Abstract:
An example method includes detecting, using sensors, packets throughout a datacenter. The sensors can then send packet logs to various collectors which can then identify and summarize data flows in the datacenter. The collectors can then send flow logs to an analytics module which can identify the status of the datacenter and detect an attack.
Abstract:
In one embodiment, a method includes selecting a first video encoding task of the plurality of video encoding tasks, the first video encoding task having a first dependency upon a second video encoding task of the plurality of video encoding tasks. The method includes determining whether to break the first dependency and performing the first video encoding task based on the determination of whether to break the first dependency.
Abstract:
In one embodiment, a method includes receiving network data at an analytics device, identifying features for the network data at the analytics device, grouping each of the features into bins of varying width at the analytics device, the bins comprising bin boundaries selected based on a probability that data within each of the bins follows a discrete uniform distribution, and utilizing the binned features for anomaly detection. An apparatus and logic are also disclosed herein.
Abstract:
Previously available network monitoring and management systems fail to provide an indication about how uplink traffic is handled at or beyond the network access point. By contrast, various implementations disclosed herein provide uplink performance monitoring and management from a client device, which is located on one side of an access point, to a destination that is located on the other side of the access point. For example, in some implementations, a method of uplink performance management is provided that includes transmitting a plurality of uplink test packets from a client device, determining a response to the transmission of the plurality of uplink test packets through the network access point, and generating one or more uplink performance values according to the determined response, the one or more uplink performance values characterizing how uplink traffic is handled between the client device and the destination both to and beyond the network access point.
Abstract:
Embodiments include receiving configuration information including a match criterion for packets received at a network device in a network and a pool of layer 3 addresses associated with a set of servers in the network, resolving layer 2 destination addresses based on the layer 3 addresses of the servers, and programming a hardware layer of the network device based, at least in part, on the match criterion, the pool of layer 3 addresses, and the layer 2 destination addresses. Specific embodiments include configuring a policy to indicate that packets from an external source are to be forwarded to a server of the set of servers. Further embodiments include receiving a packet at the network device, and matching the packet to the pool of layer 3 addresses and the resolved layer 2 addresses based, at least in part, on the match criterion programmed in the hardware layer.
Abstract:
In an example, there is disclosed a network apparatus, comprising: one or more logic elements, including at least one hardware logic element, to provide a network manager engine to: provide a switched fabric management function; communicatively couple to at least one network switch, the network switch configured to provide optional native hardware-based load balancing; monitor one or more load balancing factors; and at least partly responsive to the one or more load balancing factors, configure native hardware-based load balancing on the at least one network switch.
Abstract:
In one embodiment a system and method is described, fee system and method including a Power Source Equipment (PSE) configured to provide a Powered Device (PD) with a first voltage polarity for power over Ethernet (PoE), the PSE comprising a control module which detects an indication from the PD indicating successful power up of the PD, a PSE voltage generator which continues to send PoE having voltage with the first voltage polarity in response to the PD successfully powering up, the PSE control module being operative to reverse the voltage polarity set by the PSE to be sent to the PD from the first voltage polarity to a second voltage polarity in response to no indication from the PD, thereby indicating a failure of the PD to power up., and the PSE voltage generator being operative to continue to send PoE having voltage w ith the second voltage polarity in response to the PD successfully powering up. Related methods, systems, and apparatus are also described.
Abstract:
In one embodiment, a system comprises a processor to retrieve a first data element including a value X 0 and Y 0 , provide a hash function for use with a hash table having buckets, the hash function having a first and second input that in combination map to one of the buckets wherein the first input is in a range of X- values having X-value sub-ranges, the second input is in a range of Y-values having Y-value sub-ranges, different combinations of the X-value sub-ranges and the Y- value sub-ranges map using the hash function to different buckets, and input the value X 0 and Y 0 into the hash function yielding an output which is indicative of a first bucket of the hash-table. Related apparatus and methods are also described.
Abstract:
A cage within a communication module may have a plurality of receptacles. A cover may cover at least a portion of the cage. A thermal conduction system may include a top wrap, a first side wrap, and a second side wrap. The top wrap may comprise a top wrap top portion covering at least a portion of the cover top side and a top wrap back portion covering at least a portion of the cover back side. The first side wrap may comprise a first side wrap back portion covering at least a portion of the top wrap back portion, a first side wrap side portion covering at least a portion of the cover first side, and first side fingers extending through a first slit in the cover into the cage. A heat sink may be attached to the first side wrap back portion.
Abstract:
Systems and methods for detecting anomalies in network traffic and providing notification to the users of the computers that generated the network traffic for confirmation of the activities that resulted in the network traffic are described herein. According to particular embodiments, the system is configured to collect data regarding network activity (e.g., via sensors), generate inquiries to users regarding that activity, receive the user's response to those inquiries, and provide the user's response along with the network activity to a security analyst.