OPPORTUNISTIC MESH FOR SOFTWARE-DEFINED WIDE AREA NETWORK (SD-WAN)

    公开(公告)号:US20230116163A1

    公开(公告)日:2023-04-13

    申请号:US17449311

    申请日:2021-09-29

    Abstract: Techniques are described for forming on-demand mesh connections between spoke routers of a Software-Defined Wide Area Network (SD-WAN) arranged in a hub-and-spoke topology. A first spoke router modifies the first packet to include metadata specifying first reachability information and first Internet Protocol (IP) address information for the first spoke router. The first spoke router forwards the first packet to a hub router for forwarding to a second spoke router. The first spoke router receives a second packet from the hub router that includes metadata specifying second reachability information and second IP address information for the second spoke router. In response to determining that the first reachability information is compatible with the second reachability information, the first spoke router initiates a peering connection with the second spoke router along a path which bypasses the hub router for forwarding subsequent packets of the forward packet flow.

    Layer-2 network extension over layer-3 network using layer-2 metadata

    公开(公告)号:US11546249B2

    公开(公告)日:2023-01-03

    申请号:US17357790

    申请日:2021-06-24

    Abstract: Techniques are disclosed for session-based routing within Open Systems Interconnection (OSI) Model Layer-2 (L2) networks extended over Layer-3 (L3) networks. In one example, L2 networks connect a first client device to a first router and a second client device to a second router. An L3 network connects the first and second routers. The first router receives, from the first client device, an L2 frame destined for the second client device. The first router generates an L3 packet comprising an L3 header specifying L3 addresses of the first and second routers, a first portion of metadata comprising L2 addresses for the first and second client devices, and a second portion of metadata comprising L3 addresses for the first and second client devices, and forwards the L3 packet to the second router. The second router recovers the L2 frame from the metadata and forwards the L2 frame to the second client device.

    METRIC-BASED MULTI-HOP PATH SELECTION

    公开(公告)号:US20220200887A1

    公开(公告)日:2022-06-23

    申请号:US17645846

    申请日:2021-12-23

    Abstract: Techniques are described for a router providing metric-based multi-hop path selection. For example, a first router of a plurality of routers receives a plurality of network performance metrics for a plurality of links interconnecting the plurality of routers. The plurality of links form a plurality of multi-hop paths through the plurality of routers to a service instance. The router determines, based on the plurality of network performance metrics for the plurality of links, an end-to-end performance of each of the plurality of multi-hop paths. The router selects a multi-hop path over which to forward traffic associated with the session based on the end-to-end performance of each of the plurality of multi-hop paths and one or more performance requirements for a service associated between a session between a client device and the service instance. The router forwards the traffic to the service instance along the selected multi-hop path.

    INLINE SECURITY KEY EXCHANGE
    17.
    发明公开

    公开(公告)号:US20240340163A1

    公开(公告)日:2024-10-10

    申请号:US18745443

    申请日:2024-06-17

    CPC classification number: H04L9/0825 H04L9/0827 H04L9/0891 H04L45/42 H04L45/74

    Abstract: Techniques are disclosed for inline security key exchanges between network devices. An example network device includes one or more processors and memory coupled to the one or more processors. The memory stores instructions that, upon execution, cause one or more processors to obtain a first payload key and obtain a path key. The instructions cause the one or more processors to encrypt a first payload of a first packet using the first payload key and insert the first payload key into first metadata of the first packet. The instructions cause the one or more processors to encrypt the first metadata using the path key and send the first packet to another network device.

    Inline security key exchange
    18.
    发明授权

    公开(公告)号:US12041162B2

    公开(公告)日:2024-07-16

    申请号:US17651599

    申请日:2022-02-18

    CPC classification number: H04L9/0825 H04L9/0827 H04L9/0891 H04L45/42 H04L45/74

    Abstract: Techniques are disclosed for inline security key exchanges between network devices. An example network device includes one or more processors and memory coupled to the one or more processors. The memory stores instructions that, upon execution, cause one or more processors to obtain a first payload key and obtain a path key. The instructions cause the one or more processors to encrypt a first payload of a first packet using the first payload key and insert the first payload key into first metadata of the first packet. The instructions cause the one or more processors to encrypt the first metadata using the path key and send the first packet to another network device.

    POINT-TO-MULTIPOINT LAYER-2 NETWORK EXTENSION OVER LAYER-3 NETWORK

    公开(公告)号:US20230009482A1

    公开(公告)日:2023-01-12

    申请号:US17932960

    申请日:2022-09-16

    Abstract: Techniques are disclosed for session-based routing of multipoint Open Systems Interconnection (OSI) Model Layer-2 (L2) frames of an L2 network extended over Layer-3 (L3) networks. In one example, L2 networks connect a source device to an ingress router and receiver devices to egress routers. An L3 network connects the ingress and egress routers. The ingress router receives, from the source device, a multipoint L2 frame destined for the receiver devices. The ingress router forms, for each egress router that is connected to at least one multipoint receiver device, a unicast L3 packet for the L2 frame and forwards the unicast L3 packet to the egress router. Each egress router generates, in response to receiving the unicast L3 packet, the multipoint L2 frame and forwards, to the receiver devices, the multipoint L2 frame.

    LAYER -2 NETWORK EXTENSION OVER LAYER-3 NETWORK USING LAYER-2 METADATA

    公开(公告)号:US20210409323A1

    公开(公告)日:2021-12-30

    申请号:US17357790

    申请日:2021-06-24

    Abstract: Techniques are disclosed for session-based routing within Open Systems Interconnection (OSI) Model Layer-2 (L2) networks extended over Layer-3 (L3) networks. In one example, L2 networks connect a first client device to a first router and a second client device to a second router. An L3 network connects the first and second routers. The first router receives, from the first client device, an L2 frame destined for the second client device. The first router generates an L3 packet comprising an L3 header specifying L3 addresses of the first and second routers, a first portion of metadata comprising L2 addresses for the first and second client devices, and a second portion of metadata comprising L3 addresses for the first and second client devices, and forwards the L3 packet to the second router. The second router recovers the L2 frame from the metadata and forwards the L2 frame to the second client device.

Patent Agency Ranking