H04L45/04

Enabling selection of a bypass path from available paths in an open shortest path first (OSPF) domain and an intermediate system to intermediate system (ISIS) domain
11711290 · 2023-07-25 · ·

A network device receives an attribute identifying paths associated with an open shortest path first (OSPF) domain of a network and an intermediate system to intermediate system (ISIS) domain of the network, and provides the attribute to other network devices of the network. The network device receives traffic destined for one of the other network devices of the network, and determines that a primary path is unavailable for routing the traffic to the one of the other network devices. The network device selects a secondary path from the paths identified by the attribute. The secondary path is selected based on determining that the primary path is unavailable, and the secondary path is associated with the OSPF domain or the ISIS domain of the network. The network device provides the traffic to the one of the other network devices via the secondary path.

MANAGING PROCESSING QUEUE ALLOCATION BASED ON ADDRESSING ATTRIBUTES OF AN INNER PACKET

Described herein are systems, methods, and software to manage processing queue allocation based on addressing attributes of an inner packet. In one implementation, a first gateway identifies processing queues at a second gateway and assigns a unique flow label to each of the processing queues. The first gateway further receives a packet from a computing node that is directed toward the second gateway. The first gateway hashes addressing information in the packet to select a flow label, encapsulates the packet with the flow label in the outer encapsulation header for the encapsulated packet, and forwards the packet toward the second gateway.

Distributed network security service
11711398 · 2023-07-25 · ·

A distributed network security service is disclosed. The disclosed platform comprises an external service that facilitates security operations for a private network. Data from nodes of the private network is received and analyzed by the service. An output is automatically generated by the service in response to a detected security event in the analyzed data that facilitates remediating the security event at least at one or more of the nodes of the private network, wherein a latency exists between the security event occurring on the private network and being remediated during which time an entity responsible for the security event has access to the private network before being blocked.

OVERLAY BROADCAST NETWORK FOR MANAGEMENT TRAFFIC
20230023429 · 2023-01-26 ·

The disclosure provides an approach for an overlay broadcast network for management traffic. Techniques are provided for updating an underlay network route for a virtual computing instance (VCI) on a new host. After activating the VCI on the new host, a routing table on the old host is reprogrammed to associate an Internet protocol (IP) address of the VCI to an overlay broadcast network IP address and a routing table on the new host is reprogramed to associate the first IP address to a local route on the new host. The VCI sends a message to an application programming interface (API) endpoint to initiate reprogramming of an underlay network route to associate the first IP address to the new host. When a response packet is received at the old host, via the underlay network, the old host broadcasts the packet to the overlay broadcast network.

IN-SITU FLOW DETECTION METHOD AND ELECTRONIC DEVICE
20230231804 · 2023-07-20 ·

Embodiments of the present disclosure provide an in-situ flow detection method and an electronic device. The method includes: receiving a first service packet carrying a first packet header, where the first packet header includes at least a first in-situ flow detection option which is added to the first packet header by an ingress node of a first network domain and is for indicating an in-situ flow detection; and when the network device is an ingress node of a second network domain, forwarding a second service packet in the second network domain; where the second service packet is obtained by encapsulating a second packet header in an outer layer of the first service packet, the second packet header includes at least a second in-situ flow detection option.

Mechanism and procedures for multi-domain enterprise fabric domain federations

In one embodiment, a method generally includes a first edge (E) node in a network receiving an encapsulated data packet, wherein the encapsulated data packet comprises an outer header and a data packet, wherein the outer header comprises a first router locator (RLOC) corresponding to the first E node, wherein the data packet comprises an internet protocol (IP) header, and wherein the IP header comprises a destination endpoint identification (EID) corresponding to a host H. The first E node determines whether the host H is attached to the first E node. And in response to the first E node determining the host is attached to the first E node, the first E node forwards the data packet to the host H. The first E node receives a message from another node after the host H detaches from the first E node and reattaches to another E node, wherein the message comprises the destination EID.

Remote probing for failover
11563627 · 2023-01-24 · ·

A method, a device, and a non-transitory storage medium are described in which a remote probing for failover service is provided. The remote probing for failover service includes receiving, by a network device at a standby location associated with a geographic redundancy, failover traffic, which originates at a primary location of a network. The network device routes the failover traffic back to a corresponding network device at the primary location. The network device at the primary location may provide the failover traffic to a network performance analyzer device at the primary location.

Stitching label switch paths between autonomous systems with internet protocol routing
11706132 · 2023-07-18 · ·

Systems and methods for routing traffic through a network along Label-Switched Paths (LSPs) that may extend across multiple autonomous systems include performing Internet Protocol (IP) routing lookups as a packet is transmitted along the LSP. In one implementation, a packet having a predetermined value (which may be inserted by an upstream network device) is received at a network device after travelling along a first segment of an LSP. In response to identifying the predetermined label value of the packet, the network device may perform an IP routing lookup using IP routing information included in the packet to identify a next hop for the packet. The network device may then update a label of the packet such that the packet is routed along a second segment of the LSP and transmit the communication packet to the next hop.

EFFICIENT ROUTING OF COMMUNICATIONS IN A MESH NETWORK
20230231907 · 2023-07-20 · ·

A method including receiving, by an infrastructure device in communication with a first device in a mesh network, a binding request from a meshnet local port associated with the first device that is dedicated for communicating meshnet data associated with the first device, the binding request requesting the infrastructure device to determine a currently allocated public port associated with the first device; and transmitting, by the infrastructure device to the first device, a response indicating the currently allocated public port associated with the first device. Various other aspects are contemplated.

SYSTEM AND METHOD FOR FORWARDING PACKETS IN A HIERARCHICAL NETWORK ARCHITECTURE USING VARIABLE LENGTH ADDRESSES
20230015347 · 2023-01-19 · ·

This disclosure relates to transmitting data packets from a source to a destination within a communications network. A data packet is received from the source located in a local sub-network of the network. The data packet includes a first network layer protocol header having a source address containing the local sub-network address of the source, a destination address of the destination, a first field indicating a length of the source address and a second field indicating a length of the destination address. The first network layer protocol header is transformed by modifying the source address and the first field indicating the length of the source address, such that the modifying includes appending to the local sub-network address a prefix of the sub-network to make the source address an address of a higher-level network. The data packet is then forwarded toward the destination in the higher-level network.