Association-rules based on BSS- and affinity-coloring

    公开(公告)号:US11190956B2

    公开(公告)日:2021-11-30

    申请号:US16752313

    申请日:2020-01-24

    Abstract: Embodiments herein describe association rules (e.g., affinity and anti-affinity rules) that a wireless device can use to optimize its performance in a Wi-Fi network. While BSS coloring is typically used to eliminate color collisions, the embodiments herein use BSS coloring to define what BSS colors should be on the same channel and which should not. For example, an affinity rule can indicate that a wireless device assigned a first BSS color (e.g., red) can share the same channel with wireless devices (or BSSs) assigned a second BSS color (e.g., green). In contrast, an anti-affinity rule can indicate that a wireless device in the red BSS color cannot share a channel with a wireless device assigned to a third BSS color (e.g., blue). The embodiments herein permit the wireless devices to be grouped with, or separated from, wireless devices having different BSS colors.

    DETERMINING FORMAL MODELS USING WEIGHTING FACTORS FOR COMPUTING ELEMENTS IN MULTI-DOMAIN ENVIRONMENTS

    公开(公告)号:US20210367852A1

    公开(公告)日:2021-11-25

    申请号:US17217532

    申请日:2021-03-30

    Abstract: Techniques for deploying, monitoring, and modifying network topologies operating across multi-domain environments using formal models and weighting factors assigned to computing elements in the network topologies. The weighting factors restrict or allow the movement of various computing elements and/or element groupings to prevent undesirable disruptions or outages in the network topologies. Generally, the weighting factors may be determined based on an amount of disruption experienced in the network topologies if the corresponding computing element or grouping was migrated. As the amount of disruption caused by modifying a particular computing element increases, the weighting factor represents a greater measure of resistivity for migrating the computing element. In this way, topology deployment systems may allow, or disallow, the modification of particular computing elements based on weighting factors. Thus, the amount of disruption in the functioning of network topologies may be considered when optimizing the allocation of computing elements across multi-domain environments.

    DELAYED RECOMPUTATION OF FORMAL NETWORK TOPOLOGY MODELS BASED ON MODIFICATIONS TO DEPLOYED NETWORK TOPOLOGIES

    公开(公告)号:US20210367849A1

    公开(公告)日:2021-11-25

    申请号:US16878370

    申请日:2020-05-19

    Abstract: Techniques are described herein for generating and modifying formal network topology models, and deploying network topologies based on the formal models across multiple workload resource domains. A topology deployment system may receive modification data for a deployed network topology, and analyze the modification data to determine whether the associated formal network topology model is to be recomputed. In some examples, modifications to a deployed network topology that do not impact operational performance or compromise functional equivalence with the underlying logical model, need not trigger a recomputation of the network topology model immediately and could be delayed. Modifications to deployed network topologies that do not trigger recomputations of the formal network topology model may be stored and tracked, so that subsequent recomputations of the model may incorporate the pending modifications.

    Determining formal models using weighting factors for computing elements in multi-cloud environments

    公开(公告)号:US10992540B1

    公开(公告)日:2021-04-27

    申请号:US16878341

    申请日:2020-05-19

    Abstract: Techniques for deploying, monitoring, and modifying network topologies operating across multi-domain environments using formal models and weighting factors assigned to computing elements in the network topologies. The weighting factors restrict or allow the movement of various computing elements and/or element groupings to prevent undesirable disruptions or outages in the network topologies. Generally, the weighting factors may be determined based on an amount of disruption experienced in the network topologies if the corresponding computing element or grouping was migrated. As the amount of disruption caused by modifying a particular computing element increases, the weighting factor represents a greater measure of resistivity for migrating the computing element. In this way, topology deployment systems may allow, or disallow, the modification of particular computing elements based on weighting factors. Thus, the amount of disruption in the functioning of network topologies may be considered when optimizing the allocation of computing elements across multi-domain environments.

    Controller for bulk onboarding
    45.
    发明授权

    公开(公告)号:US10917293B2

    公开(公告)日:2021-02-09

    申请号:US15935003

    申请日:2018-03-25

    Inventor: Sebastian Jeuk

    Abstract: In one embodiment, a system, apparatus and method is described, the system including a local controller by executed by a processor of an Internet of Things (IoT) device, the local controller being operative to perform, at least one of a push or a pull operation with at least one other IoT device, to request extended control functionality from a central controller, to receive extended control functionality from the central controller, to exercise said extended control functionality over the least one other IoT device, to receive an instruction from the central controller retracting control functionality and, in response to receiving said instruction, to retract said control functionality, and to receive a command to delete itself from the IoT device. Related systems, apparatus, and hardware are also described.

    Secure client-server communication
    46.
    发明授权

    公开(公告)号:US10824744B2

    公开(公告)日:2020-11-03

    申请号:US15891434

    申请日:2018-02-08

    Abstract: In one embodiment, a client device includes an interface, a memory to store at least one part of a blockchain, and a processor to generate a client message indicating use of blockchain mode to establish a secure connection between the client device and a server, send the client message to the server on the interface, receive, from the server on the interface, a server message indicating use of the blockchain mode, and securely communicate with the server, on the interface, using at least one cryptographic key generated from information including cryptographic key generation information stored in the blockchain. Related apparatus and methods are also described.

    System and method of providing segment routing as a service

    公开(公告)号:US10708183B2

    公开(公告)日:2020-07-07

    申请号:US15216653

    申请日:2016-07-21

    Abstract: Disclosed is a system and method of providing a segment routing as a service application. The method includes receiving a configuration of an internet protocol environment. The configuration can be a layer 3 configuration of a single cloud environment or even across multiple cloud environments. The configuration defines routing, forwarding, and paths in the environment between different entities such as virtual machines. The method includes receiving a parameter associated with a workload of a tenant. The parameter can be a service level agreement (i.e., a best bandwidth available), a pathway requirement, a parameter associated with specific workload, and so forth. Based on the configuration and the parameter, the method includes generating tenant-defined layer 3 overlay segment routing rules that define how the workload of the tenant will route data in the internet protocol environment using segment routing.

    AUTHENTICATION, AUTHORIZATION AND ACCOUNTING IN MANAGED CLOUD COMPUTING SERVICES

    公开(公告)号:US20200021590A1

    公开(公告)日:2020-01-16

    申请号:US16036805

    申请日:2018-07-16

    Abstract: In an embodiment, a computer implemented method comprises receiving, at a first computing device associated with a managing entity, a request to perform an operation of a managed service; publishing to a first block of a distributed ledger system, by the first computing device associated with the managing entity, identification information of the managing entity; identifying, by a second computing device associated with the managed service, the identification information published to the first block of the distributed ledger system; publishing to a second block of the distributed ledger system, by the second computing device associated with the managed service, acknowledgement information comprising an indication that the identification information of the managing entity published to the first block was received and verified; publishing to a third block of the distributed ledger system, by the second computing device associated with the managed service, management request information comprising an operation request for the managing entity; identifying, by the first computing device associated with the managing entity, the management request information published to the third block of the distributed ledger system; publishing to a fourth block of the distributed ledger system, by the first computing device associated with the managing entity, management request acknowledgment information comprising an indication that the management request information of the third block was received; and in response to a performance of an operation included in the management request information published to the third block, publishing to a fifth block of the distributed ledger system, by the first computing device associated with the managing entity, management operation record information including a history of operations performed by the managing entity.

    Optimizing source routing using machine learning

    公开(公告)号:US10454780B2

    公开(公告)日:2019-10-22

    申请号:US15834881

    申请日:2017-12-07

    Abstract: A controller device sends predictions from a machine learning module to source endpoints. The controller receives flow information and network information from a network elements in a network. The flow information is associated with source routed data flows that traverse the network in source routed network paths. The network information is associated with network characteristics of each of the network elements included in at least one of the source routed network paths. The controller analyzes the flow information and the network information with machine learning to generate a prediction of at least one metric of source routing behavior within the network. The controller sends the prediction of the at least one metric to one or more source endpoints to optimize the source routed network paths used by future source routed data flows originating from the one or more source endpoints.

Patent Agency Ranking