Abstract:
A system and a method to dynamically reprovision network devices may include a first network device configured to reprovision a second network device in accordance with a specific location of the second network device in a predefined area. The first network device may be configured to sense the second device at the specific location in the predefined area, identify reprovisioning parameters associated with the specific location, and provide the reprovisioning parameters to the second network device. In turn, the second network device may be configured to perform one or more roles associated with the specific location in the predefined area based at least in part upon information in the reprovisioning parameters.
Abstract:
A system and a method to dynamically reprovision network devices may include a first network device configured to reprovision a second network device in accordance with a specific location of the second network device in a predefined area. The first network device may be configured to sense the second device at the specific location in the predefined area, identify reprovisioning parameters associated with the specific location, and provide the reprovisioning parameters to the second network device. In turn, the second network device may be configured to perform one or more roles associated with the specific location in the predefined area based at least in part upon information in the reprovisioning parameters.
Abstract:
In one embodiment, a mobile system scans wireless channels for any upcoming access points using a dedicated monitor radio of the mobile system. The mobile system identifies a particular wireless channel in use by an upcoming access point. The mobile system notifies a second radio of the mobile system of the particular wireless channel. The mobile system performs a handoff between a current access point and the upcoming access point in part by switching the second radio of the mobile system to the particular wireless channel of the upcoming access point.
Abstract:
In one embodiment, a networking device receives packets of a traffic flow destined for a mobile system. The networking device sends a first flowlet of the traffic flow towards the mobile system via a first wireless access point. The networking device determines an idle time between the first flowlet and a second flowlet of the traffic flow. The networking device sends, based on the idle time, the second flowlet towards the mobile system via a second wireless access point.
Abstract:
The present technology includes calculating the 3-D RF propagation pattern in a space for at least one Wi-Fi access point and displaying a visualization of the RF propagation pattern in augmented reality (AR). The augmented reality view of the space can be created by capturing at least one image of the space and displaying at least one image of the space on a display with the visualization of the Wi-Fi access point RF propagation pattern on the display overlaid at least one image of the space. The disclosed technology further can calculate the RF propagation properties and render a visualization of the RF propagation patterns in a 3D space by utilizing hardware on a user device. The AR display is useful in visualizing, in-person aspects of a Wi-Fi network and coverage, and can be used in troubleshooting, maintenance, and simulations of equipment variations.
Abstract:
The present technology pertains to identifying one or more sub-components of one or more network devices in a network environment; disaggregating the one or more sub-components from corresponding network devices of the one or more network devices; monitoring one or more functional flows across the one or more sub-components on a sub-component basis to generate functional flow data associated with the one or more sub-components; and generating analytics of the network environment on a sub-component basis from the functional flow data.
Abstract:
The present disclosure is directed to systems and methods that enable automatic provisioning of access points within an enterprise network by a controller of the enterprise network. In one aspect, a method includes detecting, at a network controller, attachment of a first access point to a network; identifying, by the network controller, a profile of a second access point, the second access point having being replaced with the first access point, the profile including at least one of identification parameters and configuration parameters of the second access point; and provisioning, by the network controller, the first access point with the profile of the second access point.
Abstract:
In one embodiment, a method includes receiving packets in a flow at a network device in a deterministic network, wherein at least one of the packets is transmitted from a source out of sync due to collision with another flow at the source, analyzing at the network device, the flow to reconstruct a period of the flow, and processing at the network device, the packets according to the period to synchronize the processing of the packets at the network device with the source and remove jitter from the flow. An apparatus and logic are also disclosed herein.
Abstract:
In one embodiment, a method includes sampling text in a received packet at a network device and analyzing the sampled text using a sampled deterministic finite automata (DFA) to identify matches between a set of regular expressions and the text. The sampled DFA is created with the regular expressions sampled at a sampling rate calculated for the regular expressions using operations including selecting a minimum sampling rate from sampling rates computed for each of the regular expressions based on a minimum length of the text that can match the regular expression. An apparatus and logic are also disclosed herein.
Abstract:
In one embodiment, a method includes identifying at a network device, a number of items for matching at a hash table, the number of items exceeding matching available with ternary content addressable memory (TCAM) at the network device, defining at the network device, an optimal cyclic redundancy check (CRC) polynomial based on the number of items for matching at the hash table, and generating at the network device, an optimal hash function based on the optimal CRC polynomial to extend packet classification capability at the network device. An apparatus is also disclosed herein.