Abstract:
In one embodiment, a gateway device receives, from a centralized broker device, a data-access policy for a given computer network, the data-access policy defining which of one or more accessing entities are granted access to specific elements of data within the given computer network. When the gateway device then receives, from a particular accessing entity, a request for one or more particular elements of data from within the given computer network, it may determine, based on the data-access policy, whether the particular accessing entity has been granted access to each of the one or more particular elements of data of the request. As such, the gateway device may prevent access for the particular accessing entity to any of the one or more particular elements of the data request to which the particular accessing entity has not been granted access.
Abstract:
Techniques are presented herein for enabling performance monitoring of flows within a management and provisioning tunnel used for communicating packets between a wireless controller and wireless access point devices. A wireless controller that is configured to communicate with at least one wireless access point obtains a packet to be sent to the wireless access point for wireless transmission in a wireless network by the wireless access point. The wireless controller identifies, based on the packet, traffic session flow information associated with the packet. The wireless controller encapsulates the packet with a tunneling header that comprises the traffic session flow information and sends the encapsulated packet to the wireless access point. The tunneling header may also comprise an application identifier (ID) associated with the packet.
Abstract:
In an example embodiment, a method for selecting a communication path is provided. The method may comprise receiving data encapsulated in a transport protocol. In addition, a classification type and exit path information associated with the classification type may be received. The data is associated with the classification type and then is encapsulated in Stream Control Transmission Protocol (SCTP) based on the exit path information. This exit path information is associated with the classification type that is associated with the data.
Abstract:
In one embodiment, a supervisory device in a network, configured to interact with one or more sensors positioned in a given area and with a conference room scheduling service, obtains an acoustic feature of the area from one or more of the sensors. The supervisory device makes a determination that a conference room should be reserved based on the acoustic feature and selects a particular conference room based on the determination that a conference room should be reserved. The supervisory device instructs a conference room scheduling service to reserve the particular conference room.
Abstract:
In one embodiment, a gateway device receives, from a centralized broker device, a data-access policy for a given computer network, the data-access policy defining which of one or more accessing entities are granted access to specific elements of data within the given computer network. When the gateway device then receives, from a particular accessing entity, a request for one or more particular elements of data from within the given computer network, it may determine, based on the data-access policy, whether the particular accessing entity has been granted access to each of the one or more particular elements of data of the request. As such, the gateway device may prevent access for the particular accessing entity to any of the one or more particular elements of the data request to which the particular accessing entity has not been granted access.
Abstract:
The present disclosure describes methods and systems for providing and enforcing scalable federated policies for network-provided flow-based performance metrics. Due to different security concerns related to different domains, varying group policies can be applied to different domains to ensure proper sharing and receipt of flow-based performance metrics. Some policies can limit the type of performance metric being shared among the nodes in the domain. Some policies allow less information to be exposed by specifying aggregated performance metrics to be shared among the nodes in the domain. A group key management infrastructure can be provided to enforce these group policies in the network in a scalable manner.
Abstract:
The present disclosure describes a technique for performing performance monitoring of service chains. Variations on performance monitoring can include: passive monitoring, active monitoring, or hybrid monitoring. To provide performance monitoring, the Network Service Header (NSH) is modified to include telemetry information usable for monitoring the performance of a particular traffic flow being transported over a service path.