H04L41/02

COMPUTER DEVICE AND CONFIGURATION AND MANAGEMENT METHOD OF COMPUTER DEVICE
20170300431 · 2017-10-19 ·

According to the computer device and the configuration and management method of a computer device that are provided in the embodiments of the present invention, an SMM and a CPU are controlled to connect to a PCIE Switch at different stages of system startup, so that management of a PCIE device does not rely on involvement of the CPU of the computer device. In this way, the PCIE device can be configured and managed without involvement of an operating system of the computer device, and CPU resources are saved. Manageability of the computer device is improved, meeting a requirement of a large data center for simplifying computing device management. In addition, the PCIE device is connected to the PCIE Switch by using a downstream port, with no need to configure a special interface to connect to the SMM, thereby simplifying system configuration.

Computer network security configuration visualization and control system
11258763 · 2022-02-22 · ·

A computing device is configured to retrieve network security configuration information from a computer network and generate a security configuration map which readily enables a user to detect defects in the security configuration with respect to a security policy. The computing device retrieves firewall configurations from security appliances in the network which operate firewalls, and processes the firewall configurations to generate a set of corresponding standardized firewall configurations. These are processed to identify enclaves containing network nodes which are associated with respective security sensitivity values based on the security policy. The computing device monitors and detects inter-node network traffic. The computing device generates a map representing the network nodes and security appliances, the security enclaves, the respective security sensitivity values, and the network traffic flows, thereby rendering readily visible inconsistencies between the actual security configuration and traffic flows, and the security policy.

Computer network security configuration visualization and control system
11258763 · 2022-02-22 · ·

A computing device is configured to retrieve network security configuration information from a computer network and generate a security configuration map which readily enables a user to detect defects in the security configuration with respect to a security policy. The computing device retrieves firewall configurations from security appliances in the network which operate firewalls, and processes the firewall configurations to generate a set of corresponding standardized firewall configurations. These are processed to identify enclaves containing network nodes which are associated with respective security sensitivity values based on the security policy. The computing device monitors and detects inter-node network traffic. The computing device generates a map representing the network nodes and security appliances, the security enclaves, the respective security sensitivity values, and the network traffic flows, thereby rendering readily visible inconsistencies between the actual security configuration and traffic flows, and the security policy.

Network controller for multi-site logical network

Some embodiments provide a method for a first network controller executing at a first site of multiple sites spanned by a logical network. Network controllers execute at each site. The method generates logical network state data for the first site based on (i) data received from computing devices that implement the logical network at the first site and (ii) logical network configuration data from a network manager at the first site. The method provides the logical network state data for the first site to a second network controller executing at a second site. The method provides logical network state data received from the second site to the computing devices that implement the logical network at the first site.

Network controller for multi-site logical network

Some embodiments provide a method for a first network controller executing at a first site of multiple sites spanned by a logical network. Network controllers execute at each site. The method generates logical network state data for the first site based on (i) data received from computing devices that implement the logical network at the first site and (ii) logical network configuration data from a network manager at the first site. The method provides the logical network state data for the first site to a second network controller executing at a second site. The method provides logical network state data received from the second site to the computing devices that implement the logical network at the first site.

Cooperation between MoCA service provider and consumer networks

Embodiments may be disclosed herein that provide systems, devices, and methods of operating a Multimedia over Coax (MoCA) network. One such embodiment is a method comprising: designating a selected MoCA device as a network controller; and logically partitioning, into virtual MoCA networks, a predetermined bandwidth reserved for the MoCA network by sending, from the network controller one or more beacons containing virtual network information.

Web services and telecom network management unification

A method of unifying web services and telecom network management is described. The method comprises exporting an external model representation of at least one entity of a service oriented architecture of a service oriented architecture manager and importing the exported external model representation of the at least one entity as a network management data model entity of a network manager. The method further comprises subscribing, by the network manager, to subsequent updates of the at least one entity.

Multi-tenancy engine
09734466 · 2017-08-15 · ·

According to one general aspect, in one embodiment, a method may include establishing a relationship with a plurality of external tenant systems configured to utilize an internal ERP service provider system. In one embodiment, the method may also include receiving an external tenant message from one of the external tenant systems. The method may further include, in various embodiments, converting the received external tenant message to an internal provider message. In some embodiments, the method may include transmitting the converted internal provider message to at least a portion of the internal ERP service provider system.

Smartap arrangement and methods thereof
09736051 · 2017-08-15 · ·

Methods for enabling monitoring a network with a monitoring tool are disclosed. The method includes receiving data packets and adding metadata to the data packets, thereby forming metadata-enhanced data packets. The method also includes forwarding the metadata-enhanced data packets along a path toward the monitoring tool, wherein the metadata pertains to data employed by the monitoring tool to perform network monitoring tasks. Arrangements for performing the same are also disclosed.

Flexible rules engine for managing connected consumer devices

A processing device executing a rules engine receives a notification of a first event on a first network-connected device. The processing device identifies a first rule associated with a first user account, wherein the first user account is further associated with the first network-connected device, and wherein the first event on the first network-connected device is an input for the first rule. The processing device determines that the first event satisfies a first criterion of the first rule and generates a first command for a second network-connected device also associated with the first user account. The processing device then transmits the first command to the second network-connected device on behalf of the first user account, wherein the first command causes the second network-connected device to perform an action.