-
7039724 Programmable command-line interface API for managing operation: A method of managing a network device, includes providing a command-line interface application programming interface (CLI-API) compatible with a command-line interface (CLI) of the network device, receiving instructions from an application that calls one or more routines in the CLI application programming interface, and generating at least one command in response to receiving instructions from the application wherein the at least one command is compatible with the CLI of the network device. An apparatus includes a remote serial command-line interface (RS-CLI) device having a storage device capable of storing instructions, a network port capable of being connected to the network and capable of processing a network protocol stack in addition to receiving the instructions, a serial port capable of processing a serial protocol and capable of being connected to the non-application enabled network device, and a processor capable of processing instructions stored in the storage area of the RS-CLI device.
READ MORE7039724 Programmable command-line interface API for managing operation: A method of managing a network device, includes providing a command-line interface application programming interface (CLI-API) compatible with a command-line interface (CLI) of the network device, receiving instructions from an application that calls one or more routines in the CLI application programming interface, and generating at least one command in response to receiving instructions from the application wherein the at least one command is compatible with the CLI of the network device. An apparatus includes a remote serial command-line interface (RS-CLI) device having a storage device capable of storing instructions, a network port capable of being connected to the network and capable of processing a network protocol stack in addition to receiving the instructions, a serial port capable of processing a serial protocol and capable of being connected to the non-application enabled network device, and a processor capable of processing instructions stored in the storage area of the RS-CLI device.
READ MORE -
6976054 Accessing low-level resources in a network device: A method and system provides access to information about a resource associated with a network device. The method and system selects a layer for communicating with the requested resource associated with the network device in a network protocol stack having multiple layers, establishes an inner layer socket for communicating at the selected layer using an inner layer application programming interface (IL API) and a socket identifier associated with the requested resource, wherein the inner layer socket communicates using the selected layer and bypasses other layers in the network protocol stack, transmits the request for information about the resource through the inner layer socket and the socket identifier, receives the information about the resource in response to the transmission made through the inner layer socket, and passes the information about the resource through the inner layer socket to the application making the request.
READ MORE6976054 Accessing low-level resources in a network device: A method and system provides access to information about a resource associated with a network device. The method and system selects a layer for communicating with the requested resource associated with the network device in a network protocol stack having multiple layers, establishes an inner layer socket for communicating at the selected layer using an inner layer application programming interface (IL API) and a socket identifier associated with the requested resource, wherein the inner layer socket communicates using the selected layer and bypasses other layers in the network protocol stack, transmits the request for information about the resource through the inner layer socket and the socket identifier, receives the information about the resource in response to the transmission made through the inner layer socket, and passes the information about the resource through the inner layer socket to the application making the request.
READ MORE -
6970943 Routing architecture for high-speed packet processing: The present invention provides a routing architecture including a control plane, a compute plane, and a forward plane. The forward plane provides traditional forwarding of packets to the next-hop address, along with any necessary header manipulation, while the control plane configures the forward plane and the compute plane for desired operation. The compute plane is configured for high-speed processing of packets to provide application level support, including manipulating application data in the payload of the packets during routing. The forward plane preferably implements forwarding rules using filters sufficient to forward a received packet to the next-hop address, to the compute plane for application processing, or to the control plane to facilitate control or configuration.
READ MORE6970943 Routing architecture for high-speed packet processing: The present invention provides a routing architecture including a control plane, a compute plane, and a forward plane. The forward plane provides traditional forwarding of packets to the next-hop address, along with any necessary header manipulation, while the control plane configures the forward plane and the compute plane for desired operation. The compute plane is configured for high-speed processing of packets to provide application level support, including manipulating application data in the payload of the packets during routing. The forward plane preferably implements forwarding rules using filters sufficient to forward a received packet to the next-hop address, to the compute plane for application processing, or to the control plane to facilitate control or configuration.
READ MORE -
6950932 Security association mediator for java-enabled devices: The invention provides a system and method for providing security against unauthorized access to a java enabled network device. The system includes multiple conventional class loaders, code verifiers, security managers, access managers, SAMs, a certificate authority and a policy server. The SAM verifies the authenticity of the entity and either allows a download/access to a device or rejects the download/access to a network device. The certificate authority is a repository for public key certificates and may be a part of the secure network or part of the unsecured network. The policy server is a repository for the rights (privileges) an entity is entitled to on the secure network. The code verifiers verify that the Byte Code is valid java code. The security manager is the conventional security manager. The class loader loads the code to the device and the access manager assigns access levels to each Java thread that is created.
READ MORE6950932 Security association mediator for java-enabled devices: The invention provides a system and method for providing security against unauthorized access to a java enabled network device. The system includes multiple conventional class loaders, code verifiers, security managers, access managers, SAMs, a certificate authority and a policy server. The SAM verifies the authenticity of the entity and either allows a download/access to a device or rejects the download/access to a network device. The certificate authority is a repository for public key certificates and may be a part of the secure network or part of the unsecured network. The policy server is a repository for the rights (privileges) an entity is entitled to on the secure network. The code verifiers verify that the Byte Code is valid java code. The security manager is the conventional security manager. The class loader loads the code to the device and the access manager assigns access levels to each Java thread that is created.
READ MORE -
6850989 Automatically configuring with external network data ports: A method and apparatus for automatically configuring a network switch having external network data ports, a processor, and memory. Network data is monitored on the external network data port. Information about the network data traffic is compared to one or more threshold conditions. The network switch is automatically configured if the network data meets one of the threshold conditions. The monitor and configuration functions can be performed by software running on the processor which has been downloaded from an external network maintenance station through a maintenance data port. Information about the network data traffic can be uploaded to the external network maintenance station through a maintenance data port.
READ MORE6850989 Automatically configuring with external network data ports: A method and apparatus for automatically configuring a network switch having external network data ports, a processor, and memory. Network data is monitored on the external network data port. Information about the network data traffic is compared to one or more threshold conditions. The network switch is automatically configured if the network data meets one of the threshold conditions. The monitor and configuration functions can be performed by software running on the processor which has been downloaded from an external network maintenance station through a maintenance data port. Information about the network data traffic can be uploaded to the external network maintenance station through a maintenance data port.
READ MORE -
6845397 Interface for accessing inner layers of a network protocol: A method of performing network communications includes receiving a datagram for transmitting information over a network, selecting a layer in a network protocol stack to establish communication over the network using an inner layer application programming interface (IL API), establishing an inner layer socket at the selected network layer using the IL API without accessing other layers in the layered network protocol stack, and transmitting the datagram packet over the selected layer using the inner layer socket.
READ MORE6845397 Interface for accessing inner layers of a network protocol: A method of performing network communications includes receiving a datagram for transmitting information over a network, selecting a layer in a network protocol stack to establish communication over the network using an inner layer application programming interface (IL API), establishing an inner layer socket at the selected network layer using the IL API without accessing other layers in the layered network protocol stack, and transmitting the datagram packet over the selected layer using the inner layer socket.
READ MORE -
6842781 Download and processing of a network management application: A method and system is provided for performing a network management task on a network device. The network device loads a network management application capable of performing the network management task onto the network device in response to a request. Loading may include accessing an application server having the network management application capable of a performing the network management task and downloading the network management application over a network from the application server to the network device. The network device then executes the network management application corresponding to the requested network management task. Methods and systems provide a result from executing the network management application to a network management system used to manage the network.
READ MORE6842781 Download and processing of a network management application: A method and system is provided for performing a network management task on a network device. The network device loads a network management application capable of performing the network management task onto the network device in response to a request. Loading may include accessing an application server having the network management application capable of a performing the network management task and downloading the network management application over a network from the application server to the network device. The network device then executes the network management application corresponding to the requested network management task. Methods and systems provide a result from executing the network management application to a network management system used to manage the network.
READ MORE -
6772205 Executing applications using a proxy network device: A method processes an object-oriented application on a target network device, by identifying a proxy network device capable of processing the object-oriented application, transmitting the object-oriented application to the proxy network device, generating one or more non-object-oriented instructions using the proxy network device corresponding to the object-oriented application, and transmitting the non-object-oriented instructions generated using the proxy network device to the target network device for processing. A system for processing an object-oriented application is also provided and includes a target network device capable of processing non-object-oriented instructions and sending information across a network, a proxy network device capable of processing the object-oriented instructions of the object-oriented application and converting the object-oriented instructions into non-object oriented instructions that the target network device can process, and a network that transmits the non-object oriented instructions from the proxy network device to the target network device to generate information that corresponds to results generated by the object-oriented application.
READ MORE6772205 Executing applications using a proxy network device: A method processes an object-oriented application on a target network device, by identifying a proxy network device capable of processing the object-oriented application, transmitting the object-oriented application to the proxy network device, generating one or more non-object-oriented instructions using the proxy network device corresponding to the object-oriented application, and transmitting the non-object-oriented instructions generated using the proxy network device to the target network device for processing. A system for processing an object-oriented application is also provided and includes a target network device capable of processing non-object-oriented instructions and sending information across a network, a proxy network device capable of processing the object-oriented instructions of the object-oriented application and converting the object-oriented instructions into non-object oriented instructions that the target network device can process, and a network that transmits the non-object oriented instructions from the proxy network device to the target network device to generate information that corresponds to results generated by the object-oriented application.
READ MORE -
6564325 Providing multi-level security access to system: A software system provides security against unauthorized operations initiated by software code supplied by an untrusted source. The allowed operations that are associated with the software code are determined. A thinned interface is generated which permits the software code to successfully call only the allowed operations. The software code is independent of a security environment of the system. The thinned interface operates in at least one version of the security environment. The software code and the thinned interface are activated within the system.
READ MORE6564325 Providing multi-level security access to system: A software system provides security against unauthorized operations initiated by software code supplied by an untrusted source. The allowed operations that are associated with the software code are determined. A thinned interface is generated which permits the software code to successfully call only the allowed operations. The software code is independent of a security environment of the system. The thinned interface operates in at least one version of the security environment. The software code and the thinned interface are activated within the system.
READ MORE -
6175868 Automatically configuring a network switch: A method and apparatus for automatically configuring a network switch having external network data ports, a processor, and memory. Network data is monitored on the external network data port. Information about the network data traffic is compared to one or more threshold conditions. The network switch is automatically configured if the network data meets one of the threshold conditions. The monitor and configuration functions can be performed by software running on the processor which has been downloaded from an external network maintenance station through a maintenance data port. Information about the network data traffic can be uploaded to the external network maintenance station through a maintenance data port.
READ MORE6175868 Automatically configuring a network switch: A method and apparatus for automatically configuring a network switch having external network data ports, a processor, and memory. Network data is monitored on the external network data port. Information about the network data traffic is compared to one or more threshold conditions. The network switch is automatically configured if the network data meets one of the threshold conditions. The monitor and configuration functions can be performed by software running on the processor which has been downloaded from an external network maintenance station through a maintenance data port. Information about the network data traffic can be uploaded to the external network maintenance station through a maintenance data port.
READ MORE