Patent classifications
H04L45/741
SYSTEMS AND METHODS FOR PROVIDING A DYNAMIC-HYBRID FORWARDING INFORMATION BASE (DHFIB)
A routing system can provide a Dynamic-Hybrid Forwarding Information Base (DHFIB). A control component of the routing system can build a routing table that includes routing information (e.g., prefixes, addresses, etc.) for use by a first routing component. The routing table can be ordered or ranked based on traffic information from the first routing component. Then, the control component can create the DHFIB from the routing table, wherein the DHFIB is a portion of the routing table and related to the first routing component. As such, the portion of the routing table selected for the DHFIB can be the set of prefixes in the routing table that represent the most frequently routed or most important prefixes in the routing table. Finally, the control component can forward the DHFIB to the first routing component to allow the routing component to route communications.
IPv6 extension header for stateless handling of fragments in IPv6
A network device may receive, from a first network, a network packet of a first network packet type that encapsulates a fragment of a second network packet of a second network packet type, where the network packet includes an extension header that indicates a source port and a destination port for the second network packet. The network device may perform an anti-spoof check on the fragment of the second network packet based at least in part on at least one of: the source port or the destination port for the second network packet that is indicated by the extension header. The network device may, based on the fragment passing the anti-spoof check, forward the fragment of the second network packet to a second network.
IPv6 extension header for stateless handling of fragments in IPv6
A network device may receive, from a first network, a network packet of a first network packet type that encapsulates a fragment of a second network packet of a second network packet type, where the network packet includes an extension header that indicates a source port and a destination port for the second network packet. The network device may perform an anti-spoof check on the fragment of the second network packet based at least in part on at least one of: the source port or the destination port for the second network packet that is indicated by the extension header. The network device may, based on the fragment passing the anti-spoof check, forward the fragment of the second network packet to a second network.
SOURCE ROUTING WITH SHADOW ADDRESSES
Various example embodiments for supporting source routing are presented herein. Various example embodiments for supporting source routing may be configured to support source route compression for source routing. Various example for supporting source route compression for source routing may be configured to support source route compression for source routing based on use of shadow addresses. Various example for supporting source route compression for source routing based on use of shadow addresses may be configured to support source routing of packets based on use of shadow addresses of hops in place of actual addresses of hops to encode source routes within source routed packets, thereby compressing the source routes within the source routed packets and, thus, providing source route compression.
PACKET HEADER INFORMATION OBTAINING METHOD, PACKET GENERATION METHOD, DEVICE, AND STORAGE MEDIUM
A packet header information obtaining method. The method includes: obtaining, by a communications device, a first packet, where the first packet includes a plurality of extension packet headers; and obtaining an extension header self-describing option from the first packet, where the extension header self-describing option is used to indicate information about the plurality of extension packet headers. Therefore, the communications device obtains, based on the extension header self-describing option in the first packet, a first extension packet header included in the plurality of extension packet headers. Packet header information of the extension packet header in the first packet can be obtained by using the extension header self-describing option, and the first extension packet header that needs to be parsed can be directly located from the first packet by using the obtained packet header information.
PACKET HEADER INFORMATION OBTAINING METHOD, PACKET GENERATION METHOD, DEVICE, AND STORAGE MEDIUM
A packet header information obtaining method. The method includes: obtaining, by a communications device, a first packet, where the first packet includes a plurality of extension packet headers; and obtaining an extension header self-describing option from the first packet, where the extension header self-describing option is used to indicate information about the plurality of extension packet headers. Therefore, the communications device obtains, based on the extension header self-describing option in the first packet, a first extension packet header included in the plurality of extension packet headers. Packet header information of the extension packet header in the first packet can be obtained by using the extension header self-describing option, and the first extension packet header that needs to be parsed can be directly located from the first packet by using the obtained packet header information.
Systems, apparatuses and methods for network packet management
Methods and systems are provided for latency-oriented router. An incoming packet is received on a first interface. The type of the incoming packet is determined. Upon the detection that the incoming packet belongs to latency-critical traffic, the incoming packet is duplicated into one or more copies. Subsequently, the duplicated copies are sent to a second interface in a delayed fashion where the duplicated copies are spread over a time period. The duplicated copies are received and processed at the second interface.
Systems, apparatuses and methods for network packet management
Methods and systems are provided for latency-oriented router. An incoming packet is received on a first interface. The type of the incoming packet is determined. Upon the detection that the incoming packet belongs to latency-critical traffic, the incoming packet is duplicated into one or more copies. Subsequently, the duplicated copies are sent to a second interface in a delayed fashion where the duplicated copies are spread over a time period. The duplicated copies are received and processed at the second interface.
Mechanism and procedures for multi-domain enterprise fabric domain federations
In one embodiment, a method generally includes a first edge (E) node in a network receiving an encapsulated data packet, wherein the encapsulated data packet comprises an outer header and a data packet, wherein the outer header comprises a first router locator (RLOC) corresponding to the first E node, wherein the data packet comprises an internet protocol (IP) header, and wherein the IP header comprises a destination endpoint identification (EID) corresponding to a host H. The first E node determines whether the host H is attached to the first E node. And in response to the first E node determining the host is attached to the first E node, the first E node forwards the data packet to the host H. The first E node receives a message from another node after the host H detaches from the first E node and reattaches to another E node, wherein the message comprises the destination EID.
Inband group-based network policy using SRV6
The present technology pertains to a group-based network policy using Segment Routing over an IPv6 dataplane (SRv6). After a source application sends a packet, an ingress node can receive the packet, and if the source node is capable, it can identify an application policy and apply it. The ingress node indicates that the policy has been applied by including policy bits in the packet encapsulation. When the packet is received by the egress node, it can determine whether the policy was already applied, and if so, the packet is forward to the destination application. If the egress node determines that the policy has not be applied the destination application can apply the policy. Both the ingress node and egress nodes can learn of source application groups, destination application groups, and applicable policies through communication with aspects of the segment routing fabric.