-
公开(公告)号:US20220417143A1
公开(公告)日:2022-12-29
申请号:US17902158
申请日:2022-09-02
Applicant: Cisco Technology, Inc.
Inventor: Pascal Thubert , Eric Levy-Abegnoli , Patrick Wetterwald
IPC: H04L45/00 , H04L12/46 , H04L45/02 , H04L49/201
Abstract: Techniques for leveraging MLD capabilities at edge nodes of network fabrics to receive SNMAs from silent hosts, and creating unicast addresses from the SNMAs for the silent nodes that are used as secondary matches in a network overlay if primary unicast address lookups fail. The edge nodes described herein may act as snoopers of MLD reports in order to identify the SNMAs of the silent hosts. The edge nodes then forge unicast addresses for the silent hosts that match with the least three bytes of the SNMAs. The forged unicast addresses are presented as unicast MAC/IP mappings in the fabric overlay. In situations where a primary IP address lookup fails, the look-up device performs a secondary lookup for a mapped address that has the last three bytes of the IP address. If a mapping is found, the lookup is sent as a unicast message to the matching MAC address.
-
公开(公告)号:US20220394009A1
公开(公告)日:2022-12-08
申请号:US17819783
申请日:2022-08-15
Applicant: Cisco Technology, Inc.
Inventor: Pascal Thubert , Eric Levy-Abegnoli , Jonas Zaddach , Patrick Wetterwald
IPC: H04L61/3015 , H04L61/30 , H04L45/02 , H04L9/40
Abstract: Systems and methods may include sending, to a network registrar, an extended duplicate address request (EDAR) message including a first nonce generated by a host computing device, and receiving, from the network registrar, an extended duplicate address confirmation (EDAC) message including a second nonce and a first signature, a first nonce pair including the first nonce and the second nonce being signed by the network registrar via a first key pair of the network registrar via the first signature. The systems and methods may further include sending a first neighbor advertisement (NA) message to the host computing device including the second nonce. The second nonce and a public key of the network registrar verifies the first signature from the network registrar, the verification of the first signature indicating that a router through which the host computing device connects to a network is not impersonating the network.
-
公开(公告)号:US20220353165A1
公开(公告)日:2022-11-03
申请号:US17866465
申请日:2022-07-15
Applicant: Cisco Technology, Inc.
Inventor: Nagendra Kumar Nainar , Carlos M. Pignataro , Pascal Thubert
IPC: H04L43/12 , H04L43/0817
Abstract: This disclosure describes techniques for monitoring expected behavior of devices in a computing network. Behavior of network devices may include performing various functions associated with transferring data packets through the computing network. Monitoring expected behavior may include sending a probe packet into the computing network, and determining whether network devices behave as expected with respect to the probe packet. In some examples, behaviors such as replicating, forwarding, eliminating, ordering, and/or other functions regarding data packets may be validated using the present techniques. As computing networks and/or operations become more complex, assuring the expected behavior of network devices may become more important for the continued efficient, smooth, successful, and/or timely flow of data traffic.
-
公开(公告)号:US11470021B2
公开(公告)日:2022-10-11
申请号:US16172677
申请日:2018-10-26
Applicant: Cisco Technology, Inc.
Inventor: Pascal Thubert , Eric M. Levy-Abegnoli , Nagendra Kumar Nainar
IPC: H04L41/0893 , H04L47/6275 , H04L49/10 , H04L49/00 , H04L47/80 , H04L45/64 , G06N20/00
Abstract: Techniques for providing a non-blocking fabric in a network are described. A network controller determines the network requirement for various network traffic types on the network and determines the allocation of resources across the network needed to establish a midlay, including midlay components on the network. The network controller then establishes the midlay on the network according to the determined allocation. At least one of the midlay components is a virtually non-blocking fabric for high-priority traffic or fully non-blocking fabric for deterministic traffic.
-
公开(公告)号:US11451945B2
公开(公告)日:2022-09-20
申请号:US16820843
申请日:2020-03-17
Applicant: Cisco Technology, Inc.
Inventor: Pascal Thubert , Jean-Philippe Vasseur , Patrick Wetterwald , Eric Levy-Abegnoli
Abstract: In one embodiment, a supervisory device in a network forms a virtual access point (VAP) for a node in the network. A set of access points (APs) in the network are mapped to the VAP as part of a VAP mapping and the node treats the APs in the VAP mapping as a single AP for purposes of communicating with the network. The supervisory device receives measurements from the APs in the VAP mapping regarding communications associated with the node. The supervisory device identifies a movement of the node based on the received measurements from the APs in the VAP mapping. The supervisory device adjusts the set of APs in the VAP mapping based on the identified movement of the node.
-
公开(公告)号:US11381518B2
公开(公告)日:2022-07-05
申请号:US17002003
申请日:2020-08-25
Applicant: Cisco Technology, Inc.
Inventor: Patrick Wetterwald , Pascal Thubert , Jean-Philippe Vasseur , Eric Levy-Abegnoli , Stephane Labetoulle
IPC: H04L47/83 , H04L47/127 , G06N20/00 , G06N5/04 , H04L47/70
Abstract: In one embodiment, a device of a software defined wide area network (SD-WAN) predicts characteristics of a new traffic flow to be admitted to the SD-WAN, based on a set of initial packets of the flow. The device predicts an impact of admitting the flow to the SD-WAN, based in part on extrinsic or exogenous data regarding the SD-WAN. The device admits the flow to the SD-WAN, based on the predicted impact. The supervisory device uses reinforcement learning to adjust one or more call admission control (CAC) parameters of the SD-WAN, based on captured telemetry data regarding the admitted flow.
-
公开(公告)号:US20220191130A1
公开(公告)日:2022-06-16
申请号:US17123294
申请日:2020-12-16
Applicant: Cisco Technology, Inc.
Inventor: Nagendra Kumar Nainar , Pascal Thubert , Carlos M. Pignataro
IPC: H04L12/733 , H04L12/707 , H04L12/741
Abstract: A node of a network configured to forward packets based on network programming instructions encoded in the packets, performs a method. The method includes generating a probe packet encoded with a replication network programming instruction. The replication network programming instruction is configured to validate equal-cost multi-path (ECMP) routing in the network from the node to a destination by remotely triggering transit nodes of the network, that are traversed by the probe packet, to each perform replicate-and-forward actions. The replicate-and-forward actions include: identifying ECMP paths toward the destination; generating, for the ECMP paths, replicated probe packets that each include the replication network programming instruction; and forwarding the replicated probe packets along the ECMP paths. The method further includes forwarding the probe packet toward the destination.
-
公开(公告)号:US20220150105A1
公开(公告)日:2022-05-12
申请号:US17094540
申请日:2020-11-10
Applicant: Cisco Technology, Inc.
Inventor: Pascal Thubert , Nagendra Kumar Nainar , Carlos M. Pignataro
IPC: H04L12/24 , H04L12/851 , H04L12/703
Abstract: Techniques for identifying nodes in a data center fabric that are affected by a failure in the fabric, and selectively sending disaggregation advertisements to the nodes affected by the failure. The techniques include a process where a component monitors the network fabric to identify communication paths between leaf nodes, and determines what leaf nodes would be affected by a failure in those communication paths. The component may detect a failure in the network and determine which communication paths, and thus which leaf nodes, are affected by the failure and send disaggregation advertisements to the affected leaf nodes. In some examples, ingress leaf nodes send data through the fabric that indicate egress nodes for the communication paths. Intermediate nodes along may receive the data from the leaf nodes to identify communication paths, and the notify only affected nodes upon detecting a failure in the network.
-
公开(公告)号:US20220116306A1
公开(公告)日:2022-04-14
申请号:US17559640
申请日:2021-12-22
Applicant: Cisco Technology, Inc.
Inventor: Pascal Thubert , Eric Levy-Abegnoli , Jakob Heitz
IPC: H04L45/02
Abstract: A particular fat tree network node stores default routing information indicating that the particular fat tree network node can reach a plurality of parent fat tree network nodes of the particular fat tree network node. The particular fat tree network node obtains, from a first parent fat tree network node of the plurality of parent fat tree network nodes, a negative disaggregation advertisement indicating that the first parent fat tree network node cannot reach a specific destination. The particular fat tree network node determines whether the first parent fat tree network node is the only parent fat tree network node of the plurality of parent fat tree network nodes that cannot reach the specific destination. If so, the particular fat tree network node installs supplemental routing information indicating that every parent fat tree network node except the first parent fat tree network node can reach the specific destination.
-
公开(公告)号:US20220109548A1
公开(公告)日:2022-04-07
申请号:US17552523
申请日:2021-12-16
Applicant: Cisco Technology, Inc.
Inventor: Pascal Thubert , Jerome Henry , Patrick Michel Pierre Wetterwald , Eric Michel Levy-Abegnoli
Abstract: In one embodiment, an access point is configured with a plurality of resource units (RUs). Each RU is configured to use a frequency range that differs from frequency ranges used by the other RUs. The access point determines a pattern of recurring signal performance over time. For each RU of the plurality of RUs, the pattern indicates the recurring signal performance with respect to a station when the station is located in a given physical location. The access point allocates one or more of the RUs for communicating with the station. The pattern is used for avoiding allocation of any of the RUs for which the station is predicted to experience strong multipath fading or other destructive interference.
-
-
-
-
-
-
-
-
-