H04L2101/659

P2MP TREE CONNECTIVITY DETECTION METHOD, DEVICE, AND SYSTEM
20230155906 · 2023-05-18 ·

This application provides a P2MP tree connectivity detection method, a device, and a system. The method is applied to SR domain. The SR domain includes a P2MP tree. The P2MP tree includes a first node. The first node is a root node or an intermediate replication node of the P2MP tree. The method includes: The first node determines a first next-hop node of the first node based on replication branch information; and the first node sends a first request message to the first next-hop node. The first request message includes a segment identifier SID of the first next-hop node. The first request message includes a first identifier. The first identifier indicates that the first request message is for connectivity detection.

Ethernet virtual private network using segment routing

In one embodiment, Ethernet Virtual Private Network (EVPN) is implemented using Internet Protocol Version 6 (IPv6) Segment Routing (SRv6) underlay network and SRv6-enhanced Border Gateway Protocol (BGP) signaling. A particular route associated with a particular Internet Protocol Version 6 (IPv6) Segment Routing (SRv6) Segment Identifier (SID) is advertised in a particular route advertisement message of a routing protocol (e.g., BGP). The SID includes encoding representing a particular Ethernet Virtual Private Network (EVPN) Layer 2 (L2) flooding Segment Routing end function of the particular router and a particular Ethernet Segment Identifier (ESI), with the particular SID including a routable prefix to the particular router. The particular router receives a particular packet including the particular SID; and in response, the particular router performs the particular EVPN end function on the particular packet.

Attestation-based scheme for validating peering setups for critical infrastructure protocols

A verifier peer system transmits a request to an application of another peer system to obtain integrity data of the application. In response to the request, the verifier peer system obtains a response that includes kernel secure boot metrics of the other peer system and integrity data of the application and of any application dependencies. If the verifier peer system determines that the response is valid, the verifier peer system evaluates the integrity data and the kernel secure boot metrics against a set of Known Good Values to determine whether the integrity data and the kernel secure boot metrics are valid. If the integrity data and the kernel secure boot metrics are valid, the verifier peer system determines that the other peer system is trustworthy.

SUPPORTING DYNAMIC HOST CONFIGURATION PROTOCOL-BASED CUSTOMER PREMISES EQUIPMENT IN FIFTH GENERATION WIRELINE AND WIRELESS CONVERGENCE
20230146807 · 2023-05-11 ·

A device may receive, from a first network device, an authentication request that requests authentication of the device, and may provide, to the first network device, an authentication response that includes the authentication of the device. The device may provide, to the first network device and based on the authentication response, a PDU session establishment request that requests establishment of a PDU session for customer premises equipment, and may receive, from the first network device and based on the PDU session establishment request, a PDU session resource setup request that requests a resource to be established for the PDU session. The device may provide, to the first network device and based on the PDU session resource setup request, a PDU session resource setup response indicating that the resource is a GTP tunnel, and may establish the GTP tunnel with a second network device.

Systems and methods for advertising internet protocol (IP) version 4 network layer routing information with an IP version 6 Next Hop address
11658934 · 2023-05-23 · ·

A first network device associated with a network may establish an Internet protocol version 6 Multiprotocol BGP session with a second network device associated with the network. The first network device and second network device are both capable of forwarding both IPv4 and IPv6 packets with only an IPv6 address configured on the interface of both the first network device and second network device. The first network device may exchange Multiprotocol Reachability capability with second network device for corresponding 2-tuple Address Family Identifier/Subsequent Address Family Identifier. The first network device may advertise Internet protocol version 4 network layer reachability information and may advertise Internet protocol version 6 network layer reachability information with IPv6 extended next hop encoding using Internet Assigned Numbering Authority assigned capability code value 5 to second network device.

System, computer program, computer-readable medium and method for providing a redundant relay, particularly a routing function

A system, computer program, computer-readable medium and method for providing a redundant relay, particularly routing function in a network, wherein a superordinate subnetwork is connected to a subordinate subnetwork via redundant relays, particularly routers, a maximum of one of the redundant relays is operated in an active mode at any one time, while the remaining relay(s) are in standby mode, each redundant relay forms a relay redundancy module for controlling the relay mode and a DHCPv6 client for processing a prefix delegation, particularly in accordance with RFC 3633, and the redundant relays each include a relay control module, to which the relay redundancy module of the particular relay signals the current relay mode, and the relay control module of the active relay synchronizes a virtual DUID of its DHCPv6 client and/or a prefix delegated to the active relay to the (or each) relay in standby mode.

Segment Routing Network Signaling and Packet Processing

In one embodiment, a service chain data packet is instrumented as it is communicated among network nodes in a network providing service-level and/or networking operations visibility. The service chain data packet includes a particular header identifying a service group defining one or more service functions, and is a data packet and not a probe packet. A network node adds networking and/or service-layer operations data to the particular service chain data packet, such as, but not limited to, in the particular header. Such networking operations data includes a performance metric or attribute related to the transport of the particular service chain packet in the network. Such service-layer operations data includes a performance metric or attribute related to the service-level processing of the particular service chain data packet in the network.

INTELLIGENTLY ROUTING INTERNET TRAFFIC

A request from a client device is received at a first one of a plurality of compute nodes at a first one of a plurality of data centers of a distributed cloud computing network. A destination of the request is determined. An optimized route for transmitting the request toward an origin server that corresponds with the destination of the request is determined, where the optimized route is based on at least in part on probe data between data centers of the distributed cloud computing network for a plurality of transit connections, and where the optimized route has an IP address that encodes an identification of which of the plurality of transit connections is to be used to deliver the request. The request is transmitted to a next hop as defined by the optimized route over the identified one of the plurality of transit connections.

METHOD AND DEVICE FOR PROTECTING SENSITIVE USER PLANE TRAFFIC

Disclosed herein are a communication technique for merging, with an IoT technology, a 5G communication system for supporting a data transmission rate higher than that of a 4G system; and a system therefor.

Embodiments herein disclose a method of protecting sensitive user plane traffic in an User Equipment (UE) (100), the method comprising: transmitting, to a network (200), by the UE (100) a first NAS message comprising an indicator indicating that the UE (200) supports of a secure channel for domain name system (DNS); receiving, from the network (200), by the UE (100) a second NAS message including DNS server security information in response to transmitting the first NAS message; and transmitting, to the network (200), by the UE (100) the DNS over the secure channel based on the DNS server security information.

ADDRESS GENERATION FOR NETWORKS

A network includes at least two nodes that employ a routing protocol to communicate across a network. One of the nodes is a parent node and another of the nodes is a child node of the parent node. An address generator assigns a unique network address to the child node by appending an address value of a number of bits to a parent address of the parent node to create the unique network address for the child node.