Patent classifications
H04L12/4675
MAC address synchronization
A method, an apparatus and a VTEP for synchronizing MAC address are provided. According to the method, first mapping relationship configured on first aggregation/IPP port of first VTEP is notified to second VTEP in a same MLAG system. The second VTEP configures the relationship on second aggregation/IPP port of the second VETP. The relationship represents a mapping relationship of first tag ID of first port of the first VTEP to first VXLAN ID. Second tag ID of second port of the second VTEP differs from the first tag ID. The first VTEP receives a successful configuration message returned by the second VTEP after successfully configuring the relationship on the second IPP port. The first VTEP then sends first MAC address to the second IPP port via the first IPP port, wherein the first MAC address is the MAC address of a device accessing the first VTEP via the first port.
COMMUNICATION SYSTEM AND METHOD OF CHANGING A SETTING
A communication system comprises a plurality of network elements and a management apparatus. Each of the network elements transfers a data signal. The management apparatus manages a line service provided by a network element as management object among the plurality of network elements. The management apparatus generates an authentication code corresponding to the network element as management object and notifies the generated authentication code to the network element as management object. The network element as management object, using the notified authentication code, judges whether or not to accept a change concerning the line service of the own network element.
PACKET FORWARDING METHOD AND NETWORK DEVICE
A packet forwarding method and a network device are provided, and the method is applied to the network device. The network device includes a first virtual routing and forwarding (VRF) table and a second VRF table. The method includes: the network device receives a first packet. If the first packet carries tunnel attribute information, the network device forwards the first packet based on the first VRF table. The first VRF table includes one or more local routes, and next-hop outbound interfaces of the one or more local routes are all local outbound interfaces. The network device forwards the first packet based on the first VRF table, so that a packet from a tunnel may be forwarded to a local virtual machine for processing and may not be forwarded to another tunnel endpoint device, to avoid a routing loop during packet forwarding.
Packet Forwarding Method and Network Device
A packet forwarding method includes obtaining, by a network device, a first tunnel identifier of a first packet. When the first tunnel identifier is a first value, and forwarding, by the network device, the first packet based on a first routing group in a virtual routing and forwarding (VRF) table. The first routing group consists of one or more local routes, and each next-hop outbound interface of the one or more local routes is a local outbound interface. The network device forwards the packet based on a local routing group including only a local route in the VRF table such that the packet is forwarded to a local virtual machine for processing, and is not forwarded to another tunnel endpoint device during packet forwarding.
SERVICE AWARE VIRTUAL PRIVATE NETWORK FOR OPTIMIZED FORWARDING IN CLOUD NATIVE ENVIRONMENT
Techniques for defining a service flow definition among container pods that provide services in a network. The techniques may include an orchestrator of a computer network platform of the network determining which container pods need to communicate with which container pods. The service flow definition thus indicates needed paths between the container pods. In configurations, a cluster topology may be determined where the cluster topology indicates corresponding nodes of the network in which each container pod is located, as well as end points of the network with which the corresponding nodes communicate. Based at least in part on the service flow definition and the cluster topology, corresponding route distribution policies may be determined for the end points. The corresponding route distribution policies may be applied to the end points.
PACKET FORWARDING METHOD AND NETWORK DEVICE
This application provides a packet forwarding method and a network device. The method specifically includes: A first network device forwards a first packet from a second network device to a corresponding local virtual machine based on the virtual network identifier in the first packet, and does not need to forward the packet according to a virtual routing and forwarding VRF table. This prevents the packet from being forwarded to another network device again, and ensures normal forwarding of the packet.
Methods for accessing data in a compressed file system and devices thereof
A method, computer readable medium, and network traffic management apparatus that accesses data in a compressed file system includes obtaining an original write request from a client computing device including at least object data. The object data is compressed into a plurality of compressed blocks. A mapping of each compressed block to a portion of the object data compressed therein is generated, wherein the portion of the object data compressed therein is represented in the mapping by a unique object identifier, a start offset, and a length. The compressed blocks and the mapping are stored in at least one data storage device. At least one data access request for at least a portion of the object data is serviced based on the mapping.
On premises, remotely managed, host computers for virtual desktops
Virtual desktops are hosted on one or more remote desktop hosts at one or more private locations of an enterprise, remote from a service provider location, and behind a firewall on a private computer network. The desktops are remotely managed through resources at a service provider data center, optionally along with other virtual desktops hosted on desktop hosts at the service provider data center. The remote desktop hosts can be pre-configured with known storage, compute and connectivity resources. The remote desktop hosts can be remotely managed through a resource management appliance, i.e., a management system running resource management software, which can be located at either the service provider data center or the tenant data center.
MANUFACTURING LINE COMPUTER SYSTEM AND NETWORK SETUP METHOD OF THE SAME
Disclosed herein is a manufacturing line computer system including: first and second computers. The first computer includes a storage section adapted to store a template that associates role information of the second computer and a network address of the second computer; and a reply section adapted to return the network address of the second computer associated with the role information to the second computer in response to reception of the role information from the second computer. The second computer includes an input section adapted to input the role information of the second computer; a transmission section adapted to send the input role information of the second computer to the first computer; and a network address setup section adapted to specify the network address, returned from the first computer, for the second computer.
System and method for creating encrypted virtual private network hotspot
System and method for extending zones of control through a hotspot for communications to and from computing devices based on specific criteria corresponding to zones of control. An encrypted virtual private network (VPN) for a browsing session may be established at a first computing device and remote server computers matching the parameters of the established zone. Then, a user of the first computing device may further establish a wireless hotspot network suited to allow additional remote computing devices to piggy-back on the one or more established encrypted virtual private networks. Thus, other connected devices using the hotspot connection to reach a broader computer network (e.g., the Internet) are then also taking advantage of the encrypted VPN being provided by the host of the hotspot. Each connected computing device may then also have various communications isolated through zonal control from the hotspot device.