Abstract:
Method and system for providing dynamic configuration of network elements using hierarchical inheritance including monitoring a data network, detecting a change associated with a configuration of the data network, identifying one or more member groups affected by the detected change, and modifying the network configuration for the one or more member groups in the data network, is disclosed.
Abstract:
Methods and articles of manufacture relating to server load balancing are disclosed. In one aspect, the method includes load balancing a plurality of network packets among a plurality of servers using a minimally disruptive hash table having a plurality of hash table buckets by identifying a plurality of elements, each element corresponding to at least one of the plurality of servers, inserting at least two of the identified plurality of elements into the minimally disruptive hash table so that at least some of the hash table buckets each include one of the plurality of elements, receiving one of the plurality of network packets, determining a hash table index for the received network packet using a hash function, identifying an element stored in a hash table bucket corresponding to the hash table index, and transmitting the received network packet to a server corresponding to the identified element.
Abstract:
In one embodiment, a method includes receiving a communication from an endpoint device at a network access device located within a data path between the endpoint device and a network, identifying a network admission control policy for the endpoint device, enforcing at the network access device, the network admission control policy for traffic received from the endpoint device, and forwarding at the network access device, traffic from the endpoint device to the network in accordance with the network admission control policy. An apparatus is also disclosed.
Abstract:
In one embodiment, a method includes receiving a packet from a source wireless device at a second switch, the source wireless device previously associated with a first switch and roamed to and associated with the second switch, wherein a point of presence for the source wireless device is maintained at the first switch, inserting into the packet a direction indicator, and forwarding the packet from the second switch to the first switch, the direction indicator identifying the packet as being transmitted towards the point of presence for the source wireless device to prevent a forwarding loop. An apparatus is also disclosed.
Abstract:
Security is enabled in an electrical system by examining a configuration file for a substation present in the electrical system, where the substation includes one or more electrical devices and one or more network devices. Based on the examination of the configuration file, information is determined on a characteristic of an electrical device that is selected from a group including a type, allowed role of the electrical device and allowed communication modes for the electrical device. Based on the determined information, a basis for controlling the role and communication modes for the electrical device is identified. A security policy is configured in a network device in the substation to incorporate the identified basis. Based on the configured security policy in the network device, communication patterns for the electrical device are allowed that are associated with the allowed role and allowed communication modes for the electrical device.
Abstract:
Techniques are provided for the controlled scheduling of the authentication of devices in a lossy network, such as a mesh network. An authenticator device that is configured to authenticate devices in a lossy network receives an authentication start message from a particular device to be authenticated. The authenticator device determines a schedule for engaging in an authentication procedure for the particular device based on an indication of current network utilization.
Abstract:
A method is provided in one example embodiment and includes receiving a request for a service that involves phasor measurement unit (PMU) data; identifying a service device in a network to perform the service; and multicasting one or more results of the service to a group of subscribers identified by a multicast group address. In more particular embodiments, particular PMU data is redirected to the service device via a service insertion architecture (SIA) protocol. In addition, the service can include replicating packets and masking a subset of traffic for forwarding to a first hop router of the network. In certain example instances, metadata is used in order to apply the service to certain traffic propagating in the network.
Abstract:
In one embodiment, a method includes obtaining information relating to a steady state operation of a portion of an electrical network, the electrical network including a plurality of components, the information being obtained from the plurality of components while the portion of the electrical network is operating at steady state, wherein the information is obtained through a communications network that at least partially overlays the electrical network. The method also includes detecting a fault in the electrical network, isolating the location of the fault, and restoring the electrical network. The fault is detected by at least a first component of the plurality of components. Restoring the electrical network includes determining when the first component owns the fault. Determining when the first component owns the fault includes at least processing the information obtained from the plurality of components.
Abstract:
In one embodiment, a method includes obtaining information relating to a steady state operation of a portion of an electrical network, the electrical network including a plurality of components, the information being obtained from the plurality of components while the portion of the electrical network is operating at steady state, wherein the information is obtained through a communications network that at least partially overlays the electrical network. The method also includes detecting a fault in the electrical network, isolating the location of the fault, and restoring the electrical network. The fault is detected by at least a first component of the plurality of components. Restoring the electrical network includes determining when the first component owns the fault. Determining when the first component owns the fault includes at least processing the information obtained from the plurality of components.
Abstract:
In one embodiment, a method includes receiving a packet at a network device in communication with a plurality of client nodes, the packet identifying a first client node, performing a look up in a table stored at the network device to locate policies associated with the first client node, the table including an entry for each of the client nodes, each entry having a plurality of policies associated with the client node, applying the policies associated with the first client node at a forwarding engine at the network device, and forwarding the packet from the network device. An apparatus is also disclosed.