H04L45/38

IN-SITU FLOW DETECTION METHOD AND ELECTRONIC DEVICE
20230231804 · 2023-07-20 ·

Embodiments of the present disclosure provide an in-situ flow detection method and an electronic device. The method includes: receiving a first service packet carrying a first packet header, where the first packet header includes at least a first in-situ flow detection option which is added to the first packet header by an ingress node of a first network domain and is for indicating an in-situ flow detection; and when the network device is an ingress node of a second network domain, forwarding a second service packet in the second network domain; where the second service packet is obtained by encapsulating a second packet header in an outer layer of the first service packet, the second packet header includes at least a second in-situ flow detection option.

Content based routing method and apparatus

Embodiments of the present disclosure provide a content based routing method and apparatus. The method may include: judging, in response to receiving a service request, whether the service request matches a preset shunt rule, the preset shunt rule including a request content and a request context; and forwarding, in response to judging that the service request matches the preset shunt rule, the service request to a service cluster corresponding to the preset shunt rule matching the preset service request.

Method and system for processing network packets
11563830 · 2023-01-24 · ·

The packet processing system, according to an example embodiment, comprises a Network Interface Controller (NIC) to receive and transmit network packets; a memory unit for storing network packets; a processor for processing network packets stored in the memory unit; a cache unit to access all data to the processor from the memory unit; and an application process running on the processing unit. The NIC includes a packet processing means to process the network packets received by the NIC. The packet processing means includes a Contiguous Header Mapping/Map (CHM) header-data splitter to split said network packets into a header portion and a payload portion; a table or equivalent to store the contiguous header-data split configuration data; and a packet Direct Memory Access (DMA) unit to DMA copy said header portion and said payload portion into separate memory area/location and contiguously map said header portion of network packets in the memory unit.

Datapath for multiple tenants

A novel design of a gateway that handles traffic in and out of a network by using a datapath pipeline is provided. The datapath pipeline includes multiple stages for performing various data-plane packet-processing operations at the edge of the network. The processing stages include centralized routing stages and distributed routing stages. The processing stages can include service-providing stages such as NAT and firewall. The gateway caches the result previous packet operations and reapplies the result to subsequent packets that meet certain criteria. For packets that do not have applicable or valid result from previous packet processing operations, the gateway datapath daemon executes the pipelined packet processing stages and records a set of data from each stage of the pipeline and synthesizes those data into a cache entry for subsequent packets.

Distributing service function chain data and service function instance data in a network

In some examples, a computing device comprises a first service function instance to apply a service function and a service function forwarder to: receive a first layer 3 routing protocol route advertisement that includes service function instance data for a second service function instance, the service function instance data indicating a service function type and a service identifier for the service function instance; receive a second layer 3 routing protocol route advertisement that includes service function chain data for a service function chain, the service function chain data indicating a service path identifier and one or more service function items; and send, to the second service function instance and based at least on determining a service function item of the one or more service function items indicates the second service function instance, a packet classified to the service function chain.

Application-based network security
11706216 · 2023-07-18 · ·

A network device may receive, from an application on a user device, a first network packet associated with a packet flow. The network device may identify an application identifier of the first network packet, wherein the application identifier identifies the application on the user device. The network device may select, based on the application identifier, a security protocol, wherein the security protocol is associated with at least one of an authentication header (AH) or an encryption algorithm. The network device may selectively apply, to a second network packet associated with the packet flow, at least one of the AH or the encryption algorithm, associated with the security protocol, to generate a protected network packet. The network device may transmit the protected network packet.

Stateless multicasting over traffic engineered unicast tunnels

A software defined networking (SDN) controller or routers in a network determine unicast paths from an ingress router to egress routers from the network based on quality-of-service (QoS) metrics for links between routers of the network. A subset of the unicast paths is associated with a multicast flow based on one or more QoS criteria for the multicast flow. A router pushes a label stack onto a packet of the multicast flow. The label stack includes labels that identify the subset of the unicast paths. The packet including the label stack is multicast through the network to the egress routers. Routers that receive the multicast packet selectively modify the label stack in the packet based on the labels that identify the subset of the unicast paths. The routers selectively forward the packet based on the labels.

Low latency for network devices not supporting LLD

An optimizing agent of a network device that does not support low latency DOCSIS can identify traffic or packets associated with a client resource for an optimization service flow. For example, the optimizing agent can receive a priority notification associated with a client resource from a low latency controller that is indicative of a low latency requirement associated with the client resource. The optimizing agent identifies the traffic for the optimized service flow based on the priority notification. The identifying can require modifying one or more parameters of an existing service flow, creating a new service flow, or selecting an existing service flow with low latency. The identified traffic can be routed to the optimized service flow to achieve low latency or high QoS.

Path Identity Allocation Method, System, and Apparatus, Device, and Storage Medium
20230224241 · 2023-07-13 ·

A path identity allocation method, system, and apparatus, a device, and a storage medium are provided, and belong to the field of communication technologies. According to the method, a forwarding node on a path receives a PCEP packet, so that when determining that path identification information of the path is unavailable, the forwarding node performs, based on indication information in the PCEP packet, an operation associated with the path identification information, for example, determines, based on indicated content, that the forwarding node reallocates a path identity, or requests the control node to reallocate a path identity.

Packet Transmission Method and Apparatus
20230224245 · 2023-07-13 ·

A packet transmission method includes, obtaining one or more control items, a first network device determines, based on a fact that a device identifier included in a first packet to which each control item belongs is a device identifier of a second network device, a target control item to be sent to the second network device. The first network device sends at least one second packet comprising the target control item to the second network device, where the target control item is located in the at least one second packet, and the second packet includes the device identifier of the second network device.