H04L41/0645

Selective disaggregation advertisement for routing in multi-plane topologies

Techniques for identifying nodes in a data center fabric that are affected by a failure in the fabric, and selectively sending disaggregation advertisements to the nodes affected by the failure. The techniques include a process where a component monitors the network fabric to identify communication paths between leaf nodes, and determines what leaf nodes would be affected by a failure in those communication paths. The component may detect a failure in the network and determine which communication paths, and thus which leaf nodes, are affected by the failure and send disaggregation advertisements to the affected leaf nodes. In some examples, ingress leaf nodes send data through the fabric that indicate egress nodes for the communication paths. Intermediate nodes along may receive the data from the leaf nodes to identify communication paths, and the notify only affected nodes upon detecting a failure in the network.

RECORDING PACKET LOSS IN A NETWORK
20230063253 · 2023-03-02 ·

Packets in a network may be dropped from time to time. Although network devices are able to provide counters specifying the number of dropped packets, these network devices are unable to provide additional context about the dropped packets. However, users of a network wish to know more about dropped packets; such as why the packets were dropped. Therefore, methods for capturing and storing the dropped packets are provided. This way, users can analyze the dropped packets to determine why these packets were dropped.

Communication system, communication device, and abnormality monitoring method

A communication system includes a first communication device and a second communication device. The first communication device includes a first processor that executes a first process including: performing a logging process for recording an operation of the first communication device; monitoring whether an abnormal occurrence is present and suspending the logging process when the abnormal occurrence is detected; and generating a trigger signal that instructs to suspend the logging process when the abnormal occurrence is detected, and a transmitter that transmits the trigger signal. The second communication device includes a receiver that receives the trigger signal transmitted from the first communication device, and a second processor that executes a second process including: performing a logging process for recording an operation of the second communication device; and suspending the logging process when the trigger signal is received by the receiver.

Cloud Network Failure Auto-Correlator

Analysis of a root cause of errors within a cloud network is manually complex and computationally intensive. Methods and systems are provided to determine a subset of elements of the cloud network to analyze, and to identify a subset of analyzers for analyzing the subset of elements to determine the root cause for the error. Thus, when configuring a network, a user may be provided with an identification of the root cause of error, enabling the user to quickly identify and correct the error.

Collaborative Testing of Devices or Subsections Within a Network
20230116553 · 2023-04-13 · ·

A method for testing a device or a subsection under test within a network includes generating, by at least one sending device that is a regular participant of the network and borders the device or subsection under test, at least one test data flow; sending the test data flow to at least one receiving device that is a regular participant of the network different from the sending device and also borders the device or subsection under test, on a path that passes through the device or subsection under test; determining, by the receiving device, at least one performance metric of the received test data flow; determining, based on the at least one performance metric, whether the device or subsection under test, and/or a link between this device or subsection under test and the sending device or receiving device, is performing according to at least one predetermined criterion.

Monitoring user experience using data blocks for secure data access

Techniques for enabling secure access to data using data blocks is described. Computing device(s) can provide instruction(s) to a component associated with an entity, wherein the instruction(s) are associated with an identifier corresponding to a data block of a plurality of data blocks. The computing device(s) can receive, from the component, data associated with the component, wherein the data is associated with the identifier and is indicative of a state of the component. The computing device(s) can store the data in the data block and monitor, using rule(s), changes to the state of the component based at least partly on the data in the data block. As a result, techniques described herein enable near real-time—and in some examples, automatic—reporting and/or remediation for correcting changes to the state of the component using data that is securely accessed by use of data blocks.

Communication Method and Device
20220322196 · 2022-10-06 ·

A communication method and a device are provided. The method includes: Two thresholds are set on a terminal device side: a first threshold and a second threshold. A terminal device may determine a cause for a radio link failure RLF based on a value relationship between a measurement result of a radio signal and the two thresholds, and further may use different handling manners depending on different RLF causes. According to the foregoing method, the terminal device can more accurately locate the cause for the RLF, and perform corresponding handling, to quickly resume communication, meet a service requirement of an industrial scenario, and the like.

Failure notification system, failure notification method, failure notification device, and failure notification program

A failure notification system includes a logical configuration provider which provides logical configurations in which a plurality of types of hardware are virtualized, a processor using logical configurations provided from the logical configuration provider, and a failure notifier which notifies the processor 3 of a failure in the logical configuration provider. A notifier includes a storage device 10 which stores hardware configuration data in which an ID of the hardware is associated with an ID of a logical configuration corresponding to the hardware, a logical configuration identifier which identifies a logical configuration corresponding to hardware from which a failure is detected from the hardware configuration data when a failure in the hardware is detected, and a notifier which notifies the processor of occurrence of a failure in the logical configuration identified by the logical configuration identifier.

Managing a second ring link failure in a multiring ethernet network

Examples disclosed herein relate to managing a second ring link failure in a multi-ring Ethernet network. In an example, an inter-connection network node in a multi-ring Ethernet network comprising a major ring and a sub-ring may propagate a signal failure (SF) event, received in response to a second ring link failure in the major ring, to one or more nodes in the sub-ring. In response to receiving the SF event, a Ring Protection Link (RPL) on the sub-ring may be unlocked to allow network traffic through the RPL and avoid loop formation on the multi-ring Ethernet network. The sub-ring may be moved to the ring protection switching state, including performing a filtering database (FDB) flush at every node on the multi-ring Ethernet network whereby all MAC addresses and related port associations for traffic forwarding are cleared from the FDB.

Abnormal data detection

A method, system, and computer program product for abnormal data detection. According to the method, a plurality of data points collected at different time points are classified into a plurality of groups. A plurality of groups of potential abnormal data points are determined from the plurality of groups. Correlations between a first group of the plurality of groups of potential abnormal data points with other groups of potential abnormal data points are determined. In response to the first group of the plurality of groups of potential abnormal data points being uncorrelated to a majority of the other groups of potential abnormal data points based on the correlations, data points in the first group are identified as abnormal data points.