Patent classifications
H04L41/0883
OBTAINING LOCATION METADATA FOR NETWORK DEVICES USING AUGMENTED REALITY
Obtaining location metadata for network devices using augmented reality (AR) is disclosed herein. In one embodiment, an AR computing device receives first user inputs indicating boundary points of a device region, and determines first spatial coordinates for each boundary point. The AR computing device next receives a second user input that indicates a network device within the device region, and determines second spatial coordinates for the network device. The AR computing device may also correlate the network device with a known connected network device. The AR computing device then transmits, to a server computing device, first metadata that includes the first spatial coordinates and an identifier of the device region, and second metadata that includes the second spatial coordinates and an identifier of the indicated network device. In some embodiments, the metadata may be employed, e.g., to generate a floorplan visualization and/or a signal strength map of the device region.
MODE-BASED ACCESS CONTROL METHOD AND DEVICE
Provided is a mode-based access control method that includes: making a security mode list which indicates security setting states of devices existing in a home network; setting a specific security mode selected from the modes on the security mode list; and making the devices perform functions thereof in the specific security mode. Also, provided is a mode-based access control device includes: an authentication unit which checks information on a user and authenticates the user; a mode configuration unit which makes a security mode list indicating the security setting state of devices forming a home network; a mode setting unit which sets a specific security mode selected from modes on the security mode list; and an operating unit which causes the devices to perform functions thereof in the specific security mode.
Sharing configuration resources for network devices among applications
In an example, a method includes receiving, by a network management system (NMS), a configuration request comprising first configuration data for a network device, the first configuration data defining a data structure comprising a first property/value pair; generating, by the NMS from the first configuration data, a corresponding first path/value pair for the first property/value pair, wherein a path of the first path/value pair uniquely identifies the first path/value pair in an associative data structure; modifying, by the NMS, the associative data structure based on the first path/value pair; generating, by the NMS, from the associative data structure, a configuration resource comprising second configuration data for the network device, the second configuration data comprising a second property/value pair that corresponds to the first path/value pair; and sending, by the NMS, the second configuration data to the network device to modify a configuration of the network device.
Security ecosystem
A system, method, and apparatus for implementing workflows across multiple differing systems and devices is provided herein. During operation, a workflow is automatically generated to allow users affected by an action of a workflow to control various IoT devices associated with a trigger of a workflow.
System and Method for Semi-Static Traffic Engineering
A method and application function for managing data flows in a network comprising a plurality of nodes. The method comprises generating a number N of network load representatives (NLRs) of an expected loading of the network, identifying a path selection configuration for the data flows for each of the N NLRs and mapping a prevailing network loading to a selected one of the N NLRs. If the selected NLR is different from a currently selected NLR, the method triggers traffic engineering (TE) by implementing the path selection configuration of the selected NLR at nodes affected thereby. The application function may comprise an NLR generator, a path optimizer and an NLR mapper.
CONFIGURING DEVICES USING DEVICE MANAGEMENT TEMPLATES
Tools are provided to enable a service technician or administrator to apply settings, via a mobile terminal, from configuration templates to a device, particularly when the device is accessible through a network. Such configuration templates may be obtained or downloaded to the mobile terminal from a device management server on a regular basis or as needed or on demand.
Smart network topology systems and methods
The smart network topology systems and methods of the present disclosure are aimed at easing network administrator efforts in configuring network configurations to suit their network environment. For instance, the smart network topology system may provide predefined network topology types that an administrator can use when setting up network connectivity between client devices and other network devices such as media agents, storage servers, and the like. Further, the smart network topology system provides the user with a way to customize the routes created between the client computing devices and storage computing devices such that each client computing device is configured to communicate with only those storage computing devices that the client computing device needs to communicate with to perform one or more data protection operations.
System for generating data center asset configuration recommendations
A system, method, and computer-readable medium are disclosed for performing a data center monitoring and management operation. The data center monitoring and management operation includes: identifying a plurality of assets within a data center; monitoring usage of the plurality of assets within the data center; generating data center asset profile data based upon the monitoring; identifying a plurality of asset configurations related to the asset profile data; ranking the plurality of asset configurations based upon the data center asset profile data; and, generating a recommended asset configuration recommendation based upon the ranking.
MULTI-FABRIC DEPLOYMENT AND MANAGEMENT PLATFORM
The present technology provides a framework for user-guided end-to-end automation of network deployment and management, that enables a user to guide the automation process for any kind of network deployment from the ground up, as well as offering network management, visibility, and compliance verification. The disclosed technology accomplishes this by creating a stateful and interactive virtual representation of a fabric using a customizable underlay fabric template instantiated with user-provided parameter values and network topology data computed from one or more connected network devices. A set of expected configurations corresponding to the user-specified underlay and overly fabric policies is then generated for deployment onto the connected network devices. Network deviations from the intended fabric policies are addressed by the provision of one or more configuration lines to be deployed onto or removed from the connected network devices to bring the network state in agreement with the set of expected configuration.
DEPLOYING A NETWORK MANAGEMENT CONTROLLER IN AN EXISTING DATA CENTER FABRIC
Some organizations have a deployed and functional “controllerless” EVPN VxLAN Fabric in their data centers. Eventually, however, the organization may deploy a controller within the network. In one example, this disclosure describes a method that includes configuring a controller to communicate with each of a plurality of elements in a network; determining, by the controller, an initial operational state of the network; translating, by the controller, the initial operational state of the network to an intent-based configuration; pushing, by the controller, the intent-based configuration to the network to reconfigure each of the plurality of elements in the network in a manner consistent with the intent-based configuration; determining, by the controller and after pushing the intent-based configuration, an updated operational state of the network; and comparing, by the controller, the initial operational state of the network with the updated operational state of the network.