H04L12/717

Fabric control protocol for data center networks with packet spraying over multiple alternate data paths

A fabric control protocol is described for use within a data center in which a switch fabric provides full mesh interconnectivity such that any of the servers may communicate packet data for a given packet flow to any other of the servers using any of a number of parallel data paths within the data center switch fabric. The fabric control protocol enables spraying of individual packets for a given packet flow across some or all of the multiple parallel data paths in the data center switch fabric and, optionally, reordering of the packets for delivery to the destination. The fabric control protocol may provide end-to-end bandwidth scaling and flow fairness within a single tunnel based on endpoint-controlled requests and grants for flows. In some examples, the fabric control protocol packet structure is carried over an underlying protocol, such as the User Datagram Protocol (UDP).

Weighted bandwidth allocation for adaptive routing
11178046 · 2021-11-16 · ·

Systems and methods of routing are provided. In the system, one or more processors determine that a packet is to be transmitted to a destination. In one or more aspects of the system, the one or more processors select a next port to be used for transmitting the packet by selecting a set of ports among a plurality of ports based on a static weight configuration associated with each port. The next port may be selected from the set of ports based on a number of hops required to reach the destination from each port and based on an estimated latency from each port to the destination. The one or more processors may then route the packet through the selected next port.

Protocol and state analysis in a dynamic routing network
11178042 · 2021-11-16 · ·

A network protocol analyzer module receives one or more networking log data files, where each of the one or more networking log data files is associated with a corresponding node of a dynamic routing network comprising one or more nodes, determines a network communication protocol associated with the dynamic routing network, retrieves a set of communication protocol rules associated with the network communication protocol, analyzes the one or more networking log data files in view of the set of communication protocol rules associated with the network communication protocol, and generates a combined output file for the one or more nodes of the dynamic routing network in view of the analysis.

First front-end node, client node, load balancer node, and methods performed thereby, for supporting data communication

A method is performed by a first front-end node, for supporting data communication. The first front-end node operates in a communications network comprising a pool of front-end nodes for providing access to a database. The pool of front-end nodes includes the first front-end node. The first front-end node receives, from a load balancer node, a first request for data from the database, from a client node. The first front-end node provides, to the client node, a first response to the received first request, the first response including a first indication indicating that the first front-end node is a preferred node for providing a subsequent response to a subsequent request for data from the client node. The subsequent response is allowed to originate from another front-end node in the pool of front-end nodes, different than the preferred node.

Measuring packet residency and travel time

The disclosure sets forth techniques, devices, systems, and methods for measuring a packet residency time in a network device. In some aspects, a network flow measurement protocol includes data fields in flow data records exported to a traffic collector, including a packet ingress time and a packet egress time. The data fields allow the calculation of the packet residency time within a network device, as well as the time required for the packet to traverse between two network devices in the network. A filter can be installed on one or more network devices in a network. For packets that match the filter criteria, the network device records the times of packet arrival and packet departure, and, in some aspects, a packet residency time of the packet with the network device. The network device exports the flow data record pertaining to this packet to a traffic flow data collector.

Providing recommendations for implementing virtual networks

Some embodiments provide a novel method for deploying different virtual networks over several public cloud datacenters for different entities. For each entity, the method (1) identifies a set of public cloud datacenters of one or more public cloud providers to connect a set of machines of the entity, (2) deploys managed forwarding nodes (MFNs) for the entity in the identified set of public cloud datacenters, and then (3) configures the MFNs to implement a virtual network that connects the entity's set of machines across its identified set of public cloud datacenters. In some embodiments, the method identifies the set of public cloud datacenters for an entity by receiving input from the entity's network administrator. In some embodiments, this input specifies the public cloud providers to use and/or the public cloud regions in which the virtual network should be defined. Conjunctively, or alternatively, this input in some embodiments specifies actual public cloud datacenters to use.

ROUTING PATH CALCULATION METHOD, SYSTEM AND DEVICE, AND COMPUTER-READABLE STORAGE MEDIUM
20210344588 · 2021-11-04 ·

A routing path calculation method, system and device, and a computer-readable storage medium are provided. The number n of passing constraint condition or conditions is determined, and n network topology layer or layers are correspondingly copied. Different layer attribute information is configured for an original network topology layer and the n copied network topology layer or layers. Connection of at least one link of each network topology layer is modified according to the n passing constraint condition or conditions, and connection of at least one one-way link is established between two network topology layers with adjacent layer attribute information. A k-optimal path from a starting point of a head network topology layer to an ending point of an end network topology layer is calculated by a k-optimal path algorithm. The layer attribute information of at least one node in the k-optimal path is restored to obtain a final path.

ROUTE CONTROL TECHNIQUES
20210344594 · 2021-11-04 ·

Embodiments described herein relate to techniques for route control. The techniques may include obtaining, by a routing information base (RIB) agent, a route policy for performing a route action; receiving, by the RIB agent, a route from a routing protocol; analyzing, by the RIB agent, the route using to make a determination about whether to perform the route action; and performing, by the RIB agent, the route action based on the determination. Route actions may include actions relating to route modification, route re-distribution, modifications of various attributes of a route, etc.

System and method to facilitate content delivery to multiple recipients in a network environment

A method is provided in one example embodiment and may include determining at a parent content node that a plurality of recipient content nodes are to receive a same content; generating, based on a determination that the same content is available at the parent content node, a multi-delivery header comprising a plurality of identifiers, wherein each identifier of the plurality of identifiers indicates each recipient content node that is to receive the same content; appending the multi-delivery header to one or more packets of an Internet Protocol (IP) flow associated with the same content; and transmitting packets for the IP flow to each of the plurality of the recipient content nodes.

SECURITY FOR COMMUNICATION PROTOCOLS
20230133729 · 2023-05-04 ·

Various example embodiments for supporting security for communications may be configured to support security for communications of communication protocols at various communication layers. For example, various example embodiments for supporting security for communications may be configured to support security for communications of communication protocols operating above Layer 2 using a Layer 2 network security protocol. For example, various example embodiments for supporting security for communications may be configured to support security for communications of communication protocols operating at Layer 2.5 (e.g., Multiprotocol Label Switching (MPLS) protocols or other Layer 2.5 protocols) using a Layer 2 network security protocol. For example, various example embodiments for supporting security for communications may be configured to support security for communications of communication protocols operating at Layer 3 (e.g., Internet Protocol (IP), such as IP version 4 (IPv4) or IP version 6 (IPv6), or other Layer 3 protocols) using a Layer 2 network security protocol.