Systems and Methods for Enterprise Fabric Creation

    公开(公告)号:US20200177447A1

    公开(公告)日:2020-06-04

    申请号:US16203949

    申请日:2018-11-29

    Abstract: In one embodiment, a method is performed at a controller of a fabric that is connected to a first seed device in the fabric. The method includes obtaining a connectivity graph of the fabric including the first seed device. The method further includes causing the first seed device to send a first request to a first neighboring device in the connectivity graph via a first interface of the first seed device connectable to the first neighboring device. The method also includes assigning fabric component properties to devices in the fabric based at least in part on a first message from the first seed device, where the first seed device generates the first message based at least in part on a first response from the first neighboring device received via the first interface. The method additionally includes converting the first neighboring device to a second seed device in the fabric.

    Contextual service mobility in an enterprise fabric network environment

    公开(公告)号:US09838314B1

    公开(公告)日:2017-12-05

    申请号:US15155393

    申请日:2016-05-16

    CPC classification number: H04L45/74 H04L12/4633 H04L49/25

    Abstract: In one embodiment, contextual service mobility in an enterprise fabric network environment (e.g., overlay and underlay networks) provides for moving of the location of a service being applied to packets with minimal updates to the mapping database. The mapping database is used to convert addresses of the overlay network to physical network and service addresses. The mapping database provides contextual lookup operations on the same destination address of a packet being forwarded in the overlay network to provide different results. The contextual lookup operations provide for a packet to be forwarded to a service node or its intended destination depending on the current context. In one embodiment, the enterprise fabric network uses Locator/ID Separation Protocol (LISP), a network architecture and set of protocols that uses different overlay and underlay namespaces and a distributed mapping database for converting an overlay address to an underlay address.

    Contextual Service Mobility in an Enterprise Fabric Network Environment

    公开(公告)号:US20170331733A1

    公开(公告)日:2017-11-16

    申请号:US15155393

    申请日:2016-05-16

    CPC classification number: H04L45/74 H04L12/4633 H04L49/25

    Abstract: In one embodiment, contextual service mobility in an enterprise fabric network environment (e.g., overlay and underlay networks) provides for moving of the location of a service being applied to packets with minimal updates to the mapping database. The mapping database is used to convert addresses of the overlay network to physical network and service addresses. The mapping database provides contextual lookup operations on the same destination address of a packet being forwarded in the overlay network to provide different results. The contextual lookup operations provide for a packet to be forwarded to a service node or its intended destination depending on the current context. In one embodiment, the enterprise fabric network uses Locator/ID Separation Protocol (LISP), a network architecture and set of protocols that uses different overlay and underlay namespaces and a distributed mapping database for converting an overlay address to an underlay address.

    Virtual Expansion of Network Fabric Edge for Multihoming of Layer-2 Switches and Hosts
    25.
    发明申请
    Virtual Expansion of Network Fabric Edge for Multihoming of Layer-2 Switches and Hosts 有权
    网络结构边缘的虚拟扩展,用于多层次的二层交换机和主机

    公开(公告)号:US20170041222A1

    公开(公告)日:2017-02-09

    申请号:US14820636

    申请日:2015-08-07

    CPC classification number: H04L45/66 H04L45/02 H04L49/15 H04L49/25 H04L61/2007

    Abstract: Methods and systems are provided for virtual expansion of a fabric network edge to include edge network devices. For example, unique virtual Internet Protocol (IP) addresses may be assigned to a plurality of L2 switches, wherein the L2 switches are connected to one or more fabric edge devices in a fabric, and wherein the L2 switches are located outside of the fabric. Next, the unique virtual IP addresses may be announced in an underlay of the fabric.

    Abstract translation: 提供了用于将网络边缘虚拟扩展以包括边缘网络设备的方法和系统。 例如,唯一的虚拟互联网协议(IP)地址可以被分配给多个L2交换机,其中L2交换机连接到一个或多个织物边缘设备,并且其中L2交换机位于结构外部。 接下来,唯一的虚拟IP地址可以在织物的底层中公布。

    DIAGNOSING AND RESOLVING ISSUES IN A NETWORK USING PROBE PACKETS

    公开(公告)号:US20220086076A1

    公开(公告)日:2022-03-17

    申请号:US17532776

    申请日:2021-11-22

    Abstract: This disclosure describes various methods, systems, and devices related to identifying an issue in a network using a probe packet. An example method includes identifying an expired data packet transmitted in a network and addressed to a destination; generating a probe packet addressed to the destination; and forwarding the probe packet. When the probe packet is received, a report indicating a routing loop in the network can be transmitted to an administrator.

    Path signatures for data flows
    29.
    发明授权

    公开(公告)号:US11102121B2

    公开(公告)日:2021-08-24

    申请号:US16661540

    申请日:2019-10-23

    Abstract: This disclosure describes various methods, systems, and devices related to identifying path changes of data flows in a network. An example method includes receiving, at a node, a packet including a first path signature. The method further includes generating a second path signature by inputting the first path signature and one or more node details into a hash function. The method includes replacing the first path signature with the second path signature in the packet. The packet including the second path signature is forwarded by the node.

    Secure WAN path selection at campus fabric edge

    公开(公告)号:US10992654B2

    公开(公告)日:2021-04-27

    申请号:US16104456

    申请日:2018-08-17

    Abstract: A method is performed by an access router of an enterprise network including a first edge router to communicate with a second edge router over a wide area network (WAN). The method includes receiving a packet from a first endpoint, receiving from a mapping service a network location of a second edge router for which the packet is destined and a security association (SA) to encrypt the packet from the access router to the second edge router, and generating for the first edge router one or more path selectors for WAN path selection. The method includes encrypting the packet using the SA, and adding to the encrypted IP packet, in clear text, the path selectors and outer encapsulation including the network location, to produce an encrypted tunnel packet. The method also includes forwarding the encrypted tunnel packet to the second edge router via the first edge router and the WAN.

Patent Agency Ranking