H04L45/20

Route Determining Method and Apparatus and Network Device
20230006917 · 2023-01-05 ·

A route determining method, apparatus, and a network device are disclosed. The method includes a first forwarding node receives routing information from a second forwarding node, and then sends a packet to a destination node based on the routing information. The routing information includes a node identifier of the destination node and at least one piece of indication information that is in a one-to-one correspondence with at least one third forwarding node, and the second forwarding node belongs to the at least one third forwarding node. The packet includes the at least one piece of indication information, and the at least one piece of indication information indicates to forward the packet along the at least one third forwarding node.

Method and apparatus for defending against network attack
11570212 · 2023-01-31 · ·

This application discloses a method and an apparatus for defending against a network attack, to resolve a problem that network defense costs are relatively high. The method includes: a network security device receives a first packet sent by an external device, and matches a destination IP address of the first packet with configuration information of a fake network. If an IP address of a node in the configuration information of the fake network has a same subnet prefix as the destination IP address, the network security device processes the first packet based on a fake network policy; if no IP address of a node in the configuration information of the fake network has a same subnet prefix as the destination IP address, the network security device processes the first packet based on a firewall policy.

Data transmission method, node and system

A data transmission method, a node, and a system, the method including receiving, by a forwarding node, a data packet, where a label stack of the data packet comprises a path identifier (path-ID), where the path-ID is an identifier of a constrained path, and where the constrained path is a path that consists of at least two nodes arranged in a specific order, determining, by the forwarding node, that the forwarding node is a node on the constrained path, selecting, by the forwarding node, a target label/target address from a local available label block/address block according to the path-ID and according to a preset rule, where the label block/address block comprises at least one label/address, searching for, by the forwarding node, a corresponding target interface according to the target label/target address, and forwarding, by the forwarding node, the data packet through the target interface.

SYSTEM AND METHOD FOR DETERMINING THE SHORTEST DATA TRANSFER PATH IN DATA COMMUNICATION

A system accesses a set of devices transferring a data element from a source device to a destination device. The system determines a transformation type implemented on the data element at each device. The system generates an array that uniquely defines the data element at each device. The array comprises the transformation type and an identifier of the device. The system generates a transformation dependency map that represents a set of transformation types implemented on the data element at different devices. The system determines a set of data transfer paths for the data element from the source device to the destination device based on the transformation dependency map. The system selects the shortest data transfer path for the data element that corresponds to the least number of hops between devices. The system communicates the data element from the source device to the destination device using the shortest data transfer path.

SOURCE ROUTING WITH SHADOW ADDRESSES
20230022876 · 2023-01-26 ·

Various example embodiments for supporting source routing are presented herein. Various example embodiments for supporting source routing may be configured to support source route compression for source routing. Various example for supporting source route compression for source routing may be configured to support source route compression for source routing based on use of shadow addresses. Various example for supporting source route compression for source routing based on use of shadow addresses may be configured to support source routing of packets based on use of shadow addresses of hops in place of actual addresses of hops to encode source routes within source routed packets, thereby compressing the source routes within the source routed packets and, thus, providing source route compression.

Peer-to-peer relaying of discovery information

Certain aspects of the present disclosure relate to methods and apparatus for wireless communication, and more specifically to advertising discovery information, relaying discovery information, and to the secure relay of discovery information in wireless networks. Various frame structures are provided for such transmitting and relaying of discovery information. According to certain aspects of the present disclosure, security is provided for relaying discovery information. According to certain aspects of the present disclosure, compensation may be provided to a device that relays discovery information (e.g., when the relaying results in a transaction).

Customization of CNAM information for calls placed to mobile devices

One example method of operation may include identifying a call from a calling device destined for a mobile device, identifying a calling device number associated with the calling device and a mobile device number associated with the mobile device, determining whether a stored calling relationship exists between the calling device number and the mobile device number, and appending one of a plurality of caller identification names (CNAM) to the call based on the determination as to whether there is a stored calling relationship.

Segment identifiers that support end-to-end segment routing with color extended community and border gateway protocol virtual private network option b

A first network device may receive an advertisement that includes a prefix for a second network device, wherein the advertisement is destined for a third network device. The first network device may determine, based on a network topology, whether a next hop is one hop away or multiple hops away. The first network device may selectively modify the advertisement to include a first segment identifier, based on the next hop being one hop away and to generate a first modified advertisement, or may modify the advertisement to include a second segment identifier, based on the next hop being multiple hops away and to generate a second modified advertisement. The first network device may forward the first modified advertisement or the second modified advertisement toward the third network device.

BIT-FORWARDING INGRESS ROUTER, BIT-FORWARDING ROUTER, AND OPERATION, ADMINISTRATION AND MAINTENANCE TEST METHOD
20230224230 · 2023-07-13 ·

Embodiments of this application provide a bit-forwarding ingress router, a bit-forwarding router, and an OAM test method, and pertain to the field of multicast networks. A first BFR receives an OAM request packet from a BFIR; the first BFR determines, according to the OAM request packet, that a destination BFR corresponding to the OAM request packet is the first BFR; and the first BFR obtains a first OAM response packet according to an ID of the BFIR, and sends the first OAM response packet to the BFIR. According to the method and the apparatus that are provided in the embodiments of this application, a problem that a BFIR cannot diagnose or handle a transmission fault when the fault occurs during transmission of a multicast packet can be resolved, which helps implement connectivity testing by using an OAM packet and enables testing of multiple BFERs.

Bit-forwarding ingress router, bit-forwarding router, and operation, administration and maintenance test method

Embodiments of this application provide a bit-forwarding ingress router, a bit-forwarding router, and an OAM test method, and pertain to the field of multicast networks. A first BFR receives an OAM request packet from a BFIR; the first BFR determines, according to the OAM request packet, that a destination BFR corresponding to the OAM request packet is the first BFR; and the first BFR obtains a first OAM response packet according to an ID of the BFIR, and sends the first OAM response packet to the BFIR. According to the method and the apparatus that are provided in the embodiments of this application, a problem that a BFIR cannot diagnose or handle a transmission fault when the fault occurs during transmission of a multicast packet can be resolved, which helps implement connectivity testing by using an OAM packet and enables testing of multiple BFERs.