-
31.
公开(公告)号:US11082293B2
公开(公告)日:2021-08-03
申请号:US16867382
申请日:2020-05-05
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Charles F. Clark , Craig Joseph Mills , Shaun Wackerly
Abstract: A network configuration change validation environment is disclosed. In particular, this disclosure is related to an interface to initiate automated test actions (e.g., network monitoring commands, application monitoring commands, etc.) and to view results in an efficient manner to support a network communication infrastructure. In one example, results of a set of commands executed prior to a configuration change may serve as a baseline and one or more results of the same set of commands may be intelligently compared to the baseline to identify any potential issues that have arisen. For example, as a result of a specific network configuration change or application update. The disclosed network change validation command initiator and validation report viewer represent part of an overall network configuration change validation environment that includes automated techniques such that it may be used within a given change window.
-
公开(公告)号:US20210044498A1
公开(公告)日:2021-02-11
申请号:US16537411
申请日:2019-08-09
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Anu Mercian , David Rodrigues Pinheiro , Charles F. Clark
Abstract: Systems and methods are provided for self-tuning networks using distributed analytics for network devices. In some embodiments, the method includes instantiating, in a network device, an agent for a network protocol, wherein the agent: monitors a performance parameter for a resource of the network protocol, and responsive to a value of the performance parameter exceeding a threshold value, reports an anomaly for the network protocol to a remote management server, receives a new threshold value from the remote management server, the new threshold value being based on the anomaly reported by the network device, and anomalies reported by other network devices according to respective thresholds employed by the network devices for the performance parameter for the resource of the network protocol, and replaces the threshold value of the performance parameter for the resource of the network protocol with the new threshold value received from the remote management server.
-
33.
公开(公告)号:US10778517B2
公开(公告)日:2020-09-15
申请号:US15934806
申请日:2018-03-23
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Charles F. Clark , Craig Joseph Mills , Shaun Wackerly
Abstract: A network configuration change validation environment is disclosed. In particular, this disclosure is related to an interface to initiate automated test actions (e.g., network monitoring commands, application monitoring commands, etc.) and to view results in an efficient manner to support a network communication infrastructure. In one example, results of a set of commands executed prior to a configuration change may serve as a baseline and one or more results of the same set of commands may be intelligently compared to the baseline to identify any potential issues that have arisen. For example, as a result of a specific network configuration change or application update. The disclosed network change validation command initiator and validation report viewer represent part of an overall network configuration change validation environment that includes automated techniques such that it may be used within a given change window.
-
34.
公开(公告)号:US10530681B2
公开(公告)日:2020-01-07
申请号:US15752377
申请日:2015-08-14
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Shaun Wackerly , Charles F. Clark , Duane Edward Mentze
IPC: H04L12/703 , H04L12/725 , H04L12/721 , H04L12/715 , H04L12/707 , H04L12/24 , H04L12/26 , H04L12/813
Abstract: In an example, a method is disclosed for implementing forwarding behavior based on communication activity between an SDN controller and a network device. The method includes generating, for the network device, a first flow table rule to implement first forwarding behavior for a network flow if communication to the SDN controller is active. The first flow table rule comprises match criteria for matching to the network flow, a first timeout value, and a first priority value. The method also includes generating, for the network device, a second flow table rule to implement second forwarding behavior for the network flow if communication to the SDN controller is not active. The second flow table rule comprises match criteria for matching to the network flow, a second timeout value, and a second priority value. The method further includes instructing the network device to implement the first and second flow table rules.
-
公开(公告)号:US12101218B2
公开(公告)日:2024-09-24
申请号:US17394995
申请日:2021-08-05
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Charles F. Clark , Shaun Wakumoto
IPC: H04L41/0213 , H04L12/44 , H04L41/12 , H04L45/00 , H04L45/48 , H04L49/354 , H04L41/0659 , H04L45/18
CPC classification number: H04L41/0213 , H04L12/44 , H04L41/12 , H04L45/48 , H04L45/66 , H04L49/354 , H04L41/0659 , H04L45/18
Abstract: Embodiments herein relate to transmitting specific traffic along a blocked link. A status of links between switches of a network is monitored. The status of the links is one of blocked and non-blocked. A blocked link is not used by a Spanning Tree Protocol (STP). At least one of the network switches is configured to transmit the specific traffic along the blocked link.
-
公开(公告)号:US20230306108A1
公开(公告)日:2023-09-28
申请号:US17700958
申请日:2022-03-22
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Alex Veprinsky , Charles F. Clark , John Blumenthal , Ayman Abouelwafa
IPC: G06F21/55
CPC classification number: G06F21/552 , G06F2221/034
Abstract: In some examples, a system applies an inline detection of a write of data in a storage, the inline detection to detect potential data encryption of the data. In response to an indication of the potential data encryption, the system creates a first object that represents a first version of the data, and applies a further analysis to determine whether the potential data encryption constitutes unauthorized data encryption, the further analysis based on the first object and a second object that represents a second version of the data that is prior to the first version of the data.
-
公开(公告)号:US11463341B2
公开(公告)日:2022-10-04
申请号:US17142389
申请日:2021-01-06
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Charles F. Clark , Shaun Wackerly
IPC: H04L43/50 , H04L41/0873 , H04L43/0817
Abstract: An example method is described for monitoring a network. The method includes detecting that a network attribute has been updated at a network device. The method further includes selecting, based in part on the updated network attribute, a set of network functionality tests from a group of network functionality tests. The method further includes executing the set of network functionality tests. The method further includes receiving information describing functionality of the network during the set of network functionality tests at the network device. The method further includes determining results of the set of network functionality tests based on the information describing functionality of the network. The method further includes calculating a network functionality score based, in part, on the results of the set of network functionality tests.
-
公开(公告)号:US11438161B2
公开(公告)日:2022-09-06
申请号:US16671088
申请日:2019-10-31
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Thomas M. Laffey , Charles F. Clark
Abstract: A method and apparatus for use in a trusted network environment together or separately employ an implicit attestation that a requesting computing resource is in a trusted state before access to a network resource is granted. The method includes: verifying that a requesting computing resource is in a trusted state; accessing the private key using the released key authorization value; and creating a digital signature for the requesting device from the accessed private key. The apparatus may implement the method.
-
公开(公告)号:US11316756B2
公开(公告)日:2022-04-26
申请号:US16537411
申请日:2019-08-09
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Anu Mercian , David Rodrigues Pinheiro , Charles F. Clark
IPC: H04L12/24 , H04L29/06 , H04L41/5025 , H04L41/5009 , H04L41/046
Abstract: Systems and methods are provided for self-tuning networks using distributed analytics for network devices. In some embodiments, the method includes instantiating, in a network device, an agent for a network protocol, wherein the agent: monitors a performance parameter for a resource of the network protocol, and responsive to a value of the performance parameter exceeding a threshold value, reports an anomaly for the network protocol to a remote management server, receives a new threshold value from the remote management server, the new threshold value being based on the anomaly reported by the network device, and anomalies reported by other network devices according to respective thresholds employed by the network devices for the performance parameter for the resource of the network protocol, and replaces the threshold value of the performance parameter for the resource of the network protocol with the new threshold value received from the remote management server.
-
公开(公告)号:US11290329B2
公开(公告)日:2022-03-29
申请号:US16864037
申请日:2020-04-30
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Shaun Wackerly , Charles F. Clark
IPC: H04L12/24 , H04L41/084 , H04L41/0806
Abstract: Examples described herein configure a network based on a centroid configuration of a group of network entities. Examples herein include classifying a plurality of network entities into a classification, wherein the network entities are configured on a plurality of network devices that are connected to the network. Examples herein include, based on the classification of the network entities, grouping the network entities into a plurality of groups. Examples herein include determining, for each of the groups, a centroid configuration of the network entities in the group. Examples herein include sending instructions to configure the network according to the centroid configuration of a selected one of the groups, wherein at least one network entity is configured according to the centroid configuration of the selected group in response to receiving the instructions.
-
-
-
-
-
-
-
-
-