-
公开(公告)号:US20140344312A1
公开(公告)日:2014-11-20
申请号:US13897232
申请日:2013-05-17
Applicant: Amazon Technologies, Inc.
Inventor: David Craig Yanacek , Bjorn Patrick Swift , Wei Xiao , Kiran-Kumar Muniswamy-Reddy , Miguel Mascarenhas Filipe , Yijun Lu
IPC: G06F17/30
CPC classification number: G06F17/30595 , G06F17/30289 , G06F17/30386
Abstract: A database management system may be operated by a third-party provider that hosts the system in a datacenter and provides access to the system to end users on behalf of various entities. Limits on total capacity consumption may be imposed, but may result in service outages when capacity consumption exceeds those limits. Requests to perform operations on the system may be classified. The request classifications may be associated with policies for admitting or rejecting the request. One or more token buckets representative of capacity available to the request to perform the operation may be used to determine to admit the request and updated based on the cost of performing the operation.
Abstract translation: 数据库管理系统可以由在数据中心中承载系统的第三方提供商来操作,并且代表各种实体向终端用户提供对系统的访问。 总容量消耗的限制可能会受到限制,但是当容量消耗超过这些限制时可能导致服务中断。 可以对在系统上执行操作的请求进行分类。 请求分类可能与允许或拒绝请求的策略相关联。 可以使用表示可用于执行操作的请求的容量的一个或多个令牌桶来确定承认请求并且基于执行操作的成本来更新。
-
公开(公告)号:US11601512B2
公开(公告)日:2023-03-07
申请号:US17245811
申请日:2021-04-30
Applicant: Amazon Technologies, Inc.
Inventor: Wei Xiao , David Alan Lutz , Timothy Andrew Rath , Maximiliano Maccanti , Miguel Mascarenhas Filipe , David Craig Yanacek
Abstract: A system that provides services to clients may receive and service requests, various ones of which may require different amounts of work. The system may determine whether it is operating in an overloaded or underloaded state based on a current work throughput rate, a target work throughput rate, a maximum request rate, or an actual request rate, and may dynamically adjust the maximum request rate in response. For example, if the maximum request rate is being exceeded, the maximum request rate may be raised or lowered, dependent on the current work throughput rate. If the target or committed work throughput rate is being exceeded, but the maximum request rate is not being exceeded, a lower maximum request rate may be proposed. Adjustments to the maximum request rate may be made using multiple incremental adjustments. Service request tokens may be added to a leaky token bucket at the maximum request rate.
-
公开(公告)号:US20210329077A1
公开(公告)日:2021-10-21
申请号:US17245811
申请日:2021-04-30
Applicant: Amazon Technologies, Inc.
Inventor: Wei Xiao , David Alan Lutz , Timothy Andrew Rath , Maximiliano Maccanti , Miguel Mascarenhas Filipe , David Craig Yanacek
IPC: H04L29/08 , G06F9/50 , G06F11/34 , H04L12/917 , H04L12/24 , H04L12/911 , H04L29/06
Abstract: A system that provides services to clients may receive and service requests, various ones of which may require different amounts of work. The system may determine whether it is operating in an overloaded or underloaded state based on a current work throughput rate, a target work throughput rate, a maximum request rate, or an actual request rate, and may dynamically adjust the maximum request rate in response. For example, if the maximum request rate is being exceeded, the maximum request rate may be raised or lowered, dependent on the current work throughput rate. If the target or committed work throughput rate is being exceeded, but the maximum request rate is not being exceeded, a lower maximum request rate may be proposed. Adjustments to the maximum request rate may be made using multiple incremental adjustments. Service request tokens may be added to a leaky token bucket at the maximum request rate.
-
公开(公告)号:US10999381B2
公开(公告)日:2021-05-04
申请号:US16377078
申请日:2019-04-05
Applicant: Amazon Technologies, Inc.
Inventor: Wei Xiao , David Alan Lutz , Timothy Andrew Rath , Maximiliano Maccanti , Miguel Mascarenhas Filipe , David Craig Yanacek
IPC: H04L12/24 , H04L29/08 , H04L12/917 , H04L12/911 , G06F9/50 , G06F11/34 , H04L29/06
Abstract: A system that provides services to clients may receive and service requests, various ones of which may require different amounts of work. The system may determine whether it is operating in an overloaded or underloaded state based on a current work throughput rate, a target work throughput rate, a maximum request rate, or an actual request rate, and may dynamically adjust the maximum request rate in response. For example, if the maximum request rate is being exceeded, the maximum request rate may be raised or lowered, dependent on the current work throughput rate. If the target or committed work throughput rate is being exceeded, but the maximum request rate is not being exceeded, a lower maximum request rate may be proposed. Adjustments to the maximum request rate may be made using multiple incremental adjustments. Service request tokens may be added to a leaky token bucket at the maximum request rate.
-
公开(公告)号:US10939480B2
公开(公告)日:2021-03-02
申请号:US16377031
申请日:2019-04-05
Applicant: Amazon Technologies, Inc.
Inventor: Kyle Michael Roche , David Craig Yanacek
Abstract: A network-connected device service receives a request to establish a communications session with a network-connected device. In response to the request, the service transmits a set of electronic messages to the network-connected device through an access point of the network-connected device to establish the communications session. The network-connected device service receives a notification from the network-connected device indicating whether the communications session has been established. If so, the service provides an indication to a controlling device that the session has been established. This enables the controlling device to submit commands executable by the network-connected device to the service, which provides the commands to the network-connected device through the access point.
-
公开(公告)号:US10521449B1
公开(公告)日:2019-12-31
申请号:US14573956
申请日:2014-12-17
Applicant: Amazon Technologies, Inc.
Inventor: Benjamin Aldouby Schwartz , Khawaja Salman Shams , Usman Ahmed Shami , David Craig Yanacek , Khai Quang Tran
Abstract: One or more computing nodes located in a first region may maintain a first collection of data items. A second set of one or more computing nodes in a second region may maintain a collection of data items that is at least a partial replica of the first collection. Notifications of changes to the first collection may be transmitted, via a broadcast communications channel, to a replication module, which may be included in a client application. The replication module may transmit requests to update the second collection of data based on changes to the first collection. Conflicts may be resolved through a last-write wins policy.
-
公开(公告)号:US10459898B2
公开(公告)日:2019-10-29
申请号:US14845220
申请日:2015-09-03
Applicant: Amazon Technologies, Inc.
Inventor: David Craig Yanacek , Mohammad Zeeshan Qureshi , Jai Vasanth , Pejus Manoj Das , Stefano Stefani , Stuart Henry Seelye Marshall , Wei Xiao
IPC: G06F16/21 , G06F16/22 , G06F16/955
Abstract: Methods and apparatus for configurable-capacity time-series tables are disclosed. A schedule of database table management operations, including at least an operation to change a throughput constraint associated with a table in response to a triggering event, is generated. The table is instantiated with an initial throughput constraint in accordance with the schedule. Work requests directed to the table are accepted based on the initial throughput constraint. The throughput constraint is modified in response to the triggering event. Subsequent work requests are accepted based on the modified throughput constraint.
-
公开(公告)号:US10387578B1
公开(公告)日:2019-08-20
申请号:US14868181
申请日:2015-09-28
Applicant: Amazon Technologies, Inc.
Inventor: Wei Xiao , David Craig Yanacek
IPC: G06F17/30
Abstract: Capacity utilization may be controlled by a token-based allocation of input/output capacity. Operations on nested objects may utilize capacity based on factors other than input/output capacity. A capacity utilization model may be used to scale input/output utilization associated with an operation on a nested object so that the scaled input/output utilization correlates to the computing capacity used performing the operation on the nested object. The correlation may be determined to be valid for a range of attributes associated with the operation.
-
公开(公告)号:US20170171182A1
公开(公告)日:2017-06-15
申请号:US14968697
申请日:2015-12-14
Applicant: Amazon Technologies, Inc.
Inventor: David Craig Yanacek , Rameez Loladia
CPC classification number: H04L63/08 , H04L12/2818 , H04L12/4633 , H04L63/0272 , H04L63/0281 , H04L63/029 , H04L63/0876 , H04L63/101 , H04L63/105 , H04L63/166 , H04L67/28 , H04W4/70 , H04W12/08
Abstract: A device management service provide a centralized credential provisioning system which can instantiate a proxy device that facilitates remote connections between various computing devices and various client devices. The device management service can manage instances of proxy devices in a resource provider environment that are associated with various computing devices. When a client device requests to access a computing device, the device management service can identify an instance of a proxy device associated with the computing device. The instance of the proxy device and the computing device can be configured to securely connect using credentials exchanged through, and managed by, the device management service. The computing device can be instructed to connect to the instance of the proxy device, and the client device can be provided with access information for the instance of the proxy device.
-
公开(公告)号:US20170141958A1
公开(公告)日:2017-05-18
申请号:US15420007
申请日:2017-01-30
Applicant: Amazon Technologies, Inc.
Inventor: Adam Douglas Morley , David Craig Yanacek
CPC classification number: H04L41/0806 , H04L41/0893 , H04L41/5051 , H04L67/2842
Abstract: Methods and apparatus for dedicated endpoint instances for network-accessible services are disclosed. The number of dedicated endpoint instances to be established to direct work requests of a given client to back-end nodes of a service may be determined. Configuration policies for the instances, including one or more policies related to caching, authentication, redundancy, durability, availability, and/or load balancing, may also be determined. Configuration of the instances may be initiated, and an indication that the endpoint or endpoints have been configured may be provided to the client.
-
-
-
-
-
-
-
-
-