摘要:
In one embodiment, a method includes establishing a control channel across a wide area network (WAN) from a first gateway that has a first public internetwork layer (L3) address to a second gateway that has a second public L3 address. Each gateway connects a local area network (LAN) to the WAN. Negotiations over the control channel establish a first set of private L3 addresses for the first LAN and a non-overlapping second set for the second LAN. A different address from the first set is provided for each different node in the first LAN. A discovery packet is received from the first LAN. The discovery packet is encapsulated in a tunnel packet directed to the second public L3 address. The tunnel packet is sent over the WAN to the second gateway which extracts the discovery packet. The second gateway sends the discovery packet over the second LAN.
摘要:
According to one aspect, a method includes identifying a request for a piece of content, and obtaining a Moving Picture Expert Group (MPEG) Dynamic Adaptive Streaming over HTTP (DASH) manifest after identifying the request for the piece of content. The method also includes identifying at least one location at which the piece of content is located using the DASH manifest, wherein the at least one location at which the piece of content is located is a location from which the piece of content is arranged to be fetched.
摘要:
According to one aspect, a method includes obtaining a packet at a network endpoint from a client via a first segment. The packet has a segment routing header that includes a list of addresses attached to a chunk entry, and is configured to identify at least a first chunk requested by the client. The method also includes identifying, at the network endpoint, the at least first chunk using the packet, and determining at the network endpoint if the network endpoint has the first chunk. If it is determined that the network endpoint has the first chunk, the first chunk is provided from the network endpoint to the client. Alternatively, if it is determined that the network endpoint does not have the first chunk, the packet is provided to a second segment.
摘要:
Disclosed are, inter alia, methods, apparatus, computer-readable media, mechanisms, and means for load balancing manipulation of packet flows within a transport conduit (e.g., a tunnel, pseudo wire, etc.), typically using a load balancing value which is independent of standard routing-based parameters (e.g., source address, destination address, source port, destination port, protocol type, etc.). A load balancing value is included in encapsulated packets transported across a network using a transport conduit. This load balancing value can be used to load balance the individual flows/microflows within the transport conduit.
摘要:
A computer network includes first and second Ethernet access domain networks, each of Ethernet access domain networks including a user-facing provider edge (u-PE) device, and a stack group of network-facing provider edge (n-PE) devices coupled with the u-PE device, the n-PE devices running a bidding protocol to select one of the n-PE devices as a primary n-PE device for a single pseudowire connection path between the first and second Ethernet access domain networks. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims.
摘要:
Techniques for managing a persistent session associated with a particular Media Access Control (MAC) include determining at a broadband remote access server whether an elapsed time since a data packet is received with the particular MAC address exceeds a threshold time. If so, then point-to-point protocol (PPP) control data is sent in a data link protocol payload that is encapsulated in a data packet with an Ethernet destination field that indicates the particular MAC address. The PPP control data indicates a request for an echo. It is determined whether a data packet with the particular MAC address in an Ethernet source field is received within a particular time interval. If not, then a session associated with the particular MAC address is terminated. These techniques allow PPP control plane functionality while utilizing IP over Ethernet for the data plane.
摘要:
Techniques for distributing digital content include receiving provider content over a network connection at a customer premises node located on premises of a first customer. The provider content is offered by a network service provider different from the first customer. Provider data based on the provider content is stored in non-volatile storage on the customer premises node of the first customer. It is determined whether conditions are satisfied for sending the provider content to a second customer different from the first customer. If it is determined that such conditions are satisfied, then the provider data is retrieved from the non-volatile storage, and data based on the provider data is sent over the network connection for receipt by the second customer. Thereby a customer premises node serves as a cache of provider content for other customer premises nodes on the same last mile segment or access network.
摘要:
Techniques for negotiating Point-to-Point Protocol (PPP) sessions over an Ethernet network include receiving configuration data that indicates a first node is connected to a second node thorough an Ethernet network that supports Ethernet frame payload sizes larger than 1500 octets. Request data is received at the first node from the second node. The request data indicates a request for PPP communications between the first node and the second node using a requested PPP payload size greater than 1492 octets. A particular PPP payload size greater than 1492 octets is determined. Response data is sent from the first node to the second node. The response data indicates that the particular PPP payload size greater than 1492 octets is to be used for PPP communications between the first node and the second node. These techniques allow better utilization of Ethernet Jumbo, Giant and Baby Giant frames.
摘要:
Link fragmentation and interleaving at an access device located between a point to point link and a tunneled connection is provided. A method of access device-based link fragmentation and interleaving is also provided. The method includes receiving frames through a tunnel from a network server, fragmenting at least some of the frames from the network server, and sending fragmented and unfragmented frames over a data link to an endpoint device. The frames may be multilink point to point protocol (MLPPP) frames and the frames may be received through a layer two tunneling protocol (L2TP) tunnel. The method can include scanning a frame for PPP options and removing options related to MLPPP negotiation and then forwarding the frame to a network server.
摘要:
Disclosed are, inter alia, methods, apparatus, computer-readable media, mechanisms, and means for load balancing manipulation of packet flows within a transport conduit (e.g., a tunnel, pseudo wire, etc.), typically using a load balancing value which is independent of standard routing-based parameters (e.g., source address, destination address, source port, destination port, protocol type, etc.). A load balancing value is included in encapsulated packets transported across a network using a transport conduit. This load balancing value can be used to load balance the individual flows/microflows within the transport conduit.