Service chain overlay network operations visibility via data packets

    公开(公告)号:US10348648B2

    公开(公告)日:2019-07-09

    申请号:US15156689

    申请日:2016-05-17

    Abstract: In one embodiment, a particular service chain data packet is received by a particular service node, with the service chain data packet including a header identifying service chain information. The particular service node applies a service to the particular service chain data packet. The particular service node adds service-layer operations data to the particular service chain data packet, with the service-layer operations data related to the current service function or the particular service node. Subsequently, the particular service node sends the particular service chain data packet with the service-layer operations data from the particular service node. In one embodiment, networking operations data is also added to the particular service chain data packet. In one embodiment, an egress service node removes the service-layer (and possibly networking) operations data and forwards to another system, possibly after processing this operations data.

    PATH SIGNATURES FOR DATA FLOWS
    96.
    发明申请

    公开(公告)号:US20250112861A1

    公开(公告)日:2025-04-03

    申请号:US18981218

    申请日:2024-12-13

    Abstract: This disclosure describes various methods, systems, and devices related to identifying path changes of data flows in a network. An example method includes receiving, at a node, a packet including a first signature. The method further includes generating a second signature by inputting the first signature and one or more node details into a hash function. The method includes replacing the first signature with the second signature in the packet. The packet including the second value is forwarded by the node.

    OVERLAY-BASED OAM FOR BGP FAULT DETECTION

    公开(公告)号:US20250016092A1

    公开(公告)日:2025-01-09

    申请号:US18372443

    申请日:2023-09-25

    Abstract: Techniques for generating and utilizing overlay-based Border Gateway Protocol (BGP) Operations, Administration, and Maintenance (OAM) packets to detect issues with an underlay network. The techniques may include receiving, from a BGP peer device via a control plane path, an OAM probe indicating a forwarding path to be used for sending the traffic to a destination associated with a prefix. The techniques may also include determining, based at least in part on the OAM probe, that a next-hop device is incapable of being utilized to forward the traffic to the destination, the next-hop device determined based on an origination of the prefix. The techniques may further include performing a policy-based action based at least in part on determining that the next-hop device is incapable of being utilized to forward the traffic to the destination.

    DISTRIBUTED ARTIFICIAL INTELLIGENCE RUNTIME AT THE NETWORK EDGE AS A SERVICE

    公开(公告)号:US20240054318A1

    公开(公告)日:2024-02-15

    申请号:US17888379

    申请日:2022-08-15

    CPC classification number: G06N3/04 G06N3/10

    Abstract: This disclosure describes techniques and mechanisms for enabling a user and third party applications to dynamically partition and place heavy deep learning workloads on standard edge networks to optimize the overall inference throughput of the network while meeting Service Level Objective(s) (SLOs). The techniques may include profiling, partitioning, and splitting of the deep learning workloads, which may be hidden from the user and/or third party application. The user may user interact with a pre-deployed service through a simple SDK that resembles those used for hardware acceleration, such that the current techniques may be easily inserted into their code.

    Path validation checks for proof of security

    公开(公告)号:US11818141B2

    公开(公告)日:2023-11-14

    申请号:US17546492

    申请日:2021-12-09

    Abstract: According to an embodiment, a node comprises one or more processors and one or more computer-readable non-transitory storage media comprising instructions that, when executed by the one or more processors, cause one or more components of the node to perform operations. The operations comprise determining security validation information that the node associates with a packet, inserting into the packet an identifier associated with the node and the security validation information that the node associates with the packet, and transmitting the packet comprising the identifier associated with the node and the security validation information that the node associates with the packet. The security validation information comprises one or more proof of security attributes and/or one or more proof of security level attributes.

Patent Agency Ranking