Abstract:
A method, apparatus and computer program product for providing a variable tunnel keep-alive interval is presented. A tunnel keep-alive packet for a first tunnel is received at a first switching device. A Quality of Service (QoS) value of the keep-alive packet ishcekce. A determination is made regarding whether the QoS value corresponds to a QoS value of network control traffic, and when the QoS value of the keep-alive packet is lower than the QoS value of the network control traffic then a value of a tunnel keep-alive interval is increased.
Abstract:
Systems, methods and computer readable media for mobility integration with fabric-enabled networks are described. Some implementations can include a method comprising terminating, using one or more processors, an access tunnel at an edge switch of a fabric-enabled network, and establishing, using the one or more processors, a mobility tunnel with the edge switch. The method can also include mapping, using the one or more processors, a mobility network to a service identifier associated with the mobility network. The method can further include forwarding, using the one or more processors, traffic for the mobility network from the edge switch to another edge switch across the fabric enabled network, wherein the traffic includes the service identifier.
Abstract:
A method, apparatus and computer program product for providing a variable tunnel keep-alive interval is presented. A tunnel keep-alive packet for a first tunnel is received at a first switching device. A Quality of Service (QoS) value of the keep-alive packet ishcekce. A determination is made regarding whether the QoS value corresponds to a QoS value of network control traffic, and when the QoS value of the keep-alive packet is lower than the QoS value of the network control traffic then a value of a tunnel keep-alive interval is increased.
Abstract:
Systems, methods and computer readable media for mobility integration with fabric-enabled networks are described. Some implementations can include a method comprising terminating, using one or more processors, an access tunnel at an edge switch of a fabric-enabled network, and establishing, using the one or more processors, a mobility tunnel with the edge switch. The method can also include mapping, using the one or more processors, a mobility network to a service identifier associated with the mobility network. The method can further include forwarding, using the one or more processors, traffic for the mobility network from the edge switch to another edge switch across the fabric enabled network, wherein the traffic includes the service identifier.
Abstract:
A wireless access point employs monitor to scrutinize priority of mobility unit assigned priority values, and replaces invalid or reserved values to prevent rogue or poorly constructed applications (apps) from improper priority specification and subsequent imbalance of priority message transmission for control and other high-priority message traffic. The access point receives an indication of reserved message priorities from a wireless switching point at a remote end of an access tunnel providing backhaul network access to mobility units coupled to the access point. The access point stores the reserved message priorities for comparison with priorities assigned at the mobility units. Messages having invalid priorities are modified to reduce the priority to an allowed value, such as best effort, prior to the message transmission through the access tunnel to the backhaul network.