Abstract:
In general, various aspects of the techniques described in this disclosure provide time synchronization for encrypted traffic in a computer network. In one example, the disclosure describes an apparatus, such as a network device, having a control unit for a network device in a computerized network having a topology of network devices; and a forwarding unit operative to determine a release time for sending a synchronization packet in accordance with a time synchronization protocol; modify the synchronization packet to include a release timestamp specifying the release time; sending a time value via sideband data associated with the synchronization packet, wherein the time value is based on the release time specified by the release timestamp; and schedule transmission of the synchronization packet for a time corresponding to the time value in the sideband data, the synchronization packet to be transmitted to a destination network device.
Abstract:
In general, various aspects of the techniques described in this disclosure provide time synchronization for encrypted traffic in a computer network. In one example, the disclosure describes an apparatus, such as a network device, having a control unit for a network device in a computerized network having a topology of network devices; and a forwarding unit operative to determine a release time for sending a synchronization packet in accordance with a time synchronization protocol; modify the synchronization packet to include a release timestamp specifying the release time; sending a time value via sideband data associated with the synchronization packet, wherein the time value is based on the release time specified by the release timestamp; and schedule transmission of the synchronization packet for a time corresponding to the time value in the sideband data, the synchronization packet to be transmitted to a destination network device.
Abstract:
A system may obtain a current bit error count that identifies a quantity of bit errors in a bit stream during a time interval. The system may determine that the current bit error count identifies one or more bit errors. The system may determine whether an estimated bit error rate (BER) for the bit stream is likely to satisfy a threshold. The system may select an approach for determining the estimated BER for the bit stream. The estimated BER may be determined based on combining the current bit error count with a quantity of bits received in the time interval when the estimated BER is likely to exceed the threshold, and the estimated BER may be determined based on the current bit error count and one or more past bit error counts when the estimated BER is unlikely to exceed the threshold. The system may determine the estimated BER.
Abstract:
In some embodiments, an apparatus includes a switch device that can be operatively coupled to a network having a set of links. The switch device can receive at a first time, a message having a set of physical coding sublayer (PCS) lanes. The message can include an error notification within a first subset of PCS lanes from the set of PCS lanes and not within a second subset of PCS lanes from the set of PCS lanes. The error notification is associated with signal degradation of a link from the set of links, where the switch device can send a first signal in response to receiving the message at the first time. The switch device can also receive at a second time a message without the error notification, and the switch device can send a second signal in response to receiving the message at the second time.
Abstract:
A network device may receive traffic to be processed by a routing component, and may determine temperatures of an ASIC and an HBM of the routing component at a first time. The network device may determine whether the temperature of the ASIC satisfies a first ASIC temperature threshold or a second ASIC temperature threshold, and may determine whether the temperature of the HBM satisfies a first HBM temperature threshold or a second HBM temperature threshold. The network device may selectively throttle processing of the traffic by a first quantity when the temperature of the ASIC satisfies the first ASIC temperature threshold or the temperature of the HBM satisfies the first HBM temperature threshold, or throttle the processing of the traffic by a second quantity when the temperature of the ASIC satisfies the second ASIC temperature threshold or the temperature of the HBM satisfies the second HBM temperature threshold.
Abstract:
A network device may receive traffic to be processed by a routing component, and may determine temperatures of an ASIC and an HBM of the routing component at a first time. The network device may determine whether the temperature of the ASIC satisfies a first ASIC temperature threshold or a second ASIC temperature threshold, and may determine whether the temperature of the HBM satisfies a first HBM temperature threshold or a second HBM temperature threshold. The network device may selectively throttle processing of the traffic by a first quantity when the temperature of the ASIC satisfies the first ASIC temperature threshold or the temperature of the HBM satisfies the first HBM temperature threshold, or throttle the processing of the traffic by a second quantity when the temperature of the ASIC satisfies the second ASIC temperature threshold or the temperature of the HBM satisfies the second HBM temperature threshold.
Abstract:
A system may obtain a current bit error count that identifies a quantity of bit errors in a bit stream during a time interval. The system may determine that the current bit error count identifies one or more bit errors. The system may determine whether an estimated bit error rate (BER) for the bit stream is likely to satisfy a threshold. The system may select an approach for determining the estimated BER for the bit stream. The estimated BER may be determined based on combining the current bit error count with a quantity of bits received in the time interval when the estimated BER is likely to exceed the threshold, and the estimated BER may be determined based on the current bit error count and one or more past bit error counts when the estimated BER is unlikely to exceed the threshold. The system may determine the estimated BER.
Abstract:
The disclosed system may include (1) a modular port concentrator that connects as a modular line card within a router to forward network packets, (2) a profile module, stored in memory, that stores an allowed port configuration profile that defines supported port configurations for the modular port concentrator, (3) a configuration module, stored in memory, that receives an attempted port configuration for the modular line card, (4) an enforcement module, stored in memory, that enforces the allowed port configuration profile by taking remedial action in response to determining that the allowed port configuration profile does not allow the attempted port configuration, and (5) at least one physical processor configured to execute the modular port concentrator, the profile module, the configuration module, and the enforcement module. Various other systems and methods are also disclosed.