H04L12/773

Link-State Advertisement LSA Sending Method, Apparatus, and System
20200220803 · 2020-07-09 ·

This application discloses a link-state advertisement LSA sending method, an apparatus, and a system, to reduce a quantity of LSA sending times. The method includes: generating, by a first router, a first path table based on level location information of the first router, level location information of a second router, and level location information of at least one third router; sending, by the first router, a first link state update LSU message to the second router; receiving, by the second router, the first link state update LSU message from the first router; updating, by the second router, a link state database LSDB of the second router based on a first LSA; and sending, by the second router, the first LSA to a router corresponding to an identifier in the first path table.

Content negotiation in a content centric network

One embodiment provides a system that facilitates content negotiation in a content centric network. During operation, the system receives, by a content producing device, a packet that corresponds to a first interest, wherein an encoded name for the interest indicates a plurality of qualifiers for acceptable types of requested content, and wherein a name is a hierarchically structured variable length identifier which comprises contiguous name components. The system generates a first content object that satisfies one of the indicated plurality of qualifiers, wherein a name for the content object is the encoded name, and wherein a content object indicates data and a content type corresponding to the satisfied qualifier.

Source routing design with simplified forwarding elements

Some embodiments provide a network that includes (i) multiple forwarding elements, (ii) a set of one or more global control plane (GCP) servers, and (iii) multiple end-node machines. The GCP servers maintain topological information about connections between the forwarding elements. Each of the end-node machines receives the topological information, identifies a source-routing path for a message sent by the machine, and embeds the source-routing path in a source-routing message header that includes an egress port for each forwarding element along the path.

ATTESTATION BASED ROUTING

At a networking device, a method includes obtaining, according to a predefined protocol, a first plurality of attestation vectors from a corresponding plurality of candidate next-hop nodes. Each of the plurality of candidate next-hop nodes is included within a respective route between a particular node and a destination node. The method further includes determining at plurality of confidence scores. Each of the plurality of confidence scores is based on at comparison between a corresponding one of the first plurality of attestation vectors and a trusted image vector. The method further includes selecting, from the plurality of confidence scores, a particular confidence score that satisfies one or more selection criteria. Each of the particular confidence score is associated with a particular candidate next-hop node of the plurality of candidate next-hop nodes. The method further includes directing, to the particular candidate next-hop node, a data packet destined for the destination node.

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR SUPPORTING MULTI-HOMED CONNECTIONS
20200204478 · 2020-06-25 ·

Methods, systems, and computer readable media for supporting multi-homed (MH) connections are disclosed. According to one method, the method comprises: determining that an MH connection is enabled; identifying a local initiate port associated with the MH connection; using the local initiate port to configure connection rules to allow traffic associated with a plurality of paths associated with the MH connection; and using the connection rules to process traffic received over the MH connection.

Asymmetric connection with external networks
10693763 · 2020-06-23 · ·

Some embodiments provide a system that allows for the use of direct host return ports (abbreviated DHR ports) on managed forwarding elements to bypass gateways in managed networks. The DHR ports provide a direct connection from certain managed forwarding elements in the managed network to remote destinations that are external to the managed network. Managed networks can include both a logical abstraction layer and physical machine layer. At the logical abstraction layer, the DHR port is treated as a port on certain logical forwarding elements. The DHR port transmits the packet to the routing tables of the physical layer machine that hosts the logical forwarding element without any intervening transmission to other logical forwarding elements. The routing tables of the physical layer machine then strip any logical context associated with a packet and forwarding the packet to the remote destination without any intervening forwarding to a physical gateway provider.

Method, apparatus and system for controlling routing information advertising

A method, an apparatus and a system for controlling routing information advertising are provided, which relate to the field of communications and are used for reducing the configuration complexity and reinforcing the operability. The method includes: receiving, by a control device, first routing information sent by a first forwarding device; wherein the first routing information includes an identifier of the first forwarding device; determining a first routing path according to the identifier of the first forwarding device, an identifier of a second forwarding device and a routing path group; and determining an advertising range of second routing information for the second forwarding device according to the first routing path; for enabling the second forwarding device to advertise the second routing information according to the advertising range of the second routing information.

Low cost multi-server array architecture
10680943 · 2020-06-09 · ·

An array of columns and rows of host server devices is mounted in a row of racks. Each device has a host processor and an exact-match packet switching integrated circuit. Packets are switched within the system using exact-match flow tables that are provisioned by a central controller. Each device is coupled by a first cable to a device to its left, by a second cable to a device to its right, by a third cable to a device above, and by a fourth cable to a device below. In one example, substantially all cables that are one meter or less in length are non-optical cables, whereas substantially all cables that are seven meters or more in length are optical cables. Advantageously, each device of a majority of the devices has four and only four cable ports, and connects only to non-optical cables, and the connections involve no optical transceiver.

Splitting data into an information vector and a control vector and processing, at a stage of a control pipeline, the control vector and a data block of the information vector extracted from a corresponding stage of a data pipeline
10680977 · 2020-06-09 · ·

Disclosed herein are techniques for improving the performance of a pipeline in an integrated circuit. An integrated circuit includes a pipeline including a plurality of stages, and a plurality of storage circuits coupled to corresponding stages in the plurality of stages of the pipeline. A first stage of the plurality of stages is configured to split a set of data into a first vector and a second vector. The plurality of stages is configured to transport the first vector through the pipeline, and sequentially perform operations on the first vector of the set of data. The plurality of storage circuits is configured to transport the second vector among the plurality of storage circuits. Each storage circuit of the plurality of storage circuits is configured to provide a data block in the second vector to the corresponding stage in the plurality of stages of the pipeline for data processing.

METHOD FOR SECURING COMPUTING SYSTEM NETWORKS THROUGH LOCKING OSI LAYERS 2 AND 3 ON INDIVIDUAL REMOTE COMPUTING DEVICES
20200177524 · 2020-06-04 ·

A secure ethernet chassis and console port and a method of enabling the same is provided through turning off an ethernet switch and/or router console port (OSI layer 2 or layer 3). The present invention isolates and controls an inside network egress and an outside ingress of the physical console port. The present invention enables operator to turn off and secure the console port, allowing for chassis security as well as console port security for unattended devices as well as remote devices. The process also allows the reverse recovery of the port. The process works for devices with single or dual IP stacks. The turning off the console port completely isolates the inside network of the switch and prevents network intrusion or device corruption via the console port. It also prevents unauthorized configuration changes of the device.