H04L12/717

DATA FORWARDING METHOD AND RELATED APPARATUS

A data forwarding method and a related apparatus. The method includes: a head node obtains to-be-forwarded data; obtains a first segment identifier (SID) list corresponding to the to-be-forwarded data, where the first SID list is generated based on SIDs of a part of nodes in a target forwarding path; encapsulates, in front of the to-be-forwarded data, a packet header including the first SID list, to obtain a to-be-forwarded packet; and sends the to-be-forwarded packet based on the first SID list, where the target forwarding path includes M nodes, the first SID list is generated based on first N nodes in the M nodes, the first SID list is replaced with a second SID list at an intermediate node, and the second SID list is generated based on an X.sup.th node to a Y.sup.th node in the M nodes.

Best Path Computation Offload In A Network Computing Environment
20210377158 · 2021-12-02 ·

Systems, methods, and devices for offloading best path computations in a networked computing environment. A method includes storing in memory, by a best path controller, a listing of a plurality of paths learnt by a device, wherein each of the plurality of paths is a route for transmitting data from the device to a destination device. The method includes receiving, by the best path controller, a message from the device. The method includes processing, by the best path controller, a best path computation to identify one or more best paths based on the message such that processing of the best path computation is offloaded from the device to the best path controller. The method includes sending the one or more best paths to the device.

APPARATUS AND METHODS FOR EMBEDDING SECURITY ASSOCIATION IDENTIFIER IN IP ADDRESS
20210377169 · 2021-12-02 ·

An electronic device includes an address generator module that generates a source address for each traffic class to be sent using a network interface. The source address includes a Unique Local Address (ULA) prefix and an interface identifier having a traffic class identifier as one or more most significant bits and a randomly generated remainder. The address generator module generates a destination address having the ULA prefix and the traffic class identifier. When a processor of the electronic device is selecting a source address for the traffic class according to rules of a network layer protocol (e.g., IPv6), including a rule that a longest matching address of possible source addresses to the given destination is selected as the source address, the generated source address is selected due to the one or more most significant bits of the interface identifier matching with the traffic class identifier of the destination address.

Methods, apparatus and computer programs for allocating traffic in a telecommunications network

Embodiments of the disclosure provide methods, apparatus and computer programs for allocating traffic in a telecommunications network comprising a plurality of nodes, with pairs of nodes being connected by respective links. A method comprises obtaining a plurality of demands for connectivity between respective first nodes and respective second nodes of the telecommunications network, each demand being subject to a respective constraint associated with the connectivity between the respective first node and the respective second node; for each demand, generating a list of possible paths between the first node and the second node satisfying the constraint; based on the list of possible paths for each demand and an indication of traffic usage for each demand, determining, for each demand, weights in respect of each of the possible paths; and providing the weights to nodes of the telecommunications network, for the distribution of traffic associated with each of the plurality of demands to the possible paths in accordance with the respective weights.

METHOD AND SYSTEM FOR DATA LOSS PREVENTION MANAGEMENT

A method may include obtaining, from a user device, a first feedback from a first predetermined party regarding a data loss prevention (DLP) event through a graphical user interface (GUI). The method may further include determining whether the DLP event is authorized using the first feedback. The method may further include transmitting, automatically in response to determining that the DLP event is not authorized, a request for a second feedback by a second predetermined party using the GUI. The second predetermined party may be selected for the request automatically according to a routing queue. The method may further include obtaining, in response to transmitting the request for the second feedback, a selection of a security action regarding the DLP event using the GUI. The method may further include transmitting, automatically in response to the selection of the security action, a command that initiates the security action.

Hyperscalar packet processing

The disclosed systems and methods provide hyperscalar packet processing. A method includes receiving a plurality of network packets from a plurality of data paths. The method also includes arbitrating, based at least in part on an arbitration policy, the plurality of network packets to a plurality of packet processing blocks comprising one or more full processing blocks and one or more limited processing blocks. The method also includes processing, in parallel, the plurality of network packets via the plurality of packet processing blocks, wherein each of the one or more full processing blocks processes a first quantity of network packets during a clock cycle, and wherein each of the one or more limited processing blocks processes a second quantity of network packets during the clock cycle that is greater than the first quantity of network packets. The method also includes sending the processed network packets through data buses.

CONTROL DEVICE, CONTROL METHOD, AND PROGRAM

A control device is connected to a plurality of networks, dispatches a packet received from a user terminal to a network among the plurality of networks, and includes a memory and a processor configured to execute receiving a DNS query packet transmitted from the user terminal, and based on a query target of the DNS query packet, dispatching the DNS query packet to a network among the plurality of networks; and receiving a packet, determining a destination of the packet based on a destination address of the packet, and transmitting the packet to the determined destination.

Packet Scheduling Method, Scheduler, Network Device, and Network System
20210359931 · 2021-11-18 ·

A network device adds an extreme low latency (ELL) service packet to an ELL queue, and adds a (time sensitive) TS service packet to a TS queue. A packet in the TS queue is sent within a time window corresponding to the TS queue, and the packet in the TS queue is not allowed to be sent within a time period beyond the time window corresponding to the TS queue. When a remaining time period obtained by subtracting a time period required by a to-be-sent TS service packet within the time window from the time window is greater than or equal to a first threshold, a packet in the ELL queue is allowed to be sent within the time window corresponding to the TS queue. The first threshold is a time period required for sending one or more ELL service packets in the ELL queue.

Load Balancing Communication Sessions in a Networked Computing Environment

Techniques for load balancing communication sessions in a networked computing environment are described herein. The techniques may include establishing a first communication session between a client device and a first computing resource of a networked computing environment. Additionally, the techniques may include storing, in a data store, data indicating that the first communication session is associated with the first computing resource. The techniques may further include receiving, at a second computing resource of the networked computing environment, traffic associated with a second communication session that was sent by the client device, and based at least in part on accessing the data stored in the data store, establishing a traffic redirect such that the traffic and additional traffic associated with the second communication session is sent from the second computing resource to the first computing resource.

AVOIDING MARKERS FOR LONGEST PREFIX MATCH BASED ON BINARY SEARCH TREE ALGORITHM

In one embodiment, a packet processing apparatus includes interfaces, a memory to store a representation of a routing table as a binary search tree of address prefixes, and store a marker with an embedded prefix including k marker bits providing a marker for an address prefix of a node corresponding to a prefix length greater than k, and n additional bits, such that the k marker bits concatenated with the n additional bits provide another address prefix, packet processing circuitry configured upon receiving a data packet having a destination address, to traverse the binary search tree to find a longest prefix match, compare a key with the k marker bits, extract an additional n bits from the destination address, and compare the extracted n bits with the n additional bits, and process the data packet in accordance with a forwarding action indicated by the longest prefix match.