摘要:
The devices, systems, and methods test network connectivity, where the physical network is used to provide one or more service chains connecting service appliances, including firewalls, intrusion detection systems, load balancers, network address translators, web servers, and so on. A service chain may involve multiple routing paths. The devices, systems, and methods test network connectivity test network connectivity by injecting customized echo request packets on each routing path and collecting customized echo reply packets in response. The customized echo reply packets are processed and aggregated to isolate network connectivity problems.
摘要:
A controller and method for fault detection is provided in network cloud environments is provided. The controller may transmit a request to activate at least two scout functions at deployment locations in the network cloud environment, each scout function operable to execute one or more evaluation operations to collect and report evaluation information relating to its corresponding deployment location. The controller may receive at least one evaluation report comprising an evaluation of computational or communication resource availability at the deployment locations.
摘要:
Aspects of the invention pertain to methods and devices that allow user equipment (UE), such as for example wireless devices, to reconfigure their respective antennas in a dynamic manner to allow connection to additional or fewer logical networks, also being referred to as network slices. Changing the configuration of the array of antennas may include changing an existing configuration, or allocation, of the antennas that are currently communicating with a first number of logical networks into a different configuration of antennas for communicating with a second, different second number of logical networks. In some cases this may mean that antennas that were allocated for communicating with a primary logical network are re-allocated for communicating with a second logical network, with other antennas remaining in communication with the primary logical network.
摘要:
A controller and method for fault detection is provided in network cloud environments is provided. The controller may transmit a request to activate at least two scout functions at deployment locations in the network cloud environment, each scout function operable to execute one or more evaluation operations to collect and report evaluation information relating to its corresponding deployment location. The controller may receive at least one evaluation report comprising an evaluation of computational or communication resource availability at the deployment locations.
摘要:
Routers using virtual routing and forwarding nodes to implement a service fabric of service chains. The router may configure M+1 virtual routing and forwarding instances, M being an integer representing a number of a plurality of service appliances in a data center network. Each virtual routing and forwarding instance may be associated with a routing table of routing rules to define various service chain routing paths. The routing rules are based on destination addresses in data packets.
摘要:
There is provided a Radio Frequency Identification tag that is sensitive to stress induced in a component to which the tag is coupled. In some embodiments, the RFID tag includes an electrically conductive loop that it configured to retain the RFID tag in a first operational state and upon breakage of the electrically conductive loop the RFID tag changes into a second operational state. By adhering the stress sensitive RFID tag to a particular component or location thereon, the operation state change of the RFID tag can be indicative of a the particular component reaching a known physical change. Moreover, a change in the operational state of the RFID tag can be detected by an appropriate RFID detector or scanner without the need for visual inspection, and thus provides evaluation of components that are positioned in hard to reach locations or hidden behind one or more coverings.
摘要:
A method and apparatus for instantiating network slices using connectivity and computing resources, is provided. Information regarding connectivity and computing resources for supporting network slices is used to identify shared risk groups. Each shared risk group includes those resources expected to be disabled by a common failure event. A first set of functions, such as virtual network functions, belonging to a network slice, is instantiated on a first subset of the resources. The union of all shared risk groups which include at least one of the first subset of resources is disjoint from the union of all shared risk groups which include at least one of a second subset of resources. The second subset of resources is allocated for instantiating a second set of functions which are redundant with the first set of functions. As such, redundant network slices and/or functions thereof can be provided which are robust to failure.
摘要:
Forwarding state is installed for sparse multicast trees in a link state protocol controlled Ethernet network by enabling intermediate nodes to install state for one or more physical multicast trees, each of which may have multiple logical multicast trees mapped to it. By mapping multiple logical multicasts to a particular physical multicast, and installing state for the physical multicast, fewer FIB entries are required to implement the multiple multicasts. Mapping may be performed by destination nodes before advertising membership in the physical multicast, or may be performed by the intermediate nodes before installing state when a destination node advertises membership in a logical multicast. Intermediate nodes will install state for the physical multicast tree if they are on a shortest path between a source and at least one destination of one of the logical multicasts that has been mapped to the physical multicast.
摘要:
Routes may be installed across multiple link state protocol controlled Ethernet network areas by causing ABBs to leak I-SID information advertised by BEBs in a L1 network area into an L2 network area. ABBs will only leak I-SIDs for BEBs where it is the closest ABB for that BEB. Where another ABB on the L2 network also leaks the same I-SID into the L2 network area from another L1 network area, the I-SID is of multi-area interest. ABBs will advertise I-SIDs that are common to the L1 and L2 networks back into their respective L1 network. Within each L1 and L2 network area, forwarding state will be installed between network elements advertising common interest in an ISID, so that multi-area paths may be created to span the L1/L2/L1 network areas. The L1/L2/L1 network structure may recurse an arbitrary number of times.
摘要:
An apparatus comprising a node that uses a set of determined virtual local area network (VLAN) identifier (VIDs) to provide a hop limit for a packet forwarded by the node in a network. Also disclosed is a network component comprising a receiver that receives a packet comprising a VID that belongs to a determined set of ordered VIDs, a processor that substitutes the VID in the packet from the set of ordered VIDs and maps the VID to a next hop or instead drops the VID if the VID is a last ordered VID of the ordered VIDs, and a transmitter that forwards the packet comprising the substituted VID to the mapped next hop.