-
公开(公告)号:US10686669B2
公开(公告)日:2020-06-16
申请号:US15663582
申请日:2017-07-28
Applicant: Cisco Technology, Inc.
Inventor: Chandra Nagarajan , Divjyot Sethi , Ramana Rao Kompella
Abstract: Systems, methods, and computer-readable media for collecting node information from a fabric and generating models based on the node information. In some examples, a system can obtain, from one or more controllers in a software-defined network (SDN), a logical model of the SDN, the logical model containing objects configured for the SDN from a hierarchical management information tree (MIT) associated with the SDN and representing configurations of the objects, the hierarchical MIT defining manageable objects and object properties for the SDN, the objects corresponding to the manageable objects. The system can obtain a topological model of a fabric associated with the SDN and, based on the topological model, poll nodes in the fabric for respective configurations at the nodes. Based on the respective configurations, the system can generate a node-specific representation of the logical model, the node-specific representation projecting the logical model on each node.
-
公开(公告)号:US20200036593A1
公开(公告)日:2020-01-30
申请号:US16046798
申请日:2018-07-26
Applicant: Cisco Technology, Inc.
Inventor: Divjyot Sethi , Chandra Nagarajan
IPC: H04L12/24
Abstract: Systems, methods, and computer-readable media for determining a deployment model for deploying rules in a network environment in response to deployment of a contract into the network environment. In some embodiments, a method can include deploying a contract into a network environment. One or more candidate deployment configuration variables can be selected and policy configurations for deploying rules in the network environment as part of implementing policies using the contract can be determined based on the one or more candidate deployment configuration variables. Rule configuration states corresponding to the policy configuration states in the network environment can be identified based on deployment of the one or more contracts in the network environment. Subsequently, a deployment model for implementing the one or more policies in the network environment can be formed based on the policy configurations and the rule configuration states corresponding to the policy configurations.
-
公开(公告)号:US20190222485A1
公开(公告)日:2019-07-18
申请号:US15873204
申请日:2018-01-17
Applicant: Cisco Technology, Inc.
Inventor: Divjyot Sethi , Chandra Nagarajan , Advait Dixit , John Thomas Monk , Gabriel Cheukbun Ng , Ramana Rao Kompella , Sundar Iyer
CPC classification number: H04L41/145 , G06F9/45533 , H04L43/50 , H04W24/04 , H04W24/06
Abstract: Systems, methods, and computer-readable media for emulating a state of a network environment for purposes of re-executing a network assurance appliance in the emulated state of the network environment. In some embodiments, a method can include receiving snapshot data for a network environment corresponding to a specific time in the network environment and including network events occurring in the network environment generated by a network assurance appliance. A state of the network environment at the specific time can be emulated using the snapshot data to create an emulated state of the network environment. Subsequently, the network assurance appliance can be re-executed in the emulated state of the network environment corresponding to the specific time and the network assurance appliance can be debugged outside of the network environment based on re-execution of the network assurance appliance in the emulated state of the network environment.
-
公开(公告)号:US11824728B2
公开(公告)日:2023-11-21
申请号:US17112854
申请日:2020-12-04
Applicant: Cisco Technology, Inc.
Inventor: Divjyot Sethi , Chandra Nagarajan , Advait Dixit , John Thomas Monk , Gabriel Cheukbun Ng , Ramana Rao Kompella , Sundar Iyer
CPC classification number: H04L41/145 , H04L41/5019 , H04W24/04 , H04W24/06 , G06F9/45533 , H04L43/50 , H04L43/55
Abstract: Systems, methods, and computer-readable media for emulating a state of a network environment for purposes of re-executing a network assurance appliance in the emulated state of the network environment. In some embodiments, a method can include receiving snapshot data for a network environment corresponding to a specific time in the network environment and including network events occurring in the network environment generated by a network assurance appliance. A state of the network environment at the specific time can be emulated using the snapshot data to create an emulated state of the network environment. Subsequently, the network assurance appliance can be re-executed in the emulated state of the network environment corresponding to the specific time and the network assurance appliance can be debugged outside of the network environment based on re-execution of the network assurance appliance in the emulated state of the network environment.
-
公开(公告)号:US11019027B2
公开(公告)日:2021-05-25
申请号:US16171771
申请日:2018-10-26
Applicant: Cisco Technology, Inc.
Inventor: Vivek Balamurugan , Chandra Nagarajan , Divjyot Sethi , Chaitanya Velpula , Manvesh Vyas , Ramana Rao Kompella , Pradhap Muthuraman
IPC: H04L29/12 , H04L12/715 , H04L12/743 , H04L12/24 , H04L12/46 , H04L29/06 , G06F9/455
Abstract: Systems, methods, and computer-readable media relate to providing a network management service. A system is configured to request first network information from a first component of a network using a public IP address for the first component, wherein the first network information includes private IP addresses for a second component in the network and translate, based on a mapping information for a private IP address space to a public IP address space, the private IP address for a second component to a public IP address for the second component. The system is further configured to request second network information from the second component using the public IP address and provide a network management service for the network based on the second network information.
-
公开(公告)号:US20210092023A1
公开(公告)日:2021-03-25
申请号:US17112854
申请日:2020-12-04
Applicant: Cisco Technology, Inc.
Inventor: Divjyot Sethi , Chandra Nagarajan , Advait Dixit , John Thomas Monk , Gabriel Cheukbun Ng , Ramana Rao Kompella , Sundar Iyer
Abstract: Systems, methods, and computer-readable media for emulating a state of a network environment for purposes of re-executing a network assurance appliance in the emulated state of the network environment. In some embodiments, a method can include receiving snapshot data for a network environment corresponding to a specific time in the network environment and including network events occurring in the network environment generated by a network assurance appliance. A state of the network environment at the specific time can be emulated using the snapshot data to create an emulated state of the network environment. Subsequently, the network assurance appliance can be re-executed in the emulated state of the network environment corresponding to the specific time and the network assurance appliance can be debugged outside of the network environment based on re-execution of the network assurance appliance in the emulated state of the network environment.
-
公开(公告)号:US10826770B2
公开(公告)日:2020-11-03
申请号:US16046798
申请日:2018-07-26
Applicant: Cisco Technology, Inc.
Inventor: Divjyot Sethi , Chandra Nagarajan
Abstract: Systems, methods, and computer-readable media for determining a deployment model for deploying rules in a network environment in response to deployment of a contract into the network environment. In some embodiments, a method can include deploying a contract into a network environment. One or more candidate deployment configuration variables can be selected and policy configurations for deploying rules in the network environment as part of implementing policies using the contract can be determined based on the one or more candidate deployment configuration variables. Rule configuration states corresponding to the policy configuration states in the network environment can be identified based on deployment of the one or more contracts in the network environment. Subsequently, a deployment model for implementing the one or more policies in the network environment can be formed based on the policy configurations and the rule configuration states corresponding to the policy configurations.
-
公开(公告)号:US10574513B2
公开(公告)日:2020-02-25
申请号:US15794111
申请日:2017-10-26
Applicant: Cisco Technology, Inc.
Inventor: Chandra Nagarajan , Divjyot Sethi , Ramana Rao Kompella
Abstract: Systems, methods, and computer-readable media for handling failure scenarios during data collection and analysis for assurance. In some examples, a system can obtain a logical model of a network and, based on the logical model, identify a plurality of controllers on the network and a plurality of nodes on a fabric of the network. The system can probe the plurality of controllers and plurality of nodes for respective status information, including respective reachability information, respective login diagnostics information, and/or respective software information. Based on the respective status information, the system can determine conditions at the plurality of controllers and the plurality of nodes and define one or more assurance operations based on the conditions at the plurality of controllers and the plurality of nodes. The system can then perform the one or more assurance operations.
-
公开(公告)号:US20180367371A1
公开(公告)日:2018-12-20
申请号:US15794111
申请日:2017-10-26
Applicant: Cisco Technology, Inc.
Inventor: Chandra Nagarajan , Divjyot Sethi , Ramana Rao Kompella
Abstract: Systems, methods, and computer-readable media for handling failure scenarios during data collection and analysis for assurance. In some examples, a system can obtain a logical model of a network and, based on the logical model, identify a plurality of controllers on the network and a plurality of nodes on a fabric of the network. The system can probe the plurality of controllers and plurality of nodes for respective status information, including respective reachability information, respective login diagnostics information, and/or respective software information. Based on the respective status information, the system can determine conditions at the plurality of controllers and the plurality of nodes and define one or more assurance operations based on the conditions at the plurality of controllers and the plurality of nodes. The system can then perform the one or more assurance operations.
-
-
-
-
-
-
-
-