Abstract:
The present technology provides a system, method and computer-readable medium for configuration pattern recognition and inference, directed to a device with an existing configuration, through an extensible policy framework. The policy framework uses a mixture of python template logic and CLI micro-templates as a mask to infer the intent behind an existing device configuration in a bottom-up learning inference process. Unique values for device/network identifiers and addresses as well as other resources are extracted and accounted for. The consistency of devices within the fabric is checked based on the specific policies built into the extensible framework definition. Any inconsistencies found are flagged for user correction or automatically remedied by a network controller. This dynamic configuration pattern recognition ability allows a fabric to grow without being destroyed and re-created, thus new devices with existing configurations may be added and automatically configured to grow a Brownfield fabric.
Abstract:
The present technology provides a system, method and computer-readable medium for configuration pattern recognition and inference, directed to a device with an existing configuration, through an extensible policy framework. The policy framework uses a mixture of python template logic and CLI micro-templates as a mask to infer the intent behind an existing device configuration in a bottom-up learning inference process. Unique values for device/network identifiers and addresses as well as other resources are extracted and accounted for. The consistency of devices within the fabric is checked based on the specific policies built into the extensible framework definition. Any inconsistencies found are flagged for user correction or automatically remedied by a network controller. This dynamic configuration pattern recognition ability allows a fabric to grow without being destroyed and re-created, thus new devices with existing configurations may be added and automatically configured to grow a Brownfield fabric.
Abstract:
The present technology provides a system, method and computer-readable medium for configuration pattern recognition and inference, directed to a device with an existing configuration, through an extensible policy framework. The policy framework uses a mixture of python template logic and CLI micro-templates as a mask to infer the intent behind an existing device configuration in a bottom-up learning inference process. Unique values for device/network identifiers and addresses as well as other resources are extracted and accounted for. The consistency of devices within the fabric is checked based on the specific policies built into the extensible framework definition. Any inconsistencies found are flagged for user correction or automatically remedied by a network controller. This dynamic configuration pattern recognition ability allows a fabric to grow without being destroyed and re-created, thus new devices with existing configurations may be added and automatically configured to grow a Brownfield fabric.
Abstract:
Methods and apparatuses for rapid TRILL convergence are disclosed herein. The methods can be implemented in a network including a plurality of RBridges or in a cloud network environment including a plurality of cloud switch domains. An example method for rapid TRILL convergence can include: Executing a spanning tree protocol (STP) for network topology in a network; and executing a Hello protocol for control and forwarding at the RBridge. The Hello protocol can be configured to elect a designated RBridge and assign an appointed forwarder. The method can also include assigning a transient appointed forwarder during a period of time between convergence of the STP and convergence of the Hello protocol. The transient appointed forwarder can be configured to forward frames in the network during the period of time between convergence of the STP and convergence of the Hello protocol.
Abstract:
The present disclosure provides systems, methods, and non-transitory computer-readable storage media for determining container to leaf switch connectivity information in a data center in a presence of blade switches and servers. In one aspect of the present disclosure, a method of determining container to leaf switch connectivity information of a data center utilizing at least one blade switch and at least one blade server, includes receiving, at a network controller, link connectivity information that includes south-bound neighboring information between the at least one blade switch of the data center and the at least one blade server of the data center; determining, at the network controller, the container to leaf switch connectivity information of the data center, based on the link connectivity information; and generating a visual representation of a topology of the data center based on the container to leaf switch connectivity information.
Abstract:
An example method for facilitating multiple mobility domains with VLAN translation in a multi-tenant network environment is provided and includes detecting attachment of a first virtual machine on a first port and a second virtual machine on a second port of a network element, the first port and the second port being configured with a first mobility domain and a second mobility domain, respectively, and the first and second virtual machines being configured on a same original VLAN, determining whether the original VLAN falls within a pre-configured VLAN range, translating the original VLAN to a first VLAN on the first port corresponding to the first mobility domain and to a second VLAN on the second port corresponding to the second mobility domain, and segregating traffic on the original VLAN into the first VLAN and the second VLAN according to the respective mobility domains for per-port VLAN significance.
Abstract:
Methods and apparatuses for rapid TRILL convergence are disclosed herein. The methods can be implemented in a network including a plurality of RBridges or in a cloud network environment including a plurality of cloud switch domains. An example method for rapid TRILL convergence can include: Executing a spanning tree protocol (STP) for network topology in a network; and executing a Hello protocol for control and forwarding at the RBridge. The Hello protocol can be configured to elect a designated RBridge and assign an appointed forwarder. The method can also include assigning a transient appointed forwarder during a period of time between convergence of the STP and convergence of the Hello protocol. The transient appointed forwarder can be configured to forward frames in the network during the period of time between convergence of the STP and convergence of the Hello protocol.
Abstract:
Techniques for determining that a configuration change in configurations for a network device has occurred to result in changed configurations for the network device. The techniques include creating a policy for the network device by a network controller that manages one or more network devices. The network controller may obtain data from the network device, and update the network device policy based on the obtained data. In some examples, the network controller may compare the network device configurations state with the network controller intent to determine if an Out-of-Band (OOB) configuration change has occurred in the configuration of the network device. Finally, the controller may synchronize the network device to the controller based on the updated policy.
Abstract:
The present disclosure provides systems, methods, and non-transitory computer-readable storage media for determining container to leaf switch connectivity information in a data center in a presence of blade switches and servers. In one aspect of the present disclosure, a method of determining container to leaf switch connectivity information of a data center utilizing at least one blade switch and at least one blade server, includes receiving, at a network controller, link connectivity information that includes south-bound neighboring information between the at least one blade switch of the data center and the at least one blade server of the data center; determining, at the network controller, the container to leaf switch connectivity information of the data center, based on the link connectivity information; and generating a visual representation of a topology of the data center based on the container to leaf switch connectivity information.
Abstract:
An example method for facilitating multiple mobility domains with VLAN translation in a multi-tenant network environment is provided and includes detecting attachment of a first virtual machine on a first port and a second virtual machine on a second port of a network element, the first port and the second port being configured with a first mobility domain and a second mobility domain, respectively, and the first and second virtual machines being configured on a same original VLAN, determining whether the original VLAN falls within a pre-configured VLAN range, translating the original VLAN to a first VLAN on the first port corresponding to the first mobility domain and to a second VLAN on the second port corresponding to the second mobility domain, and segregating traffic on the original VLAN into the first VLAN and the second VLAN according to the respective mobility domains for per-port VLAN significance.