摘要:
A computer network processes data packets in the event of a network link failure. The network includes a plurality of routers that deliver data packets to the network via a plurality of links. At least one router includes a protection cycle manager. The protection cycle manager has a protection cycle packet identifier and a protection cycle packet processor. The protection cycle packet identifier identifies, as protection cycle packets, data packets having a specific protection cycle format. The protection cycle packet processor processes protection cycle packets to determine whether the packet destination corresponds to the routing node, and if the packet destination corresponds to the routing node, the protection cycle packet is treated by the routing node as a data packet received from the packet source via the failed link. Otherwise, if the packet destination does not correspond to the routing node, the protection cycle packet is sent to a protection cycle node for the routing node.
摘要:
A computer network processes data packets in the event of a network link failure. The network includes a plurality of routers that deliver data packets to the network via a plurality of links. At least one router includes a protection cycle manager. The protection cycle manager has a protection cycle packet identifier and a protection cycle packet processor. The protection cycle packet identifier identifies, as protection cycle packets, data packets having a specific protection cycle format. The protection cycle packet processor processes protection cycle packets to determine whether the packet destination corresponds to the routing node, and if the packet destination corresponds to the routing node, the protection cycle packet is treated by the routing node as a data packet received from the packet source via the failed link. Otherwise, if the packet destination does not correspond to the routing node, the protection cycle packet is sent to a protection cycle node for the routing node.
摘要:
A computer network processes data packets in the event of a network link failure. The network includes a plurality of routers that deliver data packets to the network via a plurality of links. At least one router includes a protection cycle manager. The protection cycle manager has a protection cycle packet identifier and a protection cycle packet processor. The protection cycle packet identifier identifies, as protection cycle packets, data packets having a specific protection cycle format. The protection cycle packet processor processes protection cycle packets to determine whether the packet destination corresponds to the routing node, and if the packet destination corresponds to the routing node, the protection cycle packet is treated by the routing node as a data packet received from the packet source via the failed link. Otherwise, if the packet destination does not correspond to the routing node, the protection cycle packet is sent to a protection cycle node for the routing node.
摘要:
A computer network processes data packets in the event of a network link failure. The network includes a plurality of routers that deliver data packets to the network via a plurality of links. At least one router includes a protection cycle manager. The protection cycle manager has a protection cycle packet identifier and a protection cycle packet processor. The protection cycle packet identifier identifies, as protection cycle packets, data packets having a specific protection cycle format. The protection cycle packet processor processes protection cycle packets to determine whether the packet destination corresponds to the routing node, and if the packet destination corresponds to the routing node, the protection cycle packet is treated by the routing node as a data packet received from the packet source via the failed link. Otherwise, if the packet destination does not correspond to the routing node, the protection cycle packet is sent to a protection cycle node for the routing node.
摘要:
A method of establishing a data connection between terminal switching nodes in a network involves switching nodes participating in a network layer wavelength routing (WR) protocol to determine the next hop switching node for every possible combination of terminal nodes based on the network topology. Switching nodes participate in a network layer wavelength distribution (WD) once the data connection is to be established. The WR protocol determines the path used through the network, while the WD protocol assigns wavelengths on each link between switching nodes. The wavelengths may be different on different optical links. The switching nodes include wavelength converters with an optical switch or optoelectronic converters with a digital electronic switch. Advantages of using potentially different wavelengths along various segments of a single end-to-end connection yields increased wavelength efficiency.
摘要:
The present invention relates to distributed systems and methods for finding a path from a source node to a destination node where the path chosen satisfies a path constraint for a first additive path parameter and concurrently optimizes a second additive path parameter. One embodiment of the invention provides a routing method. The method includes receiving at a current node a construct path message from a neighboring previous node. The construct path message includes first and second values for first and second additive parameters. The method includes checking whether the first value satisfies an optimality condition and whether the second value indicates a feasible path given a path constraint. If the first value satisfies an optimality condition and the second value indicates a feasible path given a path constraint, then the method (i) sends out a construct path message to a next neighboring node, (ii) increments a number-of-acknowledgement-messages variable by the number of construct path messages sent, and (iii) adds an entry to a predecessor array stored at the current node. The entry includes an identifier for the predecessor neighboring node, the first path value, and the second path value. If not, the method sends an acknowledgement message to the neighboring previous node.
摘要:
A network element employing a universal mapper enables multiple services to be mapped onto a physical medium (metallic link with a particular physical layer protocol) so that the number of service mappers, and hence the complexity of the network element, may be reduced, the cost of provisioning the device may be reduced, and new services may be deployed, such as Ethernet over T1. The universal mapper may be configured to generate frames for transmission over multiple physical mediums utilizing a protocol known as Generic Framing Procedure (GFP). Using this embodiment, services such as ATM, Frame Relay, Ethernet, IP/PPP, Voice, and Infiniband may be transported in GFP frames over metallic links operating using xDSL, T1/E1, T3/E3, or cable access technologies by utilizing a single GFP framer and a single set of service mappers.
摘要:
A technique for optically converting wavelengths in a multi-wavelength system is disclosed. In one embodiment, wherein the multi-wavelength system has W wavelength channels, wherein W=2N, the technique is realized by selectively directing a received frequency channel corresponding to a respective wavelength channel based upon a predetermined frequency mapping. Then, the frequency of the selectively directed frequency channel is shifted at least once by an amount defined by ±2iΔf, wherein Δf is the frequency spacing between adjacent frequency channels, and i=0, 1, . . . N−1.
摘要:
A content router for managing content for virtual private groups in a content oriented network, the content router comprising storage configured to cache a content from a customer in a content oriented network (CON), and a transmitter coupled to the storage and configured to forward the content upon request, wherein the content is signed by the user, wherein the CON provides different security levels for different users in a plurality of users, and wherein the plurality of users correspond to a plurality of user classes.
摘要:
A two step method for determining restoration cycles for a mesh network includes generating a set of possible restoration cycles, and selecting a subset of low-cost restoration cycles on the network. The cost of a restoration cycle may be based, in part, on the availability of capacity on the link to restore traffic with and/or without interference, and network policy. Enabling the restoration cycles to be determined based on the bandwidth capacity of the restoring link, the flows carried by the other link, and other network policy considerations enables embodiments of the invention to account for traffic class, priority, and other traffic considerations when selecting restoration cycles on the network. Identifying arcs on the network with relatively high cost restoration cycles allows portions of the network to be targeted for increased capacity.