System and method for avoiding neighbor cache pollution
First Claim
1. A method implemented by a first endpoint computing device in a computer network of avoiding cache corruption when establishing a network connection, the method comprising:
- transmitting a broadcast request to a second endpoint computing device and a third endpoint computing device, wherein the request includes a media access control (MAC) address associated with a first network interface card (NIC) in the first endpoint computing device and a masquerade layer-3 address associated with the first endpoint computing device that is different than a layer-3 address currently associated with the first endpoint computing device, wherein a first cache included in the third endpoint computing device stores a first relationship between the layer-3 address currently associated with the first endpoint computing device and a MAC address associated with a second NIC in the first endpoint computing device, and, in response to receiving the broadcast request the first cache, stores a second relationship between the masquerade layer-3 address and the MAC address associated with the first NIC without modifying the first relationship, wherein, in response to receiving the broadcast request, a second cache in the second computing device stores a third relationship between the masquerade layer-3 address and the MAC address currently associated with the first NIC, and wherein the masquerade layer-3 address is generated by providing a masquerade MAC address that is different than the MAC address associated with the first NIC to a dynamic host configuration protocol (DHCP) server;
receiving a reply transmitted by the second endpoint computing device in response to the request, wherein the reply includes a media access control (MAC) address associated with the second endpoint computing device; and
establishing a network connection with the second endpoint computing device using the MAC address associated with the second endpoint computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of avoiding cache corruption when establishing a network connection includes the steps of transmitting a request to a computing device, where the request includes a masquerade layer-3 address, and receiving a reply transmitted by the computing device in response to the request, where the reply includes a MAC address associated with the computing device. Since the masquerade layer-3 address is unique relative to the computer network, computing devices within the network do no overwrite existing layer-3-to-MAC relationships in their respective caches with the layer-3-to-MAC relationship reflected in the request. Thus, the method enables a network connection to be initiated between two computing devices in the same computer network while avoiding neighbor cache pollution on other computing devices in that network.
113 Citations
20 Claims
-
1. A method implemented by a first endpoint computing device in a computer network of avoiding cache corruption when establishing a network connection, the method comprising:
-
transmitting a broadcast request to a second endpoint computing device and a third endpoint computing device, wherein the request includes a media access control (MAC) address associated with a first network interface card (NIC) in the first endpoint computing device and a masquerade layer-3 address associated with the first endpoint computing device that is different than a layer-3 address currently associated with the first endpoint computing device, wherein a first cache included in the third endpoint computing device stores a first relationship between the layer-3 address currently associated with the first endpoint computing device and a MAC address associated with a second NIC in the first endpoint computing device, and, in response to receiving the broadcast request the first cache, stores a second relationship between the masquerade layer-3 address and the MAC address associated with the first NIC without modifying the first relationship, wherein, in response to receiving the broadcast request, a second cache in the second computing device stores a third relationship between the masquerade layer-3 address and the MAC address currently associated with the first NIC, and wherein the masquerade layer-3 address is generated by providing a masquerade MAC address that is different than the MAC address associated with the first NIC to a dynamic host configuration protocol (DHCP) server; receiving a reply transmitted by the second endpoint computing device in response to the request, wherein the reply includes a media access control (MAC) address associated with the second endpoint computing device; and establishing a network connection with the second endpoint computing device using the MAC address associated with the second endpoint computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 20)
-
-
11. A non-transitory computer-readable medium storing instructions for causing a first endpoint computing device to avoid cache corruption when establishing a network connection with a second endpoint computing device by performing the steps of:
-
transmitting a broadcast request to a second endpoint computing device and a third endpoint computing device, wherein the request includes a media access control (MAC) address associated with a first network interface card (NIC) in the first endpoint computing device and a masquerade layer-3 address associated with the first endpoint computing device that is different than a layer-3 address currently associated with the first endpoint computing device, wherein a first cache included in the third endpoint computing device stores a first relationship between the layer-3 address currently associated with the first endpoint computing device and a MAC address associated with a second NIC in the first endpoint computing device, and, in response to receiving the broadcast request the first cache, stores a second relationship between the masquerade layer-3 address and the MAC address associated with the first NIC without modifying the first relationship, wherein, in response to receiving the broadcast request, a second cache in the second computing device stores a third relationship between the masquerade layer-3 address and the MAC address currently associated with the first NIC, and wherein the masquerade layer-3 address is generated by providing a masquerade MAC address that is different than the MAC address associated with the first NIC to a dynamic host configuration protocol (DHCP) server; receiving a reply transmitted by the second endpoint computing device in response to the request, wherein the reply includes a media access control (MAC) address associated with the second endpoint computing device; and establishing a network connection with the second endpoint computing device using the MAC address associated with the second endpoint computing device. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A system configured to avoid cache corruption when establishing a network connection, the system comprising:
-
a first endpoint computing device configured to transmit a broadcast or multicast request that includes a media access control (MAC) address associated with the first endpoint computing device and a masquerade layer-3 address associated with the first endpoint computing device that is different than a layer-3 address currently associated with the first endpoint computing device to a second endpoint computing device and a third endpoint computing device, wherein a first cache included in the third endpoint computing device stores a first relationship between the layer-3 address currently associated with the first endpoint computing device and a MAC address associated with a second NIC in the first endpoint computing device, and, in response to receiving the broadcast request the first cache, stores a second relationship between the masquerade layer-3 address and the MAC address associated with the first NIC without modifying the first relationship, wherein, in response to receiving the broadcast request, a second cache in the second computing device stores a third relationship between the masquerade layer-3 address and the MAC address currently associated with the first NIC, and wherein the masquerade layer-3 address is generated by providing a masquerade MAC address that is different than the MAC address associated with the first NIC to a dynamic host configuration protocol (DHCP) server, and wherein the second endpoint computing device that is configured to transmit a reply to the first endpoint computing device in response to the broadcast or multicast request, wherein the reply includes a MAC address associated with the second endpoint computing device. - View Dependent Claims (18, 19)
-
Specification