Abstract:
A system comprising a plurality of service nodes, a controller and a network device in communication with the controller. Each of the plurality of service nodes is configured to support one or more service functions to establish a service function chain that includes a plurality of service functions to be performed by routing traffic among the plurality of service nodes. The controller is configured to generate provisioning information for the service function chain. The provisioning information includes at least one condition upon which a service function reclassification or branching operation is to be performed by at least one service node. The network device is in communication with the controller, and is configured to distribute the provisioning information for the service function chain to the plurality of service nodes using a distributed routing protocol.
Abstract:
In one embodiment, a device in a network receives a packet that includes one or more forwarding labels and a service function chaining (SFC) header. The device removes the one or more forwarding labels from the packet. The device inserts an indication of the one or more forwarding labels into metadata of the SFC header. The device forwards the packet with the inserted indication of the one or more forwarding labels to a service function.
Abstract:
In one embodiment, a plurality of packets is sent from an origin device along a communication path toward a destination device. Each packet includes a lifespan indicator which is incrementally increased for each subsequently sent packet. A plurality of response messages are received at the origin device from a plurality of intermediate devices, respectively. A plurality of secure path objects included in the plurality of response messages, respectively, is determined. Additionally, the plurality of secure path objects are validated based on validation information accessible by the origin device. Validation results of the plurality of secure path objects are checked to determine whether a packet that is sent from the origin device and received by the destination device travels along a particular communication path as dictated by control plane information.
Abstract:
In one embodiment, an ingress router sends a multipath information query across a computer network toward an egress router, and builds an entropy table based on received query responses. The entropy table maps the egress router to one or more available paths to the egress router, and associated entropy information for each respective available path of the one or more available paths. The ingress router may then forward traffic to the egress router using the entropy table to load share the traffic across the one or more available paths using the associated entropy information for each respective available path. In response to detecting a failure of a particular path of the one or more available paths, however, the ingress router then removes the particular path from the entropy table, thereby ceasing forwarding of traffic over the particular path.
Abstract:
Techniques are presented herein that validate integrity of a computing device. A command to a first processor of a security module of the computing device is received through an interface unit of the security module on a communication channel external to the computing device. A configuration of the security module cannot be changed by a second processor of the computing device which executes an operating system and at least one application on the computing device. In response to receiving the command, one or more memory devices of the computing device are directly accessed by the first processor independent from the second processor to validate integrity of the computing device.
Abstract:
Network topology information may be determined for a plurality of network devices on a network. System identifier information may then be determined for each of the plurality of network devices on the network. The system identifier information may be a list of network solutions that each network device actually or potentially belongs to. The system may then flag the system identifier information to indicate whether each solution is an actual or a potential solution.
Abstract:
A method is provided in one example and includes communicating a first request message to a first network element functioning as a point of local repair for a backup label switched path. The first request message includes a first network address having a predetermined value and an indication of a forwarding equivalence class associated with the backup label switched path. The method further includes receiving a first reply message from the first network element. The first reply message includes at least one backup path parameter associated with the backup label switched path.
Abstract:
An example method for seamless path monitoring and rapid fault isolation using bidirectional forwarding detection (BFD) in a network environment is provided and includes determining a BFD target identifier type for communicating in a BFD session in a network environment, determining a non-zero globally assigned BFD discriminator value associated with the BFD target identifier type, populating a Your Discriminator field in a BFD Control Packet with the non-zero globally assigned BFD discriminator value, with a My Discriminator field in the BFD Control Packet being populated with a locally assigned BFD Discriminator value, and initiating the BFD session by transmitting the BFD Control Packet to a target node in the network. In a specific embodiment, the BFD target identifier type is type 3, and the non-zero globally assigned BFD discriminator is an Alert Discriminator reserved by substantially all nodes in the network exclusively for BFD traceroute operations.
Abstract:
In one embodiment, a circuit that extends between a head-end label switching router (LSR) and a tail-end LSR and traverses one or more intermediate LSRs is locked to data plane traffic. The head-end LSR transmits a packet along the circuit that includes a particular time-to-live (TTL) value configured to expire at a particular intermediate LSR at which loopback is to occur. The circuit is used in a loopback mode. The head-end LSR transmits along the circuit a packet that includes a cease loopback request. The circuit ceases to be used in the loopback mode. The circuit is unlocked to permit the circuit to pass data plane traffic.
Abstract:
In one embodiment, a method includes receiving a packet in a service function chain at a network device located at a border of a first administrative domain, the packet comprising a service function path identifier and a service index, processing the packet at the network device, wherein processing comprises modifying the packet based on the service function path identifier and the service index to direct the packet to a second administrative domain, and forwarding the packet from the network device to the second administrative domain for processing in the service function chain. The service function chain extends over the first and second administrative domains. An apparatus and logic are also disclosed herein.