Patent classifications
H04L41/085
Systems and method for discovering network topology
A method for determining network topology of a provider network includes selecting a first network element, selecting a first port on the first network element, and iteratively performing connectivity validation tests using the first port, wherein each connectivity validation test is associated with a type of network element and yields a result that indicates whether a second port on a second network element of the associated type is connected to the first port. A system for discovering topology of a network, the system comprising a topology discovery engine in operable communication with a near network element and operable to identify a first port of a far network element that is connected to a second port of the near network element by remotely altering operation of the near network element to cause the second network element to respond in a manner that identifies the first port.
Network controller for multi-site logical network
Some embodiments provide a method for a first network controller executing at a first site of multiple sites spanned by a logical network. Network controllers execute at each site. The method generates logical network state data for the first site based on (i) data received from computing devices that implement the logical network at the first site and (ii) logical network configuration data from a network manager at the first site. The method provides the logical network state data for the first site to a second network controller executing at a second site. The method provides logical network state data received from the second site to the computing devices that implement the logical network at the first site.
Network controller for multi-site logical network
Some embodiments provide a method for a first network controller executing at a first site of multiple sites spanned by a logical network. Network controllers execute at each site. The method generates logical network state data for the first site based on (i) data received from computing devices that implement the logical network at the first site and (ii) logical network configuration data from a network manager at the first site. The method provides the logical network state data for the first site to a second network controller executing at a second site. The method provides logical network state data received from the second site to the computing devices that implement the logical network at the first site.
Enhanced messaging for backup state status notifications in communications networks
Enhanced messaging is described to support status notifications regarding backup nodes of a data communications network. In one example, a status of a network node at the network node is monitored. The network node is coupled to a network. It is determined that the node is operating in a backup state, and a backup alive packet is sent through the network in response to determining that the node is operating in a backup state.
SYSTEMS AND METHODS FOR PROVIDING A TOPOLOGY OF A WIRELESS NETWORK
A distribution of a content selection being distributed throughout a wireless mesh network may be tracked. A wireless device in the wireless mesh network enables the content selection to be exchanged. Wireless devices then exchange the content, and a network topology is recorded in response. Finally, the network topology is reported to a reporting agent.
Network management device, network management method, and network management program
A network management device according to an embodiment includes network property storage means for storing information representing network properties, information object storage means for storing an information object relating to a network configuration corresponding to information representing network properties stored in the network property storage means, network property acquisition means for acquiring, from the network property storage means, information representing network properties corresponding to an optional protocol layer, information object acquisition means for acquiring, from the information object storage means, the information object corresponding to information representing network properties acquired by the network property acquisition means, and display means for displaying the information object acquired by the information object acquisition means.
Template-based onboarding of internet-connectible devices
Methods, systems, and computer-readable media for template-based onboarding of internet-connectible devices are disclosed. A device onboarding service receives an onboarding request comprising a proof and context of identity (PCI) of an Internet-connectible device (ICD). The service determines an account associated with the ICD based at least in part on the onboarding request. The account is associated with an account policy in an onboarding template that is determined at least in part by an owner of the account. If the PCI is verified against one or more criteria of the onboarding template, then a device configuration is determined based at least in part on the onboarding template. The service sends the device configuration to the ICD, and the ICD's behavior is determined at least in part on the device configuration. The ICD uses the access credentials of the device configuration to communicate with an application in a cloud computing environment.
Template-based onboarding of internet-connectible devices
Methods, systems, and computer-readable media for template-based onboarding of internet-connectible devices are disclosed. A device onboarding service receives an onboarding request comprising a proof and context of identity (PCI) of an Internet-connectible device (ICD). The service determines an account associated with the ICD based at least in part on the onboarding request. The account is associated with an account policy in an onboarding template that is determined at least in part by an owner of the account. If the PCI is verified against one or more criteria of the onboarding template, then a device configuration is determined based at least in part on the onboarding template. The service sends the device configuration to the ICD, and the ICD's behavior is determined at least in part on the device configuration. The ICD uses the access credentials of the device configuration to communicate with an application in a cloud computing environment.
System for testing Ethernet paths and links without impacting non-test traffic
A system for testing Ethernet paths or links without adversely impacting non-test traffic. The system includes a test traffic generator that includes a scheduler that determines when a new test packet is generated. The test traffic generator includes a packet creator that builds a test packet and a transmitter for transmitting the test packet via the Ethernet path or link. The packet creator sends the test packet to the transmitter. The traffic generator includes a transmit credit block coupled to the transmitter or to the scheduler. The transmit credit block stores an amount of credits representing a number of bytes that are available to transmit and decrements the amount each time a non-test packet is communicated via the Ethernet path or link.
Configuration management for virtual machine environment
A computer-implemented method for controlling a connection between a virtual machine and a physical device comprises receiving a connection request for connecting the physical device to the virtual machine and determining whether the virtual machine satisfies a first connection permission condition and whether the physical device satisfies a second connection permission condition. In response to a determination that the virtual machine does not satisfy the first connection permission condition, a configuration of the virtual machine is changed to satisfy the first connection permission condition. In response to a determination that the physical device does not satisfy the second connection permission condition, a configuration of the physical device is changed to satisfy the second connection permission condition. In response to a determination that the virtual machine satisfies the first connection permission condition and that the physical device satisfies the second connection permission condition, the received connection request is accepted.