H04L12/2859

Module unit for connecting a data bus subscriber

A module unit for connecting a data bus participant to a local bus. The module unit has a first input interface and a first output interface which can be connected to the local bus, a first data connection interface which can be connected to the data bus participant, and a first switch which is adapted so as to assume a first or a second switch state depending on a control input from the data bus participant, connect the first input interface to the first output interface in the first switch state, and connect the first data connection interface to the first output interface in the second switch state.

Coordinating pseudowire connection characteristics and multi-homed provider edge device capabtilities

A device may store first information regarding a first pseudowire connection with a first device, wherein the first pseudowire connection provides access to an Ethernet virtual private network (EVPN) to communicate with a host device. The device may store second information regarding a second pseudowire connection with a second device, wherein the second pseudowire connection provides access to the EVPN to communicate with the host device. The device may receive a message that includes a configuration identifier and identify the configuration identifier. The device may change a first characteristic of the first pseudowire connection based on the configuration identifier. The device may change a second characteristic of the second pseudowire connection based on the configuration identifier. The device may receive data from the host device based on changing the first characteristic of the first pseudowire connection and changing the second characteristic of the second pseudowire connection.

ENHANCED ENTROPY FOR A CONVERGED INTERCONNECT NETWORK
20220255861 · 2022-08-11 ·

Systems, methods, and computer-readable media are provided for introducing entropy in a Converged Interconnect Network. For instance, a remote physical layer device (RPD) can receive a first plurality of Internet Protocol (IP) addresses that are assigned to the RPD. The RPD can receive, from a Converged Cable Access Platform Core (CCAP-Core) device, a first data packet having a first destination IP address selected from the first plurality of IP addresses. The RPD can receive, from the CCAP-Core device, a second data packet having a second destination IP address selected from the first plurality of IP addresses. In some examples, a difference between the first destination IP address and the second destination IP address can cause a router disposed between the CCAP-Core device and the RPD to select a first route for the first data packet and a second route for the second data packet.

METHOD AND APPARATUS FOR DEFENDING AGAINST CYBER ATTACKS, RECEIVING DEVICE AND COMPUTER STORAGE MEDIUM
20220263859 · 2022-08-18 ·

Embodiments of the present disclosure provide a method and system for defending against cyber-attacks, and a computer storage medium. An apparatus for defending against cyber-attacks randomly generates a new keyword. The apparatus for defending against cyber-attacks transmits the new keyword to a transmitting device and a receiving device, respectively. The receiving device updates a keyword set of the receiving device to include the new keyword, acquires a keyword carried in a communication message transmitted by the transmitting device, and determines whether the communication message is a cyber-attack message according to the keyword carried and the keyword set. The receiving device discards the communication message in response to the communication message being determined to be a cyber-attack message.

Secured transport in remote MAC/PHY DAA architecture
11425110 · 2022-08-23 · ·

Exchanging encrypted packet payloads between a cable headend and a Remote MACPHY device. A single device executes a cable modem termination system (CMTS) implemented in software and not hardware. The software-implemented CMTS (i.e., a virtual CMTS) instantiates a tunnel to the Remote MACPHY device. The virtual CMTS encrypts the payloads of one or more packets and transmits those packets over the tunnel to the Remote MACPHY device. In similar fashion, the Remote MACPHY device may send packets with encrypted payloads to the virtual CMTS over the tunnel. In this way, encryption is not performed on a hop by hop basis, thereby allowing the payloads of packets to remain encrypted at all times during transmit through the tunnel.

VIRTUAL INTRANET ACCELERATION METHOD AND SYSTEM, CONFIGURATION METHOD, STORAGE MEDIUM, AND COMPUTER APPARATUS
20220109588 · 2022-04-07 ·

The present disclosure relates to a virtual Intranet acceleration method and system, a configuration method, a storage medium and a computer apparatus, pertaining to the field of SD-WAN and addressing the problem in which existing processing methods for preventing packet loss consume a large amount of resources and do not achieve a satisfactory results. The method comprises: upon receiving a TCP request sent from a server at an initiating end to a server at a receiving end, customer premise equipment (CPE) at the initiating end transmitting information of the TCP request to CPE at the receiving end; the CPE at the receiving end configuring a connection link between the server at the initiating end and the server at the receiving end according to the information of the TCP request; and transmitting the TCP request and/or TCP response data via the connection link. The technical solution provided by the present disclosure is applicable to data transmission between SD-WAN subsystems, and achieves transparency and acceleration of the TCP connection between the initiating end and the receiving end.

Resilient zero touch provisioning

An example branch gateway includes processing circuitry, memory including instructions, and a plurality of ports. The branch gateway transmits, from a plurality of ports, a first broadcast message. The branch gateway receives, in response to the first broadcast message, response messages on respective ports. The branch gateway determines, based on a receipt order of the response messages, an identifying address from a first response message. The branch gateway assigns the respective port for each response message to a unique VLAN. The branch gateway determines, for each port assigned to a unique VLAN, a link health parameter. The branch gateway selects a primary port to connect to an activation server of a WAN. The branch gateway selects a secondary port to connect to the activation server.

Distribution of data packet via overlay tunnel connecting multicast trees utilizing a fat tree network topology

In one embodiment, a method comprises causing, by an apparatus, establishment of first and second multicast trees within one or more underlay switching fabrics of one or more fat tree topologies, the first and second multicast trees comprising first and second multicast roots for multicast transmission to leaf network devices in the respective first and second multicast trees; causing, by the apparatus, establishment of an overlay tunnel between the first and second multicast roots, the overlay tunnel independent and distinct from the first and second multicast trees; causing the first multicast root to multicast transmit, via the first multicast tree, a data packet having been transmitted to the first multicast root; and causing the first multicast root to unicast transmit the data packet to the second multicast root via the overlay tunnel, for multicast transmission of the data packet by the second multicast root via the second multicast tree.

METHOD AND APPARATUS FOR ACCESSING GATEWAY
20220078122 · 2022-03-10 ·

This application discloses a method and an apparatus for accessing a gateway, and pertains to the field of communications technologies. A service level agreement (SLA) level may be obtained based on user information of a terminal, and further a user plane (UP) device corresponding to the terminal is determined based on the SLA level of the terminal. Thus, terminals with different SLA levels may be allocated to different UP devices for bearing, so that a specific terminal may access a specified UP device. This resolves a problem in a related technology that a terminal relatively randomly accesses a UP device. In addition, because an SLA level may be used to indicate a level of quality of service of a terminal, after terminals with different SLA levels access different UP devices, differentiated services may be provided on the different UP devices. Therefore, user requirements are met, and revenues are increased.

Redundant multicast tree in a fat tree network topology with anisotropic routing

In one embodiment, a method comprises identifying a fat tree network topology comprising top-of-fabric (ToF) switching devices, an intermediate layer of intermediate switching devices connected to each of the ToF switching devices, and a layer of leaf network devices; and causing a first leaf network device to initiate establishment of first and second redundant multicast trees for multicasting of data packets, including: causing first and second ToF switching devices to operate as roots of the first and second multicast trees according to first and second attribute types, respectively, causing the first leaf network device to select first and second of the intermediate switching devices as first and second flooding relays belonging to the first and second attribute types, respectively, and causing the first and second flooding relays to limit propagation of registration messages generated by the first leaf network device to the first and second ToF switching devices, respectively.