ADAPTABLE SOFTWARE DEFINED WIDE AREA NETWORK APPLICATION-SPECIFIC PROBING

    公开(公告)号:US20240073117A1

    公开(公告)日:2024-02-29

    申请号:US18501190

    申请日:2023-11-03

    CPC classification number: H04L43/12 H04L43/026 H04L43/028

    Abstract: Systems, devices and techniques for an adaptive application-specific probing scheme are disclosed. An example network device includes memory configured to store a network address and probe protocol usable for probing a first network device associated with a source of an application, and one or more processors configured to determine a network address and probe protocol usable for probing the first network device, wherein the first network device comprises a server that is responsive to the probing, the server executing the application for the data flow, or a closest network device, to the server, that is responsive to the probing. The one or more processors are also configured to send to a second network device at a location serviced by the application, a message specifying the network address and probe protocol usable for probing the first network device.

    Rules driven software deployment agent

    公开(公告)号:US11777802B2

    公开(公告)日:2023-10-03

    申请号:US17457602

    申请日:2021-12-03

    CPC classification number: H04L41/082 G06F8/65 H04L43/0817 H04L43/12 H04L63/02

    Abstract: The disclosed embodiments provide for rules-based deployment of software installations. In some aspects, operational parameters for a computer system are monitored over time to generate a historical database of values for the operational parameters. The computer system may include multiple instances of a software installation. A portion of the multiple instances is updated with a new version of software. The operational parameters are then monitored to quantify whether the new version results in an improvement or degradation of performance of the computer system. The improvement or degradation is based on comparing values of the operational parameters after deployment to their historical values. Depending on the evaluation of the operational parameters after the installation, the installation may be rolled back if a degradation is indicated. Otherwise, the new software version may be propagated to additional installation instances.

    DETECTING NETWORK EVENTS HAVING ADVERSE USER IMPACT

    公开(公告)号:US20230308374A1

    公开(公告)日:2023-09-28

    申请号:US17812676

    申请日:2022-07-14

    CPC classification number: H04L43/0876 H04L41/0631 H04L45/48 H04L43/062

    Abstract: A method includes receiving, by a network management system, network data from a plurality of network devices configured to provide a network at a site; receiving, by the processing circuitry, user impact data from a plurality of client devices that access the network at the site; determining, based on the network data, a pattern of one or more network events occurring over time; correlating in time the pattern of the one or more network events to an adverse user impact event indicated by the user impact data received from the plurality of client devices; and determining, in response to the correlating, an instance of overwhelming network traffic having an adverse user impact. In some examples, the network data includes network traffic impact data, such as a number of packets dropped at a switch port due to congestion.

    WIRELESS ACCESS POINT PROXIMITY ZONES

    公开(公告)号:US20230047635A1

    公开(公告)日:2023-02-16

    申请号:US17644984

    申请日:2021-12-17

    Abstract: Techniques are described by which a network management system (NMS) is configured to generate and monitor an RSSI-based proximity zone for a wireless network using a user interface (UI). The NMS may generate a UI comprising UI elements representing access point (AP) devices configured to provide a wireless network at a site; receive, at the user interface, an indication of a user input selecting one or more UI elements representing selected AP devices; establish a proximity zone for each of the selected AP devices based on an RSSI threshold value; receive network data comprising proximity information of a client device relative to the selected AP devices; generate, based on proximity assessments using the proximity information and the RSSI threshold value of the proximity zone, one or more proximity events indicating the client device relation to the proximity zone; and invoke, based on the proximity events, one or more actions.

    RULES DRIVEN SOFTWARE DEPLOYMENT AGENT

    公开(公告)号:US20220094592A1

    公开(公告)日:2022-03-24

    申请号:US17457602

    申请日:2021-12-03

    Abstract: The disclosed embodiments provide for rules-based deployment of software installations. In some aspects, operational parameters for a computer system are monitored over time to generate a historical database of values for the operational parameters. The computer system may include multiple instances of a software installation. A portion of the multiple instances is updated with a new version of software. The operational parameters are then monitored to quantify whether the new version results in an improvement or degradation of performance of the computer system. The improvement or degradation is based on comparing values of the operational parameters after deployment to their historical values. Depending on the evaluation of the operational parameters after the installation, the installation may be rolled back if a degradation is indicated. Otherwise, the new software version may be propagated to additional installation instances.

    Methods and apparatus for performing access and/or forwarding control in wireless networks such as WLANS

    公开(公告)号:US11051169B2

    公开(公告)日:2021-06-29

    申请号:US15679128

    申请日:2017-08-16

    Abstract: Methods and apparatus for controlling access to and/or forwarding of communicated information, e.g. traffic, in a wireless communication system are described. The key, e.g., PSK, used to secure data that is transmitted to an access point for communication to a destination device is taken into consideration when deciding whether or not to provide the destination device access to the communicated content. The decision of whether or not to provide the destination device access to a communication may involve deciding whether or not to forward the received data to another device, e.g., another access point, for delivery to the destination device and/or may involve deciding whether or not to transmit the data to the destination device. If the destination device is not associated with, e.g., does not have access to and/or authorization to use, the key used to secure the received data, the data is not communicated to the destination device.

    Detecting network events having adverse user impact

    公开(公告)号:US12021722B2

    公开(公告)日:2024-06-25

    申请号:US17812676

    申请日:2022-07-14

    CPC classification number: H04L43/0876 H04L41/0631 H04L43/062 H04L45/48

    Abstract: A method includes receiving, by a network management system, network data from a plurality of network devices configured to provide a network at a site; receiving, by the processing circuitry, user impact data from a plurality of client devices that access the network at the site; determining, based on the network data, a pattern of one or more network events occurring over time; correlating in time the pattern of the one or more network events to an adverse user impact event indicated by the user impact data received from the plurality of client devices; and determining, in response to the correlating, an instance of overwhelming network traffic having an adverse user impact. In some examples, the network data includes network traffic impact data, such as a number of packets dropped at a switch port due to congestion.

Patent Agency Ranking