Abstract:
A software defined network controller detects when a host has moved between network elements in a network. The controller generates a list of network elements to which the host has roamed, the list being sorted by time when the host is attached to a network element so that a most recent network element to which the host is attached is the root network element and at a head of the list. The controller updates the root network element in the list first for traffic flow associated with the host. The controller sends commands to the network elements to program a tunnel from each previous point of attachment network element in the list to the most recent root network element in the list in reverse order of the roaming path so as to route traffic for the host via a tunnel.
Abstract:
Techniques whereby a LAN-side border router observes all packets of an application flow from both directions so that the application recognition performed on the LAN-side border router functions properly. A border router may implement flags in a flow cache to indicate whether the border router is the LAN-side border router and/or a WAN-side border router for an application flow. As packets are received at a border router at either the LAN interface or WAN interface, the flags associated with packet's application flows are examined to determine if the border router is the LAN-side border router for the application flow. If so, then application recognition and routing control may be performed. If not, the packet may be redirected to another border router that may be the LAN-side border router or the WAN-side border router for the application flow to insure that border router observes the packet.
Abstract:
A software defined network controller detects when a host has moved between network elements in a network. The controller generates a list of network elements to which the host has roamed, the list being sorted by time when the host is attached to a network element so that a most recent network element to which the host is attached is the root network element and at a head of the list. The controller updates the root network element in the list first for traffic flow associated with the host. The controller sends commands to the network elements to program a tunnel from each previous point of attachment network element in the list to the most recent root network element in the list in reverse order of the roaming path so as to route traffic for the host via a tunnel.
Abstract:
Techniques whereby a LAN-side border router observes all packets of an application flow from both directions so that the application recognition performed on the LAN-side border router functions properly. A border router may implement flags in a flow cache to indicate whether the border router is the LAN-side border router and/or a WAN-side border router for an application flow. As packets are received at a border router at either the LAN interface or WAN interface, the flags associated with packet's application flows are examined to determine if the border router is the LAN-side border router for the application flow. If so, then application recognition and routing control may be performed. If not, the packet may be redirected to another border router that may be the LAN-side border router or the WAN-side border router for the application flow to insure that border router observes the packet.
Abstract:
A software defined network controller detects when a host has moved between network elements in a network. The controller generates a list of network elements to which the host has roamed, the list being sorted by time when the host is attached to a network element so that a most recent network element to which the host is attached is the root network element and at a head of the list. The controller updates the root network element in the list first for traffic flow associated with the host. The controller sends commands to the network elements to program a tunnel from each previous point of attachment network element in the list to the most recent root network element in the list in reverse order of the roaming path so as to route traffic for the host via a tunnel.
Abstract:
Aspects of the present disclosure are directed to dynamic adjustment of load-balancing weights across multiple network transport interfaces in a network, informed in part by Quality of Service (QoS) metrics. In one aspect, a method includes determining one or more metrics based on one or more Software-defined Wide Area Network (SDWAN) session level throughput and SDWAN session loss through one or more tunnels; generating a Quality of Service (QoS) SDWAN session level shape rate per tunnel based on the one or more metrics; and dynamically adjusting an SDWAN forwarding load-balance weight for each of the one or more tunnels based on the QoS SDWAN session level shape rate.
Abstract:
Techniques whereby a LAN-side border router observes all packets of an application flow from both directions so that the application recognition performed on the LAN-side border router functions properly. A border router may implement flags in a flow cache to indicate whether the border router is the LAN-side border router and/or a WAN-side border router for an application flow. As packets are received at a border router at either the LAN interface or WAN interface, the flags associated with packet's application flows are examined to determine if the border router is the LAN-side border router for the application flow. If so, then application recognition and routing control may be performed. If not, the packet may be redirected to another border router that may be the LAN-side border router or the WAN-side border router for the application flow to insure that border router observes the packet.
Abstract:
A software defined network controller detects when a host has moved between network elements in a network. The controller generates a list of network elements to which the host has roamed, the list being sorted by time when the host is attached to a network element so that a most recent network element to which the host is attached is the root network element and at a head of the list. The controller updates the root network element in the list first for traffic flow associated with the host. The controller sends commands to the network elements to program a tunnel from each previous point of attachment network element in the list to the most recent root network element in the list in reverse order of the roaming path so as to route traffic for the host via a tunnel.