Patent classifications
H04L12/715
Individual Virtual Private Local Area Network Service Conversion to a Different Virtual Private Network Service
In one embodiment, a plurality of virtual private local area network services (VPLSs) are operated among a plurality of packet switching devices, with the plurality of VPLSs including a first VPLS and a different second VPLS. In response to a conversion declaration including a particular Service Instance VLAN ID (I-SID), the first VPLS corresponding to the particular I-SID is converted to a different type of virtual private network (VPN) service, while continuing to operate the different second VPLS which is not related to the particular I-SID. In one embodiment, the different type of VPN service is Provider Backbone Bridging Ethernet VPN (PBB-EVPN). In one embodiment, the conversion declaration is a Border Gateway Protocol (BGP) Network Layer Reachability Information (NLRI) of Route Type 3 Inclusive Multicast Ethernet Tag (IMET) route.
Hierarchical hardware linked list approach for multicast replication engine in a network ASIC
A multicast rule is represented in a hierarchical linked list with N tiers. Each tier or level in the hierarchical linked list corresponds to a network layer of a network stack that requires replication. Redundant groups in each tier are eliminated such that the groups in each tier are stored exactly once in a replication table. A multicast replication engine traverses the hierarchical linked list and replicates a packet according to each node in the hierarchical linked list.
Overlay network
An overlay network is contemplated. The overlay network may be characterized as supporting, or at least virtually supporting, separate networks over a common infrastructure. The common infrastructure may be comprised of a plurality of routers or other devices configured to facilitate directing messages according to various addressing requirements. The use of the separate networks may be dictated according to the particular addressing requirements of each message desired for transport.
Emergency services routing proxy cluster management
Systems and methods for clustering emergency services routing proxies are provided. The described features allow a group of ESRPs running as individual servers or a group of virtual servers, to be referenced using a single URI. In one implementation, an emergency services routing proxy device includes an emergency services routing proxy node configured to route a call to a downstream entity, the call received from an upstream entity. The device further includes a cluster manager configured to receive registration information from the emergency services routing proxy node, the registration information including a routing service identifier. The cluster manager may be further configured to identify the emergency services routing proxy node for call routing based on a comparison of an identifier included in the call with the routing service identifier.
System and method for supporting partition-aware routing in a multi-tenant cluster environment
A system and method can support partition-aware routing in a multi-tenant cluster environment. An exemplary method can support one or more tenants within the multi-tenant cluster environment. The method can associate each of the one or more tenants with a partition of a plurality of partitions. The method can then associate each of the plurality of partitions with one or more nodes of a plurality of nodes, each of the plurality of nodes being associated with a leaf switch of a plurality of switches, the plurality of switches comprising a plurality of leaf switches and a plurality of root switches. Finally, the method can generate one or more linear forwarding tables, the one or more linear forwarding tables providing isolation between the plurality of partitions, wherein each of the plurality of nodes is associated with a partitioning order.
Symmetric routing enforcement
A method enabling symmetric routing between a first host within a first AS and a second host within a second AS is disclosed. The method includes detecting that a first routing message was received at an edge router of the first AS from an edge router of the second AS. The first message identifies the second host as a source and the first host as a destination of a forward route. The method further includes determining that the first message further comprises an indication to implement symmetric routing between the first and second hosts and generating a second routing message for propagating to router(s) within the first AS. The second message identifies the first host as a source and the second host as a destination of a return route, and indicates that data is to be sent via the edge router of the first AS that received the first message.
Adjusting communication capacity in a multi-stage routing network
A method for adjusting capacity in a multi-stage routing network includes monitoring a number of available connections between a router in a first stage of a multi-stage router network and one or more routers in a second stage of the multi-stage router network. Each of the stages of the multi-stage router network may include a plurality of routers. The method may also include detecting that the number of available connections falls below a threshold number. A notification can be sent to one or more routers in a third stage of the multi-stage router network that the router in the first stage is deprioritized. The one or more routers in the third stage can be operated so that communications to the first stage are routed to one or more other routers in the first stage.
DATA FORWARDING METHOD, DEVICE, AND SYSTEM IN SOFTWARE-DEFINED NETWORKING
Data forwarding method, device, and system are provided for software-defined networking. An SDN control device delivers a proactive flow entry according to network topology information, where the proactive flow entry is unrelated to a service, and instead related to the network topology information. The proactive flow entry may be reused during data forwarding. After data is received, the SDN control device delivers reactive flow entries to some switching devices, where the reactive flow entries are related to the service, but are delivered to a subset of switching devices. This reduces flow entries delivered by the SDN control device to some switching devices, so that occupation of resources of the SDN control device and a switching device by flow entries is reduced.
System and Method for Implementing Network Experience Shifting
Novel tools and techniques are provided for implementing network experience shifting, and, in particular embodiments, using either a roaming or portable hypervisor associated with a user or a local hypervisor unassociated with the user. In some embodiments, a network node in a first network might receive, via a first network access device in a second network, a request from a user device to establish roaming network access, and might authenticate a user associated with the user device, the user being unassociated with the first network access device. Based on a determination that the user is authorized to access data, content, profiles, and/or software applications that are accessible via a second network access device, the network node might establish a secure private connection through a hypervisor or container communicatively coupled to the first network access device to provide the user with access to her data, content, profiles, and/or software applications.
ADDRESS SHARING
A plurality of network nodes are configured to form a virtual logical network over a plurality of broadcast domains. Configuring the virtual logical network includes configuring at least one of the nodes in the plurality of nodes to broadcast routes to IP addresses hosted on nodes in the plurality of network nodes between nodes in the plurality of broadcast domains. A primary workload hosted on a first node in the plurality of nodes is configured to share ownership of an IP address with a secondary workload hosted on a second node in the plurality of nodes. In response to detecting a failure indication associated with the primary workload, an IP address failover procedure for the shared IP address is performed between the primary workload and the secondary workload.