Abstract:
In one embodiment, a device in a network determines whether a destination address of a packet received by the device is within a neighbor discovery (ND) cache of the device. The device determines whether the destination address is not in a set of addresses used to generate an address lookup array or possibly in the set of addresses used to generate the address lookup array, in response to determining that the destination address of the packet is not within the ND cache. The device performs address resolution for the destination address of the packet, in response to determining that the destination address of the packet is possibly in the set of addresses used to generate the address lookup array.
Abstract:
In one embodiment, a device (e.g., path computation device) informs a network management device of a plurality of possible probing profiles, where nodes of a computer network receive the plurality of possible probing profiles from the network management device. Based on determining that particular information is desired from one or more particular nodes of the nodes of the computer network, the device may then select one or more particular probing profiles of the plurality of possible probing profiles based on the particular information, and instructs the one or more particular nodes to probe one or more particular destination nodes according to the one or more particular probing profiles.
Abstract:
In one embodiment, a device in a network receives one or more time slot usage reports regarding a use of time slots of a channel hopping schedule by nodes in the network. The device predicts a time slot demand change for a particular node based on the one or more time slot usage reports. The device identifies a time frame associated with the predicted time slot demand change. The device adjusts a time slot assignment for the particular node in the channel hopping schedule based on predicted demand change and the identified time frame associated with the predicted time slot demand change.
Abstract:
A node in a Low power and Lossy Network (LLN) is managed by monitoring a routing configuration on a node in a LLN. A triggering parameter that is used to invoke an address change on a child node is tracked and a threshold against which to compare the triggering parameter is accessed. The triggering parameter is compared to the threshold. Based on results of comparing the triggering parameter to the threshold, it is determined that an address change at the child node is appropriate. An address change of a child node appearing in the routing configuration is invoked based on the determination that an address change is appropriate.
Abstract:
Techniques are providing for managing and optimizing the configuration of network devices. At a management device in a network, a message is received from a first network device via a wireless link or a power line communication link between the management device and the first network device. The new network device is classified as belonging to one of a plurality of network device zones based on evaluating the message. A response message is then sent to the new network device via the wireless link or the power line communication link to ensure secure access to a virtual console-port is provided for the management device and the network devices in the network device zones.
Abstract:
In one embodiment, an agent device discovers a set of path computation elements (PCEs) and corresponding available capabilities and resources, and determines particular capabilities and resources of interest in a particular computer network. Upon building a simplified view of the available capabilities and resources of the set of PCEs based on the particular capabilities and resources of interest, the agent device advertises the simplified view of the available capabilities and resources into the particular computer network.
Abstract:
Techniques are presented herein for use in a Time Division Multiple Access (TDMA) communication system in which devices send transmissions to each other in time slots during a time frame. A plurality of time slots is allocated for a first device to send traffic to a second device. The first device includes in a transmission during at least one of the plurality of time slots an indicator configured to indicate whether a next time slot in the plurality of time slots is used for traffic from the first device to the second device. Thus, the actual usage of a next time slot in a sequence of a plurality of time slots may be dynamically determined by the transmitting device so that the receiving device(s) need not be in the idle listening mode for the next time slot, thereby saving power.
Abstract:
A first address resolution request may be received by a first access switch from a first device and the address resolution request may be resolved by the first access switch with a central database of a network. Then a second address resolution request may be sent to a sensor by the first access switch in response to resolving the first address resolution request. An address resolution response may then be sent by the sensor to the first device in response to the sensor determining that the first device is a bad endpoint. A session may then be established between the sensor and the first device in response to the sensor sending the address resolution response. The first device may then be prompted by the sensor via the established session to resolve issues that lead the sensor to determine that the first device is a bad endpoint.
Abstract:
Systems, methods and computer-readable storage media are provided for encoding, within the SRH-6LoRH field within a data packet, an IPV6 address that can be used to decompress the SCHC information in the data packet. A rule is generated that indicates that the first network address in the SRH-6LoRH field of the data packet is usable to decompress the SCHC information from the data packet as opposed to the compression residue. When the data packet is received at the destination node, the destination node, through a SCHC decompressor, uses the first network address in the SRH-6LoRH field according to the rule to decompress the SCHC information.
Abstract:
In one embodiment, an access point of an overhead mesh of access points in an area selects a range of client identifiers. The access point sends, via a beam cone transmitted in a substantially downward direction towards a floor of the area, a trigger signal that includes the range of client identifiers and prompts client devices having identifiers in that range to send best effort transmissions towards the overhead mesh. The access point detects a collision between the best effort transmissions of the client devices. The access point adjusts the range of client identifiers so as to avoid future collisions between the best effort transmissions of the client devices.