H04L45/507

ROUTING INTER-AS LSPs WITH CENTRALIZED CONTROLLER
20170289027 · 2017-10-05 ·

Techniques are described for routing inter-AS LSPs with a centralized controller taking inter-AS TE metric values for inter-AS links into account. The inter-AS TE metric values, e.g., local preference values, MED values, or EROS, indicate route preferences for routes between ASes. The disclosed techniques enable network devices within either or both of a first AS and a second AS to store inter-AS TE metric values for inter-AS links in TEDs of the network devices. The network devices then send the contents of their TEDs, including the inter-AS TE metric values, to a centralized controller of the first AS and the second AS. The centralized controller computes an inter-AS LSP across the first AS and the second AS based at least in part on the inter-AS TE metric values such that the inter-AS LSP includes a preferred one of the inter-AS links as indicated by the inter-AS TE metric values.

Heterogeneous Network in a Modular Chassis

In one embodiment, a system includes a number of application-specific integrated circuits (ASICs). The system also includes one or more processors coupled to the ASICs including instructions executable by the processors. The processors being operable when executing the instructions to configure the plurality of ASICs to route data packets using a standard protocol; configure the ASICs to set up a tunnel, using the standard protocol, for moving data packets from one ASIC to another of the number of ASICs; and implement a software overlay to facilitate interaction between the number of ASICs through the tunnel for moving the data packets.

SELECTION OF A TRANSPORT PROTOCOL FOR SUPPORTING A LABEL DISTRIBUTION PROTOCOL
20220052946 · 2022-02-17 ·

Various example embodiments for supporting selection of a transport protocol for use in supporting a label distribution protocol in a label switching network are presented. Various example embodiments for supporting selection of a transport protocol for use in supporting a label distribution protocol in a label switching network may be configured to support multiple transport protocol options for use in supporting use of the label distribution protocol between a pair of label switched routers in the label switching network. Various example embodiments for supporting selection of a transport protocol for use in supporting a label distribution protocol in a label switching network may be configured to use the selected transport protocol to support various aspects of the label distribution protocol (e.g., establishment of a label distribution protocol session based on the label distribution protocol, label distribution based on the label distribution protocol, and so forth).

MACHINE-LEARNING OPTIMIZATION FOR COMPUTING NETWORKS
20170250875 · 2017-08-31 ·

A machine-learning optimization of a plurality of networks is provided. The machine-learning optimization includes interconnecting an online platform providing a machine learning module, a core network of computers deploying novel software, and a plurality of Internet network service providers. The platform collects, via the software, performance data of the Internet networks, which the machine learning module utilizes to enhance performance and reduce the latency therein networks by taking into account thousands of real-time and historic latency and bandwidth metrics. Thereby the software continually selects an optimal path through the plurality of Internet networks.

Pseudowire protection using a standby pseudowire
09749249 · 2017-08-29 · ·

Providing protection to network traffic includes sending a Pseudowire protection configuration parameter for configuring a standby Pseudowire between a source node and a destination node, receiving a Pseudowire configuration acknowledgement indicating whether the Pseudowire protection configuration parameter has been accepted by the destination node, and in the event that the Pseudowire protection configuration parameter has been accepted by the destination node, using the standby Pseudowire, wherein the standby Pseudowire's configured based at least in part on the Pseudowire protection configuration parameter.

Method for forwarding packet and network device
11245620 · 2022-02-08 · ·

A method for forwarding a packet, and a network device are provided. According to the method a first packet can be received. The first packet includes first indication information, payload data, and a packet sequence number of the first packet in a data flow corresponding to the first packet. When the first network device determines that the first packet includes the first indication information, a plurality of second packets can be generated based on the first packet. Each of the plurality of second packets includes the payload data, the packet sequence number, and second indication information. The plurality of second packets can be separately forwarded to a second network device over different forwarding paths in a plurality of forwarding paths.

Path Computation Element Hierarchical Software Defined Network Control
20170244628 · 2017-08-24 ·

A parent PCE controller comprising a memory comprising instructions executable by a processor and a processor coupled to the memory and configured to execute the instructions. Executing the instructions causes the processor to establish a parent-child relationship with at least a first child PCE controller controlling a first domain and a second child PCE controller controlling a second domain, receive a request to create an E2E tunnel from a source to a destination crossing the first domain and the second domain, compute a shortest path from the source to the destination through the first domain and the second domain, transmit a request message to the first child PCE controller for creating a first tunnel segment of the E2E tunnel through the first domain, and transmit a request message to the second child PCE controller for creating a second tunnel segment of the E2E tunnel through the second domain.

TECHNOLOGIES FOR ANNOTATING PROCESS AND USER INFORMATION FOR NETWORK FLOWS

Systems, methods, and computer-readable media for annotating process and user information for network flows. In some embodiments, a capturing agent, executing on a first device in a network, can monitor a network flow associated with the first device. The first device can be, for example, a virtual machine, a hypervisor, a server, or a network device. Next, the capturing agent can generate a control flow based on the network flow. The control flow may include metadata that describes the network flow. The capturing agent can then determine which process executing on the first device is associated with the network flow and label the control flow with this information. Finally, the capturing agent can transmit the labeled control flow to a second device, such as a collector, in the network.

Method and system for core network support of access network protocols in multi-homed redundancy groups

In one embodiment, a method according to the present disclosure includes receiving a topology change advertisement at a remote core edge node and performing a network address information removal operation. The topology change advertisement is received from a core edge node that is in communication with an access network. The topology change advertisement indicates that a topology change has occurred in the access network. The network address information removal operation removes network address information stored by the remote core edge node. The network address information is used by the remote core edge node in participating in communications with the core edge node.

Label forwarding entry generation method and apparatus, packet sending method and apparatus, and device
11431633 · 2022-08-30 · ·

This application provides an example label forwarding entry generation method, applied to a first network device. The method includes obtaining a first packet sent by a second network device, where the first packet carries an address of a third network device and a prefix segment identifier of the third network device, the first network device and the second network device belong to a first area, and the third network device belongs to a second area. The method also includes determining a routing entry that matches the address of the third network device, where the routing entry includes an address of a next-hop network device of the first network device. The method further includes generating a label forwarding entry based on the prefix segment identifier and the address of the next-hop network device.