H04L101/622

Network system, communication control device, and communication control method

A mobile-side IP address is translated into an intranet-side MAC address, and an IP address for an intranet is acquired. The present invention provides a network system for transferring a packet, including: a first network that controls transfer of data at a first layer; a second network that is connected to the first network and controls transfer of data at a second layer different from the first layer; and a translation device that translates an address between networks, in which the translation device translates the address of the first layer of the first network attached to data transferred from the first network to the second network into the address of the second layer of the second network.

Efficient ARP packet propagation

Techniques disclosed herein provide a method for efficiently propagating address resolution reply messages. A first router in a first network receives an address resolution request message from a second router in a second network. The first router generates an entry for the address resolution request message and stores the entry in a pending address resolution requests table. When the first router receives a route advertisement, it extracts a network layer address from the route advertisement and determines whether the pending address resolution requests table includes an entry for the network layer address. If so, the router extracts a link layer address from the route advertisement and generates an address resolution reply message comprising the network layer address and the link layer address. The router then transmits the address resolution reply message to the second router.

Method and system for resolving UNI port information on an external SOC/switch based on a mac-table cache
11811724 · 2023-11-07 · ·

The present invention provides a method of using a mac-table cache to resolve UNI port information on an external system of chip (SOC) is provide. The method comprises, receiving, by a packet processing chip, a packet with a source address (SA); locating, by the packet processing chip, the SA in a mac-table cache implemented on the packet processing chip; and looking up a SOC mac-table implemented on the external SOC if the SA cannot be found in the mac-table cache.

Secured suppression of address discovery messages

Some embodiments provide a novel secure method for suppressing address discovery messaging. In some embodiments, the method receives an address discovery record that provides a network address associated with a machine connected to a network. The method then identifies a set of one or more rules for evaluating the received address discovery record to determine whether the address discovery record or its provided network address should be distributed to one or more hosts and/or devices associated with the network. The method then processes the set of rules to determine whether the received address discovery record violates a rule in the set of rules so as to prevent the distribution of its provided network address. When the address discovery record violates a rule, the method discards it in some embodiments. On the other hand, when the address discovery record does not violate any rule in the identified set of rules, the method distributes the address discovery record or its provided network address to one or more hosts and/or devices associated with the network.

Enhanced security for multi-link wireless operations

This disclosure describes systems, methods, and devices related to security for multi-link operations. A multi-link device (MLD) may establish a first communication link between a first device of the MLD and a first device of a second MLD, and a second communication link between a second device of the MLD and a second device of the second MLD. The MLD may generate a group-addressed message. The MLD may protect the group-addressed message using a first key or a first integrity key. The MLD may protect the group-addressed message using a second key or a second integrity key. The MLD may send, using the first communication link, the group-addressed message protected using the first key or the first integrity key, and may send, using the second communication link, the group-addressed message protected using the second key or the second integrity key.

Label-based methods for identifying a source location in service chaining topology

In an embodiment, a computer-implemented method provides mechanisms for identifying a source location in a service chaining topology. In an embodiment, a method comprises: determining, at an egress interface of a host that hosts a virtual machine (“VM”), whether a service plane MAC address (“spmac”) in a packet header of a packet, provided to the egress interface, is the same as an inner destination MAC address in the packet; in response to determining that the spmac in the packet header of the packet, provided to the egress interface, is the same as the inner destination MAC address in the packet: encapsulating the packet with a destination virtual tunnel endpoint (“VTEP”) address retrieved from a mapping of VTEP-labels onto VTEP addresses; and causing providing the packet from the egress interface of the host that hosts the VM to a source host that hosts a source guest virtual machine (“GVM”).

INCREASING DATA AVAILABILITY
20210194785 · 2021-06-24 ·

Systems, methods, and related technologies for increasing data availability. The determining of one or more recommendations to improve classification may include accessing network traffic from a network and selecting an entity. One or more values associated with one or more properties associated with the entity may be determined. The one or more values may be accessed from the network traffic. The entity may be classified and in response to the classification meeting a condition, one or more properties that are unavailable in the network traffic may be determined. A data source associated with the one or more properties for which a value is not present in the network traffic may be determined and the data source associated with the one or more properties that are unavailable in the network traffic may be stored.

Scalable physical loop detection in non-native virtual local area networks (VLANs)
11870607 · 2024-01-09 · ·

Systems and methods for detecting physical loops in both native and non-native VLANs are provided. According to one embodiment, a processing resource of a network switch detects a physical loop in a non-native Virtual Local Area Network (VLAN) by configuring a set of one or more network chips (e.g., an ASIC) associated with an interface associated with the non-native VLAN of multiple interfaces of the network switch to provide an indication (e.g., a Media Access Control (MAC) address or a packet) regarding a MAC move event detected on the interface. Responsive to receipt of the indication, it is determined whether a number of MAC move events for the interface meets an event count threshold within each unit of time (e.g., one or more seconds) of multiple consecutive units of time. When the determination is affirmative, the existence of the physical loop is identified.

Wireless network security system and method
11871229 · 2024-01-09 ·

Traditional Media Access Channel (MAC) address filtering used to prevent a device from gaining access to a wireless network requires an operator to manually enter the MAC address of the undesirable device into the Dynamic Host Configuration Protocol (DHCP) server of the wireless network. However, the present invention does not require or permit manual entry of MAC addresses into the DHCP server. Instead, unique identifiers of devices seeking permission to join the wireless network are contained in a Candidate Joining Device (CJD) Record which resides on a distributed ledger technology infrastructure. The use of a distributed ledger infrastructure, prevents unauthorised users from modifying MAC address records in a DHCP server to grant an unauthorised device access to a wireless network, as any such modification to a CJD Record must be read from and accepted by the members of the distributed ledger infrastructure in accordance with the consensus mechanism thereof.

Methods, device and computer-readable medium for protecting MAC addresses

Embodiments of the disclosure provide a method, device and computer readable medium for protecting MAC addresses. According to embodiments of the present disclosure, the terminal device may obtain a set of virtual MAC addressed from a network device and may connect with a further network device (for example, Wi-Fi AP or Bluetooth devices) using the virtual MAC addresses. In this way, tracking the terminal device with MAC address is prevented so that user privacy protection could be enhanced.