Patent classifications
H04L47/724
Segment routing over label distribution protocol
An apparatus and method is disclosed for segment routing (SR) over label distribution protocol (LDP). In one embodiment, the method includes a node receiving a packet with an attached segment ID. In response, the node may attach a label to the packet. Thereafter, the node may forward the packet with the attached label and segment ID to another node via a label switched path (LSP).
Segment routing over label distribution protocol
An apparatus and method is disclosed for segment routing (SR) over label distribution protocol (LDP). In one embodiment, the method includes a node receiving a packet with an attached segment ID. In response, the node may attach a label to the packet. Thereafter, the node may forward the packet with the attached label and segment ID to another node via a label switched path (LSP).
Systems and methods for determining secure network paths
In one embodiment, an apparatus includes one or more processors and one or more computer-readable non-transitory storage media coupled to the one or more processors. The one or more computer-readable non-transitory storage media include instructions that, when executed by the one or more processors, cause the apparatus to perform operations including determining a path through a plurality of provider nodes within a provider network and determining that the path through the plurality of provider nodes within the provider network is secure. The operations also include receiving, from a customer node, a Resource Reservation Protocol (RSVP) path message comprising an attribute for a security request. The operations further include routing the RSVP path message along the path of the plurality of provider nodes.
Systems and methods for determining secure network paths
In one embodiment, an apparatus includes one or more processors and one or more computer-readable non-transitory storage media coupled to the one or more processors. The one or more computer-readable non-transitory storage media include instructions that, when executed by the one or more processors, cause the apparatus to perform operations including determining a path through a plurality of provider nodes within a provider network and determining that the path through the plurality of provider nodes within the provider network is secure. The operations also include receiving, from a customer node, a Resource Reservation Protocol (RSVP) path message comprising an attribute for a security request. The operations further include routing the RSVP path message along the path of the plurality of provider nodes.
Control plane based configuration for time sensitive networking
A session management function (SMF) receives, from an access and mobility management function (AMF), a first request message. The first request message is for a time sensitive network (TSN) bridge. The SMF selects, based on the first request message, a user plane function (UPF) that supports TSN functionality. The SMF sends, to the UPF, a second request message to configure the UPF for the TSN bridge. The second request message comprises an identifier of the TSN bridge. The second request message comprises an identifier of a port associated with TSN packet transmission.
Traffic-shaping HTTP proxy for denial-of-service protection
In accordance with some aspects of the present disclosure, an apparatus is disclosed. In some embodiments, the apparatus includes a processor and a memory. In some embodiments, the memory includes programmed instructions that, when executed by the processor, cause the apparatus to receive a request from a client; determine family of metrics; schedule the request based on the family of metrics; and in response to satisfying one or more scheduling criteria, send the request to a backend server.
Signaling IP path tunnels for traffic engineering
In general, techniques are described for signaling IP path tunnels for traffic engineering using constraints in an IP network. For example, network devices, e.g., routers, of an IP network may compute an IP path using constraint information and establish the IP path using, for example, Resource Reservation Protocol, to signal the IP path without using MPLS. As one example, the egress router generates a path reservation signaling message that includes an egress IP address that is assigned for use by the routers on the IP path to send traffic of the data flow by encapsulating the traffic with the egress IP address and forwarding toward the egress router. As each router in the IP path receives the path reservation signaling message, the router configures a forwarding state to forward traffic encapsulated with the egress IP address to a next hop along the IP path toward the egress router.
Signaling IP path tunnels for traffic engineering
In general, techniques are described for signaling IP path tunnels for traffic engineering using constraints in an IP network. For example, network devices, e.g., routers, of an IP network may compute an IP path using constraint information and establish the IP path using, for example, Resource Reservation Protocol, to signal the IP path without using MPLS. As one example, the egress router generates a path reservation signaling message that includes an egress IP address that is assigned for use by the routers on the IP path to send traffic of the data flow by encapsulating the traffic with the egress IP address and forwarding toward the egress router. As each router in the IP path receives the path reservation signaling message, the router configures a forwarding state to forward traffic encapsulated with the egress IP address to a next hop along the IP path toward the egress router.
Selective multicast ethernet tag extension for optimal source driven multicast forwarding
A networking environment includes a first node and a second node configured as Ethernet Virtual Private Networking (EVPN) peers on an EVPN subnet that is coupled to a Layer 3 VPN over a core network. The first node receives a first multicast join request from a third node in the core network, the first multicast join request including a source address and multicast group address of a source of a multicast stream. The first node determines that the source address and the multicast group address for the source are behind the EVPN subnet at the second node. The first node sends to the second node, a control plane join request message that includes a receiver identifier that identifies the third node as a receiver of the multicast stream, the receiver identifier enabling the second node to forward the multicast stream directly into the core network to the third node.
Selective multicast ethernet tag extension for optimal source driven multicast forwarding
A networking environment includes a first node and a second node configured as Ethernet Virtual Private Networking (EVPN) peers on an EVPN subnet that is coupled to a Layer 3 VPN over a core network. The first node receives a first multicast join request from a third node in the core network, the first multicast join request including a source address and multicast group address of a source of a multicast stream. The first node determines that the source address and the multicast group address for the source are behind the EVPN subnet at the second node. The first node sends to the second node, a control plane join request message that includes a receiver identifier that identifies the third node as a receiver of the multicast stream, the receiver identifier enabling the second node to forward the multicast stream directly into the core network to the third node.