Patent classifications
H04L2101/622
Virtual machine migration downtime reduction using a multicast address
A migration process for migration of a virtual machine from a source host to a destination host has initiated is determined. The source host and the destination host are part of a network. A multicast address that is mapped to a group comprising the source host and the destination host is obtained. Host in the network to begin encapsulating packets addressed to the virtual machine and send the encapsulated packets using the multicast address in a destination address field of the encapsulated packets is notified.
Identifying ephemeral computing assets using machine learning
Disclosed herein are methods, systems, processes, and machine learning models for identifying ephemeral or short lived computing assets in a network. Data indicative of potential ephemeralness associated with the computing assets in the network is received. The received data is processed and provided as input to a logistic machine learning model trainer for classification based on logistic regression. The logistic machine learning model trainer classifies each computing asset as ephemeral or non-ephemeral based on one or more ephemeralness feature characteristics of each of the computing assets that are part of input data. The logistic machine learning model trainer generates a trained logistic machine learning model for identifying new ephemeral computing assets in the network and excluding these new ephemeral computing assets from security operations. The logistic machine learning model is then stored for automatically determining whether a new computing asset in the network is ephemeral.
NETWORK DEVICE AND MEDIA ACCESS CONTROL ADDRESS LEARNING METHOD THEREFOR
A Media Access Control address (MAC) learning method includes: parsing out packet header and packet verification parameter of a packet from an input/output port; generating a port identifier corresponding to the input/output port; starting first-stage procedure for the packet header; and starting second-stage procedure for the packet verification parameter. The first-stage procedure includes: performing, according to a MAC forwarding table and the port identifier, learning processing for source MAC address of the packet header to generate learning result; generating status parameter according to the learning result; and associating and storing the status parameter, the port identifier, and a hash address corresponding to the source MAC address into a memory. The second-stage procedure includes: obtaining the status parameter and the hash address from the memory according to the port identifier; and updating the MAC forwarding table according to the packet verification parameter, the obtained status parameter, and the obtained hash address.
NETWORK FABRIC DEPLOYMENT SYSTEM
A network fabric deployment system includes a fabric deployment management system that is coupled to a DHCP server. The fabric deployment management system generates a cloud-based network fabric that is based on a network fabric topology file and that includes a plurality of cloud-based networking devices that are assigned a physical networking device identifier that identifies a corresponding physical networking device. The fabric deployment management system configures and validates each of the plurality of cloud-based networking devices causing each physical networking device identifier being mapped to an IP address at the DHCP server and then retrieves a deployment image file from each of the plurality of cloud-based networking devices that have been configured and validated, and stores each of the deployment image files in a database in association with the physical networking device identifier such that the corresponding physical networking device boots from that deployment image file.
Private allocated networks over shared communications infrastructure
Methods and systems for implementing private allocated networks in a virtual infrastructure are presented. One method operation creates virtual switches in one or more hosts in the virtual infrastructure. Each port in the virtual switches is associated with a private allocated network (PAN) from a group of possible PANs. In one embodiment, one or more PANs share the same physical media for data transmission. The intranet traffic within each PAN is not visible to nodes that are not connected to the each PAN. In another operation, the method defines addressing mode tables for the intranet traffic within each PAN. The entries in the addressing mode tables define addressing functions for routing the intranet traffic between the virtual switches, and different types of addressing functions are supported by the virtual switches.
FAILURE DETECTION AND MITIGATION IN AN MC-LAG ENVIRONMENT
In an example, a failure event is detected in a network, where the failure event is indicative of a network outage in a network device or a peer network device of an MC-LAG. The network device and the peer network device may be configured as a first VTEP in an overlay network. It may be determined that reprovisioning of virtual tunnels in the network device is incomplete. State parameters between the network device and the peer network device is synchronized. The set of virtual tunnels in the network device is provisioned based on the state parameters. After completion of provisioning of the virtual tunnels, an IP address of the first VTEP is published to underlay network devices connecting the first VTEP to a second VTEP over an underlay network. Subsequently, communication links between the MC-LAG and a host device is enabled.
Network authorization in web-based or single sign-on authentication environments
Systems and methods for network authorization are described herein. An example method can include receiving a user credential from a host device connected to a network, authenticating the user credential, and in response to authenticating the user credential, determining an authorization policy associated with the host device. The method can also include polling a network overlay control plane of the network to obtain a network location information associated with the host device, identifying at least one network device of the network using the network location information, and transmitting the authorization policy to the at least one network device.
Identifying and controlling remote user equipment on network side
A method for identifying and controlling remote user equipment on a network side includes: receiving, by a session management device, an identifier of a remote user equipment, and generating, based on the identifier, a policy related to the remote user equipment, where the policy includes the identifier of the remote user equipment; sending the policy to a user plane function device; and identifying, by the user plane function device, a packet of the remote user equipment based on the policy, and implementing policy control on the remote user equipment based on the policy. According to the method, the network side can be compatible with service access of the remote user equipment and can perform service management and policy control on the remote user equipment.
Packet flow monitoring device, packet data extraction device, extraction data aggregation device, and program
A packet flow monitoring device, a packet data extraction device, an extraction data aggregation device, and a program for efficiently and highly accurately monitoring a packet flow in a video or audio communication system constructed by an Ethernet (registered trademark) frame or IP packet network. This packet flow monitoring device includes: a packet data extraction device that replicates all passing packets that pass through one or a plurality of specific network switches on the network and extracts and aggregates some predetermined pieces of information in the replicated passing packets to form and output an extraction data report packet; and an extraction data aggregation device that receives the extraction data report packet, analyzes the extraction data report packet so as to aggregate the predetermined pieces of information in the replicated passing packets included in the extraction data report packet for each packet flow, and records the aggregated information as aggregation data.
Method for Robust Communication Between Nodes That Are Adjacent At Layer 3
A method for communication between nodes, where the method includes: constructing, by a first Layer 3 node, a link local control frame; adding, by the first Layer 3 node, a destination group Media Access Control (MAC) address to the link local control frame, wherein the destination group MAC address is outside a block of destination group MAC addresses assigned for Ethernet bridging purposes; and transmitting, by the first Layer 3 node, the link local control frame to a second Layer 3 node.