Russ White, Ph.D.

Russ White, Ph.D.

Louisville, Tennessee, United States
26K followers 500+ connections

About

I build networking technology and networks. In the last 25 years, I've built, broken, and…

Articles by Russ

See all articles

Activity

Join now to see all activity

Experience

Education

Licenses & Certifications

Volunteer Experience

  • Member, Technical Steering Commitee

    FR Routing

    - Present 6 years 10 months

  • Internet Engineering Task Force Graphic

    Routing Area Directorate

    Internet Engineering Task Force

    - Present 14 years 3 months

    Science and Technology

    Provide leadership and review in all areas of IETF routing area work.

  • Internet Engineering Task Force Graphic

    Co-Chair, BABEL Working Group

    Internet Engineering Task Force

    - Present 8 years 4 months

    Science and Technology

  • Internet Engineering Task Force Graphic

    Co-Chair, I2RS Working Group

    Internet Engineering Task Force

    - Present 8 years 3 months

    Science and Technology

  • Internet Engineering Task Force Graphic

    Internet Architecture Board

    Internet Engineering Task Force

    - Present 3 years 8 months

    Science and Technology

    Provide technical input into the architecture of Internet Standards. Work with liaisons to other standards bodies impacting the global Internet and computer networks.

  • Board Member

    Linux Foundation (Networking)

    - 1 year 1 month

  • Shepherds Theological Seminary Graphic

    Technical Advisor, Guest Lecturer

    Shepherds Theological Seminary

    - 10 years 2 months

    Education

    Provide technical advice on audio/visual, computer, and other support as needed; lecture on privacy issues.

  • Internet Society Graphic

    Organizational Advisory Council CoChair

    Internet Society

    - 2 years 7 months

    Science and Technology

  • High School Teacher

    SEEK Homeschool Co-op

    - 8 years 10 months

    Education

    Develop and deliver high school level curriculum. Taught courses in networking technology, history of philosophy, and worldview.

  • Capella University Graphic

    Member of the Information Technology Advisory Board

    Capella University

    - 4 years 1 month

    Education

    Aid in the formation and content creation of the Master's programs in information technology at Capella University.

Publications

  • How the Internet Really Works

    Pearson IT

    Periodic live webinar on the basic components and organizations that make the Internet "go" and their business models. This four-hour training helps learners understand how providers, standards, and services are connected to build the Internet as we know it.

    See publication
  • Privacy for Network Engineers

    Pearson

    Live training on Person's platform about the importance and practice of privacy for network engineers.

  • Unintended Dystopia

    Wipf & Stock

    Social media, shopping experiences, and mapping programs might not seem like they have much in common, but they are all built on neurodigital media. What is neurodigital media? It lives at the intersection of the Californian Ideology, the digital computing revolution, network ecosystems, the nudge, and a naturalistic view of the person. The Californian Ideology holds individuals should be reshaped, naturalism says individuals may be reshaped, and digital computing provides the tools, through…

    Social media, shopping experiences, and mapping programs might not seem like they have much in common, but they are all built on neurodigital media. What is neurodigital media? It lives at the intersection of the Californian Ideology, the digital computing revolution, network ecosystems, the nudge, and a naturalistic view of the person. The Californian Ideology holds individuals should be reshaped, naturalism says individuals may be reshaped, and digital computing provides the tools, through network ecosystems theory and the nudge, that can reshape individuals. Th

    See publication
  • Effective Data Center Fabric Design

    Pearson

    Periodic training in the origin and design of spine and leaf fabrics for network engineers. A 3 hour course given using Pearson's training platform.

  • How the Internet Really Works 1 & 2

    Pearson IT

    Periodic training in the shape and operation of the global Internet. Each section is a 3 hour course given using Pearson's training platform. The first section covers the operation of DNS and routing, including the financial and other considerations for each entity. The second section covers the use of global, public, tools to discover information about autonomous systems, reachable destinations, domain names, reachable destinations, etc. The second section also considers various organizations…

    Periodic training in the shape and operation of the global Internet. Each section is a 3 hour course given using Pearson's training platform. The first section covers the operation of DNS and routing, including the financial and other considerations for each entity. The second section covers the use of global, public, tools to discover information about autonomous systems, reachable destinations, domain names, reachable destinations, etc. The second section also considers various organizations that set standards and control numbering for the global Internet.

  • Link State Protocols on Data Center Fabrics

    Internet Protocol Journal

    Many of the lessons we have learned in the global design space will be relearned in the data center space before the pendulum returns and widearea design comes back to the fore. In this issue, Russ White and Melchior Aelmans examine the use of link-state alternatives to the Border Gateway Protocol (BGP) in data center designs.

    Other authors
    See publication
  • Understanding Network Transports

    Pearson IT

    This video considers the engineering problems to solve when transporting data from one device to another over a network and the solutions available for those problems. The presentation follows the pattern of the Recursive InterNetworking Architecture, or RINA, model, in breaking the problems down into marshaling, multiplexing, error handling, and flow control.

    Other authors
    See publication
  • How Routers Really Work

    Pearson IT

    Periodic Live Training

    This training will peer into the internal components of a router, starting with an explanation of how a router switches packets. This walk through of a switching path, in turn, will be used as a foundation for explaining the components of a router, including the various tables used to build forwarding tables and the software components used to build these tables.

    See publication
  • Network Troubleshooting: Basic Theory and Process

    Pearson IT

    Periodic Live Training

    This training focuses on the half-split system of troubleshooting, which is widely used in the electronic and civil engineering domains. The importance of tracing the path of the signal, using models to put the system in context, and the use of a simple troubleshooting “loop” to focus on asking how, what, and why are added to the half-split method to create a complete theory of troubleshooting.

    See publication
  • Network Disaggregation Fundamentals LiveLessons

    Pearson IT

    Network Disaggregation Fundamentals LiveLessons aims to provide the foundational knowledge required for those interested in understanding the realm of disaggregated networking.

    Other authors
    See publication
  • Computer Networking Problems and Solutions: An innovative approach to building resilient, modern networks

    Addison-Wesley Professional

    Computer Networking Problems and Solutions offers a new approach to understanding networking that not only illuminates current systems but prepares readers for whatever comes next. This guide’s problem-solving approach reveals why modern computer networks and protocols are designed as they are, by explaining the problems any protocol or system must overcome, considering common solutions to those problems, and providing examples of these solutions as they've been implemented in protocols both…

    Computer Networking Problems and Solutions offers a new approach to understanding networking that not only illuminates current systems but prepares readers for whatever comes next. This guide’s problem-solving approach reveals why modern computer networks and protocols are designed as they are, by explaining the problems any protocol or system must overcome, considering common solutions to those problems, and providing examples of these solutions as they've been implemented in protocols both old and new.

    This book’s three sections each cover a different set of problems and solutions. Section I considers data transport (the data plane). Section II covers protocols used to discover and use topology and reachability information (the control plane). Section III considers some common network designs and architectures, including data center fabrics, MPLS cores, and modern Software-Defined Wide Area Networks (SD-WAN). The principles that underlie such technologies as Software Defined Networks (SDNs) are considered throughout the book, as solutions to the common problems faced by all networking technologies.

    Computer Networking Problems and Solutions is ideal for beginning network engineers, students just starting out in computer networks, and experienced engineers seeking a deeper understanding of the technologies they use every day. Whatever their background, it will help readers quickly recognize problem/solution patterns constantly encountered in computer networks, and quickly apply this knowledge with new protocols, solutions, systems, and network environments.

    Other authors
    See publication
  • Considering the Impact of Artificial Narrow Intelligence on Human Dignity

    Evangelical Theological Society, Southeast Regional Meeting

    A paper read at the ETS Southeastern Regional conference on Artificial Narrow Intelligence and Human Dignity; this is in the area of my current Dissertation work.

  • Nothing to Hide, Everything to Gain

    The IETF Journal

    Why should a provider—particularly a content provider—care about the open standards and open source communities? There is certainly a large set of reasons why edge-focused content providers shouldn’t care about the open communities. A common objection to working in the open communities often voiced by providers runs something like this: Isn’t the entire point of building a company around data—which ultimately means around a set of processing capabilities, including the network—to hide your path…

    Why should a provider—particularly a content provider—care about the open standards and open source communities? There is certainly a large set of reasons why edge-focused content providers shouldn’t care about the open communities. A common objection to working in the open communities often voiced by providers runs something like this: Isn’t the entire point of building a company around data—which ultimately means around a set of processing capabilities, including the network—to hide your path to success and ultimately to prevent others from treading the same path you’ve tread? Shouldn’t providers defend their intellectual property for all the same reasons as equipment vendors?

    Other authors
    See publication
  • Large-Scale Network Design LiveLessons

    Pearson IT

    Large Scale Network Design LiveLessons takes you through the concepts behind stable, scalable, elegant network design, including modularity, resilience, layering, and security principles. This livelesson will focus on traditional distributed link state, distance vector, and path vector routing protocols, as well as the basic principles of centralized control planes (such as OpenFlow). A special point will be made of sorting out the relationship between policy and reachability, and where they…

    Large Scale Network Design LiveLessons takes you through the concepts behind stable, scalable, elegant network design, including modularity, resilience, layering, and security principles. This livelesson will focus on traditional distributed link state, distance vector, and path vector routing protocols, as well as the basic principles of centralized control planes (such as OpenFlow). A special point will be made of sorting out the relationship between policy and reachability, and where they can best be managed in a large scale network.

    Other authors
    See publication
  • Cloudy-Eyed: Complexity and Reality with Software-Defined Networks

    Internet Protocol Journal

    S oftware-Defined Networks (SDN) are promoted as a way to eliminate the complexity of distributed control planes, increase network responsiveness to specific applications and business requirements, and reduce operational and equipment cost. If this description sounds like the classic “too good to be true” situation, that’s because it might just be. Just like you can’t build a database that has ideal consistency, accessibility, and partionability, you can’t build a cheap network with optimal…

    S oftware-Defined Networks (SDN) are promoted as a way to eliminate the complexity of distributed control planes, increase network responsiveness to specific applications and business requirements, and reduce operational and equipment cost. If this description sounds like the classic “too good to be true” situation, that’s because it might just be. Just like you can’t build a database that has ideal consistency, accessibility, and partionability, you can’t build a cheap network with optimal routing and minimal control plane state.

    Other authors
    See publication
  • A Framework for Defining Network Complexity

    IETF RFC 7980

    Complexity is a widely used parameter in network design, yet there is no generally accepted definition of the term. Complexity metrics exist in a wide range of research papers, but most of these address only a particular aspect of a network, for example, the complexity of a graph or software. While it may be impossible to define a metric for overall network complexity, there is a desire to better understand the complexity of a network as a whole, as deployed today to provide Internet…

    Complexity is a widely used parameter in network design, yet there is no generally accepted definition of the term. Complexity metrics exist in a wide range of research papers, but most of these address only a particular aspect of a network, for example, the complexity of a graph or software. While it may be impossible to define a metric for overall network complexity, there is a desire to better understand the complexity of a network as a whole, as deployed today to provide Internet services. This document provides a framework to guide research on the topic of network complexity as well as some practical examples for trade-offs in networking.

    This document summarizes the work of the IRTF's Network Complexity Research Group (NCRG) at the time of its closure. It does not present final results, but a snapshot of an ongoing activity, as a basis for future work.

    Other authors
    See publication
  • Unintended Features

    LeanPub

    So you’ve decided you want to be a network engineer—or you’re already you a network engineer, and you want to be a better engineer, to rise to the top, to be among the best, to… Well, you get the idea. The question is, how do you get from where you are now to where you want to be? This short volume is designed to answer just that question.

    Other authors
    See publication
  • Intermediate System to Intermediate System Livelesson

    Cisco Press

    In this video training, networking expert Russ White provides you with a detailed introduction to the IS-IS routing protocol. IS-IS is a widely deployed protocol used to provide routing information for IPv4 and IPv6 networks as well as MPLS label switching and many advanced functions. This video provides you with everything you need to know to get up and running with IS-IS, from the underlying history to configuration and troubleshooting a wide variety of features.

    See publication
  • Navigating Network Complexity: Next-generation routing with SDN, service virtualization, and service chaining

    Addison-Wesley Professional

    Navigating Network Complexity is the first comprehensive guide to managing the deployment and operational complexity associated with today's large scale networks. From start to finish, Navigating Network Complexity helps network professionals get past the hype associated with SDN, NFV, and other new control planes, assess their true impact, and gain more of their benefits with fewer problems.

    Other authors
    See publication
  • EVPN Introduction & Use-Cases with Russ White + Jeff Tantsura

    Packetpushers

    Our Discussion:
    What is EVPN?
    How is EVPN different from L2VPN services like EoMPLS or VPLS?
    How does EVPN work?
    What are the technical advantages of EVPN?
    What are the EVPN use-cases & benefits for the service provider?
    What about for the end customer?
    How far along in the IETF process has EVPN gotten?
    What vendors are showing support for EVPN? Are there any commercial products yet?
    Does an end user have to do anything special to…

    Our Discussion:
    What is EVPN?
    How is EVPN different from L2VPN services like EoMPLS or VPLS?
    How does EVPN work?
    What are the technical advantages of EVPN?
    What are the EVPN use-cases & benefits for the service provider?
    What about for the end customer?
    How far along in the IETF process has EVPN gotten?
    What vendors are showing support for EVPN? Are there any commercial products yet?
    Does an end user have to do anything special to support EVPN on their network? Or is it invisible to them like most service provider handoffs?
    How does EVPN relate to existing data center fabrics?

    Other authors
    See publication
  • The Art of Network Architecture

    Cisco Press

    The Art of Network Architecture is the first book that places business needs and capabilities at the center of the process of architecting and evolving networks. Two leading enterprise network architects help you craft solutions that are fully aligned with business strategy, smoothly accommodate change, and maximize future flexibility.

    Other authors
    See publication
  • Link-State Protocols in Data Center Networks

    Internet Protocol Journal

    This article examines three extensions to the Open Shortest Path First (OSPF) protocol that did not originate in the data center field but have direct applicability to efficient and scalable network operation in highly meshed environments. Specifically, the application extensions to OSPF to reduce flooding in Mobile Ad Hoc Networks (MANET) [1], demand circuits designed to support on-demand links in wide-area networks [2], and OSPF stub router advertisements designed to support large-scale hub…

    This article examines three extensions to the Open Shortest Path First (OSPF) protocol that did not originate in the data center field but have direct applicability to efficient and scalable network operation in highly meshed environments. Specifically, the application extensions to OSPF to reduce flooding in Mobile Ad Hoc Networks (MANET) [1], demand circuits designed to support on-demand links in wide-area networks [2], and OSPF stub router advertisements designed to support large-scale hub and spoke networks [3] are considered in a typical data center network design to show how these sorts of protocol improvements could affect the scaling of data center environments.

    Other authors
    See publication
  • OSPF Stub Router Advertisement

    IETF RFC 6987

    This memo describes a backward-compatible technique that may be used by OSPF (Open Shortest Path First) implementations to advertise unavailability to forward transit traffic or to lower the preference level for the paths through such a router. In some cases, it is desirable not to route transit traffic via a specific OSPF router. However, OSPF does not specify a standard way to accomplish this.

    Other authors
    See publication
  • Use Cases and Interpretations of Resource Public Key Infrastructure (RPKI) Objects for Issuers and Relying Parties

    IETF RFC 6907

    This document describes a number of use cases together with directions and interpretations for organizations and relying parties when creating or encountering Resource Public Key Infrastructure (RPKI) object scenarios in the public RPKI. All of these items are discussed here in relation to the Internet routing system.

    Other authors
    See publication
  • Open EIGRP

    IETF RFC7868

    Protocol design and architecture for Enhanced Interior Gateway Routing Protocol (EIGRP). EIGRP is a routing protocol based on Distance Vector technology. The specific algorithm used is called DUAL, a Diffusing UPDATE Algorithm. The algorithm and procedures were researched, developed, and simulated by SRI International.

    Other authors
    See publication
  • Issues with Existing Cryptographic Protection Methods for Routing Protocols

    IETF RFC 6039

    Routing protocols have been extended over time to use cryptographic mechanisms to ensure that data received from a neighboring router has not been modified in transit and actually originated from an authorized neighboring router. The cryptographic mechanisms defined to date and described in this document rely on a digest produced with a hash algorithm applied to the payload encapsulated in the routing protocol packet. This document outlines some of the limitations of the current mechanism…

    Routing protocols have been extended over time to use cryptographic mechanisms to ensure that data received from a neighboring router has not been modified in transit and actually originated from an authorized neighboring router. The cryptographic mechanisms defined to date and described in this document rely on a digest produced with a hash algorithm applied to the payload encapsulated in the routing protocol packet. This document outlines some of the limitations of the current mechanism, problems with manual keying of these cryptographic algorithms, and possible vectors for the exploitation of these limitations.

    Other authors
    See publication
  • Loss of Carrier

    BookSurge

    Lately, Jess Wirth’s life has become as gray as the walls of his cubicle. He spends his days toiling as a network engineer in a North Carolina data center, nursing an ugly divorce that has left him with a decidedly sour outlook on dating. After coming into the office one Friday morning and discovering most of his coworkers playing hooky after a corporate party, he decides to skip out and spend a quiet day alone on the lake. But when a service call sends him into the building’s basement, he…

    Lately, Jess Wirth’s life has become as gray as the walls of his cubicle. He spends his days toiling as a network engineer in a North Carolina data center, nursing an ugly divorce that has left him with a decidedly sour outlook on dating. After coming into the office one Friday morning and discovering most of his coworkers playing hooky after a corporate party, he decides to skip out and spend a quiet day alone on the lake. But when a service call sends him into the building’s basement, he discovers his co-worker Carl dead, hanging from a tangle of Ethernet cables.

    See publication
  • OSPFv2 HMAC-SHA Cryptographic Authentication

    IETF RFC-5709

    This expanded the set of cryptographic authentication algorithms supported by the OSPFv2 interior routing protocol. The original work on OSPFv2 cryptographic authentication, specified in RFC-2328, was undertaken by Fred Baker and Randall Atkinson. The HMAC-SHA algorithms specified here are not widely implemented or deployed at present.

    Other authors
    See publication
  • BGP IPsec Tunnel Encapsulation Attribute

    IETF RFC 5566

    The BGP Encapsulation Subsequent Address Family Identifier (SAFI) provides a method for the dynamic exchange of encapsulation information and for the indication of encapsulation protocol types to be used for different next hops. Currently, support for Generic Routing Encapsulation (GRE), Layer 2 Tunneling Protocol (L2TPv3), and IP in IP tunnel types are defined. This document defines support for IPsec tunnel types.

    Other authors
    • Lou Berger
    • Eric C. Rosen
    See publication
  • CCDE Quick Reference

    Cisco Press

    Other authors
    See publication
  • Cryptographic Authentication for IS-IS

    IETF RFC-5310

    This expanded the set of supported algorithms from Keyed-MD5 and HMAC-MD5 to also include HMAC with the SHA family of cryptographic hash functions.

    Other authors
    See publication
  • Considerations in Validating the Path in BGP

    IETF RFC 5123

    This document examines the implications of hop-by-hop forwarding, route aggregation, and route filtering on the concept of validation within a BGP Autonomous System (AS) Path.

    Other authors
    See publication
  • Cisco Express Forwarding

    Cisco Press

    Other authors
    See publication
  • Optimal Routing Design

    Cisco Press

  • Benchmarking Basic OSPF Single Router Control Plane Convergence

    IETF RFC 4061

    This document provides suggestions for measuring OSPF single router control plane convergence. Its initial emphasis is on the control plane of a single OSPF router. We do not address forwarding plane performance.

    Other authors
    See publication
  • Considerations When Using Basic OSPF Convergence Benchmarks

    IETF RFC 4063

    This document discusses the applicability of various tests for measuring single router control plane convergence, specifically in regard to the Open Shortest First (OSPF) protocol. There are two general sections in this document, the first discusses advantages and limitations of specific OSPF convergence tests, and the second discusses more general pitfalls to be considered when routing protocol convergence is tested.

    Other authors
    See publication
  • OSPF Benchmarking Terminology and Concepts

    IETF RFC 4062

    This document explains the terminology and concepts used in OSPF benchmarking. Although some of these terms may be defined elsewhere (and we will refer the reader to those definitions in some cases) we include discussions concerning these terms, as they relate specifically to the tasks involved in benchmarking the OSPF protocol.

    Other authors
    See publication
  • Practical BGP

    Addison-Wesley

  • IS-IS: Deployment in IP Networks

    Addison-Wesley

    Other authors
    See publication
  • Using 31-Bit Prefixes on IPv4 Point-to-Point Links

    IETF RFC 3021

    With ever-increasing pressure to conserve IP address space on the Internet, it makes sense to consider where relatively minor changes can be made to fielded practice to improve numbering efficiency. One such change, proposed by this document, is to halve the amount of address space assigned to point-to-point links (common throughout the Internet infrastructure) by allowing the use of 31-bit subnet masks in a very limited way.

    Other authors
    See publication
  • EIGRP for IP

    Addison-Wesley

    The book begins with EIGRP theory, explaining the basic concepts, terminology, and mechanisms used by EIGRP to provide routing information. Next, the authors introduce each of the most important EIGRP configuration options; and review fundamental network design principles within the framework of EIGRP's capabilities. Along the way, they present practical tips on network architecture, and on addressing common EIGRP network scenarios. The final chapter presents comprehensive troubleshooting…

    The book begins with EIGRP theory, explaining the basic concepts, terminology, and mechanisms used by EIGRP to provide routing information. Next, the authors introduce each of the most important EIGRP configuration options; and review fundamental network design principles within the framework of EIGRP's capabilities. Along the way, they present practical tips on network architecture, and on addressing common EIGRP network scenarios. The final chapter presents comprehensive troubleshooting guidance on the most common problems encountered in EIGRP network.

    Other authors
    See publication
  • Advanced IP Network Design

    Cisco Press

    Other authors
  • Abstraction in Computer Networks

    Pearson IT

    Computer networks rely on many forms of abstraction to scale–indeed, to operate at all. While at least some of this abstraction is visible, such as route aggregation and flooding domain boundary summarization, much of it is hidden in unexpected places, such as in the logical construction of a network device, in the operation of BGP route reflectors, and in the data plane protocol stack.

    See publication

Patents

  • Defining Non-Forwarding Adjacencies in Bipartite Networks

    Issued US 11050679

    Problems associated with providing a large Clos network having at least one top of fabric (ToF) node, a plurality of internal nodes, and a plurality of leaf nodes may be solved by: (a) providing L2 tunnels between each of the leaf nodes of the Clos and one or more of the at least one ToF node to ensure a non-partitioned IGP L2 backbone, and (b) identi- fying the L2 tunnels as non-forwarding adjacencies in link state topology information stored in ToF node(s) and leaf node(s) such that the L2…

    Problems associated with providing a large Clos network having at least one top of fabric (ToF) node, a plurality of internal nodes, and a plurality of leaf nodes may be solved by: (a) providing L2 tunnels between each of the leaf nodes of the Clos and one or more of the at least one ToF node to ensure a non-partitioned IGP L2 backbone, and (b) identi- fying the L2 tunnels as non-forwarding adjacencies in link state topology information stored in ToF node(s) and leaf node(s) such that the L2 tunnels are not used for forwarding traffic.

    Other inventors
  • Propagating network configuration policies using a publish-subscribe messaging system

    Issued US 10447815

    The disclosed embodiments provide a system for propagating network configuration policies using a publish-subscribe messaging system. During operation, the system receives, through the publish-subscribe messaging system, one or more messages containing a first representation of a configuration policy from a policy server. Next, the system uses a data model to convert the first representation into a second representation of the configuration policy. The system then uses the second representation…

    The disclosed embodiments provide a system for propagating network configuration policies using a publish-subscribe messaging system. During operation, the system receives, through the publish-subscribe messaging system, one or more messages containing a first representation of a configuration policy from a policy server. Next, the system uses a data model to convert the first representation into a second representation of the configuration policy. The system then uses the second representation to apply the configuration policy during processing of network traffic.

    See patent
  • Automatically detecting roles of nodes in layered network topologies

    Issued US 10367686

    The disclosed embodiments provide a system that automatically detects a role of a node in a network with a layered topology. During operation, the system uses a local shortest path tree (SPT) for a node in a network with a layered topology to identify one or more additional nodes in the network that are farthest from the node. Next, the system compares the local SPT with a remote SPT for the one or more additional nodes to identify a position of the node in the layered topology. The system then…

    The disclosed embodiments provide a system that automatically detects a role of a node in a network with a layered topology. During operation, the system uses a local shortest path tree (SPT) for a node in a network with a layered topology to identify one or more additional nodes in the network that are farthest from the node. Next, the system compares the local SPT with a remote SPT for the one or more additional nodes to identify a position of the node in the layered topology. The system then outputs the position of the node for use in configuring the operation of the node in the network.

    Other inventors
    See patent
  • Reducing Flooding of Link State Changes in Networks

    Issued US 10038623

    When a change in connectivity is detected in a network, the change is flooded in a link state message from the node that detected the change to all other nodes in the network. In networks with dense topologies, the link state message may be received multiple times by certain nodes, which may increase bandwidth consumption in the networks and processing overhead in the nodes.

    Other inventors
    See patent
  • Network topologies for energy efficient networks

    Issued US 9413636

    One embodiment identifies all one-hop neighbor nodes and two-hop neighbor nodes of a node; determines an active set of one-hop neighbor nodes for the node, comprising: includes in the active set each one-hop neighbor node that is either an edge node or connected with at least one two-hop neighbor node with which no other one-hop neighbor nodes are connected; and if the active set is not yet complete, then: determine all combinations of one-hop neighbor nodes that are not already in the active…

    One embodiment identifies all one-hop neighbor nodes and two-hop neighbor nodes of a node; determines an active set of one-hop neighbor nodes for the node, comprising: includes in the active set each one-hop neighbor node that is either an edge node or connected with at least one two-hop neighbor node with which no other one-hop neighbor nodes are connected; and if the active set is not yet complete, then: determine all combinations of one-hop neighbor nodes that are not already in the active set; and tests each combination in order of each combination's total-energy value to determine whether a specific combination is able to complete the active set; if no combination is able to complete the active set, then including all one-hop neighbor nodes in the active set; and communicates a message to each one-hop neighbor node in the active set indicating that it is in the active set.

    Other inventors
    See patent
  • Determining a route advertisement in a reactive routing environment

    Issued US 9191227

    In an example embodiment, a method and system is provided to determine and advertise a route advertisement in a reactive routing environment. In response to receiving a network address query with respect to a destination address at a routing device, an aggregate value, e.g. an address prefix, is determined and advertised in reply to the network address query. Determining of the aggregate value may comprise identifying within a range of network addresses represented by the aggregate value…

    In an example embodiment, a method and system is provided to determine and advertise a route advertisement in a reactive routing environment. In response to receiving a network address query with respect to a destination address at a routing device, an aggregate value, e.g. an address prefix, is determined and advertised in reply to the network address query. Determining of the aggregate value may comprise identifying within a range of network addresses represented by the aggregate value respective addresses for which the routing device does not have reachability information.

    Other inventors
    See patent
  • Network topologies for energy efficient networks

    Issued US 9124449

    One embodiment receives at a first node in at least a portion of a network a routing table, the portion of the network comprising the first node and one or more second nodes, the routing table specifying the immediate neighbor that provides each of the best paths in the portion of the network based on a total cost; using the routing table, determines at the first node every second node that is necessary for the first node to reach all edges of the network, the second nodes that are necessary…

    One embodiment receives at a first node in at least a portion of a network a routing table, the portion of the network comprising the first node and one or more second nodes, the routing table specifying the immediate neighbor that provides each of the best paths in the portion of the network based on a total cost; using the routing table, determines at the first node every second node that is necessary for the first node to reach all edges of the network, the second nodes that are necessary for the first node to reach all edges of the network comprising an active set for the first node; and sends a message from the first node to every second node to facilitate determining whether to shut down the second node.

    Other inventors
    See patent
  • Dynamically configuring and verifying routing information of broadcast networks using link state protocols in a computer network

    Issued US 9043487

    A technique dynamically configures and verifies routing information of broadcast networks using link state protocols in a computer network. According to the novel technique, a router within the broadcast network receives a link state protocol routing information advertisement from an advertising router, e.g., a designated router or other adjacent neighbor.

    Other inventors
    See patent
  • Creating balanced link-disjoint topologies in a computer network

    Issued US 8964566

    In one embodiment, each node in a computer network determines a shortest looping ring back to the node through each of its neighbors. Each of these rings may then be marked in a particular direction, ensuring that any ring that shares a link with another ring is marked in such a way that the shared link is in the same direction in each of the rings that share the link. The links that are marked in the particular direction may be stored as part of a first topology. Conversely, the opposite…

    In one embodiment, each node in a computer network determines a shortest looping ring back to the node through each of its neighbors. Each of these rings may then be marked in a particular direction, ensuring that any ring that shares a link with another ring is marked in such a way that the shared link is in the same direction in each of the rings that share the link. The links that are marked in the particular direction may be stored as part of a first topology. Conversely, the opposite direction on the links (e.g., bidirectional links or parallel unidirectional links) may be stored as a second topology that is link-disjoint from the first topology.

    Other inventors
    See patent
  • Dynamic discovery mechanisms via inter-domain routing protocol

    Issued US 8897311

    In an embodiment, a method is provided at which it is used in a device. In this method, a logical identifier assigned to the device is identified and additionally, a mesh group identifier identifying a mesh group is identified. The logical identifier and the mesh group identifier are encoded in a routing message, which is used in an inter-domain routing protocol, and this routing message is transmitted to a reflector device in communication with the device. The reflector device is configured to…

    In an embodiment, a method is provided at which it is used in a device. In this method, a logical identifier assigned to the device is identified and additionally, a mesh group identifier identifying a mesh group is identified. The logical identifier and the mesh group identifier are encoded in a routing message, which is used in an inter-domain routing protocol, and this routing message is transmitted to a reflector device in communication with the device. The reflector device is configured to transmit the routing message to a remote device included in the computer network.

    Other inventors
    See patent
  • Determining a route advertisement in a reactive routing environment

    Issued US 8705539

    In an example embodiment, a method and system is provided to determine and advertise a route advertisement in a reactive routing environment. In response to receiving a network address query with respect to a destination address at a routing device, an aggregate value, e.g. an address prefix, is determined and advertised in reply to the network address query. Determining of the aggregate value may comprise identifying within a range of network addresses represented by the aggregate value…

    In an example embodiment, a method and system is provided to determine and advertise a route advertisement in a reactive routing environment. In response to receiving a network address query with respect to a destination address at a routing device, an aggregate value, e.g. an address prefix, is determined and advertised in reply to the network address query. Determining of the aggregate value may comprise identifying within a range of network addresses represented by the aggregate value respective addresses for which the routing device does not have reachability information. The routing device may send address queries with respect to the identified addresses, to determine reachability via the routing device of those addresses. The aggregate value may be advertised conditional upon determining that a percentage of addresses within the corresponding range that can be reached via the routing device satisfies a predefined minimal coverage value.

    Other inventors
    See patent
  • Network topologies for energy efficient networks

    Issued US 8699382

    One embodiment identifies all one-hop neighbor nodes and two-hop neighbor nodes of a node; determines an active set of one-hop neighbor nodes for the node, comprising: includes in the active set each one-hop neighbor node that is either an edge node or connected with at least one two-hop neighbor node with which no other one-hop neighbor nodes are connected; and if the active set is not yet complete, then: determine all combinations of one-hop neighbor nodes that are not already in the active…

    One embodiment identifies all one-hop neighbor nodes and two-hop neighbor nodes of a node; determines an active set of one-hop neighbor nodes for the node, comprising: includes in the active set each one-hop neighbor node that is either an edge node or connected with at least one two-hop neighbor node with which no other one-hop neighbor nodes are connected; and if the active set is not yet complete, then: determine all combinations of one-hop neighbor nodes that are not already in the active set; and tests each combination in order of each combination's total-energy value to determine whether a specific combination is able to complete the active set; if no combination is able to complete the active set, then including all one-hop neighbor nodes in the active set; and communicates a message to each one-hop neighbor node in the active set indicating that it is in the active set.

    Other inventors
    See patent
  • Performing a defensive procedure in response to certain path advertisements

    Issued US 8640236

    In certain embodiments, performing a defensive procedure involves receiving at a first speaker of a first autonomous system a path advertisement from a second speaker of a second autonomous system. The path advertisement advertises a path from the second speaker of the second autonomous system. It is determined whether the second autonomous system is a stub autonomous system and whether a path length of the path is greater than one. If the second autonomous system is a stub and the path length…

    In certain embodiments, performing a defensive procedure involves receiving at a first speaker of a first autonomous system a path advertisement from a second speaker of a second autonomous system. The path advertisement advertises a path from the second speaker of the second autonomous system. It is determined whether the second autonomous system is a stub autonomous system and whether a path length of the path is greater than one. If the second autonomous system is a stub and the path length is greater than one, a defensive measure is performed for the path. Otherwise, a default procedure is performed for the path.

    Other inventors
    See patent
  • Dynamic discovery mechanisms via inter-domain routing protocol

    Issued US 8121136

    In an embodiment, a method is provided at which it is used in a device. In this method, a logical identifier assigned to the device is identified and additionally, a mesh group identifier identifying a mesh group is identified. The logical identifier and the mesh group identifier are encoded in a routing message, which is used in an inter-domain routing protocol, and this routing message is transmitted to a reflector device in communication with the device. The reflector device is configured to…

    In an embodiment, a method is provided at which it is used in a device. In this method, a logical identifier assigned to the device is identified and additionally, a mesh group identifier identifying a mesh group is identified. The logical identifier and the mesh group identifier are encoded in a routing message, which is used in an inter-domain routing protocol, and this routing message is transmitted to a reflector device in communication with the device. The reflector device is configured to transmit the routing message to a remote device included in the computer network.

    Other inventors
    See patent
  • Determining an optimal route advertisement in a reactive routing environment

    Issued US 8121130

    In an example embodiment, a method is provided. In this method, a network address query is received. A first network address of a known apparatus is retrieved from a routing table, in response to the network address query. A second network address may be determined based upon the network address query, the second network address having a smaller bit length than the first network address. An aggregate value may be advertised that represents a range of reachable network addresses, the range of…

    In an example embodiment, a method is provided. In this method, a network address query is received. A first network address of a known apparatus is retrieved from a routing table, in response to the network address query. A second network address may be determined based upon the network address query, the second network address having a smaller bit length than the first network address. An aggregate value may be advertised that represents a range of reachable network addresses, the range of reachable network addresses including the second network address.

    Other inventors
    See patent
  • Synchronizing portions of a database with different databases on different nodes of a network

    Issued US 8107501

    Techniques are disclosed for synchronizing a database related to a first node in a network with multiple nodes. Each node includes a database different from a database on a different node. An inquiry control message is sent to each node in a candidate set of one or more nodes on the network, which are different from the first node. In response to the inquiry control message, the first node receives a first set of one or more messages from a particular node different from the first node. The…

    Techniques are disclosed for synchronizing a database related to a first node in a network with multiple nodes. Each node includes a database different from a database on a different node. An inquiry control message is sent to each node in a candidate set of one or more nodes on the network, which are different from the first node. In response to the inquiry control message, the first node receives a first set of one or more messages from a particular node different from the first node. The first set indicates a portion from the database of the particular node. The portion is relevant for the first node. A particular portion of a first database for the first node is derived from the first set of messages. The particular portion is less than all of the first database. These techniques allow the first node to derive its full database from multiple adjacent nodes.

    Other inventors
    See patent
  • System and method for exchanging awareness information in a network environment

    Issued US 8098589

    A method for communicating packets in a network environment is provided that includes receiving a packet at a network element and identifying a sequence number included in the packet that correlates to awareness information associated with one or more adjacent network elements. A table included in the network element may be updated in order to account for the awareness information included within the packet that has not been accounted for by the network element. In cases where the awareness…

    A method for communicating packets in a network environment is provided that includes receiving a packet at a network element and identifying a sequence number included in the packet that correlates to awareness information associated with one or more adjacent network elements. A table included in the network element may be updated in order to account for the awareness information included within the packet that has not been accounted for by the network element. In cases where the awareness information included in the packet has already been accounted for, the packet may be ignored.

    Other inventors
    See patent
  • Partitioned forwarding of packets originated on a broadcast link among layer 2 forwarding devices of different adjacency networks

    Issued US 8072908

    The designated forwarding device functionality for forwarding of packets originated on a broadcast link among layer 2 is shared among multiple forwarding devices of different adjacency networks. As these networks do not form adjacencies, the forwarding devices do not natively participate in a same spanning tree for determining how to forward packets, and a designated forwarding device is used for forwarding packets originated on the common broadcast link. Distributing the role of a designated…

    The designated forwarding device functionality for forwarding of packets originated on a broadcast link among layer 2 is shared among multiple forwarding devices of different adjacency networks. As these networks do not form adjacencies, the forwarding devices do not natively participate in a same spanning tree for determining how to forward packets, and a designated forwarding device is used for forwarding packets originated on the common broadcast link. Distributing the role of a designated forwarding device among multiple of the forwarding devices provides a means for more efficiently forwarding packets to their destinations.

    Other inventors
    See patent
  • Automatic overlapping areas that flood routing information

    Issued US 8009591

    In one embodiment, a method includes receiving on a first communication link at a local router all routing information at a certain level of detail for each router of multiple routers communicating in a first flooding domain. A measure of distance is determined from a particular router in the first flooding domain to the local router. It is determined whether the measure of distance exceeds a threshold. If the measure of distance exceeds the threshold, then summary routing information with less…

    In one embodiment, a method includes receiving on a first communication link at a local router all routing information at a certain level of detail for each router of multiple routers communicating in a first flooding domain. A measure of distance is determined from a particular router in the first flooding domain to the local router. It is determined whether the measure of distance exceeds a threshold. If the measure of distance exceeds the threshold, then summary routing information with less than the certain level of detail is determined for the particular router. Also, certain routing information is sent over a different second communication link at the local router. The certain routing information includes the summary information for the particular router, and all routing information at the certain level of detail for a subset of routers communicating in the first flooding domain, which subset excludes the particular router.

    Other inventors
    See patent
  • Two-hop relay for reducing distance vector routing information

    Issued US 7978612

    In one embodiment, a method for using a two-hop relay includes receiving an update message for a distance vector routing protocol from a first neighbor. The update message is sent to a different neighbor. Often, it is first determined whether the receiving node is a relay node for the first neighbor in the protocol. The relay node is a node preferred to update a particular node two hops from the first neighbor. In another embodiment, a method for serving as the two-hop relay includes receiving…

    In one embodiment, a method for using a two-hop relay includes receiving an update message for a distance vector routing protocol from a first neighbor. The update message is sent to a different neighbor. Often, it is first determined whether the receiving node is a relay node for the first neighbor in the protocol. The relay node is a node preferred to update a particular node two hops from the first neighbor. In another embodiment, a method for serving as the two-hop relay includes receiving from each neighbor a first message that includes neighbor data that indicates nodes that are in direct communication with the neighbor. A relay set of fewer than all neighbors is determined. Every node two hops from the first node is updated using only the relay set of neighbors. The relay set is sent in a second message for the protocol.

    Other inventors
    See patent
  • Method and apparatus to enable an IPe domain through EIGRP

    Issued US 7940668

    In one embodiment, a system, method, and apparatus for preventing excessive transmission of routing information in a communications network occurs by receiving a network routing address at a connection node in a communications network, the network routing address allowing the transmission of data packets from a source node to a destination node in the communications network; determining a longest summary route covering a path to the destination node; creating a list comprising a summary of all…

    In one embodiment, a system, method, and apparatus for preventing excessive transmission of routing information in a communications network occurs by receiving a network routing address at a connection node in a communications network, the network routing address allowing the transmission of data packets from a source node to a destination node in the communications network; determining a longest summary route covering a path to the destination node; creating a list comprising a summary of all neighbor connection nodes of the connection node; and transmitting an update of the longest summary route of the network routing address towards all neighbor nodes advertising a destination address comprising a shorter address prefix, wherein the transmitting process occurs sequentially beginning with a first neighbor connection node entered in the list.

    Other inventors
    See patent
  • Fast re-routing in distance vector routing protocol networks

    Issued US 7940776

    In one embodiment, a method includes sending an adjacency discovery message 1 from a local router over a direct link to a first neighbor router. An adjacency discovery message is not forwarded and includes a repair address. The repair address indicates the local router but is not advertised as reachable over the direct link. An outbound routing update message is sent to a different second neighbor router. The outbound routing update message is forwarded and includes reachability data that…

    In one embodiment, a method includes sending an adjacency discovery message 1 from a local router over a direct link to a first neighbor router. An adjacency discovery message is not forwarded and includes a repair address. The repair address indicates the local router but is not advertised as reachable over the direct link. An outbound routing update message is sent to a different second neighbor router. The outbound routing update message is forwarded and includes reachability data that indicates the repair address is reachable. A payload of an inbound tunneled packet received at the local router and directed to the repair address is forwarded based on a destination indicated in the payload.

    Other inventors
    See patent
  • Building backup tunnels for fast reroute in communications networks

    Issued US 7936667

    In one embodiment, a method includes identifying at a node, a destination for which a primary path is defined between the node and the destination, transmitting a request message to a neighbor node for routing information for a backup path between the node and the destination, receiving a reply message containing an address identifying the backup path, and building a backup tunnel to the address. The request message includes at least one node identified as a node to be avoided in the backup…

    In one embodiment, a method includes identifying at a node, a destination for which a primary path is defined between the node and the destination, transmitting a request message to a neighbor node for routing information for a backup path between the node and the destination, receiving a reply message containing an address identifying the backup path, and building a backup tunnel to the address. The request message includes at least one node identified as a node to be avoided in the backup path and a request cost. An apparatus for building backup tunnels is also disclosed.

    Other inventors
    See patent
  • Arrangement for preventing count-to-infinity in flooding distance vector routing protocols

    Issued US 7924726

    Each router in a network is configured for generating router advertisement messages according to a flooding distance vector routing protocol. Each router advertisement message output according to the flooding distance vector routing protocol includes reachability information for at least one destination, and an originating router identifier indicating a router having originated the reachability information. If any router receiving the router advertisement message detects a match between the…

    Each router in a network is configured for generating router advertisement messages according to a flooding distance vector routing protocol. Each router advertisement message output according to the flooding distance vector routing protocol includes reachability information for at least one destination, and an originating router identifier indicating a router having originated the reachability information. If any router receiving the router advertisement message detects a match between the originating router identifier and the corresponding assigned router identifier, the received router advertisement message is disregarded during calculation of the best paths from the network. If the originating router identifier identifies another router, the router floods the received router advertisement message to other ports, and output its own router advertisement message based on the received router advertisement message and that specifies the originating router identifier from the received router advertisement message.

    Other inventors
    See patent
  • Techniques for detecting loop-free paths that cross routing information boundaries

    Issued US 7889655

    Techniques for detecting loops in routes that cross route information boundaries include receiving a control message at a first edge node on one side of the boundary that is connected to a different second edge node on another side of the boundary. The control message indicates a particular network address of a particular node that is reachable from the first edge node. Distinguisher data is determined that indicates if a node in the first collection can reach the first edge node without…

    Techniques for detecting loops in routes that cross route information boundaries include receiving a control message at a first edge node on one side of the boundary that is connected to a different second edge node on another side of the boundary. The control message indicates a particular network address of a particular node that is reachable from the first edge node. Distinguisher data is determined that indicates if a node in the first collection can reach the first edge node without leaving the first collection. An advertising message is sent from the first edge node to the second edge node that includes route data that indicates the particular network address and the distinguisher data. Based on the distinguisher data, a testing edge node in the first collection can determine whether there is a loop comprising both an internal path and an external path to the first edge node.

    Other inventors
    See patent
  • Extending an IP everywhere network over a plurality of flooding domains

    Issued US 7860027

    In one embodiment, a border node receives a message that includes routing information indicating connection of a network device to a domain. The border node then updates a routing database with the routing information, and also uses a network address for the network device to determine whether to propagate the routing information.

    Other inventors
    See patent
  • System and method for controlling the flooding of information in a network environment

    Issued US 7821956

    An apparatus for communicating packets in a network environment is provided that includes a first network element that includes a first neighbor list, the first network element being coupled to a second network element and a third network element. The first network element is operable to receive a second neighbor list from the second network element and a third neighbor list from the third network element. The first network element is further operable to determine one or more overlaps provided…

    An apparatus for communicating packets in a network environment is provided that includes a first network element that includes a first neighbor list, the first network element being coupled to a second network element and a third network element. The first network element is operable to receive a second neighbor list from the second network element and a third neighbor list from the third network element. The first network element is further operable to determine one or more overlaps provided by the second and third neighbor lists when compared to the first neighbor list, the first network element relaying an update that it receives based on the one or more overlaps.

    Other inventors
    See patent
  • Protection of transit links in a network

    Issued US 7821970

    A router identifies transit links and non-transit links. Only the non-transit links are advertised as routes to adjacent routers, thereby protecting the transit links from edge traffic which terminates on a network on one of the transit links. In another aspect of the invention, an administrative whitelist supplements the routes which identify the transit link network routes. In another aspect of the invention, a method for advertising routes identifies entries in a router table as broadcast or…

    A router identifies transit links and non-transit links. Only the non-transit links are advertised as routes to adjacent routers, thereby protecting the transit links from edge traffic which terminates on a network on one of the transit links. In another aspect of the invention, an administrative whitelist supplements the routes which identify the transit link network routes. In another aspect of the invention, a method for advertising routes identifies entries in a router table as broadcast or point-to-point. Only the router table entries for point-to-point links which are not transit or broadcast links that are not for a neighboring router are advertised, whereas the point-to-point transit links or broadcast transit links are advertised as transit links if an administrative whitelist is enabled.

    Other inventors
    See patent
  • Technique to automatically deaggregate an optimum set to prevent suboptimal routing or routing failures within a link state flooding domain

    Issued US 7808927

    In one embodiment, information is signaled between aggregating routers indicating the components of aggregated addresses. This information is used to dynamically leak, or deaggregate, specific parts of the aggregated address space to reduce sub-optimal routing and possibly prevent routing black holes from occurring in a network.

    Other inventors
    See patent
  • Creating non-transit nodes in a link network

    Issued US 7796537

    In one embodiment, a method includes receiving a first link state initiation (HELLO) message from a first neighboring router. The HELLO message requests that a recipient node send a unique identifier for itself in a link state routing protocol. In response to receiving the first HELLO message, a first response message is sent that includes a first identifier from an identifier pool. The identifier pool contains for a local node a plurality of network identifiers that are unique among all nodes…

    In one embodiment, a method includes receiving a first link state initiation (HELLO) message from a first neighboring router. The HELLO message requests that a recipient node send a unique identifier for itself in a link state routing protocol. In response to receiving the first HELLO message, a first response message is sent that includes a first identifier from an identifier pool. The identifier pool contains for a local node a plurality of network identifiers that are unique among all nodes in the network that uses the link state routing protocol. A second HELLO message is received from a different second neighboring router. In response to receiving the second HELLO message, a second response message is sent that includes a different second identifier from the identifier pool.

    Other inventors
    See patent
  • Validating internal routing protocol information passed through an external routing protocol

    Issued US 7782858

    In one embodiment, a method includes receiving authenticated site data that includes site ID data and address data. The site ID data indicates a unique site ID for each site among multiple sites for a first network that uses an internal routing protocol. Multiple edge sites of those sites are separate from each other and connected to a second network that is under separate administrative control of at least one different party. The address data indicates network addresses associated with each…

    In one embodiment, a method includes receiving authenticated site data that includes site ID data and address data. The site ID data indicates a unique site ID for each site among multiple sites for a first network that uses an internal routing protocol. Multiple edge sites of those sites are separate from each other and connected to a second network that is under separate administrative control of at least one different party. The address data indicates network addresses associated with each site of the plurality of sites. An external routing protocol message is discounted based on the authenticated site data.

    Other inventors
    See patent
  • Compression of a routing header in a packet by a mobile router in an ad hoc network

    Issued US 7778235

    Each mobile router in a mobile ad hoc network is configured for identifying routes to nearby nodes that are within a prescribed distance, based on storage of explicit paths specified within routing headers of packets transmitted from a host node to a destination node. Each mobile router also can selectively compress the routing header, based on the storage of the explicit path, resulting in a loose source route type routing header in the packet output from the mobile router. In addition, a…

    Each mobile router in a mobile ad hoc network is configured for identifying routes to nearby nodes that are within a prescribed distance, based on storage of explicit paths specified within routing headers of packets transmitted from a host node to a destination node. Each mobile router also can selectively compress the routing header, based on the storage of the explicit path, resulting in a loose source route type routing header in the packet output from the mobile router. In addition, a routing header of a received packet can be expanded based on the mobile router inserting the explicit path, enabling mobile hosts in the explicit path to forward the packet according to strict source routing. The storage and compression of explicit paths also can be applied to packets specifying reverse routing headers, minimizing the size of the reverse routing headers.

    Other inventors
    See patent
  • Techniques for one-way synchronization of routing information among intermediate nodes

    Issued US 7768995

    Techniques for synchronizing routing data include determining whether conditions are satisfied for one-way transfer with an adjacent router. If it is determined that conditions are satisfied for one-way transfer of routing table data with the adjacent router, then a refresh-notice message is sent from the initiating router to the adjacent router. The refresh-notice message includes data that indicates a particular direction for transfer of routing table data. If the particular direction is…

    Techniques for synchronizing routing data include determining whether conditions are satisfied for one-way transfer with an adjacent router. If it is determined that conditions are satisfied for one-way transfer of routing table data with the adjacent router, then a refresh-notice message is sent from the initiating router to the adjacent router. The refresh-notice message includes data that indicates a particular direction for transfer of routing table data. If the particular direction is inbound, then a copy of an adjacent routing table is received without sending a copy of the initiating router's own routing table. If the particular direction is outbound, then a copy of the own routing table is sent without receiving a copy of the adjacent routing table.

    Other inventors
    See patent
  • Evaluation of network data aggregation

    Issued US 7733798

    In one embodiment, a method includes receiving topology data that indicates multiple communication links and multiple intermediate network nodes in communication based on the communication links. The intermediate network nodes include multiple leaf nodes that terminate communications and multiple transit nodes that facilitate the passage of information between leaf nodes. Aggregation point data is also received, which indicates all aggregation points on the intermediate network nodes. An…

    In one embodiment, a method includes receiving topology data that indicates multiple communication links and multiple intermediate network nodes in communication based on the communication links. The intermediate network nodes include multiple leaf nodes that terminate communications and multiple transit nodes that facilitate the passage of information between leaf nodes. Aggregation point data is also received, which indicates all aggregation points on the intermediate network nodes. An aggregation point is an interface between a network node and a communication link, through which is output data that is a combination of data received through multiple different interfaces upstream of the interface. A set of paths is determined for which each path in the set connects a different pair of leaf nodes. A measure of aggregation is determined based on a number of aggregated paths of the set of paths. An aggregated path passes through an aggregation point.

    Other inventors
    See patent
  • Techniques for decreasing queries to discover routes in an interior gateway protocol

    Issued US 7697505

    Techniques for recovering lost routes include receiving reported costs for transmitting data to a destination from neighboring nodes; and determining total costs as a sum of costs for transmitting data packets to the neighboring nodes and a corresponding reported cost. A selected neighboring node with a minimum total cost is determined as the next hop for the route to the destination. A feasible successor set of neighboring nodes which have reported costs less than the total cost of the…

    Techniques for recovering lost routes include receiving reported costs for transmitting data to a destination from neighboring nodes; and determining total costs as a sum of costs for transmitting data packets to the neighboring nodes and a corresponding reported cost. A selected neighboring node with a minimum total cost is determined as the next hop for the route to the destination. A feasible successor set of neighboring nodes which have reported costs less than the total cost of the selected neighboring node and excluding the selected neighboring node, and successor data about the feasible successor set, are determined. The successor data is sent to the neighboring nodes. A neighboring node that loses a route to the particular destination node is able to determine whether to query the sending node while recovering a lost route to the destination based on the successor data, thereby reducing network resource consumption.

    Other inventors
    See patent
  • Border router with selective filtering of link state advertisements

    Issued US 7672253

    An example embodiment of the present invention provides a process relating to the selective filtering of an LSA at a not-so-stubby-sub-area (NSSSA) border router. In one embodiment, the border router receives an LSA from another router inside the NSSSA, which might be in the access layer of the hierarchical network design model and which might use OSPF as its IGP. If the LSA is Type 1 and includes a subnet route or forwarder address, the border router floods it to its neighboring routers…

    An example embodiment of the present invention provides a process relating to the selective filtering of an LSA at a not-so-stubby-sub-area (NSSSA) border router. In one embodiment, the border router receives an LSA from another router inside the NSSSA, which might be in the access layer of the hierarchical network design model and which might use OSPF as its IGP. If the LSA is Type 1 and includes a subnet route or forwarder address, the border router floods it to its neighboring routers, regardless of whether they are inside the NSSSA. If the LSA is Type 7 and includes a host address, the border router floods it to a neighboring router if the neighboring router is inside the NSSSA, but filters the LSA if the neighboring router is outside the NSSSA, for example, in an OSPF area in the distribution layer of the hierarchical network design model.

    Other inventors
    See patent
  • Ad hoc network formation and management based on aggregation of ad hoc nodes according to an aggregation hierarchy

    Issued US 7668119

    Each mobile ad hoc node has an assigned hierarchy position within an identified tree-based aggregation group. Each ad hoc node is configured for selectively attaching to one of a plurality of available ad hoc nodes based on identifying a best match, for the assigned hierarchy position within the identified aggregation group, from among identifiable hierarchy positions of identifiable aggregation groups. Each ad hoc node also is configured for selectively attaching to any available ad hoc node…

    Each mobile ad hoc node has an assigned hierarchy position within an identified tree-based aggregation group. Each ad hoc node is configured for selectively attaching to one of a plurality of available ad hoc nodes based on identifying a best match, for the assigned hierarchy position within the identified aggregation group, from among identifiable hierarchy positions of identifiable aggregation groups. Each ad hoc node also is configured for selectively attaching to any available ad hoc node based on a determined absence of any available ad hoc node advertising the identified aggregation group of the ad hoc node, or an aggregation group containing the identified aggregation group. Hence, a root node of an aggregation group can filter group-specific routing information from packets destined toward a network clusterhead, resulting in a scalable routing protocol that is not adversely affected by added nodes.

    Other inventors
    See patent
  • System and method for verifying the validity of a path in a network environment

    Issued US 7626948

    A method for verifying a validity of a path is provided that includes receiving an advertisement communication at a first autonomous system from a second autonomous system, the advertisement communication including a list of one or more connected autonomous systems. The method also includes identifying whether the first autonomous system claims a connection to the second autonomous system and whether the second autonomous system claims a connection to the first autonomous system such that…

    A method for verifying a validity of a path is provided that includes receiving an advertisement communication at a first autonomous system from a second autonomous system, the advertisement communication including a list of one or more connected autonomous systems. The method also includes identifying whether the first autonomous system claims a connection to the second autonomous system and whether the second autonomous system claims a connection to the first autonomous system such that two-way connectivity is established between the autonomous systems. In response to the establishment of the two-way connectivity, a directed graph is constructed that includes two nodes representing the first and second autonomous systems respectively. An edge may be formed that connects the two nodes.

    Other inventors
    See patent
  • Techniques for distributing information using multicast subsets

    Issued US 7623474

    Techniques for sending data in a packet-switched communications network include determining multiple subsets of adjacent network nodes of the network. The adjacent network nodes communicate without intervening network nodes with a particular network node through an interface on the particular network node. Each subset includes multiple adjacent network nodes. Subset definition data is sent through the interface. The subset definition data indicates which adjacent network nodes belong to which…

    Techniques for sending data in a packet-switched communications network include determining multiple subsets of adjacent network nodes of the network. The adjacent network nodes communicate without intervening network nodes with a particular network node through an interface on the particular network node. Each subset includes multiple adjacent network nodes. Subset definition data is sent through the interface. The subset definition data indicates which adjacent network nodes belong to which subset. Data for fewer than all adjacent network nodes in all subsets are sent by including, in a multicast data packet sent over the interface with a multicast destination address, subset identifier data that indicates a particular subset. When such data is received by a node, it is discarded unless the subset identifier matches the receiving node's subset identifier. Among other effects, this allows routing messages to be more efficiently sent to better performing neighboring network nodes.

    Other inventors
    See patent
  • Method and apparatus for automatic sub-division of areas that flood routing information

    Issued US 7609672

    Techniques for sharing routing information over a network include determining whether the scale of a flooding domain exceeds a threshold. If so, then a router announcement message is sent over a particular link. The message indicates the local router is a flooding domain border router (FDBR). Summary routing information is determined with less than a certain level of detail used in the flooding domain for routers connected to the local router through links different from the particular link…

    Techniques for sharing routing information over a network include determining whether the scale of a flooding domain exceeds a threshold. If so, then a router announcement message is sent over a particular link. The message indicates the local router is a flooding domain border router (FDBR). Summary routing information is determined with less than a certain level of detail used in the flooding domain for routers connected to the local router through links different from the particular link. The summary routing information is sent over the particular link in a link state message that includes type data that indicates summary routing information that crosses a FDBR. These techniques allow automatic favorable scaling of domains of shared routing information as the size of a mobile ad hoc network grows.

    Other inventors
    See patent
  • Processing two-octet and four-octet values using border gateway protocol

    Issued US 7561588

    A method of processing both two-octet and four-octet autonomous system (AS) identifier values in a first network node that communicates with peer network nodes using Border Gateway Protocol (BGP), comprises receiving a first route message from a BGP peer node that is outside a local autonomous system that includes the first network node, wherein the BGP peer node can process only two-octet AS identifier values; identifying one or more extended community attributes in a route in the received…

    A method of processing both two-octet and four-octet autonomous system (AS) identifier values in a first network node that communicates with peer network nodes using Border Gateway Protocol (BGP), comprises receiving a first route message from a BGP peer node that is outside a local autonomous system that includes the first network node, wherein the BGP peer node can process only two-octet AS identifier values; identifying one or more extended community attributes in a route in the received route update message; for each of the identified extended community attributes, modifying the received route by creating an AS set containing four-octet AS identifier values carried in the identified extended community attributes, and attaching the AS set to the received route; and sending the modified received route to a third BGP node.

    Other inventors
    See patent
  • Forwarding for network devices

    Issued US 7525949

    Techniques for implementing forwarding in network devices are provided. Proxy addresses are used in place of next hop addresses so that a large routing table is not required. Pairs of proxy IP and MAC addresses can be used to allow this optimization to occur completely transparent to any other device in the network. One or more smaller tables can be utilized in place of a large routing table to more efficiently implement forwarding. Additionally, the technique can be utilized without requiring…

    Techniques for implementing forwarding in network devices are provided. Proxy addresses are used in place of next hop addresses so that a large routing table is not required. Pairs of proxy IP and MAC addresses can be used to allow this optimization to occur completely transparent to any other device in the network. One or more smaller tables can be utilized in place of a large routing table to more efficiently implement forwarding. Additionally, the technique can be utilized without requiring modification of other hardware devices in the network.

    Other inventors
    See patent
  • Techniques for reducing adjacencies in a link-state network routing protocol

    Issued US 7515551

    A method and apparatus are presented supporting shortest path first (SPF) routing of data packets over a network by establishing link-state data at an router. Link-state data indicates direct links between the router and a different router and establishes an adjacency relationship with the different node. Initial link-state data is stored at a first router. After the initial link-state data is stored, a hello message is received at the first router. The hello message indicates a direct…

    A method and apparatus are presented supporting shortest path first (SPF) routing of data packets over a network by establishing link-state data at an router. Link-state data indicates direct links between the router and a different router and establishes an adjacency relationship with the different node. Initial link-state data is stored at a first router. After the initial link-state data is stored, a hello message is received at the first router. The hello message indicates a direct connection with a different second router on one network segment. Based on the initial link-state data, it is determined whether establishing an adjacency relationship with the second router is sufficiently valuable. If not, then an adjacency relationship is not established with the second router in response to the hello message. A shortest path first routing for a data packet traversing the network is determined based on one or more adjacency relationships indicated in link-state data stored at the first router.

    Other inventors
    See patent
  • System and method for synchronizing link state databases in a network environment

    Issued US 7391730

    A method for communicating packets in a network environment is provided that includes communicating, by a first network element, a first summary update to a second network element. The method further includes receiving a second summary update from the second network element. The exchange of the first and second summary updates achieves adjacency between the first and second network elements. The first and second summary updates include, at least, locally generated state information and a single…

    A method for communicating packets in a network environment is provided that includes communicating, by a first network element, a first summary update to a second network element. The method further includes receiving a second summary update from the second network element. The exchange of the first and second summary updates achieves adjacency between the first and second network elements. The first and second summary updates include, at least, locally generated state information and a single link state.

    Other inventors
    See patent
  • System and method for reducing information being transmitted in a network environment

    Issued US 7363387

    A method for reducing information being transmitted in a network is provided that includes gleaning routing information being communicated by a first network element, the routing information being stored such that the routing information may be accessed. An adjacency protocol may be executed between the first network element and a second network element that allows for a data exchange between the first and second network elements. The first network element does not communicate the routing…

    A method for reducing information being transmitted in a network is provided that includes gleaning routing information being communicated by a first network element, the routing information being stored such that the routing information may be accessed. An adjacency protocol may be executed between the first network element and a second network element that allows for a data exchange between the first and second network elements. The first network element does not communicate the routing information gleaned by the second network element during the data exchange associated with the adjacency protocol.

    Other inventors
    See patent
  • System and method for controlling the flooding of information in a network environment

    Issued US 7298707

    An apparatus for communicating packets in a network environment is provided that includes a first network element that includes a first neighbor list, the first network element being coupled to a second network element and a third network element. The first network element is operable to receive a second neighbor list from the second network element and a third neighbor list from the third network element. The first network element is further operable to determine one or more overlaps provided…

    An apparatus for communicating packets in a network environment is provided that includes a first network element that includes a first neighbor list, the first network element being coupled to a second network element and a third network element. The first network element is operable to receive a second neighbor list from the second network element and a third neighbor list from the third network element. The first network element is further operable to determine one or more overlaps provided by the second and third neighbor lists when compared to the first neighbor list, the first network element relaying an update that it receives based on the one or more overlaps.

    Other inventors
    See patent
  • Techniques for determining network nodes to represent, multiple subnetworks for a routing protocol

    Issued US 7333501

    A method and apparatus are presented for determining network nodes for aggregating addresses in routing information used for routing data packets over a network. Link data and reachability data are received. Link data indicates direct links between each of multiple candidate routers of a network and a different router or a network segment. Reachability data indicates a set of one or more contiguous network addresses that can be reached on each link described in the link data. A measure of…

    A method and apparatus are presented for determining network nodes for aggregating addresses in routing information used for routing data packets over a network. Link data and reachability data are received. Link data indicates direct links between each of multiple candidate routers of a network and a different router or a network segment. Reachability data indicates a set of one or more contiguous network addresses that can be reached on each link described in the link data. A measure of possible aggregation of contiguous network addresses is determined at the candidate routers based on the link data and the reachability data. A preferred router to aggregate addresses in routing information sent between routers in the network is determined among the candidate routers based on the measure of possible aggregation at each candidate router.

    Other inventors
    See patent
  • System and method for exchanging awareness information in a network environment

    Issued US 7319674

    A method for communicating packets in a network environment is provided that includes receiving a packet at a network element and identifying a sequence number included in the packet that correlates to awareness information associated with one or more adjacent network elements. A table included in the network element may be updated in order to account for the awareness information included within the packet that has not been accounted for by the network element. In cases where the awareness…

    A method for communicating packets in a network environment is provided that includes receiving a packet at a network element and identifying a sequence number included in the packet that correlates to awareness information associated with one or more adjacent network elements. A table included in the network element may be updated in order to account for the awareness information included within the packet that has not been accounted for by the network element. In cases where the awareness information included in the packet has already been accounted for, the packet may be ignored.

    Other inventors
    See patent

Courses

  • 70-535 Architecting Microsoft Azure Solutions (Updated)

    Udemy

  • Cumulus Linux Fundamentals, plus Ansible automation

    Udemy

  • GitHub Ultimate: Master Git and GitHub

    Udemy

  • Linux: Overview and Installation

    LinkedIn Learning

Honors & Awards

  • ACM Senior Member

    Association of Computing Machinery

  • Cisco Live Distinguished Speaker

    Cisco Systems

  • Eagle Scout

    Boy Scouts of America

Organizations

  • Society of Christian Philosophers

    -

    - Present
  • International Association of Privacy Professionals

    -

    - Present
  • Evangelical Philosophical Society

    -

    - Present
  • Internet Society

    -

    - Present
  • Association for Computing Machinery

    Senior Member

    - Present
  • Internet Engineering Task Force

    -

    - Present
  • Evangelical Theological Society

    -

    -
  • Cloud Security Alliance

    -

    -

Recommendations received

12 people have recommended Russ

Join now to view

More activity by Russ

View Russ’ full profile

  • See who you know in common
  • Get introduced
  • Contact Russ directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses