摘要:
Methods and systems are provided for connecting an electronic device (405) to a network. In some situations, the electronic device (405) connects to a first network provider (410) and pings a first server (420) having a static internet protocol address and a second server (425) having a dedicated uniform resource locator. If the electronic device (405) receives a response from the first (420) and second server (425), the electronic device maintains its connection to the first network provider (410). Otherwise, the electronic device (405) connects to a second network provider (415) and pings the first (420) and second servers (425).
摘要:
Methods and systems are provided for connecting an electronic device (405) to a network. In some situations, the electronic device (405) connects to a first network provider (410) and pings a first server (420) having a static internet protocol address and a second server (425) having a dedicated uniform resource locator. If the electronic device (405) receives a response from the first (420) and second server (425), the electronic device maintains its connection to the first network provider (410). Otherwise, the electronic device (405) connects to a second network provider (415) and pings the first (420) and second servers (425).
摘要:
A method implemented by an apparatus for providing spare capacity allocation (SCA) for dual link failures in a network. The SCA scheme computes the SCA for each of a plurality of flows in the network for a plurality of primary backup paths corresponding to a plurality of disjoint working paths for the flows using a first integer linear programming (ILP) model. The SCA scheme further computes the SCA for each of the flows for a plurality of secondary backup paths corresponding to the disjoint working paths and the primary backup paths using a second ILP model and the computed spare capacity information for the primary backup paths. The SCA scheme further aggregates the computed SCA for the primary backup paths and the secondary backup paths for all the flows.
摘要:
It is the aim of the present invention to provide a method and a system for reducing to the minimum the network bandwidth allocation for the protected routes of GBW-services. This aims are achieved by a method and a system for minimizing bandwidth allocation for alternative routes within a network, comprising the steps of: a) providing a management system for managing the routes of services within said network; b) providing a plurality of guaranteed bandwidth services, hereafter referred as GBW-services; c) assigning to each GBW-service a traffic class, hereafter referred as TC; d) calculating for each GBW-service belonging to a protected TC an active route and at least one alternative route; the active route being the planned route in case of absence of a respective network failure and the alternative route being the route which guarantees that, in case of a network failure with respect to the active route, said GBW-service is protected elsewhere by protecting the respective network resources; e) providing a first optimized protection mode to be assigned to all the GBW-services belonging to a given protected TC; said first optimized protection mode comprising a first optimization step including the step of reserving bandwidth for each GBW-service only once for each network resource employed by the active and/or the alternative route of each GBW-service.
摘要:
A method for congestion response in a communication system that comprises routing capability over a first type network and a second type network is described. The method comprises : - receiving (S1O) a congestion indication for resources on a route to a target through the first type network, - storing (S11) the congestion indication associated to the route, - upon receiving (S12) a subsequent request for initiating a set-up of a call on the route, -- checking (S13) if a congestion indication exists for the route, and -- establishing (S14) the call on an alternative route to the target through the second type network if said congestion indication exists.
摘要:
An admission control process in an Ethernet-based access network (10) having both active links and idle backup links (14a-14c). When a service request is received in an access node (11 a-11f), the process searches for a path of links to an access edge node (13) with sufficient bandwidth to serve the service request. Active links are searched first. If a path of active links with sufficient bandwidth cannot be found, and the service is a unicast request, the process searches for a path that utilizes at least one idle backup link and has sufficient bandwidth to serve the service request.
摘要:
The method includes transmitting a Quality-of-Service (QoS) route request (102) to discover routing based upon a QoS parameter, and the route request (102) including a flow identifier and a QoS link metric. Furthermore, the method includes each intermediate node determining whether the node can support the requested QoS parameter (104), and if so, updating the QoS link metric, forwarding the QoS route request, and temporarily reserving node resources (108). The destination node, upon receiving the QoS route request, generates a reply (110) including the flow identifier and updated QoS link metric for each discovered route, and the source node generates QoS route metrics (112) based upon updated QoS link metrics in the replies. The source nodes selects a route to the destination node (114) based upon the QoS route metrics, and transmits route confirmation to intermediate nodes on the selected route (116).
摘要:
The method includes nodes transmitting quality-of-service (QoS) route requests to discover traffic routing based upon a QoS parameter, and the QoS route requests including a traffic flow identifier. Each node calculates a node QoS tag value to make traffic admission control decisions, and each node determines whether to admit traffic in response to QoS route requests based upon the calculated QoS tag value and the QoS parameter of QoS route requests. Also, each node replies to QoS route requests to indicate whether the node can support the QoS parameter of the route request and admit the traffic, and each node polices admitted traffic based upon the traffic flow identifier to ensure that admitted traffic does not exceed the QoS parameter of the QoS route request.
摘要:
The invention relates to a method for protection of label-switching paths in an MPLS network, comprising several nodes connected by IP connections, each path passing through a given series of nodes and connections in said network called elements of said pathway. An element in a first pathway is protected by means of a pathway called the first pathway bypass, starting at a node in the first pathway upstream of said element for protection and terminating at a node of the first pathway downstream of said element for protection with a certain number of network resources being reserved for said first pathway bypass, the latter begin activated in the case of failure of said element in the first pathway. An element in the second pathway is protected by a pathway called the second pathway bypass, starting from a node in the second pathway upstream of said element and terminating at a node of the second pathway downstream of said element. The pathway of the bypass for the second pathway uses at least a part of the resources reserved for the pathway of the first pathway bypass.
摘要:
The present invention discloses a link protection method in an SDN. The method includes: receiving, by a first switching device in the SDN, first information sent by a network controller in the SDN and link protection information, where the first information is used to establish a communication link between the first switching device and a destination device, and the link protection information is used to instruct the first switching device to proactively perform primary-to-secondary link switching when a link is faulty; and establishing, by the first switching device, the communication link with the destination device according to the first information, and determining, by the first switching device according to the link protection information, that the first switching device proactively performs the primary-to-secondary link switching. The present invention further discloses another link protection method in an SDN and a corresponding switching device and network controller.