摘要:
In communication network, the network blocking probability can be efficiently calculated by applying a Gaussian approximation to a fixed point algorithm. Gaussian curves are approximated to represent state probability distributions of the network links. By efficiently calculating the network blocking probability, the network can be optimally designed by lowering the network blocking probability below a threshold at the least cost.
摘要:
A method is provided in one example and includes verifying a storage capacity of a network element coupled to an end device over a network connection. The method also includes executing script provided in the network element, which is configured for exchanging packets in a network environment. The script initiates a collection of data being retrieved from the end device. The data can be Fault, Configuration, Accounting, Performance, and Security (FCAPS) data associated with the end device. The data collected from the end device is communicated to a next destination.
摘要:
A method is disclosed for preventing spoofing of network addresses. A binding is established between an Internet Protocol (IP) address, a Media Access Control (MAC) address, and a port. An Address Resolution Protocol (ARP) table is updated based on the binding.
摘要:
In one embodiment, a central service request management system for managing service requests across a plurality of ticketing systems. The central service request management system includes translation logic for receiving service request messages from the plurality of ticketing systems and translating the service request messages to a standardized format, where each service request message is associated with a respective service request. Additionally, the central service request management system includes data storage logic for maintaining a status of service requests based on the translated service request messages. The central service request management system further includes routing logic for identifying one of the plurality of ticketing systems to transmit each translated service request message to based on the maintained status of the service request associated with the service request message, and for transmitting the translated service request message to the identified ticketing system.
摘要:
A system for streamlining a network management system (NMS) includes scanning, via a mobile device, a code on a hardware or software component; and determining, via the mobile device, whether the hardware or software component is a network component (NC), based on the scanned code. The hardware or software component may be a call manager, server, client device, interface card, repeater, hub, bridge, switch, router, or firewall, for example.
摘要:
Techniques are disclosed for preventing malicious attacks or other exploits on a computer server. A network manager may be configured to determine a topology of a plurality of network devices and deploy an intrusion prevention system in one or more of the network devices to mitigate attacks against the vulnerable servers. The one or more network devices may be identified based on the topology and one or more constraints for optimizing the deployment of the intrusion prevention systems.
摘要:
Methods and systems are provided for estimating the source-destination traffic in a packet-switched network. Source-destination traffic is critical input to a variety of network engineering and planning functions. However, it is difficult and prohibitively expensive to directly measure source-destination traffic in a packet-switched network. Channel link measurements are more readily available for packet-switched networks. Thus, methods and systems in accordance with the present invention use channel link measurements, along with knowledge of traffic paths through the network for source-destination pairs, to estimate source-destination traffic.
摘要:
In one embodiment, a method for securely transferring entitled data from one or more devices in a customer's network to a vendor's network via a public network is described. The data is obtained from a collection module communicatively coupled to the devices. The obtained data is transformed into a format that is recognized by a backend server present in the vendor's network. The transformed data is then assorted by associating the transformed data with corresponding one or more devices. Finally, the assorted data is then encrypted and sent to the backend server securely via the public network along with entitlement attributes corresponding to the one or more devices.
摘要:
Techniques are disclosed for hiding sensitive information from a provider of support services. In one embodiment, a first network device determines that network device information includes non-sensitive data and sensitive data. In response to the determining, the first network device generates mapping data that maps dummy information to the sensitive data. The first network device generates output data that comprises the non-sensitive data and the dummy data and sends the output data to a second network device. In other embodiments, the user may select the network parameters that are sensitive. The first network device may also receive first report data from the second network device that identifies a network problem and includes the dummy data and generate second report data by using the mapping data to replace the dummy information with the sensitive data.
摘要:
A method is provided in one example and includes verifying a storage capacity of a network element coupled to an end device over a network connection. The method also includes executing script provided in the network element, which is configured for exchanging packets in a network environment. The script initiates a collection of data being retrieved from the end device. The data can be Fault, Configuration, Accounting, Performance, and Security (FCAPS) data associated with the end device. The data collected from the end device is communicated to a next destination.