Abstract:
Methods and network devices are disclosed for multicast traffic steering in a communications network. In one embodiment, a method includes generating a first tree connecting a source node for a multicast flow through a communications network to each of multiple destination nodes for the multicast flow. The communications network is configured to forward a multicast message based on bit values in a message bit array carried by the message, and the first tree comprises a first set of unicast paths from the source node to the destination nodes. The method further includes allocating a first tree identifier to the first tree and communicating the first tree identifier and associated forwarding information to each of multiple forwarding nodes within the communications network. An embodiment of a network device includes a processor operably coupled to one or more network interfaces and adapted to perform steps of the method.
Abstract:
A software defined network controller detects when a host has moved between network elements in a network. The controller generates a list of network elements to which the host has roamed, the list being sorted by time when the host is attached to a network element so that a most recent network element to which the host is attached is the root network element and at a head of the list. The controller updates the root network element in the list first for traffic flow associated with the host. The controller sends commands to the network elements to program a tunnel from each previous point of attachment network element in the list to the most recent root network element in the list in reverse order of the roaming path so as to route traffic for the host via a tunnel.
Abstract:
In an example, a server architecture is described for a dynamic cascaded node chain providing a resource cluster. The cascaded node chain may include one or more resource instances provisioned as a head node, zero or more middle nodes, and a tail node. Each node may include a discrete number of available resource entries in a flow table. As traffic enters the head node, each node attempts to match the traffic to an entry in its flow table. If no match is found, the packet is downlinked to the next node in the chain. If the packet reaches the tail node without a match, it is punted to the controller. The controller may then provision a matching entry if an entry is available. If not, the controller may spawn a new resource instance. When the full capacity of the cluster is reached, non-matching entries may be dropped.
Abstract:
A software defined network controller detects when a host has moved between network elements in a network. The controller generates a list of network elements to which the host has roamed, the list being sorted by time when the host is attached to a network element so that a most recent network element to which the host is attached is the root network element and at a head of the list. The controller updates the root network element in the list first for traffic flow associated with the host. The controller sends commands to the network elements to program a tunnel from each previous point of attachment network element in the list to the most recent root network element in the list in reverse order of the roaming path so as to route traffic for the host via a tunnel.
Abstract:
Techniques whereby a LAN-side border router observes all packets of an application flow from both directions so that the application recognition performed on the LAN-side border router functions properly. A border router may implement flags in a flow cache to indicate whether the border router is the LAN-side border router and/or a WAN-side border router for an application flow. As packets are received at a border router at either the LAN interface or WAN interface, the flags associated with packet's application flows are examined to determine if the border router is the LAN-side border router for the application flow. If so, then application recognition and routing control may be performed. If not, the packet may be redirected to another border router that may be the LAN-side border router or the WAN-side border router for the application flow to insure that border router observes the packet.
Abstract:
A software defined network controller detects when a host has moved between network elements in a network. The controller generates a list of network elements to which the host has roamed, the list being sorted by time when the host is attached to a network element so that a most recent network element to which the host is attached is the root network element and at a head of the list. The controller updates the root network element in the list first for traffic flow associated with the host. The controller sends commands to the network elements to program a tunnel from each previous point of attachment network element in the list to the most recent root network element in the list in reverse order of the roaming path so as to route traffic for the host via a tunnel.
Abstract:
Techniques whereby a LAN-side border router observes all packets of an application flow from both directions so that the application recognition performed on the LAN-side border router functions properly. A border router may implement flags in a flow cache to indicate whether the border router is the LAN-side border router and/or a WAN-side border router for an application flow. As packets are received at a border router at either the LAN interface or WAN interface, the flags associated with packet's application flows are examined to determine if the border router is the LAN-side border router for the application flow. If so, then application recognition and routing control may be performed. If not, the packet may be redirected to another border router that may be the LAN-side border router or the WAN-side border router for the application flow to insure that border router observes the packet.
Abstract:
Methods and network devices are disclosed for multicast traffic steering in a communications network. In one embodiment, a method includes generating a first tree connecting a source node for a multicast flow through a communications network to each of multiple destination nodes for the multicast flow. The communications network is configured to forward a multicast message based on bit values in a message bit array carried by the message, and the first tree comprises a first set of unicast paths from the source node to the destination nodes. The method further includes allocating a first tree identifier to the first tree and communicating the first tree identifier and associated forwarding information to each of multiple forwarding nodes within the communications network. An embodiment of a network device includes a processor operably coupled to one or more network interfaces and adapted to perform steps of the method.
Abstract:
A software defined network controller detects when a host has moved between network elements in a network. The controller generates a list of network elements to which the host has roamed, the list being sorted by time when the host is attached to a network element so that a most recent network element to which the host is attached is the root network element and at a head of the list. The controller updates the root network element in the list first for traffic flow associated with the host. The controller sends commands to the network elements to program a tunnel from each previous point of attachment network element in the list to the most recent root network element in the list in reverse order of the roaming path so as to route traffic for the host via a tunnel.
Abstract:
Methods and network devices are disclosed for multicast traffic steering in a communications network. In one embodiment, a method includes receiving, at a node in a network, a multicast message comprising an incoming message bit array and a tree identifier value. The embodiment further includes selecting a bit indexed forwarding table stored at the node and corresponding to the tree identifier value, accessing within the selected forwarding table an entry corresponding to an intended destination node for the message, and forwarding, to a neighboring node identified in the accessed entry, a copy of the message comprising a forwarded message bit array in place of the incoming message bit array. An embodiment of a network device includes one or more network interfaces and a processor adapted to perform steps of the method.