-
公开(公告)号:US12261741B2
公开(公告)日:2025-03-25
申请号:US18328550
申请日:2023-06-02
Applicant: Juniper Networks, Inc.
Inventor: Chandrasekhar A , Jayanthi R , Cyril Margaria
IPC: H04L41/0806 , G06F12/0866 , G06F16/21 , G06F16/2452 , G06F16/27
Abstract: Network elements are managed with a server to support client data models from heterogeneous data sources. A server receives a first query for configuration data of a network element to be returned in a first model. The server determines a model type for the configuration data of the network element. When the model type is a second model that is not the first model, the server sends a second query to the network element for the configuration data to be returned in the second model and transforms the configuration data received from the network element into the first model. Additionally, the server returns the configuration data in the first model as a response to the first query.
-
公开(公告)号:US12032662B2
公开(公告)日:2024-07-09
申请号:US17589962
申请日:2022-02-01
Applicant: Juniper Networks, Inc.
Inventor: Viren L. Shah , Jayanthi R , Ritesh Shelat , Premchandar N , Bhaskar T. Reddy , Chandrasekhar A
CPC classification number: G06F21/105 , G06F9/5072 , G06F21/10 , G06F21/12 , G06F21/44 , G06N20/00 , G06F2221/2141
Abstract: A device may receive license data identifying device licenses and organization licenses associated with an organization of users of a multi-tenant system, and may identify, in the license data, entitlements for licenses associated with the organization. The device may combine the entitlements to generate combined entitlements, and may determine an entitlement count of the combined entitlements. The device may add quantities of new entitlements to the entitlement count, and may identify, in the license data, roles of the users and capabilities associated with each of the roles. The device may map the entitlements and the capabilities to generate a mapping, and may authorize a particular user based on the mapping. The device may process usage of the entitlements, with a machine learning model, to predict future usage of the entitlements, and may determine entitlement recommendations based on the future usage. The device may provide the entitlement recommendations for display.
-
公开(公告)号:US20240097968A1
公开(公告)日:2024-03-21
申请号:US18523569
申请日:2023-11-29
Applicant: Juniper Networks, Inc.
Inventor: Gert Grammel , Jayanthi R , Chandrasekhar A
IPC: H04L41/0631 , H04L41/069
CPC classification number: H04L41/0631 , H04L41/069
Abstract: An example method includes obtaining, by one or more processors, data indicating resource dependencies between a plurality of resources in a network and event dependencies between a plurality of network events and one or more of the plurality of resources; generating a Bayesian model based on resource types of the plurality of resources and event types of the plurality of network events; receiving an indication of a fault in the network; collecting fault data and generating, based on the Bayesian model and the fault data, a plurality of root cause hypotheses for the fault; ordering the plurality of root cause hypotheses based on respective root cause probabilities associated with the plurality of root cause hypotheses; and outputting the ordered plurality of root cause hypotheses.
-
公开(公告)号:US11809266B2
公开(公告)日:2023-11-07
申请号:US17652096
申请日:2022-02-22
Applicant: Juniper Networks, Inc.
Inventor: Jayanthi R , Javier Antich , Chandrasekhar A
CPC classification number: G06F11/079 , G06F11/0709 , G06F11/0751 , H04L41/145 , H04L41/22
Abstract: Failure impact analysis (or “impact analysis”) is a process that involves identifying effects of a network event that are may or will results from the network event. In one example, this disclosure describes a method that includes generating, by a control system managing a resource group, a resource graph that models resource and event dependencies between a plurality of resources within the resource group; detecting, by the control system, a first event affecting a first resource of the plurality of resources, wherein the first event is a network event; and identifying, by the control system and based on the dependencies modeled by the resource graph, a second resource that is expected to be affected by the first event.
-
公开(公告)号:US11444833B1
公开(公告)日:2022-09-13
申请号:US17385009
申请日:2021-07-26
Applicant: Juniper Networks, Inc.
Inventor: Chandrasekhar A , Premchandar N , Jayanthi R
IPC: G06F15/177 , H04L41/082 , H04L9/40
Abstract: A controller device manages a plurality of network devices. The controller device includes one or more processing units configured to receive an indication of a stateful intent, the data structure including a plurality of nodes and a plurality of edges, each node of the plurality of nodes being representative of a respective network device of the plurality of network devices. The one or more processing units are configured to determine, using an abstract function configured at a node of the plurality of nodes, a stateless intent for implementing the stateful intent and generate low level configuration data for the plurality of network devices based on the stateless intent. The one or more processing units are configured to interface with one or more of the plurality of network devices to configure the one or more of the plurality of network devices with the low level configuration data.
-
公开(公告)号:US11323320B2
公开(公告)日:2022-05-03
申请号:US16116725
申请日:2018-08-29
Applicant: Juniper Networks, Inc.
Inventor: Chandrasekhar A , Nirmal Anburose , Jayanthi R
IPC: G06F15/177 , H04L41/0816 , H04L41/0213 , H04L41/085 , H04L41/12 , H04L12/46
Abstract: Techniques are disclosed for managing a network. In one example, a device configuration manager is configured to generate, in accordance with a device management protocol, a configuration change request representing a transaction having a first sub-transaction specifying a first configuration change for a network device of the network and a second sub-transaction specifying a second configuration change for the same network device. The device configuration manager is further configured to output the configuration change request to the network device and receive a reply message from the network device. The reply message includes a first response element specifying whether the first configuration change is successfully committed at the network device and a second response element specifying whether the second configuration change is successfully committed at the network device.
-
公开(公告)号:US20220019494A1
公开(公告)日:2022-01-20
申请号:US16946994
申请日:2020-07-14
Applicant: Juniper Networks, Inc.
Inventor: Jayanthi R , Javier Antich , Chandrasekhar A
Abstract: Failure impact analysis (or “impact analysis”) is a process that involves identifying effects of a network event that are may or will results from the network event. In one example, this disclosure describes a method that includes generating, by a control system managing a resource group, a resource graph that models resource and event dependencies between a plurality of resources within the resource group; detecting, by the control system, a first event affecting a first resource of the plurality of resources, wherein the first event is a network event; and identifying, by the control system and based on the dependencies modeled by the resource graph, a second resource that is expected to be affected by the first event.
-
公开(公告)号:US20210144072A1
公开(公告)日:2021-05-13
申请号:US17099533
申请日:2020-11-16
Applicant: Juniper Networks, Inc.
Inventor: Chandrasekhar A , Jayanthi R
IPC: H04L12/24 , H04L12/923 , H04L12/927
Abstract: A controller device manages a plurality of network devices. The controller device includes one or more processing units implemented in circuitry and configured to determine that one or more stateful intents used to manage the plurality of network devices and represented by a graph model are degraded due to assigned resources for the stateful intents having become degraded; in response to determining that the one or more stateful intents are degraded, determine resources for the stateful intents, the resources corresponding to vertices of the graph model; provision the stateful intents using the determined resources; determine whether the provisioning of the stateful intents was successful; compile at least one of the stateful intents that was successful into low-level configuration data for at least one network device of the plurality of network devices; and configure the at least one network device using the low-level configuration data.
-
公开(公告)号:US10897395B2
公开(公告)日:2021-01-19
申请号:US16551532
申请日:2019-08-26
Applicant: Juniper Networks, Inc.
Inventor: Chandrasekhar A , Anand Beedi , Javier Antich , Jayanthi R , Rahamath Sharif
IPC: G06F15/177 , H04L12/24 , G06F16/901
Abstract: A controller device manages a plurality of network devices. The controller device is configured to receive, for a data structure, a configlet specifying a set of configuration changes to be applied to a resource of a plurality of resources of the plurality of network devices. A low level configuration for each respective owned resource of a set of owned resources of the plurality of resources includes a pointer indicating an owner for the respective owned resources. The one or more processing units are further configured to determine the set of configuration changes does not conflict in response to determining the low level configuration for the resource does not include a pointer indicating the owner for the resource is not the configlet and apply the set of configuration changes to the resource in response to determining the set of configuration changes does not conflict with the set of owned resources.
-
10.
公开(公告)号:US20240179183A1
公开(公告)日:2024-05-30
申请号:US18070948
申请日:2022-11-29
Applicant: Juniper Networks, Inc.
Inventor: Chandrasekhar A , Jayanthi R
IPC: H04L9/40
CPC classification number: H04L63/20
Abstract: A system may identify a security intent policy model associated with an initial time. The system may generate one or more delta snapshots that respectively indicate one or more incremental changes to the security intent policy model at times subsequent to the initial time. The system may determine that the system is to deploy an updated version of the security intent policy model to a device and may thereby determine a previous deployment time at which the system deployed a previous version of the security intent policy model to the device. The system may generate, based on the one or more delta snapshots and the previous deployment time, a cumulative delta snapshot, and may thereby update a low-level security intent policy model associated with the device. The system may generate, based on the low-level security intent policy model, device-level security configuration information for the device.
-
-
-
-
-
-
-
-
-