Abstract:
A method is provided in one example embodiment and includes receiving a request for a service that involves phasor measurement unit (PMU) data; identifying a service device in a network to perform the service; and multicasting one or more results of the service to a group of subscribers identified by a multicast group address. In more particular embodiments, particular PMU data is redirected to the service device via a service insertion architecture (SIA) protocol. In addition, the service can include replicating packets and masking a subset of traffic for forwarding to a first hop router of the network. In certain example instances, metadata is used in order to apply the service to certain traffic propagating in the network.
Abstract:
In one embodiment, a method includes obtaining information relating to a steady state operation of a portion of an electrical network, the electrical network including a plurality of components, the information being obtained from the plurality of components while the portion of the electrical network is operating at steady state, wherein the information is obtained through a communications network that at least partially overlays the electrical network. The method also includes detecting a fault in the electrical network, isolating the location of the fault, and restoring the electrical network. The fault is detected by at least a first component of the plurality of components. Restoring the electrical network includes determining when the first component owns the fault. Determining when the first component owns the fault includes at least processing the information obtained from the plurality of components.
Abstract:
In one embodiment, a method includes obtaining information relating to a steady state operation of a portion of an electrical network, the electrical network including a plurality of components, the information being obtained from the plurality of components while the portion of the electrical network is operating at steady state, wherein the information is obtained through a communications network that at least partially overlays the electrical network. The method also includes detecting a fault in the electrical network, isolating the location of the fault, and restoring the electrical network. The fault is detected by at least a first component of the plurality of components. Restoring the electrical network includes determining when the first component owns the fault. Determining when the first component owns the fault includes at least processing the information obtained from the plurality of components.
Abstract:
In one embodiment, a method includes receiving a packet at a network device in communication with a plurality of client nodes, the packet identifying a first client node, performing a look up in a table stored at the network device to locate policies associated with the first client node, the table including an entry for each of the client nodes, each entry having a plurality of policies associated with the client node, applying the policies associated with the first client node at a forwarding engine at the network device, and forwarding the packet from the network device. An apparatus is also disclosed.
Abstract:
In an example embodiment, packets for a selected flow are replicated and sent over one or more diverse paths, such as a primary path and at least one secondary path, to a destination switching device. At the destination switching device, one copy of the replicated packets is selected for delivery to the destination, and the remaining copies are discarded. In the event that packets are not received at the destination switching device due to loss of connection on the primary path or packets are not timely delivered due to congestion on the primary path, a different path may be selected as the primary path.
Abstract:
Method and system for providing a dynamic network configuration and management based on defining and applying high level administrative intents including retrieving one or more attributes associated with one or more logical groups in a network, determining one or more network policies based on the one or more retrieved attributes, associating the one or more logical groups to a respective network group identifier, and generating a network group list associated with the one or more network group identifiers, is disclosed.
Abstract:
In one embodiment, a method for processing encrypted wireless station data at a network device includes receiving from an access point, one or more frames comprising wireless station data fragmented into a plurality of encrypted protocol data units. The frames are configured to identify the encrypted protocol units associated with the wireless station data. The method further includes decrypting the encrypted protocol data units and forwarding the wireless station data. An apparatus for processing encrypted wireless station data, a method for transmitting encrypted multicast data for a wireless client, and a method for processing encrypted wireless station data at an access point are also disclosed.
Abstract:
A method and apparatus for handoff of a wireless client from a first network device to a second network device in a wired network are disclosed. In one embodiment, the method includes receiving data from a new wireless client at the second network device and transmitting a request for a route update for the new wireless client to the wired network. Prior to network convergence for the route update, data traffic for the new wireless client is received from the first network device and forwarded to the new wireless client. Context information for the new wireless client is transmitted from the second network device to other network devices in a proximity group of the second network device.
Abstract:
In one aspect, a computerized system for locating anomalous query activity with a cloud-based database, comprising: with an atypical query engine: analyzing and understanding data within a cloud-based database, processing all accesses to the data within cloud-based database and SAAS environment, generating a list of user that accesses a table from a location in the cloud-based database using, and capture a set of specified key statistics about the cloud-based database query; and role suggestion engine: generating a user behavior fingerprint comprising a history of the user's behavior within the cloud-based database, identifying that a user is an outlier with respect to behavior with respect to the set of specified key statistics, and suggesting a new role within an enterprise managing the cloud-based database for the user, wherein the fingerprint of the outlier user is used to generate the suggestion for the new role.
Abstract:
At a network device of each of a plurality of generator substations that is connected to a multi-terminal transmission line, phasor measurement data produced by a phasor measurement unit at the generator substation is assigned to a multicast stream. A request is received from a network device at any of the plurality of the generator substations to join the multicast stream so that a destination device at any of the plurality of generator substations receives the phasor measurement data carried by the multicast stream. The multicast stream is sent for distribution to one or more destination devices at respective ones of the plurality of generator substations.