Abstract:
According to one aspect disclosed herein, a system can include a set of node peers, including a first subset implemented in software and a second subset implemented in hardware. The first subset can include a software node. The second subset can include a hardware node that includes a hardware cache, a processor, and a memory that stores computer-executable instructions. The hardware node can receive, from a network, a packet, and can determine if data that identifies a path associated with the packet is stored in the hardware cache. If not, the hardware node can query the software node to identify the path associated with the packet, and can receive, in response from the software node, the data that identifies the path, which then can be stored in the hardware cache. The hardware node can forward, along the path, the packet to a network element.
Abstract:
According to one aspect disclosed herein, a system can include a set of node peers, including a first subset implemented in software and a second subset implemented in hardware. The first subset can include a software node. The second subset can include a hardware node that includes a hardware cache, a processor, and a memory that stores computer-executable instructions. The hardware node can receive, from a network, a packet, and can determine if data that identifies a path associated with the packet is stored in the hardware cache. If not, the hardware node can query the software node to identify the path associated with the packet, and can receive, in response from the software node, the data that identifies the path, which then can be stored in the hardware cache. The hardware node can forward, along the path, the packet to a network element.
Abstract:
Methods and systems may use a software-defined network (SDN) based approach for interworking different types of nodes. In an example, an SDN controller may include components that assist in building pseudowires across Ethernet virtual private network (EVPN) nodes and Border gateway protocol-virtual private local area network (LAN) service (BGP-VPLS) nodes.
Abstract:
Methods, apparatus, and articles of manufacture to provide a multicast virtual private network (MVPN) are disclosed. Example methods to transmit multicast data in a network disclosed herein include monitoring, with a first network node, a multicast data flow to determine a characteristic for triggering a switch from a first logical topology for the multicast data flow to a second logical topology for the multicast data flow. Disclosed example methods also include, after the switch to the second logical topology, accessing a multicast data packet associated with a first multicast route generated for the multicast data flow from a second network node, and transmitting a first replication of the multicast data packet to a third network node via a unicast path, the first replication of the multicast data packet to include a first label provided by the third network node to identify the first multicast route.
Abstract:
A method, apparatus and computer-readable storage medium distribute a non-live content stream in a network. An initial meta-file is transmitted in response to a request for the content, which identifies a division of the content stream into blocks, and available sources for delivery of the blocks. The initial meta-file can identify a first multicast and a second multicast server, assigning a first and second portion of the blocks for delivery using the first and second multicast source server, respectively. The first and second portions are transmitted using the first and second multicast source servers, respectively. The first and second portions correspond to distinct non-overlapping portions of the non-live content stream. The initial meta-file can also identify a unicast source server, assigning a third portion of the blocks for delivery using the unicast source server, the third potion being transmitted by the unicast source server.
Abstract:
A cloud computing network is implemented by defining a plurality of network connectivity features for designing a virtual private cloud computing network within the cloud computing network. Each network connectivity feature has user-definable attributes and each network connectivity feature is translatable into a set of network element configuration statements that instantiate an action particular to the network connectivity feature. Usage rules specifying how the features can be used are defined for the cloud computing network. Selected features from the plurality of network connectivity features are accepted and assembled into a template for configuring the virtual private cloud computing network. The template for configuring the virtual private cloud computing network is validated against the usage rules. The virtual private cloud computing network is implemented in accordance with the validated template for configuring the virtual private cloud computing network.
Abstract:
Methods, apparatus, and articles of manufacture to provide a multicast virtual private network (MVPN) are disclosed. An example method to transmit multicast data over a communication network includes receiving, at a first machine, a multicast data packet from an ingress provider edge router of the communication network, the multicast data packet associated with a multicast route, and transmitting a first replication of the multicast data packet from the first machine to a second machine via a first unicast path. The first replication of the multicast data packet includes a first label provided by the second machine to identify the multicast route in the second machine. Example methods further include receiving the first replication of the multicast data packet at the second machine via the first unicast path, and replicating the multicast data packet from the second machine to an egress provider edge router of the communication network.
Abstract:
A user is provided an interface for selecting network connectivity features for designing a virtual private cloud computing network. Each network connectivity feature has an attribute for connecting tangible storage elements and tangible computing elements in the virtual private cloud computing network. Each network connectivity feature is translatable into a network element configuration statement that instantiates an action particular to the network connectivity feature. Usage rules are defined specifying how the network connectivity features can be used. Selected network connectivity features are accepted from the user. The virtual private cloud computing network is configured in accordance with the selected network connectivity features using the tangible storage elements and tangible computing elements in the virtual private cloud computing network. The virtual private cloud computing network is implemented in accordance with the selected network connectivity features using the tangible storage elements and tangible computing elements in the virtual private cloud computing network.
Abstract:
Methods and systems may use a software-defined network (SDN) based approach for interworking different types of nodes. In an example, an SDN controller may include components that assist in building pseudowires across Ethernet virtual private network (EVPN) nodes and Border gateway protocol-virtual private local area network (LAN) service (BGP-VPLS) nodes.
Abstract:
Concepts and technologies are disclosed herein for a distributed stateful load balancer. A first load balancer can store a first portion of a distributed hash table including data over a first range of hash keys. The first load balancer can be in communication with a second load balancer that stores a second portion of the distributed hash table including data over a second range of hash keys. The first load balancer can receive a packet, where a hash value calculated for the packet does not fall in the first range of hash keys. The first load balancer can identify, based on the hash value, that the second load balancer stores data that identifies a path associated with the packet and query the second load balancer to identify the path. The first load balancer can receive the data and forward, along the path, the packet to a network element.