Flexible and Scalable Monitoring in a TRILL Network
    22.
    发明申请
    Flexible and Scalable Monitoring in a TRILL Network 有权
    灵活和可扩展的监控在TRILL网络

    公开(公告)号:US20150016301A1

    公开(公告)日:2015-01-15

    申请号:US13942426

    申请日:2013-07-15

    CPC classification number: H04L43/18 H04L41/12 H04L43/00 H04L43/08 H04L43/12

    Abstract: A monitoring session associated with a virtual nickname may be established in a TRILL network. A monitoring station may be connected to an edge switch of the TRILL network specifying the virtual nickname for the monitoring session. The monitoring station is set as a destination for the monitoring session and the virtual nickname is flooded throughout the TRILL network. A source may then be configured to the monitoring session by specifying the virtual nickname of the monitoring session without knowing the destination tied to the monitoring session. Network traffic through the source may then be forwarded to the destination tied to the monitoring session.

    Abstract translation: 可以在TRILL网络中建立与虚拟昵称相关联的监视会话。 监控站可以连接到TRILL网络的边缘交换机,指定监视会话的虚拟昵称。 监控站被设置为监视会话的目的地,虚拟昵称在整个TRILL网络中泛滥。 然后,可以通过在不知道与监视会话相关联的目的地的情况下指定监视会话的虚拟昵称来将源配置为监视会话。 然后可以将通过源的网络流量转发到与监视会话相关联的目的地。

    Adaptive application recovery
    23.
    发明授权

    公开(公告)号:US12216556B2

    公开(公告)日:2025-02-04

    申请号:US18480821

    申请日:2023-10-04

    Abstract: This disclosure describes techniques for adaptive disaster recovery of applications running on network devices. The techniques include generating an application template and an application template clone that include application attributes usable to deploy an application stack at an application site. The techniques also include sending the application template clone to a disaster recovery site group to await deployment instructions. In some examples, an observer may determine that a health metric of the application site indicates that a disaster recovery process be triggered. A disaster recovery site of the disaster recovery site group may be selected based at least in part on a performance metric. The application stack may be deployed at the disaster recovery site utilizing the application template clone.

    ON-DEMAND AND SCALABLE TUNNEL MANAGEMENT IN A MULTI-CLOUD AND ON-PREMISES ENVIRONMENT

    公开(公告)号:US20220385498A1

    公开(公告)日:2022-12-01

    申请号:US17335887

    申请日:2021-06-01

    Abstract: Techniques are described for dynamically establishing and scaling IPSec tunnels to connect hundreds of sites of a network by making use of the user intent of connecting certain applications for applying security policies and translating it dynamically based on the location and needs of the workloads to set up the network on demand. The techniques involve a tight loop between the network controller of a site (e.g., a cloud Application Policy Infrastructure Controller) and the inter-site or multi-cloud inter-connect controller, stitched through services that enable security and network automation at scale. In particular, to control the number of IPSec tunnels, IPSec tunnels are established only when required. Additionally, IPSec tunnels may be eliminated when no longer required. Thus, resources of a network may be used in a measured way that is necessary and sufficient to meet network traffic demand.

    System and method for providing scalable flow monitoring in a data center fabric

    公开(公告)号:US11159412B2

    公开(公告)日:2021-10-26

    申请号:US16808830

    申请日:2020-03-04

    Abstract: Disclosed is a method that includes calculating, at a collector receiving a data flow and via a hashing algorithm, all possible hashes associated with at least one virtual attribute associated with the data flow to yield resultant hash values. Based on the resultant hash values, the method includes computing a multicast address group and multicasting the data flow to n leafs based on the multicast address group. At respective other collectors, the method includes filtering received sub-flows of the data flow based on the resultant hashes, wherein if a respective hash is owned by a collector, the respective collector accepts and saves the sub-flow in a local switch collector database. A scalable, distributed netflow is possible with the ability to respond to queries for fabric-level netflow statistics even on virtual constructs.

    SEAMLESS MULTI-CLOUD ROUTING AND POLICY INTERCONNECTIVITY

    公开(公告)号:US20210258216A1

    公开(公告)日:2021-08-19

    申请号:US17244941

    申请日:2021-04-29

    Abstract: Technologies for multi-cloud routing and policy interconnectivity are provided. An example method can include assigning different sets of data plane routers to data plane traffic associated with different address spaces in a cloud site of a multi-cloud fabric to yield a distributed mapping of data plane traffic and data plane routers. The method can further include providing, to an on-premises site in the multi-cloud fabric, routing entries from a control plane router on the cloud site, the routing entries reflecting the distributed mapping and identifying, for each address space, which data plane router handles data plane traffic for that address space; and when a data plane router is deployed at the cloud site, providing, to the on-premises site, updated routing information from the control plane router, the updated routing information identifying the data plane router as a next hop for data plane traffic associated with a respective address space.

    LAYER 2 MOBILITY FOR HYBRID MULTI-CLOUD DEPLOYMENTS WITHOUT HOST-OVERLAY

    公开(公告)号:US20200382471A1

    公开(公告)日:2020-12-03

    申请号:US16426336

    申请日:2019-05-30

    Abstract: Technologies for extending a subnet across on-premises and cloud-based deployments are provided. An example method may include creating a VPC in a cloud for hosting an endpoint being moved from an on-premises site. For the endpoint to retain its IP address, a subnet range assigned to the VPC, based on the smallest subnet mask allowed by the cloud, is selected to include the IP address of the endpoint. The IP addresses from the assigned subnet range corresponding to on-premises endpoints are configured as secondary IP addresses on a Layer 2 (L2) proxy router instantiated in the VPC. The L2 proxy router establishes a tunnel to a cloud overlay router and directs traffic destined to on-premises endpoints, with IP addresses in the VPC subnet range thereto for outbound transmission. The cloud overly router updates the secondary IP addresses on the L2 proxy router based on reachability information for the on-premises site.

Patent Agency Ranking