Patent application number | Description | Published |
20080219247 | Network switch deployment - Network devices, systems and methods are described that may be used in network switch deployment. One method embodiment includes physically connecting a network switch to a network prior to booting the network switch, booting the network switch into a non-bridging mode, and providing the network switch with a configuration while the switch is in the non-bridging mode. | 09-11-2008 |
20080265915 | METHOD OF DETECTING A NETWORK CABLING CHANGE - A system and method of detecting a network cabling change comprises measuring cable parameters of a cable to create a baseline signature of the cable and storing the baseline signature in a memory. The system and method is operable to detect a cable change based upon a comparison of the stored baseline signature and a subsequent cable measurement. A network device operable to perform the above method comprises a physical layer device that transmits signals into a coupled cable and receives return signals from the cable, a cable diagnostic module that measures cable parameters, a memory operable to store a baseline cable signature, and a controlling system that compares subsequently measured cable parameters to the baseline cable signatures to detect a cable change. | 10-30-2008 |
20090083398 | Autonomous network device configuration method - An embodiment of the present invention comprises a method of configuring one or more target network devices for operation, that further comprises the steps of creating an object for deployment to a predetermined target network device, the object having configuration data for configuring the target network device, and at least one of identification data identifying the object, an autonomous encapsulated agent for executing necessary steps for installing the configuration data, identification data identifying the predetermined target network device, and authentication data for authenticating at least one of the predetermined target network device identification data and object identification data, transporting the object to the predetermined target network device, and the autonomous encapsulated agent begins an on-site process of installing the configuration data in the predetermined target network device. | 03-26-2009 |
20110026529 | Method And Apparatus For Option-based Marking Of A DHCP Packet - A method and apparatus for processing a Dynamic Host Configuration Protocol (DHCP) packet in a trusted network are disclosed. The trusted network includes a plurality of trusted network devices and a trusted host. The DHCP packet is received at a network device of the trusted network. A port of the network device from which the DHCP packet was received is determined. An identifier associated with the port is determined. An option in the DHCP packet is marked by the network device using the identifier. The marked DHCP packet is transmitted along a forwarding path. | 02-03-2011 |
20130054767 | AUTONOMOUS NETWORK DEVICE CONFIGURATION METHOD - An embodiment of the present invention comprises a method of configuring one or more target network devices for operation, that further comprises the steps of creating an object for deployment to a predetermined target network device, the object having configuration data for configuring the target network device, and at least one of identification data identifying the object, an autonomous encapsulated agent for executing necessary steps for installing the configuration data, identification data identifying the predetermined target network device, and authentication data for authenticating at least one of the predetermined target network device identification data and object identification data, transporting the object to the predetermined target network device, and the autonomous encapsulated agent begins an on-site process of installing the configuration data in the predetermined target network device. | 02-28-2013 |
20130246590 | AUTONOMOUS NETWORK DEVICE CONFIGURATION METHOD - An embodiment of the present invention comprises a method of configuring one or more target network devices for operation, that further comprises the steps of creating an object for deployment to a predetermined target network device, the object having configuration data for configuring the target network device, and at least one of identification data identifying the object, an autonomous encapsulated agent for executing necessary steps for installing the configuration data, identification data identifying the predetermined target network device, and authentication data for authenticating at least one of the predetermined target network device identification data and object identification data, transporting the object to the predetermined target network device, and the autonomous encapsulated agent begins an on-site process of installing the configuration data in the predetermined target network device. | 09-19-2013 |
20150058985 | Network Access Apparatus Having a Control Module and a Network Access Module - A network access apparatus includes a processor and an interface to receive a plurality of packets that originate from a client device. The apparatus also includes a network access module that is to perform a forwarding function on the plurality of packets, to determine whether the received plurality of packets comprise a predetermined type of communication, and to instruct the control module to analyze the plurality of packets in response to the plurality of packets being determined as comprising the predetermined type of communication. The apparatus further includes a control module that is to determine a feature of the plurality of packets received from the network access module, to determine whether the feature matches a configuration of a plurality of predetermined configurations, and to perform a predefined action on the plurality of packets in response to the feature matching the configuration. | 02-26-2015 |
20150222491 | TRANSMIT SPECIFIC ALONG BLOCKED LINK - Embodiments herein relate to transmitting specific traffic along a blocked link. A status of links between switches of a network is monitored. The status of the links is one of blocked and non-blocked. A blocked link is not used by a Spanning Tree Protocol (STP). At least one of the network switches is configured to transmit the specific traffic along the blocked link. | 08-06-2015 |