摘要:
Techniques and architecture are described grouping various sources of traffic within a network into grouping fields and assigning each combination of grouping field values an aggregate identification (ID). A first hop edge router may receive a packet and search a mapping table for a corresponding aggregate ID for the combination of grouping field values within the mapping table. If not found, the first hop edge router may assign a corresponding aggregate ID for the combination of grouping field values and store the new aggregate ID for the combination of grouping field values in the mapping table. The first hop edge router may forward the packet on through the network with the aggregate ID embedded in metadata. Routers within the network may measure and aggregate flow metrics of the packet within the network based on the aggregate ID and provide the measurements to the network controller.
摘要:
According to an embodiment, a node comprises one or more processors operable to execute instructions to cause the node to perform operations that comprise receiving a packet from a first node associated with an SD-WAN domain. The packet comprises a header indicating a TLOC associated with a second node to send the packet, the second node associated with an SR domain. The operations comprise determining that the TLOC corresponds to a virtual TLOC used in the SD-WAN domain to identify the second node that is in the SR domain and, in response, determining a second node identifier used in the SR domain to identify the second node. The operations further comprise preparing the packet to be communicated via the SR domain. Preparing the packet comprises including the second node identifier in the packet. The operations further comprise sending the packet comprising the second node identifier to the second node.
摘要:
In one embodiment, a method includes receiving, by a network orchestrator, trace parameters from a user device. The method also includes determining, by the network orchestrator, to initiate a network path trace for the application, generating, by the network orchestrator, a filter policy for the network path trace using the trace parameters, and allocating, by the network orchestrator, a trace identification to the network path trace. The method also includes initiating, by the network orchestrator, the network path trace within a network by communicating the filter policy and the trace identification to a first node of the network and receiving, by the network orchestrator, network path trace data from a plurality of nodes of the network. The method further includes generating, by the network orchestrator, a trace report for the application using the network path trace data.
摘要:
In one embodiment, a method includes determining, by a first network component, a sender shaper drop value based on the following: a maximum sequence number; a minimum sequence number; and a sender sequence counter number associated with the first network component. The method also includes determining, by the first network component, a wide area network (WAN) link drop value based on the sender sequence counter number associated with the first network component and a receiver sequence counter number associated with a second network component. The method further includes determining, by the first network component, whether to adjust a sender shaper rate based on the sender shaper drop value and the WAN link drop value.
摘要:
Methods and network devices are disclosed for multicast traffic steering in a communications network. In one embodiment, a method includes generating a first tree connecting a source node for a multicast flow through a communications network to each of multiple destination nodes for the multicast flow. The communications network is configured to forward a multicast message based on bit values in a message bit array carried by the message, and the first tree comprises a first set of unicast paths from the source node to the destination nodes. The method further includes allocating a first tree identifier to the first tree and communicating the first tree identifier and associated forwarding information to each of multiple forwarding nodes within the communications network. An embodiment of a network device includes a processor operably coupled to one or more network interfaces and adapted to perform steps of the method.
摘要:
In one embodiment, a method includes determining, by a first network component, a sender shaper drop value based on the following: a maximum sequence number; a minimum sequence number; and a sender sequence counter number associated with the first network component. The method also includes determining, by the first network component, a wide area network (WAN) link drop value based on the sender sequence counter number associated with the first network component and a receiver sequence counter number associated with a second network component. The method further includes determining, by the first network component, whether to adjust a sender shaper rate based on the sender shaper drop value and the WAN link drop value.
摘要:
In one embodiment, a method includes determining, by a first network component, a sender shaper drop value based on the following: a maximum sequence number; a minimum sequence number; and a sender sequence counter number associated with the first network component. The method also includes determining, by the first network component, a wide area network (WAN) link drop value based on the sender sequence counter number associated with the first network component and a receiver sequence counter number associated with a second network component. The method further includes determining, by the first network component, whether to adjust a sender shaper rate based on the sender shaper drop value and the WAN link drop value.
摘要:
In one embodiment, a method includes receiving, by a network orchestrator, trace parameters from a user device. The method also includes determining, by the network orchestrator, to initiate a network path trace for the application, generating, by the network orchestrator, a filter policy for the network path trace using the trace parameters, and allocating, by the network orchestrator, a trace identification to the network path trace. The method also includes initiating, by the network orchestrator, the network path trace within a network by communicating the filter policy and the trace identification to a first node of the network and receiving, by the network orchestrator, network path trace data from a plurality of nodes of the network. The method further includes generating, by the network orchestrator, a trace report for the application using the network path trace data.
摘要:
In an example, a server architecture is described for a dynamic cascaded node chain providing a resource cluster. The cascaded node chain may include one or more resource instances provisioned as a head node, zero or more middle nodes, and a tail node. Each node may include a discrete number of available resource entries in a flow table. As traffic enters the head node, each node attempts to match the traffic to an entry in its flow table. If no match is found, the packet is downlinked to the next node in the chain. If the packet reaches the tail node without a match, it is punted to the controller. The controller may then provision a matching entry if an entry is available. If not, the controller may spawn a new resource instance. When the full capacity of the cluster is reached, non-matching entries may be dropped.
摘要:
In response to receiving one or more packets from an interface, an anchoring border router classifies the traffic flow and either transmits the packets based upon the routing control table as usual, or determines that the packets of the traffic flow are to be forwarded to a forwarding border router. Upon determining that the packets are to be forwarded, the packets are encapsulated with a routing encapsulation key corresponding to a routing path and are forwarded from the anchoring border router to the forwarding border router via a routing encapsulation tunnel. When a forwarding border router receives the redirected packets over the routing encapsulation tunnel, the forwarding border router removes the routing encapsulation key from the packets of the traffic flow and transmits the packets via a routing path corresponding to the routing encapsulation key.