Leveraging multicast listener discovery for discovering hosts

    公开(公告)号:US11736393B2

    公开(公告)日:2023-08-22

    申请号:US17902158

    申请日:2022-09-02

    Abstract: Techniques for leveraging MLD capabilities at edge nodes of network fabrics to receive SNMAs from silent hosts, and creating unicast addresses from the SNMAs for the silent nodes that are used as secondary matches in a network overlay if primary unicast address lookups fail. The edge nodes described herein may act as snoopers of MLD reports in order to identify the SNMAs of the silent hosts. The edge nodes then forge unicast addresses for the silent hosts that match with the least three bytes of the SNMAs. The forged unicast addresses are presented as unicast MAC/IP mappings in the fabric overlay. In situations where a primary IP address lookup fails, the look-up device performs a secondary lookup for a mapped address that has the last three bytes of the IP address. If a mapping is found, the lookup is sent as a unicast message to the matching MAC address.

    Determining node behavior in deterministic networks

    公开(公告)号:US11716274B2

    公开(公告)日:2023-08-01

    申请号:US17866465

    申请日:2022-07-15

    CPC classification number: H04L43/12 H04L43/0817

    Abstract: This disclosure describes techniques for monitoring expected behavior of devices in a computing network. Behavior of network devices may include performing various functions associated with transferring data packets through the computing network. Monitoring expected behavior may include sending a probe packet into the computing network, and determining whether network devices behave as expected with respect to the probe packet. In some examples, behaviors such as replicating, forwarding, eliminating, ordering, and/or other functions regarding data packets may be validated using the present techniques. As computing networks and/or operations become more complex, assuring the expected behavior of network devices may become more important for the continued efficient, smooth, successful, and/or timely flow of data traffic.

    SCHEDULING TIME-DICED UPLINKS AND DOWNLINKS IN A DENSE OVERHEAD MESH OF ACCESS POINTS

    公开(公告)号:US20230239352A1

    公开(公告)日:2023-07-27

    申请号:US17581204

    申请日:2022-01-21

    CPC classification number: H04L67/12 G16Y10/75 G16Y40/35 H04W84/18

    Abstract: In one embodiment, a controller identifies access points forming an overhead mesh of access points in an area, each access point comprising one or more directional transmitters each configured to transmit a beam cone in a substantially downward direction towards a floor of the area. The controller determines coverage areas on the floor of the area for the one or more directional transmitters of the access points in the overhead mesh. The controller generates, based on the coverage areas, alternating communication schedules for the access points such that a client device at any given location on the floor of the area is within range of a plurality of receiving access points in the overhead mesh and at least one transmitting access point in the overhead mesh at a certain point in time. The controller sends the communication schedules to the access points.

    RANDOMIZING SERVER-SIDE ADDRESSES
    305.
    发明公开

    公开(公告)号:US20230179579A1

    公开(公告)日:2023-06-08

    申请号:US18104603

    申请日:2023-02-01

    CPC classification number: H04L63/0421 H04L61/2525 H04L61/4511

    Abstract: Techniques for using Network Address Translation (NAT), Mobile Internet Protocol (MIP), and/or other techniques in conjunction with Domain Name System (DNS) to anonymize server-side addresses in data communications. Rather than having DNS provide a client device with an IP address of an endpoint device, such as a server, the DNS instead returns a random IP address that is mapped to the client device and the endpoint device. In this way, IP addresses of servers are obfuscated by a random IP address that cannot be used to identify the endpoint device or service. The client device may then communicate data packets to the server using the random IP address as the destination address, and a gateway that works in conjunction with DNS can convert the random IP address to the actual IP address of the server using NAT and forward the data packet onto the server.

    Scalable reachability for movable destinations attached to a leaf-spine switching architecture

    公开(公告)号:US11659436B2

    公开(公告)日:2023-05-23

    申请号:US17347640

    申请日:2021-06-15

    CPC classification number: H04W28/0289 H04L49/50

    Abstract: In one embodiment, a method comprises: determining, by a network switching device, whether the network switching device is configured as one of multiple leaf network switching devices, one of multiple Top-of-Fabric (ToF) switching devices, or one of multiple intermediate switching devices in a switched data network having a leaf-spine switching architecture; if configured as a leaf switching device, limiting flooding of an advertisement only to a subset of the intermediate switching devices in response to detecting a mobile destination is reachable; if configured as an intermediate switching device, flooding the advertisement, received from any one of the leaf network switching devices, to connected ToF switching devices without installing any routing information specified within the advertisement; if configured as a ToF switching device, installing from the flooded advertisement the routing information and tunneling a data packet, destined for the mobile destination, to the leaf switching device having transmitted the advertisement.

    Generating cross-pan bypass path based on stitching between border LLN devices

    公开(公告)号:US11539613B2

    公开(公告)日:2022-12-27

    申请号:US17213393

    申请日:2021-03-26

    Abstract: In one embodiment, a method comprises determining, by a controller device in a low power and lossy network (LLN), that a first LLN border device is in a first personal area network (PAN) having a first directed acyclic graph (DAG) topology, and that the first LLN border device is a neighbor of a second LLN border device in a second PAN of the LLN having a second DAG topology; receiving a path request for a third LLN device in the first PAN to reach a fourth LLN device in the second PAN; and generating an inter-PAN path between the third LLN device and the fourth LLN device via the first and second LLN border devices, the inter-PAN path providing a stitching between the first DAG topology and the second DAG topology.

    RoCE over wireless
    309.
    发明授权

    公开(公告)号:US11513985B2

    公开(公告)日:2022-11-29

    申请号:US16933878

    申请日:2020-07-20

    Abstract: A wireless device can achieve higher predictability for its transmissions by inserting a placeholder frame in a transmission queue before time sensitive data has been received. In addition, a contention countdown associated with the placeholder frame can start before the time sensitive data is ready for transmission. Once the data is available, the device can insert the data into the payload of the placeholder frame, thereby reducing the wait time before the data can be transmitted wirelessly. Additionally, the device can improve reliability by transmitting data using multiple subcarrier RUs in a channel. The data blocks and the duplicative data can be transmitted in parallel using the subcarrier RUs. If a subset of the subcarrier RUs are blocked because of narrowband interference, the receiving device can nonetheless recover the data blocks and reconstruct the packet from the data transported on the RUs that did not have interference.

    Reliable and available wireless forwarding information base (FIB) optimization

    公开(公告)号:US11463916B2

    公开(公告)日:2022-10-04

    申请号:US17145201

    申请日:2021-01-08

    Abstract: Optimal determination of wireless network pathway configurations may be provided. A computing device may receive an error profile and a response instruction associated with the error profile, as generated by a network controller. The computing device may then monitor, for an error, on a communication Track, in a network, between an ingress node and an egress node. Then, the computing device, upon detecting the error, can determine that the error is similar to the error profile, and based on the determination that the error is similar to the error profile, enact the response instruction. The response instruction can direct the computing device to switch from the communication Track to a communication subTrack between the ingress node and the egress node.

Patent Agency Ranking