H04L12/46

Method and apparatus for providing a point-to-point connection over a network

A method and apparatus for providing a point-to-point connection are disclosed. The method queries for a next available label for a first provider edge router and a next available label for a second provider edge router, performs a first configuration at the first provider edge router and a second configuration at the second provider edge router, wherein the performing the first configuration comprises configuring a first interface and configuring a label for using at least one tunnel by a second interface, wherein the performing the second configuration comprises configuring a third interface and configuring a label for using the at least one tunnel by a fourth interface, and performs a first mapping for the first provider edge router from the first interface to the second interface, and a second mapping for the second provider edge router from the third interface to the fourth interface.

BARE-METAL CONNECTION STORAGE METHOD AND SYSTEM, AND APPARATUS
20230231915 · 2023-07-20 ·

A bare-metal connection storage method includes establishing a storage network, where the storage network includes a plurality of bare-metals, an access switch, a core switch, and a storage device. The plurality of bare-metals are coupled to the access switch, the access switch is coupled to the core switch, and the core switch is coupled to the storage device. The method configures the storage network, so that each of the plurality of bare-metals is coupled to the storage device.

BARE-METAL CONNECTION STORAGE METHOD AND SYSTEM, AND APPARATUS
20230231915 · 2023-07-20 ·

A bare-metal connection storage method includes establishing a storage network, where the storage network includes a plurality of bare-metals, an access switch, a core switch, and a storage device. The plurality of bare-metals are coupled to the access switch, the access switch is coupled to the core switch, and the core switch is coupled to the storage device. The method configures the storage network, so that each of the plurality of bare-metals is coupled to the storage device.

Securing a connection from a device to a server
11563604 · 2023-01-24 · ·

This invention is directed to a communication processing apparatus that secures a safe connection from a non-IP-connection device to an IP-connection cloud (server). This communication processing apparatus includes a first connection unit that connects devices, a second connection unit that connects to servers, a switching unit that switches connections of the devices and the servers between the first connection unit and the second connection unit, a determiner that determines whether connection of a device to the first connection unit is permitted or unpermitted, and a connection controller that controls the switching unit in accordance with a determination result from the determiner.

Pseudo wire load sharing method and device
11563680 · 2023-01-24 · ·

A pseudo wire load sharing method, applied to a scenario in which a first provider edge PE device is separately connected to at least one second PE device by using at least two PWs includes receiving, by the first PE device, a data flow from a customer edge CE device, and forwarding the data flow to a PW trunk interface, where the PW trunk interface is associated with at least two active PWs; and performing, by the first PE device, load sharing processing on the data flow, and forwarding the data flow by using the at least two active PWs.

Graph Embedding-Based Virtual Network Mapping Method
20230231774 · 2023-07-20 ·

The present invention provides a graph embedding-based virtual network mapping method including inputting a virtual network and a substrate network corresponding to a virtual network mapping scenario, in an optimized mapping mode, generating an embedding value for every substrate node by applying a graph convolution network (GCN), by a network encoder, to embed the virtual network, determining whether a difference between an embedding value for every substrate node and an embedding value for every previous substrate node which is previously embedded exceeds a set threshold, by a network decoder, and mapping an allocation node of the virtual network to a mapping node of a previous substrate network which is previously mapped according to an embedding value for every previous substrate node when the difference value does not exceed the threshold value, by the network decoder.

PER-NAMESPACE IP ADDRESS MANAGEMENT METHOD FOR CONTAINER NETWORKS
20230231827 · 2023-07-20 ·

Some embodiments of the invention provide a method of sending data in a network that includes at least one worker node executing one or more sets of containers and a virtual switch, the virtual switch including a gateway interface, a virtual local area network (VLAN) tunnel interface, and a set of virtual Ethernet interfaces associated with the one or more sets of containers. The method configures the gateway interface of the worker node to associate the gateway interface with multiple subnets that are each associated with a namespace. The worker node executes at least (1) first and second sets of containers of a first namespace, and (2) a third set of containers of a second namespace. The method sends data between the first and second sets of containers through a first virtual Ethernet interface associated with the first set of containers and a second virtual Ethernet interface associated with the second set of containers. The method sends data between the first set of containers and the third set of containers through the first virtual Ethernet interface associated with the first set of containers, the gateway interface, and a third virtual Ethernet interface associated with the third set of containers.

SYSTEMS AND METHODS FOR SELECTING TUNNELS FOR TRANSMITTING APPLICATION TRAFFIC BY AN SD-WAN APPLICATION

Systems and methods for selecting tunnels for transmitting application traffic by an SD-WAN application include a software-defined wide area network (SD-WAN) application executing on a client device establishing a connection between the SD-WAN application and one or more applications. The SD-WAN application maintains a plurality of tunnels between the SD-WAN application and respective tunnel destinations. The SD-WAN application receives application traffic from an application of the one or more applications. The SD-WAN application selects, based on the application traffic, a respective tunnel of the plurality of tunnels via which to transmit the application traffic of the application. The SD-WAN application transmits the application traffic via the selected tunnel.

PERFORMANCE IMPROVEMENT OF IPSEC TRAFFIC USING SA-GROUPS AND MIXED-MODE SAS
20230231826 · 2023-07-20 ·

Some embodiments provide a method of load balancing data message flows across multiple secure connections. The method receives a data message having source and destination addresses formatted according to a first protocol. Based on the source and destination addresses, the method selects one of the multiple secure connections for the data message. Each of the secure connections handles a first set of connections formatted according to the first protocol and a second set of connections formatted according to a second protocol that is an alternative to the first protocol. The method securely encapsulates the data message and forwards the encapsulated data message onto a network. The encapsulation includes an identifier for the selected secure connection.

ASSIGNMENT OF NETWORK CONFIGURATION FOR A WIRED NETWORK USING A WIRELESS NETWORK

A technique is configured to utilize messages (e.g., frames) generated by a first layer of a protocol stack for a wireless network to configure network parameters associated with a second layer of the protocol stack for a wired network. The messages are illustratively beacon frames generated by a data link layer of a Transmission Control Protocol/Internet Protocol (TCP/IP) stack for a wireless network, and the network parameters are illustratively IP addresses associated with a network layer of the TCP/IP stack for a wired network. Notably, the beacon frames of the wireless network may be utilized for two-way communication exchange on a per node basis for each node in the wired network.