VERIFICATION OF IN-SITU NETWORK TELEMETRY DATA IN A PACKET-SWITCHED NETWORK

    公开(公告)号:US20220329606A1

    公开(公告)日:2022-10-13

    申请号:US17846381

    申请日:2022-06-22

    Abstract: Techniques to facilitate verification of in-situ network telemetry data of data packet of data traffic of packet-switched networks are described herein. A technique described herein includes a network node obtaining a data packet of data traffic of a packet-switched network. The data packet includes an in-situ network telemetry block. The network node obtains telemetry data and cryptographic key. The cryptographic key confidentially identifies the network node. The node encrypts at least a portion of the telemetry data based on the cryptographic key to produce signed telemetry data and updates telemetry-data entry of the in-situ network telemetry block. The telemetry data and signed telemetry data is inserted into the telemetry-data entry. The node forwards the data packet with the updated telemetry-data entry to another network node of the packet-switched network.

    Function-as-a-service (FaaS) model for specialized processing units

    公开(公告)号:US11282160B2

    公开(公告)日:2022-03-22

    申请号:US16817390

    申请日:2020-03-12

    Abstract: A server that includes a graphics processing unit (GPU) may receive, from a first application that is remote from the server, a first request to reserve a first number of cores of the GPU for a first amount of time. The server may also receive, from a second application that is also remote from the server, a second request to reserve a second number of cores of the GPU for a second amount of time that at least partly overlaps the first amount of time. The server may determine that the first request is associated with a higher priority than the second request and, in response, may reserve the first number of cores for the first amount of time for the first application. The server may send, to the first application, an indication that the first number of cores have been reserved as requested by the first application.

    Network operations including protocol processing of a packet updating an operations data field of a different protocol

    公开(公告)号:US11082540B2

    公开(公告)日:2021-08-03

    申请号:US16231301

    申请日:2018-12-21

    Abstract: In one embodiment, network operations are improved by performing updating operations data in an operations data field associated with the header of a particular protocol during the processing of a different protocol. A particular multiple-protocol (MP) packet is received by a particular network node in a network. The particular MP packet includes multiple protocol headers, including a first protocol header associated with a first protocol and a second protocol header associated with a second protocol. Further, the second protocol header associated with a second operations data field. During protocol processing of the first protocol on the particular MP packet, the second operations data field updated with particular operations data. The particular MP packet is sent from the particular network node, with said sent particular MP packet including said updated second operations data field with particular operations data.

    AUTHENTICATION OF NETWORK DEVICES USING ACCESS CONTROL PROTOCOLS

    公开(公告)号:US20200322145A1

    公开(公告)日:2020-10-08

    申请号:US16784025

    申请日:2020-02-06

    Abstract: Systems, methods, and computer-readable media for authenticating access control messages include receiving, at a first node, access control messages from a second node. The first node and the second node including network devices and the access control messages can be based on RADIUS or TACACS+ protocols among others. The first node can obtain attestation information from one or more fields of the access control messages determine whether the second node is authentic and trustworthy based on the attestation information. The first node can also determine reliability or freshness of the access control messages based on the attestation information. The first node can be a server and the second node can be a client, or the first node can be a client and the second node can be a server. The attestation information can include Proof of Integrity based on a hardware fingerprint, device identifier, or Canary Stamp.

    INTRA-HOST AND END-TO-END PACKET PATH AND TREATMENT TRACING USING IN-SITU OAM IN CONTAINER NETWORKING ARCHITECTURE

    公开(公告)号:US20190297011A1

    公开(公告)日:2019-09-26

    申请号:US15926292

    申请日:2018-03-20

    Abstract: Presented herein are techniques for monitoring packets in a container networking environment. A method includes receiving a packet at a network node, the packet having been routed to the network node in accordance with instructions from a container orchestration system, inserting an additional field in the packet that is configured to record a path of the packet within a first POD of the host device that includes at least one container, forwarding the packet to the first POD of the host device in accordance with the instructions from the container orchestration system, updating the additional field with container networking path information as the packet transits the first POD and the at least one container therein, storing the container path information in an analytics node of the network node, removing the additional field from the packet, and transmitting the packet from the network node to the network.

Patent Agency Ranking