Patents Issued in November 2, 2017
-
Publication number: 20170317931Abstract: The present invention relates to the communications field, and discloses a data flow transmission method, a device, and a system, so as to resolve a problem of resource waste caused when a relay user equipment provides a relay service for a remote user equipment. A specific solution is as follows: A first network device triggers a first relay user equipment to establish a common data flow bearer with a second network device, and the first network device sends an identifier of a common data flow to a remote user equipment in a first group before or after the first network device triggers the first relay user equipment to establish the common data flow bearer with the second network device. The present invention is applied to data flow transmission.Type: ApplicationFiled: July 18, 2017Publication date: November 2, 2017Inventors: Yanmei Yang, Wanqiang Zhang
-
Publication number: 20170317932Abstract: The present disclosure is directed towards systems and methods of service chain load balancing. A controller intermediary to a client and computing infrastructure identifies a plurality of service chains. Each of the plurality of service chains include a path having an instance of a first service provided by the computing infrastructure and an instance of a second service provided by the computing infrastructure. The controller determines a path weight for each of the plurality of service chains. The path weight indicates a level of efficiency of delivering services in accordance with the service chain. The controller selects, based on a load balancing function and the path weight for each of the plurality of service chains, a service chain from the plurality of service chains to direct network traffic from a client.Type: ApplicationFiled: April 29, 2016Publication date: November 2, 2017Inventor: Sankar Muthu Paramasivam
-
Publication number: 20170317933Abstract: One embodiment includes receiving a notification at a communications network node; determining a lowest cost path for implementing a next hop for the notification; determining a best alternate path for the next hop; comparing a cost of the best alternate path with a value stored in a notification header field; updating the header field value to equal the cost of the best alternate path if the cost of the best alternate path is less than the header field value; and forwarding the notification along the lowest cost path. Some embodiments include receiving a NACK at the node; comparing a cost of the best alternate path with a NACK header field value; and retransmitting the notification along the best alternate path if the NACK header field value is greater than or equal to the cost of the best alternate path.Type: ApplicationFiled: May 2, 2016Publication date: November 2, 2017Applicant: CISCO TECHNOLOGY, INC.Inventors: David R. Oran, James Cameron Gibson, Maziar Mirzazad Barijough
-
Publication number: 20170317934Abstract: Most of the internet traffic today is carried out via the Transmission Control Protocol (TCP). The main advantage of TCP is that it provides reliable data transfer to the application layer and simplifies programming. The protocol maximizes data throughput but may also lead to noticeable transmission delay in wide area networks (WAN). A client-server based medical image viewing system is disclosed that achieves high data throughput over TCP without impacting responsiveness. Special timestamp messages inserted into the data stream allow the system to detect situations where network latency increases noticeably and to obtain a reliable estimate of sustained transfer bandwidth. The system applies a feedback scheme that avoids network delays by limiting send bandwidth. In addition other parameters, in particular image compression settings, are dynamically adjusted depending on current network quality.Type: ApplicationFiled: July 17, 2017Publication date: November 2, 2017Applicant: PME IP PTY LTD.Inventors: Detlev Stalling, Malte Westerhoff
-
Publication number: 20170317935Abstract: Disclosed are a system comprising a computer-readable storage medium storing at least one program, and a computer-implemented method for event messaging over a network. A subscription interface receives data indicative of a subscription request for sessionized data. An allocation module allocates a sessionizer bank linked to the subscription request. A messaging interface module provisions identifiers linked to the respective processing engines of the sessionizer bank. The messaging interface module registers the allocated sessionizer bank as available to process event messages matching the subscription request by providing the provisioned identifiers. The messaging interface module receives event messages from a producer device linked by a collection server to a selected one of the processing engines of the sessionizer bank. The selected one of the processing engine processes the received event messages in accordance with session rule data linked to the subscription request to generate sessionized data.Type: ApplicationFiled: January 23, 2015Publication date: November 2, 2017Applicant: eBay Inc.,Inventors: Sharad R. Murthy, Bhaven Avalani, Hongyue Nemo Chen, Chun Tung Tony Ng, Weiwei Jin, Xinglang Wang, Mingming Wang, Wei Fang
-
Publication number: 20170317936Abstract: A classifier network element in a service function chain system receives a classification policy and an access policy from a controller of the service function chain system. The classification policy identifies which service function path network traffic flows will traverse through the service function chain system. The access policy defines criteria for determining whether network traffic flows will be sent along a service function path of the service function chain system. The classifier network element receives an initial packet of a network traffic flow from a source endpoint directed to a destination endpoint. Responsive to a determination that the initial packet of the network traffic flow satisfies the criteria of the access policy, the classifier network element applies the access policy to the network traffic flow.Type: ApplicationFiled: April 28, 2016Publication date: November 2, 2017Inventors: Nagarajan Swaminathan, Dinesh Ranjit, Daniel Freedman
-
Publication number: 20170317937Abstract: Systems and methods are provided for quality of service over broadband networks. A network device performs a probe transaction over a tunnel of a broadband network. Based on the probe transaction, parameters are determined reflecting tunnel performance, and, based on the parameters, target transmit and receive rates are determined for data communications over the tunnel. Based on the target transmit and receive rates, data communications to and from a first node of the network are regulated. When the tunnel comprises a peered tunnel, the regulation of received data communications comprises performing a set rate transaction with a peer second node of the network (the set rate transaction establishes a rate for data transmitted over the tunnel by the peer second node to the first node). When the tunnel comprises a peerless tunnel, the regulation of received data communications comprises shaping data traffic received by the first node over the tunnel.Type: ApplicationFiled: July 20, 2017Publication date: November 2, 2017Inventor: Douglas DILLON
-
Publication number: 20170317938Abstract: A device for communication includes a processor and a transmitter. The processor is configured to determine a target quality of service (QoS). The processor is also configured to determine, based on the target QoS, a transmission schedule identifying one or more transmission time-blocks. The transmitter is configured to transmit data to at least one device during a transmission time-block of the one or more transmission time-blocks.Type: ApplicationFiled: April 7, 2017Publication date: November 2, 2017Inventors: Santosh Paul ABRAHAM, Abhishek Pramod PATIL, George CHERIAN, Alireza RAISSINIA, Abhijeet BISAIN, Xiaolong LI, Ajay VUNDYALA
-
Publication number: 20170317939Abstract: A wireless communication system for a train, including: a plurality of antennas arranged on an exterior side of the train; an internal local area network (LAN) inside the train; and at least one router in the train for receiving and transmitting wireless voice communication and data communication to and from a stationary communication server outside the train via the antennas, through at least one exterior mobile network, the at least one exterior mobile network providing at least two concurrently useable data links. The internal LAN provides WiFi communication between the at least one router and at least one mobile terminal located inside the train. Further, the router is arranged to transfer wireless voice communication via voice over WiFi (VoWIFI) between the at least one mobile terminal and the exterior mobile network.Type: ApplicationFiled: October 26, 2015Publication date: November 2, 2017Applicant: ICOMERA ABInventor: Mats KARLSSON
-
Publication number: 20170317940Abstract: An information handling system includes a plurality of memories and a plurality of processors. Portions of the processors and the memories are allocated as a virtual machine to a second information handling system. During a learning phase, a first processor to monitors a high bandwidth network activity of the second information handling system, and stores an event associated with the high bandwidth network activity. During an operating phase, the first processor detects the event, and transfers data associated with the high bandwidth network activity as a background activity based on available bandwidth between the information handling system and the second information handling system.Type: ApplicationFiled: April 27, 2016Publication date: November 2, 2017Inventor: John Kelly
-
Publication number: 20170317941Abstract: System and method for reporting usage of a network infrastructure includes obtaining a map that includes at least one flow-mapping that correlates a flow feature with a service and that correlates a flow feature with an endpoint type, wherein the endpoint types include at least a subscriber type and a service type; at a first computer, receiving flow telemetry of a network infrastructure, the flow telemetry representing at least the destination and source attributes for network traffic in the flow telemetry; categorizing the flow telemetry into at least a subscriber flow category based on the source and destination endpoint types of the traffic; for subscriber flow telemetry of a subscriber, processing the subscriber flow telemetry into at least one flow feature; identifying at least one service to attribute to at least a portion of the subscriber flow telemetry, the service identified through the processed flow feature and a flow-mapping.Type: ApplicationFiled: May 11, 2017Publication date: November 2, 2017Applicant: Deepfield Networks Inc.Inventors: Joseph E. Eggleston, Craig H. Labovitz
-
Publication number: 20170317942Abstract: This application discloses a data traffic management method and apparatus. The method includes: obtaining traffic control information of a first application and a data traffic value used by the first application, where the traffic control information includes at least an upper traffic threshold; and disconnecting a data connection of the first application when the data traffic value used by the first application is greater than or equal to the upper traffic threshold included in the traffic control information of the first application. In the foregoing solution, real-time traffic management on a single application is implemented, so that a user instantly modifies traffic control information according to a requirement, to manage data traffic in real time.Type: ApplicationFiled: October 31, 2014Publication date: November 2, 2017Inventors: Xiaochen Chen, Qingquan Peng, Peili Xu, Shuaisheng Guo, Chao Jiang
-
Publication number: 20170317943Abstract: A system for scheduling prioritized traffic in a scrambled and coded multiple access (SCMA) system multiple terminals and a gateway. Each terminal is configured to receive packets from user devices and place the packets on various input queues. The packets are en-queued onto a plurality of output queues based on priority or service class. The terminal is further configured to detect one or more available SCMA slots within a frame of a communication system, and de-queue packets from the highest priority output queue onto the frame via one or more SCMA bursts. The terminal includes transceiver for transmitting/receiving frames of the communication system to/from the gateway. The terminals autonomously transmit SCMA bursts on a first channel, and transmit TDMA bursts on a second channel based on assigned timings received from the gateway.Type: ApplicationFiled: April 28, 2016Publication date: November 2, 2017Inventors: Jun XU, Rob TORRES, John BORDER, Zengquan FAN
-
Publication number: 20170317944Abstract: Embodiments of the present invention are directed to systems and methods for queuing and sending messages to recipients according to historical latency values associated with each recipient. In some embodiments, a plurality of messages are received, each message including a network address of a recipient. The messages are sent to the recipients by threads that remain active (i.e., cannot be used to send another message) until confirmation responses are received from the recipients. Latency times are measured between when the messages were sent and when the confirmation responses were received. The latency times may be used to assign future messages to queues designated by certain latency ranges.Type: ApplicationFiled: May 2, 2016Publication date: November 2, 2017Inventors: Rhidian John, Thomas Looney, Bartlomiej Prokop
-
Publication number: 20170317945Abstract: Methods and systems of managing a resource in a distributed resource management system can include: receiving a resource request including data identifying at least one requested resource attribute; identifying one or more candidate resources from a plurality of resources by performing element-wise operations on one or more resource attribute element sets corresponding to the at least one requested resource attribute, each resource attribute element set comprising an element for each of the plurality of resources, each element representing a resource attribute for a respective resource of the plurality of resources; and scheduling a workload associated with the resource request for execution based on the one or more identified candidate resources.Type: ApplicationFiled: April 29, 2016Publication date: November 2, 2017Inventors: Lei GUO, Chong CHEN, Xiaodi KE, Jason T.S. LAM
-
Publication number: 20170317946Abstract: In an approach for converging a cloud computing environment and a mobile device into an integrated environment, a processor receives a request to complete a computing task on a first device. A processor identifies capabilities of the first device. A processor monitors resource utilization on the first device. A processor determines that the computing task should be offloaded based, at least in part, on the capabilities of the first device and resource utilization on the first device. A processor offloads the computing task. A processor receives a result of the computing task.Type: ApplicationFiled: April 29, 2016Publication date: November 2, 2017Inventors: Pei Xing Ji, Xue Ling Mi, Yun Qi Li, Yan Lu, Xiang Zhou, Jin Fan Zhu
-
Publication number: 20170317947Abstract: Embodiments of the disclosure provide techniques for partitioning a resource object into multiple resource components of a cluster of host computer nodes in a distributed resources system. The distributed resources system translates high-level policy requirements into a resource configuration that the system accommodates. The system determines an allocation based on the policy requirements and identifies resource configurations that are available. Upon selecting a resource configuration, the distributed resources system assigns the allocation and associated values to the selected configuration and publishes the new configuration to other host computer nodes in the cluster.Type: ApplicationFiled: August 26, 2014Publication date: November 2, 2017Inventors: Christos KARAMANOLIS, William EARL, Eric KNAUFT, Pascal RENAULD
-
Publication number: 20170317948Abstract: Hosting one or more web applications and providing local device capabilities to the one or more web applications. One or more second applications are hosted within a first application. A call from the one or more second applications is performed to a device abstraction layer of the first application. Such a performed call comprises a request to access a capability of a local device. Upon receiving the call, the device abstraction layer verifies that the performed call is permitted. In response to the first application verifying that the performed call is permitted, the one or more second applications is permitted to access the capability of the local device that was requested.Type: ApplicationFiled: June 30, 2016Publication date: November 2, 2017Inventors: Faisal Khaled Faisal Ilaiwi, Bryan Thomas Phelps, Yasser Elsayed, Christoph Ponath
-
Publication number: 20170317949Abstract: An intermediary server receives a resource request for a requested resource from a client computer. The intermediary server responds to the resource request by initiating an interactive dialog between the intermediary server and the client computer, where the interactive dialog identifies a desired resource ability of the requested resource. The intermediary server identifies, based on responses to the interactive dialog from the client computer, an alternative resource that best meets the desired resource ability, wherein the requested resource and the alternative resource are a same type of resource, and wherein the interactive dialog uses an interactive exchange that interprets interactive dialog responses from the client computer in order to identify the desired resource ability and the alternative resource that best meets the desired resource ability and then instructs a resource server to send the alternative resource to the client computer.Type: ApplicationFiled: April 29, 2016Publication date: November 2, 2017Inventors: ROTEM AHARONOV, SALIL AHUJA, RAMA K. T. AKKIRAJU, DAVID AMID, ATERET ANABY-TAVOR, JASON M. LEONARD, MITCHELL MASON
-
Publication number: 20170317950Abstract: According to an example, a batch processing system is to determine a cluster of related metrics. A stability of a baseline for a metric in the cluster is determined. A frequency of execution of batch jobs for calculating baselines for metrics is determined based on the stability.Type: ApplicationFiled: April 28, 2016Publication date: November 2, 2017Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Eli REVACH, Gabriel DAYAN, Avihay MOR
-
Publication number: 20170317951Abstract: Embodiments of the apparatus of dynamically renumbering ports relate to a network chip that minimizes the total logic on the network chip by limiting the number of states that needs to be preserved for all ports on the network chip. Each pipe on the network chip implements a dynamic port renumbering scheme that dynamically assigns a relative port number for each port assigned to that pipe. The dynamic port renumbering scheme allows for internal parallelism without increasing the total amount of state space required for the ports on the network chip.Type: ApplicationFiled: July 18, 2017Publication date: November 2, 2017Inventors: Vishal Anand, Vamsi Panchagnula
-
Publication number: 20170317952Abstract: Example embodiments provide apparatus, systems and methods to optimise a multicasting operation used to transmit data packets in a communication network.Type: ApplicationFiled: April 20, 2017Publication date: November 2, 2017Inventor: Simo Mikael SILLANKORVA
-
Publication number: 20170317953Abstract: Systems and methods for dynamic adjustment of a connection's priority in a network include configuring the connection with a dynamic priority and setting a current priority based on one or more factors, wherein the connection is a Layer 0 connection, a Layer 1 connection, and a combination thereof; detecting an event in the network requiring a change to the current priority, wherein the event changes the one or more factors; and causing a change in the current priority of the connection based on the event.Type: ApplicationFiled: November 16, 2016Publication date: November 2, 2017Inventors: Jatin SAREEN, Darek SKALECKI, Gerard L. SWINKELS
-
Publication number: 20170317954Abstract: Some embodiments provide a method or tool for automatically configuring a logical router on one or more edge nodes of an edge cluster (e.g., in a hosting system such as a datacenter). The method of some embodiments configures the logical router on the edge nodes based on a configuration policy that dictates the selection method of the edge nodes. In some embodiments, an edge cluster includes several edge nodes (e.g., gateway machines), through which one or more logical networks connect to external networks (e.g., external logical and/or physical networks). In some embodiments, the configured logical router connects a logical network to an external network through the edge nodes.Type: ApplicationFiled: January 30, 2017Publication date: November 2, 2017Inventors: Uday Masurekar, Abhishek Goliya, Minjal Agarwal
-
Publication number: 20170317955Abstract: Embodiments of the disclosure provide methods and devices for providing user information in an instant messaging application.Type: ApplicationFiled: October 10, 2015Publication date: November 2, 2017Inventor: Shuyan LIU
-
Publication number: 20170317956Abstract: A system and method for collecting and transmitting messages to the deceased.Type: ApplicationFiled: May 2, 2016Publication date: November 2, 2017Inventor: Richard D. Yelvington
-
Publication number: 20170317957Abstract: A computer identifies a first participant and a one or more additional participants associated with a collaboration through an electronic communication application that includes messaging content, identifies a first set of one or more keywords within the messaging content between the first participant and the one or more additional participants, retrieves a first set of historical information based at least in part on the first set of one or more keywords, the first participant and the one or more additional participants, generates a first instance of historical results that includes a multi-dimensional cube that graphs the first set of historical information with respect to the first set of one or more keywords, the first participant and the one or more additional participants, and a time frame, and provides the first instance of historical results to the first participant.Type: ApplicationFiled: July 26, 2017Publication date: November 2, 2017Inventors: Tao Ding, Xue Feng Gao, Ying Wei, Qing Yu, Rui Hua Zhu
-
Publication number: 20170317958Abstract: A multipurpose event invitation comprises an event information space for entering event details and an applied message space. The event invitation is configured to be delivered to the sender after being read and updated by a recipient. In some embodiments event details are entered using an event information input and a personalized message is entered using a message space input. In some embodiments, the event invitation is physically delivered to a recipient. Alternatively or in addition, the event invitation is able to be electronically delivered.Type: ApplicationFiled: April 7, 2017Publication date: November 2, 2017Inventors: Matthew Joy, Rolilyn Joy
-
Publication number: 20170317959Abstract: Various technologies and techniques are disclosed that improve the workflow process for resolving data elements, such as email addresses. These technologies and techniques allow the user to perform such tasks in the same context as the activity or message. In addition, user can start and stop the resolution process at any point in the process of composing the activity or email. The activity cannot be finalized, such as an email message being sent, until all of the data elements are resolved.Type: ApplicationFiled: July 18, 2017Publication date: November 2, 2017Applicant: Microsoft Technology Licensing, LLCInventors: Brendan C. FIELDS, Diana J. SCHWEND, Jorge PEREIRA
-
Publication number: 20170317960Abstract: The present disclosure relates to methods and devices for detecting control commands and present display notifications. In one embodiment, the method includes displaying a user interface for a message application, wherein the user interface is displayed to include a display window configured for graphical representation of received and transmitted messages for a communication session with an active contact, and a contact display element configured for presentation of one or more contact graphical elements. The method also includes detecting, by the device, a message from a second contact and updating, by the device, presentation of the user interface, wherein a contact graphical element associated with the second contact and associated with the contact display element is displayed including a graphical element identifying a number of unread messages received from the second contact.Type: ApplicationFiled: April 28, 2016Publication date: November 2, 2017Applicants: Jamdeo Canada Ltd., Hisense Electric Co., Ltd., Hisense USA CORP., Hisense International Co., Ltd.Inventors: Sanjiv SIRPAL, Saulo DOURADO
-
Publication number: 20170317961Abstract: Disclosed are various examples for communicating notifications for received email messages. A monitoring service monitors inboxes to which clients are subscribed. When a message arrives in a subscribed inbox, the monitoring service sends a notification to a notification brokering service. The notification brokering service then forwards the notification to the appropriate notification service for communication to a subscribed client.Type: ApplicationFiled: July 13, 2017Publication date: November 2, 2017Inventors: Erich Stuntebeck, Sridhara Babu Kommireddy, Evan Hurst
-
Publication number: 20170317962Abstract: A method for delivering messages performed at a server includes: generating a group-sending interface invocation request, and sending the group-sending interface invocation request to an open platform server, where the group-sending interface invocation request carries a to-be-sent message and at least one group identifier, a follower group corresponding to each group identifier includes a user account of at least one follower of a target user account, the target user account is a user account that a service provider applies for to the social networking application, the group-sending interface invocation request is used to invoke a message group-sending interface provided by the open platform server, and the message group-sending interface is configured to send a message to a client terminal corresponding to a user account in a follower group corresponding to each of the at least one group identifier.Type: ApplicationFiled: June 21, 2017Publication date: November 2, 2017Inventor: Hao CHEN
-
Publication number: 20170317963Abstract: This disclosure relates to systems and methods that include configuring a machine learning system to train on a plurality of messages, solving, for a set of input messages, a multi-objective optimization problem to minimize a number of messages to send while satisfying one or more constraints, selecting a random value for one or more message and message recipient pairs in the set of input messages, setting a send constraint for one or more of the pairs using a send threshold for the message in the set and the random value, and sending the message to a recipient for the message in the set in response to the send constraint for the pair being satisfied.Type: ApplicationFiled: April 27, 2016Publication date: November 2, 2017Inventors: Rupesh Gupta, Guanfeng Liang, Hsiao-Ping Tseng, Ravi Kiran Holur Vijay, Romer E. Rosales
-
Publication number: 20170317964Abstract: A social networking system receives from a member an item for sharing on the social networking system. The system determines whether the item for sharing is a first sharing for the member or whether the member has not shared an item for a time period that transgresses a threshold. When the item for sharing is a first sharing or a sharing that transgresses the threshold, the system marks the item for a promotion in a feed of another member of the social networking system.Type: ApplicationFiled: April 28, 2016Publication date: November 2, 2017Inventors: Bee-Chung Chen, Guangde Chen, Deepak Agarwal
-
Publication number: 20170317965Abstract: A call handling platform receives a call placed by a caller to a calling number. The platform examines parameters of the call, determines identifying information of the caller and matches the identifying information with a social network username corresponding to a social media network. The platform obtains the caller's social network data from the social media network. Using the social network data, the platform computes a social network influence score for the caller. The platform compares the social network influence score to a predetermined influence score threshold value and determines that the social network influence score for the caller indicates that the activity of the caller in the social media network has a high level of impact. The platform accordingly selects a first human agent at a call center and routes the call to the first human agent at the call center.Type: ApplicationFiled: July 17, 2017Publication date: November 2, 2017Inventors: Pawel Harasimiuk, Aaron Wellman, Lindsay Frazier, Praphul Kumar
-
Publication number: 20170317966Abstract: A social networking system allows a user to insert media information into content posted by the user, where the media information identifies a media item that the user is consuming while composing the posted content. When a user of a social networking system composes content via a composer interface, the user may select an option on the composer interface to record audio using a microphone on the user's device. A media item is identified from the recorded audio and information about the identified media item is added to the user's posted content. The system may also update information about the identified media item and the composing user.Type: ApplicationFiled: July 18, 2017Publication date: November 2, 2017Inventors: Justin Alexander Shaffer, Robert Taaffe Lindsay, Sean Michael Bruich
-
Publication number: 20170317967Abstract: Disclosed are a method and device for redirection to a Web page.Type: ApplicationFiled: May 15, 2015Publication date: November 2, 2017Applicant: ZTE CorporationInventor: Shuyang ZHOU
-
Publication number: 20170317968Abstract: Techniques are provided for performing dynamic DNS-SD. In an embodiment, an apparatus includes one or more databases, one or more transceivers to receive a first Domain Name System (DNS) query from a first computing device, the first DNS query defining a first service discovery name space, and one or more processors in communication with each of the one or more databases and the one or more transceivers. The one or more processors generate and append a first metadata associated with the first computing device to the first DNS query. The one or more transceivers transmit the first DNS query and the first metadata to a Domain Name System (DNS) server computer, receive, from the DNS server computer, a first response responsive to the first DNS query, and relay, to the first computing device, the first response.Type: ApplicationFiled: July 17, 2017Publication date: November 2, 2017Inventors: Ralph Droms, Timothy P. Donahue
-
Publication number: 20170317969Abstract: Some embodiments provide a method for providing dynamic host configuration protocol (DHCP) services to different data compute nodes (e.g., virtual machines) that belong to different logical networks (e.g., for different tenants in a datacenter). In some embodiments, the method inserts a logical network identifier (LNI) value to each DHCP packet and forwards the packet to a DHCP server module for processing the DHCP request. Based on the LNI value, the DHCP server of some embodiments identifies the logical network from which the DHCP packet is received. The DHCP server then provides the requested DHCP service (e.g., assigning an IP address to a data compute node that has originated the DHCP packet, assigning a domain name, etc.) according to a DHCP service configuration for the identified logical network.Type: ApplicationFiled: January 30, 2017Publication date: November 2, 2017Inventors: Uday Masurekar, Jayant Jain, Ronghua Zhang, Mani Kancherla, Minjal Agarwal
-
Publication number: 20170317970Abstract: Methods and systems are described for assigning the proper Internet protocol (IP) address to a client device following authentication of the client device on a network. In particular, at commencement of an authentication procedure of the client device, a role is associated with the client device that denies all DHCP renews/requests. By assigning a role to the client device 103 with a “deny DHCP renew/request” rule at the commencement of an authentication procedure, the systems and methods described herein ensure that a race condition does not allow the client device to renew an IP address in an old segment of the network. Accordingly, the client device may avoid a possibly improper IP address in a segment of the network system in which the client device is no longer associated with or operating on.Type: ApplicationFiled: July 17, 2017Publication date: November 2, 2017Inventors: Brijesh Kumar Yadav, Rajalakshmi Manoharan
-
Publication number: 20170317971Abstract: Some embodiments provide a method for determining a router identifier for a centralized routing component of a logical router. The method determines that a dynamic routing protocol is enabled for the centralized routing component. When a router identifier was previously stored for the centralized routing component, the method assigns the stored router identifier as the router identifier for the centralized routing component only when the stored router identifier matches one of a set of valid addresses for the centralized routing component. When the centralized routing component does not have a previously stored router identifier that matches one of the set of valid addresses, the method assigns one of the set of valid addresses as the router identifier for the centralized routing component according to a hierarchy among the set of valid addresses.Type: ApplicationFiled: May 4, 2016Publication date: November 2, 2017Inventors: Ankur Dubey, Sami Boutros
-
Publication number: 20170317972Abstract: A method of providing a set of network addresses associated with a managed forwarding element (MFE) in a logical network that includes a set of data compute nodes (DCNs). The DCNs are hosted on a set of physical hosts. Each DCN is connected to an MFE on the corresponding host. The method receives a request to translate an MFE into a set of network addresses, the request comprising an identification of the MFE. The method identifies a logical network entity associated with the MFE based on the identification of the MFE. The method identifies a set of network addresses associated with the identified network entity and provides the set of network addresses as the set of network addresses associated with the identified network entity.Type: ApplicationFiled: January 31, 2017Publication date: November 2, 2017Inventors: Kaushal Bansal, Uday Masurekar
-
Publication number: 20170317973Abstract: A method for providing a verification process for verifying eligibility of a domain name registrant via a verification web interface for a domain name either registered or in the process of registration with a registrar over a communications network.Type: ApplicationFiled: April 28, 2016Publication date: November 2, 2017Inventors: Jimmy Lam, Cedarampattu Mohan, John Kane, Christy Gnanapragasam, Calvin Cheung, Hui Zhou
-
Publication number: 20170317974Abstract: Some embodiments provide a method for providing metadata proxy services to different data compute nodes that are associated with different logical networks (e.g., for different tenants of a datacenter). When a data compute node (DCN) is instantiated (i.e., starts executing) in a host machine, the DCN requests for metadata associated with the DCN from a metadata server. The requested metadata includes identification and configuration data (e.g., name and description, amount of virtual memory, number of allocated virtual CPUs, etc.) for the DCN. Each DCN generates and sends out a metadata request packet after an IP address is assigned to the DCN (e.g., by a DHCP server). In some embodiments, a metadata proxy server (1) receives the metadata request packets that are sent by different DCNs associated with different logical networks, (2) adds logical network identification data to the packets, and (3) forwards the packets to a metadata server.Type: ApplicationFiled: January 30, 2017Publication date: November 2, 2017Inventors: Uday Masurekar, Jayant Jain, Ronghua Zhang, Mani Kancherla, Minjal Agarwal
-
Publication number: 20170317975Abstract: Systems and methods for secure communications over broadband datalinks are provided. In certain implementations, a system for providing secure communications through a communication link includes a first communication unit that includes a processing unit that is configured to execute code that causes the first communication unit to verify messages with a firewall as they are received by the first communication unit; remove encapsulation data that encapsulates a message received from a second communication unit; check a digital signature appended to the message received from a second communication unit through a non-secure communication link; perform an integrity check on the message; and when the message is verified through the digital signature and the integrity check, process the message; wherein removal of the encapsulation data and implementation of the firewall is in a first partition and performance of the integrity check and verification of the digital signature is in a second partition.Type: ApplicationFiled: April 26, 2017Publication date: November 2, 2017Inventors: Michael L. Olive, Daniel P. Johnson, Thomas D. Judd
-
Publication number: 20170317976Abstract: Some embodiments provide a method for a network controller that manages a flow-based managed forwarding element (MFE). The method receives multiple sets of service rules for implementation by the MFE. The sets of service rules have a priority order and the rules in each set of service rules have separate priority orders. The method organizes the service rules in all of the sets of service rules into a single ordered list of service rules. The method assigns priority values within a space-constrained set of priority values to the service rules in the list in a manner designed to minimize re-assignment when changes to the sets of service rules are received. The method uses the assigned priority values to generate flow entries for the MFE to use to implement the service rules.Type: ApplicationFiled: April 29, 2016Publication date: November 2, 2017Inventors: Anuprem Chalvadi, Natasha Gude
-
Publication number: 20170317977Abstract: A novel method for managing firewall configuration of a software defined data center is provided. Such a firewall configuration is divided into multiple sections that each contains a set of firewall rules. Each tenant of the software defined data center has a corresponding set of sections in the firewall configuration. The method allows each tenant to independently access and update/manage its own corresponding set of sections. Multiple tenants or users are allowed to make changes to the firewall configuration simultaneously.Type: ApplicationFiled: June 29, 2016Publication date: November 2, 2017Inventors: Radha Popuri, Igor Ganichev, Shadab Shah, Kaushal Bansal
-
Publication number: 20170317978Abstract: Techniques for isolating interfaces of a protocol stack are discussed herein. In some instances, an apparatus may store a firewall policy that defines a set of rules for a component or type of component of a layer of a protocol stack, such as an Internet Protocol (IP) interface(s), an IP address(es), a TCP port(s), a socket(s), an application(s), a virtual network interface(s), an interface associated with a Virtual Private Network (VPN), and so on. The apparatus may include a firewall configured to implement the firewall policy at the layer of the protocol stack when data traffic is received at the layer. In some instances, the apparatus may include a monitor module to determine environmental context associated with the device, such as a geo-location of the apparatus or a connection of the apparatus to a network. The firewall may select a firewall policy that is applicable to the environmental context.Type: ApplicationFiled: June 30, 2016Publication date: November 2, 2017Inventors: Gerardo Diaz-Cuellar, Aman Arneja, Benjamin M. Schultz
-
Publication number: 20170317979Abstract: A novel method for distributing firewall configuration of a software defined data center is provided. The network manager of the data center receives update requests from tenants of the data center and correspondingly generates update fragments and delivers the generated update fragment to local control planes controlling the enforcing devices. Each local control plane in turn integrates the update fragments it receives into its firewall rules table. For each rule and/or section thusly integrated, the local control plane uses the rule or the section's assigned priority number to establish ordering in the firewall rules table of the local control plane.Type: ApplicationFiled: January 31, 2017Publication date: November 2, 2017Inventors: Kaushal Bansal, Uday Masurekar, Subrahmanyam Manuguri, Jingmin Zhou, Shadab Shah, Igor Ganichev
-
Publication number: 20170317980Abstract: An information processing device that can communicate with an external device includes a controller for controlling the information processing device, and a network interface for communicating data with the external device via a network. The network interface performs proxy response for responding to specific data received from the external device via the network to the external device without the controller. The network interface includes a storage unit for storing system status information indicating a power state of the information processing device and determines whether or not to perform the proxy response on the basis of the system status information stored in the storage unit.Type: ApplicationFiled: April 24, 2017Publication date: November 2, 2017Inventor: Yasuhiro Kozuka