H04L12/707

Multi-homing in an extended bridge

Disclosed are various embodiments for multi-homing in an extended bridge, including both multi-homing of port extenders and multi-homing of end stations. In various embodiments, a controlling bridge device receives a packet via an ingress virtual port and determines a destination virtual port link aggregation group based at least in part on a destination media access control (MAC) address of an end station in the packet. The controlling bridge device selects one of multiple egress virtual ports of the destination virtual port link aggregation group. The end station of the extended bridge is reachable through any of the egress virtual ports of the destination virtual port link aggregation group. The controlling bridge device forwards the packet through the selected egress virtual port, and the forwarded packet includes an identifier of a destination virtual port to which the end station is connected.

Method and apparatus for fast reroute, control plane and forwarding plane synchronization

Exemplary methods include generating a first fast reroute (FRR) next hop (NH) comprising of a first primary next hop (PNH), a first secondary next hop (SNH), and a first attribute, wherein the first PNH and first SNH include forwarding information that causes traffic to be forwarded towards a second and third network device, respectively. The methods include sending a first request to a forwarding plane to generate a second FRR NH comprising of a second PNH, a second SNH, and a second attribute. The methods include updating contents of the first FRR NH, and sending a second request to the forwarding plane to update the second FRR NH, wherein the second request causes the forwarding plane to determine whether to revert back to using the second PNH based on whether the first attribute included in the second request is different from the second attribute of the second FRR NH.

Dynamically adjusting load balancing

Some embodiments provide a novel method for load balancing data messages that are sent by a source compute node (SCN) to one or more different groups of destination compute nodes (DCNs). In some embodiments, the method deploys a load balancer in the source compute node's egress datapath. This load balancer receives each data message sent from the source compute node, and determines whether the data message is addressed to one of the DCN groups for which the load balancer spreads the data traffic to balance the load across (e.g., data traffic directed to) the DCNs in the group. When the received data message is not addressed to one of the load balanced DCN groups, the load balancer forwards the received data message to its addressed destination. On the other hand, when the received data message is addressed to one of load balancer's DCN groups, the load balancer identifies a DCN in the addressed DCN group that should receive the data message, and directs the data message to the identified DCN. To direct the data message to the identified DCN, the load balancer in some embodiments changes the destination address (e.g., the destination IP address, destination port, destination MAC address, etc.) in the data message from the address of the identified DCN group to the address (e.g., the destination IP address) of the identified DCN.

Adaptive network function chaining

Disclosed herein are system, method, and computer program product embodiments for dynamically applying network functions to traffic flows based on heuristics, policy conditions and client-specified conditions. A network monitors a network traffic flow to determine whether the network traffic flow meets a first criterion of a first rule. The criterion specifies that when the first criterion is met a network function be used to analyze or process the network traffic flow. When the network traffic flow is determined to meet the first criterion, the network determines a first route through the network to a network function provider that provides the network function and configures one or more routers along the first route to forward the network traffic flow to the network function provider for analysis or processing.

Method, Device, and System for Deferring Switchback
20170272358 · 2017-09-21 ·

A method, a device, and a system for deferring a switchback. A first network device sends a query packet to a second network device, detects, according to the query packet, whether a route from the second network device to a destination device is available after receiving the query packet, and when it is available, the second network device sends a query response packet to the first network device in order to trigger the first network device to switch back from a secondary route to a primary route. The technical solution provided reduces a wait-to-restore time of the switchback, ensures that service data transmitted from the first network device to the second network device can be transmitted to the destination device, and facilitates smooth transmission of the service data.

Path selection based on error analysis

Embodiments of the present invention include systems and methods for optimizing data flow in a network. The system for distributing data flow in a network includes a controller that receives, from a set of nodes coupled through the network, information of errors at the ports of each node through an input-output (IO) port. The controller compiles the information of errors to assign credits to links coupled to the ports; determines, based on the credits, how to distribute data flow in the network; generates a control signal for controlling the ports; and sends the control signal to the set of nodes through the IO port. The set of nodes controls the ports according to the control signal.

Adjusting control-plane allocation of packet processing resources

In one embodiment, configurable policy-based processing of packets is performed, including, but not limited to, using user-configurable parameters to adjust control-plane allocation of resources used in processing of packets. In one embodiment, these resources include, but are not limited to, processing by fast path or slow path forwarding of packets; forwarding information base (FIB) entries, databases, and hardware processing elements; instantiation of sub-FIB databases; and/or selection of sub-FIB data plane entries for population of sub-FIB databases, a group of FIB entries is label switched traffic, fully expanded Internet Protocol routes, loopback addresses of packet switching devices in the network, label-switched to label-switched traffic, Internet Protocol (IP) to label-switched traffic, IP to IP traffic, and/or label to IP traffic. In one embodiment, a group of the plurality of different groups of FIB entries is defined upon how a route or label corresponding to a FIB entry was learned.

Traffic surge management for points of presence

A system, method, and computer-readable medium for point of presence (POP) based traffic surge detection and mitigation are provided. The system detects a traffic surge for a target group of resources directed at a source POP based on the target group's rank shifts and volume changes among recent time intervals. The system mitigates the detected traffic surge by identifying destination POPs with spare capacity and routing at least a portion of incoming requests for the target group of resources to the destination POPs in accordance with their spare capacities.

Cooperative subspace demultiplexing in content delivery networks
09819449 · 2017-11-14 · ·

A source node selects a plurality of original data components to transfer to at least one destination node. A plurality of transmitting nodes cooperatively encodes the original data components to generate a plurality of subspace coded components and a corresponding code matrix. Each of the transmitting nodes transmits a subset of the plurality of subspace coded components and corresponding code matrix, wherein at least one of the transmitting nodes has a rank that is insufficient for decoding the plurality of subspace coded components. A destination node may employ a plurality of receiving nodes to cooperatively receive a plurality of subspace coded components and their corresponding code vectors, wherein the rank of at least one of the receiving nodes is insufficient for decoding the subspace coded components. The destination node builds up the dimension of the subspace spanned by code vectors it collects from the receiving nodes and then decodes the subspace coded components.

SIGNALING MONITORING METHOD AND SYSTEM
20170272350 · 2017-09-21 ·

Provided are a signaling monitoring method and system. In the method, multi-path network signalings are accessed, and one or multiple key control signalings are acquired from the acquired multi-path network signalings; the one or multiple key control signalings are analyzed to acquire and share whole-network key control information; and the multi-path network signalings are managed and distributed by utilizing the acquired whole-network key control information. Since each access point has an identical whole-network control table consisting of the whole-network key control information, the technical solution can distribute user plane signalings and control plane signalings per a user to each data analysis center according to the whole-network control table, thus ensuring the control plane and user plane signalings related to the user to be distributed to the same data analysis center.