Abstract:
In one embodiment, a networking device in a local area network (LAN) receives an instruction from a server to form a virtual network overlay in the LAN that redirects traffic associated with a particular node in the LAN to the server for analysis. The networking device establishes the virtual network overlay in the LAN to redirect traffic associated with the particular node to the server. The networking device determines that at least a portion of the traffic associated with the particular node should be processed locally within the LAN and not via redirection to the server and adjusts the virtual network overlay to process the at least a portion of the traffic associated with the particular node locally within the LAN and not via redirection to the server.
Abstract:
In one embodiment, a tracking device detects a first device connecting to a computer network, and forces an install of fake routing information on the first device that is unique to the first device. Upon detecting a second device connecting to the computer network, the second device having at least one identifying property in common with the first device and at least one identifying property differing from the first device, the tracking device may then query the second device to determine if the second device knows the fake routing information unique to the first device. As such, the tracking device may then determine that the second device is the first device in response to the second device knowing the fake routing information unique to the first device.
Abstract:
In one embodiment, a device in a network receives a request from a neighbor of the device to add the neighbor as a child of the device in the network. The request includes a signed address registration certificate that certifies that a network address of the neighbor is registered in the network. The device determines whether the signed address registration certificate is valid. The device adds the neighbor as a child of the device in the network based on a determination that the signed address registration certificate is valid.
Abstract:
In one embodiment, a device in a network receives a notification from a neighbor of the device indicative of a child node of the device requesting a parent change from the device to the neighbor. The device updates an existing routing path from the device to the child node to be routed through the neighbor, in response to receiving the notification from the neighbor. The device receives an instruction to remove the updated routing path from the device to the child node through the neighbor. The device removes the updated routing path from the device to the child node, in response to receiving the instruction to remove the updated routing path.
Abstract:
In one embodiment, a method includes receiving a packet from an end node, the packet comprising an authenticated source MAC (Media Access Control) address and a source IP (Internet Protocol) address computed based on the authenticated source MAC address, and verifying the source IP address in the received packet, wherein verifying the source IP address comprises computing an IP address based on the authenticated source MAC address and comparing the computed IP address to the source IP address in the received packet to verify the source IP address. An apparatus is also disclosed herein.
Abstract:
A network includes multiple routing arcs for routing network traffic to a destination. Each arc comprising nodes connected in sequence by reversible links oriented away from a node initially holding a cursor toward one of first and second edge nodes through which the network traffic exits the arc. Each node includes a network device. The nodes in the arc detect a first failure in the arc. Responsive to the detecting the first failure, the nodes exchange first management frames over a data plane within the arc in order to transfer the cursor from the node initially holding the cursor to a first node proximate the first failure and reverse links in the arc as appropriate so that the network traffic in the arc is directed away from the first failure toward the first edge node of the arc through which the network traffic is able to exit the arc.
Abstract:
Techniques for using Home Addresses, Mobile Internet Protocol (MIP), and/or other techniques in conjunction with Domain Name System (DNS) to obfuscate server-side addresses in data communications. Rather than having DNS provide a client device with an IP address of an endpoint device, such as a server, the DNS instead returns a Home Address that is mapped to the client device and at least one server IP address of the endpoint device. In this way, IP addresses of servers are obfuscated by a network mapping of the Home Addresses and the server IP addresses. The client device may then communicate data packets to the server using the Home Addresses as the destination address, and a virtual network service that works in conjunction with DNS can encapsulate the data packet with the server IP addresses and forward the data packet onto the server.
Abstract:
Systems, methods and computer-readable storage media are provided for determining critical flow characteristics and predicting the network resources to compute time-based p-routes that satisfy different SLAs. Critical flows within a set of nodes organized in a DODAG are monitored and assessed according to applicable SLAs and relevant networking KPIs to generate a forecast of the traffic flow and the overall SLAs for these critical flows. These overall SLAs, KPIs, and the generated forecast are used by a PCE associated with the network to compute p-routes through the set of nodes in the DODAG that satisfy the overall SLAs for the critical flows.
Abstract:
Multimodal wireless and deterministic mode operation may be provided. An indication may be provided to a client device by an Access Point (AP) that the AP supports multimode operation and which current sub-mode is enabled. Then a determination may be received from the client device to perform an operation based on the indication that the AP supports multimode operation and which sub-mode is currently enabled wherein the operation comprises one of prefer the AP and avoid the AP.
Abstract:
Leveraging wireless direct transmissions may be provided. It may be determined that data traffic flowing on a first pathway between a first client device and a second client device is not meeting a predetermined service level. The first pathway may be partially wired and partially wireless. A second pathway that will meet the predetermined service level may be determined. The second pathway may be wireless. The data traffic may be caused to flow on the second pathway.