Abstract:
A method and network are described herein for provisioning Operations, Administration, and Maintenance (OAM) entities for a connection when setting-up the connection between an ingress edge node and an egress edge node.
Abstract:
A router comprising a plurality of elements, each having an element identifier, subdivided into a plurality of groups of at least one element. Each group has a common identifier and each member within each group shares redundant capabilities. Each element is capable of communicating with another element by addressing information to the common identifier instead of the element identifier. Optionally, one element can be a member of more than one group. Another option suggests that all elements within a group share essential information associated with a service provided by the group. Another option is implemented through one element of the router identifying a primary element for a group, wherein the primary element serves requests addressed the corresponding common identifier. Yet another option suggests that one element is identified through configuration of the router as a primary element in its group to serve requests addressed to the common identifier.
Abstract:
The present invention relates to a method and nodes for performing bridging of data traffic over an access domain. For doing so, for data traffic received at an access node from a first user domain and destined to a second user domain, the access node identifies a service binding corresponding to the received data. Then, the access node tunnels the data traffic in a Unicast message addressed to an access edge node in accordance with the identified service binding. The tunnelled data traffic is then forwarded to the access edge node. The access edge node receives the tunnelled data traffic, and identifies the service binding corresponding to the received tunnelled data traffic. The access edge node then proceeds with redirecting the tunnelled data traffic to a second access node in accordance with the identified service binding therein. The redirected tunnelled data traffic is received at a second access node, where it is detunnelled and forwarded to the second user domain. The method also provides an access node and an access edge node for performing the invention.
Abstract:
A lumber turning device for use with a conveyer having spaced apart lumber moving therealong whereby the lumber may be turned through 180° so that all faces of the lumber may be visually inspected. A first arrangement has a four lobed member whereby a first one of the lobes will extend upwardly above the conveyer with a front surface facing a first lumber piece such that when the locked first lumber piece contacts the front surface of the first one of the lobes, the member will rotate and a rear face of an adjacent lobe will lift the lumber piece to rotate the same through 180°. Other embodiments illustrate members which may turn alternate pieces of lumber.
Abstract:
A stackable container is disclosed which is removably secured to a display card. The container is molded from thin flexible sheet of transparent thermoplastic material and is provided with retention tabs on the side wall of the receptacle portion of the container whereby the container can be disposed in snap retention fit within an opening formed in the display card. The display card contains information carrying means while the container cover is free of printed material to fully expose the product contained therein. The cover of the container is hinged to the receptacle portion, and has a recessed top wall portion for captive stacking of a plurality of these containers. The recessed top wall has a contour vertical wall which is dimensioned for friction fit in a recess inner circumferential ledge of the receptacle.
Abstract:
A system and method for virtualizing a flow switch to be used by application providers in a cloud computing environment is provided. An application provider's packet handling rules are received by a cloud management system. The rules are translated from the application provider's overlay topology to the underlay data center topology. The underlay network elements involved in the received rules can be identified. A translated rule can be decomposed into a plurality of rule portions which are transmitted to the appropriate underlay network elements.
Abstract:
The present invention relates to network nodes and methods that use an encoding scheme for encoding a point-to-multipoint traffic path from one ingress node to a plurality of egress nodes in, for example, a Multi-Protocol Label Switching network. According to the encoding scheme a so-called common ERO is used. The common ERO specifies a list consisting of nodes that are common to several sub paths in order to provide a compression mechanism that reduces the size of path messages that are used for signaling the point-to-multipoint traffic path.
Abstract:
A method and nodes for aggregating data traffic over an access domain between service providers and user domains. An access edge node is introduced in the access domain between service providers and user domains. The access edge node hosts service agents, each service agent controlling a Virtual Local Area Network (VLAN) over the access domain for one of the service providers. The access edge node verifies whether a service agent, corresponding to the service provider identified in a received service request, exists. If so, the user domain is added to the VLAN corresponding to the requested service provider by creating a service binding at the access edge node. An access node providing access to the access domain to the user domain is informed of the service binding. Data traffic between the user domain and the identified service provider is aggregated over the access domain according to the created service binding.
Abstract:
The present invention relates to a method and nodes for handling multicast messages over an access domain. The method starts with the receipt of a multicast message from a service provider domain. The method pursues with the identification of a service agent corresponding to the service provider domain from which the multicast message is received. Then, the content of a Virtual Local Area Network (VLAN) Tag field of the multicast message is modified so as to correspond to the identified service agent. The modified multicast message is forwarded on the access domain. Upon receipt of the modified multicast message at an access node, the access node identifies at least one service binding related to the service agent identified in the VLAN Tag field of the received multicast message. For each related service binding, the access node adapts the VLAN Tag field of the multicast message so as to correspond to a local VLAN information, and forwards the adapted multicast message on a user port corresponding to the service binding. The invention also includes an access edge node and an access node adapted to perform the method of the present invention.
Abstract:
A method for establishing a downstream multicast and a upstream and downstream unicast connections between a root and at least one leaf, the root and the at least one leaf being in a tree-type configuration, comprises: creating a downstream unicast label; and distributing the created downstream unicast label in a same signaling message as downstream multicast and upstream unicast labels from the root to the at least one leaf. A network node comprising such a downstream unicast label is used to carry out the method.