Network testing simulation
    1.
    发明授权

    公开(公告)号:US10938666B2

    公开(公告)日:2021-03-02

    申请号:US16110979

    申请日:2018-08-23

    Abstract: A method for network testing simulation includes generating a simulated network configuration comprising a plurality of simulation nodes based on a topology of an existing network. The method also includes determining a peak traffic for the existing network based on a volume of traffic processed by the existing network, and a plurality of protocols of the traffic. The method further includes generating a simulated traffic based on the peak traffic, the protocols, and the simulated network configuration. Additionally, the method includes processing the simulated traffic using the simulated network configuration to generate a plurality of simulation states of the nodes. Also, the method includes determining whether the software upgrade is tested successfully based on the generated states of the nodes.

    FORWARDING DATA BASED ON DATA PATTERNS
    2.
    发明申请

    公开(公告)号:US20190394143A1

    公开(公告)日:2019-12-26

    申请号:US16013570

    申请日:2018-06-20

    Abstract: In some examples, a system determines whether data of a device that communicates with a switch is to be subjected to further inspection based on a data pattern derived based on the data. In response to determining that the data of the device is not to be subjected to the further inspection, the system causes forwarding, based on forwarding information accessible by the switch, of the data along a path to a recipient. In response to determining that the data of the device is to be subjected to the further inspection, the system causes forwarding of the data by the switch to a controller that applies the further inspection.

    Redundant simple network management protocol (SNMP) systems and methods

    公开(公告)号:US11063809B2

    公开(公告)日:2021-07-13

    申请号:US16270552

    申请日:2019-02-07

    Abstract: Systems and methods are disclosed in which Simple Network Management Protocol (SNMP) servers form a blockchain network. Each SNMP server stores and maintains a local copy of a consensus ledger for which a consensus agreement has been obtained among the SNMP servers. The consensus agreement may be based on a validation of one or more fingerprints for one or more blocks of information in the ledger. The fingerprint for each block may be based on information in a preceding block. The consensus ledger includes transaction information for SNMP operations performed between the SNMP servers and managed devices. The common consensus ledger helps ensure that bandwidth, CPU time, and energy for the managed devices and the SNMP servers is not wasted on duplicate SNMP operations.

    ACCESS DEVICE BLOCKCHAIN NETWORK SYSTEMS AND METHODS

    公开(公告)号:US20200213215A1

    公开(公告)日:2020-07-02

    申请号:US16238440

    申请日:2019-01-02

    Abstract: Systems and methods are disclosed in which access devices such as routers and switches form a blockchain network. Each router and switch stores and maintains a local copy of a network topology ledger for which a consensus agreement has been obtained among the routers and switches. The consensus agreement may be based on a validation of one or more fingerprints for one or more blocks of information in the ledger. The fingerprint for each block may be based on information in a preceding block. The network topology ledger includes device identification, routing, and/or other information for device authentication and packet routing by the routers and switches.

    EOL NOTIFICATION GENERATION
    5.
    发明申请

    公开(公告)号:US20190068738A1

    公开(公告)日:2019-02-28

    申请号:US16113473

    申请日:2018-08-27

    Abstract: On one example in accordance with the present disclosure, a system may include a processor and a memory storing end of life information. The end of life information may indicate a date when the network device will no longer be supported. The memory may comprise instructions executable by the processor to determine, based on the end of life information, that an end of life threshold has been reached and to generate a notification that the end of life threshold has been reached, wherein the notification includes the date when the network device will no longer be supported. The memory may also comprise instructions executable by the processor to broadcast the notification on a network accessible by the network device.

    Transposed passwords
    6.
    发明授权

    公开(公告)号:US11449597B2

    公开(公告)日:2022-09-20

    申请号:US16166337

    申请日:2018-10-22

    Abstract: Example implementations relate to transposed passwords. A computing device may comprise a processing resource; and a memory resource storing machine-readable instructions to cause the processing resource to: receive an entered password; generate, based on the entered password, a transposed version of the entered password; compare the transposed version of the password to a stored password; and grant access based on the comparison.

    Disabling MAC Address Aging Time for an Internet of Things (IoT) Device on a Network Switch

    公开(公告)号:US20190089704A1

    公开(公告)日:2019-03-21

    申请号:US16112669

    申请日:2018-08-25

    Abstract: Examples described relate to disabling of MAC address aging time for an IoT device on a network switch. In an example, in response to a device joining a network, a network switch in the network may determine a media access control (MAC) address of the device. The network switch may then send the MAC address to an authentication server. In response, the network switch may receive a Vendor Specific Attribute (VSA) associated with the MAC address from the authentication server. The VSA indicates that the MAC address relates to an IoT device. Based on the VSA, the network switch may recognize the MAC address of the device as a MAC address of the IoT device. In response to recognizing, the network switch may disable MAC address aging time for the MAC address of the IoT device on the network switch.

    Provisioning a new network device in a stack

    公开(公告)号:US10768992B2

    公开(公告)日:2020-09-08

    申请号:US15865972

    申请日:2018-01-09

    Abstract: Examples disclosed herein relate to provisioning a network device in a stack. In an example, a master network device in a stack may detect a new network device in the stack. In response to detecting, master network device may determine whether a member network device of the stack is missing. In response to determining that the member network device of the stack is missing, master network device may identify each active adjacent member of the member network device. The master network device may determine whether each active adjacent member of the member network device has detected the new network device in the stack. In response to determining that each active adjacent member of the member network device has detected the new network device in the stack, master network device may provision the new network device with a member ID of the member network device to the stack.

Patent Agency Ranking