Patent classifications
H04L45/742
SMART CACHE CONTROL FOR MISSION-CRITICAL AND HIGH PRIORITY TRAFFIC FLOWS
A system, apparatus, method, and non-transitory computer readable medium for providing smart cache control for mission-critical and high-priority traffic flows may include a network device which is caused to, extract attributes from a network packet, determine whether to request a new flow rule from a network controller for the network packet based on the extracted attributes, transmit a new flow rule request to the network controller based on results of the determining, the new flow rule request including the extracted attributes, receive the new flow rule from the network controller in response to the new flow rule request, and store the new flow rule in at least one cache memory based on priority information of the new flow rule.
Smart cache control for mission-critical and high priority traffic flows
A system, apparatus, method, and non-transitory computer readable medium for providing smart cache control for mission-critical and high-priority traffic flows may include a network device which is caused to, extract attributes from a network packet, determine whether to request a new flow rule from a network controller for the network packet based on the extracted attributes, transmit a new flow rule request to the network controller based on results of the determining, the new flow rule request including the extracted attributes, receive the new flow rule from the network controller in response to the new flow rule request, and store the new flow rule in at least one cache memory based on priority information of the new flow rule.
Adaptive tracing with a reduced number of probes to avoid firewall issues
Techniques for using trace with tunnels and cloud-based systems for determining measures of network performance are presented. Systems and methods include determining a number of hops from a source that is the user device and a destination, including determining metrics from the source to the destination; performing a trace to all intermediate nodes between the source and the destination, including determining metrics from the source to each of the intermediate nodes; and combining and presenting the metrics from the source to the destination and from the source to each of the intermediate nodes.
I/O method and systems that includes caching data in the network interface controller (NIC) using meta-identifier (meta-ID) for the data
Methods and systems for operating an I/O system are disclosed. Embodiments of the present technology may include a method that involves receiving data at a NIC, caching the data at the NIC, generating a meta-identifier (meta-ID) for the data, writing the data to a host via a PCIe interface, providing the meta-ID to the host, receiving a request for a service at the NIC from the host, the request including the meta-ID, accessing the cached data in the NIC using the meta-ID, and performing the service on the cached data that was accessed in the NIC using the meta-ID.
INVALIDATING CACHED FLOW INFORMATION IN A CLOUD INFRASTRUCTURE
Techniques for managing the distribution of configuration information that supports the flow of packets in a cloud environment are described. In an example, a virtual network interface card (VNIC) hosted on a network virtualization device NVD receives a first packet from a compute instance associated with the VNIC. The VNIC determines that flow information to send the first packet on a virtual network is unavailable from a memory of the NVD. The VNIC sends, via the NVD, the first packet to a network interface service, where the network interface service maintains configuration information to send packets on the substrate network and is configured to send the first packet on the substrate network based on the configuration information. The NVD receives the flow information from the network interface service, where the flow information is a subset of the configuration information. The NVD stores the flow information in the memory.
PACKET FLOW IN A CLOUD INFRASTRUCTURE BASED ON CACHED AND NON-CACHED CONFIGURATION INFORMATION
Techniques for managing the distribution of configuration information that supports the flow of packets in a cloud environment are described. In an example, a virtual network interface card (VNIC) hosted on a network virtualization device NVD receives a first packet from a compute instance associated with the VNIC. The VNIC determines that flow information to send the first packet on a virtual network is unavailable from a memory of the NVD. The VNIC sends, via the NVD, the first packet to a network interface service, where the network interface service maintains configuration information to send packets on the substrate network and is configured to send the first packet on the substrate network based on the configuration information. The NVD receives the flow information from the network interface service, where the flow information is a subset of the configuration information. The NVD stores the flow information in the memory.
METHOD AND SYSTEM FOR ESTABLISHING A DISTRIBUTED NETWORK WITHOUT A CENTRALIZED DIRECTORY
A method for establishing a connection between two nodes in a communication network without use of a centralized directory or mapping identifiers includes: receiving a lookup message from another node in the communication network that includes a lookup term; determining if a target node in a local directory cache can be identified that satisfies the lookup term; and, if such a node is identified, establishing a connection to the target node and forwarding the lookup message, or, if no such node is identified, forwarding the lookup message to other nodes in the network with which the node has an active communication connection.
PACKET TRANSMISSION METHOD, PROXY NODE, AND STORAGE MEDIUM
This application discloses a packet transmission method and device. This application provides a method for forwarding a packet to a peer end to restore an SRH. A new SID with a bypass function is extended for an End.AD SID, so that when a local proxy node fails to find the SRH from a local cache, the new SID and control information used to indicate to restore the SRH are carried in the packet whose SRH needs to be restored. The packet is transmitted to a peer proxy node by using the new SID, to indicate the peer proxy node to replace the local proxy node to restore the SRH. In this way, the SRH corresponding to the packet can be restored through the peer proxy node, and then the packet can continue to be forwarded in a network by using the SRH.
METHOD, APPARATUS, AND DEVICE FOR LOAD BALANCING IN BIT INDEX EXPLICIT REPLICATION NETWORK
This application discloses a method, and a device for load balancing in a BIER network. The method includes: a network device obtains a BIER packet, and determines, based on an identifier in the BIER packet, a target next-hop node that reaches a destination address of the first BIER packet from a plurality of next-hop nodes of the network device. Then, the network device generates a target forwarding table based on the target next-hop node, and forwards the first BIER packet based on the target forwarding table. In this application, a control plane does not perform load balancing on a BIER packet in a manner of delivering a large quantity of load balancing tables to a forwarding plane, but the forwarding plane of the network device generates the target forwarding table to perform load balancing on the BIER packet.
PACKET TRANSMISSION METHOD, PROXY NODE, AND STORAGE MEDIUM
This application discloses a packet transmission method, a proxy node, and a storage medium, and pertains to the field of communications technologies. According to the method, a new SID with a bypass function is extended for an End.AD SID. Therefore, when receiving a packet that carries the End.AD SID, a local proxy node uses this new SID to transmit an SRH of the packet to a peer proxy node in a bypass manner, so that the peer proxy node can also obtain the SRH of the packet, and therefore the SRH of the packet can be stored in the peer proxy node. In this way, synchronization of the SRH of the packet can be implemented between the two proxy nodes that are dual-homed to a same SF node, so that the SRH of the packet is redundantly backed up.