摘要:
A method and apparatus are disclosed for analyzing and designing various network configuration scenarios. A modular design allows market assessment and network planning functions to be performed more efficiently and accurately using a single integrated design tool. Wired and wireless access technologies can be modeled and evaluated. In an exemplary implementation for modeling and evaluating fixed wireless access networks, the network planning tool comprises a market scenario planner, a cluster analysis tool, a hub sector planner and a network architecture planner. Generally, the market scenario planner analyzes a listing of potential customers to generate a list of target customers. The cluster analysis tool allows the network planner to identify “clusters” of demand for potential hub placement. The hub sector planner analyzes the hub assignments generated by the cluster analysis tool and allocates each building in a given hub to a particular sector. The network architecture planner processes the output of the hub sector planning tool to (i) generate a complete configuration of the network in terms of equipment requirements at each node (each building, hub and service node); and (ii) compare a set of scenarios using several financial measures.
摘要:
Tools and methods in which user interaction via a common user interface enables the assessing of network security prior to implementation of the network, as well as assessing the security of existing networks, portions of existing networks, or modifications to existing networks. A network security model useful in realizing the tools and methods is also disclosed.
摘要:
Reduction of administrative overhead in maintaining network information, rapid convergence on an optimal routing path through the data network, and utilization of only required network resources are realized by a novel method for establishing a call path between network users. The method is based upon deployment of a network information server that stores network topology information and that is addressable by each end user. In this method, the network information server receives a request to establish a call path. The request identifies at least the calling party. In response to the request, the network information server determines a network traversal between the calling party and a root network wherein the network traversal includes call path information about the sub-networks between the calling party and the root network. The request for establishing a call path can also identify the called party. Based on the calling and called party identification, the network information server also determines a second network traversal between the called party and the root network. The second network traversal is sent to either the calling party or the called party or to both the calling and called parties. The server can determine an intersection of the traversals and send the intersection information to the parties. The intersection information is known as a merge point and represents an optimal call path between the parties.
摘要:
The invention includes a method and apparatus for establishing a call from a caller to a callee. A method includes monitoring call establishment signaling associated with a request by a caller to establish a call from a first terminal of the caller to a first terminal of the callee, determining a location of each of at least one condition in the network, and routing the call establishment signaling to at least one of a second terminal of the caller and a second terminal of the callee based on the location of each of the at least one condition in the network. A method includes monitoring call establishment signaling associated with a request to establish a call from the caller to the callee, and routing the call establishment request signaling from one of a plurality of terminals of the caller toward one of a plurality of terminals of the callee.
摘要:
Establishing voice calls in an IP based VPN includes determining the relative location of a terminating point with respect to an originating point of a new communication containing the voice data, determining one or more IP addresses to egress the communication from the originating point to the terminating point, creating a VPN identifier in the new communication, passing the new communication to the terminating point and removing the VPN identifier from the new communication. The VPN identifier can be an extra field added to an encapsulation coding scheme of the voice data.
摘要:
A method and apparatus are disclosed for analyzing and designing various network configuration scenarios. A modular design allows market assessment and network planning functions to be performed more efficiently and accurately using a single integrated design tool. Wired and wireless access technologies can be modeled and evaluated. In an exemplary implementation for modeling and evaluating fixed wireless access networks, the network planning tool comprises a market scenario planner, a cluster analysis tool, a hub sector planner and a network architecture planner. Generally, the market scenario planner analyzes a listing of potential customers to generate a list of target customers. The cluster analysis tool allows the network planner to identify “clusters” of demand for potential hub placement. The hub sector planner analyzes the hub assignments generated by the cluster analysis tool and allocates each building in a given hub to a particular sector. The network architecture planner processes the output of the hub sector planning tool to (i) generate a complete configuration of the network in terms of equipment requirements at each node (each building, hub and service node); and (ii) compare a set of scenarios using several financial measures.
摘要:
Data (e.g., instructions) used to route Internet Protocol traffic is converted from one protocol to another (e.g., MPLS to Virtual Router) or vice-versa. This allows routers and other network devices based on either protocol to co-exist in the same network.
摘要:
Data (e.g., instructions) used to route Internet Protocol traffic is converted from one protocol to another (e.g., MPLS to Virtual Router) or vice-versa. This allows routers and other network devices based on either protocol to co-exist in the same network.
摘要:
Methods and systems for forwarding packets over Label Switched Paths (LSPs) in a Virtual Private Network (VPN) are implemented within a Layer-2 architecture. A system includes a number of multi-purpose nodes connected by a number of multi-protocol label switching (MPLS) LSP links. Each multi-purpose node contains at least one bridging module (BM) that runs an extension of a bridging protocol (BP) contained in the IEEE 802.1d standard. The BP is used to establish MPLS LSPs between the BMs. The BP then generates a spanning tree using a spanning tree program to establish an optimal number of active LSPs. The remaining LSPs are then set to “inactive” The BM de-allocates the resources assigned to inactive LSPs and makes the resources available to other active LSPs.
摘要:
A system and method for dynamically managing Virtual Private Networks (VPNs) in a manner enabling subscriber access to VPN services on an as needed basis.