Method and system for meter conformance in a switch

    公开(公告)号:US11456958B1

    公开(公告)日:2022-09-27

    申请号:US17226794

    申请日:2021-04-09

    Abstract: A system for facilitating data transmission in a switch is provided. During operation, the system can obtain one or more sets of configuration parameters for a plurality of traffic policing filters of the switch. A respective traffic policing filter can correspond to a token bucket. A number of tokens in the token bucket can indicate whether to forward a packet associated with the traffic policing filter. The system can determine the token allocation frequencies for the plurality of traffic policing filters based on the one or more sets of configuration parameters. The system can then select a sampling interval from the token allocation frequencies based on a selection policy and determine a performance rate for the plurality of traffic policing filters based on the sampling interval.

    SOFTWARE UPGRADE AND DOWNGRADE USING GHOST ENTRIES

    公开(公告)号:US20210124568A1

    公开(公告)日:2021-04-29

    申请号:US16663477

    申请日:2019-10-25

    Abstract: Methods and systems for modifying software programs are disclosed. For instance, an example method for modifying a software program may include extracting, from a configuration program file, a future list of one or more future active entries relating to a future version of the software program and a future list of one or more future ghost entries relating to the future version of the software program, comparing the future lists of future active and ghost entries to current lists of current active entries and current ghost entries of a current version of the software program. Then, at least one upgrade or at least one downgrade of the current version of the software program is performed in response the comparison of the current and future lists.

    Minimizing traffic leaks during replacement of an access control list for a network interface

    公开(公告)号:US11206264B2

    公开(公告)日:2021-12-21

    申请号:US16206248

    申请日:2018-11-30

    Abstract: Systems and methods are provided for minimizing traffic leaks during replacement of an access control list for a network interface. The method includes adding a blocking access control entry to an access control list for a network interface of a network switch, wherein the blocking entry causes the network interface to block traffic from passing through the network interface; removing one or more current access control entries from the access control list, except for the blocking entry, after adding the blocking entry to the access control list; adding one or more new access control entries to the access control list, without removing the blocking entry, after removing the one or more current access control entries from the access control list; and removing the blocking entry from the access control list after adding the one or more new access control entries to the access control list.

    METHOD AND SYSTEM FOR METER CONFORMANCE IN A SWITCH

    公开(公告)号:US20220329526A1

    公开(公告)日:2022-10-13

    申请号:US17226794

    申请日:2021-04-09

    Abstract: A system for facilitating data transmission in a switch is provided. During operation, the system can obtain one or more sets of configuration parameters for a plurality of traffic policing filters of the switch. A respective traffic policing filter can correspond to a token bucket. A number of tokens in the token bucket can indicate whether to forward a packet associated with the traffic policing filter. The system can determine the token allocation frequencies for the plurality of traffic policing filters based on the one or more sets of configuration parameters. The system can then select a sampling interval from the token allocation frequencies based on a selection policy and determine a performance rate for the plurality of traffic policing filters based on the sampling interval.

    Software upgrade and downgrade using ghost entries

    公开(公告)号:US11068253B2

    公开(公告)日:2021-07-20

    申请号:US16663477

    申请日:2019-10-25

    Abstract: Methods and systems for modifying software programs are disclosed. For instance, an example method for modifying a software program may include extracting, from a configuration program file, a future list of one or more future active entries relating to a future version of the software program and a future list of one or more future ghost entries relating to the future version of the software program, comparing the future lists of future active and ghost entries to current lists of current active entries and current ghost entries of a current version of the software program. Then, at least one upgrade or at least one downgrade of the current version of the software program is performed in response the comparison of the current and future lists.

Patent Agency Ranking