Patent classifications
H04L12/721
METHOD AND SYSTEM FOR REFERENCE COUNTED PENDING INTEREST TABLES IN A CONTENT CENTRIC NETWORK
One embodiment provides a system for facilitating efficient communication of a collection of interests. During operation, the system receives, by an intermediate node, a first packet which has a name and a first nonce, wherein the first packet indicates a set of member interests, wherein a member interest has a name. In response to not obtaining a matching entry in a pending interest table based on the name for the first packet, the system creates a new entry in the pending interest table, wherein an entry includes a second nonce, a reference count, and a set of arrival nonces and corresponding arrival interfaces. The system sets the new entry's second nonce to a new nonce, and sets the new entry's reference count to a number of member interests indicated in the first packet. The system forwards the first packet, wherein the first nonce is replaced with the new nonce.
AUTOMATIC POLICY CONFIGURATION FOR PACKET FLOWS
Techniques are disclosed for providing automatic policy configuration for packet flows. For example, a computing device comprises a virtual node and one or more virtual execution elements coupled to the virtual node. The computing device may also comprise one or more processors configured to: receive a packet originating from an application workload hosted on the one or more virtual execution elements and destined for a remote destination device; determine the packet is part of a new packet flow; in response, configure, by a kernel of the computing device and without sending the packet to a user space of the computing device, a policy for a forward packet flow for the new packet flow; configure, by the kernel, a policy for a reverse packet flow associated with the forward packet flow; and send the packet toward the remote destination device in accordance with the policy for the forward packet flow.
POLICY VALIDATION
This disclosure describes techniques for policy validation techniques relating to data traffic routing among network devices. The techniques may include processing a validation request from a controller. A validation request may include information related to a computed path for routing data traffic in a computing network. The processing may include sending one or more path requests to one or more redundant controllers, and comparing computed paths from the redundant controller(s) to the originally computed path. The techniques may include generating a validation response based on comparing the computed paths. In some examples, the techniques may further include determining a health score for the controller. Policy validation techniques may improve data traffic routing among network devices by helping to ensure valid policies are produced.
Packet Transmission Method, Node, Path Management Server and Storage Medium
The present disclosure discloses a message transmission method, including: carrying a routing label and segment list information in a message, and transmitting the routing label and the segment list information along with the message in a message transmission process; the routing label being used for indicating that the message carries the segment list information, and the segment list information being used for representing a transmission path of the message. The present disclosure further discloses four nodes, two path management servers and a storage medium at the same time.
UTILIZING SERVICE TAGGING FOR ENCRYPTED FLOW CLASSIFICATION
In one embodiment, a device in a network receives domain name system (DNS) information for a domain. The DNS information includes one or more service tags indicative of one or more services offered by the domain. The device detects an encrypted traffic flow associated with the domain. The device identifies a service associated with the encrypted traffic flow based on the one or more service tags. The device prioritizes the encrypted traffic flow based on the identified service associated with the encrypted traffic flow.
System and methods for improving interaction routing performance
An interaction router includes a computerized server executing a routing engine stored on a machine-readable medium, an interface at the server receiving information from an interaction switching element, the information regarding an interaction received at the switching element to be routed, an interface at the server to a wide area network (WAN), a function of the routing engine judging if one or more business-logic determinations are to be made to select a routing destination for the interaction, and a function for controlling the switch to route the interaction. If if one or more business-logic determinations are to be made, the routing engine requests the business-logic determination from a remote server over the WAN, and upon receiving the determination from the remote server, uses the determination in controlling the switching element to route the interaction.
Processing of overlay networks using an accelerated network interface card
According to one embodiment, a system includes an accelerated network interface card (NIC), the accelerated NIC including a plurality of network ports including multiple Peripheral Component Interconnect express (PCIe) ports, an Overlay Network Offload System (ONOS), the ONOS including logic configured to provide overlay functionality to network traffic received by the accelerated NIC, and logic configured to cause network traffic that has overlay functionality provided by a hypervisor to bypass the ONOS. In another embodiment, a method for accelerating overlay functionality in a server includes providing overlay functionality for at least some network traffic received by an accelerated NIC implemented in a server, wherein the accelerated NIC provides an interface between the server and a network, and causing network traffic that has overlay functionality provided by a hypervisor of the server to bypass the accelerated NIC.
Information transfer device, delay tolerant network, information transmission method, and recording medium
A delay tolerant network is built with the use of a plurality of information transfer devices each of which includes: a communication unit to communicate to and from another device within a communication range that is connected to the information transfer device; and a storing unit to store and keeps collected notification information, and each of which holds delay tolerant communication by exchanging the collected and kept notification information with another device when the exchange becomes possible. Each information transfer device includes a control unit to exchange environment information with another information transfer device, and to execute deriving processing an assigned range that is assigned autonomously to its own information transfer device, based on the environment information that is kept by its own information transfer device, through a planarization search processing in which a value is evened out between its own information transfer device and other information transfer devices.
Systems and methods for adaptive routing
Systems and methods for performing routing are described. For each of a plurality of messages transmitted over a primary route, a message transmission indication is received by an application. The application further receives, for at least one of the messages, a conversion indication that is based on the transmitted message. The quality of the primary route is determined based on a subset or all of the transmission indications and a subset or all of the conversion indications. Based on this determination, an alternate route is selected to replace the primary route.
Using packet duplication in a packet-switched network to increase reliability
Techniques and solutions for performing packet duplication in a packet-switched network are described. For example, duplicates of a network packet can be created and sent to a destination via different network paths. Packet duplication can be performed by a computer that is creating and sending network packets. Packet duplication can also be performed by another type of computing device such as a router that receives network packets and creates duplicates that are then sent to the destination via different network paths. Network packets can be encapsulated using encapsulation packets that include network path indicators that indicate use of different network paths. Multiple copies of a network packet can be received and processed.