摘要:
A software reload is executed. The hardware associated with the network device continues to forward network traffic during the software reload. Also, a kernel of the network device operates unaffected in a protected address space throughout the software reload. Further, the kernel preserves local checkpointed and shared memory data. Application processes running on the network node are shut down gracefully. The reloaded software is brought up and the network device is resynchronized.
摘要:
A software reload is executed. The hardware associated with the network device continues to forward network traffic during the software reload. Also, a kernel of the network device operates unaffected in a protected address space throughout the software reload. Further, the kernel preserves local checkpointed and shared memory data. Application processes running on the network node are shut down gracefully. The reloaded software is brought up and the network device is resynchronized.
摘要:
In general, techniques are described for enhancing the Application-Layer Traffic Optimization (ALTO) service to supplement network topological grouping with location-based groupings to account for endpoint mobility. For example, as described herein, an ALTO server maintains physical location information for a network of one or more endpoints that provides a service. A PID generator of the ALTO server aggregates the endpoints into a set of one or more PIDs based at least on the physical location information for the endpoints, wherein each PID is associated with a subset of the endpoints. The ALTO server generates network and cost maps for the ALTO service that include PID entries to identify a respective subset of the endpoints associated with each of the set of PIDs and cost entries that incorporate cost that reflect physical distances among endpoints.
摘要:
In general, techniques are described for transmitting MPLS labels over a network. More specifically, a network device such a router receives a packet to be forwarded according to a label switching protocol, such as Multi-Protocol Label Switching (MPLS). The router may determine a service instance for the packet based on a client device from which the packet originated. The network device may determine one or more services to apply to the packet based on the service instance for the packet and generate a label which having a service instance portion and a service information portion. The network device may append the label to the packet to form an MPLS-encapsulated packet, and may forward the MPLS-encapsulated packet via an output interface according to the label switching protocol.
摘要:
Using the ALTO Service, networking applications can request through the ALTO protocol information about the underlying network topology from the ISP or Content Provider. The ALTO Service provides information such as preferences of network resources with the goal of modifying network resource consumption patterns while maintaining or improving application performance. This document describes, in one example, an ALTO server that intersects network and cost maps for a first network with network and cost maps for a second network to generate a master cost map that includes one or more master cost entries that each represent a cost to traverse a network from an endpoint in the first network to an endpoint in the second network. Using the master cost map, a redirector may select a preferred node in the first network with which to service a content request received from a host in the second network.
摘要:
A node in an overlay network requests a ranked list of other nodes in multiple areas of the overlay network that can provide a desired piece of content or service to the requesting node. A separate node such as a router generates the ranked list using a routing algorithm, returning the list to the requesting node so that the requesting node may acquire the desired content or service from the nearest node in the overlay network.
摘要:
In system of networks that are not fully meshed with each other and that are capable of processing distributed hash table (DHT) Put and Get messages, message flooding of GET messages is limited by maintaining a list of DHTs the GET has visited. Also, PUT messages include not only the storage location key in the home network but also a list of networks that the PUT has visited, in essence establishing a dynamically changing path within the PUT back to the home network.
摘要:
A method and apparatus are described for status enquiry between sending and receiving nodes in a network. For the sending node, the method comprises sending a bulk status enquiry message to inquire status of a plurality of calls to the receiving node. The bulk status enquiry message conforms to a bulk status enquiry format. For the receiving node, the method comprises sending a bulk status enquiry response message in response to a bulk status enquiry message inquiring status of a plurality of calls from the sending network node. The bulk status enquiry message conforms to a bulk status enquiry format and the bulk status enquiry response message conforms to a bulk status enquiry response format.
摘要:
A session border controller includes a first port to communicate with a user using a first signaling protocol, a second port to communicate with a content provider using a second signaling protocol, and a processor coupled to the first and second ports. The session border controller may send a PLAY message to the content provider to begin delivery of a content destined for the user. The session border controller may further receive a first media stream including the content and content provider information from the content provider. The session border controller may further create a second media stream that includes the content without the content provider information, and deliver the second media stream to the user.
摘要:
A method and apparatus for switching from a primary network controller to a secondary network controller. A switchover request is received. Messages accepted by the node from the peer nodes are limited. An active link is maintained between the node and peer nodes. Finally, control is transferred from the primary controller to the secondary controller.