MANAGING GREY ZONES OF UNREACHABLE NODES IN COMPUTER NETWORKS
First Claim
Patent Images
1. A method, comprising:
- identifying, within a currently known directed acyclic graph (DAG) topology of a computer network, a sub-DAG of one or more nodes that are unreachable;
determining a scope of the unreachable nodes of the sub-DAG; and
tunneling a redirected message to a reachable node of the DAG topology that is adjacent to at least one of the unreachable nodes of the sub-DAG, the redirected message causing the reachable node to distribute the redirected message to one or more of the unreachable nodes of the sub-DAG based on the scope.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment, a node (e.g., a root-node) of a currently known directed acyclic graph (DAG) topology of a computer network can identify a sub-DAG of one or more nodes that are unreachable. The node can further determine a scope of the unreachable nodes of the sub-DAG and tunnel a redirected message to a reachable node of the DAG topology that is adjacent to at least one of the unreachable nodes of the sub-DAG. The redirected message may cause the reachable node to distribute the redirected message to one or more of the unreachable nodes of the sub-DAG based on the scope.
-
Citations
20 Claims
-
1. A method, comprising:
-
identifying, within a currently known directed acyclic graph (DAG) topology of a computer network, a sub-DAG of one or more nodes that are unreachable; determining a scope of the unreachable nodes of the sub-DAG; and tunneling a redirected message to a reachable node of the DAG topology that is adjacent to at least one of the unreachable nodes of the sub-DAG, the redirected message causing the reachable node to distribute the redirected message to one or more of the unreachable nodes of the sub-DAG based on the scope. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. An apparatus, comprising:
-
one or more network interfaces to communicate within a computer network; a processor coupled to the network interfaces and adapted to execute one or more processes; and a memory configured to store a process executable by the processor, the process when executed operable to; identify, within a currently known directed acyclic graph (DAG) topology of a computer network, a sub-DAG of one or more nodes that are unreachable; determine a scope of the unreachable nodes of the sub-DAG; and tunnel a redirected message to a reachable node of the DAG topology that is adjacent to at least one of the unreachable nodes of the sub-DAG, the redirected message causing the reachable node to distribute the redirected message to one or more of the unreachable nodes of the sub-DAG based on the scope. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A tangible, non-transitory, computer-readable media having software encoded thereon, the software when executed by a processor operable to:
-
identify, within a currently known directed acyclic graph (DAG) topology of a computer network, a sub-DAG of one or more nodes that are unreachable; determine a scope of the unreachable nodes of the sub-DAG; and tunnel a redirected message to a reachable node of the DAG topology that is adjacent to at least one of the unreachable nodes of the sub-DAG, the redirected message causes the reachable node to distribute the redirected message to one or more of the unreachable nodes of the sub-DAG based on the scope.
-
Specification