Abstract:
A disclosed method may include (1) identifying a memory buffer that is allocated to a packet on a computing device, (2) identifying one or more characteristics of the memory buffer allocated to the packet on the computing device, (3) determining, based at least in part on the characteristics of the memory buffer, that the memory buffer allocated to the packet has leaked, and then in response to determining that the memory buffer has leaked, (4) performing at least one action to remedy the leak of the memory buffer. Various other apparatuses, systems, and methods are also disclosed.
Abstract:
A network device may intercept, from an application associated with a user space of the network device, a request message to join a multicast group or to leave the multicast group. The request message may be addressed to a kernel of the network device. The network device may direct the request message to a service daemon associated with the user space of the network device. The network device may determine, using the service daemon, whether another application associated with the user space is a member of the multicast group. The network device may selectively generate, using the service daemon and based on whether the other application associated with the user space is the member of the multicast group, an advertisement message based on the request message, and transmit the advertisement message when the advertisement message is generated.
Abstract:
Techniques include quickly establishing a maximum transmission unit (MTU) for a network path, such as a network tunnel. In one example, data representative of the MTU is included in a header of a packet. If the MTU indicated in the packet is larger than a downstream network interface of a network device, the network device updates the data of the header to indicate the MTU of the downstream network interface, and an egress network device sends the packet back to an ingress network device. In another example, network devices fragment packets, if necessary, such that the fragments satisfy the MTU of the downstream network interface. The egress network device then determines the MTU for the path based on a largest received fragment, reassembles the fragments into a single packet, and returns the reassembled packet to the ingress network device. The packets may comprise echo packets of generic routing encapsulation (GRE).
Abstract:
Techniques are described to reduce false alarms in network devices utilizing keepalive messaging schemes. In order to potentially avoid false alarms, a transmitting network device adjusts quality of service QOS/TOS settings in keep-alive probe packets that are sent later in a current detection interval such that the keep-alive probe packets have escalating priorities. In addition, for keep-alive probe packets that are sent later in the current detection interval, the network device may also insert host-level preferential indicator within each of the packets to request preferential treatment at both itself and the peer network device.
Abstract:
Techniques are described for selectively triggering fast reroute of traffic by enhancing a protocol used for monitoring operational status of a forwarding plane of a router. The forwarding plane of the router outputs periodic messages that, when received by a peer router, provide an indication that the forwarding plane is operational and able to forward packets. In addition, when constructing the periodic messages, the forwarding plane embeds an indication of a status of internal communication between the forwarding plane and a control plane of the router. In this way, the forwarding plane of the transmitting router provides an indication to the peer router that, although operational, the forwarding plane may be operating according to stale forwarding information.