Patent classifications
H04L41/08
Network control system for configuring middleboxes
Some embodiments provide a method for configuring a logical middlebox in a hosting system that includes a set of nodes. The logical middlebox is part of a logical network that includes a set of logical forwarding elements that connect a set of end machines. The method receives a set of configuration data for the logical middlebox. The method uses a stored set of tables describing physical locations of the end machines to identify a set of nodes at which to implement the logical middlebox. The method provides the logical middlebox configuration for distribution to the identified nodes.
Network control system for configuring middleboxes
Some embodiments provide a method for configuring a logical middlebox in a hosting system that includes a set of nodes. The logical middlebox is part of a logical network that includes a set of logical forwarding elements that connect a set of end machines. The method receives a set of configuration data for the logical middlebox. The method uses a stored set of tables describing physical locations of the end machines to identify a set of nodes at which to implement the logical middlebox. The method provides the logical middlebox configuration for distribution to the identified nodes.
Node Directed Multicast Traffic Management Systems and Methods for Mesh Networks
Systems and related methods include node directed management of multicast traffic within a wireless mesh network. A wireless mesh network may include a plurality of mesh nodes and a central server in communication with at least one of the mesh nodes of the plurality of mesh nodes. The central server may be configured to generate one or more rules for at least one of the mesh nodes to instruct a change in a pre-routing parameter in a packet header based on received channel state information. The central server may include a rules-based engine configured to generate and convey one or more traffic shaping rules in response to sensing traffic conditions. The position of received multicast packets in a packet order may be modified.
Management Method for Home Network Device and Network Management System
The present disclosure, relating to the technical field of communications, provides a management method for a home network device and a network management system. The method includes that: a home gateway acquires home terminal device information in a home network; the home gateway sends the home terminal device information to a home sub-cloud which corresponds to the home network and is independent from other home sub-clouds on a cloud management platform to store.
SYSTEM FOR PROVIDING DATA COMMUNICATION OVER A COAXIAL NETWORK
A system for providing data communication over a MoCA (Multimedia over Coaxial Alliance) network in a construction complex, the system comprising a coaxial network; a network management device connectable to an external data channel, the network management device comprising a connector structured to be connected to the coaxial network; and a control unit having a first MoCA chip, wherein the control unit is configured to establish an access function, creating a control channel over the coaxial network to one or more MoCA end devices; and at least one MoCA end device connected to the coaxial network, wherein the at least one MoCA end device has a second MoCA chip and a network access unit connected to a bus on the second MoCA chip.
Deploying a network management controller in an existing data center fabric
Some organizations have a deployed and functional “controllerless” EVPN VxLAN Fabric in their data centers. Eventually, however, the organization may deploy a controller within the network. In one example, this disclosure describes a method that includes configuring a controller to communicate with each of a plurality of elements in a network; determining, by the controller, an initial operational state of the network; translating, by the controller, the initial operational state of the network to an intent-based configuration; pushing, by the controller, the intent-based configuration to the network to reconfigure each of the plurality of elements in the network in a manner consistent with the intent-based configuration; determining, by the controller and after pushing the intent-based configuration, an updated operational state of the network; and comparing, by the controller, the initial operational state of the network with the updated operational state of the network.
Techniques for dynamic network strengthening
Various embodiments are generally directed to techniques for network strengthening, such as by detecting issues with one or more network components and reconfiguring one or more upstream or downstream network components to preempt issues with the one or more upstream or downstream network components, for instance. Some embodiments are particularly directed to a tool (e.g., strengthening agent) that implements pre-scripted or dynamic hardening of up and downstream dependencies of a network component in response to an issue identified with the network component. In many embodiments, up and downstream components of a network component may be reconfigured while the issue with the network component is being addressed to preempt issues with the up and downstream components.
Device pairing by cognitive computing
A computer-implemented method and a computer program product for device pairing by cognitive computing. A cognitive computing system creates a knowledge corpus about the historical activities of pairing devices of a user. The cognitive computing system predicts needs of device pairing of the user, based on analysis of the historical activities. The cognitive computing system identifies devices that can be paired in a surrounding area. An augmented reality device tracks an eye direction of the user at a device, extrapolates the eye direction to create an eye focus direction of the user, obtains from the cognitive computing system an eye focus line with an arrow pointing to the device, and creates an augmented reality overlay which shows the eye focus line. The augmented reality device pairs a user currently used device and the device, upon user approval.
CONFIGURATION TECHNIQUES FOR MANAGED HOST OPERATING SYSTEMS AND CONTAINERIZED APPLICATIONS INSTANTIATED THEREBY
Embodiments described herein are directed to configuring managed computing devices utilizing containerized applications. For instance, a mobile device manager may provide configuration settings to a computing device via, for example, an enterprise network. A host operating system (OS) executing on the computing device determines and applies the settings that are applicable to the host OS. The configuration settings are stored for configuring containerized applications executing on the computing device. For instance, as new containerized applications are launched by the host OS, the containerized applications retrieve the configuration settings and determine and apply the settings that are applicable to the containerized applications. Results of applying the configuration settings to the host OS and the containerized applications are merged and sent to the mobile device manager. The host OS and the containerized application may, for example, implement the settings in order to be compliant with an enterprise's policy.
CONFIGURATION TECHNIQUES FOR MANAGED HOST OPERATING SYSTEMS AND CONTAINERIZED APPLICATIONS INSTANTIATED THEREBY
Embodiments described herein are directed to configuring managed computing devices utilizing containerized applications. For instance, a mobile device manager may provide configuration settings to a computing device via, for example, an enterprise network. A host operating system (OS) executing on the computing device determines and applies the settings that are applicable to the host OS. The configuration settings are stored for configuring containerized applications executing on the computing device. For instance, as new containerized applications are launched by the host OS, the containerized applications retrieve the configuration settings and determine and apply the settings that are applicable to the containerized applications. Results of applying the configuration settings to the host OS and the containerized applications are merged and sent to the mobile device manager. The host OS and the containerized application may, for example, implement the settings in order to be compliant with an enterprise's policy.