Cumulative schemes for network path proof of transit

    公开(公告)号:US10187209B2

    公开(公告)日:2019-01-22

    申请号:US14992112

    申请日:2016-01-11

    Abstract: A system and methods are provided for verifying proof of transit of network traffic through a plurality of network nodes in a network. In one embodiment, each network node reads a first value and a second value from in-band metadata of packet, and generates, using a cryptographic key that is unique to each respective network node, an encryption result based on the first value. An updated second value is generated based on the second value read from the packet and the encryption result. Each network node writes the updated second value to the in-band metadata of the packet, and forwards the packet in the network. In another embodiment, a secret sharing scheme is employed by each network node computes a portion of verification information using a unique share of a secret and based on the packet specific information.

    Service Chain Overlay Network Operations Visibility via Data Packets

    公开(公告)号:US20170339072A1

    公开(公告)日:2017-11-23

    申请号:US15156689

    申请日:2016-05-17

    Abstract: In one embodiment, a particular service chain data packet is received by a particular service node, with the service chain data packet including a header identifying service chain information. The particular service node applies a service to the particular service chain data packet. The particular service node adds service-layer operations data to the particular service chain data packet, with the service-layer operations data related to the current service function or the particular service node. Subsequently, the particular service node sends the particular service chain data packet with the service-layer operations data from the particular service node. In one embodiment, networking operations data is also added to the particular service chain data packet. In one embodiment, an egress service node removes the service-layer (and possibly networking) operations data and forwards to another system, possibly after processing this operations data.

    SYSTEM AND METHOD FOR PROVIDING A TRANSLATION MECHANISM IN A NETWORK ENVIRONMENT
    67.
    发明申请
    SYSTEM AND METHOD FOR PROVIDING A TRANSLATION MECHANISM IN A NETWORK ENVIRONMENT 审中-公开
    在网络环境中提供翻译机制的系统和方法

    公开(公告)号:US20140169374A1

    公开(公告)日:2014-06-19

    申请号:US14180379

    申请日:2014-02-14

    Abstract: An example method is provided and includes receiving a packet associated with a flow, determining a tunnel identifier for the flow, and determining a flow identifier for the flow. The method includes associating the flow identifier and the tunnel identifier to an Internet protocol (IP) address to generate a binding to be used for a network address and port translation (NAPT). In other embodiments, a routing decision is executed based on the binding between the identifiers and the IP address. The flow identifier can be a context identifier (CID), and the tunnel identifier can be a softwire tunnel ID. In yet other embodiments, the packet can be tagged as part of an encapsulation operation, which includes providing information about a network location at which the network address and port translation is to be executed.

    Abstract translation: 提供了示例性方法,并且包括接收与流相关联的分组,确定流的隧道标识符,以及确定流的流标识符。 该方法包括将流标识符和隧道标识符与因特网协议(IP)地址相关联,以生成用于网络地址和端口转换(NAPT)的绑定。 在其他实施例中,基于标识符和IP地址之间的绑定来执行路由决定。 流标识符可以是上下文标识符(CID),隧道标识符可以是软线隧道ID。 在其他实施例中,分组可以被标记为封装操作的一部分,其包括提供关于将要执行网络地址和端口转换的网络位置的信息。

    In-situ operations, administration, and maintenance extension to trace multicast tree and identify failure node

    公开(公告)号:US12301404B2

    公开(公告)日:2025-05-13

    申请号:US18065221

    申请日:2022-12-13

    Abstract: A method is performed by a network controller that is configured to control routers configured to forward a multicast flow downstream from a first hop router that is a root of a multicast tree formed by the routers to last hop routers that terminate branches of the multicast tree, respectively. The method includes collecting operational configuration information from the routers and constructing a topological view of the multicast tree based on the operational configuration information; causing the routers to forward multicast probes downstream from the first hop router along all of the branches toward the last hop routers to trace the multicast tree; receiving, from particular ones of the last hop routers that received the multicast probes, indications that the multicast probes were received; and detecting failures in the multicast tree based on the indications and the topological view.

    UNJOINING AND REJOINING CLUSTERS IN COMPUTING NETWORKS

    公开(公告)号:US20250055751A1

    公开(公告)日:2025-02-13

    申请号:US18883589

    申请日:2024-09-12

    Abstract: A method for unjoining and rejoining clusters of computing nodes in edge site computing networks to reduce the impact of interruption to connectivity between computing nodes is presented. The method includes accessing a cluster of computing nodes executing on an edge site computing network. The cluster of computing nodes includes a plurality of follower computing nodes and a leader computing node. The method further includes detecting an interruption to connectivity established between the leader computing node and one or more of the plurality of follower computing nodes. In response to detecting the interruption to connectivity, the method includes bifurcating the cluster of computing nodes into a first subcluster of computing nodes and a second subcluster of computing nodes. In response to detecting a restoration of connectivity, the method includes recombining the first subcluster of computing nodes and the second subcluster of computing nodes.

    ADVERTISEMENT OF CONFIDENTIAL COMPUTING ENVIRONMENTS

    公开(公告)号:US20240372735A1

    公开(公告)日:2024-11-07

    申请号:US18143470

    申请日:2023-05-04

    Abstract: Techniques performed by offload computing devices that establish and advertise confidential computing environments for use by other computing devices. The offload computing devices may each be executing an attestable bootloader that creates the confidential computing environments, advertises the available resources to the other computing devices, establish secure encrypted channels with the other devices, and run processes in the confidential computing environments on behalf of the other computing devices. In addition to advertising the availability of computing resources in the confidential environments, the offload computing devices may additionally advertise performance metrics associated with the confidential computing environments. Computing devices may receive the advertisements, and send requests to the offload computing devices to run processes on their behalf in the confidential computing environments.

Patent Agency Ranking