SYSTEMS AND METHODS FOR NETWORK MANAGEMENT
    2.
    发明申请
    SYSTEMS AND METHODS FOR NETWORK MANAGEMENT 有权
    网络管理系统与方法

    公开(公告)号:US20160036636A1

    公开(公告)日:2016-02-04

    申请号:US14813841

    申请日:2015-07-30

    Abstract: Embodiments relate generally to network hardware, network software and methods for network management and testing. In some embodiments, state information (e.g., configuration data, forwarding states, IP tables, rules, network topology information, etc.) can be received from devices in a network. The state information can be parsed and used to generate a network model, which describes how data is processed by the network. Using the model, possible flow paths of data through the network can be identified and used to analyze the network and identify network behavior, such as types of traffic, frequency of rule matches, what kind of transformation occurs as traffic flows through the network, and where the traffic gets dropped, etc. Policies can be verified against the network model to ensure compliance, and in the event of non-compliance, a report or interface can indicate the cause and/or allow a user to explore specific details about the cause.

    Abstract translation: 实施例一般涉及网络硬件,网络软件和用于网络管理和测试的方法。 在一些实施例中,可以从网络中的设备接收状态信息(例如,配置数据,转发状态,IP表,规则,网络拓扑信息等)。 状态信息可以被解析并用于生成一个网络模型,它描述了数据如何被网络处理。 使用该模型,可以识别通过网络的可能的数据流路径,并用于分析网络并识别网络行为,如流量类型,规则匹配频率,流量通过网络发生什么样的转换,以及 流量下降等等。可以根据网络模型验证策略以确保合规性,并且在不合规的情况下,报告或接口可以指示原因和/或允许用户探索关于原因的具体细节 。

    SYSTEMS AND METHODS FOR SCALABLE NETWORK MODELING

    公开(公告)号:US20180115466A1

    公开(公告)日:2018-04-26

    申请号:US15789887

    申请日:2017-10-20

    Abstract: Embodiments of the present invention can use a protocol-independent, vendor-independent, efficient and scalable abstraction model for representing the forwarding functionality of networks. Such a model can be used for systematic analysis and verification of networks. Packet header values may be represented as groups of one or more wildcarded bit strings, where unspecified header values are assumed to be fully wildcarded. This representation can describe many combinations of packets in a space-efficient way, enables more efficient tracing and transformation operations, and can even represent traffic from large internet routing tables efficiently. As a result of the scalability benefits of this more effective way to store and operate on packet collections, network modeling can scale to some of the largest, most complicated networks—those where the benefits are the greatest.

    Systems and methods for scalable network modeling

    公开(公告)号:US10911317B2

    公开(公告)日:2021-02-02

    申请号:US15789887

    申请日:2017-10-20

    Abstract: Embodiments of the present invention can use a protocol-independent, vendor-independent, efficient and scalable abstraction model for representing the forwarding functionality of networks. Such a model can be used for systematic analysis and verification of networks. Packet header values may be represented as groups of one or more wildcarded bit strings, where unspecified header values are assumed to be fully wildcarded. This representation can describe many combinations of packets in a space-efficient way, enables more efficient tracing and transformation operations, and can even represent traffic from large internet routing tables efficiently. As a result of the scalability benefits of this more effective way to store and operate on packet collections, network modeling can scale to some of the largest, most complicated networks—those where the benefits are the greatest.

    Systems and methods for network management

    公开(公告)号:US09929915B2

    公开(公告)日:2018-03-27

    申请号:US14813841

    申请日:2015-07-30

    Abstract: Embodiments relate generally to network hardware, network software and methods for network management and testing. In some embodiments, state information (e.g., configuration data, forwarding states, IP tables, rules, network topology information, etc.) can be received from devices in a network. The state information can be parsed and used to generate a network model, which describes how data is processed by the network. Using the model, possible flow paths of data through the network can be identified and used to analyze the network and identify network behavior, such as types of traffic, frequency of rule matches, what kind of transformation occurs as traffic flows through the network, and where the traffic gets dropped, etc. Policies can be verified against the network model to ensure compliance, and in the event of non-compliance, a report or interface can indicate the cause and/or allow a user to explore specific details about the cause.

Patent Agency Ranking