Abstract:
Systems, methods, and non-transitory computer-readable storage media for a miscabling detection protocol. One or more switches can periodically send miscabling protocol (MCP) packets on non-fabric ports on all configured EPG VLANs. A first switch located at a network fabric receives a miscabling protocol (MCP) packet indicating an identity of an originating switch and a port number of an originating port of the MCP packet via a receiving port on the first switch, wherein the MCP packet is received from an external network connected to the receiving port, and wherein the originating switch and originating port are also located at the network fabric and connected to the external network. Based on the MCP packet, the first switch then detects a loop between the receiving port, the originating port, and the external network. Next, the first switch blocks the receiving port or the originating port in response to detecting the loop.
Abstract:
Various embodiments of the present disclosure provide methods for analyzing usage information at each of a plurality of network devices of a computing network according to one or more machine learning algorithms and predicting a usage pattern of a corresponding network device at a specific future time. In some embodiments, routing protocol information of a plurality of network devices and one or more corresponding upstream or downstream ports can be collected. Based upon the routing protocol information of the plurality of network devices and the corresponding upstream or downstream ports, or the predicted usage pattern at each of the plurality of network device, a reduced-power-consumption topology that scales with predicted demands at the plurality of network devices can be dynamically generated. An operation state of at least one of the plurality of network devices or at least one corresponding upstream or downstream port can be dynamically adjusted to achieve a power saving at the computing network.
Abstract:
Systems, methods, and non-transitory computer-readable storage media for stage upgrades in a network. The system generates graph-data structured based representations of devices in the network, wherein respective attributes of the representations is selected based on respective services provided by the devices to tenants in the network and identities of respective tenants serviced by the devices. Next, the system generates a graph showing a distribution of the devices in the network according to the representations, wherein the representations are interconnected in the graph based on service roles of associated devices with respect to tenants in the network and other devices associated with the tenants. The system then schedules an upgrade of devices based on the graph, the upgrade being scheduled in stages, each stage including devices selected for upgrade in that stage, wherein the devices for each stage are selected by identifying devices having respective representations assigned to that specific stage.
Abstract:
A packet is generated at a first network connected device for transmission to a destination network device through a network comprising a plurality of pods. At least two of the plurality of pods are within separate management domains, and generating the packet comprises generating the packet with a first identifier and a second identifier. The first identifier indicates a pod of the plurality of pods in which the destination network connected device is located, and the second identifier indicates an identity of the destination network connected device within the pod of the plurality of pods. The packet is transmitted from the first network connected device to the destination network connected device.
Abstract:
Systems, methods and transitory computer-readable storage media for constructing a loop free multicast tree. The methods include observing a network topology transition affecting a first path from the particular node to a root node, calculating a second path from the particular node to the root node and sending a message to an upstream node requesting that the upstream node be a root port in the calculated second path. If the upstream node agrees to be the root port in the calculated second path, the method further includes creating a new FTAG tree topology view that includes the upstream node as the root port in the second path.
Abstract:
Systems, methods and transitory computer-readable storage media for detecting one or more loops in a multicast tree. The method includes calculating a multicast tree radius for a first multicast tree, the multicast tree radius representing a maximum number of hops from a root node to a furthest edge node in the first multicast tree, forwarding, by the root node, a first packet to each edge node within the first multicast tree, the first packet having a time-to-live (TTL) value equal to twice the first multicast tree radius, receiving, at the root node, a copy of the forwarded first packet, and determining an existence of a loop in the first multicast tree based at least upon receiving the copy of the forwarded first packet.
Abstract:
A packet is generated at a first network connected device for transmission to a destination network device through a network comprising a plurality of pods. At least two of the plurality of pods are within separate management domains, and generating the packet comprises generating the packet with a first identifier and a second identifier. The first identifier indicates a pod of the plurality of pods in which the destination network connected device is located, and the second identifier indicates an identity of the destination network connected device within the pod of the plurality of pods. The packet is transmitted from the first network connected device to the destination network connected device.
Abstract:
Systems, methods, and non-transitory computer-readable storage media for stage upgrades in a network. The system generates graph-data structured based representations of devices in the network, wherein respective attributes of the representations is selected based on respective services provided by the devices to tenants in the network and identities of respective tenants serviced by the devices. Next, the system generates a graph showing a distribution of the devices in the network according to the representations, wherein the representations are interconnected in the graph based on service roles of associated devices with respect to tenants in the network and other devices associated with the tenants. The system then schedules an upgrade of devices based on the graph, the upgrade being scheduled in stages, each stage including devices selected for upgrade in that stage, wherein the devices for each stage are selected by identifying devices having respective representations assigned to that specific stage.
Abstract:
A determination is made at a network connected device that a network policy is to be verified. The network policy is applied to network packets sent to an endpoint within a network, and the application of the policy to network traffic can result in at least two outcomes. Another determination is made at the network connected device that a switch is provisionable to host the endpoint. The network connected device provisions a simulated endpoint version of the endpoint at the switch to host the policy. At least one packet is sent to the simulated endpoint via the network connected device for each of the at least two outcomes of the policy. At least one response is received by the network connected device from the simulated endpoint indicating how the policy was applied to each of the packets.
Abstract:
Systems, methods and non-transitory computer-readable storage media for determining interconnectivity in dense networks. The method includes generating, at a first network device in a data network, a traceroute packet that includes source and destination address information. The packet is encapsulated in an outer packet, and the encapsulated packet is forwarded to a second network device and to one or more intermediate network devices in the data network. A response packet is received from the second network device and each of the intermediate network devices that received the traceroute packet. The first network device determines, based on the responsive packets, an end-to-end path taken by the traceroute packet through the data network.