Patent classifications
H04L12/747
METHOD AND SYSTEM FOR CO-OPERATIVE ON-PATH AND OFF-PATH CACHING POLICY FOR INFORMATION CENTRIC NETWORKS
A method and a system is disclosed herein for co-operative on-path and off-path caching policy for information centric networks (ICN). In an embodiment, a computer implemented method and system is provided for cooperative on-path and off-path caching policy for information centric networks in which the edge routers or on-path routers optimally store the requested ICN contents and are supported by a strategically placed central off-path cache router for additional level of caching. A heuristic mechanism has also been provided to offload and to optimally store the contents from the on-path routers to off-path central cache router. The present scheme optimally stores the requested ICN contents either in the on-path edge routers or in strategically located off-path central cache router. The present scheme also ensures optimal formulation resulting in reduced cache duplication, delay and network usage.
MULTI-DOMAIN CENTRALIZED CONTENT-CENTRIC NETWORKING
A multi-domain centralized content-centric networking (MCCN), including: a management layer; a control layer; and a data layer. The management layer communicates with the data layer through the control layer. The management layer is configured to acquire application transmission requests, network resource allocation, and network running status, and give network operating commands to a control plane according to reconfiguration of management strategies. The control layer is configured to carry out routing establishment, maintain network topology of domains, inform the management layer of network status, and execute commands of the management layer. The data layer is configured to process data packet according to commands of the control layer. The task of the data layer is completed by a router and link of the bottom layer.
PARTIAL REASSEMBLY AND FRAGMENTATION FOR DECAPSULATION
In one embodiment, a decapsulating network device receives a plurality of encapsulated packet fragments of an original packet, and decapsulates them into respective decapsulated packet fragments. The decapsulating network device caches an inner header of the original packet from one of the decapsulated packet fragments, and in response to caching the inner header, and for each particular decapsulated packet fragment as it is received and decapsulated: prepends the inner header and fragmentation information to the particular decapsulated packet fragment; and forwards the particular decapsulated packet fragment with the prepended inner header and fragmentation information from the decapsulating network device toward a destination of the original packet.
Secure resource name resolution using a cache
Techniques for securing name resolution technologies and for ensuring that name resolution technologies can function in modern networks that have a plurality of overlay networks accessible via a single network interface. In accordance with some of the principles described herein, a set of resolution parameters may be implemented by a user to be used during a name resolution process. In some implementations, when an identifier is obtained for a network resource, the identifier may be stored in a cache with resolution parameters that were used in obtaining the identifier. When a new name resolution request is received, the cache may be examined to determine whether a corresponding second identifier is in the cache, and whether resolution parameters used to retrieve the second identifier in the cache match the resolution parameters for the new resolution request. If so, the second identifier may be returned from the cache.
Data forwarding method and apparatus based on operating system kernel bridge
A data forwarding method is provided for a data forwarding apparatus. The method includes, when a first port receives a to-be-forwarded data packet, executing a network adapter driver corresponding to the first port to read the to-be-forwarded data packet from a network adapter cache corresponding to the first port. The network adapter cache stores address forwarding information obtained from an operating system kernel bridge. The method also includes searching the address forwarding information in the network adapter cache for address forwarding information corresponding to the data packet and, when the address forwarding information corresponding to the data packet is found, determining a target network adapter driver for forwarding the data packet based on the found address forwarding information, and directly sending the data packet to the target network adapter driver, such that the target network adapter driver forwards the data packet through a second port.
EDGE DATAPATH USING USER SPACE NETWORK STACK
A novel design of a gateway that handles traffic in and out of a network by using a datapath daemon is provided. The datapath daemon is a run-to-completion process that performs various data-plane packet-processing operations at the edge of the network. The datapath daemon dispatches packets to other processes or processing threads outside of the daemon by utilizing a user space network stack.
METHODS AND APPARATUS TO COMPRESS PACKETS IN A COMPUTING ENVIROMENT
An apparatus is disclosed to compress packets, the apparatus comprising; a data analyzer to identify a new destination address and a protocol identifier of an input packet corresponding to a new destination node and a communication system between the new destination node and a source node; a compression engine to utilize a plurality of compression functions based on the new destination address and the protocol identifier and reduce a size of the input packet; a compression analyzer to identify a reduced packet and a compression function identifier corresponding to the reduced packet, the compression function identifier associated with one of the compression functions; and a source modifier to construct a packet to include the compression function identifier by modifying unregistered values of a protocol identifier by a difference associated with the compression function identifier, the packet to inform the new destination node of a compression function.
Mesh routing of sleepy sensor data
HVAC components having improved efficiency are described. In one embodiment, excessive sleep current draw in a battery-powered device having a microcontroller is detected by measuring a voltage drop across a MOSFET device coupled in a forward-conducting orientation in series between the battery and the microcontroller, causing a transistor to conduct when the voltage drop exceeds a predetermined threshold to generate a first trigger signal, integrating the first trigger signal to generate a second trigger signal, and generating an interrupt to the microcontroller. In another embodiment, a battery-saving method of operating an HVAC component includes maintaining the HVAC device in the sleep mode, receiving a user input to wake the device, transmitting a data request and returning the HVAC component to the sleep mode, waking up the HVAC device to poll an adjacent network node storing a cached response, displaying the response, and returning the HVAC device to sleep.
Dynamic inspection of networking dependencies to enhance anomaly detection models in a network assurance service
In one embodiment, a network assurance service that monitors a network detects, using a machine learning-based anomaly detector, network anomalies associated with source nodes in the monitored network. The network assurance service identifies, for each of the detected anomalies, a set of network paths between the source nodes associated with the anomaly and one or more potential destinations of traffic for that source node. The network assurance service correlates networking devices along the network paths in the identified sets of network paths with the detected network anomalies. The network assurance service adjusts the machine learning-based anomaly detector to use a performance measurement for a particular one of the networking devices as an input feature, based on the correlation between the particular networking device and the detected network anomalies.
Dynamically-Optimized Hash-Based Packet Classifier
A network element includes multiple ports and a packet classifier. The packet classifier is configured to receive rules and Rule Patterns (RPs), each RP corresponding to a subset of the rules and specifies positions of unmasked packet-header bits to be matched by the rules in the subset, to store in a RAM a grouping of the RPs into Extended RPs (ERPs), each ERP defining a superset of the unmasked bits in the RPs associated therewith, to receive packets and match each packet to one or more of the rules by accessing the ERPs in the RAM, to determine counter values, each counter value corresponding to a respective RP and is indicative of a number of the received packets that match the RP, and to adaptively modify grouping of the RPs into the ERPs depending on the counter values.