-
公开(公告)号:US20220006740A1
公开(公告)日:2022-01-06
申请号:US17282765
申请日:2018-10-26
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Jean Tourrilhes , Puneet Sharma
IPC: H04L12/801 , H04L12/803 , H04L12/841 , H04L12/26
Abstract: Determination of an inflection point in congestion in a network path can include determining packet congestion on a network path using an inflection point mechanism (IPDM), detecting a potential inflection point in response to a one-way delay (OWD) of a first packet being lesser than an OWD of a second packet by a quantity greater than a function of a difference of inter departure time (IDT) between the first packet and the second packet, and determining an inflection point in congestion of the network path based on the potential inflection point.
-
公开(公告)号:US11159384B2
公开(公告)日:2021-10-26
申请号:US16398728
申请日:2019-04-30
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Puneet Sharma , Huazhe Wang
Abstract: Described herein are methods, network devices, systems, and computer-readable media that provide a technical solution for runtime monitoring and visualization of intent-based network policies in a manner that bridges the gap between high-level insights from runtime and low-level network device configurations. A network topology and a plurality of network configurations can be received in an intent-based network and a number of monitoring spots available within the network topology for runtime monitoring of an intent-based network policy among a plurality of intent-based policies can be determined. A plurality of runtime constraints including one or more of time, resource capacity, and bandwidth demand can then be determined based on the network topology and the plurality of network configurations. Based on the plurality of runtime constraints, a runtime monitoring schedule that includes at least a flow, a monitoring spot assigned for runtime monitoring of the flow, and a runtime monitoring rule to be applied at the assigned monitoring spot can be generated and implemented.
-
53.
公开(公告)号:US20210184942A1
公开(公告)日:2021-06-17
申请号:US16931850
申请日:2020-07-17
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Diman Zad Tootaghaj , Junguk Cho , Puneet Sharma
Abstract: Example implementations relate to a proactive auto-scaling approach. According to an example, a machine-learning prediction model is trained to forecast future serverless workloads during a window of time for an application running in a public cloud based on past serverless workload information associated with the application by performing a training process. During the window of time, serverless workload information associated with the application is monitored. A future serverless workload is predicted for the application at a future time within the window, based on the machine learning prediction model. Prior to the future time, containers within the public cloud executing the application are pre-warmed to accommodate the predicted future serverless workload by issuing fake requests to the application to trigger auto-scaling functionality implemented by the public cloud.
-
公开(公告)号:US10992520B2
公开(公告)日:2021-04-27
申请号:US15500628
申请日:2014-11-06
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Junggun Lee , Chaithan M. Prakash , Charles F. Clark , Dave Lenrow , Yoshio Turner , Sujata Banerjee , Yadi Ma , Joon-Myung Kang , Puneet Sharma
IPC: G06F15/177 , H04L12/24 , H04L12/64
Abstract: Example implementations disclosed herein can be used to generate composite network policy graphs based on multiple network policy graphs input by network users that may have different goals for the network. The resulting composite network policy graph can be used to program a network so that it meets the requirements necessary to achieve the goals of at least some of the network users. In one example implementation, a method can include receiving multiple network policy graphs, generating composite endpoint groups based on relationships between endpoint groups and policy graph sources, generating composite paths based on the relationships between the endpoints and the network policy graphs, generating a composite network policy graph based on the composite endpoint groups and the composite paths, and analyzing the composite network policy graph to determine conflicts or errors.
-
公开(公告)号:US10965788B2
公开(公告)日:2021-03-30
申请号:US16357046
申请日:2019-03-18
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Jean Tourrilhes , Puneet Sharma
IPC: H04L29/06 , H04L12/707 , H04L12/46
Abstract: Various aspects of the subject technology relate to methods, systems, and machine-readable media for multi-path transmission control protocol (MP-TCP) proxy tunneling. The method includes reading a first multi-path transmission control protocol (MP-TCP) information from at least one first MP-TCP header, the at least one first MP-TCP header included in a first MP-TCP subflow, the first MP-TCP subflow included in a first MP-TCP session. The method also includes encapsulating the first MP-TCP information in a second MP-TCP session, the second MP-TCP session different from the first MP-TCP session. The method also includes sending the first MP-TCP information through the second MP-TCP session.
-
56.
公开(公告)号:US20200304606A1
公开(公告)日:2020-09-24
申请号:US16357046
申请日:2019-03-18
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Jean Tourrilhes , Puneet Sharma
IPC: H04L29/06 , H04L12/707 , H04L12/46
Abstract: Various aspects of the subject technology relate to methods, systems, and machine-readable media for multi-path transmission control protocol (MP-TCP) proxy tunneling. The method includes reading a first multi-path transmission control protocol (MP-TCP) information from at least one first MP-TCP header, the at least one first MP-TCP header included in a first MP-TCP subflow, the first MP-TCP subflow included in a first MP-TCP session. The method also includes encapsulating the first MP-TCP information in a second MP-TCP session, the second MP-TCP session different from the first MP-TCP session. The method also includes sending the first MP-TCP information through the second MP-TCP session.
-
公开(公告)号:US20200244527A1
公开(公告)日:2020-07-30
申请号:US16261743
申请日:2019-01-30
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Puneet Sharma , Ali Munir
IPC: H04L12/24 , G06N20/00 , H04L12/911 , H04L12/26 , H04L29/08
Abstract: In some examples, a system receives input information for an application, the input information comprising a specification of a performance parameter relating to the application, and information of an arrangement of components of the application. The system generates, based on the input specification of the parameter and the information of the arrangement of components of the application, a plurality of configuration options representing respective different sets of resources, where a first set of resources of the different sets of resources includes resources of a plurality of cloud environments from different cloud providers. The system selects, based on a target goal, a configuration option of the plurality of configuration options, and output deployment information to cause deployment of the selected configuration option. The system adjusts an allocation of resources to the application responsive to performance metrics from a performance monitor that monitors performance of the application after the deployment.
-
公开(公告)号:US20200186429A1
公开(公告)日:2020-06-11
申请号:US16721274
申请日:2019-12-19
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Ying Zhang , Jeongkeun Lee , Puneet Sharma , Joon-Myung Kang
IPC: H04L12/24 , H04L12/813 , H04L12/851
Abstract: Example implementations relate to determining whether network invariants are violated by flow rules to be implemented by the data plane of a network. In an example, a verification module implemented on a device receives a flow rule transmitted from an SDN controller to a switch, the flow rule relating to an event. The module determines whether the flow rule matches any of a plurality of network invariants cached in the device. If determined that the flow rule matches one of the plurality of network invariants, the verification module determines whether the flow rule violates the matched network invariant. If determined that the flow rule does not match any of the plurality of network invariants, the verification module (1) reports the event associated with the flow rule to a policy management module, (2) receives a new network invariant related to the event from the policy management module, and (3) determines whether the flow rule violates the new network invariant. The verification module generates an alarm if determined that the flow rule violates any of the network invariants.
-
公开(公告)号:US10659569B1
公开(公告)日:2020-05-19
申请号:US16251950
申请日:2019-01-18
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Jean Tourrilhes , Puneet Sharma
IPC: H04L12/66 , H04L29/06 , H04L12/707 , H04L12/46 , H04L29/12
Abstract: The disclosed systems and methods provide end-to-end multipath TCP (MPTCP) through a network gateway. The method includes detecting a MPTCP subflow having a first IP address as a source address and a second IP address as a destination address, wherein none of the gateways is the source or the destination of the MPTCP subflow; associating a third IP address with the MPTCP subflow; and advertising, to at least one endpoint of the MPTCP subflow, the third IP address.
-
公开(公告)号:US10425293B2
公开(公告)日:2019-09-24
申请号:US15327021
申请日:2014-07-30
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Alvin AuYoung , Yadi Ma , Sujata Banerjee , Junggun Lee , Puneet Sharma , Yoshio Turner
IPC: H04L12/24 , H04L12/64 , H04L12/911 , H04L12/927
Abstract: Example implementations disclosed herein can be used to allocate network resources in a software defined network (SDN). In one example implementation, a method can include receiving a plurality of resource allocation proposals from a plurality of controller modules, instructing the controller modules to generate votes for the plurality of resource allocation proposals, and selecting one of the plurality of resource allocation proposals based on the votes to instantiate the selected resource allocation proposal in the SDN.
-
-
-
-
-
-
-
-
-