Longest Prefix Matching Providing Packet Processing and/or Memory Efficiencies in Processing of Packets

    公开(公告)号:US20190372896A1

    公开(公告)日:2019-12-05

    申请号:US16541931

    申请日:2019-08-15

    Abstract: One embodiment performs longest prefix matching operations in one or more different manners that provides packet processing and/or memory efficiencies in the processing of packets. In one embodiment, a packet switching device determines a set of one or more mask lengths of a particular conforming entry of a multibit trie or other data structure that matches a particular address of a packet via a lookup operation in a mask length data structure. A conforming entry refers to an entry which has less than or equal to a maximum number of different prefix lengths, with this maximum number corresponding to the maximum number of prefix lengths which can be searched in parallel in the address space for a longest matching prefix by the implementing hardware. The packet switching device then performs corresponding hash table lookup operation(s) in parallel in determining an overall longest matching prefix for the particular address.

    Service chain overlay network operations visibility via data packets

    公开(公告)号:US10348648B2

    公开(公告)日:2019-07-09

    申请号:US15156689

    申请日:2016-05-17

    Abstract: In one embodiment, a particular service chain data packet is received by a particular service node, with the service chain data packet including a header identifying service chain information. The particular service node applies a service to the particular service chain data packet. The particular service node adds service-layer operations data to the particular service chain data packet, with the service-layer operations data related to the current service function or the particular service node. Subsequently, the particular service node sends the particular service chain data packet with the service-layer operations data from the particular service node. In one embodiment, networking operations data is also added to the particular service chain data packet. In one embodiment, an egress service node removes the service-layer (and possibly networking) operations data and forwards to another system, possibly after processing this operations data.

    CROWD-SOURCED CLOUD COMPUTING RESOURCE VALIDATION

    公开(公告)号:US20180013696A1

    公开(公告)日:2018-01-11

    申请号:US15203767

    申请日:2016-07-06

    CPC classification number: H04L47/822 G06F9/5072 H04L43/022 H04L43/062

    Abstract: Resource provider specifications, characterizing computing resources of computing resource providers, are received. The reachability of each IP address included in the received specification is determined. An agent is deployed that is operable to determine the value of each of a set of metrics in the environment of the host at which the agent is deployed. The agent determines the value of each metric of the set of metrics in the environment of the relevant host, and communicates the determined values to one or more computing devices that validate whether the resources characterized by the communicated values are sufficient to provide the performance characterized by the received specification and that each ISP router complies with a predetermined policy. For each computing resource provider validated and determined to comprise an ISP router compliant with policy, the specified computing resources are added to a pool of resources for cloud computing.

    Systems and methods for applying attestation tokens to LISP messages

    公开(公告)号:US12137093B2

    公开(公告)日:2024-11-05

    申请号:US17814410

    申请日:2022-07-22

    Abstract: In one embodiment, an apparatus of a LISP environment includes one or more processors and computer-readable non-transitory storage media coupled to the one or more processors. The computer-readable non-transitory storage media include instructions that, when executed by the one or more processors, cause the one or more processors to perform operations including receiving an attestation token from a first component of the LISP environment. The operations also include encoding the attestation token using a LISP message format. The operations further include distributing the encoded attestation token with a LISP signaling message to a third component of the LISP environment.

    NETWORK ENCLAVE ATTESTATION FOR NETWORK AND COMPUTE DEVICES

    公开(公告)号:US20240031350A1

    公开(公告)日:2024-01-25

    申请号:US18481765

    申请日:2023-10-05

    CPC classification number: H04L63/08 H04L63/126

    Abstract: An enclave manager of a network enclave obtains a request to retrieve configuration information and state information corresponding to compute devices and network devices comprising a network enclave. The request specifies a set of parameters of the configuration information and the state information usable to generate a response to the request. The enclave manager evaluates the compute devices, the network devices, and network connections among these devices within the network enclave to obtain the configuration information and the state information. Based on the configuration information and the state information, the enclave manager determines whether the network enclave is trustworthy. Based on the parameters of the request, the enclave manager generates a response indicating a summary that is used to identify the trustworthiness of the network enclave.

    NETWORK ENCLAVE ATTESTATION FOR NETWORK AND COMPUTE DEVICES

    公开(公告)号:US20230026420A1

    公开(公告)日:2023-01-26

    申请号:US17937935

    申请日:2022-10-04

    Abstract: An enclave manager of a network enclave obtains a request to retrieve configuration information and state information corresponding to compute devices and network devices comprising a network enclave. The request specifies a set of parameters of the configuration information and the state information usable to generate a response to the request. The enclave manager evaluates the compute devices, the network devices, and network connections among these devices within the network enclave to obtain the configuration information and the state information. Based on the configuration information and the state information, the enclave manager determines whether the network enclave is trustworthy. Based on the parameters of the request, the enclave manager generates a response indicating a summary that is used to identify the trustworthiness of the network enclave.

Patent Agency Ranking