Abstract:
A router (e.g., a home agent for an IPv6 mobile router) is configured for determining a destination router (e.g., the IPv6 mobile router) for a received packet based on accessing a routing table having multiple routing entries, each routing entry including a routing key and a routing field that specifies one of a prescribed address specifying the destination router and a computation tag. The computation tag specifies a prescribed function to be executed to calculate a determined address for the destination router (e.g., the home address for the lPv6 mobile router). The router identifies, for each received packet, the matching routing entry based on the corresponding routing key, and in response to detecting the computation tag in the routing field, selectively executes the corresponding function to calculate the determined address for the destination router.
Abstract:
In one embodiment, a method comprises receiving by an agent a request from a network node for generation of a secure IPv6 address for use by the network node, the request including a selected subset of parameters selected by the network node and required for generation of the secure IPv6 address according to a prescribed secure address generation procedure, the selected subset including at least a public key owned by the network node; dynamically generating by the agent at least a second of the parameters required for generation of the secure IPv6 address; generating by the agent the secure IPv6 address based on the selected subset and the second of the parameters required for generation of the secure IPv6 address; and outputting, to the network node, an acknowledgement to the request and that includes the secure IPv6 address, and the parameters required for generation of the secure IPv6 address.
Abstract:
A network includes network nodes (12a and 12b) and a gateway (20). Each network node (12a) has a corresponding unique in-site Ipv6 address (16a) for communication with the site (14), each in-site address having a first Ipv6 address prefix that is not advertised outside the site. Network nodes can obtain from within the site a unique extra-site Ipv6 address for mobile or extra-site communications (26a). The extra-site Ipv6 address has a second Ipv6 address prefix, distinct from the first Ipv6 address prefix, advertised by the gateway (20) to the prescribed site (14) and the wide area network (22). The gateway establishes a tunnel (24) to each in-site node (12a) using extra-site and in-site Ipv6 addresses a binding cache entry specifying the addresses.
Abstract:
A network includes network nodes (12a and 12b) and a gateway (20). Each network node (12a) has a corresponding unique in-site Ipv6 address (16a) for communication with the site (14), each in-site address having a first Ipv6 address prefix that is not advertised outside the site. Network nodes can obtain from within the site a unique extra-site Ipv6 address for mobile or extra-site communications (26a). The extra-site Ipv6 address has a second Ipv6 address prefix, distinct from the first Ipv6 address prefix, advertised by the gateway (20) to the prescribed site (14) and the wide area network (22). The gateway establishes a tunnel (24) to each in-site node (12a) using extra-site and in-site Ipv6 addresses a binding cache entry specifying the addresses.
Abstract:
In one embodiment, a method comprises creating, in a computing network, a loop-free routing topology comprising a plurality of routing arcs for reaching a destination device, each routing arc comprising a first network device as a first end of the routing arc, a second network device as a second end of the routing arc, and at least a third network device configured for routing any network traffic along the routing arc toward the destination device via any one of the first or second ends of the routing arc; and causing the network traffic to be forwarded along at least one of the routing arcs to the destination device.
Abstract:
Mobile routers in a tree-based network topology with a single clusterhead in an ad hoc network establish connectivity based on each attached mobile router sending a neighbor advertisement message to an attachment mobile router via a corresponding egress interface. Any neighbor advertisement message received by a mobile router is used to identify specified network prefixes that are reachable via the source of the neighbor advertisement message. Each attached mobile router outputs to its attachment router another neighbor advertisement message that specifies the network prefix used by the mobile router, and the specified network prefixes from its attached mobile routers. The mobile router also identifies peer mobile routers having the same depth, and selectively shares limited routing information with the peer routers, enabling the mobile router to bypass the clusterhead and reach remote prefixes via the peer routers without burdening the tree.
Abstract:
A router is configured for sharing routing rules with other routers, the routing rules defining aggregated routes according to a prescribed topology. Each routing rule, used by the router for routing a packet having a corresponding matching destination address prefix, specifies a corresponding address prefix pattern rule for extracting an identified pattern from a portion of the destination address, and a gateway address pattern rule for generating a gateway address, for a gateway providing reachability to the destination address, based on applying the identified pattern to a specified portion of the gateway address. The router generates a routing update message that describes the address prefix pattern rule and the gateway address pattern rule, and outputs the routing update message to a second router according to a prescribed distance vector routing protocol (e.g., Multiprotocol Extension for Border Gateway Protocol).
Abstract:
In one embodiment, a method comprises receiving, by a router in a network, a router advertisement message on a network link of the network; detecting within the router advertisement message, by the router, an advertised address prefix and an identified router having transmitted the router advertisement message within the network; determining, by the router, whether the identified router is authorized to at least one of advertise itself as a router, or advertise the advertised address prefix on the network link; and selecitvely initiating, by the router, a defensive operation against the identified router based on the router determining the identified router is not authorized to advertise itself as a router, or advertise the advertised address prefix on the network link.
Abstract:
In one embodiment, a method includes receiving, by an access router, an Internet Protocol version 6 (IPv6) packet that specifies a request for executing a preemptive service for data packets specifying a prescribed flow label field value identified in the request. The method further includes attempting authentication of the request by the access router based on a prescribed secure authentication protocol. The method further includes implementing the preemptive service by the access router based on the authentication of the request, including passing any IPv6 data packet received from a host node and having an IPv6 header specifying the prescribed flow label field value and satisfying a prescribed security condition, and limiting transfer of any data packet that does not specify the prescribed flow label field value or satisfy the prescribed security condition.
Abstract:
In one embodiment, a method includes receiving, by an access router, an Internet Protocol version 6 (IPv6) packet that specifies a request for executing a preemptive service for data packets specifying a prescribed flow label field value identified in the request. The method further includes attempting authentication of the request by the access router based on a prescribed secure authentication protocol. The method further includes implementing the preemptive service by the access router based on the authentication of the request, including passing any IPv6 data packet received from a host node and having an IPv6 header specifying the prescribed flow label field value and satisfying a prescribed security condition, and limiting transfer of any data packet that does not specify the prescribed flow label field value or satisfy the prescribed security condition.