Patent classifications
H04L12/705
Modular architecture for computer network operations
Disclosed embodiments include a method of operation of a distributed network system. The method includes nodes of the network system that send messages over a protocol-independent message bus, and other nodes that receive the messages. Content from the received messages can be stored in a database distributed among nodes of the network system. At least some of the content stored in the database is published. The published content can be accessed by one or more applications to perform one or more functions.
Loop Avoidance Communications Method, Device, and System
A loop avoidance communications method, where a first provider edge (PE) device sends a first identifier to a second PE device through a first interface, the first PE device receives, through the first interface, a data packet from the second PE device including the first identifier. Then, the first PE device determines that a second interface associated with the first identifier is in a faulty state. In response to the determining that the second interface is in the faulty state, the first PE device avoids sending the data packet to the second PE device through the first interface, where the first PE device connects to a customer edge (CE) device using the second interface.
Apparatus, system, and method for improved memory consumption in network devices via efficient route management
The disclosed computer-implemented method may include (1) receiving, at a network device, a route update for one or more routes that direct traffic within a network that supports BGP, (2) identifying, within the route update, a BGP prefix and a plurality of protocol next-hop addresses that (A) identify a plurality of neighbors of the network device and (B) each correspond to the BGP prefix, (3) maintaining a single copy of the BGP prefix and each of the protocol next-hop addresses, (4) receiving a packet destined for a computing device that is reachable via at least one of the neighbors of the network device, and then (5) forwarding the packet to the one of the neighbors of the network device in accordance with the BGP prefix and the protocol next-hop address that identifies the one of the neighbors. Various other methods, systems, and apparatuses are also disclosed.
System and method for using InfiniBand routing algorithms for ethernet fabrics in a high performance computing environment
Systems and methods for using InfiniBand routing algorithms for Ethernet fabrics in a high performance computing environment. The method can provide, at a computer comprising one or more microprocessors, a plurality of switches, a plurality of hosts, a topology provider (TP) module, a routing engine (RE) module, and a switch initializer (SI) module. The method can perform a discovery sweep, by the TP, of the plurality of hosts and the plurality of switches and assigns an address to each of the plurality of hosts and the plurality of switches. The method can calculate, by the routing engine, a routing map, based upon a routing scheme, for the plurality of hosts and the plurality of switches, the routing map comprising a plurality of forwarding tables. The method can configure, each of the plurality of switches with a forwarding table of the plurality of forwarding tables calculated by the routing engine.
PROTOCOL INDEPENDENT MULTICAST DESIGNATED NETWORKING DEVICE ELECTION SYSTEM
A Protocol Independent Multicast (PIM) designated networking device election system includes a first networking device and a second networking device that are coupled to the first edge device. The second networking device receives a first PIM message from the first networking device and determines that the first PIM message indicates that the first networking device supports designated networking device election based on an interface performance property. The second networking device then determines whether a first interface performance property indication indicates that a first interface performance property of the first networking device or a second interface performance property of the second networking device satisfy an interface performance property condition. In response to determining that the second interface performance property satisfies the interface performance property condition, the second networking device forwards first data traffic received at the second networking device toward the first edge device.
Dynamic Loop Detection and Suppression
Systems and methods are described for effectively managing and maintaining a communication network by monitoring communications to detect a loop condition, and effectively route the communication to one or more destinations known to reduce or eliminate the occurrence of a looping condition.
Systems and methods for wireless communication network loop detection
A method for detecting communication loop in an ad hoc network is provided. The method may comprise: receiving, at a node of the ad hoc network, a message comprising a commutative value, wherein the node is associated with a node identifier and the commutative value pertains to node identifiers associated with one or more nodes along a path the message has been traversed along regardless of the order of the nodes; and determining, with aid of one or more processors, presence of a loop based on whether the commutative value is identical to a previously obtained commutative value.
Method and apparatus for preventing loops in a network topology
The embodiments herein relate to a method and a network switch device for preventing the occurrence of loops in a network topology comprising a plurality of network switch devices, each switch device is assigned a unique SW-ID. The method comprises exchanging each SW-ID between all switch devices; and building, for each switch device, a routing table. The method further comprises when receiving, at a first switch device, a data frame from a second switch device that includes an SS-ID, assigned to the second switch device, and the data frame is received at a port of the first switch device, if, according to the routing table of the first switch device, the assigned SW-ID for this port is different from the SS-ID included in the data frame, discarding the data frame, otherwise, processing forward the data frame.
Loop check packets
In some examples, a network device may determine an uptime of a first port and a second port, compare the uptimes of the first and second ports to a transmit interval time, and determine that the first port is connected to the network device via a more recently configured link than the second port and is the cause of the network loop when the uptime of the first port is less than the transmit interval time. The network device may determine that the second port is connected to the network device via a less recently configured link than the first port and is not the cause of the network loop when the uptime of the second port is greater than the transmit interval time and disable the first port based on the determination that the first port is connected to the network device via the more recently configured link.
VERIFICATION OF SOFTWARE-DEFINED NETWORKING (SDN) POLICIES FOR SPECIFIC TOPOLOGIES
A method may include receiving a network schema including switches, links connecting the switches, and a topology that maps the switches to the links. The switches may include ports. The method may further include receiving a software defined networking (SDN) policy including a function that modifies a state of a packet entering a switch, converting the topology to a graph including nodes corresponding to the switches, while searching the graph, determining, according to the function, whether a port of a switch corresponding to a node is reachable by the packet entering the switch, and in response to searching the graph, verifying a property of the SDN policy.