-
公开(公告)号:US20230262093A1
公开(公告)日:2023-08-17
申请号:US17672262
申请日:2022-02-15
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Gopal Gupta , Abhinesh Mishra
CPC classification number: H04L63/20 , H04L63/0245 , H04L63/1425 , H04L63/1441 , H04L63/1433 , G06N20/00
Abstract: A system receives one or more ingress data packets from a client device or a user in a network. The system obtains attributes, via packet inspection, from the one or more ingress data packets, and determines one or more embedding vectors from the attributes. The one or more embedding vectors represent a status of a session during which the ingress data packets are obtained. The system transmits the one or more embedding vectors as inputs to a trained machine learning model. The system infers, using the trained machine learning mode, one or more security policies based on the embedding vectors. The system provides or implementing the one or more security policies.
-
公开(公告)号:US20230136635A1
公开(公告)日:2023-05-04
申请号:US17515125
申请日:2021-10-29
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Abhinesh Mishra , Isaac Theogaraj , Prakash Chand Sharma
Abstract: Systems and methods are provided for clustering network devices into cohorts. Next, the systems may determine a subset of the network devices between which tunnels are created, based on any of amounts of available memory, jitter, latency, packet loss, and average round trip time. The selective determination may include, determining to create a first tunnel between a first network device of the first cohort and a second network device within the first cohort, and a second tunnel between the first network device and a third network device within the second cohort, and determining not to create tunnels between first remaining network devices of the first cohort and the second set of network devices of the second cohort. The systems provision the tunnel and the second tunnel to transmit data.
-
公开(公告)号:US20240147314A1
公开(公告)日:2024-05-02
申请号:US18410839
申请日:2024-01-11
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Gopal Gupta , Abhinesh Mishra , Isaac Theogaraj , Sachin Ganu , Bernd Bandemer , Jose Tellado
IPC: H04W36/00 , G06N20/00 , H04L41/16 , H04W12/041 , H04W88/08
CPC classification number: H04W36/0038 , G06N20/00 , H04L41/16 , H04W12/041 , H04W36/0061 , H04W88/08
Abstract: Systems and methods are provided for optimizing resource consumption by bringing intelligence to the key allocation process for fast roaming. Specifically, embodiments of the disclosed technology use machine learning to predict which AP a wireless client device will migrate to next. In some embodiments, machine learning may also be used to select a subset of top neighbors from a neighborhood list. Thus, instead of allocating keys for each of the APs on the neighborhood list, key allocation may be limited to the predicted next AP, and the subset of top neighbors. In some embodiments, a reinforcement learning model may be used to dynamically adjust the size of the subset in order to optimize resources while satisfying variable client demand.
-
公开(公告)号:US11750512B2
公开(公告)日:2023-09-05
申请号:US17189750
申请日:2021-03-02
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Gopal Gupta , Abhinesh Mishra , Isaac Theogaraj
Abstract: Some examples relate to identifying a dynamic network parameter probe interval in an SD-WAN. In an example, a controller may define a probe profile of an uplink in the SD-WAN. The probe profile of the uplink may include a static probe interval and a probe retry value. The controller may determine the value of the network parameter for the uplink, prior to expiration of a static probe timer interval. If the value of the network parameter is in negative deviation with a baseline value of the network parameter, the controller may identify a dynamic probe interval for each successive determination of the value of the network parameter. The identification of the dynamic probe interval for a given successive determination may depend on at least one previously determined value of the network parameter. The controller may initiate duplicate network traffic on a secondary uplink in the SD-WAN.
-
公开(公告)号:US11632261B2
公开(公告)日:2023-04-18
申请号:US17221816
申请日:2021-04-04
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Gopal Gupta , Abhinesh Mishra , Isaac Theogaraj
Abstract: Some examples relate to managing multicast group traffic. In an example, a switch anchor controller receives a request for a multicast group from an associated network switch in a multicast-capable network. The associated network switch registers to the switch anchor controller in the multicast-capable network. In response to the request, the switch anchor controller selects a non-anchor controller in the multicast-capable network to serve the multicast group to the associated network switch. The switch anchor controller provides the information related to the non-anchor controller to the associated network switch, which in response creates a specific multicast tunnel between the associated network switch and the non-anchor controller to transfer multicast traffic related to the multicast group.
-
公开(公告)号:US11212223B2
公开(公告)日:2021-12-28
申请号:US16735028
申请日:2020-01-06
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Gopal Gupta , Abhinesh Mishra , Ataur Rehman
IPC: H04L12/721 , H04L12/26
Abstract: An example non-transitory, computer-readable medium includes instructions that cause a device to determine, for uplinks of a branch gateway, a link health baseline. The instructions further cause the device to determine, for a set of criticality classes, a class link health baseline for each link health baseline, based on the link health baseline and a tolerance level of each criticality class. The instructions further cause the device to calculate, based in part on weighted parameters of the class link health baselines and an uplink cost, a path quality threshold score for each application category and for each uplink. The instructions further cause the device to select, for each application category, a primary uplink and a secondary uplink based on the path quality threshold scores. The instructions further cause the device to route network traffic through the primary uplink of the application category assigned to the network traffic.
-
-
-
-
-