H04L41/0876

SYSTEMS AND METHODS FOR PROVISIONING NETWORK AUTOMATION BY LOGICALLY SEPARATING L2-L3 ENTITIES FROM L4-L7 ENTITIES USING A SOFTWARE DEFINED NETWORK (SDN) CONTROLLER
20170339247 · 2017-11-23 ·

Methods and systems for providing network models and network configurations for communications are described. The method includes establishing, by a device intermediary to a plurality of clients and servers, a first interface on a manager of the device for delivering a network model of the device from the manager of the device to a software defined network (SDN) controller of an SDN. The method includes providing, via the first interface, the network model configured to provide definitions of one or more network layer entities of the device that are configured to provide network layer services. The method includes establishing, a second interface on the manager of the device configured to transmit and receive communications between the device and the SDN controller. The method includes receiving, by the manager via the second interface, network configuration to configure the device to process SDN application requests received from the SDN controller.

System for provisioning racks autonomously in data centers

A provisioning system autonomously and asynchronously brings up data center racks. In an embodiment, the provisioning system determines presence of a first and second device connected to a network. The provisioning system generates a first and second thread for validation of the first and second devices, respectively. Responsive to determining by the first thread that the first device is not validated, the provisioning system notifies a detection system that the validation of the first device has not passed. Responsive to determining by the second thread that the second device is validated, the provisioning system provisions the second device for integration with one or more provisioned devices on the network.

Prediction of network events via rule set representations of machine learning models

A processing system including at least one processor may obtain a time series of measurement values from a communication network and train a prediction model in accordance with the time series of measurement values to predict future instances of an event of interest, where the time series of measurement values is labeled with one or more indicators of instances of the event of interest. The processing system may then generate a deterministic finite automaton based upon the prediction model, convert the deterministic finite automaton into a rule set, and deploy the rule set to at least one network component of the communication network.

Systems and Methods for Automatic Device Detection
20170288965 · 2017-10-05 ·

Described systems and methods enable an automatic device detection/discovery, particularly of ‘Internet of Things’ client devices such as wearables, mobile communication devices, and smart home appliances, among others. Device detection comprises assigning a target device to a device category, such as “tablet computer from an unknown manufacturer, running Android®”. Some embodiments determine multiple preliminary category assignments according to distinct inputs such as HTTP user agent data, DHCP data, mDNS data, and MAC data. Each preliminary category assignment may come with an associated score. A definitive category assignment may be made according to an aggregate score. Applications include computer security, software provisioning, and remote device management, among others.

TRANSFER OF CONTROL OF CONFIGURATION SOURCES

A configuration control transfer (“CCT”) system controls the transferring of control of configuration information of a device from a current configuration source to a target configuration source. A CCT server of the CCT system may send to the device a message requesting the configuration information of the device. In response, a CCT client of the CCT system collects the configuration information of the device and sends the collected configuration information to the CCT server. If the second configuration source can support the configuration information of the current configuration source, the CCT server requests that the device transfer control of the configuration information from the current configuration source to the target configuration source. The CCT client then transfers control of the configuration information to the target configuration source as the new current configuration source and un-enrolls the device from the former current configuration source.

Multiple levels of logical routers
11252024 · 2022-02-15 · ·

Some embodiments provide a managed network for implementing a logical network for a tenant. The managed network includes a first set of host machines and a second set of host machines. The first set of host machines is for hosting virtual machines (VMs) for the logical network. Each of the first set of host machines operates a managed forwarding element that implements a first logical router for the tenant logical network and a second logical router to which the first logical router connects. The implementation of the second logical router is for processing packets entering and exiting the tenant logical network. The second set of host machines is for hosting L3 gateways for the second logical router. The L3 gateways connect the tenant logical network to at least one external network.

CONFIGURATION OF COMMUNICATION INTERFACES FOR LINK AGGREGATION

An example communications device may include physical communication interfaces and processing circuitry. In response to detecting that two of the physical communications interfaces are both connected to a same peer device as one another, the communications device may automatically configure the two interfaces for aggregation into the same link aggregation group. The communications device may then automatically begin negotiations with the peer device for establishment of the first link aggregation group.

METHOD AND SYSTEM FOR AUTOMATIC CONFIGURATION OF A COMMUNICATIONS INTERFACE FOR A SPECIALIZED DATA NETWORK OF AN AIRCRAFT

A method of automatic configuration of a communications interface of an unknown data network, the method comprising connecting an Electronic Flight Bag (EFB) to the unknown data network, attempting to open communication ports, in response to attempting to open communication ports, receiving data from the unknown data network, determining, by a controller module, if the selected communications interface can interpret the received data, and operating the communications interface of the EFB in accordance with the selected communications interface.

APPLICATION PROGRAMMING INTERFACE (API) TO PROVIDE NETWORK METRICS AND NETWORK RESOURCE CONTROL TO USERS

Novel tools and techniques are provided for implementing network application programming interface (“API”), and, more particularly, API to provide network metrics and network resource control to users. In some embodiments, a computing system might receive customer network telemetry data from a first network via a gateway API, might receive service provider network telemetry data from a second network(s) via a network API, might compile the customer network telemetry data and the service provider network telemetry data, might receive a request from a user to access information regarding network services associated with the user, might filter the compiled customer network telemetry data and the compiled service provider network telemetry data to isolate first telemetry data and second telemetry data, respectively, might provide the user with access to at least one of the first telemetry data or the second telemetry data, and might provide the user with options to control network resources.

UPGRADING USER SPACE NETWORKING STACKS WITHOUT DISRUPTIONS TO NETWORK TRAFFIC

Described embodiments provide systems and methods for upgrading user space networking stacks without disruptions to network traffic. A first packet engine can read connection information of existing connections of a second packet engine written to a shared memory region by the second packet engine. The first packet engine can establish one or more virtual connections according to the connection information of existing connections of the second packet engine. Each of the first packet engine and the second packet engine can receive mirrored traffic data. The first packet engine can receive a first packet and determine that the first packet is associated with a virtual connection corresponding to an existing connection of the second packet engine. The first packet engine can drop the first packet responsive to the determination that the first packet is associated with the virtual connection.