Patent classifications
H04L12/26
Stand-by controller assisted failover
Methods and systems for standby controller aided failover are provided. According to one embodiment, an active control channel and an active data channel are established by an active controller with a managed device via a management protocol. A standby control channel and a standby data channel are established by a standby controller with the managed device via the management protocol. A keep-alive message is periodically sent by the standby controller to the active controller. When a response to the keep-alive message is not received by the standby controller within a predefined time, failover from the active controller to the standby controller is initiated by: (i) taking over for the active controller; and (ii) notifying the managed device to direct subsequent management protocol messages to the standby controller via the standby control channel.
Diagnosis and throughput measurement of fibre channel ports in a storage area network environment
An example method for diagnosis and throughput measurement of FC ports in a SAN environment is provided and includes generating, by a control processor at a generator in the SAN, a control packet requesting a link test to be performed with a reflector in the SAN, sending the control packet to the reflector through a media access controller (MAC) of the generator, receiving, at the MAC of the generator, an acknowledgement from the reflector indicating ability to perform the requested link test, generating, at the MAC of the generator, a test data packet for the link test, performing the link test with the reflector, and analyzing, at the generator, network parameters based on results of the link test.
System, switch device and method of controlling a plurality of switch devices
A switch apparatus includes a first controller, a second controller, and a plurality of switch devices, the plurality of switch devices being configured to receive a packet and store a flow table which indicates a method of handling a process of the received packet, wherein the first controller informs a first content of the flow table to the plurality of switch devices, a first switch device detects a communication error between the first switch device and the first controller, the first switch device informs a second switch device of the communication error, and the second switch device changes a connecting destination from the first controller to the second controller.
Partial information throttle based on compliance with an agreement
Partially reduces performance or features of a user's electronic device if the user does not comply with an agreement. An agreement may specify tasks or activities to be performed, such as homework or chores, or required results such as grades. Partial throttling of the device when the user is not in compliance with the agreement may include for example disabling a subset of the apps or services on the device, slowing down the device or selected applications, denying access to selected information sources, limiting audio volume or display resolution, or limiting time on activities such as web browsing. The device may remain usable, but with reduced features or performance. Throttling actions may also be based on location, schedule, or environmental conditions. The system may reward compliance with the agreement by increasing performance, by re-enabling previously disabled applications, or by providing direct rewards such as money or credits.
Limiting data output from windowing operations
A method for regulating output from stream operators performing a windowing operation may include receiving stream of tuples to be processed by a plurality of processing elements, each processing element having one or more stream operators. The method may also include receiving a first stream of tuples at a first stream operator, the first stream operator being configured to generate a stream of accumulated tuples according to a set of windowing conditions. The method may then include processing the stream of accumulated tuples in response to a window trigger, where the processing generates a quantity of output. At least one processor may then monitor the quantity of output to determine whether the quantity of output exceeds a data output threshold. The processing may then be adjusted, in response to determining that the quantity of output exceeds the data output threshold, to reduce the output to approach the data output threshold.
Contraband wireless communications device identification in controlled-environment facilities
Systems and methods for identification of a controlled-environment facility resident in possession of a contraband communications device capture or otherwise accept managed access data and/or contraband communications device assessment data for contraband communications devices operating in the controlled-environment facility. Controlled-environment facility resident call data for each resident of the controlled-environment facility is gathered from the controlled-environment facility resident communications system. Correlations in the managed access data and/or assessment data with the controlled-environment facility resident communications system call data are analyzed to identify each resident of the controlled-environment facility in possession of a contraband communications device.
Satellite downlink signal performance monitoring at identified antennas
A satellite monitoring system is disclosed. The system may monitor various downlink signals of various satellites. In response to user queries, the system may provide diagnostic and other data related to the characteristics of the downlink signals. In this manner, an independent verification and validation of downlink signal characteristics may be performed. Moreover, the system may take various actions in response to detected anomalies related to the characteristics of the downlink signals, such as automatically generating alerts for users and/or activating an uplink facility, such as a backup uplink facility and/or providing control signals to user devices, such as antenna controllers, to reorient user antennas in response to the characteristics of the downlink signals.
Automated device discovery on a building network
Techniques and solutions are provided for performing automated device discovery over a network operating according to the building automation and control network (BACnet) protocol standard (a BACnet network). For example, automated device discovery on a BACnet network can be performed via automated processing of BACnet traffic without going through a manual discovery and configuration process, and without binding to BACnet devices. For example, who-is and I-am BACnet messages can be used to identify BACnet devices on the network and their property values can be read and displayed (e.g., in a dashboard interface). BACnet devices can also be queried to determine their supported properties.
Mobile application identification in network traffic via a search engine approach
A method for identifying a network application. The method includes analyzing metadata and source code of a network application to extract a set of application tokens, generating an index document of the network application based on the set of application code tokens, wherein the index document is included in a library of index documents corresponding to a number of network applications, extracting a set of packet header tokens from a packet header of a packet in a flow, comparing the set of packet header tokens to the set of index documents to generate a number of match scores, wherein each match score represents a similarity measure between the set of packet header tokens and one index document, and determining, based on a highest match score corresponding to a particular network application, that the flow is generated by the particular network application.
System, method, and computer program for selecting at least one new physical element and/or virtual element for use in a system including a network function virtualization orchestrator (NFV-O)
A system, method, and computer program product are provided for selecting at least one new physical element and/or virtual element for use in a system including a network function virtualization orchestrator (NFV-O). In use, information corresponding to data traffic associated with a network system including an NFV-O module is identified, the NFV-O module being operable to manage data flow associated with one or more Virtual Network Functions (VNFs) and one or more physical elements of the network system. Additionally, an overall expected usage of the network system is determined based on the information corresponding to the data traffic. Further a cost of implementing at least one of one or more new physical elements or one or more VNFs is determined, based on the overall expected usage. Moreover, at least one of the one or more new physical elements or the one or more VNFs to implement in the network system is selected based at least partially on the determined cost of implementing the one or more new physical elements and the cost of implementing the one or more VNFs.