Automated synchronized domain wide transient policy

    公开(公告)号:US09705921B2

    公开(公告)日:2017-07-11

    申请号:US14254492

    申请日:2014-04-16

    Inventor: Eric A. Voit

    CPC classification number: H04L63/20

    Abstract: Techniques are provided for, at an administrative device in a network domain, monitoring a network traffic flow parameter to determine whether a presently applied domain wide policy configured to control a network traffic flow should be removed. In response to determining that the domain wide policy should be removed, a command is generated which causes removal of the domain wide policy at each one of the plurality of network devices, and the command is sent to each one of the plurality of network devices to cause the domain wide policy to be removed at substantially the same time at each network device. Alternatively, the domain wide policy can be automatically removed by the expiry of a timer or in accordance with a timestamp so that the policy is revoked across the network domain without a need for an explicit network wide control message instructing removal of the policy.

    Automatic configuration of external services based upon network activity
    12.
    发明授权
    Automatic configuration of external services based upon network activity 有权
    根据网络活动自动配置外部服务

    公开(公告)号:US09392050B2

    公开(公告)日:2016-07-12

    申请号:US13842394

    申请日:2013-03-15

    Abstract: System, computer program product, and method to configure an external network based on internal network conditions, by monitoring a load attribute of one or more network flows traversing an ingress port of at least one network element in a software-defined networking (SDN) enabled network, upon determining that the load attribute of a first network element in the SDN enabled network exceeds a predefined threshold, provisioning, by the application, an additional service on the external network, by the application, an additional service on the external network, and extending, by the application, the SDN enabled network to include the additional service on the external network.

    Abstract translation: 系统,计算机程序产品和基于内部网络条件来配置外部网络的方法,通过监视在启用的软件定义网络(SDN)中穿过至少一个网络元素的入口端口的一个或多个网络流的负载属性 网络,在确定所述启用SDN的网络中的第一网元的负载属性超过预定阈值时,所述应用在所述外部网络上由所述应用提供外部网络上的附加服务,所述外部网络上的附加服务,以及 由应用程序扩展启用SDN的网络,以在外部网络上包括附加服务。

    OBFUSCATING SERVER-SIDE ADDRESSES
    13.
    发明申请

    公开(公告)号:US20250071088A1

    公开(公告)日:2025-02-27

    申请号:US18237574

    申请日:2023-08-24

    Abstract: Techniques for using Home Addresses, Mobile Internet Protocol (MIP), and/or other techniques in conjunction with Domain Name System (DNS) to obfuscate server-side addresses in data communications. Rather than having DNS provide a client device with an IP address of an endpoint device, such as a server, the DNS instead returns a Home Address that is mapped to the client device and at least one server IP address of the endpoint device. In this way, IP addresses of servers are obfuscated by a network mapping of the Home Addresses and the server IP addresses. The client device may then communicate data packets to the server using the Home Addresses as the destination address, and a virtual network service that works in conjunction with DNS can encapsulate the data packet with the server IP addresses and forward the data packet onto the server.

    Client-Aware Floorplan Management with Predicted Confidence Levels

    公开(公告)号:US20250023777A1

    公开(公告)日:2025-01-16

    申请号:US18350873

    申请日:2023-07-12

    Abstract: Devices, systems, methods, and processes for managing network devices through generated predictions and associated confidence levels are described herein. Networks within a floorplan can be operated at full capacity all day in an inefficient way when not adjusted due to traffic patterns and seasonality changes. Data related to the topology of the network, along with historical data can be utilized to generate predictions of various network needs. For example, the overall network throughput capacity needs may be predicted for a series of points in the future. An associated confidence level can be generated as well including one or more confidence intervals. These can be utilized to select a future need for the network and generate a corresponding sustainable network configuration for the network devices and/or their transceivers that can provide sufficient network needs while minimizing the overall power used. This can be automated over time once trust has been established.

    Energy-Aware Traffic Forwarding and Loop Avoidance

    公开(公告)号:US20240333591A1

    公开(公告)日:2024-10-03

    申请号:US18381426

    申请日:2023-10-18

    CPC classification number: H04L41/0833 H04L41/12 H04L45/48

    Abstract: Energy-aware configurations can be utilized to operate a network based on sustainability-related metrics. In many embodiments, a suitable device includes a processor, a memory commutatively coupled to the processor, a plurality of elements, a communication port, and an energy-aware topology logic configured to collect topology data from one or more network devices, wherein each of the one or more network devices include a plurality of elements. The energy-aware topology logic can receive power source data and power usage data related to plurality of elements and generate an element energy coefficient (EEC) for a plurality of elements. Subsequently, the energy-aware topology logic can also generate an energy-aware configuration for at least one of the one or more network devices, and then pass the generated energy-aware configuration to the at least one network device, wherein the energy-aware configuration is configured to steer traffic based on at least one sustainability-related metric.

    Conflict avoidant traffic routing in a network environment

    公开(公告)号:US10652137B2

    公开(公告)日:2020-05-12

    申请号:US15689141

    申请日:2017-08-29

    Abstract: An example method for facilitating conflict avoidant traffic routing in a network environment is provided and includes detecting, at a network element, an intent conflict at a peer network element in a network, and changing a forwarding decision at the network element to steer traffic around the conflicted peer network element. The intent conflict refers to an incompatibility between an asserted intent associated with the traffic and an implemented intent associated with the traffic. In specific embodiments, the detecting includes mounting rules from the peer network element into the network element, and analyzing the mounted rules to determine intent conflict. In some embodiments, a central controller in the network deploys one or more intentlets on a plurality of network elements in the network according to corresponding intent deployment parameters.

    Routing and/or forwarding information driven subscription against global security policy data

    公开(公告)号:US10313396B2

    公开(公告)日:2019-06-04

    申请号:US15475235

    申请日:2017-03-31

    Abstract: Techniques are provided by which devices in a network may subscribe to a rapidly changing rules in central threat repository. The policies associated with threats are filtered so that just current attack vectors from within subnets learned via routing and/or forwarding information (at the network level of the network) are installed in the local access control list/policy database of the network devices. As routing changes occur, the list of applied policies are continually refined/revisited and pulled from a central security application. Publish/subscribe mechanisms ensure “zombie” policies are not left over in the device after reboot or routing changes occur.

    PRIORITIZED DE-QUEUEING
    19.
    发明申请

    公开(公告)号:US20190028399A1

    公开(公告)日:2019-01-24

    申请号:US15654927

    申请日:2017-07-20

    Abstract: A method is provided in one example and includes allocating a first queue, allocating at least two default queues, where the at least two default queues depend from the first queue, allocating a plurality of local queues that each depend from one of the at least two defaults queues, receiving data in a data stream, determining a quality of service (QoS) associated with the data, and assigning the data to one of the plurality of local queues based on the determined QoS. In an example, the QoS is a differentiated services code point.

Patent Agency Ranking