Patent classifications
H04L12/755
Achieving consensus among network nodes in a distributed system
Implementations of the present specification include a computer-implemented method for achieving a consensus among a number of network nodes of a blockchain network. The blockchain network includes a primary node and one or more backup nodes. The method includes receiving a transaction request by the primary node, sending a number of first messages to the backup nodes by the primary node, receiving second messages from the backup nodes by the primary node, reconstructing the transaction request based on data in the second messages by the primary node, sending a third message to the backup nodes by the primary node, and executing the transaction request in response to receiving a predetermined number of third messages.
Ad hoc network route construction system, node, and center node
A node includes: a packet control unit that receives, from the center node, a request packet including a data part and a header part, a MAC (Media Access Control) address of the center node and position information of the center node being described in the data part, a positive integer value being described in the header part as time to live; if determining that a value of the time to live described in the header part of the request packet is 0, generates a reply packet including a data part, all of MAC addresses and all pieces of position information described in the data part of the received request packet being described in the data part of the reply packet; and transmits the reply packet to a request source node as a source of the received request packet.
SWITCH WITH NETWORK SERVICES PACKET PROCESSING BY SERVICE SOFTWARE INSTANCES
Virtual machine environments are provided in the switches that form a network, with the virtual machines executing network services previously performed by dedicated appliances. The virtual machines can be executed on a single multi-core processor in combination with normal switch functions or on dedicated services processor boards. Packet processors analyze incoming packets and add a services tag containing services entries to any packets. Each switch reviews the services tag and performs any network services resident on that switch. This allows services to be deployed at the optimal locations in the network. The network services may be deployed by use of drag and drop operations. A topology view is presented, along with network services that may be deployed. Services may be selected and dragged to a single switch or multiple switches. The management tool deploys the network services software, with virtual machines being instantiated on the switches as needed.
Segment Routing Network Processing of Packets including Packets having a Segment Identifier Structure Providing Processing and/or Memory Efficiencies
In one embodiment, segment routing (SR) network processing of packets is performed on packets having a segment identifier structure providing processing and/or memory efficiencies. Responsive to an identified particular segment routing policy, the particular router retrieves from memory a dynamic segment routing identifier portion of the particular SR policy that includes a SR node value and a SR function value. The SR function value identifies segment routing processing to be performed by a router in the network identified based on the SR node value. A segment routing discriminator is independently identified, possibly being a fixed value for all segment identifiers in the network. Before sending into the network, a complete segment identifier is added to the particular packet by combining the segment routing discriminator with the dynamic segment routing identifier portion. The particular packet including the complete segment identifier is sent into the network.
Packet Communication System and Method
A packet according to a secure protocol over a high-speed protocol has a small size header. A reception system estimates a packet number which is used in processing of a packet having a small size header on the basis of information indicating a packet number of a received packet. The header of each of one or more packets among N packets (where N is an integer of two or more) is a small size header, which is either a first header having one part of the packet number of the packet or a second header without the packet number of the packet. When the small size header is the first header, the header of each of the N packets is the first header. When the small size header is the second header, the header of each of the packets other than one packet among the N packets is the second header.
Efficient multicast traffic forwarding in EVPN-based multi-homed networks
Embodiments of the present disclosure relate to assisting forwarding of multicast traffic over Ethernet Virtual Private Network (EVPN) from a multicast source to a host multi-homed to multiple provider edge (PE) devices. Embodiments are based on the inclusion of an Ethernet Segment Identification (ESI) to EVPN type-6 routes advertised by PE devices which received a multicast Join message. Other PE devices receiving such routes are able to determine whether they belong to the ES identified by the ESI and to determine whether they are designated forwarders (DFs) for the host. Furthermore, PE devices which are the DFs are configured to re-originate the EVPN type-6 routes, i.e. re-send the advertisements, indicating themselves as DFs. This ensures that a remote PE device associated with the multicast source will also send multicast traffic to such DF PE devices, which, in turn, would allow the multicast traffic to successfully reach the host.
MANAGING TRAFFIC CONTROL IN A NETWORK MITIGATING DDOS
Embodiments are provided for managing routes of data traffic within a network. The management may be performed via a graphical user interface that interacts with a Web server to update a configuration file. The configuration file can be converted to router management commands by a network management device (e.g., a BGP speaker). The commands can then be sent to border routers for controlling network traffic. Embodiments are also provided for capturing and logging routing updates made in a network.
Management of Forwarding Tables at Edge Routers
Concepts and technologies are disclosed herein for management of forwarding tables at edge routers. A processor that executes a software defined networking controller can select an edge router associated with a networking environment. The edge router can access or use a forwarding table. The processor can obtain routing information associated with the edge router. The routing information can include forwarding table contents associated with the forwarding table and next hop information that can indicate communication paths associated with the edge router. The processor can analyze the routing information to determine next hops associated with the edge router, generate a next hop graph that represents the next hops, and initiate updating of the forwarding table such that the forwarding table only includes data that corresponds to the next hops.
SYSTEM AND METHOD TO PROVIDE HOMOGENEOUS FABRIC ATTRIBUTES TO REDUCE THE NEED FOR SA ACCESS IN A HIGH PERFORMANCE COMPUTING ENVIRONMENT
Systems and methods for InfiniBand fabric optimizations to minimize SA access and startup failover times. A system can comprise one or more microprocessors, a first subnet, the first subnet comprising a plurality of switches, a plurality of host channel adapters, a plurality of hosts, and a subnet manager, the subnet manager running on one of the one or more switches and the plurality of host channel adapters. The subnet manager can be configured to determine that the plurality of hosts and the plurality of switches support a same set of capabilities. On such determination, the subnet manager can configure an SMA flag, the flag indicating that a condition can be set for each of the host channel adapter ports.
EFFICIENT MACHINE LEARNING FOR NETWORK OPTIMIZATION
An autonomous controller for SDN, virtual, and/or physical networks can be used to optimize a network automatically and determine new optimizations as a network scales. The controller trains models that can determine in real-time the optimal path for the flow of data from node A to B in an arbitrary network. The controller processes a network topology to determine relative importance of nodes in the network. The controller reduces a search space for a machine learning model by selecting pivotal nodes based on the determined relative importance. When a demand to transfer traffic between two hosts is detected, the controller utilizes an AI model to determine one or more of the pivotal nodes to be used in routing the traffic between the two hosts. The controller determines a path between the two hosts which comprises the selected pivotal nodes and deploys a routing configuration for the path to the network.