Patent classifications
H04L41/0886
ADAPTING MICROSERVICES TO MULTI-PLATFORM DEPLOYMENTS
A method includes: receiving, by a computing device, a microservice code from a user device; identifying, by the computing device, a service used by the microservice code; identifying, by the computing device, the service in a target cloud platform; generating, by the computing device, a modified microservice code by adding a predefined code template to the microservice code, the predefined code template being associated with the service in the target cloud platform; receiving, by the computing device, user input defining a value of a parameter in the predefined code template in the modified microservice code; and generating, by the computing device, a new deployment file for the target cloud platform based on the modified microservice code.
Automated access to racks in a colocation data center
Top-of-rack (TOR) switches are connected to a network fabric of a data center. Each TOR switch corresponds to a rack of the data center, and is configured to provide access to the network fabric for computing devices mounted in the rack. In one method, a TOR switch is mounted in a rack. The TOR switch is connected to a network fabric of a data center. A lock is used to control physical access to the rack. A request to physically access the rack is received from a computing device (e.g., a badge implementing a security token, or a mobile device). The request includes authentication credentials. The computing device is then authenticated. In response to authenticating the computing device, the lock is configured to provide physical access to the rack.
Configuration method for implementation in a network using a dynamic routing protocol
A configuration method includes: receiving, by a first device of a network, a first control message having configuration elements for activating a dynamic routing protocol in the network; configuring by the first device setup parameters for establishing sessions according to the protocol used by the first device on the basis of configuration elements included in the first message; if the configuration elements in the message include a management instruction for handling sessions according to the protocol in the network, executing by the first device the at least one management instruction; and if the configuration elements in the message include a setting for directing propagation of the configuration elements in the network, dispatching by the first device in accordance with the propagation setting at least one second control message to at least one second device of the network, which includes all or some of the configuration elements.
Automated network change system
Methods, systems, and apparatus, for automatically changing a network system. A method includes receiving a set of first intents that describe a state of a first switch fabric; receiving a set of second intents that describe a state of a second switch fabric; computing a set of network operations to perform on the first switch fabric to achieve the second switch fabric, the set of operations also defining an order in which the operations are to be executed, and the set of operations determined based on the set of first intents, the set of second intents, and migration logic that defines a ruleset for selecting the operations based on the set of first intents and the second intents; and executing the set of network operations according to the order, to apply changes to elements within the first switch fabric to achieve the state of the second switch fabric.
Network controller horizontal scaling for network device configuration sessions management
A first plurality of network configuration controllers of a controller may distribute, using a consistent hashing algorithm, a plurality of connection sessions with a plurality of network devices among the plurality of network configuration controllers. The controller may monitor a number of connection sessions maintained by each of the first plurality of network configuration controllers. The controller may add, based on monitoring the number of connection sessions maintained by each of the first plurality of network configuration controllers, an additional network configuration controller to the first plurality of network configuration controllers to form a second plurality of network configuration controllers. The second plurality of network configuration controllers may, in response to adding the additional network configuration controller to the first plurality of network configuration controllers, re-distribute, using the consistent hashing algorithm, one or more connection sessions of the plurality of connection sessions among the second plurality of network configuration controllers.
SYSTEMS AND METHODS FOR DYNAMIC FIREWALL POLICY CONFIGURATION
Systems and methods for receiving information on network firewall policy configurations are disclosed. Based on the received firewall configuration information, a configuration of a firewall and/or subnet of network devices is automatically provisioned and/or configured to control network traffic to and from the subnet.
AUTOMATIC CONFIGURATION OF SD-WAN LINK RULES ON A PER APPLICATION BASIS USING REAL-TIME NETWORK CONDITIONS
new link requests are received and an application making the request is identified. SD-WAN parameters are retrieved from an application control database. A first parameter is a JLP loss requirement for the application, and can be either low JLP, medium JLP, or high JLP SLA level. A second parameter a downstream/upstream bandwidth capability requirement. Links are determined from the pool of available links that meet the JLP requirement. One of the links is selected for the new link request, from the pool of available links that meet the JLP requirement, based on a downstream and an upstream bandwidth capability. The best link is automatically activated for the new link request
METHOD AND SYSTEM FOR CREATING SERVER CLUSTER ON EDGE LOCATION
A method includes automatically configuring a cluster using pre-defined templates of one or more servers positioned in an edge location. The method also includes creating a plurality of configuration profile templates. The method also includes obtaining one or more parameter values. The method also includes defining a plurality of parameters in each of the plurality of configuration profile templates based upon the one or more parameter values obtained. The method also includes creating a master template based on the plurality of configuration profile templates. The method also includes storing the master template in a repository. The method also includes automatically creating a planned inventory file based on the master template. The method also includes configuring the cluster of the one or more servers based on the planned inventory.
SYSTEM AND METHOD FOR AGNOSTIC ZERO TOUCH PROVISIONING OF CUSTOMER PREMISES EQUIPMENT
A method for zero-touch provisioning is disclosed. The method includes receiving a CSNR exclusively specified for a CPE assigned to a specific customer at the specific customer premises; provisioning a COS template created for providing the intended operation of the CPE at the customer premises, based at least on the CSNR; storing the COS template and a MAC address of the CPE as a job assignment; receiving, from the CPE, a provisioning request signal comprising the MAC address of the CPE, the CPE having already been authenticated by an authentication manager; and downloading to the CPE, based at least on the received MAC address of the CPE matching the job assignment, service information for the zero touch provisioning of the intended operation of the CPE; wherein the downloading to the CPE of the COS template takes place after the CPE has been authenticated by the authentication manager.
AUTOMATED ACCESS TO RACKS IN A COLOCATION DATA CENTER
Top-of-rack (TOR) switches are connected to a network fabric of a data center. Each TOR switch corresponds to a rack of the data center, and is configured to provide access to the network fabric for computing devices mounted in the rack. In one method, a TOR switch is mounted in a rack. The TOR switch is connected to a network fabric of a data center. A lock is used to control physical access to the rack. A request to physically access the rack is received from a computing device (e.g., a badge implementing a security token, or a mobile device). The request includes authentication credentials. The computing device is then authenticated. In response to authenticating the computing device, the lock is configured to provide physical access to the rack.