摘要:
A system for embedding metadata in data packets has logic that is configured to insert metadata into a data packet after the payload data and padding, if any. The logic further adjusts the packet's overhead, such as a frame check sequence, to account for the added length of the packet. The packet remains compliant with applicable protocols, such as Ethernet, and can be successfully communicated in accordance with such protocols while carrying the metadata. In this regard, the insertion of the metadata is transparent to protocol stacks such that the metadata data does not cause an error or the protocol stacks to render the packet invalid. In particular, the protocol stacks view the inserted metadata as part of the packet's pad field, and the inserted metadata should not cause any errors in the operation of the protocol stacks or prevent the protocol stacks from processing the packet.
摘要:
The present disclosure generally pertains to systems and methods for provisioning nodes of a packet network. Rather than requiring a user to individually set the configuration parameters of each node to achieve a desired behavior, the user is presented with options of various predefined network behaviors and/or the option of customizing a network behavior, such as a queuing, scheduling, or shaping profile, and each node is configured to automatically provision its configuration parameters to implement the desired behavior. Information is passed from node-to-node so that each node can automatically provision its settings to implement such behavior. Thus, the network is automatically provisioned thereby facilitating the provisioning process. Automatic provisioning also helps to ensure a correct network configuration. Indeed, since the provisioning is automatic, at least some manual provisioning errors may be prevented.
摘要:
A communication system comprises a plurality of transceivers and logic. A first transceiver is configured to communicate via a first subscriber line with a transceiver located at a remote premises. A second transceiver is configured to communicate via a second subscriber line with a transceiver located at the remote premises, and a third transceiver is configured to communicate via a third subscriber line with a transceiver located at the remote premises. The logic is configured to switch communication from the first transceiver to the third transceiver in response to a detection of a communication problem associated with the first subscriber line. The logic is further configured to switch communication from the second transceiver to the third transceiver in response to a detection of a communication problem associated with the second subscriber line.
摘要:
Embodiments of the present disclosure generally pertain to systems and methods for policing packet networks. A system in accordance with an exemplary embodiment of the present disclosure includes an enqueue policer positioned within an intermediate node of a packet network prior to at least one egress queue. The enqueue policer utilizes information related to destination end-point capacity limits for a given customer in order to police packets based on such information at a relatively early point in the packet network. Thus, a packet that would have been dropped by an egress node due to capacity limits is dropped by the intermediate node thereby preventing the packet from needlessly consuming bandwidth of the network beyond the intermediate node.
摘要:
The present disclosure generally pertains to systems and methods for providing service admission control in telecommunication networks. In one exemplary embodiment, a system comprises a network access control (SAC) element that is coupled to at least one node of a network segment. The SAC element communicates with each network node within the network segment to discover its configuration and capacity. The SAC element also stores information indicative of performance requirements, such as terms of SLAs pertaining to traffic that passes through the network segment. When a new service is to be added, the SAC element receives information indicative of the new service and its requirements, such as the SLA terms for the new service. The SAC element then automatically determines whether the network segment has sufficient capacity to add the new service without violating the SLAs of any of the services using the network segment. The SAC element then provides an output indicating whether the new service can be so added. Accordingly, the SAC element can be used to ensure SLA compliance.