Patent classifications
H04L45/76
Distributed network subnet
In general, techniques for facilitating a distributed network (L3) subnet by which multiple independent control planes of network devices connected to physically separate L2 networks provide L2 reachability to/from a single L3 subnet. In some examples, a shared L2 network physically situated to connect a plurality of physically separate L2 networks “stitches” the L2 networks together within the respective, independent control planes of switches such that the control planes bridge L2 traffic for a single bridge domain for the separate L2 networks to the shared L2 network and visa-versa. Each of the independent control planes may be configured with a virtual IRB instance associated with the bridge domain and with a common network subnet. Each of the virtual IRBs provides a functionally similar routing interface for the single bridge domain for the separate L2 networks and allows the shared network subnet to be distributed among the independent control planes.
Systems and Methods for Sharing a Control Connection
In one embodiment, a method includes onboarding, by an edge router, a first tenant from a network management system and determining, by the edge router, a mapping of a tenant identifier associated with the first tenant to a controller identifier associated with a controller. The method also includes reserving, by the edge router, a port number in a kernel for the first tenant and inserting, by the edge router, the tenant identifier into a first control packet. The method further includes communicating, by the edge router, the first control packet to the controller via an encrypted control connection during a first peering session. The first peering session shares the encrypted control connection with a second peering session.
Systems and Methods for Sharing a Control Connection
In one embodiment, a method includes onboarding, by an edge router, a first tenant from a network management system and determining, by the edge router, a mapping of a tenant identifier associated with the first tenant to a controller identifier associated with a controller. The method also includes reserving, by the edge router, a port number in a kernel for the first tenant and inserting, by the edge router, the tenant identifier into a first control packet. The method further includes communicating, by the edge router, the first control packet to the controller via an encrypted control connection during a first peering session. The first peering session shares the encrypted control connection with a second peering session.
Method and apparatus for replicating network information base in a distributed network control system with multiple controller instances
A network control system that includes several controllers for managing several switching elements. In some embodiments, each switching element implements at least one logical switching element and has a master controller. In some embodiments, at least one controller is a master of at least two switching elements. The network control system accepts definitions of the logical switching elements and, in some embodiments, each logical switching element has a master controller. In some embodiments, at least one controller is a master for at least two logical switching elements.
Methods and apparatus for providing adaptive private network database schema migration and management processes
System and techniques are described which apply a method for automatic database schema migration. An initial database is installed, according to rules that define tables of data, in an adaptive private network (APN) having a centralized management system including a network control node (NCN) coupled through the APN to a plurality of client nodes, wherein the NCN provides timing and control to the client nodes. An update to the initial database is received, wherein the initial database includes a first table of data stored in a first set of columns and the updated database includes a modified first table having a second set of columns that has a different number of columns as compared to the first table is automatically detected. One or more columns from the second set of columns that are different than the first set of columns are updated for data content.
Communication Method, CP Device, and NAT Device
This application provides a communication method, a CP device, and a NAT device; pertains to the field of communication technologies; and relate to a scenario of performing NAT tracing based on a CU-separated BNG. The CP device delivers, to the NAT device, an IP address assigned to a user. Under a trigger condition of receiving the IP address delivered by the CP device, the NAT device assigns a public network IP address to the user, and reports the public network IP address to the CP device. The CP device adds, to an accounting packet, the IP address assigned by the CP device and the public network IP address assigned by the NAT device, and sends the accounting packet to a RADIUS server, to report the public network IP address to the RADIUS server, so that the NAT tracing is performed on the RADIUS server.
Methods and apparatus for providing adaptive private network centralized management system time correlated playback of network traffic
System and techniques are described for time correlated playback of traffic patterns between nodes in a network. Node statistics of data transfers between nodes are received in a control point, wherein the node statistics include a time stamp (t.sub.n) according to time at the control point of when a request statistics message was sent to each node, a node timestamp (t.sub.a) according to time at each node of when the message was received in the node, and a first delta between t.sub.n and t.sub.a that is used to determine a second delta which adjusts the node statistics. The node statistics adjusted according to the second delta are stored in a statistics database at the control point. A time stepping mechanism is used to repeatedly access the node statistics from the statistics database at a predetermined rate for playback presentation beginning from a specified start time to a specified end time.
METHODS AND SYSTEMS FOR TRANSMITTING BROADCAST DATA
A method carried out by a first communication gateway for transmitting broadcast data. Broadcast data is first received through a first network interface. The first communication gateway determines whether the broadcast data satisfies at least one condition, and forwards the broadcast data through at least one tunnel and through a second network interface to a second communication gateway if the broadcast data satisfies the at least one condition. The broadcast data is encapsulated in at least one encapsulating packet and the at least one encapsulating packet is decapsulated by the second communication gateway in order to retrieve the broadcast data. The broadcast data is then distributed by the second communication gateway to a second network.
Selecting forwarding paths and return paths in a networked environment
Techniques for utilizing edge nodes disposed throughout a multi-site cloud computing network to generate a probe packet including indicators that guarantee the use of forward and return route paths to accurately measure the network performance of a route path between two endpoints in a wide area network (WAN). An edge node disposed in a site of the multi-site cloud computing network may store in virtual memory associated with the edge node, a mapping between route paths, usable to send data from the edge node to remote edge nodes in remote sites, and route indicators. A probe packet may include a data portion for measuring the network performance of a route path, a portion including local and remote discriminators, and/or an inner and an outer header.
PROVIDING LOGICAL NETWORKING FUNCTIONALITY FOR MANAGED COMPUTER NETWORKS
Techniques are described for providing logical networking functionality for managed computer networks, such as for virtual computer networks provided on behalf of users or other entities. In some situations, a user may configure or otherwise specify a network topology for a virtual computer network, such as a logical network topology that separates multiple computing nodes of the virtual computer network into multiple logical sub-networks and/or that specifies one or more logical networking devices for the virtual computer network. After a network topology is specified for a virtual computer network, logical networking functionality corresponding to the network topology may be provided in various manners, such as without physically implementing the network topology for the virtual computer network. In some situations, the computing nodes may include virtual machine nodes hosted on one or more physical computing machines or systems, such as by or on behalf of one or more users.