Abstract:
In example implementations, a method includes a software defined network (SDN) controller that selects an encryption key. The SDN controller then sends a first instruction to a source node to modify a flow table of the source node to include an action that includes the encryption key. A second instruction is sent by the SDN controller to a destination node to modify a flow table of the destination node to include an action that includes the encryption key. The SDN controller can then control a data packet that is encrypted by the source node with the encryption key to be sent from the source node to the destination node, wherein the data packet is to be decrypted with the encryption key by the destination node.
Abstract:
Example implementations relate to a networking device. For example, an implementation may receive a data processing packet identified as belonging to a processing virtual local area network. The networking device may execute an instruction associated with the data processing packet on data associated with the data processing packet and store resultant data in the payload of the data processing packet. The networking device may route the data processing packet with resultant data stored in the payload to a next device.
Abstract:
In some examples, a network switch includes an Application-Specific Integrated Circuit (ASIC), a processing resource, and a memory resource storing machine readable instructions. The instructions are to cause the processing resource to: accumulate an action set for a first packet received by the switch; fetch an action from the action set; determine, with the ASIC, whether the fetched action is to be performed immediately on the first packet; in response to determining that the fetched action is to be performed immediately, generate a second packet from the first packet; and output one of the first and second packets through an output port without further processing of the packet after generation of the second packet.
Abstract:
Examples herein disclose a processor to receive a list of switching events. The list of switching events is internal to a networking device and capable of detection by a programmable engine. The processor subscribes to a subset of the switching events based on a selection from the list of switching events.
Abstract:
According to an example, an amount of data traffic of a data producer is determined for a given duration of time. An indicator of a load level is determined for a data analysis resource. A sampling rate is determined from the indicator and the amount of traffic, for use in forwarding data of the data traffic to the data analysis resource.