Abstract:
Embodiments of the disclosure pertain to activating in-band OAM based on a triggering event. Aspects of the embodiments are directed to receiving a first notification indicating a problem in a network; triggering a data-collection feature on one or more nodes in the network for subsequent packets that traverse the one or more nodes; evaluating a subsequent packet that includes data augmented by the data collection feature; and determining the problem in the network based on the data augmented to the subsequent packet.
Abstract:
In one embodiment, a method includes generating at a network device, a continuity test packet configured to pass through a set of communication paths terminating at the network device and at least one other network device located at an opposite end of the communication paths, transmitting at the network device the continuity test packet on a first communication path in the set of communication paths, and identifying at the network device a failure in the set of communication paths if the continuity test packet is not received on a last communication path in the set of communication paths. An apparatus and logic are also disclosed herein.
Abstract:
In one embodiment, a device in a network receives a packet that includes a forwarding label for a service in a service chain. The packet encapsulates a service chain header for the service chain. The device swaps the forwarding label for the service in the packet for a reserved label that identifies the packet as encapsulating the service chain header. The device forwards the packet with the reserved label to the service.
Abstract:
In one embodiment, a method comprises selecting, by an ingress provider edge router, one of first or second provider edge routers as a primary router for reaching a destination via a core network, and selecting the other of the first or second provider edge routers as a backup router for reaching the destination via the core network; and inserting, into an IPv6 data packet destined for the destination, a primary label assigned by the primary router and a repair label assigned by backup router, and an IPv6 extension header specifying first and second segment identifiers associated with the respective first and second provider edge routers and a protected flag that enables fast rerouting of the IPv6 data packet to the backup router if the primary router is unavailable.
Abstract:
Presented herein are techniques performed in a network comprising a plurality of network nodes each configured to apply one or more service functions to traffic that passes the respective network nodes in a service path. At a network node, an indication is received of a failure or degradation of one or more service functions or applications applied to traffic at the network node. Data descriptive of the failure or degradation is generated. A previous service hop network node at which a service function or application was applied to traffic in the service path is determined. The data descriptive of the failure or degradation is communicated to the previous service hop network node.
Abstract:
In one embodiment, a method includes assigning a discriminator to a target in communication with a reflector at a network device, identifying at the reflector, a packet comprising the discriminator, the packet transmitted from an initiator in a seamless bidirectional forwarding detection (S-BFD) session, and transmitting a response packet from the reflector to the initiator. The response packet includes information for the target obtained by the reflector through monitoring of the target. The target may comprise a plurality of entities. An apparatus and logic are also disclosed herein.
Abstract:
In one embodiment, an ingress network virtualization edge (NVE) in a computer network generates an echo packet, and sets an indication in the echo packet that the echo packet is for overlay path validation. In addition, the ingress NVE sets a message type of the echo packet to a generic echo request, and includes virtualization network (VN) context information within the echo packet. Once setting a destination address of the echo packet as an egress NVE address and including an indication to the egress NVE that the echo packet is an operations, administration, and management (OAM) message, the ingress NVE may then send the echo packet toward the egress NVE (e.g., to validate the VN context information and/or to reveal multipath traces).
Abstract:
Techniques are presented herein to monitor a plurality of big data sources in order to dynamically identify keywords. The big data sources are analyzed to classify the keywords as related to either a technical problem or to a solution to the technical problem. In addition, data associated with the keywords is weighted based on one or more attributes of the data and stored in a database in a problem-solution format.
Abstract:
In one embodiment, a method includes generating a path validation packet at a network device, the path validation packet including a plurality of segment identifiers for use in segment routing and an operations, administration, and management (OAM) segment identifier for use in path validation, transmitting from the network device the path validation packet on a path having a plurality of routers associated with the segment identifiers, one of the routers associated with the OAM segment identifier, and validating the path if a return path validation packet is received. An apparatus is also disclosed herein.
Abstract:
The present disclosure provides for carrying reachability information in an echo request message and/or an echo reply message, which can be used to reach an initiator when the initiator's address is unknown. An echo request message includes an FEC (forwarding equivalence class) stack that identifies a label switched path (LSP). The echo request message is received by a label switching routing element (LSR) on the LSP, and the echo request is originated by an initiator. In response to a detection that the FEC stack changes at the LSR, a segment reachability (SR) sub-TLV (type-length-value) element can be generated, where the SR sub-TLV includes reachability information that can be used to reach the initiator, and the reachability information includes an incoming label allocated by the LSR to reach the initiator.