Patent classifications
H04L41/0661
Remote factory reset of an electronic device
During operation, an electronic device receives a packet or a frame associated with a second electronic device, where the packet or the frame includes information specifying a factory reset command. For example, the second electronic device may be a dynamic host configuration protocol (DHCP) server or may perform functions of a DHCP server. Moreover, the packet or the frame may include an acknowledgment (ACK) in a discover, offer, request and acknowledgment (DORA) procedure, and the information may be included in an option 43 subfield or an option 52 subfield in the packet or the frame. In response to receiving the factory reset command, the electronic device performs a factory reset. Note that the factory reset may restore firmware in the electronic device to a factory-fresh version and a configuration of the electronic device to a factory-fresh state, may erase memory in the electronic device.
DETECTING AND HANDLING A COEXISTENCE EVENT
A method includes detecting, by a coexistence controller of a system on a chip (SoC), an occurrence of a coexistence event of an SoC component; providing, by the coexistence controller, an indication of the occurrence of the coexistence event to a coexistence coordinator; and changing, by the coexistence controller, an operating point of the SoC from a current operating point to a new operating point responsive to receiving an operating point change request from the coexistence coordinator.
RESTART TOLERANCE IN SYSTEM MONITORING
When a restart event is detected within a technology landscape, restart-impacted performance metrics and non-restart-impacted performance metrics may be identified. The non-restart-impacted performance metrics may continue to be included within a performance characterization of the technology landscape. The restart-impacted performance metrics may be monitored, while being excluded from the performance characterization. The restart-impacted performance metric of the restart-impacted performance metrics may be transitioned to a non-restart-impacted performance metric, based on a monitored value of the restart-impacted performance metric following the restart event.
Identifying mismatches between a logical model and node implementation
Systems, methods, and computer-readable media analyzing memory usage in a network node. A network assurance appliance may be configured to obtain reference concrete level rules for a node in the network, obtain implemented concrete level rules for the node from the node in the network, compare the reference concrete level rules with the implemented concrete level rules, and determining that the implemented concrete level rules are not appropriately configured based on the comparison.
Monitoring user experience using data blocks for secure data access
Techniques for enabling secure access to data using data blocks is described. Computing device(s) can provide instruction(s) to a component associated with an entity, wherein the instruction(s) are associated with an identifier corresponding to a data block of a plurality of data blocks. The computing device(s) can receive, from the component, data associated with the component, wherein the data is associated with the identifier and is indicative of a state of the component. The computing device(s) can store the data in the data block and monitor, using rule(s), changes to the state of the component based at least partly on the data in the data block. As a result, techniques described herein enable near real-time—and in some examples, automatic—reporting and/or remediation for correcting changes to the state of the component using data that is securely accessed by use of data blocks.
Validating endpoints in a service mesh of a distributed computing system
Some examples of the present disclosure relate to validating endpoints in a service mesh of a distributed computing environment. In one example, a processor can receive configuration settings applied to an endpoint in a data plane of a service mesh in a distributed computing environment. The processor can receive configuration data associated with a configuration of hardware components and software components in the distributed computing environment. The processor can determine a discrepancy between the configuration settings and the configuration data. The processor can then output the discrepancy for use in resolving an operational error relating to the service mesh.
Method and Apparatus for Link Status Notification
This application provides a signal transmission method and apparatus. The method is applied to a communications system including at least three nodes, a second node in the at least three nodes communicates with a third node by using a first node, and the method includes: determining, by the first node, a status of a link between the first node and the second node; and sending, by the first node, first notification information to the third node when determining that the link between the first node and the second node is abnormal, where the first notification information is used to indicate that the link between the first node and the second node is abnormal.
Data erasure of network devices
A method for erasing stored data from the memory of the network device and requesting data from the memory after completion of the data erasure procedure or accessing the memory of the network device after completion of the data erasure procedure. The method further comprises determining the outcome of the data erasure procedure based on: the results of a comparison between a response received from the network device in reply to the request for data and an expected response which is indicative of a successful erasure of the memory of the network device; or the results of a comparison between any contents of the memory of the network device after completion of the data erasure procedure and expected contents of the memory of the network device after completion of the data erasure procedure which are indicative of a successful erasure of the memory of the network device.
Data-powered shipwright for network cloud maintenance
A system comprising a network cloud configured for a point of deployment containerized environment, a plurality of servers in communication with the network cloud, configured to establishing a point of deployment (POD) in one of the plurality of servers, receiving a determination that the POD is not operational, mapping the topology of the POD, and based on the mapping step, troubleshooting the POD in accordance with a set of rules.
Network switch recovery after reboot
A network switch can be configured using a boot loader after a reset of a controller within the network switch. The boot loader configures switching logic within the network switch prior to an operating system becoming operational. By allowing the boot loader to configure the switching logic, the network switch can become operational as fast as possible.