Abstract:
Systems, methods, apparatus, and a computer-readable medium are described for generating and receiving information regarding the current state of the active virtual machine in the host and switching the standby virtual machine from standby to active in response to determining that the current active virtual machine may no longer be able to service network packets.
Abstract:
A network device may include various cards and modules, such as management modules, line cards, and switch fabric modules. In various implementations, these components can be "hot-plugged" meaning that the components can be inserted into and removed from the network device while the network device is powered on. In various implementations, hardware in the network device can identify when a component has been added. The hardware can notify a virtual machine, which can then notify the host operating system. The host operating system can added the component, and then notify the virtual machine to also add the component. Once the virtual machine has added the component, the component becomes available for use by processes executing on the virtual machine.
Abstract:
One embodiment of the present invention provides a switch. The switch includes a storage device, one or more line cards, and a control card. A respective line card includes one or more ports and forwarding hardware. The control card determines routing and forwarding tables for the switch, and comprises processing circuitry and a management module. The management module manage a tunnel or virtual network at the switch. During operation, the control card determine an event associated with layer-2 operations of the switch. The control card refrains from notifying the management module regarding the event and notifies a first line card in the one or more line cards regarding the event. The first line card then updates a layer-3 forwarding entry in the corresponding forwarding hardware based on the notification.
Abstract:
Techniques for performing anomaly detection and prediction in a packet broker of a visibility network are provided. According to one embodiment, the packet broker can apply one or more machine learning models to network traffic that is replicated from a core network. The packet broker can further detect or predict, based on the application of the one or more machine learning models, the occurrence of a network traffic anomaly in the core network. The packet broker can then take one or more predefined actions in response to the detection/prediction of the anomaly.
Abstract:
A communication framework is provided that can be configured to control or limit a network controller's ability to communicate, export, or share the network controller's data with others, such as with other network controllers in the network environment. As part of this framework, techniques are provided that enable constraints to be specified for a particular network controller, where the constraints control and limit the data that is permitted to be communicated from the particular network controller to other network controllers or intended data recipients in the network environment.
Abstract:
An ABR-UE and Wi-Fi AP that connects with all P-GWs with APNs along a flight path and obtains an IP address from each one. When a user wishes to make a connection through the ABR-UE and Wi-Fi AP, the ABR-UE and Wi-Fi AP determines the closest P-GW and uses an IP address from that P-GW to NAT with a local IP address of the user's device so that communications then go through that nearest P-GW. The selected P-GW changes as the airplane flies and time elapses, the ABR-UE and Wi-Fi AP using the closest P-GW for any new connections.
Abstract:
Techniques for performing distributed provisioning of packet classification rules in an extended bridge are provided. According to one embodiment, a controlling bridge (CB) of the extended bridge can receive a command to create or delete a packet classification rule for one or more virtual ports of the extended bridge. The CB can further determine a port extender (PE) of the extended bridge that hosts one or more physical ports corresponding to the one or more virtual ports. The CB can then transmit a message to the PE with instructions for creating or deleting the packet classification rule in a ternary content addressable memory (TCAM) of the PE.
Abstract:
Techniques implementing redundancy in an extended bridge comprising a controller bridge (CB) unit and a plurality of port extender (PE) units are provided. In one embodiment, the CB unit can receive join requests from the plurality of PE units and can determine, based on the join requests, whether the plurality of PE units are physically connected to the CB unit and/or other CB units in the extended bridge according to a ring topology. If the plurality of PE units are physically connected to the CB unit or the other CB units according to a ring topology, the CB unit can select a link in the ring topology as being a standby link.
Abstract:
One embodiment of the present invention provides a switch. The switch includes a virtual local area network (VLAN) configuration module. During operation, the VLAN configuration module maps local resources of the switch and/or locally coupled end device information to a global VLAN identifier, wherein the global VLAN is persistent across a fabric switch. The fabric switch is operable to accommodate a plurality of switches and operates as a single logical switch.
Abstract:
Certain embodiments enable resources assigned or allocated to an operating virtual machine (VM) to be modified while the VM is operating and without having to stop, restart, or reboot the VM. The modification may correspond to increasing or decreasing the amount of a resource being assigned to the VM. In this manner, resources assigned to a VM at the time of creation of the VM are not static and can instead be dynamically changed while the VM is operating without having to stop, reboot, or restart the VM. In some embodiments, the changes to the resources allocated to one or more VMs provided for a user (e.g., a customer) may be made according to or in response to a Service Level Agreement (SLA) entered into by the user, in response to an event such as a failover or switchover event, and the like.