Abstract:
A method and network are described herein for provisioning Operations, Administration, and Maintenance (OAM) entities for a connection when setting-up the connection between an ingress edge node and an egress edge node.
Abstract:
A router comprising a plurality of elements, each having an element identifier, subdivided into a plurality of groups of at least one element. Each group has a common identifier and each member within each group shares redundant capabilities. Each element is capable of communicating with another element by addressing information to the common identifier instead of the element identifier. Optionally, one element can be a member of more than one group. Another option suggests that all elements within a group share essential information associated with a service provided by the group. Another option is implemented through one element of the router identifying a primary element for a group, wherein the primary element serves requests addressed the corresponding common identifier. Yet another option suggests that one element is identified through configuration of the router as a primary element in its group to serve requests addressed to the common identifier.
Abstract:
The present invention relates to a method and nodes for performing bridging of data traffic over an access domain. For doing so, for data traffic received at an access node from a first user domain and destined to a second user domain, the access node identifies a service binding corresponding to the received data. Then, the access node tunnels the data traffic in a Unicast message addressed to an access edge node in accordance with the identified service binding. The tunnelled data traffic is then forwarded to the access edge node. The access edge node receives the tunnelled data traffic, and identifies the service binding corresponding to the received tunnelled data traffic. The access edge node then proceeds with redirecting the tunnelled data traffic to a second access node in accordance with the identified service binding therein. The redirected tunnelled data traffic is received at a second access node, where it is detunnelled and forwarded to the second user domain. The method also provides an access node and an access edge node for performing the invention.
Abstract:
A lumber turning device for use with a conveyer having spaced apart lumber moving therealong whereby the lumber may be turned through 180° so that all faces of the lumber may be visually inspected. A first arrangement has a four lobed member whereby a first one of the lobes will extend upwardly above the conveyer with a front surface facing a first lumber piece such that when the locked first lumber piece contacts the front surface of the first one of the lobes, the member will rotate and a rear face of an adjacent lobe will lift the lumber piece to rotate the same through 180°. Other embodiments illustrate members which may turn alternate pieces of lumber.
Abstract:
A stackable container is disclosed which is removably secured to a display card. The container is molded from thin flexible sheet of transparent thermoplastic material and is provided with retention tabs on the side wall of the receptacle portion of the container whereby the container can be disposed in snap retention fit within an opening formed in the display card. The display card contains information carrying means while the container cover is free of printed material to fully expose the product contained therein. The cover of the container is hinged to the receptacle portion, and has a recessed top wall portion for captive stacking of a plurality of these containers. The recessed top wall has a contour vertical wall which is dimensioned for friction fit in a recess inner circumferential ledge of the receptacle.
Abstract:
A method and network are described herein for provisioning Operations, Administration, and Maintenance (OAM) entities for a connection when setting-up the connection between an ingress edge node and an egress edge node.
Abstract:
A method and network are described herein for provisioning Operations, Administration, and Maintenance (OAM) entities for a connection when setting-up the connection between an ingress edge node and an egress edge node.
Abstract:
A packet node and corresponding methods are provided for providing services to packets received at the packet node. At an ingress card, a packet is classified and a virtual media access control (VMAC) address is attached to the packet. The VMAC address identifies a service component for providing a service to the packet. Layer two switching of the packet is made within the packet node, based on the VMAC address. After processing of the packet by the service component, a new VMAC address is attached to the packet. Further layer two switching of the packet, based on the new VMAC address, may lead to further processing by another service component or to forwarding of the packet beyond the packet node.
Abstract:
Problems caused by Internet Protocol datagram fragmentation are solved by creating a session context for the datagram fragments without actually reassembling the datagram from its fragments. The session context enables treatment of the datagram without actually reassembling it. Processing fragments can be followed by forwarding the processed fragments to another node that can further fragment the IP datagram.
Abstract:
Several services offered by distinct service providers can be accessed from a single user device, through one or more gateways. To ensure quality of service control, each service provider allocates a distinct address to the user device. Distinct forwarding information bases and service mappings are defined at the user device, comprising one such forwarding information base for each service provider and one service mapping for each service type offered by a given service provider. The separate addresses allocated to the user device are related to the separate service mappings. Distinct virtual local area networks (VLANs) are defined, each containing one of the forwarding information base and one of the service mappings. Tags added to packets by the gateways and arriving at the user device are used to link the packets to the proper service provider and to the proper service type.