Y02D30/00

Routing configuration
11582092 · 2023-02-14 · ·

Systems, apparatuses, and methods may provide for robust and autonomous provisioning of routing nodes and/or server stacks within a network. For instance, each routing node and/or server stack may perform self-discovery (e.g., determines its own identity and where it has been placed in the network), and determine its role (e.g., how to route packets) within the network.

Voice signaling transmission method and device
11582353 · 2023-02-14 · ·

The present disclosure provides a voice signaling transmission method and device. The voice signaling transmission method includes: sending, by a second device, a request signaling to a first device; receiving, by the second device, a signaling for requesting the second device to try a call sent by the first device, and sending a signaling for trying a call to the first device; receiving, by the second device, a ringing signaling sent by the first device and sending a temporary response signaling to the first device; and receiving, by the second device, a signaling for confirming the response and a signaling for confirming the request which are sent by the first device and sending a response signaling to the first device.

Method for configuring, method for providing topology information, name service server, device, computer program and computer-readable medium

A method for providing topology information, use of a name service server, a device, a computer program, a computer-readable medium and a method for configuring a device to be named within an industrial network, wherein a) the device to be named receives a neighbouring name message from a neighbouring device, b) a self-naming module creates a topological neighbouring domain name based on the neighbouring name message, c) the self-naming module transmits the topological neighbouring domain name to a name service server, d) the self-naming module receives from the name service server a response message, which includes at least one device name of the device to be named belonging to the topological neighbouring domain name, and e) at least one device name from the response message is assigned to the device to be named and this name is stored as the device name by the self-naming module.

Validation of cross logical groups in a network

Disclosed are systems, methods, and computer-readable media for assuring tenant forwarding in a network environment. Network assurance can be determined in layer 1, layer 2 and layer 3 of the networked environment including, internal-internal (e.g., inter-fabric) forwarding and internal-external (e.g., outside the fabric) forwarding in the networked environment. The network assurance can be performed using logical configurations, software configurations and/or hardware configurations.

METHOD FOR A SWITCH-INITIATED SDN CONTROLLER DISCOVERY AND ESTABLISHMENT OF AN IN-BAND CONTROL NETWORK

Controller(s) in a software defined network (SDN) are able to determine a control path towards each network switch by performing a switch-originated discovery and using an in-band control network that is an overlay on the data network. A topology tree is maintained, where each controller being the root of the tree, and where messages from the root to any switch may pass through neighboring switches to reach that switch (and vice-versa). Each switch in the SDN attempts to connect to the controller when it does not have a readily configured control connection towards the controller. Once the controller learns about the presence of a new switch and at least one or more paths to reach that switch through a novel discovery process, it can select, adjust and even optimize the control path's route towards that switch.

BUFFER PROFILE ASSIGNMENT MANAGEMENT BASED ON PEER NETWORK DEVICE DATA
20230239346 · 2023-07-27 ·

A network device including a first data structure storing a set of buffer profile types. Each buffer profile type is associated with one or more configuration parameters. The network device further includes a second data structure storing a set of peer device identifiers, wherein each peer device identifier of the set of peer device identifiers is associated with a buffer profile type. The network device includes a buffer management application to receive first data associated with a first peer network device coupled via a first link to an interface component of the network device, determine the first data matches a first peer device identifier stored in the second data structure, and assign a first buffer profile type to the interface component of the network device, wherein the first buffer profile type is associated with the first peer device identifier in the second data structure.

Link group configuration method and device
11570088 · 2023-01-31 · ·

A link group configuration method includes obtaining first status information of M links between a source end device and a receive end device, where the first status information indicates a status of a differential delay between any two of the M links, obtaining first capability information of the receive end device, where the first capability information indicates a first capability of performing differential delay compensation on the M links by the receive end device, grouping N of the M links into a first link group based on the first status information and the first capability information, and sending first configuration information to a second device, where the first configuration information includes information used to indicate the first link group.

Service status notification
11570073 · 2023-01-31 · ·

A provider edge (PE) device may receive traffic associated with one or more services, wherein the traffic includes a plurality of packets, and may determine, based on the plurality of packets, one or more packets respectively associated with each service of the one or more services. The PE device may determine, based on the one or more packets respectively associated with each service of the one or more services, a respective status of each of the one or more services. The PE device may generate type-length-value (TLV) data that indicates the respective status of each of the one or more services and may cause the TLV data to be added to a link layer discovery protocol (LLDP) packet. The PE device may send the LLDP packet that includes the added TLV data to a customer edge (CE) device.

Data protection for networking devices

Embodiments are described for a method and system of applying data protection software mechanisms to network equipment devices to auto-discover the networking equipment, save changes from memory (TCAM) to local storage, backup changes to protection storage, provide auditing and tracking history of changes, and provide the ability to deploy test/development copies of changes using software defined networking techniques.

NEGOTIATED BRIDGE ASSURANCE IN A STACKED CHASSIS

An information handling system includes multiple data ports, a memory, and a processor. Each of the data ports enables a separate communication link of a plurality of communication links for the information handling system. The memory stores data to indicate whether the information handling system supports bridge assurance on each of the communication links. In response to the bridge assurance being supported in the information handling system, the processor provides a message across a first link of the communication links. The message indicates that bridge assurance is supported in the information handling system. The processor also determines whether an acknowledgement message has been received. In response to the acknowledgement message being received, the processor enables the bridge assurance on the first link.