Abstract:
A method for active network fabric management. The method includes receiving a probe packet by a termination beacon, where the probe packet is associated with a stream, the stream is identified using an origin beacon identification (ID) for an origin beacon, a stream source IP address, a stream destination IP address, an L2 origin interface, and a TTL value or an IP Hop value. The method further includes generating, after receiving the probe packet and after the expiration of a probe rate request (PRR) refresh timer, a rate control packet (RCP) by the termination beacon where the RCP includes a PRR for the stream, and sending the RCP to the origin beacon using an origin beacon IP address, where the origin beacon IP address is different than the stream source IP address.
Abstract:
A method for processing network traffic data units (NTDUs). The method includes receiving, by a wireless access point (WAP), a NTDU from a client device. The method further includes identifying a virtual tunnel upon which to transmit the NTDU, where the virtual tunnel is associated with a network device and transmitting, via the virtual tunnel, the NTDU to the network device.
Abstract:
A method and system for maintaining persistent network policies for a virtual machine (VM) that includes determining a name of the VM executing on a first host connected to a first network device; binding the name of the VM to a network policy for the VM on the first network device; acquiring from VM management software, using the name of the VM, a universally unique identifier (UUID) of the VM; associating the UUID to the network policy on the first network device; applying the network policy for the VM on the first network device; subscribing to receive notifications from the VM management software of changes to the configuration of the VM corresponding to the UUID; receiving notification from the VM management software of a configuration change made to the VM corresponding to the UUID; and updating the network policy of the VM to reflect the configuration change of the VM.
Abstract:
In general, embodiments of the invention relate to routing packets between hosts or virtual machines in different layer 2 domains. More specifically, embodiments of the invention relate to using overlay routing mechanisms in an Internet Protocol (IP) fabric to enable communication between hosts or virtual machines in different layer 2 domains to communication. The overlay routing mechanisms may include direct routing, indirect routing, naked routing, or a combination thereof (e.g., hybrid routing).
Abstract:
A method and system for processing network traffic data units (NTDUs) is disclosed. The method includes establishing a virtual tunnel between a wireless access point (WAP) and a network device. A NTDU is received by the WAP from a client device, and the virtual tunnel is identified upon which to transmit the NTDU based on a header of the NTDU according to a policy. The policy maps a portion of the header to a plurality of available virtual tunnels. The NTDU is transmitted, via the virtual tunnel, to the network device.
Abstract:
A method for processing network traffic data units (NTDUs). The method includes receiving, by a wireless access point (WAP), a NTDU from a client device. The method further includes identifying a virtual tunnel upon which to transmit the NTDU, where the virtual tunnel is associated with a network device and transmitting, via the virtual tunnel, the NTDU to the network device.
Abstract:
A method and apparatus of a network element that installs a device driver used to manage hardware of the network element is described. In an exemplary embodiment, the network element detects, with a functionality of a network element operating system, the hardware of a data plane of the network element, where at least one component of the network element operating system is executing in a first container as a first set of processes. The network element further determines a device driver for the hardware and installs the device driver in a kernel of the host operating system. The network element additionally manages the data, with the network element operating system, using the device driver.
Abstract:
Embodiments of the invention may relate to methods, systems, and/or non-transitory computer readable mediums for sidelining Such sidelining may include making a first determination, by a first network device, that a first network device state has degraded and making a first request, based on the first determination, to receive a first sideline token from a network controller. The network controller, in response to the first request, may make a second determination that a remaining sideline token is available. The method may also include receiving, by the first network device and based on the second determination, the remaining sideline token from the network controller and initiating, by the first network device, a graceful offlining based on receiving the remaining sideline token.
Abstract:
A method and apparatus of a device that evaluates multiple network asserts in response to changing network of network elements is described. In an exemplary embodiment, the device receives the multiple network asserts, where each of the plurality of network asserts represents a Boolean expression regarding a condition of at least one characteristic of at least one of the network elements. The device further detects a change in the network. In response to the detected change, the device, for one or more of the network asserts, evaluates this network assert to determine if this network asserts raises an action associated with this network assert. The device further performs the action associated this network assert if the network assert was raised.
Abstract:
A method for managing networking devices. The method includes receiving, by a second management system, first network device state information (NDSI) for a first plurality of network devices, where the first NDSI is obtained by a first management system and where the first management system manages the first plurality of network devices. The method further includes initiating performance of a management action based on a result, wherein the result is obtained by processing at least the first NDSI.