Abstract:
A node in a Low power and Lossy Network (LLN) is managed by monitoring a routing configuration on a node in a LLN. A triggering parameter that is used to invoke an address change on a child node is tracked and a threshold against which to compare the triggering parameter is accessed. The triggering parameter is compared to the threshold. Based on results of comparing the triggering parameter to the threshold, it is determined that an address change at the child node is appropriate. An address change of a child node appearing in the routing configuration is invoked based on the determination that an address change is appropriate.
Abstract:
Low Latency, Low Loss, Scalable Throughput (L4S) queuing and marking and, specifically, L4S parameters for congestion marking and a new congestion flag for predicted congestion events may be provided. Providing L4S marking can comprise determining, in layer 2, a packet is experiencing congestion. A L4S marking request is sent to layer 3 to request congestion marking of the packet. The packet is marked in layer 3 for congestion experienced A L4S marking response comprising the marked packet is then sent to layer 2.
Abstract:
A first address resolution request may be received by a first access switch from a first device and the address resolution request may be resolved by the first access switch with a central database of a network. Then a second address resolution request may be sent to a sensor by the first access switch in response to resolving the first address resolution request. An address resolution response may then be sent by the sensor to the first device in response to the sensor determining that the first device is a bad endpoint. A session may then be established between the sensor and the first device in response to the sensor sending the address resolution response. The first device may then be prompted by the sensor via the established session to resolve issues that lead the sensor to determine that the first device is a bad endpoint.
Abstract:
In one embodiment, a process determines wireless station (STA) load and schedule of two or more access point (AP) radios. The process then develops a coordination between the two or more access point radios to limit downtime for one or more multi-link wireless devices capable of multi-link operation (MLO) on two or more channels. The process further causes the one or more multi-link wireless devices to move between access point radios based on the wireless station load and schedule and according to the coordination.
Abstract:
In one embodiment, a method includes receiving a request from an access point to transmit to a TSN data payload to a wireless TSN station, identifying resource units (RUs) in a downlink channel, each RU comprising a set of RU tones, identifying access category (AC) queues, multiplexing the RUs and AC queues to generate RU and AC queue pairs, generating timing boundaries of the pairs, wherein each timing boundary represents a combination of an average airtime of each RU and an average wait time of each AC queue for transmitting a size of the TSN data payload, iteratively validating the timing boundaries with a TSN lookahead time, and determining a first RU tone from a first RU associated with a first timing boundary less than the TSN lookahead time to transmit the TSN data payload in a first AC queue to the wireless TSN station.
Abstract:
Systems, methods and computer-readable storage media are provided for encoding, within the SRH-6LoRH field within a data packet, an IPV6 address that can be used to decompress the SCHC information in the data packet. A rule is generated that indicates that the first network address in the SRH-6LoRH field of the data packet is usable to decompress the SCHC information from the data packet as opposed to the compression residue. When the data packet is received at the destination node, the destination node, through a SCHC decompressor, uses the first network address in the SRH-6LoRH field according to the rule to decompress the SCHC information.
Abstract:
Presented herein are techniques to regulate the use of a device and route network traffic associated with the device based on a digital visa. A method includes obtaining information associated with a device; obtaining information associated with policies for a plurality of jurisdictions, the policies including data sovereignty policies and environmental policies for each jurisdiction of the plurality of jurisdictions; determining a set of constraints for regulating use of the device and for routing network traffic associated with the device based on the information associated with the device and the policies for the plurality of jurisdictions; and regulating the use of the device and routing the network traffic associated with the device based on the set of constraints.
Abstract:
In one embodiment, an access point of an overhead mesh of access points in an area selects a range of client identifiers. The access point sends, via a beam cone transmitted in a substantially downward direction towards a floor of the area, a trigger signal that includes the range of client identifiers and prompts client devices having identifiers in that range to send best effort transmissions towards the overhead mesh. The access point detects a collision between the best effort transmissions of the client devices. The access point adjusts the range of client identifiers so as to avoid future collisions between the best effort transmissions of the client devices.
Abstract:
In one embodiment, a method comprises: registering, by a root network device in a low power and lossy network, a constrained network device that is reachable within the low power and lossy network; obtaining, by the root network device, executable code associated with execution of a network service operation by the constrained network device; receiving a data packet from a source device and destined for the constrained network device; and causing execution on the data packet, by the root network device, of the network service operation on behalf of the constrained network device in response to reception of the data packet.
Abstract:
In one embodiment, a controller identifies access points forming an overhead mesh of access points in an area, each access point comprising one or more directional transmitters each configured to transmit a beam cone in a substantially downward direction towards a floor of the area. The controller determines coverage areas on the floor of the area for the one or more directional transmitters of the access points in the overhead mesh. The controller generates, based on the coverage areas, alternating communication schedules for the access points such that a client device at any given location on the floor of the area is within range of a plurality of receiving access points in the overhead mesh and at least one transmitting access point in the overhead mesh at a certain point in time. The controller sends the communication schedules to the access points.