Patent classifications
H04L41/0889
INTEGRITY VERIFICATION FOR MANAGING NETWORK CONFIGURATIONS
In one embodiment, a method includes determining a first configuration information for configuring a user plane device of the first network slice associated with the control plane device, generating a first configuration identifier based on the first configuration information, sending, to the user plane device of the first network slice, the first configuration identifier and the first configuration information, receiving, from the user plane device of the first network slice, a second configuration identifier, wherein the second configuration identifier is generated by the user plane device of the first network slice based on the first configuration information received from the control plane device, and verifying, by comparing the first configuration identifier and the second configuration identifier, that the user plane device of the first network slice is configured using the first configuration information.
OpenFlow Instance Configuration
An AC obtains configuration information of a global instance and configuration information of an AP instance corresponding to each AP. The AC sends the configuration information of a corresponding AP instance to each AP respectively, so that each AP creates an AP instance based on the received configuration information of the AP instance, and binds an AP identifier to the created AP instance. The AC creates the global instance based on the configuration information of the global instance. The AC binds an AC identifier and an AP identifier of each AP to the global instance.
METHODS, SYSTEMS AND APPARATUSES FOR IMPLEMENTING TIME-TRIGGERED ETHERNET (TTE) FEATURE SET SCHEDULING WITH CONFIGURATION-DIVISION MULTIPLEXING (CDM) TO SUPPORT IN SITU RE-CONFIGURATION AND COMPLEX SYSTEM COMMISSIONING
Methods, systems, and apparatuses for orchestrating the re-configuration of a Time-Triggered Ethernet (TTE) network for a plurality of configuration definitions (CDs) within a network configuration superset (NCS) by a Network Scheduling Tool (NST), including coupling a plurality of FSs to at least one common control FS (CCFS) to enable control by the NST of each FS by a runtime procedure wherein each FS of the plurality of FSs is composed of Virtual Links (VLs); scheduling the plurality of features sets (FSs) based on a target configuration of a specified FSs coupled to the CCFS within the TTE network; collecting, in a first scheduling pass by the NST, multiple FSs related to a plurality of phase configurations wherein the FSs are used to derive a specified target FS configuration; and forming a common FS by using an application to determine features associated with each FS of the plurality of FSs.
Method for secure enrollment of devices in the industrial internet of things
The present invention provides a system and method for remote configuration and management of internet of thing devices, whereby applications do not need to explicitly participate in a particular configuration scheme and the application configuration and management can be performed securely and remotely while the Secure Remote Management engine is architecturally decoupled from the bearing protocols used by the remote enterprise to configure and manage the device or devices.
Managing multiple semantic versions of device configuration schemas
A controller device manages a plurality of network devices. The controller device includes one or more processing units implemented in circuitry and configured to maintain a graph data structure representing device level configuration schemas for the plurality of network devices, the graph data structure including trie nodes for every first device level configuration schema element for a first model of a version of network device of the plurality of network devices; obtain corresponding second device level configuration schema elements based on a path for a second model of the version of the network device; determine a deviation between the second device level configuration schema element and the first device level configuration schema; and update the trie node to add a branch to a node representing the second device level configuration schema element.
Batch manager for complex workflows
A workflow may include function calls to functions executed with respect to instances of elements. Health checks of elements of the workflow may be performed with reference to topology such that health checks of elements are omitted where a health check is performed by a parent in the topology. Batch processing of stages of a workflow may be performed with commencement of a stage being initiated based on completion percentage and execution time of a previous stage. Tasks of each stage may be performed by a pool of workers that are reused with pool size being selected based on expected completion time of each stage.
LOCALIZED DEVICE ATTESTATION
Various approaches for deploying and controlling distributed compute operations with the use of infrastructure processing units (IPUs) and similar networked processing units are disclosed. For example, a request to verify integrity of a device is received at a networking infrastructure device. A representation of device components of the device may be obtained. The representation of the device components may be compared with a reference value held by the networking infrastructure device. A response to the request may be transmitted based on matching the representation of the device components and the reference value. Here, the response indicates that the integrity of the device is intact.
Fast Provisioning in Cloud Computing Environments
A method for provisioning private-cloud server nodes by receiving a request to provision a specified number of server nodes for a private cloud, wherein the request is associated with a user, identifying a plurality of server nodes including (a) the specified number of hypervisor server nodes from a first pool that includes prepared hypervisor server nodes, each of which includes a previously-installed hypervisor, and (b) a management server node from a second pool that includes prepared management server nodes, each of which includes a previously-installed hypervisor and one or more previously-installed management components, configuring the identified server nodes to use a network associated with the user, creating a private cloud that includes the identified server nodes, and providing, to the user, permission to access the identified server nodes.
CONFLICT-FREE CHANGE DEPLOYMENT
A new scalable approach to conflict-free deployment of changes across networks. The conflict rules or constraints may be modeled using policies and algorithms to determine an optimized schedule for change deployment.
ARCHITECTURE OF NETWORKS WITH MIDDLEBOXES
Some embodiments provide a system for implementing a logical network that includes a set of end machines, a first logical middlebox, and a second logical middlebox connected by a set of logical forwarding elements. The system includes a set of nodes. Each of several nodes includes (i) a virtual machine for implementing an end machine of the logical network, (ii) a managed switching element for implementing the set of logical forwarding elements of the logical network, and (iii) a middlebox element for implementing the first logical middlebox of the logical network. The system includes a physical middlebox appliance for implementing the second logical middlebox.