-
公开(公告)号:US20220322047A1
公开(公告)日:2022-10-06
申请号:US17222414
申请日:2021-04-05
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Jeongkeun LEE , Souvik SEN , Stephane LAROCHE
Abstract: An example system includes a transceiver. The transceiver communicates multicast frames to a plurality of client devices in a multicast group. The system further includes a controller. The controller determines that a predetermined time has passed since the transceiver most recently sent a unicast transmission to one of the plurality of client devices. The controller instructs the transceiver to transmit a unicast frame to the one of the plurality of client devices. The controller computes a data rate for the one of the plurality of client devices based on the transmission of the unicast frame to the one of the plurality of client devices.
-
公开(公告)号:US20180331909A1
公开(公告)日:2018-11-15
申请号:US15775378
申请日:2015-11-20
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Ying ZHANG , Jeongkeun LEE , Puneet SHARMA , Joon-Myung KANG
IPC: H04L12/24 , H04L12/813 , H04L12/851
CPC classification number: H04L41/0893 , H04L41/0681 , H04L41/5032 , H04L45/38 , H04L45/64 , H04L47/20 , H04L47/2483
Abstract: Example implementations relate to determining whether network invariants are violated by flow rules to be implemented by the data plane of a network. In an example, a verification module implemented on a device receives a flow rule transmitted from an SDN controller to a switch, the flow rule relating to an event. The module determines whether the flow rule matches any of a plurality of network invariants cached in the device. If determined that the flow rule matches one of the plurality of network invariants, the verification module determines whether the flow rule violates the matched network invariant. If determined that the flow rule does not match any of the plurality of network invariants, the verification module (1) reports the event associated with the flow rule to a policy management module, (2) receives a new network invariant related to the event from the policy management module, and (3) determines whether the flow rule violates the new network invariant. The verification module generates an alarm if determined that the flow rule violates any of the network invariants.
-