H04L12/707

TECHNIQUE FOR DETERMINING WHETHER TO REESTABLISH FAST REROUTED PRIMARY TUNNELS BASED ON BACKUP TUNNEL PATH QUALITY FEEDBACK
20180006932 · 2018-01-04 ·

In one embodiment, a primary tunnel is established from a head-end node to a destination along a path including one or more protected network elements for which a fast reroute path is available to pass traffic around the one or more network elements in the event of their failure. A first path quality measures path quality prior to failure of the one or more protected network elements. A second path quality measures path quality subsequent to failure of the one or more protected network elements, while the fast reroute path is being used to pass traffic of the primary tunnel. A determination is made whether to reestablish the primary tunnel over a new path that does not include the one or more failed protected network elements, or to continue to utilize the path with the fast reroute path, in response to a difference between the first path quality and the second path quality.

SYSTEMS AND METHODS FOR DETECTING WIRELESS COMMUNICATION JAMMING IN A NETWORK

An electronic device may include a processor and a network interface that may include a first radio and a second radio. The processor may be configured to perform wireless communication jamming attack detection by occasionally performing clear channel verification utilizing the network interface to determine whether a threshold number of devices' channels are incapacitated in a wireless network within a threshold amount of time and/or by sending a heartbeat signal from the first radio and determining whether the second radio received the heartbeat signal.

AUTO DISCOVERY AND AUTO SCALING OF SERVICES IN SOFTWARE-DEFINED NETWORK ENVIRONMENT

Techniques are described for automatic discovery of two or more virtual service instances configured to apply a given service to a packet in a software-defined networking (SDN)/network functions virtualization (NFV) environment. Virtual service instances may be deployed as virtual entities hosted on one or more physical devices to offer individual services or chains of services from a service provider. The use of virtual service instances enables automatic scaling of the services on-demand. The techniques of this disclosure enable automatic discovery by a gateway network device of virtual service instances for a given service as load balancing entities. According to the techniques, the gateway network device automatically updates a load balancing group for the given service to include the discovered virtual service instances on which to load balance traffic for the service. In this way, the disclosed techniques provide auto-scaling and auto-discovery of services in an SDN/NFV environment.

NEAR-REAL-TIME AND REAL-TIME COMMUNICATIONS

The present disclosure generally discloses capabilities for supporting new network zones and associated services. The network zones and associated services may include a near-real-time (NRT) zone and associated NRT services, a real-time (RT) zone and associated RT services, or the like. The resilient network zones and associated resilient and non-resilient services may be configured to provide bounded latency guarantees for reliably supporting various types of applications (e.g., mobile fronthaul, cloud computing, Internet-of-Things (IoT), or the like). The network zones and associated services may be provided using a distance-constrained fiber and wavelength switching fabric design comprised of various network devices and using associated controllers, which may be configured to support service provisioning functions, service testing functions, wavelength switching functions, and so forth.

Data Packet Transmission Method and Border Routing Bridge Device
20180013679 · 2018-01-11 ·

A data packet transmission method and a border routing bridge device, where the method includes receiving, by a first border routing bridge device of a first area, a first data packet sent by a border routing bridge device of a second area to the first area, determining, a device identifier group of the second area according to the first data packet, determining, from the device identifier group of the second area, according to the first data packet, a device identifier of a border routing bridge device used to forward a return data packet sent by the target device to the source device, and sending, by the first border routing bridge device, a second data packet carrying the determined device identifier to the target device, where the determined device identifier is used as a source routing bridge device identifier of the second data packet.

DATA PROCESSING
20180013673 · 2018-01-11 ·

A method of routing messages includes receiving a request message from an originating device to be forwarded to one of a plurality of target devices, the request message having a first network address as a source address identifying the originating device. The first network address of the request message is dynamically mapped to a second network address of a selected target device, and the first and second network addresses are stored in association with each other as address mapping information. The method also includes forwarding the selected target device using the second network address. The routing device receives from the target device an error message in relation to the request message, and identifies the originating device which originated the request message using the address mapping information and the second network address of the target device which issued the error message.

HYBRID FLOOD-RELAYING AND ROUTING MESH NETWORKS
20180013665 · 2018-01-11 ·

Systems and methods of mesh network communication enabling a relay node to autonomously select a packet propagation mechanism. Upon receiving a packet, which may carry an indication for flooding propagation as set by the edge node originating the packet, or carry no specification for any propagation mode, the relay node determines whether the packet is eligible for routing-propagation based on a number of factors, such as whether there is an existent valid route from the source node to the destination node, whether the packet is originated from a friend edge node, and whether a route discovery process has been initiated. Accordingly, the relay node may change the indication to routing propagation and forward it by routing-relaying. Thus, the packet can be propagated over the mesh network by routing propagation, despite the initial setting for flooding propagation as specified by the edge node or no setting by the edge node.

POLICY VALIDATION

This disclosure describes techniques for policy validation techniques relating to data traffic routing among network devices. The techniques may include processing a validation request from a controller. A validation request may include information related to a computed path for routing data traffic in a computing network. The processing may include sending one or more path requests to one or more redundant controllers, and comparing computed paths from the redundant controller(s) to the originally computed path. The techniques may include generating a validation response based on comparing the computed paths. In some examples, the techniques may further include determining a health score for the controller. Policy validation techniques may improve data traffic routing among network devices by helping to ensure valid policies are produced.

APPLICATION-AWARE BGP PATH SELECTION AND FORWARDING
20230144568 · 2023-05-11 ·

A routing structure is defined for provider edge (PE) routers that will create the ability to recompute best paths based on application criteria. The routing structure may include the use of a network controller which is connected with the internet to receive requests from applications to trigger path re-computation. The controller will peer with PEs to send re-computation information used by the PE to construct an application-aware BGP table and forwarding instance. The PE also defines a new BGP and packet filter to replicate specific BGP paths into the application-aware table. The application-aware BGP and forwarding instance is unique to the requesting application. Thus, each request with a different source/destination combination obtains a discrete table providing separation. When a packet enters the PE from customer edge (CE) or core interface the packet traverses a packet filter that when matched against source/destination is redirected to the appropriate application-aware forwarding table. Once in the application-aware table the packet is then forwarded along the application-aware path achieving the objective. The instantiation of the application-aware BGP and forwarding table is be done based on BGP updates learned from the controller.

METHODS AND SYSTEMS FOR DETECTING AND TRANSFERRING DEFECT INFORMATION DURING MANUFACTURING PROCESSES
20170373965 · 2017-12-28 ·

A method, corresponding system, and computer program product for detecting and transferring defect information during a manufacturing process is disclosed. The method includes receiving data to be transferred from a source to a destination over a primary communication link. The method identifies at least one type of data in the received data in response to receiving the data to be transferred over the primary communication link. Thereafter, the method allows transfer of a first type of data from the at least one type of data to the destination over a secondary communication link, the first type of data corresponding to the defect information, and wherein the secondary communication link is different from the primary communication link. Further, the method allows transfer of a second type of data from the at least one type of data to the destination over the primary communication link.