摘要:
Congestion in connection-oriented data networks is alleviated by simulating the rerouting of circuits to uncongested parts of the network and then rerouting such circuits in a manner that causes little, or no, disruption to other parts of the network.
摘要:
A transient notification system is described. In one implementation, a Border Gateway Protocol (BGP) speaker receives a transience notification message identifying a route in a network that is no longer valid. The BGP speaker marks the route indicated by the transient notification message as not valid, and avoids using the route for transferring data to a destination. The transient notification message is forwarded faster than standard route advertisement messages.
摘要:
A method and apparatus for improved inter-domain routing convergence, include transmitting reason information associated with a route update or withdraw. An apparatus receiving the reason information associated with the update or withdraw uses the reason information to determine which of its candidate routes are also affected by substantially the same event that triggered the initial route update or withdraw and which of its candidate routes are not affected. For example, a candidate route may be considered to be transient if the apparatus receiving the reason information determines from the received reason information that a candidate route is going to be updated or withdrawn in the near future due. A candidate route considered as a transient route is avoided being advertised as a preferred route.
摘要:
An efficient protection scheme for MPLS multicast is disclosed for protection of Point-to-Multi-Point LSP connections. The efficient protection scheme for MPLS multicast includes a pair of Redundant Multicast Trees for each multicast connection which connects the source of a multicast LSP to all its destinations in such a way that in the event of a single link or node failure in the network, every destination node is still connected to the root node in at least one of the two trees. Furthermore, a method is disclosed that ensures that existing Redundant Multicast Trees can adapt to changes in the set of destination nodes and/or network topology changes without significant modifications. The efficient protection scheme for MPLS multicast is particularly useful for reducing the protection bandwidth requirements over protection methods known in the art.
摘要:
The invention includes a method and apparatus for providing secure remote access to enterprise networks. An apparatus includes a network interface module adapted for maintaining a secure network connection with a network device independent of a power state of a host computer associated with the apparatus a storage module for storing information associated with the secure connection, and a processor coupled to the network interface and the memory where the processor is adapted for automatically initiating the secure connection without user interaction.
摘要:
Systems and methods for communication data between an application server and at least one machine-to-machine (M2M) device via an internet network and a network are provided. An example system includes a network element configured to schedule delivery of the data between the application server and at least one M2M device based on network information. The network element is located on a boundary between the network and the intern et network to which the application server communicates with the at least one M2M device.
摘要:
The backup-in-the-middle primary-backup configuration is created by placing a backup-in-the-middle forwarder in the routing path between the primary and the environment. The backup-in-the-middle forwarder intercepts output messages along with required state information sent by the primary to the environment. The backup-in-the-middle forwarder backs up the primary by updating its state information and forwards the output packets to the environment.
摘要:
The method includes determining a timestamp corresponding to a received data packet associated with the virtual machine and releasing the data packet from a buffer based on the timestamp and a time another data packet is released from the buffer.
摘要:
Provided is a method and devices for overload control in a cloud computing environment. The method includes receiving a first message from a network element associated with the cloud computing environment. The first message includes information associated with a target virtual machine and a list of sessions from the one or more sessions to move from the serving virtual machine to the target virtual machine. Associating one or more client addresses with an address associated with the target virtual machine based on the list of sessions. And, treating the target virtual machine as the serving virtual machine if processing sessions associated with the list of sessions.
摘要:
The method includes determining a timestamp corresponding to a received data packet associated with the virtual machine and releasing the data packet from a buffer based on the timestamp and a time another data packet is released from the buffer.