Patent classifications
H04L45/507
Automatic version routing among multiple instances of an application
A processing device can receive a request directed to an application such as a service and parse the request to determine a version identifier based on the content of the request. The processing device can acquire a version label corresponding to at least one instance of the application from among multiple instances of the application and match the version label and the version identifier, providing automatic detection and routing of a request to an instance of an application with the correct version. The computing device can store version labels and routing rules for each instance among the multiple instances of the application deployed in the network prior to receiving requests, or determine version labels and routing when a request is received.
SIGNALING CONFIGURATION METHOD AND APPARATUS FOR BIER NETWORK, AND STORAGE MEDIUM
Provided are a signaling configuration method and apparatus for a BIER network, and a storage medium. The signaling configuration method for a BIER network includes: informing, by a PCE and a PCC each other, of a PCECC capability support message, wherein the PCECC capability support message is configured for indicating that the establishment of an extended BIER network path is supported, and the PCC comprises each BFR in the BIER network; allocating, by the PCE, extended BIER network information to each BFR in the BIER network; and receiving, by the PCE, a message about successful installation of the extended BIER network information sent by the PCC.
BIER traffic engineering (BIER-TE) using unicast MPLS-TE tunnels
At a router, at least one memory and computer program code stored therein are configured to, with at least one processor, cause the router to: determine source router identification information for a tunnel traversing the router based on a routable source IP address for the tunnel; determine destination router identification information for the tunnel based on a routable destination IP address for the tunnel; program a bit string entry for the tunnel in a Bit Index Forwarding Table (BIFT) for tunnels from a source router to a plurality of destination routers, the BIFT being indexed based on the source router identification information and at least a portion of the destination router identification information; and route packet data received at the router according to the BIFT.
Seamless end-to-end segment routing across metropolitan area networks
Techniques are described for providing end-to-end segment routing paths across metropolitan area networks. For example, a method comprises receiving, by an area border router (ABR) connected to one or more metropolitan area networks and a core network, a packet including a segment routing label stack including at least a label of the ABR, a context label associated with a routing instance of the ABR, and a subsequent label identifying a device in the segment routing path, determining, from a lookup of the context label in the metro routing table, a table next hop to the core routing table (or metro routing table); in response to determining the table next hop, determining, from a lookup of the subsequent label in the core routing table (or metro routing table), a next hop in the segment routing path; and sending, by the ABR, the packet toward the device in the segment routing path.
MULTIPROTOCOL LABEL SWITCHING (MPLS) DATA PLANE HEADER EXTENSIONS
Systems and techniques are provided for implementing multiprotocol label switching (MPLS) header extensions. In some examples, a method can include, receiving, by a router of a MPLS network, a data packet. In some aspects, the method can include adding, by the router of the MPLS network, at least one entry to an MPLS stack of the data packet, wherein the at least one entry includes an MPLS extension indicator (MEI) that is associated with at least one of an in-stack extension header presence indicator (IPI) and a bottom-of-stack extension header presence indicator (BPI). In some examples, the method can include adding, based on the IPI and the BPI, at least one of an in-stack extension header and a bottom-of-stack extension header to the MPLS stack of the data packet.
Method and apparatus for creating network slices
Disclosed are a method and an apparatus for creating network slices. The method for creating network slices comprises: creating a slice-bundles link between a first node and a second node, wherein the slice-bundles link comprises at least one member link created between the first node and the second node; and configuring a packet service for the slice-bundles link.
Using PCE as SDN Controller
Embodiments relate generally to systems and methods for transitioning a system from a tradition network to a Software Defined Network (SDN) enabled network. In some embodiments, the systems and methods may comprise the use of a Path Computation Element (PCE) as a central controller. Smooth transition between traditional network and the new SDN enabled network, especially from a cost impact assessment perspective, may be accomplished using the existing PCE components from the current network to function as the central controller of the SDN network is one choice, which not only achieves the goal of having a centralized controller to provide the functionalities needed for the central controller, but also leverages the existing PCE network components.
MANAGEMENT DEVICE, MANAGEMENT METHOD, AND MANAGEMENT PROGRAM
A management device (10) includes: a management table acquisition unit (132) that acquires at least a first management table in which an MPLS tunnel and a first label for in-network delivery are associated with each other, and a second management table in which an MPLS tunnel, a second label for specifying a CE router that is an output destination from an egress PE router, and identification information of a VPN to which the CE router that is the output destination belongs are associated with each other, the first management table being included in a node that is a copy source in an MPLS network, the second management table being included in an egress PE router as an output destination of a packet; and a VPN identification unit (133) that collates the first label of the copied packet with the first management table to identify an MPLS tunnel through which the packet passes, identifies the egress PE router to which the packed is output based on the MPLS tunnel, and identifies the VPN of the packet by collating the second management table of the egress PE router with the second label attached to the packet.
System and method of detecting hidden processes by analyzing packet flows
A method includes capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host to yield first flow data, capturing second data associated with a second packet flow originating from the first host from a second capture agent deployed outside of the first host to yield second flow data and comparing the first flow data and the second flow data to yield a difference. When the difference is above a threshold value, the method includes determining that a hidden process exists and corrective action can be taken.
Machine generated content naming in an information centric network
Systems and techniques for machine generation of content names in an information centric network (ICN) are described herein. For example, a node may obtain content. An inference engine may be invoked to produce a name for the content. Once the content is named, the node may respond to an interest packet that includes the name of the content. The response is a data packet that includes the content.