Patent classifications
H04L12/4645
Switch fabric for a data center network having virtual machines
A fabric for container virtual machines (CM) has cross fabric spine switches coupled to spine switches, each spine switch coupled to has a leaf switches, each leaf switch coupled to servers hosting CVM processes. Each of the leaf switches has an uplink port coupled to a spine switch leaf port configured in a mesh. The spine switches have a plurality of uplink ports for coupling to a plurality of cross fabric spine (CFS) ports into a mesh. The cross fabric spine switches keep a CF-NHCIB table of entries containing capabilities, and also a CF-FIB slice table which maintains entries for assignment of CVMs to new spine switches, such as GTID range, MAC Range, IP range associated with a spine port and spine address (MAC and/or IP) for transferring packets through the fabric.
PACKET FLOW IDENTIFICATION WITH REDUCED DECODE OPERATIONS
In one example, a processing system including at least one processor may obtain a first packet, determine a first tunnel identifier from a tunnel identifier field and a first source port identifier from a source port identifier field of the header of the first packet, and assign the first packet to a first flow. The processing system may further obtain a second packet, extract a first value from a tunnel identifier field and a second value from a source port identifier field of a header of the second packet, determine that the first value matches the first tunnel identifier and that the second value matches the first source port identifier, and assign the second packet to the first flow in response to the determining that the first value matches the first tunnel identifier and that the second value matches the first source port identifier.
ASSIGNMENT OF NETWORK CONFIGURATION FOR A WIRED NETWORK USING A WIRELESS NETWORK
A technique is configured to utilize messages (e.g., frames) generated by a first layer of a protocol stack for a wireless network to configure network parameters associated with a second layer of the protocol stack for a wired network. The messages are illustratively beacon frames generated by a data link layer of a Transmission Control Protocol/Internet Protocol (TCP/IP) stack for a wireless network, and the network parameters are illustratively IP addresses associated with a network layer of the TCP/IP stack for a wired network. Notably, the beacon frames of the wireless network may be utilized for two-way communication exchange on a per node basis for each node in the wired network.
Simple ethernet header compression
Various examples and schemes pertaining to simple Ethernet header compression are described. A first network node transmits a first packet with a full header to a second network node. The first network node determines whether a header compression context for the full header has been established by the second network node. In response to determining that the header compression context for the full header has been established by the second network node, the first network node transmits a second packet with a compressed header to the second network node. In response to determining that the header compression context for the full header has not been established by the second network node, the first network node transmits the second packet or a third packet with the full header to the second network node.
Method, apparatus, and computer readable medium for providing security service for data center
Embodiments of the present disclosure relate to a method, apparatus, and computer readable medium for providing a security service for a data center. According to the method, a packet terminating at or originating from the data center is received. At least one label is determined for the packet, each label indicating a security requirement for the packet. Based on the at least one label, a security service chain is selected for the packet, the security service chain including an ordered set of security functions deployed in the data center and to be applied to the packet. The packet is transmitted to the selected security service chain in association with the at least one label, the packet being processed by the ordered set of security functions in the security service chain.
Port extender with local switching
A switching system comprises a controlling switch and a plurality of port extenders. One of the port extenders includes: at least one upstream port; multiple downstream ports; and a forwarding engine. A forwarding database is populated with entries indicating associations between i) respective network addresses corresponding to devices coupled to downstream ports, and ii) respective local downstream ports. The forwarding database excludes entries corresponding to network addresses corresponding to devices coupled to the at least one upstream port. The forwarding engine is configured to: for a first packet received via one of the local downstream ports, and having a destination network address in the forwarding database, forward the first packet to a different local downstream port indicated by the forwarding database. For a second packet received via one of the local downstream ports, and having a destination network address not in the forwarding database, forward the second packet to the at least one upstream port.
Transmission control method, node, network system and storage medium
The present disclosure provides a transmission control method, a node, a network system, and a storage medium. The transmission control method includes encapsulating, by a node, overlay service identification information corresponding to a packet in the packet, and transmitting, by the node, the packet to a next hop using an underlay network resource dedicated to a service corresponding to the overlay service identification information.
Allocation of tokens for network packets based on application type
Described herein are systems, methods, and software to manage the deployment and use of application identifier tokens in a distributed firewall environment. In one implementation, a computing environment generates tokens associated with application types executing on virtual nodes in the computing environment. After generating the tokens, the computing environment provides at least one token of the tokens to each of the virtual nodes based on at least one application type executing on the virtual node. When a communication is identified in the virtual node associated with an application, the virtual node may encapsulate the communication and a corresponding token in a packet and forward the packet via a virtual network interface associated with the virtual node.
NETWORK PROVISIONING
Systems and methods for provisioning and managing a network are disclosed. One method can comprise determining location information of one or more access points and selecting a routing device based upon the location information. Communication can be established between the one or more access points and the select routing device to define a mobility group comprising the one or more access points.
Techniques for managing software defined networking controller in-band communications in a data center network
According to one or more embodiments of this disclosure, a network controller in a data center network establishes a translation table for in-band traffic in a data center network, the translation table resolves ambiguous network addresses based on one or more of a virtual network identifier (VNID), a routable tenant address, or a unique loopback address. The network controller device receives packets originating from applications and/or an endpoints operating in a network segment associated with a VNID. The network controller device translates, using the translation table, unique loopback addresses and/or routable tenant addresses associated with the packets into routable tenant addresses and/or unique loopback addresses, respectively.