Abstract:
In one embodiment, an ingress router sends a multipath information query across a computer network toward an egress router, and builds an entropy table based on received query responses. The entropy table maps the egress router to one or more available paths to the egress router, and associated entropy information for each respective available path of the one or more available paths. The ingress router may then forward traffic to the egress router using the entropy table to load share the traffic across the one or more available paths using the associated entropy information for each respective available path. In response to detecting a failure of a particular path of the one or more available paths, however, the ingress router then removes the particular path from the entropy table, thereby ceasing forwarding of traffic over the particular path.
Abstract:
A web browser executes on a device that has controllable operational features, such as sensor, actuator, and process-related features, and that is connected to other devices via a network. The web browser receives a HyperText Markup Language (HTML) document including HTML device tags. Each of the HTML device tags includes a command configured to control a corresponding one of the operational features of the device. The web browser determines, based on each HTML device tag, the command therein to control the corresponding operational feature. The web browser issues the determined command to the corresponding operational feature so as to control the operational feature.
Abstract:
The present disclosure provides for carrying downstream mapping information in an echo request message and/or echo reply message, which can describe both IP (Internet Protocol) multipath information and label multipath information. A transit node (e.g., an LSR element) that receives an echo request message from an initiator node determines downstream mapping information, which is returned to the initiator node. Transit node determines whether a newly defined type of multipath information (type 10) should be generated to return the downstream mapping information, based on whether transit node performs load balancing based on labels or IP header information, and whether transit node imposes entropy labels. A multipath information type 10 element includes either IP multipath information or label multipath information, as well as associated label multipath information that includes one or more entropy labels that map to the IP or label multipath information being returned.
Abstract:
A network device may connect to a smart-enabled network. Once connected, the network device may receive a network address for a network management server (NMS). Having the network address for the NMS, the network device may generate a vCard comprising the attributes necessary for registering with the NMS. The network device may then communicate the vCard to the NMS. The NMS may then be configured to identify, register, and add the network device to a directory.
Abstract:
In one embodiment, a circuit that extends between a head-end label switching router (LSR) and a tail-end LSR and traverses one or more intermediate LSRs is locked to data plane traffic. The head-end LSR transmits a packet along the circuit that includes a particular time-to-live (TTL) value configured to expire at a particular intermediate LSR at which loopback is to occur. The circuit is used in a loopback mode. The head-end LSR transmits along the circuit a packet that includes a cease loopback request. The circuit ceases to be used in the loopback mode. The circuit is unlocked to permit the circuit to pass data plane traffic.
Abstract:
Techniques are described for quickly rerouting traffic to an application hosted on a first Virtual Private Cloud (VPC) location. In the event of an error in routing traffic to the first VPC portion traffic can be rerouted to a second VPC portion. The first and second VPC portions can be different portions of the same VPC or could be different VPSs. The techniques include steps for calculating a predetermined route to the second private virtual cloud location. The techniques further include steps for monitoring data for detecting an error in the first cloud location. The steps further include detecting a potential error based on the monitored data, and also verifying that the potential error is in fact a valid error. In response to verifying that the error is a valid error, further steps include performing a fast reroute of traffic to the second cloud locations along the predetermined route.
Abstract:
An authorization device obtains a registration request associated with an end device, the registration request including a new randomized media access control (MAC) address associated with the end device; determines whether the end device is authorized to use the new randomized MAC address; transmits a message to the end device with a first randomly generated number when it is determined that the end device is authorized to use the new randomized MAC address; obtains integrity information associated with the end device, the first integrity information being computed based on the first randomly generated number; transmits a request to a validation system to validate the end device based on the first integrity information; obtains an indication that the end device is validated; determines policies associated with the end device when it is determined that the end device is validated; and applies the policies to the end device.
Abstract:
Systems, methods, and computer-readable for cognitive sensor fusion management include obtaining one or more data streams from one or more sensors. Learning algorithms are used for determining whether a combination of the one or more data streams includes sufficient information for achieving a desired outcome, based on context, business verticals, or other considerations. One or more modifications are determined to at least the one or more data streams or one or more sensors based on whether the combination of the one or more data streams includes sufficient information for achieving the desired outcome. In a closed-loop system, feedback from implementing the one or more modifications can be used to update the desired outcome.
Abstract:
In one embodiment, an access policy enforcement service receives a user authentication request from an end-user device. The access policy enforcement service identifies a telemetry collection intent from the user authentication request. The access policy enforcement service determines a monitoring policy based on the telemetry collection intent identified from the user authentication request. The access policy enforcement service configures, according to the monitoring policy, one or more telemetry collection agents to collect telemetry for traffic associated with the end-user device.
Abstract:
A method of orchestrating one or more radio resources among various services executing within a container. The method includes obtaining, by an orchestration engine executing on a network device, a request, from a first service of a plurality of services, for use of a physical/hardware resource that connects a container running on the network device to a network. The request from the first service has a particular priority. The plurality of services execute within the container. The method further includes determining whether to connect the first service to the network via the physical/hardware resource based on the priority and an availability status of the physical/hardware resource and establishing, at a kernel level, a connection between the first service and the physical/hardware resource based on the determining.