Abstract:
In one embodiment, a supervisory device in a network forms a virtual access point (VAP) for a node in the network. A plurality of access points (APs) in the network are mapped to the VAP as part of a VAP mapping and the node treats the APs in the VAP mapping as a single AP for purposes of communicating with the network. The supervisory device determines a traffic type of traffic associated with the node. The supervisory device assigns the node to a selected wireless channel based in part on the traffic type of the traffic associated with the node. The supervisory device controls the VAP to use the channel assigned to the node.
Abstract:
In one embodiment, a server instructs one or more networking devices in a local area network (LAN) to form virtual network overlay in the LAN that redirects traffic associated with a particular node in the LAN to the server. The server receives the redirected traffic associated with the particular node. The server determines a node profile for the particular node based in part on an analysis of the redirected traffic. The server configures the particular node based on the determined node profile for the particular node.
Abstract:
In one embodiment, a device in a network identifies a node in the network that is not synchronized to a network time synchronization mechanism. The device determines a scheduled reception time for a particular deterministic traffic flow at which the device is to receive the traffic flow from the node. The device sends, prior to the scheduled reception time, a request to the node for the particular deterministic traffic flow. The request identifies the particular deterministic traffic flow and causes the node to send the traffic flow to the device. The device receives the particular deterministic traffic flow from the node at the scheduled reception time.
Abstract:
In one embodiment, a method includes receiving a packet from an end node, the packet comprising an authenticated source MAC (Media Access Control) address and a source IP (Internet Protocol) address computed based on the authenticated source MAC address, and verifying the source IP address in the received packet, wherein verifying the source IP address comprises computing an IP address based on the authenticated source MAC address and comparing the computed IP address to the source IP address in the received packet to verify the source IP address. An apparatus is also disclosed herein.
Abstract:
In one embodiment, a device in a network receives a notification from a neighbor of the device indicative of a child node of the device requesting a parent change from the device to the neighbor. The device updates an existing routing path from the device to the child node to be routed through the neighbor, in response to receiving the notification from the neighbor. The device receives an instruction to remove the updated routing path from the device to the child node through the neighbor. The device removes the updated routing path from the device to the child node, in response to receiving the instruction to remove the updated routing path.
Abstract:
In one embodiment, a virtual firewall is installed on a port of a device that communicates across a zone boundary within an industrial network. The virtual firewall is then configured based on operation of the industrial network, such that the port may then communicate via the firewall to a remote virtual firewall of a remote port of a remote device across the zone boundary.
Abstract:
In one embodiment, a device in a network performs a first comparison between observed and expected packet error rates for a first path in the network. The device identifies one or more intersecting paths in the network that intersect the first path. The device performs one or more additional comparisons between observed and expected packet error rates for the intersecting paths that intersect the first path. The device identifies a particular node along the first path as a source of packet drops based on the first comparison between the observed and expected packet error rates for the first path and on the one or more additional comparisons between the observed and expected packet error rates for the intersecting paths that intersect the first path.
Abstract:
In one embodiment, a device (e.g., switch or registry) maintains a binding table for all internet protocol (IP) addresses in a particular subnet associated with the device, and in response to receiving a neighbor solicitation (NS) lookup message from a router for a particular address, determines whether the particular address is within the binding table. When the particular address is not within the binding table, the device causes the router to not store the particular address in a neighbor discovery (ND) cache at the router (e.g., by responding to clear the cache, or ignoring to prevent state from being created). In another embodiment, the ND-requesting router ensures that the particular address is not kept in an ND cache at the router in response to the device indicating that the particular address is not within its binding table (e.g., an explicit response to clear, or absence of instruction to store state).
Abstract:
In one embodiment, a device in a network receives information regarding one or more traffic flows in the network. The device identifies a particular one of the one or more traffic flows as a seasonal traffic flow based on the information regarding the one or more traffic flows. The device determines whether a service level agreement associated with the seasonal traffic flow is met. The device causes a time-based path for the seasonal traffic flow to be provisioned, in response to a determination that the service level agreement associated with the seasonal traffic flow is not met.
Abstract:
In one embodiment, a device both communicates with a network operating a distributed proactive routing protocol, and participates in a centralized path computation protocol. The device communicates routing characteristics of the distributed proactive routing protocol for the network from the network to the centralized path computation protocol, and also communicates one or more computed paths from the centralized path computation protocol to the network, where the computed paths from the centralized path computation protocol are based on the routing characteristics of the distributed proactive routing protocol for the network.