H04L49/1569

Packet control method, flow table update method, and node device

A packet control method, a flow table update method, and a node device including a first queue and a second queue, where the method includes: obtaining, by the node device, a first packet; determining, by the node device, that a data flow to which the first packet belongs is marked as an isolated flow; and if the first queue and/or the second queue meet and/or meets a first preset condition, controlling, by the node device, the first packet to enter the first queue and wait to be scheduled; or if the first queue and/or the second queue meet and/or meets a second preset condition, controlling, by the node device, the first packet to enter the second queue and wait to be scheduled.

Offload of storage node scale-out management to a smart network interface controller

Examples described herein relate to a network interface that includes an initiator device to determine a storage node associated with an access command based on an association between an address in the command and a storage node. The network interface can include a redirector to update the association based on messages from one or more remote storage nodes. The association can be based on a look-up table associating a namespace identifier with prefix string and object size. In some examples, the access command is compatible with NVMe over Fabrics. The initiator device can determine a remote direct memory access (RDMA) queue-pair (QP) lookup for use to perform the access command.

HIERARCHICAL RESOURCE CONSTRAINED NETWORK
20230055091 · 2023-02-23 ·

System and techniques for a hierarchical resource constrained networks are described herein. Device participating in the network are divided into groups. These groups correspond to vertices in a routing graph. A leader is selected amongst the devices in each group to function as a routing node connecting to other vertices of the routing graph. Client devices attach to leaf vertices in the routing graph. To reduce overhead in placing devices into the routing pools, a distributed hash table (DHT) can be used. Here, the routing pools can be given DHT IDs based on, for example, a structure of the routing graph. Device DHT IDs are used to assign them to the routing pools based on a distance metric. Routing, in this arrangement, can use the DHT IDs to efficiently compute routing pool hops when routing messages. This arrangement works well for publication-subscription (pub-sub) services.

SINGLE FIELD FOR ENCODING MULTIPLE ELEMENTS
20230097722 · 2023-03-30 ·

Implementations of the present disclosure are directed to systems and methods for reducing the size of packet headers by using a single field to encode multiple elements. Instead of including separate fields for each element, one or more encoded fields may be used, each of which is decoded to determine two or more values for the data packet. A receiving device decodes the encoded data field to retrieve the two or more values.

Defining non-forwarding adjacencies in bipartite networks, such as Clos networks, having a level 2 backbone and level 1 nodes

Problems associated with providing a large Clos network having at least one top of fabric (ToF) node, a plurality of internal nodes, and a plurality of leaf nodes may be solved by: (a) providing L2 tunnels between each of the leaf nodes of the Clos and one or more of the at least one ToF node to ensure a non-partitioned IGP L2 backbone, and (b) identifying the L2 tunnels as non-forwarding adjacencies in link state topology information stored in ToF node(s) and leaf node(s) such that the L2 tunnels are not used for forwarding traffic. Tunnel formation is prevented over L2.

Low latency compact Clos network controller
11665111 · 2023-05-30 · ·

Many network protocols, including certain Ethernet protocols, include specifications for multiplexing using of virtual lanes. Due to skews and/or other uncertainties associated with the process, packets from virtual lanes may arrive at the receiver out of order. The present disclosure discusses implementations of receivers that may use multiplexer based crossbars, such as Clos networks, to reorder the lanes. State-based controllers for the Clos networks and state-based methods to assign routes in are also discussed.

LOAD BALANCING METHOD, APPARATUS, AND SYSTEM

A load balancing system implemented in a data center network (DCN) includes a controller and a server. The controller generates topology information of the DCN based on information about a network node in the DCN, and sends the topology information to the server. The server obtains a data flow and selects a forwarding path corresponding to the data flow from a plurality of load balancing paths, wherein the plurality of load balancing paths are generated based on the topology information.

OFFLOAD OF STORAGE NODE SCALE-OUT MANAGEMENT TO A SMART NETWORK INTERFACE CONTROLLER
20230111490 · 2023-04-13 ·

Examples described herein relate to a network interface that includes an initiator device to determine a storage node associated with an access command based on an association between an address in the command and a storage node. The network interface can include a redirector to update the association based on messages from one or more remote storage nodes. The association can be based on a look-up table associating a namespace identifier with prefix string and object size. In some examples, the access command is compatible with NVMe over Fabrics. The initiator device can determine a remote direct memory access (RDMA) queue-pair (QP) lookup for use to perform the access command.

Managed midlay layers on a routed network

Techniques for providing a non-blocking fabric in a network are described. A network controller determines the network requirement for various network traffic types on the network and determines the allocation of resources across the network needed to establish a midlay, including midlay components on the network. The network controller then establishes the midlay on the network according to the determined allocation. At least one of the midlay components is a virtually non-blocking fabric for high-priority traffic or fully non-blocking fabric for deterministic traffic.

Packet sending method, device, and system

The method includes: generating, by a first device, a first packet including a BIER header, where the BIER header includes entropy, and the entropy includes a first part and a second part; determining, by the first device based on the first packet, that there are a plurality of forwarding entries used to forward the first packet; selecting, by the first device, one forwarding entry from the plurality of forwarding entries based on the first part, where the selected forwarding entry includes an address of a second device, and the second device is a next-hop device of the first device; and sending, by the first device, the first packet to the second device, where the second part is used by the second device to select, from a plurality of forwarding entries used to forward the first packet, a forwarding entry used by the second device to forward the first packet.