Patent classifications
H04L61/5007
Address processing method and network device
This application provides an address processing method and a network device. The method includes: obtaining, by a first network device, an address; determining, by the first network device, a length of a valid address of the address, where the valid address of the address is a 1.sup.st bit, whose bit value is 1, of the address to a last bit of the address; and adding, by the first network device when the length of the valid address of the address is less than a table width of a target table, S zeros before the valid address of the address to obtain an adjusted address, and processing the adjusted address based on the adjusted address and the target table, where S is a difference between the table width of the target table and the length of the valid address of the address.
Network configuration method, apparatus, and system
This application provides a network configuration method, apparatus, and system. The method includes: determining, based on a mapping relationship, that a first data node in a first YANG data model corresponds to a second data node in a second YANG data model, where the first data node and the second data node include a same indication operation, and the mapping relationship includes a correspondence between a data node in the first YANG data model and a data node in the second YANG data model; and generating a first packet based on the second data node.
Network configuration method, apparatus, and system
This application provides a network configuration method, apparatus, and system. The method includes: determining, based on a mapping relationship, that a first data node in a first YANG data model corresponds to a second data node in a second YANG data model, where the first data node and the second data node include a same indication operation, and the mapping relationship includes a correspondence between a data node in the first YANG data model and a data node in the second YANG data model; and generating a first packet based on the second data node.
Security mechanisms for data plane extensions of provider network services
A connectivity enablement device includes one or more processors, one or more memories and a hardware input port. The memories store program instructions that when executed examine a token obtained from a token transfer device inserted into the port, and cause one or more messages to be transmitted to a virtualized computing service. The messages indicate (a) the connectivity enablement device, (b) the token transfer device, (c) the token's source and (d) a server. An indication that the server has been configured within an isolated virtual network is obtained at the connectivity enablement device.
Security mechanisms for data plane extensions of provider network services
A connectivity enablement device includes one or more processors, one or more memories and a hardware input port. The memories store program instructions that when executed examine a token obtained from a token transfer device inserted into the port, and cause one or more messages to be transmitted to a virtualized computing service. The messages indicate (a) the connectivity enablement device, (b) the token transfer device, (c) the token's source and (d) a server. An indication that the server has been configured within an isolated virtual network is obtained at the connectivity enablement device.
Dynamic content delivery network selection using DNS
Techniques for dynamic content delivery network (CDN) selection using the domain name service (DNS) protocol are described. A DNS resolver utilizes a network identifier provided within a DNS query seeking to resolve a domain to select between different CDNs. The selection can be based on an analysis of network metric summary data corresponding to the CDNs from the perspective of an approximate location of the requesting client, as determined via the network identifier as a proxy. The selection process and involved network metric types can be configured by the user associated with the domain via a selection policy. Network metrics can be provided by the user or collected based on reported data generated by remote clients through provided metric-generating code, and thereafter transformed into network metric summary data that is used for resolution.
Dynamic content delivery network selection using DNS
Techniques for dynamic content delivery network (CDN) selection using the domain name service (DNS) protocol are described. A DNS resolver utilizes a network identifier provided within a DNS query seeking to resolve a domain to select between different CDNs. The selection can be based on an analysis of network metric summary data corresponding to the CDNs from the perspective of an approximate location of the requesting client, as determined via the network identifier as a proxy. The selection process and involved network metric types can be configured by the user associated with the domain via a selection policy. Network metrics can be provided by the user or collected based on reported data generated by remote clients through provided metric-generating code, and thereafter transformed into network metric summary data that is used for resolution.
INTERNET PROTOCOL SCHEMA GENERATION
A method includes receiving a request to create an Internet Protocol (IP) schema on a network from a first user. The method further includes receiving a list of IP parameters associated with a device connected to the network. The method further includes receiving a positional encoding for the IP parameters that associates the IP parameters to bit locations in an IP address. The method further includes determining whether the first user is authorized to create the IP schema. The method further includes generating, in response to a determination that the first user is authorized, the IP schema based on the positional encoding for the IP parameters.
INTERNET PROTOCOL SCHEMA GENERATION
A method includes receiving a request to create an Internet Protocol (IP) schema on a network from a first user. The method further includes receiving a list of IP parameters associated with a device connected to the network. The method further includes receiving a positional encoding for the IP parameters that associates the IP parameters to bit locations in an IP address. The method further includes determining whether the first user is authorized to create the IP schema. The method further includes generating, in response to a determination that the first user is authorized, the IP schema based on the positional encoding for the IP parameters.
MANAGING IP ADDRESSES FOR DPDK ENABLED NETWORK INTERFACES FOR CLOUD NATIVE PODS
The present disclosure provides example computer-implemented method, medium, and system for managing IP addresses for DPDK enabled network interfaces for cloud native pods. One example method includes creating a pod of one or more containers, where the pod connects to multiple networks through multiple network interfaces. A poll mode driver (PMD) is attached to a first network interface of the multiple network interfaces, where the PMD enables one or more data plane development kit (DPDK) applications inside the pod to manage the first network interface. A first container network interface (CNI) is created to handle the DPDK enabled first network interface. A first Internet protocol (IP) address is allocated to the first network interface using the first CNI. The first IP address is passed to the one or more DPDK applications using the first CNI.