H04L12/755

DDOS COUNTERMEASURE DEVICE, DDOS COUNTERMEASURE METHOD, AND PROGRAM
20210058427 · 2021-02-25 ·

A DDoS handling device configured to handle communication directed to a target of a DDoS attack flowing in from an adjacent autonomous system in an autonomous system provided with a plurality of mitigating locations includes: a load distribution determination unit configured to determine whether or not to execute load distribution processing on the basis of an amount of available resources at mitigating locations corresponding to a gateway device into which the communication directed to the target flows and an amount of the communication directed to the target in a case in which at least one attack has been detected; a load distribution processing unit configured to decide mitigating locations to be used to handle the communication directed to the target from among the plurality of mitigating locations to solve shortage of resources at the mitigating locations for each attack, in a case in which the load distribution determination unit determines to execute the load distribution processing; and an attack handling setting unit configured to execute path control such that the communication directed to the target pertaining to the attack passes through the mitigating locations decided by the load distribution processing unit for each attack.

FRAME TRANSFER METHOD AND SECURE STAR COUPLER
20210051090 · 2021-02-18 ·

A secure star coupler in a communication network adopting a time-triggered protocol based on a time slot include: transceivers each of which is connected to one of branches and transmits and receives signals; a routing table holder that holds a predetermined rule indicating a correspondence between a time slot and a branch; and a router that routes a signal received from a first branch to another branch unless a no-transfer condition is satisfied. The no-transfer condition includes a condition that the predetermined rule is not followed by the first branch and a condition that routing of a signal received from a second branch different from the first branch has started in the time slot.

System and method of fast roaming in enterprise fabric networks

A system and method for fast roaming in one or more enterprise fabric network. The fast roaming involves correlation operations performed in one or more databases managed by control plane of the fabric network to update routing locator entries associated with L2-VNID and L3-VNID in one or more databases when a client moves from behind a first switch to behind a second switch. In some embodiments, the control plane finds the L3-VNID from the L2-VNID. The L3-VNID is used to search for all IP addresses corresponding to a client-MAC. At least new routing locator value that is used in the routing locator entries is provided to the first switch, the second switch, and border nodes associated with the fabric network.

OPTIMIZED SERVERLESS CLOUD PROCESSING BASED ON PROCESSING JOB REQUIREMENTS
20210067434 · 2021-03-04 ·

A system is provided for optimized selection of serverless cloud processing units for resource intensive processing operations. The system includes a processor and a computer readable medium operably coupled thereto, to perform the scheduling operations which include receiving a processing operation for a data input that requires processing in a serverless computing environment, determining at least one constraint requirement imposed on performing the processing operation that are all required to be fulfilled for successful completion of the processing operation, accessing a routing table associated with the serverless computing environment, determining one of the plurality of serverless processing units from the routing table based on fulfilling all of the at least one constraint requirement, and assigning the processing operation to the one of the plurality of serverless processing units on the least costly basis or other optimization consideration.

SYSTEM AND METHOD FOR OPTIMIZED PATH RECORD HANDLING IN HOMOGENEOUS FABRICS WITHOUT HOST STACK COOPERATION IN A HIGH PERFORMANCE COMPUTING ENVIRONMENT
20210058313 · 2021-02-25 ·

Systems and methods for path record handling in a fabric without host stack cooperation in a high performance computing environment. In a case where the subnet manager has determined homogenous subnet/fabric or semi-homogenous subnet/fabric status for the current topology, but is still receiving path queries, the subnet manager can use the relevant status to avoid any route evaluation and generate path record either only based on the configuration status of the requesting port in the homogenous case, or by comparing the configuration status of both ports in the semi-homogenous case.

METHOD AND APPARATUS FOR ESTABLISHING BLOCKCHAIN NODE CONNECTION, AND DEVICE
20210075590 · 2021-03-11 ·

Embodiments of this application provide a method and an apparatus for establishing a blockchain node connection, and a device. The method is applied to a blockchain system, and includes: A first node obtains address information of a second node from a first router. The first router and the first node are located in a first autonomous system. The second node is located in a second autonomous system. The first autonomous system and the second autonomous system are neighboring autonomous systems. The first node establishes a connection to the second node based on the address information of the second node. This improves blockchain communication security.

Determining physical locations of devices in a data center

A method, an information handling system (IHS) and a data center location system for determining physical locations of devices in a data center. The method includes generating an initial grouping of servers into a plurality of racks based on the at least one of a MAC address or IP address. Each server in a first rack is paired with each other server in communication with a switch aggregator to generate server pairs. The server pairs are transmitted to the respective servers. Each of the servers are triggered to measure and transmit received signal strength indication (RSSI) values for its respective server pairs. Positions of the servers in rows are determined based on the RSSI values. An intermediate grouping of the servers in rows is generated based on the determined positions.

DISCOVERY FOR TOKEN SECURED ROUTING

Systems and methods for token secured routing and discovery in token secured routing are disclosed. An inbound routing table is maintained. A communication link is established with a second node via a first port. A discovery packet is sent to the second node via the first port. A token is generated for communication with the second node. A first inbound routing entry is added to the inbound routing table, wherein the first inbound routing entry maps the first token state to the second node.

Agent for implementing layer 2 communication on layer 3 underlay network

Techniques are disclosed herein for providing an agent for implementing layer 2 (L2) communication on a layer 3 (L3) underlay network. In one embodiment, an agent in virtualization software determines a newly available network address of a VM, configures a network interface of the L3 network to be associated with the network address such that network traffic for the network address is directed to the network interface, adds a route to a virtual router in the virtualization software indicating the VM is local, and adds a router to an address resolution table to associate the network address with a MAC address. This permits a packet sent from one VM to another VM to be processed by the virtual router based on routes therein and forwarded to the other VM either internally or using the L3 underlay network.

Method and system for validating ordered proof of transit of traffic packets in a network

A system and method for validating proof of transit of network traffic through network nodes (N), the node (N) comprising a set of input interfaces (20) receiving incoming packets, a first module (A) to identify a matching route within a routing table (23) and storing means (22) to provide next modules (B, C, D) with two private keys if the packet is matched and/or the packet metadata includes OPoT information. The second module (B) decrypts the OPoT metadata using the first private key associated to the link of the node from which the incoming packets are received. The node (N) has SSS metadata to be processed by a third module (C) for the correct generation of cumulative validation parameters. When the SSS process is finished by the third module (C), the fourth module (D) re-encrypts the OPoT metadata using the second private key before packet forwarding to the subsequent node in the path through output interfaces (21).