H04L45/68

Efficient scheduling using adaptive packing mechanism for network apparatuses
11805066 · 2023-10-31 · ·

A scheduler in a network device serves ports with data units from a plurality of queues. The scheduler implements a scheduling algorithm that is normally constrained to releasing data to a port no more frequently than at a default maximum service rate. However, when data units smaller than a certain size are at the heads of one or more data unit queues assigned to a port, the scheduler may temporarily increase the maximum service rate of that port. The increased service rate permits fuller realization of a port's maximum bandwidth when handling smaller data units. In some embodiments, increasing the service rate involves dequeuing more than one small data unit at a time, with the extra data units temporarily stored in a port FIFO. The scheduler adds a pseudo-port to its scheduling sequence to schedule release of data from the port FIFO, with otherwise minimal impact on the scheduling logic.

Methods and systems for efficient virtualization of inline transparent computer networking devices

Network devices that are inserted inline into network links and process in-transit packets may significantly improve their packet-throughput performance by not assigning L3 IP addresses and L2 MAC addresses to their network interfaces and thereby process packets through a logical fast path that bypasses the slow path through the operating system kernel. When virtualizing such Bump-In-The-Wire (BITW) devices for deployment into clouds, the network interfaces must have L3 IP and L2 MAC addresses assigned to them. Thus, packets are processed through the slow path of a virtual BITW device, significantly reducing the performance. By adding new logic to the virtual BITW device and/or configuring proxies, addresses, subnets, and/or routing tables, a virtual BITW device can process packets through the fast path and potentially improve performance accordingly. For example, the virtual BITW device may be configured to enforce a virtual path (comprising the fast path) through the virtual BITW device.

Coordinating pseudowire connection characteristics and multi-homed provider edge device capabtilities

A device may store first information regarding a first pseudowire connection with a first device, wherein the first pseudowire connection provides access to an Ethernet virtual private network (EVPN) to communicate with a host device. The device may store second information regarding a second pseudowire connection with a second device, wherein the second pseudowire connection provides access to the EVPN to communicate with the host device. The device may receive a message that includes a configuration identifier and identify the configuration identifier. The device may change a first characteristic of the first pseudowire connection based on the configuration identifier. The device may change a second characteristic of the second pseudowire connection based on the configuration identifier. The device may receive data from the host device based on changing the first characteristic of the first pseudowire connection and changing the second characteristic of the second pseudowire connection.

Pseudowire and label switched path grouping to achieve scale in protection switching
11418418 · 2022-08-16 · ·

A network element includes a plurality of ports interconnected by a switching fabric, wherein a port includes a plurality of connections including an infrastructure connection that operates a Bidirectional Forwarding Detection (BFD) session and a group of connections that share a similar fate for a fault as the infrastructure connection; and a controller configured to detect a fault on the infrastructure connection via the BFD session, and cause a protection switch for one or more of the group of connections based on the fault on the infrastructure connection. The infrastructure connection and the group of connections can be Pseudowires (PWE) or Label Switched Paths (LSPs) in a Multiprotocol Label Switching (MPLS) network.

Methods and Systems for Efficient Virtualization of Inline Transparent Computer Networking Devices
20220210119 · 2022-06-30 ·

Network devices that are inserted inline into network links and process in-transit packets may significantly improve their packet-throughput performance by not assigning L3 IP addresses and L2 MAC addresses to their network interfaces and thereby process packets through a logical fast path that bypasses the slow path through the operating system kernel. When virtualizing such Bump-In-The-Wire (BITW) devices for deployment into clouds, the network interfaces must have L3 IP and L2 MAC addresses assigned to them. Thus, packets are processed through the slow path of a virtual BITW device, significantly reducing the performance. By adding new logic to the virtual BITW device and/or configuring proxies, addresses, subnets, and/or routing tables, a virtual BITW device can process packets through the fast path and potentially improve performance accordingly. For example, the virtual BITW device may be configured to enforce a virtual path (comprising the fast path) through the virtual BITW device.

SYSTEMS AND METHODS FOR INTEGRATING A BROADBAND NETWORK GATEWAY INTO A 5G NETWORK
20220117040 · 2022-04-14 ·

In one embodiment, a method includes configuring a router to act as a BNG and establishing, by the router, a connection between CPE and the BNG. The method also includes receiving, by the router, end-user and access parameters and communicating, by the router, the end-user and access parameters to one or more 5G NFs by interacting with one or more SBIs. The method further includes allowing, by the router, the CPE access to the one or more 5G NFs in response to communicating the end-user and access parameters to the one or more 5G NFs.

METHODS AND SYSTEMS FOR EFFICIENT VIRTUALIZATION OF INLINE TRANSPARENT COMPUTER NETWORKING DEVICES
20220070140 · 2022-03-03 ·

Network devices that are inserted inline into network links and process in-transit packets may significantly improve their packet-throughput performance by not assigning L3 IP addresses and L2 MAC addresses to their network interfaces and thereby process packets through a logical fast path that bypasses the slow path through the operating system kernel. When virtualizing such Bump-In-The-Wire (BITW) devices for deployment into clouds, the network interfaces must have L3 IP and L2 MAC addresses assigned to them. Thus, packets are processed through the slow path of a virtual BITW device, significantly reducing the performance. By adding new logic to the virtual BITW device and/or configuring proxies, addresses, subnets, and/or routing tables, a virtual BITW device can process packets through the fast path and potentially improve performance accordingly. For example, the virtual BITW device may be configured to enforce a virtual path (comprising the fast path) through the virtual BITW device.

Application wire
11128567 · 2021-09-21 · ·

A method includes, at a node associated with a multiprotocol label switching system (MPLS) network, identifying information associated with an application flow based on one or more unencapsulated packet headers of the application flow or based on an ingress data stream that includes the application flow. The method further includes, in response to identifying the information, and based on stored data that maps application flows with psuedowires, determining a number of pseudowires corresponding to paths through the MPLS network, where the stored data indicates, for a sending device application, a distributed mapping of the application flow via at least one of the number of psuedowires, and communicating data related to the sending device application via at least one of the number of pseudowires.

Virtual private network interworking

Methods and systems may use a software-defined network (SDN) based approach for interworking different types of nodes. In an example, an SDN controller may include components that assist in building pseudowires across Ethernet virtual private network (EVPN) nodes and Border gateway protocol-virtual private local area network (LAN) service (BGP-VPLS) nodes.

Configuration and/or deployment of a service based on location information and network performance indicators of network devices that are to be used to support the service

A device receives a request for a service and identifies, based on information included in the request, a set of sites that include a set of network devices that are capable of being used to support the service. The device obtains network performance indicator (NPI) data that is associated with a subset of network devices, of the set of network devices, and that includes NPI values that satisfy a set of performance criteria. The device causes the NPI data to be made available via an interface accessible to a user. The device receives device selection data that specifies a plurality of network devices, of the subset of network devices, that have been selected by the user. The device causes cause the plurality of network devices to be configured in a manner that allows the plurality of network devices to support the service.