H04L12/703

Conflict avoidant traffic routing in a network environment

An example method for facilitating conflict avoidant traffic routing in a network environment is provided and includes detecting, at a network element, an intent conflict at a peer network element in a network, and changing a forwarding decision at the network element to steer traffic around the conflicted peer network element. The intent conflict refers to an incompatibility between an asserted intent associated with the traffic and an implemented intent associated with the traffic. In specific embodiments, the detecting includes mounting rules from the peer network element into the network element, and analyzing the mounted rules to determine intent conflict. In some embodiments, a central controller in the network deploys one or more intentlets on a plurality of network elements in the network according to corresponding intent deployment parameters.

Method and apparatus for optimal, scale independent failover redundancy infrastructure

Exemplary methods performed by a first network device (ND) include generating first and second prefix entries associating incoming Internet Protocol (IP) traffic to first and second data structures (DSs), respectively. Generating the first DS includes generating a first proxy including forwarding information causing incoming IP traffic to be forwarded to a second ND, and generating a second proxy referencing a third DS. Generating the second DS includes generating a first proxy including forwarding information causing incoming IP traffic to be forwarded to the second ND, and generating a second proxy referencing the third DS. The methods include generating the third DS including forwarding information causing the incoming IP traffic to be forwarded to a third ND, the third DS further including first state information indicating whether the forwarding information included in the first proxies of the first and second DSs should be used for forwarding the incoming IP traffic.

FAILURE HANDLING FOR ACTIVE-STANDBY REDUNDANCY IN EVPN DATA CENTER INTERCONNECT

Techniques are described for avoiding traffic black-holing in a multi-homed Ethernet virtual private networks (EVPNs) in which a customer device (CE) is multi-homed to a plurality of multi-homing provider edge devices (PEs) via respective links of an Ethernet segment. An overlay network is created over the Ethernet segment, and the multi-homing PEs of the EVPN are configured with a common anycast IP address for respective virtual network interfaces. Upon election as active designated forwarder (DF) for the EVPN, the DF PE of the multi-homing PEs advertises toward the customer network an IGP metric for the anycast IP address that is lower than the IGP metric(s) advertised by any of the non-DF standby PE routers segment to direct the CE to forward network packets from the customer network to the DF PE over the respective link of the Ethernet segment.

NON-TRANSITORY COMPUTER READABLE RECORDING MEDIUM, COMMUNICATION METHOD AND COMMUNICATION DEVICE
20170289023 · 2017-10-05 · ·

A non-transitory computer readable recording medium storing therein a communication program, the communication program relaying communication from an application operating on a terminal to a communication destination and causing a computer to execute a process, the process including: switching a communication protocol for the communication from a first protocol to a Delay/Disruption Tolerant Networking (DTN) protocol, in accordance with a connection condition with the communication destination for the communication; and notifying the terminal of a failure of a specific communication in cases when the specific communication has been notified to the application as completed and the specific communication in the DTN protocol results in failure.

MULTI-PATH VIRTUAL SWITCHING
20170289067 · 2017-10-05 ·

A virtual switch for packet switching includes an ingress traffic steering manager executing on circuitry and coupled to receive packets from multiple virtual machines or containers, multiple data plane providers, each data plane provider having a data path coupled to selectively receive the packets from the ingress traffic steering manager, and wherein the ingress traffic steering manager classifies the received packets and selects available data paths based on the classification of the packets and a set of distribution rules.

Wireless home network routing protocol
09781031 · 2017-10-03 · ·

An example method for a device to implement one of the nodes in a wireless network for processing packets includes submitting a request to a network-management system in the network to become a node in the network, after having registered with the network-management system, determining neighboring nodes, flooding the wireless network with a link-state advertisement, the link-state advertisement providing neighboring relationships of the node, constructing switching rules for the node based on a tree switching network portion of the network, processing the packets received by the node with the switching rules, the switching rules defining at least one of (1) an ingress link to a parent node with a power capability greater than the node and (2) egress links to child nodes with a mobility greater than the node, and in response to having determined a failed link to a neighboring node, informing a node at the end of an ingress wireless link and the network-management system of the failed link.

Fast re-route protection using GRE over MPLS
09781030 · 2017-10-03 · ·

Techniques are described for providing fast re-route (FRR) node and/or link protection along a primary label switched path (LSP) using generic routing encapsulation (GRE) over multi-protocol label switching (MPLS). An ingress edge router of a primary LSP is configured to encapsulate incoming packets into GRE with a destination address of an egress edge router of the primary LSP, and push a primary label onto the encapsulated packet for forwarding along the primary LSP. Upon a failover to a bypass LSP, a point of local repair (PLR) router swaps the primary label on the encapsulated packet with a bypass label. A merge point (MP) router then receives the encapsulated packet via the bypass LSP, and performs a lookup using the destination address of the egress edge router included on the encapsulated packet in order to determine a primary label for forwarding the encapsulated packet along the primary LSP.

Pseudowire protection using a standby pseudowire
09749249 · 2017-08-29 · ·

Providing protection to network traffic includes sending a Pseudowire protection configuration parameter for configuring a standby Pseudowire between a source node and a destination node, receiving a Pseudowire configuration acknowledgement indicating whether the Pseudowire protection configuration parameter has been accepted by the destination node, and in the event that the Pseudowire protection configuration parameter has been accepted by the destination node, using the standby Pseudowire, wherein the standby Pseudowire's configured based at least in part on the Pseudowire protection configuration parameter.

System and method for selecting a content delivery network

A system and method for selecting a data delivery network. A determination is made of user information associated with a communication from a user. A determination is made of performance information for multiple data delivery networks. The data delivery network is selected for the communication from the multiple data delivery networks.

Method and system for information interaction among systems in the same end in DRNI

Disclosed are a method and system for information interaction between systems in a same portal in a distributed resilient network interconnection, wherein the method is applied to each system in an portal in a link aggregation group, including: sending a distributed relay control protocol (DRCP) message through an intra-portal interface, wherein at least system information of a present system is carried; after receiving a DRCP message sent by an adjacent system, if it is determined that the present system and the adjacent system can form one portal in the distributed resilient network interconnection, determining an operational Key value of the present system. The system includes: a sending state machine, a receiving state machine, a negotiating state machine, a synchronizing state machine and a periodic sending state machine.