Abstract:
A system includes an access node having an associated identifier. The access node is configured to insert the identifier into a network connection request. The system includes an IP edge service node connected to the access node and configured to receive the network connection request. The IP edge service node is further configured to store the inserted identifier and to insert the identifier into an Internet protocol version 6 (IPv6) address request transmitted according to dynamic host configuration protocol version 6 (DHCPv6) through an established network connection based on the network connection request. The system further includes a server configured to receive the IPv6 address request and assign an IPv6 address based on the IPv6 address request.
Abstract:
In one embodiment, for each port of an access node in an access-based computer network, one access server of a plurality of access servers is configured as a preferred access server for that port. Upon receiving a session initiation message at a particular port, the access node forwards the session initiation message to one or more of the access servers based on the configured preferred access server for the particular port.
Abstract:
A system includes an access node having an associated identifier. The access node is configured to insert the identifier into a network connection request. The system includes an IP edge service node connected to the access node and configured to receive the network connection request. The IP edge service node is further configured to store the inserted identifier and to insert the identifier into an Internet protocol version 6 (IPv6) address request transmitted according to dynamic host configuration protocol version 6 (DHCPv6) through an established network connection based on the network connection request. The system further includes a server configured to receive the IPv6 address request and assign an IPv6 address based on the IPv6 address request.
Abstract:
This disclosure describes techniques and mechanisms for providing an intelligent de-scheduler filtering system that minimizes service disruptions within a network. The techniques may provide continuous monitoring of clusters within a dynamic system and provide an intelligent determination of pod(s) within a cluster to move by utilizing a disruption score based on disruption policies, balancer policies, service level agreement policies, and other data associated with the cluster and/or pods. The techniques enable a subset of pods that are flagged as violating compute usage to be selected to be moved, such that the subset will result in the least disruption to move to help restore or realign compute resources in the system.
Abstract:
Disclosed are systems, methods, and computer-readable storage media for automatically, dynamically generating feature model augmentation statements for data nodes for a new network feature described in a data modeling language. A software-defined controller, or other network components, can detect the availability of a new network feature defined by a feature model in a data modeling language and process the feature model to create an authorization policy data defining access rules control rules for the new network feature. Based on the authorization policy, the controller or the authorization model generator can generate a set of augmentation statements for one or more data nodes in the feature model of the new network feature and augment the new feature model with the augmentation statements for controlling access to the new network feature.
Abstract:
In one embodiment, an aggregation device is configured to aggregate traffic of a plurality of customer edge (CE) devices into a single bridge-domain. The aggregation device receives connectivity fault management (CFM) packets of a CFM protocol from the plurality of CE devices. Each received CFM packet includes a media access control (MAC) address of an access port of the CE device from which the CFM packet was transmitted. The aggregation device detects conflicting MAC addresses between access ports of CE devices by comparing MAC addresses of the received CFM packets. The aggregation device notifies one or more of the plurality of CE devices of the conflict.
Abstract:
This disclosure describes techniques and mechanisms for providing an intelligent de-scheduler filtering system that minimizes service disruptions within a network. The techniques may provide continuous monitoring of clusters within a dynamic system and provide an intelligent determination of pod(s) within a duster to move by utilizing a disruption score based on disruption policies, balancer policies, service level agreement policies, and other data associated with the cluster and/or pods. The techniques enable a subset of pods that are flagged as violating compute usage to be selected to be moved, such that the subset will result in the least disruption to move to help restore or realign compute resources in the system.
Abstract:
Systems and methods provide for scaling service discovery in a micro-service environment. A controller can inject a service discovery agent onto a host. At least one of the controller or the agent can identify a first set of micro-service containers that are dependencies of the first micro-service container and a second set of micro-service containers that are dependencies of the second micro-service container. At least one of the controller or the agent can update routing data for the first set of micro-service containers and the second set of micro-service containers. At least one of the controller or the agent can determine the second micro-service container has terminated on the host computing device. At least one of the controller or the agent can update the agent to remove the routing data for the second set of micro-service containers.
Abstract:
Systems and methods provide for scaling service discovery in a micro-service environment. A controller can inject a service discovery agent onto a host. At least one of the controller or the agent can identify a first set of micro-service containers that are dependencies of the first micro-service container and a second set of micro-service containers that are dependencies of the second micro-service container. At least one of the controller or the agent can update routing data for the first set of micro-service containers and the second set of micro-service containers. At least one of the controller or the agent can determine the second micro-service container has terminated on the host computing device. At least one of the controller or the agent can update the agent to remove the routing data for the second set of micro-service containers.
Abstract:
A method for translating network addresses includes receiving a first network packet, the first network packet comprising an internal source address. The method also includes generating, by performing a mapping operation, a mapping value. The generating of the mapping value uses, at least in part, at least a portion of the internal source address, and at least a portion of an external source address. The external source address is associated with the internal source address. The method also includes forwarding, using a second network packet, at least a portion of the first network packet. The second network packet comprises the external source address and at least a portion of the mapping value.