Patent classifications
H04L61/2596
Load balance method and apparatus thereof
Embodiments of this application provide a load balance method and an apparatus thereof. The method may include the following steps: receiving, by a load balance node, a first service request packet from a service request end, where the first service request packet includes address information of the service request end, address information of a to-be-processed load balance instance, and a MAC address of the load balance node; determining a to-be-processed service member based on the address information of the to-be-processed load balance instance, where the to-be-processed service member is configured to process the first service request packet; and modifying the MAC address of the load balance node in the first service request packet to a MAC address of the to-be-processed service member, to obtain a second service request packet, and sending the second service request packet to a computing node to which the to-be-processed service member belongs.
Load balance method and apparatus thereof
Embodiments of this application provide a load balance method and an apparatus thereof. The method may include the following steps: receiving, by a load balance node, a first service request packet from a service request end, where the first service request packet includes address information of the service request end, address information of a to-be-processed load balance instance, and a MAC address of the load balance node; determining a to-be-processed service member based on the address information of the to-be-processed load balance instance, where the to-be-processed service member is configured to process the first service request packet; and modifying the MAC address of the load balance node in the first service request packet to a MAC address of the to-be-processed service member, to obtain a second service request packet, and sending the second service request packet to a computing node to which the to-be-processed service member belongs.
Line side multiplexers with protection switching
The present invention is directed to data communication systems and techniques thereof. In a specific embodiment, the present invention provides a network connector that includes an interface for connecting to a host. The interface includes a circuit for utilizing two data paths for the host. The circuit is configured to transform the host address to different addresses based on the data path being used. There are other embodiments as well.
DATA PROCESSING METHOD BASED ON NETWORK SLICES AND APPARATUS THEREFOR
A data processing method based on network slices comprises determining on a data plane a network slice to which a data flow belongs according to network slice resource information, an uplink port receiving the data flow, virtual local area network (VLAN) information carried by the data flow, and destination media access control (MAC) address of the data flow. The method further comprises processing and forwarding the data flow through the network slice to which the data flow belongs. In the network slice resource information, different network slices sharing a VLAN on a shared uplink port are configured with different three-layer interface MAC addresses.
DATA PROCESSING METHOD BASED ON NETWORK SLICES AND APPARATUS THEREFOR
A data processing method based on network slices comprises determining on a data plane a network slice to which a data flow belongs according to network slice resource information, an uplink port receiving the data flow, virtual local area network (VLAN) information carried by the data flow, and destination media access control (MAC) address of the data flow. The method further comprises processing and forwarding the data flow through the network slice to which the data flow belongs. In the network slice resource information, different network slices sharing a VLAN on a shared uplink port are configured with different three-layer interface MAC addresses.
Transparent multiplexing of IP endpoints
Allowing a network function (such as a router, firewall or SD-WAN endpoint) or service chain of network functions to transparently access a network uplink, while also allowing a set of management entities to access the same link without interference or configuration. To the extent that a conflict arises between ports allocated to the management functions and to the network functions, the relevant port is automatically removed from use by management functions and allocated to network functions to end the conflict.
SCALABLE AND SECURE EDGE CLUSTER REGISTRATION
A method includes initiating, by a device manager associated with a cluster manager proxy, a connection with a cluster of computing devices, wherein initiating the connection includes providing first credentials to the cluster of computing devices to access the cluster manager proxy. The method further includes receiving, at the cluster manager proxy, a first request to register the cluster of computing devices with a cluster manager, the first request including the first credentials to access the cluster manager proxy and sending, from the cluster manager proxy to the cluster manager, a second request to register the cluster of computing devices with the cluster manager, the second request including second credentials to access the cluster manager.
SCALABLE AND SECURE EDGE CLUSTER REGISTRATION
A method includes initiating, by a device manager associated with a cluster manager proxy, a connection with a cluster of computing devices, wherein initiating the connection includes providing first credentials to the cluster of computing devices to access the cluster manager proxy. The method further includes receiving, at the cluster manager proxy, a first request to register the cluster of computing devices with a cluster manager, the first request including the first credentials to access the cluster manager proxy and sending, from the cluster manager proxy to the cluster manager, a second request to register the cluster of computing devices with the cluster manager, the second request including second credentials to access the cluster manager.
LOCAL AREA NETWORK (LAN) DEVICE PRIVACY
Aspects of the present disclosure relate to wireless communications, and more particularly, to techniques for increasing local area network (LAN) device privacy. One aspect provides a method for wireless communications at an access point (AP). The method generally includes: determining a mapping between a first distribution system (DS) medium access control (MAC) address and a second DS MAC address; obtaining, from a source access terminal, a frame having the second DS MAC address; and sending at least a portion of the frame to a target access terminal based on the mapping between the first MAC address and the second MAC address.
GROUP IDENTITY ASSIGNMENT AND POLICY ENFORCEMENT FOR DEVICES WITHIN THE SAME NETWORK
Group identity assignment and policy enforcement may be provided. A User Defined Network Identifier (UDN ID) defining a group of client devices may be received. Next, a client identifier (ID) associated with a source client device that is associated with the group of client devices may be received. The UDN ID and the client ID may be encoded in an Extended Local Identifier (ELI) Media Access Control (MAC) address associated with the source client device. A source MAC address of a packet received from the source client device may then be substituted with the ELI MAC address. Then the packet may be forwarded.