Abstract:
In one embodiment, a computer networking device calculates a first hash value for an identifier of a group of computing devices, as well as a second hash value for the identifier of the group of computing devices, with each hash value being at least in part on the identifier of the group of computing devices and an identifier of the respective interface. The computer networking device may also analyze the first hash value with respect to the second hash value and select the first interface for association with the identifier of the group of computing devices based at in part on the analyzing. The computer networking device may further store an indication that the identifier of the group of computing devices is associated with the first interface.
Abstract:
In one embodiment, a method includes generating, by a first controller of a network, an overlay domain digest using a first domain digest associated with the first controller of the network and a second domain digest associated with a second controller of the network. The method also includes communicating, by the first controller, the overlay domain digest to an edge device of the network, updating, by the first controller, the overlay domain digest to generate an updated overlay domain digest, and communicating, by the first controller, the updated overlay domain digest to the edge device of the network. The method further includes detecting, by the edge device, a difference between the overlay domain digest and the updated overlay domain digest and re-establishing, by the edge device, a connection with an orchestrator of the network to determine a control plane domain change within the network.
Abstract:
In one embodiment, a computer networking device calculates a first hash value for an identifier of a group of computing devices, as well as a second hash value for the identifier of the group of computing devices, with each hash value being at least in part on the identifier of the group of computing devices and an identifier of the respective interface. The computer networking device may also analyze the first hash value with respect to the second hash value and select the first interface for association with the identifier of the group of computing devices based at in part on the analyzing. The computer networking device may further store an indication that the identifier of the group of computing devices is associated with the first interface.
Abstract:
The present disclosure describes several key features of an agent deployable on a service appliance: agent architecture/design, transport and channel abstractions of the agent, new message definition components, channel switching (e.g., platform independent processing), Channel state machine, platform dependent hooks (e.g., memory, timers), Service key data store, and Secure channel infrastructure. Many of these features alleviate the vendor of the service appliance from having to provide the features. The features and standardization thereof enable the system to be more robust (and increases code quality). Speed of integration is decreased while the risk of integration issues is also decreased. Updates to the agent can be deployed in a controlled and efficient manner. Furthermore, the agent can ensure security between a switch and the agent. The agent deployed and running on vendor appliances provides a unique way to present transport channels that run between the switch, agent, and other service appliance components.
Abstract:
Disclosed are systems, apparatuses, methods, and computer-readable media for managing networks. According to at least one example, a method is provided for connecting to a network controller across different regions. The method includes identifying a first connection with a network orchestrator during establishment of a second connection with the network orchestrator from a network controller; establishing a sibling session that links the second connection and the first connection at a control plane; inserting a sibling data message that identifies the sibling session into control messages sent; receiving a message from the network orchestrator over the second connection, the message including an address of the network controller associated with the second connection; and transmitting the second address of the network controller over the first connection to the network orchestrator.
Abstract:
In one embodiment, a computer networking device calculates a first hash value for an identifier of a group of computing devices, as well as a second hash value for the identifier of the group of computing devices, with each hash value being at least in part on the identifier of the group of computing devices and an identifier of the respective interface. The computer networking device may also analyze the first hash value with respect to the second hash value and select the first interface for association with the identifier of the group of computing devices based at in part on the analyzing. The computer networking device may further store an indication that the identifier of the group of computing devices is associated with the first interface.
Abstract:
In one embodiment, a method includes generating, by a first controller of a network, an overlay domain digest using a first domain digest associated with the first controller of the network and a second domain digest associated with a second controller of the network. The method also includes communicating, by the first controller, the overlay domain digest to an edge device of the network, updating, by the first controller, the overlay domain digest to generate an updated overlay domain digest, and communicating, by the first controller, the updated overlay domain digest to the edge device of the network. The method further includes detecting, by the edge device, a difference between the overlay domain digest and the updated overlay domain digest and re-establishing, by the edge device, a connection with an orchestrator of the network to determine a control plane domain change within the network.
Abstract:
In one embodiment, a computer networking device calculates a first hash value for an identifier of a group of computing devices, as well as a second hash value for the identifier of the group of computing devices, with each hash value being at least in part on the identifier of the group of computing devices and an identifier of the respective interface. The computer networking device may also analyze the first hash value with respect to the second hash value and select the first interface for association with the identifier of the group of computing devices based at in part on the analyzing. The computer networking device may further store an indication that the identifier of the group of computing devices is associated with the first interface.
Abstract:
Embodiments of the present disclosure enable monitoring network traffic on multiple Virtual Device Context (VDC) elements of a switch using a single NAM module. To that end, if a monitored network element supports contexts (i.e. VDC elements), a NAM module could be configured to seamlessly drive the move of the data port interfaces (at the managed device) from one context to the other. After the move of the data ports that support SPAN destination traffic flow to the target VDC is complete, these SPAN destination ports may be configured to be able to receive SPAN data traffic.
Abstract:
Disclosed are systems, apparatuses, methods, and computer-readable media for managing networks. According to at least one example, a method is provided for connecting to a network controller across different regions. The method includes identifying a first connection with a network orchestrator during establishment of a second connection with the network orchestrator from a network controller; establishing a sibling session that links the second connection and the first connection at a control plane; inserting a sibling data message that identifies the sibling session into control messages sent; receiving a message from the network orchestrator over the second connection, the message including an address of the network controller associated with the second connection; and transmitting the second address of the network controller over the first connection to the network orchestrator.