Patent classifications
H04L2012/5609
SYSTEMS FOR NETWORK RISK ASSESSMENT INCLUDING PROCESSING OF USER ACCESS RIGHTS ASSOCIATED WITH A NETWORK OF DEVICES
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for network risk assessment. One of the methods includes obtaining information describing network traffic between a plurality of network devices within a network. A network topology of the network is determined based on the information describing network traffic, with the network topology including nodes connected by an edge to one or more other nodes, and with each node being associated with one or more network devices. Indications of user access rights of users are associated to respective nodes included in the network topology. User interface data associated with the network topology is generated.
Method for Obtaining Port Path and Apparatus
A method for obtaining a port path and an apparatus to improve a network capacity, where the method includes receiving, by a controller, a request message from a first server, where the request message requests port path information, and the port path information includes a port that a logical link from the first server to a second server passes through, obtaining, by the controller, a first absolute port path (APP) and a second APP according to network topology information, where the first APP includes a port that a logical link from a root node to the first server passes through, and the second APP includes a port that a logical link from the root node to the second server passes through, obtaining, by the controller, the port path information according to the first APP and the second APP, and sending the port path information to the first server.
Systems for network risk assessment including processing of user access rights associated with a network of devices
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for network risk assessment. One of the methods includes obtaining information describing network traffic between a plurality of network devices within a network. A network topology of the network is determined based on the information describing network traffic, with the network topology including nodes connected by an edge to one or more other nodes, and with each node being associated with one or more network devices. Indications of user access rights of users are associated to respective nodes included in the network topology. User interface data associated with the network topology is generated.
SYSTEMS FOR NETWORK RISK ASSESSMENT INCLUDING PROCESSING OF USER ACCESS RIGHTS ASSOCIATED WITH A NETWORK OF DEVICES
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for network risk assessment. One of the methods includes obtaining information describing network traffic between a plurality of network devices within a network. A network topology of the network is determined based on the information describing network traffic, with the network topology including nodes connected by an edge to one or more other nodes, and with each node being associated with one or more network devices. Indications of user access rights of users are associated to respective nodes included in the network topology. User interface data associated with the network topology is generated.
Systems for network risk assessment including processing of user access rights associated with a network of devices
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for network risk assessment. One of the methods includes obtaining information describing network traffic between a plurality of network devices within a network. A network topology of the network is determined based on the information describing network traffic, with the network topology including nodes connected by an edge to one or more other nodes, and with each node being associated with one or more network devices. Indications of user access rights of users are associated to respective nodes included in the network topology. User interface data associated with the network topology is generated.
SYSTEMS FOR NETWORK RISK ASSESSMENT INCLUDING PROCESSING OF USER ACCESS RIGHTS ASSOCIATED WITH A NETWORK OF DEVICES
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for network risk assessment. One of the methods includes obtaining information describing network traffic between a plurality of network devices within a network. A network topology of the network is determined based on the information describing network traffic, with the network topology including nodes connected by an edge to one or more other nodes, and with each node being associated with one or more network devices. Indications of user access rights of users are associated to respective nodes included in the network topology. User interface data associated with the network topology is generated.
Systems for network risk assessment including processing of user access rights associated with a network of devices
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for network risk assessment. One of the methods includes obtaining information describing network traffic between a plurality of network devices within a network. A network topology of the network is determined based on the information describing network traffic, with the network topology including nodes connected by an edge to one or more other nodes, and with each node being associated with one or more network devices. Indications of user access rights of users are associated to respective nodes included in the network topology. User interface data associated with the network topology is generated.
Method for obtaining port path and apparatus
A method for obtaining a port path and an apparatus to improve a network capacity, where the method includes receiving, by a controller, a request message from a first server, where the request message requests port path information, and the port path information includes a port that a logical link from the first server to a second server passes through, obtaining, by the controller, a first absolute port path (APP) and a second APP according to network topology information, where the first APP includes a port that a logical link from a root node to the first server passes through, and the second APP includes a port that a logical link from the root node to the second server passes through, obtaining, by the controller, the port path information according to the first APP and the second APP, and sending the port path information to the first server.
ADAPTIVE COMMUNICATION NETWORK WITH CROSS-POINT SWITCHES
A cross-point switch system forming an adaptive communication network between a plurality of switches includes a plurality of ports connected to the plurality of switches, wherein the plurality of switches are connected to one another via a Port Aggregation Group (PAG) comprising multiple ports with a same set of endpoints between two switches; and a cross-point switch fabric configured to connect the plurality of ports between one another, wherein the cross-point switch fabric is configured to rearrange bandwidth in a PAG due to congestion thereon without packet loss.
SYSTEMS FOR NETWORK RISK ASSESSMENT INCLUDING PROCESSING OF USER ACCESS RIGHTS ASSOCIATED WITH A NETWORK OF DEVICES
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for network risk assessment. One of the methods includes obtaining information describing network traffic between a plurality of network devices within a network. A network topology of the network is determined based on the information describing network traffic, with the network topology including nodes connected by an edge to one or more other nodes, and with each node being associated with one or more network devices. Indications of user access rights of users are associated to respective nodes included in the network topology. User interface data associated with the network topology is generated.