Abstract:
A method relates to providing arbitrary and custom application traffic generation on network devices. The method includes identifying, via a network controller, an application associated with a network to yield an identified application, spinning up, by the network controller, a traffic generator in a container on a network device, wherein the traffic generator is configured to emulate traffic associated with the network device and the identified application and monitoring performance of at least one of the identified application in the network and the traffic generator on the network device.
Abstract:
This disclosure describes techniques to operate a control plane in a network fabric. The techniques include determining a stateless rule corresponding to communication between a first segment of the network fabric and a second segment of the network fabric. The techniques further include configuring the control plane to enforce the stateless rule.
Abstract:
A method relates to providing arbitrary and custom application traffic generation on network devices. The method includes identifying, via a network controller, an application associated with a network to yield an identified application, spinning up, by the network controller, a traffic generator in a container on a network device, wherein the traffic generator is configured to emulate traffic associated with the network device and the identified application and monitoring performance of at least one of the identified application in the network and the traffic generator on the network device.
Abstract:
A method relates to providing arbitrary and custom application traffic generation on network devices. The method includes identifying, via a network controller, an application associated with a network to yield an identified application, spinning up, by the network controller, a traffic generator in a container on a network device, wherein the traffic generator is configured to emulate traffic associated with the network device and the identified application and monitoring performance of at least one of the identified application in the network and the traffic generator on the network device.
Abstract:
Systems, methods, and computer-readable media are provided for performing secure frame encryption as a service. For instance, a network edge device can determine at least a first path and a second path for routing a data packet. The network edge device can obtain a first plurality of values for at least one network metric, wherein the first plurality of values corresponds to the first path and at least a first backup path associated with the first path. The network edge device can obtain a second plurality of values for the at least one network metric, wherein the second plurality of values corresponds to the second path and at least a second backup path associated with the second path. The network edge device can select one of the first path or the second path for routing the data packet based on a comparison of the first plurality of values and the second plurality of values.
Abstract:
This disclosure describes techniques to operate a control plane in a network fabric. The techniques include determining a stateless rule corresponding to communication between a first segment of the network fabric and a second segment of the network fabric. The techniques further include configuring the control plane to enforce the stateless rule.
Abstract:
This disclosure describes techniques to operate a control plane in a network fabric. The techniques include determining a stateless rule corresponding to communication between a first segment of the network fabric and a second segment of the network fabric. The techniques further include configuring the control plane to enforce the stateless rule.
Abstract:
A technique is able to direct a power signal from a port power controller to one of multiple physical ports. The technique involves activating a set of port power controllers. Each port power controller is constructed and arranged to deliver power to a device through at most one physical port at a time. The technique further involves performing a set of discovery operations to discover device presence, the set of discovery operations providing discovery data. The technique further involves providing, based on the discovery data provided by the set of discovery operations, a set of switching signals to switching circuitry which is coupled to a set of physical ports. The switching circuitry is constructed and arranged to steer power signals from the activated set of port power controllers through the set of physical ports to deliver power to a set of devices.
Abstract:
A technique is able to direct a power signal from a port power controller to one of multiple physical ports. The technique involves activating a set of port power controllers. Each port power controller is constructed and arranged to deliver power to a device through at most one physical port at a time. The technique further involves performing a set of discovery operations to discover device presence, the set of discovery operations providing discovery data. The technique further involves providing, based on the discovery data provided by the set of discovery operations, a set of switching signals to switching circuitry which is coupled to a set of physical ports. The switching circuitry is constructed and arranged to steer power signals from the activated set of port power controllers through the set of physical ports to deliver power to a set of devices.
Abstract:
This disclosure describes techniques for software-defined service insertion. The techniques include a method of configuring a network for service insertion. The techniques include processing a master policy correlating an endpoint group pair, of source endpoint group and destination endpoint group, to a service graph. The service graph indicates a template service chain, and the template service chain indicates an ordering of a plurality of services. Processing the master policy includes disaggregating the master policy into at least one location specific policy, each of the at least one location specific policy corresponding to a separate location in the network and including traffic steering directives corresponding to a portion of the plurality of services associated with the separate location. The techniques further include causing each of the at least one location specific policy to be stored in association with the separate location to which that location specific policy corresponds.