摘要:
In one embodiment, an edge network device may monitor a network service that is provided at a network service device. Information related to the monitored network service may be temporarily stored at the edge network device and transmitted to a remote network device. In one embodiment, an administrative device may compare current extracted information with stored historical information to determine if a unique machine identifier of an end user device has been spoofed.
摘要:
A switch comprises a switching module coupled to a plurality of ports. The switching module receives and forwards a plurality of packets through the ports. The switch also comprises a management unit comprising a processor and an agent executable by the processor. The agent causes the processor to monitor each packet received by the switching module and determine whether each such packet contains a predetermined fingerprint. Upon determining that a packet contains the predetermined fingerprint, the processor causes additional information to be included in a copy of the fingerprinted packet and forwarded to a predetermined address. The switching module also forwards the packet containing the predetermined fingerprint, but without the additional information, to an address corresponding to a destination address contained in the packet. A method of programming the switches is also described as well as a management workstation used to program the switches and analyze the fingerprinted packets.
摘要:
A preassembled modular drop-in transition having internal components in conformity with assembly and function specifications prior to and after insertion into an industrial gas turbine access port. The transition assembly maintains conformity with those specifications after insertion into the combustor case if it does not inadvertently impact other turbine components during its installation. Inadvertent impact is avoided by having a combustor service zone proximal the combustor case, enabling slidable insertion of each transition and/or combustor assembly into its corresponding access port along its corresponding insertion path without contacting other turbine system components. A multi-axis motion transition handling tool (THT) in the combustor service zone, preferably under automatic control, is coupled to a transition and facilitates precise alignment along the insertion path. Automatic control facilitates consistent repetitive transition installation and removal by executing a sequence of stored pre-determined manipulation steps.
摘要:
An edge network device may monitor a network service that is provided at a network service device. Information related to the monitored network service may be temporarily stored at the edge network device and transmitted to a remote network device.
摘要:
Methods, systems, and devices are provided for device driver selection. One embodiment of a management station includes a processor, memory in communication with the processor, and program instructions stored in memory and executable on the processor. The program instructions are executable to initiate execution of a particular device function that will use a driver, select a set of drivers based upon defined device information, and call a routine in a particular driver from the selected set of drivers which executes to determine whether the particular driver is most appropriate to perform the particular device function for a particular device.
摘要:
Network devices, systems and methods are described that may be used in network switch deployment. One method embodiment includes physically connecting a network switch to a network prior to booting the network switch, booting the network switch into a non-bridging mode, and providing the network switch with a configuration while the switch is in the non-bridging mode.
摘要:
Network devices, systems, and methods are described that perform network service monitoring. One method includes examining a number of packets received by a first network device to determine whether a protocol of a packet corresponds to a given network service, forwarding packet service type information and packet address information to a second network device in response to a determination that the protocol of the packet corresponds to the network service, comparing the packet service type information and an associated service type address to a list of service types and addresses on the second network device, and executing a remedial action if, based on the comparing, it is determined that the network service is an unauthorized service and that a provider of the network service is an unauthorized provider.
摘要:
Network devices, systems, and methods are described that perform network service monitoring. One method includes examining a number of packets received by a first network device to determine whether a protocol of a packet corresponds to a given network service, forwarding an event to a second network device in response to a determination that the protocol of the packet corresponds to the network service, determining whether the network service is an authorized service by comparing the network service to a list of network services, and executing a remedial action in response to a determination that the network service is an unauthorized service.
摘要:
A network device is configured by a network manager. The network manager creates a pool identifier and a corresponding pool of network addresses. The network manager also creates a template identifier and a corresponding template including at least one reference to the pool identifier. A device identifier of the network device is set to the template identifier before coupling the network device to a network. The network manager discovers the network device on the network and obtains the device identifier via the network. The network device is configured by the network manager with a configuration that is the corresponding template for the template identifier having each reference to the pool identifier replaced with a network address from the corresponding pool for the pool identifier.
摘要:
An access control system for use with a networked computer system [10] comprises a host [14] of the networked computer system, and a bit stream whereby information is transferred from a source of said bit stream to said host [14], said bit stream bearing a routing label identifying an origin of said bit stream in the computer network. The system further comprises a word integrated with said bit stream, said word including a routing label identifying an origin of said word in the computer network, and an access control module in communication with said host, said access control module operable to make an identification, wherein the identification includes comparing the origin of said bit stream to the origin of said word.