Patent classifications
H04L12/751
POLICY VALIDATION
This disclosure describes techniques for policy validation techniques relating to data traffic routing among network devices. The techniques may include processing a validation request from a controller. A validation request may include information related to a computed path for routing data traffic in a computing network. The processing may include sending one or more path requests to one or more redundant controllers, and comparing computed paths from the redundant controller(s) to the originally computed path. The techniques may include generating a validation response based on comparing the computed paths. In some examples, the techniques may further include determining a health score for the controller. Policy validation techniques may improve data traffic routing among network devices by helping to ensure valid policies are produced.
APPLICATION-AWARE BGP PATH SELECTION AND FORWARDING
A routing structure is defined for provider edge (PE) routers that will create the ability to recompute best paths based on application criteria. The routing structure may include the use of a network controller which is connected with the internet to receive requests from applications to trigger path re-computation. The controller will peer with PEs to send re-computation information used by the PE to construct an application-aware BGP table and forwarding instance. The PE also defines a new BGP and packet filter to replicate specific BGP paths into the application-aware table. The application-aware BGP and forwarding instance is unique to the requesting application. Thus, each request with a different source/destination combination obtains a discrete table providing separation. When a packet enters the PE from customer edge (CE) or core interface the packet traverses a packet filter that when matched against source/destination is redirected to the appropriate application-aware forwarding table. Once in the application-aware table the packet is then forwarded along the application-aware path achieving the objective. The instantiation of the application-aware BGP and forwarding table is be done based on BGP updates learned from the controller.
SIGNALING IP ADDRESS MOBILITY IN ETHERNET VIRTUAL PRIVATE NETWORKS
In some examples, a provider edge device provides L2 virtual bridge connectivity for at least one customer network using an EVPN instance and L3 routing using an IRB interface that is a L3 routing interface assigned to the EVPN instance; the provider edge device obtains an indication of a new binding for an endpoint device of the at least one customer network, the new binding comprising a first L2 address and a L3 address that are assigned to the endpoint device; and the provider edge device outputs, in response to determining the provider edge device stores a prior binding for the endpoint device of a second L2 address and the L3 address that are assigned to the endpoint device, an EVPN route comprising an indication of the new binding and an indication the new binding is an updated binding of the prior binding for the endpoint device.
METHOD OF SHARING NETWORK RESOURCE AND NETWORK COORDINATION APPARATUS
A method of sharing network resource and associated network coordination apparatus are provided. The method includes following steps. Firstly, a resource sharing request from a tenant is received. Then, a controller is requested to determine whether resource of a shared transport network is satisfied with the resource sharing request. A tenant ID is generated for the tenant when the controller determines the resource of the shared transport network is satisfied with the resource sharing request. The tenant ID is transmitted to the tenant. The controller is requested to generate at least one packet header for at least one transport service type corresponding to the each of at least one group ID, and further update a plurality of flow tables of the plurality of forward devices according to the at least one packet header.
Method, device, and virtual private network system for advertising routing information
The present invention discloses a method for advertising routing information, and embodiments of the present invention further provide a virtual private network server device, an IP edge node device, and a client-based virtual private network system. In the technical solutions of the present invention, a virtual private network server first collects MAC address routing information of each site on a local virtual private network and then sends MAC address routing information of each site except a destination site in a unicast manner to a customer edge node that corresponds to each site on the virtual private network. This solves the problem that CE nodes in sites on the virtual private network cannot exchange routing information with each other by using a routing protocol because multicast packets are filtered by an access node of the data center network.
Control method, information processing device, and communication system
A control method executed by an information processing device including a memory configured to store information on a plurality of temporary routes set for each kind of service, the control method includes receiving a routing request from a switch among a plurality of switches; extracting, from the memory, a temporary route corresponding to a service related to the routing request when it is determined that processing congestion of the information processing device occurs; setting the extracted temporary route for one or more related switches among the plurality of switches; determining a route corresponding to the service, based on a predetermined condition of the service, when it is determined that the processing congestion of the information processing device has subsided; and setting the determined route for the one or more related switches among the plurality of switches.
Device mobility in a mesh network
In one embodiment, a device in a network receives a notification from a neighbor of the device indicative of a child node of the device requesting a parent change from the device to the neighbor. The device updates an existing routing path from the device to the child node to be routed through the neighbor, in response to receiving the notification from the neighbor. The device receives an instruction to remove the updated routing path from the device to the child node through the neighbor. The device removes the updated routing path from the device to the child node, in response to receiving the instruction to remove the updated routing path.
NETWORK TOPOLOGY
A system for network topology includes a first edge router node and a plurality of first sensors operatively connected to the first edge router node. A second edge router node is operatively connected to the first edge router node and to the plurality of first sensors. A plurality of second sensors are operatively connected to the second edge router node and to the first edge router node. The first and second edge router nodes are operatively connected to a cloud server through a respective cloud connection, so that in the event of one of the cloud connections becoming unavailable the plurality of first and second sensors in the system can remain operatively connected to the cloud server through the remaining cloud connection.
SCALED INTER-DOMAIN METRICS FOR LINK STATE PROTOCOLS
In general, techniques are described by which to provide a scaled end-to-end view of link metrics to integrate multiple non-uniform Interior Gateway Protocol (“IGP”) domains. For example, an Accumulated Interior Gateway Protocol (“AIGP”) attribute, a non-transitive BGP attribute, which includes a link metric assigned to a link within a first IGP domain, is scaled to conform to a metric scale of the second IGP domain. The AIGP attribute may also add link metric assigned to a link within the second IGP domain and may add static metrics of non-IGP links connecting the IGP domains. An IGP domain may set its IGP to the scaled AIGP attribute such that the link metric may include a uniformly scaled end-to-end view of link metrics across the IGP domains. Additionally, a sham-link is assigned a metric value in accordance with the scaling techniques.
Sleeping link waking method and apparatus
The present invention discloses a sleeping link waking method and apparatus, and relates to the field of communications network technologies, which can automatically wake a sleeping link in a timely manner according to an actual load condition of a network, and reduce labor maintenance costs. According to embodiments of the present invention, a first router receives a first LSP packet sent by a management router, where the first LSP packet includes a first TLV, and the first TLV is used to determine a sleeping link to be woken; the first router determines, according to the first TLV, the sleeping link to be woken; and the first router wakes the sleeping link. The solutions provided by the embodiments of the present invention are suitable to be used to wake a sleeping link.