H04L12/761

Configuration of networks using switch device access of remote server
11201814 · 2021-12-14 · ·

Implementations relate to configuration of networks using switch device access of a remote server. In some implementations, a method includes sending a request from an edge configuration device to an access control server, where the request requests shortest path bridging (SPB) configuration information for a detected end device connected to the edge configuration device, and where the edge configuration device is connected to an SPB network. The method receives at the edge configuration device the SPB configuration information for the end device from the access control server. The edge configuration device is configured to provide the end device access to the SPB network.

DIRECTED BROADCAST IN NETWORK FABRIC

This technology enables directed broadcasts in network fabrics. To enable a directed broadcast, a control plane node is configured to resolve directed broadcast addresses by mapping the directed broadcast address to a subnet address associated with the network fabric. A fabric border node receives a directed broadcast, extracts a destination address associated with the directed broadcast, and transmits a request to the control plane node to resolve the destination address. The control plane node retrieves the stored mapping and generates a map reply to the fabric border node with a multicast destination comprising the network fabric subnet address. The fabric border node encapsulates the directed broadcast with a header comprising the multicast destination and forwards the encapsulated directed broadcast to fabric edge nodes, which decapsulate the directed broadcast and deliver a data set from the directed broadcast to appropriate end point devices.

System And Method For Bypassing A Content Delivery Network (CDN)

Systems, methods, and devices for delivering content (e.g., multimedia streams, video files, documents, images, text, operating system updates, app store downloads, etc.) from a content source to one or more receiver devices over an internet protocol (IP) network. Network devices may be configured to bypass a content delivery network (CDN) to deliver a bulk of the content via IP multicast, and to utilize the CDN and multipath connectivity between the content source and the receiver devices to deliver the remaining portions of the content via unicast.

Data transmission method and related product

Disclosed are a data transmission method and a related product. The method includes: when it is detected that a data replication transmission function of a PDCP layer entity is activated, a terminal enabling a first RLC layer entity, a second RLC layer entity being in an enabled status; and invoking the PDCP layer entity to determine a first PDCP PDU associated with a first PDCP SDU, and sending the first PDCP PDU to the first RLC layer entity, wherein the first PDCP PDU is used for the first RLC layer entity and a MAC layer entity to process the first PDCP PDU into a MAC PDU and send same.

Method and device for bearing multicast virtual private network

Provided in embodiments of the present disclosure are a method and a device for bearing a multicast virtual private network. The method includes: assigning, by a BFIR accessing a VRF, a global VPN identifier to a multicast VRF, and carrying the global VPN identifier to notify a route to a BFER accessing the multicast VRF; after receiving a packet of the multicast VRF, encapsulating, by the BFIR, the packet with a BIER header and forwarding the packet, the forwarded packet carrying the global VPN identifier.

Scalable IPSec services

An Internet Key Exchange protocol message indicating a first Internet Protocol Security traffic flow is to be established via a first device is obtained at the first device. The Internet Key Exchange protocol message is forwarded from the first device to a second device. An encryption key used to transmit traffic via the first Internet Protocol Security Traffic flow is received at the first device from a key value store. The key value store is populated with the encryption key in response to the second device obtaining the Internet Key Exchange protocol message. A first data packet to be transmitted via the first Internet Protocol Security traffic flow is obtained at the first device. The first device provides the first data packet encrypted with the encryption key of the first Internet Protocol Security traffic flow.

PATH CALCULATION METHOD, APPARATUS, AND DEVICE
20210377155 · 2021-12-02 ·

A path calculation method, apparatus, and device, to implement network slicing. The path calculation method includes: obtaining an algorithm constraint supported by each of a plurality of network devices, where the algorithm constraint is a constraint of a forwarding path algorithm, and the forwarding path algorithm is used to calculate, for the network device, a forwarding path that meets the algorithm constraint; performing network topology division on the plurality of network devices, where network devices in a same network topology support a same algorithm constraint; and calculating a forwarding path between network devices in each network topology based on the algorithm constraint, of the forwarding path algorithm, corresponding to the network topology.

TRANSFER OF SECURE MULTICAST DATA TRAFFIC OVER A COMPUTING NETWORK

Disclosed herein are systems and methods for scalable and secure transmission of multicast data over a public communication network. In exemplary embodiments of the present disclosure, a virtual overlay network can be presented as a single virtual interface to a computing device, for the receipt and transfer of multicast data in a secure and scalable manner across a public insecure communication network.

Establishing a Multicast Flow Path Through a Network Using Multicast Resources Currently Associated with a Different Multicast Flow Path

In one embodiment, resource availability reallocation is used in establishing one or more new designated multicast flow paths with guaranteed availability of resources currently allocated and/or used by one or more designated existing multicast flow path to allocate/use for the new designated flow path(s). These resources typically include allocated guaranteed bandwidth of a network path between two adjacent or non-adjacent nodes of the network, and possibly forwarding/processing/memory resources of a network node. One embodiment communicates multicast control messages between nodes identifying to establish a new multicast flow path with resource availability reallocation from a designated multicast flow path. In one embodiment, a Protocol Independent Multicast-Sparse Mode (PIM-SM) Join/Prune Message identifies Pruning of one or more multicast flow paths and Joining of one or more different multicast flow paths and designating resource availability reallocation from these Pruned multicast flow path(s) to these Joined multicast flow path(s).

Twinning service for groups of internet of things (IOT) devices

IoT twinning groups can be dynamically created. These twinning groups can be activated based on selected triggers. As part of twinning operation, service delivery can be re-directing away from the primary device to the IoT twinning group. Messages originating from members of the IoT twinning group can be processed and forwarded externally as if they came from the primary device. Further, the twinning service can be de-activated based on selected triggers.