H04L43/0811

Debugging arrangement for active ethernet cable

A cable, a manufacturing method, and a usage method, each facilitate product development, testing, and debugging. An illustrative embodiment of a cable manufacturing method includes: connecting a first connector plug to a first data recovery and re-modulation (DRR) device and to a first controller device; and coupling electrical signal conductors to the first DRR device to convey electrical transit signals to and from a second DRR device, the second DRR device being connected to a second connector plug. The first controller device is operable in response to a host command to initiate a debug dump by the first DRR device and to store the debug dump in a nonvolatile memory.

Unique ID generation for sensors

Systems, methods, and computer-readable media are provided for generating a unique ID for a sensor in a network. Once the sensor is installed on a component of the network, the sensor can send attributes of the sensor to a control server of the network. The attributes of the sensor can include at least one unique identifier of the sensor or the host component of the sensor. The control server can determine a hash value using a one-way hash function and a secret key, send the hash value to the sensor, and designate the hash value as a sensor ID of the sensor. In response to receiving the sensor ID, the sensor can incorporate the sensor ID in subsequent communication messages. Other components of the network can verify the validity of the sensor using a hash of the at least one unique identifier of the sensor and the secret key.

Unique ID generation for sensors

Systems, methods, and computer-readable media are provided for generating a unique ID for a sensor in a network. Once the sensor is installed on a component of the network, the sensor can send attributes of the sensor to a control server of the network. The attributes of the sensor can include at least one unique identifier of the sensor or the host component of the sensor. The control server can determine a hash value using a one-way hash function and a secret key, send the hash value to the sensor, and designate the hash value as a sensor ID of the sensor. In response to receiving the sensor ID, the sensor can incorporate the sensor ID in subsequent communication messages. Other components of the network can verify the validity of the sensor using a hash of the at least one unique identifier of the sensor and the secret key.

Cross-cloud connectivity checks

Example methods and systems are provided for cross-cloud connectivity checks. One example method may include detecting a first connectivity check packet that is addressed from a first virtualized computing instance deployed in a first cloud environment; and determining that the first connectivity check packet is destined for a second virtualized computing instance in a second cloud environment reachable via the network device. The method may also comprise: generating a second connectivity check packet by modifying the first connectivity check packet to include one or more indicators that a connectivity check is required along a datapath towards the second virtualized computing instance in the second cloud environment. The method may further comprise: sending the second connectivity check packet to cause one or more observation points along the datapath to, based on the one or more indicators, generate and send report information associated with the second connectivity packet.

Cross-cloud connectivity checks

Example methods and systems are provided for cross-cloud connectivity checks. One example method may include detecting a first connectivity check packet that is addressed from a first virtualized computing instance deployed in a first cloud environment; and determining that the first connectivity check packet is destined for a second virtualized computing instance in a second cloud environment reachable via the network device. The method may also comprise: generating a second connectivity check packet by modifying the first connectivity check packet to include one or more indicators that a connectivity check is required along a datapath towards the second virtualized computing instance in the second cloud environment. The method may further comprise: sending the second connectivity check packet to cause one or more observation points along the datapath to, based on the one or more indicators, generate and send report information associated with the second connectivity packet.

Estimation of network quality metrics from network request data

Network request data is collected over a time window. The network request data is filtered to generate bypass network traffic records. Network performance categories are generated from the bypass network traffic records. Sufficient statistics of network optimization parameters are calculated for the network performance categories. The sufficient statistics of the network optimization parameters are used to generate network optimization parameters to determine data download performances of web applications.

Estimation of network quality metrics from network request data

Network request data is collected over a time window. The network request data is filtered to generate bypass network traffic records. Network performance categories are generated from the bypass network traffic records. Sufficient statistics of network optimization parameters are calculated for the network performance categories. The sufficient statistics of the network optimization parameters are used to generate network optimization parameters to determine data download performances of web applications.

User generated pluggable content delivery network (CDN) system and method

A pluggable CDN system and method include an edge node that is installed at each premises and caches/serves content/data to that premises that may be an individual user or a community. The edge node may use a hybrid push/pull caching scheme and may serve data to users even without any Internet connectivity.

Method of checking connection integrity of source nodes in cluster, electronic device, and computer readable storage medium applying method

A method of checking connection states of source nodes in a cluster is carried out by host computer, collecting information of a source node of each monitored computer, and generating a checking list. Each source corresponds to a plurality of network interface, and each network interface corresponds to a plurality of target nodes. At least one source node is selected as a to-be-checked source node. Each to-be-checked source node confirms the corresponding target nodes based on an instruction to detect network. Connection states between each to-be-checked source node and the target nodes are detected. A reason for detection failure is confirmed based on the result of detection and the checking list. An electronic device and a computer readable storage medium applying the method are also disclosed.

Method of checking connection integrity of source nodes in cluster, electronic device, and computer readable storage medium applying method

A method of checking connection states of source nodes in a cluster is carried out by host computer, collecting information of a source node of each monitored computer, and generating a checking list. Each source corresponds to a plurality of network interface, and each network interface corresponds to a plurality of target nodes. At least one source node is selected as a to-be-checked source node. Each to-be-checked source node confirms the corresponding target nodes based on an instruction to detect network. Connection states between each to-be-checked source node and the target nodes are detected. A reason for detection failure is confirmed based on the result of detection and the checking list. An electronic device and a computer readable storage medium applying the method are also disclosed.