Abstract:
A mesh network includes domain(s) of multiple nodes interconnected through links and in which there are gateway(s) connecting a domain to another network. The domain(s), their multiple nodes, and their links are part of a topology. A set of primary and backup routing paths, each including an ST that includes the selected gateway and route to that selected gateway for nodes in the domain, for a selected one of the gateway(s) is accessed or determined. Schedule(s) to be used by node(s) in the mesh network over one or more scheduling cycles are accessed or determined. Based on status of link(s) between nodes and on the schedule(s), switching is performed to a selected one of the primary or backup routing paths for the selected gateway. Routing in the mesh network is caused to be modified based on the selected routing path. Information is sent to nodes for the paths and schedules.
Abstract:
Systems, methods, apparatuses, and computer program products for dynamically redistributing timing and synchronization in a packet switched network are provided. One method includes creating, by a slave node, a peer list comprising an identifier of at least one peer slave node that shares a same master node as the slave node or that has a certain predefined affinity with the slave node. The method may also include announcing a holdover time of the slave node to the at least one peer slave node, and, when a predefined event occurs, announcing to the at least one peer slave node that the slave node is taking on a mini-master role for at least the announced holdover time.
Abstract:
Methods, devices, systems, techniques, and computer program products are provided to secure timing synchronization to network nodes connected over an inherently insecure best effort public network with mechanisms to improve accuracy of timing protocols such as a statistically estimated edge timestamp offset encoded into the timing message to account for network jitter and processing latency variances incurred due to the security packet processing and encryption; to ensure slave network nodes shall only accept timing messages from trusted timing sources; to establish a secure tunnel with a trusted timing source for exchange of timing packets; to provide authentication and security for timing packets over the insecure public network; and to enhance message anonymity with variable payload padding.