H04L12/46

DATA CENTER NETWORK WITH PACKET SPRAYING

A network system for a data center. In one example, a method comprises establishing, by a plurality of access nodes, a logical tunnel over a plurality of data paths across a switch fabric between a source access node and a destination access node included within the plurality of access nodes, wherein the source access node is coupled to a source network device; and spraying, by the source access node, a data flow of packets over the logical tunnel to the destination access node, wherein the source access node receives the data flow of packets from the source network device, and wherein spraying the data flow of packets includes directing each of the packets within the data flow to one of the data paths based on an amount of data previously transmitted on each of the plurality of data paths.

MANAGING PROCESSING QUEUE ALLOCATION BASED ON ADDRESSING ATTRIBUTES OF AN INNER PACKET

Described herein are systems, methods, and software to manage processing queue allocation based on addressing attributes of an inner packet. In one implementation, a first gateway identifies processing queues at a second gateway and assigns a unique flow label to each of the processing queues. The first gateway further receives a packet from a computing node that is directed toward the second gateway. The first gateway hashes addressing information in the packet to select a flow label, encapsulates the packet with the flow label in the outer encapsulation header for the encapsulated packet, and forwards the packet toward the second gateway.

Distributed network security service
11711398 · 2023-07-25 · ·

A distributed network security service is disclosed. The disclosed platform comprises an external service that facilitates security operations for a private network. Data from nodes of the private network is received and analyzed by the service. An output is automatically generated by the service in response to a detected security event in the analyzed data that facilitates remediating the security event at least at one or more of the nodes of the private network, wherein a latency exists between the security event occurring on the private network and being remediated during which time an entity responsible for the security event has access to the private network before being blocked.

PRIORITIZING WIRELESS ACCESS TECHNOLOGIES IN AN ENTERPRISE FABRIC
20230021912 · 2023-01-26 ·

An enterprise network may receive a WiFi packet associated with a 5G service (or other type of service) at an access point (AP) in the enterprise network. The enterprise network determines whether the WiFi packet satisfies a first-packet policy associated with the 5G service, where the first-packet policy controls access to a tunnel for traversing the enterprise network to reach the 5G service. If the packet satisfies the policy, the enterprise network queries a map server to identify a location of a 5G border in the enterprise network that is connected to the 5G service. The enterprise network can transmit the WiFi packet on the tunnel with priority to meet SLA using the location of the 5G border.

OVERLAY BROADCAST NETWORK FOR MANAGEMENT TRAFFIC
20230023429 · 2023-01-26 ·

The disclosure provides an approach for an overlay broadcast network for management traffic. Techniques are provided for updating an underlay network route for a virtual computing instance (VCI) on a new host. After activating the VCI on the new host, a routing table on the old host is reprogrammed to associate an Internet protocol (IP) address of the VCI to an overlay broadcast network IP address and a routing table on the new host is reprogramed to associate the first IP address to a local route on the new host. The VCI sends a message to an application programming interface (API) endpoint to initiate reprogramming of an underlay network route to associate the first IP address to the new host. When a response packet is received at the old host, via the underlay network, the old host broadcasts the packet to the overlay broadcast network.

Method for implementing network virtualization and related apparatus and communications system

A method for implementing network virtualization, and a related apparatus and a communications system are provided. The method for implementing network virtualization may include: receiving, by an SDN controller, a virtual network creation request that carries virtual network topology information; creating a virtual network in response to the virtual network creation request; establishing, by the SDN controller, a device mapping relationship; establishing, by the SDN controller, a port mapping relationship; allocating, by the SDN controller, a virtual SDN controller to the virtual network; and registering, by the SDN controller, a first virtual forwarding device and a second virtual forwarding device with the virtual SDN controller. Technical solutions of embodiments of the present invention help to improve networking flexibility, reduce service costs, and shorten a service deployment period.

Grade of service control closed loop

Systems and methods for managing network traffic receives, at a grade of service device, network traffic information for a plurality of network traffic channels from a network device separate from the grade of service device. The network traffic information is compared to a threshold to determine a behavior value for each network traffic channel. Each network traffic channel is mapped to a grade of service according to the behavior value.

Grade of service control closed loop

Systems and methods for managing network traffic receives, at a grade of service device, network traffic information for a plurality of network traffic channels from a network device separate from the grade of service device. The network traffic information is compared to a threshold to determine a behavior value for each network traffic channel. Each network traffic channel is mapped to a grade of service according to the behavior value.

COMMUNICATION APPARATUS AND COMMUNICATION METHOD FOR EHT VIRTUALIZATION WITH MULTI-LINK DEVICES
20230232315 · 2023-07-20 ·

Communication devices and methods for EHT virtualization for MLD devices.are provided. One exemplary embodiment provides an Access Point (AP) included in a plurality of APs affiliated with an AP Multi-link Device (MLD), wherein each of the plurality of APs advertises a Basic Service Set Identifier (BSSID), and provides a link identified by a Link Identifier (ID), the AP comprising: circuitry, which in operation, generates a frame carrying a multi-link element containing information about the AP MLD and the plurality of APs; and a transmitter, which in operation, transmits the frame on a link, the Multi-link element indicating a Link ID of the link on which the frame is transmitted.

Key splitting
11563566 · 2023-01-24 · ·

According to an example, key splitting may include utilizing a masked version of a master key that is masked by using a mask.