Patent classifications
H04L12/743
DISTRIBUTION OF NETWORK TRAFFIC TO SOFTWARE DEFINED NETWORK BASED PROBES
In one example, a processor may receive network traffic from a demultiplexer via a first network interface card and place portions of the network traffic into a plurality of hash buckets. The processor may further process a first portion of the portions of the network traffic in at least a first hash bucket of the plurality of hash buckets and forward a second portion of the portions of the network traffic in at least a second hash bucket of the plurality of hash buckets to a switch via a second network interface card. In one example, the switch distributes the second portion of the network traffic to one of a plurality of overflow probes. In one example, the plurality of overflow probes comprises a network function virtualization infrastructure for processing the second portion of the network traffic.
BLOCKCHAIN NODE SYNCHRONIZATION METHOD AND DEVICE USING TRUST MECHANISM
The present application proposes a blockchain node synchronization method and device using a trust mechanism. The method comprises: acquiring data throughput history data of each node in a routing table of a node to be synchronized; acquiring synchronization success rate history data of each node in the routing table of the node to be synchronized; acquiring a total difficulty value of a blockchain currently stored by each node in the routing table of the node to be synchronized; determining a credibility of each node in the routing table according to the data throughput history data, the synchronization success rate history data, and the total difficulty value of the blockchain; and selecting, according to the credibility of each node, a target node for synchronization, and synchronizing, according to blockchain data stored by the target node, the node to be synchronized.
Forwarding table entry access
A method for accessing a forwarding entry and a network device are provided. In an example, a cache receives, from a forwarding component, an entry reading command which carries a storage address in a storage of a first forwarding entry to be read. The cache locally searches for a first Hash bucket in a valid state according to the storage address of the first forwarding entry, the first Hash bucket containing a storage address identical to that of the first forwarding entry. If the first Hash bucket is found, the cache transmits, to the forwarding component, the first forwarding entry cached in cache space corresponding to the first Hash bucket. If not found, the cache reads the first forwarding entry from the storage and transmits the first forwarding entry to the forwarding component when the first Hash bucket is not found.
Storing data in association with a key within a hash table and retrieving the data from the hash table using the key
Computer-implemented methods and systems are provided for storing data in association with a key within a hash table and for retrieving the data from the hah table using the key. The hash table comprises a plurality of storage tables. Each of the storage tables is associated with a respective primary hashing function for determining which of a plurality of buckets of the storage table should be used for storing data associated with a particular key. Each of the buckets is configured to store a limited number of elements. Each element comprises respective stored data and a representation of the respective key associated with the stored data. Each of the storage tables is further associated with a respective secondary hashing function with which the representations of the keys of the elements of that storage table are generated. The secondary hashing function for each of the storage tables is the primary hashing function for at least one of the other storage tables.
TRANSFER CONTROL DEVICE, TRANSFER CONTROL METHOD, SERVICE PROVISION SYSTEM, AND TRANSFER CONTROL PROGRAM
To provide a transfer control apparatus, a transfer control method, and a transfer control program, by which it is possible to improve availability without modifying an application side. The transfer control apparatus 1 is an apparatus for dynamically switching enablers 2, and includes a registration unit 11 that registers enablers 2 having a similar function, in an identical genre, a monitoring unit 12 that monitors states of the enablers 2, and a transfer control unit 13 that transfers a request to an alternative enabler 2 registered in a genre identical to each of the enablers 2 to automatically switch a request destination if the enabler 2 is in a predetermined busy state upon calling the enabler 2.
Technologies for managing exact match hash table growth
Technologies for managing exact match hash table growth include a network computing device which includes a compute engine and a network interface controller (NIC). The NIC is configured to allocate a plurality of physical bucket addresses in non-contiguous chunks of memory of the compute engine, configure a bucket threshold value as a function of a hash size of the hash table, generate a plurality of virtual bucket addresses as a function of the bucket threshold value, and map each generated virtual bucket address to an allocated physical bucket address. Other embodiments are described herein.
Packet forwarding method, device, switch, apparatus, and storage medium
A method, apparatus, switch, device for packet forwarding and storage medium are disclosed. The method includes: obtaining a packet to be forwarded; detecting whether a first data table contains connection cache information corresponding to the packet; obtaining a first identifier of the connection cache information from the first data table if the first data table contains the connection cache information corresponding to the packet; obtaining connection information corresponding to the connection cache information from a second data table, and determining a second identifier of the connection cache information, wherein the second identifier is a current connection identifier corresponding to the connection cache information and changes when the connection information changes; and forwarding the packet based on the connection cache information if the second identifier is the same as the first identifier. The method for packet forwarding according an embodiment of the present application can reduce errors in packet forwarding.
Flexible processing of network packets
Aspects of this disclosure describes techniques for parsing network packets, processing network packets, and modifying network packets before forwarding the modified network packets over a network. The present disclosure describes a system that, in some examples, parses network packets, generates data describing or specifying attributes of the network packet, identifies operations to be performed when processing a network packet, performs the identified operations, generates data describing or specifying how to modify and/or forward the network packet, modifies the network packet, and outputs the modified packet to another device or system, such as a switch.
Intelligent and dynamic overlay tunnel formation via automatic discovery of citrivity/SDWAN peer in the datapath in a pure plug and play environment with zero networking
Described embodiments provide systems and methods of forming overlay tunnels for delivery of data between networked devices. A first intermediary device may transmit, responsive to a connection request from a client, a request having a source IP address corresponding to a first virtual IP address of the first device and a first payload including first security hash information to be processed by a second intermediary device. The first device may receive, from the second intermediary device, a response. The response may have a source IP address corresponding to the IP address of the server and a second payload including a virtual IP address of the second device, responsive to second security hash information corresponding to the first security hash information. The first device may establish an overlay tunnel using the first virtual IP address and the second virtual IP address for communicating data between the client and the server.
Router methods and apparatus for managing memory for network overlay routes with fallback route support prioritization
A method and a router device for managing memory for network overlay routes with fallback route support prioritization may be provided. A network overlay route as a candidate network overlay route may be obtained at a router for storage in a memory. The memory may store a plurality of network overlay routes for forwarding user plane traffic in a network. An assessment for storage of the candidate network overlay route based on a priority level indicator of the candidate network overlay route may be performed. The priority level indicator may be indicative of a fallback route support level of the candidate network overlay route in the router. Based on the assessment, at least one of the following may be performed: adding the candidate network overlay route to the memory and refraining from adding the candidate network overlay route to the memory.