会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明申请
    • Automated controlling of host over network
    • 通过网络自动控制主机
    • US20130346968A1
    • 2013-12-26
    • US13530064
    • 2012-06-21
    • Yousef A. KhalidiDeepak BansalChanghoon KimSrikanth KandulaDavid A. Maltz
    • Yousef A. KhalidiDeepak BansalChanghoon KimSrikanth KandulaDavid A. Maltz
    • G06F15/177G06F9/455G06F21/00
    • G06F8/61G06F9/5072
    • The provisioning of a host computing system by a controller located over a wide area network. The host computing system has power-on code that automatically executes upon powering up, and causes the host to notify the controller of the host address. In a first level of bootstrapping, the controller instructs the host to download a maintenance operating system. The host responds by downloading and installing a maintenance operating system, enabling further bootstrapping. The persistent memory may further have security data, such as a public key, that allows the host computing system to securely identify the source of the download instructions (and subsequent instructions) as originating from the controller. A second level of bootstrapping may accomplish the configuring of the host with a hypervisor and a host agent. A third level of bootstrapping may accomplish the provisioning of virtual machines on the host.
    • 由位于广域网上的控制器提供主计算系统。 主机计算系统具有在上电时自动执行的上电代码,并使主机向控制器通知主机地址。 在第一级自举中,控制器指示主机下载维护操作系统。 主机通过下载和安装维护操作系统进行响应,实现进一步的自举。 持久存储器还可以具有诸如公开密钥的安全数据,其允许主计算系统将源自该控制器的下载指令(和后续指令)的源安全地标识。 第二级引导可以使用管理程序和主机代理完成主机的配置。 第三级引导可以完成主机上虚拟机的配置。
    • 7. 发明申请
    • TRANSPARENT AUTO-DISCOVERY OF NETWORK DEVICES LOGICALLY LOCATED BETWEEN A CLIENT AND SERVER
    • 网络设备的透明自动发现位于客户端和服务器之间
    • US20130013805A1
    • 2013-01-10
    • US13615844
    • 2012-09-14
    • Murari SridharanDeepak BansalEran YarivRonen BarenboimMaxim StepinAlexander Malvsh
    • Murari SridharanDeepak BansalEran YarivRonen BarenboimMaxim StepinAlexander Malvsh
    • G06F15/16
    • H04L69/16H04L69/163
    • Discovery of intermediate network devices is performed using a technique that piggybacks upon the existing standard TCP (Transport Control Protocol) “SACK” (Selective Acknowledgment) option in a SYN/ACK packet so that discovery information may be shared between pair-wise-deployed peer intermediate devices when a TCP/IP connection (Transport Control Protocol/Internet Protocol) is first established between network endpoints using a conventional three-way handshake. Use of the SACK option is combined with another technique which comprises modifying the original 16-bit value of the TCP receive window size to a special arbitrary value to mark a SYN packet as being generated by a first peer device. The marked SYN when received by the second peer device triggers that device's discovery information to be piggybacked in the SACK option of the SYN/ACK packet. The first device then piggybacks its discovery information in the SACK option of the ACK packet which completes the three-way handshake.
    • 使用在SYN / ACK分组中搭载现有标准TCP(传输控制协议)SACK(选择性确认)选项的技术来执行中间网络设备的发现,使得发现信息可以在成对部署的对等中间设备之间共享 当使用传统的三次握手在网络端点之间首先建立TCP / IP连接(传输控制协议/因特网协议)时。 使用SACK选项与另一种技术相结合,其中包括将TCP接收窗口大小的原始16位值修改为特殊任意值,以将SYN分组标记为由第一对等设备生成。 标记的SYN在第二个对等设备接收时触发该设备的发现信息被捎带在SYN / ACK数据包的SACK选项中。 然后,第一个设备在ACK包的SACK选项中搭载其发现信息,完成三次握手。
    • 8. 发明授权
    • Transparent auto-discovery of network devices logically located between a client and server
    • 网络设备的透明自动发现逻辑上位于客户端和服务器之间
    • US08335858B2
    • 2012-12-18
    • US13169071
    • 2011-06-27
    • Murari SridharanDeepak BansalEran YarivRonen BarenboimMaxim StepinAlexander Malvsh
    • Murari SridharanDeepak BansalEran YarivRonen BarenboimMaxim StepinAlexander Malvsh
    • G06F15/16
    • H04L69/16H04L69/163
    • Discovery of intermediate network devices is performed using a technique that piggybacks upon the existing standard TCP (Transport Control Protocol) “SACK” (Selective Acknowledgment) option in a SYN/ACK packet so that discovery information may be shared between pair-wise-deployed peer intermediate devices when a TCP/IP connection (Transport Control Protocol/Internet Protocol) is first established between network endpoints using a conventional three-way handshake. Use of the SACK option is combined with another technique which comprises modifying the original 16-bit value of the TCP receive window size to a special arbitrary value to mark a SYN packet as being generated by a first peer device. The marked SYN when received by the second peer device triggers that device's discovery information to be piggybacked in the SACK option of the SYN/ACK packet. The first device then piggybacks its discovery information in the SACK option of the ACK packet which completes the three-way handshake.
    • 使用在SYN / ACK分组中搭载现有标准TCP(传输控制协议)SACK(选择性确认)选项的技术来执行中间网络设备的发现,使得发现信息可以在成对部署的对等中间设备之间共享 当使用传统的三次握手在网络端点之间首先建立TCP / IP连接(传输控制协议/因特网协议)时。 使用SACK选项与另一种技术相结合,其中包括将TCP接收窗口大小的原始16位值修改为特殊任意值,以将SYN分组标记为由第一对等设备生成。 标记的SYN在第二个对等设备接收时触发该设备的发现信息被捎带在SYN / ACK数据包的SACK选项中。 然后,第一个设备在ACK包的SACK选项中搭载其发现信息,完成三次握手。
    • 9. 发明申请
    • Employing Overlays for Securing Connections Across Networks
    • 采用覆盖网络来保护连接
    • US20110110377A1
    • 2011-05-12
    • US12614007
    • 2009-11-06
    • Hasan AlkhatibDeepak Bansal
    • Hasan AlkhatibDeepak Bansal
    • H04L12/56
    • H04L29/12349H04L45/64H04L61/2507H04L63/0272
    • Computerized methods, systems, and computer-storage media for establishing and managing a virtual network overlay (“overlay”) are provided. The overlay spans between a data center and a private enterprise network and includes endpoints, of a service application, that reside in each location. The service-application endpoints residing in the data center and in the enterprise private network are reachable by data packets at physical IP addresses. Virtual presences of the service-application endpoints are instantiated within the overlay by assigning the service-application endpoints respective virtual IP addresses and maintaining an association between the virtual IP addresses and the physical IP addresses. This association facilitates routing the data packets between the service-application endpoints, based on communications exchanged between their virtual presences within the overlay. Also, the association secures a connection between the service-application endpoints within the overlay that blocks communications from other endpoints without a virtual presence in the overlay.
    • 提供了用于建立和管理虚拟网络覆盖(“覆盖”)的计算机化方法,系统和计算机存储介质。 覆盖层跨越数据中心和私有企业网络,并且包括驻留在每个位置的服务应用程序的端点。 驻留在数据中心和企业专用网络中的服务应用程序端点可以通过物理IP地址的数据包来访问。 通过分配服务应用端点各自的虚拟IP地址并维持虚拟IP地址和物理IP地址之间的关联,在覆盖内实例化服务应用端点的虚拟存在。 该关联有助于在服务应用端点之间基于在它们的虚拟存在之间交换的通信来路由数据分组。 此外,该关联确保覆盖内的服务应用端点之间的连接,其阻止来自其他端点的通信,而无需在覆盖中虚拟存在。
    • 10. 发明申请
    • SYSTEM AND METHOD FOR ECMP LOAD SHARING
    • 用于ECMP负载共享的系统和方法
    • US20110044340A1
    • 2011-02-24
    • US12900279
    • 2010-10-07
    • Deepak BansalYuen Wong
    • Deepak BansalYuen Wong
    • H04L12/56
    • H04L45/00H04L45/24H04L45/7453H04L47/125H04L47/2408
    • A packet classifier and a method for routing a data packet are provided. The packet classifier includes a content addressable memory, a translation table and a parameter memory. The method includes looking up a content addressable memory for a base address into a parameter memory using a header of the data packet. The base address is related to the routes under ECMP for forwarding the data packet. From among these addresses, using multiple headers of the data packet, an adjustment to the base address is computed. The adjustment specifies an actual address to the parameter memory corresponding to a selected route for forwarding the data packet. The parameter memory is then accessed using the actual address to obtain parameter values relevant to the selected route. The data packet is then forwarded according to the parameter values thus obtained.
    • 提供了分组分类器和用于路由数据分组的方法。 分组分类器包括内容可寻址存储器,转换表和参数存储器。 该方法包括使用数据分组的报头查找用于基地址的内容可寻址存储器到参数存储器中。 基地址与ECMP下的路由相关,用于转发数据包。 从这些地址中,使用数据分组的多个头,计算对基地址的调整。 该调整指定与用于转发数据分组的所选择的路由相对应的参数存储器的实际地址。 然后使用实际地址访问参数存储器,以获得与所选路线相关的参数值。 然后根据如此获得的参数值转发数据包。