-
公开(公告)号:US20200344171A1
公开(公告)日:2020-10-29
申请号:US16392160
申请日:2019-04-23
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Puneet SHARMA , Huazhe WANG
IPC: H04L12/813 , H04L12/803 , H04L29/06
Abstract: Example method includes: receiving a plurality of intent-based network policies in a network, wherein each intent-based policy comprises at least a rule and an action to be performed by a network function on a network packet in response to the rule being matched; identifying a set of header address spaces comprising a plurality of addresses that match to a same set of rules and actions; creating an atomic address object representing the identified set of header address spaces; and verifying the plurality of intent-based network policies using the atomic address object.
-
公开(公告)号:US20160173403A1
公开(公告)日:2016-06-16
申请号:US14908745
申请日:2013-07-30
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Jeffrey Clifford Mogul , Alvin AUYOUNG , Sujata BANERJEE , Jung Gun LEE , Jean TOURRILHES , Michael SCHLANSKER , Puneet SHARMA , Lucian POPA
IPC: H04L12/911
CPC classification number: H04L47/70 , G06F9/50 , H04L41/0893 , Y02D10/22
Abstract: An example method for allocating resources in accordance with aspects of the present disclosure includes collecting proposals from a plurality of modules, the proposals assigning the resources to the plurality of modules and resulting in topology changes in a computer network environment, identifying a set of proposals in the proposals, the set of proposals complying with policies associated with the plurality of modules, instructing the plurality of modules to evaluate the set of proposals, selecting a proposal from the set of proposals, and instructing at least one module associated with the selected proposal to instantiate the selected proposal.
Abstract translation: 根据本公开的方面的用于分配资源的示例性方法包括从多个模块收集建议,将所述资源分配给所述多个模块并导致在计算机网络环境中的拓扑变化,识别一组建议 所述提案,所述提议符合与所述多个模块相关联的策略,指示所述多个模块评估所述提议集合,从所述一组提案中选择提案,以及指示与所选择的提案相关联的至少一个模块 实例化所选提案。
-
公开(公告)号:US20220094696A1
公开(公告)日:2022-03-24
申请号:US17539831
申请日:2021-12-01
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Puneet SHARMA , Arun RAGHURAMU , David LEE
IPC: H04L29/06 , G06F9/455 , G06F21/64 , G06F16/27 , G06F16/182 , H04W4/70 , H04L9/32 , H04W12/106
Abstract: In some examples, a secure compliance protocol may include a virtual computing instance (VCI) deployed on a hypervisor and may be provisioned with hardware computing resources. In some examples the VCI may also include a cryptoprocessor to provide cryptoprocessing to securely communicate with a plurality of nodes, and a plurality of agents to generate a plurality of compliance proofs; the VCI may communicate with a server corresponding to a node of the plurality of nodes; and receive a time stamp corresponding to at least one compliance proof based on a metric of a connected device.
-
公开(公告)号:US20210344587A1
公开(公告)日:2021-11-04
申请号:US16862629
申请日:2020-04-30
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Faraz AHMED , Puneet SHARMA , Diman ZAD TOOTAGHAJ
IPC: H04L12/751 , G06N20/00 , G06N7/00 , H04L12/707 , H04L12/721 , H04L12/26
Abstract: An example client device includes processing circuitry and a memory including instructions that, when executed by the processing circuitry, cause the client device to undertake certain actions. Certain instructions cause the device to periodically measure active network performance data for a network, calculate expected rewards for the plurality of entry points, select an expected best entry point based on the expected rewards, route data to the selected entry point, measure passive network performance data for the selected entry point, and update a reinforcement learning algorithm, based in part on the measured passive network performance data.
-
公开(公告)号:US20180331909A1
公开(公告)日:2018-11-15
申请号:US15775378
申请日:2015-11-20
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Ying ZHANG , Jeongkeun LEE , Puneet SHARMA , Joon-Myung KANG
IPC: H04L12/24 , H04L12/813 , H04L12/851
CPC classification number: H04L41/0893 , H04L41/0681 , H04L41/5032 , H04L45/38 , H04L45/64 , H04L47/20 , H04L47/2483
Abstract: Example implementations relate to determining whether network invariants are violated by flow rules to be implemented by the data plane of a network. In an example, a verification module implemented on a device receives a flow rule transmitted from an SDN controller to a switch, the flow rule relating to an event. The module determines whether the flow rule matches any of a plurality of network invariants cached in the device. If determined that the flow rule matches one of the plurality of network invariants, the verification module determines whether the flow rule violates the matched network invariant. If determined that the flow rule does not match any of the plurality of network invariants, the verification module (1) reports the event associated with the flow rule to a policy management module, (2) receives a new network invariant related to the event from the policy management module, and (3) determines whether the flow rule violates the new network invariant. The verification module generates an alarm if determined that the flow rule violates any of the network invariants.
-
公开(公告)号:US20240126460A1
公开(公告)日:2024-04-18
申请号:US17957700
申请日:2022-09-30
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Faraz AHMED , Lianjie CAO , Puneet SHARMA , Amit SAMANTA
IPC: G06F3/06
CPC classification number: G06F3/0638 , G06F3/0665 , G06F3/0604 , G06F3/0679
Abstract: A scheduling platform for scheduling serverless application tasks in persistent memory (PMEM) is provided. A profiler receives application requests from processes of serverless applications. The profiler categorizes the processes as persistent or non-persistent based on the application requests. A read/write batcher creates batches of the persistent requests including the read requests and write requests and assigns the batches to persistent memory banks. A scheduler creates a schedule of the batches to the persistent memory banks in a manner enabling optimization of job completion time.
-
公开(公告)号:US20200351167A1
公开(公告)日:2020-11-05
申请号:US16398728
申请日:2019-04-30
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Puneet SHARMA , Huazhe WANG
IPC: H04L12/24
Abstract: Example method includes: receiving a network topology and a plurality of network configurations in an intent-based network; determining a number of spots available for runtime monitoring of an intent-based network policy among a plurality of intent-based policy in the intent-based network; determining a plurality of runtime constraints comprising one or more of time, resource capacity, and bandwidth demand based on the network topology and the plurality of network configurations; based on the plurality of runtime constraints, generating a runtime monitoring schedule that comprises at least a flow, a spot assigned for runtime monitoring of the flow, and a runtime monitoring rule to be applied at the assigned spot; and monitoring the flow based on the runtime monitoring schedule at the assigned spot.
-
公开(公告)号:US20190238410A1
公开(公告)日:2019-08-01
申请号:US15885202
申请日:2018-01-31
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Joon Myung Kang , Huazhe WANG , Puneet SHARMA
IPC: H04L12/24
CPC classification number: H04L41/0873 , H04L41/0853 , H04L41/0866 , H04L41/0869 , H04L41/0893 , H04L41/12 , H04L41/145 , H04L43/04
Abstract: A method for verifying network intents may include decomposing at least one network intent into a plurality of sub-verification tasks, generating a set of normalized configurations for a plurality of network devices in a target network based on a set of current configurations for the plurality of network devices and generating a network graph based on the set of normalized configurations and a topology of the target network. The method may further include analyzing the plurality of sub-verification tasks and the network graph to determine if the set of current configurations for the plurality of network devices satisfies the at least one network intent. If the at least one network intent is not satisfied, a report may be generated indicating that the target network is not in compliance. If the at least one network intent is satisfied, information may be provided indicating that target network is in compliance.
-
公开(公告)号:US20190014056A1
公开(公告)日:2019-01-10
申请号:US15646070
申请日:2017-07-10
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Puneet SHARMA , Amit Kumar SHEORAN , Vinay SAXENA
IPC: H04L12/923 , H04L12/725
CPC classification number: H04L47/762 , H04L45/30 , H04L45/306
Abstract: Examples provided herein describe a method for managing virtualized network service bundles. For example, a physical processor may implement machine readable instructions to receive a first data packet in a virtual network, determine a first type of the first data packet, determine a first active virtualized network service bundle instance associated with a first virtualized network service bundle that handles the first type of data packet, and direct the first data packet to the first active virtualized network service bundle instance. In some examples, the first virtualized network service bundle may comprise a first set of virtual network functions, and the first virtualized network service bundle may be associated with a set of active virtualized network service bundles instances, where the set of active virtualized network service bundle instances may comprise the first active virtualized network service bundle instance.
-
公开(公告)号:US20180349202A1
公开(公告)日:2018-12-06
申请号:US15608248
申请日:2017-05-30
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Puneet SHARMA , Lianjie CAO , Vinay SAXENA
IPC: G06F9/50 , G06F9/455 , H04L12/46 , H04L12/725 , H04L12/713 , H04L12/911
CPC classification number: H04L41/0896 , G06F9/5061 , G06F9/5077
Abstract: Examples allocating resources to virtual network functions (VNFs). Some examples include monitoring information associated with a set of VNFs that includes a set of VNF instances. A resource allocation event may be predicted for a VNF instance based on the monitored information and a resource flexing model that is developed using a capacity metric of the VNF instance. A resource flexing plan may be generated based on the resource allocation event and an order of the set of VNFs in a service function chain.
-
-
-
-
-
-
-
-
-