-
公开(公告)号:US10938666B2
公开(公告)日:2021-03-02
申请号:US16110979
申请日:2018-08-23
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Sanchal Thakkar , Yashavantha Nagaraju , Ashmitha Jiv Shetty
Abstract: A method for network testing simulation includes generating a simulated network configuration comprising a plurality of simulation nodes based on a topology of an existing network. The method also includes determining a peak traffic for the existing network based on a volume of traffic processed by the existing network, and a plurality of protocols of the traffic. The method further includes generating a simulated traffic based on the peak traffic, the protocols, and the simulated network configuration. Additionally, the method includes processing the simulated traffic using the simulated network configuration to generate a plurality of simulation states of the nodes. Also, the method includes determining whether the software upgrade is tested successfully based on the generated states of the nodes.
-
公开(公告)号:US20190394143A1
公开(公告)日:2019-12-26
申请号:US16013570
申请日:2018-06-20
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Sunitha Ayyappan , Praveen Ramesh Ganjam , Yashavantha Nagaraju
IPC: H04L12/947 , H04L12/46 , H04L12/26 , H04L12/24
Abstract: In some examples, a system determines whether data of a device that communicates with a switch is to be subjected to further inspection based on a data pattern derived based on the data. In response to determining that the data of the device is not to be subjected to the further inspection, the system causes forwarding, based on forwarding information accessible by the switch, of the data along a path to a recipient. In response to determining that the data of the device is to be subjected to the further inspection, the system causes forwarding of the data by the switch to a controller that applies the further inspection.
-
公开(公告)号:US11063809B2
公开(公告)日:2021-07-13
申请号:US16270552
申请日:2019-02-07
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Nitin Singla , Yashavantha Nagaraju
IPC: H04L12/24
Abstract: Systems and methods are disclosed in which Simple Network Management Protocol (SNMP) servers form a blockchain network. Each SNMP server stores and maintains a local copy of a consensus ledger for which a consensus agreement has been obtained among the SNMP servers. The consensus agreement may be based on a validation of one or more fingerprints for one or more blocks of information in the ledger. The fingerprint for each block may be based on information in a preceding block. The consensus ledger includes transaction information for SNMP operations performed between the SNMP servers and managed devices. The common consensus ledger helps ensure that bandwidth, CPU time, and energy for the managed devices and the SNMP servers is not wasted on duplicate SNMP operations.
-
公开(公告)号:US20200213215A1
公开(公告)日:2020-07-02
申请号:US16238440
申请日:2019-01-02
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Sunil Jayadevappa , Yashavantha Nagaraju , Nitin Singla
IPC: H04L12/751 , H04L9/32 , H04L29/06 , H04L12/721
Abstract: Systems and methods are disclosed in which access devices such as routers and switches form a blockchain network. Each router and switch stores and maintains a local copy of a network topology ledger for which a consensus agreement has been obtained among the routers and switches. The consensus agreement may be based on a validation of one or more fingerprints for one or more blocks of information in the ledger. The fingerprint for each block may be based on information in a preceding block. The network topology ledger includes device identification, routing, and/or other information for device authentication and packet routing by the routers and switches.
-
公开(公告)号:US20190068738A1
公开(公告)日:2019-02-28
申请号:US16113473
申请日:2018-08-27
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Praveen Ramesh Ganjam , Yashavantha Nagaraju , Vinod Muraleedharan
Abstract: On one example in accordance with the present disclosure, a system may include a processor and a memory storing end of life information. The end of life information may indicate a date when the network device will no longer be supported. The memory may comprise instructions executable by the processor to determine, based on the end of life information, that an end of life threshold has been reached and to generate a notification that the end of life threshold has been reached, wherein the notification includes the date when the network device will no longer be supported. The memory may also comprise instructions executable by the processor to broadcast the notification on a network accessible by the network device.
-
公开(公告)号:US11449597B2
公开(公告)日:2022-09-20
申请号:US16166337
申请日:2018-10-22
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Lavanya Bollam , Yashavantha Nagaraju , Sharath Srikanth Chellappa
Abstract: Example implementations relate to transposed passwords. A computing device may comprise a processing resource; and a memory resource storing machine-readable instructions to cause the processing resource to: receive an entered password; generate, based on the entered password, a transposed version of the entered password; compare the transposed version of the password to a stored password; and grant access based on the comparison.
-
7.
公开(公告)号:US11277407B2
公开(公告)日:2022-03-15
申请号:US16112669
申请日:2018-08-25
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Yashavantha Nagaraju , Nitin Singla , Praveen Ramesh Ganjam , Kunal Deshpande
IPC: H04L29/06 , H04L29/08 , H04W4/70 , H04L29/12 , H04L67/12 , H04L69/28 , H04L101/622 , H04L61/103
Abstract: Examples described relate to disabling of MAC address aging time for an IoT device on a network switch. In an example, in response to a device joining a network, a network switch in the network may determine a media access control (MAC) address of the device. The network switch may then send the MAC address to an authentication server. In response, the network switch may receive a Vendor Specific Attribute (VSA) associated with the MAC address from the authentication server. The VSA indicates that the MAC address relates to an IoT device. Based on the VSA, the network switch may recognize the MAC address of the device as a MAC address of the IoT device. In response to recognizing, the network switch may disable MAC address aging time for the MAC address of the IoT device on the network switch.
-
8.
公开(公告)号:US20190089704A1
公开(公告)日:2019-03-21
申请号:US16112669
申请日:2018-08-25
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Yashavantha Nagaraju , Nitin Singla , Praveen Ramesh Ganjam , Kunal Deshpande
Abstract: Examples described relate to disabling of MAC address aging time for an IoT device on a network switch. In an example, in response to a device joining a network, a network switch in the network may determine a media access control (MAC) address of the device. The network switch may then send the MAC address to an authentication server. In response, the network switch may receive a Vendor Specific Attribute (VSA) associated with the MAC address from the authentication server. The VSA indicates that the MAC address relates to an IoT device. Based on the VSA, the network switch may recognize the MAC address of the device as a MAC address of the IoT device. In response to recognizing, the network switch may disable MAC address aging time for the MAC address of the IoT device on the network switch.
-
公开(公告)号:US10768992B2
公开(公告)日:2020-09-08
申请号:US15865972
申请日:2018-01-09
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Dhanesh Kumar Shanmuga Sundaram , Supreeth Sathyanarayana , Praveen Ramesh Ganjam , Yashavantha Nagaraju
Abstract: Examples disclosed herein relate to provisioning a network device in a stack. In an example, a master network device in a stack may detect a new network device in the stack. In response to detecting, master network device may determine whether a member network device of the stack is missing. In response to determining that the member network device of the stack is missing, master network device may identify each active adjacent member of the member network device. The master network device may determine whether each active adjacent member of the member network device has detected the new network device in the stack. In response to determining that each active adjacent member of the member network device has detected the new network device in the stack, master network device may provision the new network device with a member ID of the member network device to the stack.
-
公开(公告)号:US20190238539A1
公开(公告)日:2019-08-01
申请号:US15926257
申请日:2018-03-20
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Praveen Kumar Arora , Sivasankaran Nagarajan , Nitin Singla , Yashavantha Nagaraju , Praveen Ganjam Ramesh , Kunal Deshpande
IPC: H04L29/06
CPC classification number: H04L63/0876 , H04L63/104 , H04L63/162 , H04L63/20
Abstract: A method, executable by a switch to automatically onboard end devices connected thereto, comprises detecting that an end device has connected to the switch, and determining a device identity of the connected end device. The determined device identity is used to obtain a configuration template profile associated with the connected end device. The switch is configured using the obtained configuration template profile.
-
-
-
-
-
-
-
-
-