Abstract:
A system that incorporates teachings of the present disclosure may include, for example, a network policy manager having a controller element to provision one or more network elements in a communication system with at least one base policy template and at least one atomic policy template retrieved from one or more base policy templates and a plurality of atomic policy templates according to a service order of a subscriber. At least one base policy template can correspond to an operating baseline of the one or more network elements, while at least one atomic policy template can correspond to one among a plurality of service configurations of the one or more network elements. Additional embodiments are disclosed.
Abstract:
A system and method are disclosed for fault-tolerance in an inter-carrier network interface. A system that incorporates teachings of the present disclosure may include, for example, a PE-ASBR (Provider Edge-Autonomous System Boundary Router) (108, 138) having a communications interface (202) for internetworking with another MPLS-VPN (Multi-protocol Label Switching-Virtual Private Network) cluster (102, 132), and a controller (204). The controller can be programmed to exchange (302) routing information with a PE-ASBR within its own MPLS-VPN cluster and with a corresponding PE-ASBR of another MPLS-VPN cluster, and accept (334) a reroute of packet traffic away from a PE-ASBR of its MPLS-VPN cluster experiencing a fault.
Abstract:
A system and method are disclosed for fault-tolerance in an inter-carrier network interface. A system that incorporates teachings of the present disclosure may include, for example, a PE-ASBR (Provider Edge-Autonomous System Boundary Router) (108, 138) having a communications interface (202) for internetworking with another MPLS-VPN (Multi-protocol Label Switching-Virtual Private Network) cluster (102, 132), and a controller (204). The controller can be programmed to exchange (302) routing information with a PE-ASBR within its own MPLS-VPN cluster and with a corresponding PE-ASBR of another MPLS-VPN cluster, and accept (334) a reroute of packet traffic away from a PE-ASBR of its MPLS-VPN cluster experiencing a fault.
Abstract:
A particular method includes measuring port usage data related to each of a plurality of physical ports associated with a link aggregation group. A bandwidth requirement of a requested media stream is estimated and added to a traffic load at each of the plurality of physical ports to produce an estimated total traffic load of each of the plurality of physical ports. When the requested media stream includes non-video data, the requested media stream is sent to a destination device via a physical port that selected in accordance with a static bandwidth allocation. When the requested media stream includes video data, the requested media stream is sent to the destination device via a least loaded physical port that is dynamically identified based on the estimated traffic loads of each of the plurality of physical ports.
Abstract:
A particular method includes receiving a request to access a secured wireless local network at a security device of the secured wireless local network from a wireless-enabled device that is not authorized to access the secured wireless local network when the request is received. The method includes receiving identification information from the wireless-enabled device at the security device. The method also includes automatically sending an access request message from the security device to at least one messaging address. The access request message provides a recipient of the access request message with at least a portion of the identification information and a selectable option to allow the wireless-enabled device access to the secured wireless local network without requiring user input of a network password associated with the secured wireless local network via the wireless-enabled device.
Abstract:
Systems and methods of controlling communication of data are provided. A method of controlling communication of data may include receiving, at a network component, a request for data associated with a data source. The network component may have a limited capacity to distribute data. The method also includes determining whether the network component is exceeding a first capacity threshold. When the network component is exceeding the first capacity threshold, the method includes determining whether the data source meets a popularity criterion. When the data source meets the popularity criterion, the method includes sending the data associated with the data source.
Abstract:
A system and methods for automating membership discovery in a distributed computer network is presented. A first virtual circuit label switch path (LSP) associated with a first VPLS is established between a first multi tenant unit (MTU) and an attached provider edge (PE) device. A first label mapping message (LMM) is communicated over the first virtual circuit LSP and received at the PE device. The PE device broadcasts the LMM to a plurality of additional PE devices. In addition, methods for automating membership discovery for adding and deleting virtual private LAN service (VPLS) sites are presented. A virtual circuit forwarding equivalence class (VC-FEC) type packet utilized in the various methods and system is also disclosed.
Abstract:
A system that incorporates teachings of the present disclosure may include, for example, a PE-ASBR (Provider Edge-Autonomous System Boundary Routers) having a controller to receive new routing information without an attribute of origin, insert a site of origin of the PE-ASBR into the new routing information if the PE-ASBR is dual-homed to another MPLS-VPN cluster, and broadcast to other network elements the new routing information with the site of origin of the PE-ASBR. Additional embodiments are disclosed.
Abstract:
A computer-readable storage medium (102) is provided for managing end-to-end QoS (Quality of Service) policies in a communication network (100). The storage medium includes computer instructions for establishing (302) a plurality of QoS domains (108) between a plurality of packet switching technologies (102, 106. 110) operating with disparate QoS policies, each QoS domain having an ingress and egress boundary, remapping (303) a QoS policy of each packet exchanged between the ingress boundaries of the plurality of QoS domains, and restoring (309) the QoS policy of each packet exchanged between the egress boundaries of the plurality of QoS domains.
Abstract:
A computer-readable storage medium (102) is provided for managing end-to-end QoS (Quality of Service) policies in a communication network (100). The storage medium includes computer instructions for establishing (302) a plurality of QoS domains (108) between a plurality of packet switching technologies (102, 106. 110) operating with disparate QoS policies, each QoS domain having an ingress and egress boundary, remapping (303) a QoS policy of each packet exchanged between the ingress boundaries of the plurality of QoS domains, and restoring (309) the QoS policy of each packet exchanged between the egress boundaries of the plurality of QoS domains.