Abstract:
In one embodiment, a device both communicates with a network operating a distributed proactive routing protocol, and participates in a centralized path computation protocol. The device communicates routing characteristics of the distributed proactive routing protocol for the network from the network to the centralized path computation protocol, and also communicates one or more computed paths from the centralized path computation protocol to the network, where the computed paths from the centralized path computation protocol are based on the routing characteristics of the distributed proactive routing protocol for the network.
Abstract:
In one embodiment, a multicast listener device floods a path lookup request to search for a multicast tree, and may then receive path lookup responses from candidate nodes on the multicast tree, where each of the path lookup responses indicates a unicast routing cost from a respective candidate node to the multicast listener device, and where each of the candidate nodes is configured to suppress a path lookup response if a total path latency from a source of the multicast tree to the multicast listener device via that respective candidate node is greater than a maximum allowable path latency. The multicast listener device may then select a particular candidate node as a join point for the multicast tree based on the particular node having a lowest associated unicast routing cost to the multicast listener device from among the candidate nodes, and joins the multicast tree at the selected join point.
Abstract:
In one embodiment, a device receives a network policy based upon, at least in part, a physical network, and configures a design of an industrial network overlay on the physical network based upon, at least in part, the network policy. The configuring, according to the techniques herein, may generally include: determining a number of virtual local area networks (VLANs) within the industrial network overlay; determining which devices of the physical network are on which VLAN; determining placement of at least one virtual firewall within the industrial network overlay; and determining at least one communication path for the industrial network overlay between at least two devices.
Abstract:
A network includes routing arcs for routing network traffic to a destination. Each arc comprising nodes connected in sequence by reversible links oriented to direct network traffic to first and second edge nodes through which the network traffic exits the arc. The nodes in the arc detect a first failure. In response, the nodes exchange first management frames to reverse links in the arc so that the network traffic in the arc is directed away from the first failure toward the first edge node of the arc through which the network traffic exits the arc. The nodes detect a second failure in the arc that is spaced apart from the first failure. In response, the nodes exchange second management frames to freeze incoming edges of parent arcs to prevent network traffic in the corresponding parent arc from entering the arc.
Abstract:
In one embodiment, a device in a network receives packet arrival information for a packet from a neighbor of the device in the network. The packet arrival information indicates a likelihood of the packet being received by a target node that is moving in the network were the packet forwarded by the neighbor to the target node. The device forwards the packet to the target node based on a determination that the device has a higher likelihood of the packet being received by target node were the packet forwarded by the device to the target node than were the packet forwarded by the neighbor to the target node.
Abstract:
In one embodiment, a switch in a computer network intercepts a packet to a destination target, the packet having a solicited node multicast address of the target as a destination media access control (MAC) address of the packet. As such, the switch may determine whether the solicited node multicast address is a hit or miss within a switch hardware table of the switch, and in response to a hit, re-writes the destination MAC address with a known value of the destination target from the table, and unicasts the packet to the destination target. In one or more additional embodiments, in response to a miss, and in response to a single-switch architecture, the switch drops the packet, while in response to a miss, and in response to a multi-switch architecture, the switch may compute a repository switch for the solicited multicast destination, and unicasts the packet to the computed repository switch.
Abstract:
A network includes routing arcs for routing network traffic to a destination. Each arc comprising nodes connected in sequence by reversible links oriented to direct network traffic to first and second edge nodes through which the network traffic exits the arc. The nodes in the arc detect a first failure. In response, the nodes exchange first management frames to reverse links in the arc so that the network traffic in the arc is directed away from the first failure toward the first edge node of the arc through which the network traffic exits the arc. The nodes detect a second failure in the arc that is spaced apart from the first failure. In response, the nodes exchange second management frames to freeze incoming edges of parent arcs to prevent network traffic in the corresponding parent arc from entering the arc.
Abstract:
A network includes multiple routing arcs for routing network traffic to a destination. Each arc comprising nodes connected in sequence by reversible links oriented away from a node initially holding a cursor toward one of first and second edge nodes through which the network traffic exits the arc. Each node includes a network device. The nodes in the arc detect a first failure in the arc. Responsive to the detecting the first failure, the nodes exchange first management frames over a data plane within the arc in order to transfer the cursor from the node initially holding the cursor to a first node proximate the first failure and reverse links in the arc as appropriate so that the network traffic in the arc is directed away from the first failure toward the first edge node of the arc through which the network traffic is able to exit the arc.
Abstract:
In one embodiment, a particular device in a deterministic network performs classification of one or more packets of a traffic flow between a source and a destination in the deterministic network. The particular device determines, based on the classification of the one or more packets, a requirement of the traffic flow. The particular device performs, based on the requirement, a packet operation on at least one packet of the traffic flow. The particular device sends packets of the traffic flow towards the destination via two or more paths in the deterministic network.
Abstract:
In one embodiment, a supervisory device in a network notifies, via an access point of the network, a node as to an ability of the network to support virtual access points. The supervisory device receives, in response to notifying the node, information from the node regarding characteristics of the node. The supervisory device selects, based on the characteristics of the node, a plurality of access points in the network to form a virtual access point with which the node may communicate. The supervisory device configures the plurality of access points to function as the virtual access point, wherein the node communicates with the network via the virtual access point.