Patent classifications
H04L41/0893
ASSIGNMENT OF NETWORK CONFIGURATION FOR A WIRED NETWORK USING A WIRELESS NETWORK
A technique is configured to utilize messages (e.g., frames) generated by a first layer of a protocol stack for a wireless network to configure network parameters associated with a second layer of the protocol stack for a wired network. The messages are illustratively beacon frames generated by a data link layer of a Transmission Control Protocol/Internet Protocol (TCP/IP) stack for a wireless network, and the network parameters are illustratively IP addresses associated with a network layer of the TCP/IP stack for a wired network. Notably, the beacon frames of the wireless network may be utilized for two-way communication exchange on a per node basis for each node in the wired network.
TECHNIQUES FOR DYNAMIC NETWORK MANAGEMENT
Various embodiments are generally directed to techniques for dynamic network management, such as by monitoring and analyzing network parameters, such as network traffic and network configurations, to enable visualization of network state and improved situational awareness. Some embodiments are particularly directed to providing a graphical user interface (GUI) that utilizes various network parameters to map, characterize, and/or assign attributes to network traffic and resources. In many embodiments, network traffic may be monitored and/or routed based on their attributes.
Method for data protection in a data processing cluster with policy-based partition
Systems and methods are disclosed for data protection in a cluster of data processing accelerators (DPAs) using a policy that partitions the DPAs into one or more group of DPAs in the cluster. A host device instructs the DPAs to organize themselves into non-overlapping groups according to a policy for each DPA in the cluster. The policy indicates, for each DPA, one or more other DPAs the DPA is to establish a communication link with, to implement the grouping. Once grouped, the host device and a DPA can access all resources of the DPA. DPAs in the same group as a first DPA can access non-secure resources, but not secure resources, of the first DPA. DPAs in a different group from the first DPA cannot access any resources of the first DPA. A scheduler in the host device can allocate processing tasks to any group in the cluster.
Method for data protection in a data processing cluster with policy-based partition
Systems and methods are disclosed for data protection in a cluster of data processing accelerators (DPAs) using a policy that partitions the DPAs into one or more group of DPAs in the cluster. A host device instructs the DPAs to organize themselves into non-overlapping groups according to a policy for each DPA in the cluster. The policy indicates, for each DPA, one or more other DPAs the DPA is to establish a communication link with, to implement the grouping. Once grouped, the host device and a DPA can access all resources of the DPA. DPAs in the same group as a first DPA can access non-secure resources, but not secure resources, of the first DPA. DPAs in a different group from the first DPA cannot access any resources of the first DPA. A scheduler in the host device can allocate processing tasks to any group in the cluster.
Allowing both internet access and network-based media sharing with media devices of particular guest room in response to confirming personal details received from guest device match registered guest of hospitality establishment
A media system includes a computer network, a media device supporting a network-based media sharing protocol, a plurality of output devices located at a plurality of physical locations within a hospitality establishment, and a system controller. In response to a first event, the system controller assigns the media device to a particular guest device by reconfiguring one or more components of the computer network to enable the particular guest device to utilize the network-based media sharing protocol to share media over the computer network with the media device, and commands an output device located at a physical location associated with the particular guest device to play media corresponding to the media signal outputted by the media device on the output port. In response to a second event, the system controller un-assigns the media device from the particular guest device and commands the output device to stop playing the media.
Allowing both internet access and network-based media sharing with media devices of particular guest room in response to confirming personal details received from guest device match registered guest of hospitality establishment
A media system includes a computer network, a media device supporting a network-based media sharing protocol, a plurality of output devices located at a plurality of physical locations within a hospitality establishment, and a system controller. In response to a first event, the system controller assigns the media device to a particular guest device by reconfiguring one or more components of the computer network to enable the particular guest device to utilize the network-based media sharing protocol to share media over the computer network with the media device, and commands an output device located at a physical location associated with the particular guest device to play media corresponding to the media signal outputted by the media device on the output port. In response to a second event, the system controller un-assigns the media device from the particular guest device and commands the output device to stop playing the media.
Forwarding element implementation for containers
A method of creating containers in a physical host that includes a managed forwarding element (MFE) configured to forward packets to and from a set of data compute nodes (DCNs) hosted by the physical host. The method creates a container DCN in the host. The container DCN includes a virtual network interface card (VNIC) configured to exchange packets with the MFE. The method creates a plurality of containers in the container DCN. The method, for each container in the container DCN, creates a corresponding port on the MFE. The method sends packets addressed to each of the plurality of containers from the corresponding MFE port to the VNIC of the container DCN.
Forwarding element implementation for containers
A method of creating containers in a physical host that includes a managed forwarding element (MFE) configured to forward packets to and from a set of data compute nodes (DCNs) hosted by the physical host. The method creates a container DCN in the host. The container DCN includes a virtual network interface card (VNIC) configured to exchange packets with the MFE. The method creates a plurality of containers in the container DCN. The method, for each container in the container DCN, creates a corresponding port on the MFE. The method sends packets addressed to each of the plurality of containers from the corresponding MFE port to the VNIC of the container DCN.
Orchestration of overlay paths for wide area network virtualization
The present application relates to traffic routing for overlay paths in a public cloud network. A path orchestrator receives a configuration of a set of overlay paths for a wide area network virtualization from a client, each overlay path including virtual routing nodes associated with respective geographic regions and at least one policy for a link between the virtual routing nodes. The path orchestrator is configured to instantiate a plurality of virtual routers on computing resources of the public cloud network located within the respective geographic regions based on the configuration, each virtual router configured to route traffic according to the policy for each link associated with the virtual routing node corresponding to the virtual router. The path orchestrator is configured to scale the plurality of virtual routers based on traffic for the client on the set of overlay paths.
Dynamic management of network policies between microservices within a service mesh
Systems, methods and/or computer program products optimizing network policies between microservices of a service mesh. The service mesh tracks incoming API calls of applications and based on the historical transactions, the context of API calls, and the microservices in the microservice chain being invoked, network controls and policy configurations are set to optimize the transactions performed by the service mesh. Dimensions of the communications between microservices of the service mesh are dynamically optimized via the service mesh control plane using a policy optimizer. Optimized dimensions of service mesh transactions includes automated policy adjustments to retries between microservices, circuit breaking between microservices, automated timeout adjustments between microservices and intelligent rate limiting between microservices and/or rate limiting applied to user profiles.