CONVERSATIONAL ASSISTANT DIALOG DESIGN
    61.
    发明公开

    公开(公告)号:US20230231776A1

    公开(公告)日:2023-07-20

    申请号:US18057019

    申请日:2022-11-18

    CPC classification number: H04L41/22

    Abstract: A network management system (NMS) comprises one or more processors coupled to memory. The one or more processors of are configured to determine a list of network devices from the plurality of network devices based on an entity type and determine a suggested filter attribute based on the list of network devices and one or more of a user profile, a current state of the plurality of network devices, or a current state of the networking services. The one or more processors are further configured to output, in a user interface, an indication of the suggested filter attribute and, in response to receiving user input representative of a selection of the indication of the suggested filter attribute, determine a filtered list of network devices from the list of network devices using the suggested filter attribute and output, in the user interface, an indication of the filtered list of network devices.

    APPLICATION RECORDS USING SESSION INFORMATION

    公开(公告)号:US20230128098A1

    公开(公告)日:2023-04-27

    申请号:US17452344

    申请日:2021-10-26

    Abstract: Techniques are disclosed for the identification of applications from communication sessions of network traffic between client devices and the generation of application-specific metrics for network traffic associated with the applications. In one example, a router obtains metrics for a plurality of packets. The router determines a session of a plurality of sessions associated with each packet. For each determined session, the router generates metrics for the session from the metrics of the packets associated with the session and determines an application of a plurality of applications associated with the session. For each determined application, the router generates metrics for the application from the metrics of the sessions associated with the application and transmits, to a device, the metrics for the application. In some examples, the router generates the metrics for each application on a per-client, per-next-hop, or per-traffic class basis.

    IDENTIFYING ROOT CAUSE OF FAILURES THROUGH DETECTION OF NETWORK SCOPE FAILURES

    公开(公告)号:US20230069434A1

    公开(公告)日:2023-03-02

    申请号:US17446601

    申请日:2021-08-31

    Abstract: Techniques are described by which a network management system (NMS) is configured to provide identification of root cause failure through the detection of network scope failures. For example, the NMS comprises one or more processors; and a memory comprising instructions that when executed by the one or more processors cause the one or more processors to: generate a hierarchical attribution graph comprising attributes representing different network scopes at different hierarchical levels; receive network event data, wherein the network event data is indicative of operational behavior of the network, including one or more of successful events or one or more failure events associated with one or more client devices; and apply a machine learning model to the network event data and to a particular network scope in the hierarchical attribution graph to detect whether the particular network scope has failure.

    ADAPTABLE SOFTWARE DEFINED WIDE AREA NETWORK APPLICATION-SPECIFIC PROBING

    公开(公告)号:US20230012609A1

    公开(公告)日:2023-01-19

    申请号:US17377078

    申请日:2021-07-15

    Abstract: Systems, devices and techniques for an adaptive application-specific probing scheme are disclosed. An example network device includes memory configured to store a network address and probe protocol usable for probing a first network device associated with a source of an application, and one or more processors configured to determine a network address and probe protocol usable for probing the first network device, wherein the first network device comprises a server that is responsive to the probing, the server executing the application for the data flow, or a closest network device, to the server, that is responsive to the probing. The one or more processors are also configured to send to a second network device at a location serviced by the application, a message specifying the network address and probe protocol usable for probing the first network device.

    DETECTING VLAN MISCONFIGURATION
    67.
    发明申请

    公开(公告)号:US20220321379A1

    公开(公告)日:2022-10-06

    申请号:US17808226

    申请日:2022-06-22

    Inventor: Jisheng Wang

    Abstract: Disclosed are methods for detecting misconfigured VLANs. In some embodiments, traffic on a VLAN across multiple access points is categorized. Traffic on the VLAN at a single access point is then also categorized. The categorization of the VLAN traffic at the single access point can be in response to, for example, communication errors or other conditions. The two categorizations are then compared to determine if the VLAN traffic at the AP is consistent with the VLAN traffic across a network (e.g., an enterprise network). If the VLAN traffic at the AP is generally consistent with that across the network, this may indicate that a downstream network component, such as a switch or router, is misconfigured. Thus, some embodiments programmatically reconfigure the downstream component to forward traffic for the VLAN.

    Detecting VLAN misconfiguration
    68.
    发明授权

    公开(公告)号:US11388022B2

    公开(公告)日:2022-07-12

    申请号:US16782568

    申请日:2020-02-05

    Inventor: Jisheng Wang

    Abstract: Disclosed are methods for detecting misconfigured VLANs. In some embodiments, traffic on a VLAN across multiple access points is categorized. Traffic on the VLAN at a single access point is then also categorized. The categorization of the VLAN traffic at the single access point can be in response to, for example, communication errors or other conditions. The two categorizations are then compared to determine if the VLAN traffic at the AP is consistent with the VLAN traffic across a network (e.g., an enterprise network). If the VLAN traffic at the AP is generally consistent with that across the network, this may indicate that a downstream network component, such as a switch or router, is misconfigured. Thus, some embodiments programmatically reconfigure the downstream component to forward traffic for the VLAN.

    LOG ANALYSIS IN VECTOR SPACE
    69.
    发明申请

    公开(公告)号:US20220075679A1

    公开(公告)日:2022-03-10

    申请号:US17448108

    申请日:2021-09-20

    Abstract: The disclosed embodiments provide for identification of a remedial action based on analysis of a system log file. In some example embodiments, messages from the system log file are used as input to generate vectors within a vector space. Portions of the log messages may generate vectors that cluster into a region in the vector space. The region of vector space is associated with one or more remedial actions. The disclosed embodiments are configured, in some example embodiments, to perform the one or more remedial actions when activity in the log file maps to the region of vector space associated with the one or more remedial actions. In some example embodiments, a remedial action can include submitting a problem report to a problem tracking database.

    Log analysis in vector space
    70.
    发明授权

    公开(公告)号:US11138059B2

    公开(公告)日:2021-10-05

    申请号:US16583064

    申请日:2019-09-25

    Abstract: The disclosed embodiments provide for identification of a remedial action based on analysis of a system log file. In some example embodiments, messages from the system log file are used as input to generate vectors within a vector space. Portions of the log messages may generate vectors that cluster into a region in the vector space. The region of vector space is associated with one or more remedial actions. The disclosed embodiments are configured, in some example embodiments, to perform the one or more remedial actions when activity in the log file maps to the region of vector space associated with the one or more remedial actions. In some example embodiments, a remedial action can include submitting a problem report to a problem tracking database.

Patent Agency Ranking