Abstract:
Techniques are disclosed for dynamically determining or learning hostnames. According to embodiments described herein, a solicitation message is received at a first network device. Based on the solicitation message, a hostname is determined for a second network device that sent the solicitation message. A first network address is also determined for the second network device that sent the solicitation message. A mapping between the hostname and the first network address is stored at the first network device.
Abstract:
A method in an example embodiment can include polling a first cable modem in a cable network and receiving a first response message from the first cable modem identifying a downstream frequency detected by the first cable modem. The method further includes determining the downstream frequency is split between at least two fiber nodes and determining a cable modem termination system (CMTS) service group topology, where the topology includes the at least two fiber nodes. In specific embodiments, determining that the downstream frequency is split is based on at least the first response message from the first cable modem and a second response message from a second cable modem. In more specific embodiments, the method includes constructing a hybrid fiber-coaxial (HFC) topology map of the cable network based on at least the first and second response messages, where the HFC topology map indicates the CMTS service group topology.
Abstract:
In an embodiment, an electronic digital data packet router performs receiving a DHCP initiation message on a particular interface among a plurality of network interfaces; modifying the DHCP initiation message by adding a particular DHCP option that signals a DHCP server to provide router configuration data, resulting in a modified DHCP initiation message; relaying the modified DHCP initiation message to the DHCP server; receiving, from the DHCP server, a DHCPOFFER message that comprises the particular DHCP option containing configuration data; configuring the router using the configuration data; relaying the DHCPOFFER message without the particular DHCP option on the particular interface toward another data packet router.
Abstract:
Various systems and methods for performing bit indexed explicit replication (BIER). For example, one method involves receiving a packet at a node. The packet includes a bit string includes information identifying a plurality of destinations. The node selects an entry in a bit indexed forwarding table (BIFT). The BIFT includes both a primary path entry and a backup path entry. The node forwards the packet based on information in the entry.
Abstract:
In an embodiment, a method comprises obtaining a second network address at a computer node, which has been already associated with a first network address and provided first keying information; sending, to a key server computer, an update message that comprises both the first network address and the second network address; using the first keying information to encrypt messages that the computer node sends from the second network address to one or more other members of a group.
Abstract:
The present disclosure provides for carrying reachability information in an echo request message and/or an echo reply message, which can be used to reach an initiator when the initiator's address is unknown. An echo request message includes an FEC (forwarding equivalence class) stack that identifies a label switched path (LSP). The echo request message is received by a label switching routing element (LSR) on the LSP, and the echo request is originated by an initiator. In response to a detection that the FEC stack changes at the LSR, a segment reachability (SR) sub-TLV (type-length-value) element can be generated, where the SR sub-TLV includes reachability information that can be used to reach the initiator, and the reachability information includes an incoming label allocated by the LSR to reach the initiator.
Abstract:
A method to protect data in a database. The method includes detecting an actual flow path for an API call between a source node and a destination node, determining whether the actual flow path for the API call deviates from an expected flow path for the API call, and in response to determining that the actual flow path for the API call deviates from the expected flow path by a predetermined threshold, denying access to data sought by the API call at the destination node.
Abstract:
In one embodiment, a method herein comprises: determining a set of flows to be monitored within a computer network; determining, by the device, a set of nodes within the computer network through which the set of flows traverse; determining monitoring capabilities for the set of nodes; generating an assignment for each particular node of the set of nodes to monitor a subset of one or more flows of the set of flows based on the monitoring capabilities of each particular node, wherein the assignment for each particular node of the set of nodes ensures that each flow of the set of flows is monitored by at least one or more nodes of the set of nodes; and instructing the set of nodes to monitor the set of flows according to the assignment for each particular node of the set of nodes.
Abstract:
A solution for selecting an optimal user Plane entity (with Control and User Plane Separation (CUPS)) per UE during seamless roaming. In one embodiment, a method is provide that is performed by a control plane entity in a mobile core network that supports inter public land mobile network (PLMN) roaming among two or more PLMNs. The method includes obtaining a create session request from an entity in a second PLMN to which a user equipment has roamed from a first PLMN; selecting a particular user plane entity among a plurality of user plane entities based on one or more user equipment related parameters; and establishing a session with the particular user plane entity to serve user plane traffic in the mobile core network for the user equipment.
Abstract:
A system is provided that includes one management cluster to manage network function virtualization infrastructure (NFVI) resources lifecycle in more than one edge POD locations, where resources include hardware and/or software, and where software resources lifecycle includes software development, upgrades, downgrades, logging, monitoring etc. Methods are provided for decoupling storage from compute and network functions in each virtual machine (VM)-based NFVI deployment location and moving it to a centralized location. Centralized storage could simultaneously interact with more than one edge PODs, and the security is built-in with periodic key rotation. Methods are provided for increasing NFVI system viability by dedicating (fencing) CPU core pairs for specific controller operations and workload operations, and sharing the CPU cores for specific tasks.