Patent classifications
H04L41/085
Port configuration method and communications device
This application provides a port configuration method and a communications device. The method includes: obtaining, by a first communications device, an identifier of a second port group of a second communications device, where the identifier of the second port group is used to indicate configuration information of a first port of the first communications device, and establishing, by the first communications device, a connection to a second port in the second port group by using the first port, where the first port is any port of the first communications device, the second port is any port in the second port group, and the configuration information includes an internet protocol IP address; determining, by the first communications device, the configuration information of the first port based on the identifier of the second port group; and configuring, by the first communications device, the configuration information for the first port.
Managing and classifying assets in an information technology environment using tags
Disclosed below are representative embodiments of methods, apparatus, and systems for managing and classifying assets in an information technology (“IT”) environment using a tag-based approach. The disclosed tag-based classification techniques can be implemented through a graphical user interface. Embodiments of the disclosed tag-based classification techniques can be used to allow a user to easily and quickly select, and perform actions on groups of one or more assets (e.g., monitor policies, perform upgrades, etc.). For example, the tag-based classification techniques can automatically classify assets into “tag sets” (or “tagged sets”) based on node properties or user-selected criteria or conditions (e.g., criteria or conditions that are established in a user-created tagging profile or rule). The tagged assets can then be further filtered to identify even deeper relationships between the assets.
Managing and classifying assets in an information technology environment using tags
Disclosed below are representative embodiments of methods, apparatus, and systems for managing and classifying assets in an information technology (“IT”) environment using a tag-based approach. The disclosed tag-based classification techniques can be implemented through a graphical user interface. Embodiments of the disclosed tag-based classification techniques can be used to allow a user to easily and quickly select, and perform actions on groups of one or more assets (e.g., monitor policies, perform upgrades, etc.). For example, the tag-based classification techniques can automatically classify assets into “tag sets” (or “tagged sets”) based on node properties or user-selected criteria or conditions (e.g., criteria or conditions that are established in a user-created tagging profile or rule). The tagged assets can then be further filtered to identify even deeper relationships between the assets.
Intelligent learning and management of a networked architecture
Intelligent learning and management of networked architectures is disclosed. A network architecture can be mapped to identify a set of interconnected hardware and software elements that comprise the network architecture. Data sources associated with the set of interconnected hardware and software elements can be identified and employed to compile data associated with the elements. The data can be utilized to determine an action to address potential negative effects of a change to the network architecture such as an update or patch. In one instance, the action corresponds to a reconfiguration of at least one of the set of interconnected hardware and software elements. Further, machine learning can be employed to determine a particular configuration. Once determined the action can be implemented on the network architecture.
Intelligent learning and management of a networked architecture
Intelligent learning and management of networked architectures is disclosed. A network architecture can be mapped to identify a set of interconnected hardware and software elements that comprise the network architecture. Data sources associated with the set of interconnected hardware and software elements can be identified and employed to compile data associated with the elements. The data can be utilized to determine an action to address potential negative effects of a change to the network architecture such as an update or patch. In one instance, the action corresponds to a reconfiguration of at least one of the set of interconnected hardware and software elements. Further, machine learning can be employed to determine a particular configuration. Once determined the action can be implemented on the network architecture.
SYSTEM PROCESSING DEVICE AND METHOD FOR SUPPORTING A SOFTWARE-DEFINED NETWORKING ARCHITECTURE FOR A CONSTRAINED DEVICE
A system configured to support software-defined networking, SDN, is described. The system comprises: a management client entity (310); main processing device (220, 320) operably connected to the management client entity (310) and arranged to communicate with the management client entity (310) using a first SDN protocol; a target server (330) running on a constrained device (228, 329) operably connected to the main processing device (220, 320) and arranged to communicate with the main processing device (320) using a second SDN protocol (242) that is different to the first SDN protocol. The main processing device (220, 320) comprises a data store (370) configured to perform as an interface between the first SDN protocol and the second SDN protocol (242).
SYSTEM PROCESSING DEVICE AND METHOD FOR SUPPORTING A SOFTWARE-DEFINED NETWORKING ARCHITECTURE FOR A CONSTRAINED DEVICE
A system configured to support software-defined networking, SDN, is described. The system comprises: a management client entity (310); main processing device (220, 320) operably connected to the management client entity (310) and arranged to communicate with the management client entity (310) using a first SDN protocol; a target server (330) running on a constrained device (228, 329) operably connected to the main processing device (220, 320) and arranged to communicate with the main processing device (320) using a second SDN protocol (242) that is different to the first SDN protocol. The main processing device (220, 320) comprises a data store (370) configured to perform as an interface between the first SDN protocol and the second SDN protocol (242).
CLOUD NETWORK MECHANISM DRIVER MIGRATION
A method includes updating a cloud networking environment from a first network mechanism driver to a second network mechanism driver and identifying a configuration of one or more resources of the cloud networking environment associated with the first network mechanism driver. The method further includes determining one or more features of the configuration of the one or more resources that are incompatible with the second network mechanism driver and updating the one or more features of the configuration of the one or more resources to be compatible with the second network mechanism driver.
TECHNIQUES FOR CORRELATING SERVICE EVENTS IN COMPUTER NETWORK DIAGNOSTICS
Examples described herein generally relate to receiving a query context for service events occurring on one or more networks, determining, based on the query context, a set of service events occurring on the one or more networks, querying multiple layers of a multiple-layer relational graph to determine one or more other service events having a defined relationship with the set of service events at one or more of the multiple layers, where the multiple layers include a configuration layer, an observation layer, and learned layer, defining relationships between services or service events, and indicating, via a user interface and in response to the query context, the one or more other service events.
CONFLICT-FREE CHANGE DEPLOYMENT
A new scalable approach to conflict-free deployment of changes across networks. The conflict rules or constraints may be modeled using policies and algorithms to determine an optimized schedule for change deployment.