摘要:
In one embodiment, informing nodes of traffic management resource availability includes determining a number of available traffic management resources at a first node, where a traffic management resource tracks usage of bandwidth by a tunnel at the first node. The number of available traffic management resources is recorded in a link-state advertisement. The link-state advertisement is sent to one or more second nodes.
摘要:
In one embodiment, informing nodes of traffic management resource availability includes establishing whether there is an available traffic management resource at a first node, where a traffic management resource tracks usage of bandwidth by a tunnel at the first node. Whether there is an available traffic management resource is recorded in a traffic management link attribute. The traffic management link attribute is sent to second nodes to inform the second nodes of whether there is an available traffic management resource at the first node.
摘要:
In one embodiment, correlating label switched paths of a pseudowire includes receiving a first message at a second label switching router. The first message is sent from a first label switching router and includes a pseudowire identifier and a first label switched path identifier. The pseudowire identifier identifies a pseudowire, and the first label switched path identifier identifies a first label switched path that implements the pseudowire. A second message is sent from the second label switching router to the first label switching router. The second message comprises the pseudowire identifier and a second label switched path identifier. The second label switched path identifier identifies a second label switched path that implements the pseudowire.
摘要:
In one embodiment, correlating label switched paths of a pseudowire includes receiving a first message at a second label switching router. The first message is sent from a first label switching router and includes a pseudowire identifier and a first label switched path identifier. The pseudowire identifier identifies a pseudowire, and the first label switched path identifier identifies a first label switched path that implements the pseudowire. A second message is sent from the second label switching router to the first label switching router. The second message comprises the pseudowire identifier and a second label switched path identifier. The second label switched path identifier identifies a second label switched path that implements the pseudowire.
摘要:
In one embodiment, informing nodes of traffic management resource availability includes establishing whether there is an available traffic management resource at a first node, where a traffic management resource tracks usage of bandwidth by a tunnel at the first node. Whether there is an available traffic management resource is recorded in a traffic management link attribute. The traffic management link attribute is sent to second nodes to inform the second nodes of whether there is an available traffic management resource at the first node.
摘要:
A method may include: (i) in response to clearing of a fault on a working path of a protection switching group to which a first network element is interfaced: (a) transitioning, by the first network element, its state to a first state in which a protection path of the protection switching group is active; and (b) initiating, by the first network element, a wait to restore timer, the wait to restore timer having a duration such that upon expiration of the timer, the first network element is configured to switch the working path to active; and (ii) in response to receiving a message from a second network element interfaced to the protection switching group indicating that a failure has occurred on the working path: (a) maintaining, by the first network element, its state in the first state; and (b) continuing, by the first network element, the wait to restore timer.
摘要:
In one embodiment, a method for telecommunications includes determining the operational state of a first network switch, determining the operational state of a second network switch, determining the existence of an actionable condition, accessing information on the first switch, and changing the operational state of the first switch. The second network switch is coupled to the first network switch by a protected path. Determining the actionable condition and changing the operational state use references to the operational state of the first network switch, the operational state of the second network switch, and the actionable condition.
摘要:
A method may include: (i) in response to clearing of a fault on a working path of a protection switching group to which a first network element is interfaced: (a) transitioning, by the first network element, its state to a first state in which a protection path of the protection switching group is active; and (b) initiating, by the first network element, a wait to restore timer, the wait to restore timer having a duration such that upon expiration of the timer, the first network element is configured to switch the working path to active; and (ii) in response to receiving a message from a second network element interfaced to the protection switching group indicating that a failure has occurred on the working path: (a) maintaining, by the first network element, its state in the first state; and (b) continuing, by the first network element, the wait to restore timer.
摘要:
A method and system for buffer flush optimization in ERP networks includes generating improved ERP control messages to include a sub-ring identifier and a topology change notification sequence number. When the improved ERP control messages are received, the recipient is enabled to disambiguate multiple redundant ERP control messages. Additionally, a do not flush attribute bit is set for subsequently sent ERP control messages.
摘要:
In a packet-switched network having a plurality of nodes interconnected by links, pre-defined protection paths provide protection of a selected plurality of links. Adjacent nodes connected by a protected link are adapted to detect a failure of the protected link, to encapsulate packets within tunnel packets, to differentiate between tunnel packets and non-tunnel packets and to exchange the tunnel packets via a protection path rather than via the failed link. This results in faster automatic protection switching of packet-based traffic. The invention is particularly suited to an Internet Protocol network.