Abstract:
A method is provided in one example embodiment and may include receiving a packet by a forwarder in an Information-Centric Networking (ICN) network; determining Bit Index Explicit Replication (BIER) information associated with the packet; and forwarding the packet based, at least in part, on the BIER information associated with the packet. The packet can be an interest packet or a data packet received by the forwarder in the ICN network.
Abstract:
One embodiment is a method including creating at an ingress node of a communications network a request message including an Application Specific Mapping (“ASM”) TLV identifying a hashing parameter for a network application, wherein the ASM TLV includes range of values for the identified hashing parameter to enable load balancing for packets associated with the network application; forwarding the created request message to a node associated with a next hop along a first path through the network between the ingress node and an egress node; and receiving a response message from the node associated with the next hop, wherein the response message includes load balancing information for the node associated with the next hop corresponding to the range of values for the identified hashing parameter.
Abstract:
In one embodiment, a device in a network monitors Ethernet virtual private network (EVPN) traffic in the network for a plurality of media access control (MAC) addresses. The device generates a machine learning-based traffic model for the MAC addresses based on the monitored EVPN traffic. The device determines a timeout for a particular one of the MAC addresses based on traffic predicted by the machine learning-based traffic model for the particular MAC address. The device causes the particular MAC address to be timed out from one or more forwarding tables in the network based on the determined timeout.
Abstract:
A system for decentralized tracking of assets (devices (hardware) or software) is provided. One or more servers are configured to execute blockchain software for a blockchain that tracks ownership and usage of devices or software. Each transaction in the blockchain includes an asset identifier that identifies a particular device or instance of software and an owner identifier that identifies a particular owner of a particular device or instance of software. One or more computing devices are configured to run a blockchain client application that communicates with the blockchain software to provide updates to the blockchain as to ownership and usage of devices or software. The blockchain client application configured to add a new transaction to the blockchain to specify a new owner identifier when upon a sale/transfer and to specify when an update or change is made to a particular device or instance of software.
Abstract:
The subject technology relates to methods for identifying network routes. In some aspects, the method can include steps for transmitting a first query to a network controller, the first query identifying a destination node for a traffic flow routed by the first network node, wherein the first query is configured to cause the network controller perform operations including: identify at least one egress node between the first network node and the destination node, transmit a second query to the at least one egress node to determine entropy information relative to the egress node, and transmit the entropy information to the first network node in response to the first query. Systems and machine-readable media are also provided.
Abstract:
Embodiments include generating an error message based on an error associated with a packet, adding to the error message an address of a node in a segment routing domain of a network to serve as a destination address of the error message, and adding a new segment routing header to the error message. Embodiments also include rewriting the packet where the rewriting includes replacing a destination address in the packet with a final destination address associated with the packet. Embodiments further include adding the rewritten packet to the error message, and forwarding the error message to the destination address of the error message. In specific embodiments, the rewriting the packet includes removing a segment routing header of the packet. More specific embodiments include deriving the new segment routing header from information in the packet.
Abstract:
Systems, methods, and computer-readable media for improving the reliability of service function (SF) application in a service function chain (SFC) are provided. In some aspects, the subject technology facilitates automatic service function type validation by a service function forwarder (SFF), for example, by using a probe configured query a function type of a SF module associated with the validating SFF.
Abstract:
There is disclosed an apparatus having logic elements to: receive an incoming packet associated with a first service function chain; identify a next hop service function for the incoming packet as a non-reactive service function; create a duplicate packet; forward the duplicate packet to the non-reactive service function; and forward the incoming packet to a next reactive service function. There is also disclosed an apparatus having logic to: receive an incoming packet associated with a first service function chain (SFC), having a first service path identifier (SPI); determine that the incoming packet has a first service index (SI), and that a next-hop SI identifies a non-reactive service function (NRSF); receive a duplicate packet of the incoming packet; rewrite a service header of the duplicate packet to identify a second SFC having a second SPI, wherein the second SPI is different from the first SPI; and alter the first SI of the incoming packet to identify a next reactive service function in the first SFC.
Abstract:
In one embodiment, a method includes assigning a discriminator to a target in communication with a reflector at a network device, identifying at the reflector, a packet comprising the discriminator, the packet transmitted from an initiator in a seamless bidirectional forwarding detection (S-BFD) session, and transmitting a response packet from the reflector to the initiator. The response packet includes information for the target obtained by the reflector through monitoring of the target. The target may comprise a plurality of entities. An apparatus and logic are also disclosed herein.
Abstract:
In one embodiment, a method includes generating a path validation packet at a network device, the path validation packet including a plurality of segment identifiers for use in segment routing and an operations, administration, and management (OAM) segment identifier for use in path validation, transmitting from the network device the path validation packet on a path having a plurality of routers associated with the segment identifiers, one of the routers associated with the OAM segment identifier, and validating the path if a return path validation packet is received. An apparatus is also disclosed herein.