Abstract:
In one example, an Access Point (AP) configures a first mapping of a first cellular network connection to a first local access network group, and further configures a second mapping of a second cellular network connection to a second local access network group. The AP determines whether a user device is authorized to use the first cellular network connection or the second cellular network connection. If the user device is authorized to use the first cellular network connection, the AP associates, for the user device, a first user device identifier with the first local access network group. If the user device is authorized to use the second cellular network connection, the AP associates, for the user device, a second user device identifier with the second local access network group.
Abstract:
A first customer edge network device receives an encapsulated packet that includes inner headers comprising source address information for a first service running on a first computing apparatus in a first home cloud and destination address information for a second service running on a second computing apparatus in a second home cloud. The customer edge network device inserts a predetermined portion of bits of a virtual domain identifier of the encapsulated packet into a label to form a virtual domain label for label-based routing. The virtual domain label is appended to the encapsulated packet. The encapsulated packet is sent to a first provider edge network device of a provider network. The first provider edge network device appends an virtual private network label to the encapsulated packet, and sends the encapsulated packet to a provider network device for label-based routing in the provider network.
Abstract:
A first customer edge network device receives an encapsulated packet that includes inner headers comprising source address information for a first service running on a first computing apparatus in a first home cloud and destination address information for a second service running on a second computing apparatus in a second home cloud. The customer edge network device inserts a predetermined portion of bits of a virtual domain identifier of the encapsulated packet into a label to form a virtual domain label for label-based routing. The virtual domain label is appended to the encapsulated packet. The encapsulated packet is sent to a first provider edge network device of a provider network. The first provider edge network device appends an virtual private network label to the encapsulated packet, and sends the encapsulated packet to a provider network device for label-based routing in the provider network.
Abstract:
System, method, and computer program product to perform an operation, the operation comprising capturing, at one or more peering routers, parameters for a plurality of data packets sent by a client device and specifying a destination network address, identifying which peering router captured the parameters for each of the plurality of data packets, determining, based on the identified peering routers, a first peering router nearest to the client, relative to the other peering routers, identifying a first content cache, of a plurality of content caches in a content distribution network, nearest to the first peering router, and fulfilling a content request from the client device using content stored on the first content cache.
Abstract:
A source virtual private network (VPN) gateway supports a local source subnet and communicates over a wide area network (WAN) with a destination VPN gateway that supports a local destination subnet. The source VPN gateway receives from the local source subnet an Internet Protocol (IP) packet destined for the local destination subnet, determines a security association (SA) based on a source IP address and a destination IP address of the IP packet, and encapsulates the IP packet with tunnel encapsulation including a tunnel protocol header and a tunnel outer IP header, to produce a clear-text tunnel packet. The source VPN gateway encrypts the IP packet and the tunnel protocol header but not the tunnel outer IP header using an encryption key and a security parameter index for the SA, to produce an encrypted tunnel packet, and tunnels it to the destination VPN gateway over the WAN.
Abstract:
Techniques are presented herein for optimizing secure communications in a network. A router in a virtual private network determines whether or not it has successfully registered with a key server that provides cryptographic keys for routers in the virtual private network. The router stores state information that is indicative of whether or not the router has successfully registered with the key server.
Abstract:
Consistent with embodiments of the present invention, a system may be provided to provide per-subscriber stream management comprising: a client capable of receiving a playlist containing a subset of segments associated with a video asset; a video application server to request subscriber state information and to build state representations in a subscriber database on a per-subscriber basis; a media segmenter capable of providing the video asset in multiple bit rates; a subscriber state manager capable of managing the current state of one or more subscribers in a subscriber database; and a stream manager capable of requesting the assignment of bandwidth from a wireless infrastructure on a per-subscriber basis.
Abstract:
System, method, and computer program product to perform an operation, the operation comprising capturing, at one or more peering routers, parameters for a plurality of data packets sent by a client device and specifying a destination network address, identifying which peering router captured the parameters for each of the plurality of data packets, determining, based on the identified peering routers, a first peering router nearest to the client, relative to the other peering routers, identifying a first content cache, of a plurality of content caches in a content distribution network, nearest to the first peering router, and fulfilling a content request from the client device using content stored on the first content cache.
Abstract:
Techniques are presented for optimizing secure communications in a network. A first router receives from a second router an encrypted packet with an unknown security association. The first router examines the packet to determine whether the counter value is in a range of predicted counter values. Additionally, a key server is configured to provision routers that are part of a virtual private network. The key server selects a counter value that is part of a security association and calculates a key value. The key server sends the key value together with the security association to enable routers to exchange encrypted packets with each other in the virtual private network using the key value and the security association. The key server increments the counter value to a value within a range of counter values capable of being predicted by the routers.
Abstract:
Techniques are presented herein for optimizing secure communications in a network. A router in a virtual private network determines whether or not it has successfully registered with a key server that provides cryptographic keys for routers in the virtual private network. The router stores state information that is indicative of whether or not the router has successfully registered with the key server.