Patent classifications
H04L61/5084
TRANSPARENT WIDE-AREA SERVICE MIGRATION WITH MPTCP
A system for server migration includes a first computer hosting a service during a first period of time. A second computer hosts the service during a second, third and fourth period of time. A client computer communicates directly with the service at a first IP address, during the first period of time. The client computer communicates with the service at the first IP address, during the second and third periods of time, through a tunneled connection via a first subflow of a multi-path communication session. The client computer communicates directly with the service at the second IP address, during the third period of time, via a second subflow of the multi-path communication session, and discontinue the first subflow of the multi-path communication session while maintaining the second subflow of the multi-path communication session during the fourth period of time.
Method and apparatus for providing migration of cloud components across address domains
Various embodiments provide a method and apparatus for providing migration of cloud components across address domains without the overhead of sending traffic from prior sessions through an anchor. In particular, the networking control plane is decoupled from the packet forwarding data plane using a mobility enablement layer (MEL) that allows creating rules for forwarding elements (FEs) to forward traffic directed to an address within the proper address domain.
Determining IP addresses that are associated with physical locations with new occupants and providing advertisements tailored to new movers to one or more of those IP addresses
Methods related to determining and utilizing one or more attributes to associate with an IP addresses. Attributes are determined based on request data provided with requests from an IP address and one or more available secondary information sources. Attributes may include physical locations and/or category designations for the IP address. One or more attributes may be assigned a likelihood value indicative of likelihood that the attribute is associated with the IP address. Some implementations are directed to utilizing the attributes and likelihood values to identify likely fraudulent information provided with requests. Some implementations are directed to utilizing the attributes and likelihood values to provide advertisements in response to requests from IP addresses.
Determining IP addresses that are associated with physical locations with new occupants and providing advertisements tailored to new movers to one or more of those IP addresses
Methods related to determining and utilizing one or more attributes to associate with an IP addresses. Attributes are determined based on request data provided with requests from an IP address and one or more available secondary information sources. Attributes may include physical locations and/or category designations for the IP address. One or more attributes may be assigned a likelihood value indicative of likelihood that the attribute is associated with the IP address. Some implementations are directed to utilizing the attributes and likelihood values to identify likely fraudulent information provided with requests. Some implementations are directed to utilizing the attributes and likelihood values to provide advertisements in response to requests from IP addresses.
Directed broadcast in network fabric
This technology enables directed broadcasts in network fabrics. To enable a directed broadcast, a control plane node is configured to resolve directed broadcast addresses by mapping the directed broadcast address to a subnet address associated with the network fabric. A fabric border node receives a directed broadcast, extracts a destination address associated with the directed broadcast, and transmits a request to the control plane node to resolve the destination address. The control plane node retrieves the stored mapping and generates a map reply to the fabric border node with a multicast destination comprising the network fabric subnet address. The fabric border node encapsulates the directed broadcast with a header comprising the multicast destination and forwards the encapsulated directed broadcast to fabric edge nodes, which decapsulate the directed broadcast and deliver a data set from the directed broadcast to appropriate end point devices.
METHOD AND SYSTEM FOR HANDLING A TRAFFIC FLOW BETWEEN LOCAL SERVICE CLOUDS
A method in a network node for handling a traffic flow of a User Equipment, UE. The network node creates a unique Network Address Translated, NAT:ed, Internet Protocol, IP, address mapping to an IP address of the UE. The NAT:ed IP address includes a local IP address prefix assigned to a related first local service cloud. The NAT:ed IP address is usable for the traffic flow both before and after a handover of the UE from the first local service cloud to a neighbouring second local service cloud. The NAT:ed IP address is unique at least in all local service clouds neighbouring to the first local service cloud, including the second local service cloud. The network node assigns the NAT:ed IP address to the UE for local break out of the traffic flow of the application session to the first local service cloud.
MASS MAC WITHDRAWAL FOR EVPN-DCI USING VIRTUAL ESI
The techniques described are directed to providing mass withdrawal of media access control (MAC) routes for network devices in an Ethernet virtual private network data center interconnect (EVPN DCI). MAC routes to reach the learned MAC addresses are stored in routing tables with corresponding top-of-rack Ethernet segment identifier (TOR-ESI) values that represent the Ethernet segments from where the MAC addresses were learned. A provider edge (PE) network device may configure and advertise a virtual Ethernet segment identifier (vESI) that includes a plurality of TOR-ESI values. As Ethernet segments of the data center become unavailable, the corresponding TOR-ESI values may be withdrawn from the vESI to form an updated vESI. In this way, MAC routes having a TOR-ESI value that was withdrawn from the vESI may be removed from the routing tables in each of the network devices.
Storage mobility using locator-identifier separation protocol
A processing device such as a router or other network device implements a locator-identifier mapping system associating identifiers of respective endpoints with respective locators in accordance with a locator-identifier separation protocol. A first one of the endpoints comprises a storage server associated with a storage array. In conjunction with reconfiguration of the storage server, the locator-identifier mapping system updates a particular one of the locators corresponding to the endpoint identifier of the storage server. The reconfiguration of the storage server may comprise, for example, a migration of the storage server within a given data center, or from a first data center to a second data center. The locator of the storage server illustratively specifies a subnet of the storage server. The processing device may comprise a router operating as at least one of an ingress tunnel router and an egress tunnel router in accordance with the locator-identifier separation protocol.
PRINTER WITH DUAL MEDIA ACESS CONTROL INTERFACES AND UNINTERUPTED INTERFACE CHANGE
A printer has first and second interfaces for connecting to first and second networks having first and second data host configuration protocol servers. The first and second interfaces have differing media access control (MAC) addresses. The printer uses a recovery sequence to enable recovery for a host computer running an application when switching from the first printer interface to the second printer interface.
Automatic isolation and detection of outbound spam
Embodiments provide IP address partitioning features that can be used to source outbound email communications, but the embodiments are not so limited. In an embodiment, a computer-based method operates to identify and/or isolate one or more customers that may be misusing one or more IP addresses of a partition. A system of an embodiment is configured in part to divide a partition that includes one or more potentially misused IP addresses into one or more levels of sub-partitions as part of identifying offending or potentially offending customers. Other embodiments are included.