-
公开(公告)号:US20160352617A1
公开(公告)日:2016-12-01
申请号:US14721828
申请日:2015-05-26
Applicant: CISCO TECHNOLOGY, INC.
Inventor: Peng Wang , Jeffrey Cai , Bo Sun , Yu Jiang
IPC: H04L12/707 , H04L12/26 , H04L29/12
CPC classification number: H04L45/22 , H04L43/0817 , H04L43/10 , H04L61/103 , H04L61/2084
Abstract: In one embodiment, a method includes identifying at a first edge device, a failure at a second edge device, the first and second edge devices located in a local network site in communication with remote network sites in an overlay network, changing a state of a routing locator address at the first edge device from down to up in response to the failure at the second edge device, the routing locator address initially associated with the second edge device, and advertising the routing locator address at the first edge device in an underlay network so that packets from the remote network sites are forwarded to the first edge device upon convergence in the underlay network. An apparatus and logic are also disclosed herein.
Abstract translation: 在一个实施例中,一种方法包括在第一边缘设备处识别在第二边缘设备处的故障,位于与覆盖网络中的远程网络站点通信的本地网络站点中的第一和第二边缘设备, 响应于第二边缘设备的故障,最初与第二边缘设备相关联的路由定位器地址,以及在底层网络中的第一边缘设备处的路由定位器地址进行通告,在第一边缘设备处的路由定位器地址从下到上 使得当在底层网络中收敛时,来自远程网站的分组被转发到第一边缘设备。 本文还公开了一种装置和逻辑。
-
2.
公开(公告)号:US11777966B2
公开(公告)日:2023-10-03
申请号:US16693884
申请日:2019-11-25
Applicant: Cisco Technology, Inc.
Inventor: Yu Jiang , Saravanan Radhakrishnan , Jeffrey Cai , Yuefeng Jiang
IPC: H04L9/40 , H04L43/087 , H04L43/16 , H04L43/0829
CPC classification number: H04L63/1425 , H04L43/087 , H04L43/0829 , H04L43/16 , H04L63/1416 , H04L63/1433 , H04L63/20
Abstract: Systems and methods for causation analysis of network anomalies in a network include detecting an alarm condition at a network device, the alarm condition pertaining to an anomaly or increase in a traffic condition such as packet loss. A dominant key is identified in each of one or more key types which contributed to the alarm condition, the key types including dimensions of traffic flow. Two or more dominant keys of two or more key types are aggregated and clustered to determine a combination of dominant keys which contributed to the alarm condition. A dominant traffic flow comprising the combination of dominant keys which contributed to the alarm condition is identified based on the aggregation and clustering. Malware or security threats can be identified from detecting a dominant source IP address or host which contributed to a predominant number of packet drops or retransmissions at ports of the network.
-
3.
公开(公告)号:US20210160263A1
公开(公告)日:2021-05-27
申请号:US16693884
申请日:2019-11-25
Applicant: Cisco Technology, Inc.
Inventor: Yu Jiang , Saravanan Radhakrishnan , Jeffrey Cai , Yuefeng Jiang
Abstract: Systems and methods for causation analysis of network anomalies in a network include detecting an alarm condition at a network device, the alarm condition pertaining to an anomaly or increase in a traffic condition such as packet loss. A dominant key is identified in each of one or more key types which contributed to the alarm condition, the key types including dimensions of traffic flow. Two or more dominant keys of two or more key types are aggregated and clustered to determine a combination of dominant keys which contributed to the alarm condition. A dominant traffic flow comprising the combination of dominant keys which contributed to the alarm condition is identified based on the aggregation and clustering. Malware or security threats can be identified from detecting a dominant source IP address or host which contributed to a predominant number of packet drops or retransmissions at ports of the network.
-
公开(公告)号:US09929941B2
公开(公告)日:2018-03-27
申请号:US14721828
申请日:2015-05-26
Applicant: CISCO TECHNOLOGY, INC.
Inventor: Peng Wang , Jeffrey Cai , Bo Sun , Yu Jiang
IPC: H04L12/50 , H04L12/707 , H04L12/26 , H04L29/12
CPC classification number: H04L45/22 , H04L43/0817 , H04L43/10 , H04L61/103 , H04L61/2084
Abstract: In one embodiment, a method includes identifying at a first edge device, a failure at a second edge device, the first and second edge devices located in a local network site in communication with remote network sites in an overlay network, changing a state of a routing locator address at the first edge device from down to up in response to the failure at the second edge device, the routing locator address initially associated with the second edge device, and advertising the routing locator address at the first edge device in an underlay network so that packets from the remote network sites are forwarded to the first edge device upon convergence in the underlay network. An apparatus and logic are also disclosed herein.
-
5.
公开(公告)号:US20140317256A1
公开(公告)日:2014-10-23
申请号:US13865240
申请日:2013-04-18
Applicant: CISCO TECHNOLOGY, INC.
Inventor: Yu Jiang , Jerry Ziyi Lu , Jeffrey Cai , Kevin Fang
IPC: H04L12/751
Abstract: A controller, e.g., a software-defined network (SDN) controller, stores data representing a topology of a network that includes a plurality of network elements. A move is detected of a host between network elements in the network and a destination network element to which the host has moved is determined. The destination network element is designated as a root of a tree in the network. A topology for the tree is generated using the destination network element as the root of the tree. Following the topology of the tree, starting with the root, parent network elements in the tree are updated for a traffic flow for the host before child network elements are updated.
Abstract translation: 诸如软件定义网络(SDN)控制器的控制器存储表示包括多个网络元件的网络拓扑的数据。 检测到网络中的网络元件之间的主机和主机已经移动到的目的地网络元件的移动。 目标网元被指定为网络中树的根。 使用目标网络元素作为树的根生成树的拓扑。 根据树的拓扑结构,从根开始,在子网络元素更新之前,树中的父网络元素针对主机的流量进行更新。
-
-
-
-