摘要:
A method and apparatus for instantiating network slices using connectivity and computing resources, is provided. Information regarding connectivity and computing resources for supporting network slices is used to identify shared risk groups. Each shared risk group includes those resources expected to be disabled by a common failure event. A first set of functions, such as virtual network functions, belonging to a network slice, is instantiated on a first subset of the resources. The union of all shared risk groups which include at least one of the first subset of resources is disjoint from the union of all shared risk groups which include at least one of a second subset of resources. The second subset of resources is allocated for instantiating a second set of functions which are redundant with the first set of functions. As such, redundant network slices and/or functions thereof can be provided which are robust to failure.
摘要:
The present invention is provides a method and apparatus for routing a data packet in a network. For each nearby device capable of routing the packet toward a further destination, an associated cost or utility is determined. The device with lowest cost or highest utility is selected and the packet is forwarded toward same. The selecting may use a comparator tree. The cost or utility may be associated with forwarding the data packet from the candidate device toward the further destination. The cost or utility may be based on a distance from candidate device to the further destination, and may be determined using a Haversine function or approximation thereof, or by computing an inner product of a first vector and a second vector originating at a center of Earth, the first vector directed toward the candidate device, the second vector directed toward the further destination.
摘要:
A method and apparatus for instantiating network slices using connectivity and computing resources, is provided. Information regarding connectivity and computing resources for supporting network slices is used to identify shared risk groups. Each shared risk group includes those resources expected to be disabled by a common failure event. A first set of functions, such as virtual network functions, belonging to a network slice, is instantiated on a first subset of the resources. The union of all shared risk groups which include at least one of the first subset of resources is disjoint from the union of all shared risk groups which include at least one of a second subset of resources. The second subset of resources is allocated for instantiating a second set of functions which are redundant with the first set of functions. As such, redundant network slices and/or functions thereof can be provided which are robust to failure.
摘要:
The present invention is provides a method and apparatus for routing a data packet in a network. For each nearby device capable of routing the packet toward a further destination, an associated cost or utility is determined. The device with lowest cost or highest utility is selected and the packet is forwarded toward same. The selecting may use a comparator tree. The cost or utility may be associated with forwarding the data packet from the candidate device toward the further destination. The cost or utility may be based on a distance from candidate device to the further destination, and may be determined using a Haversine function or approximation thereof, or by computing an inner product of a first vector and a second vector originating at a center of Earth, the first vector directed toward the candidate device, the second vector directed toward the further destination.
摘要:
There is provided a Radio Frequency Identification tag that is sensitive to stress induced in a component to which the tag is coupled. In some embodiments, the RFID tag includes an electrically conductive loop that it configured to retain the RFID tag in a first operational state and upon breakage of the electrically conductive loop the RFID tag changes into a second operational state. By adhering the stress sensitive RFID tag to a particular component or location thereon, the operation state change of the RFID tag can be indicative of a the particular component reaching a known physical change. Moreover, a change in the operational state of the RFID tag can be detected by an appropriate RFID detector or scanner without the need for visual inspection, and thus provides evaluation of components that are positioned in hard to reach locations or hidden behind one or more coverings.
摘要:
Forwarding state is installed for sparse multicast trees in a link state protocol controlled Ethernet network by enabling intermediate nodes to install state for one or more physical multicast trees, each of which may have multiple logical multicast trees mapped to it. By mapping multiple logical multicasts to a particular physical multicast, and installing state for the physical multicast, fewer FIB entries are required to implement the multiple multicasts. Mapping may be performed by destination nodes before advertising membership in the physical multicast, or may be performed by the intermediate nodes before installing state when a destination node advertises membership in a logical multicast. Intermediate nodes will install state for the physical multicast tree if they are on a shortest path between a source and at least one destination of one of the logical multicasts that has been mapped to the physical multicast.
摘要:
Routes may be installed across multiple link state protocol controlled Ethernet network areas by causing ABBs to leak I-SID information advertised by BEBs in a L1 network area into an L2 network area. ABBs will only leak I-SIDs for BEBs where it is the closest ABB for that BEB. Where another ABB on the L2 network also leaks the same I-SID into the L2 network area from another L1 network area, the I-SID is of multi-area interest. ABBs will advertise I-SIDs that are common to the L1 and L2 networks back into their respective L1 network. Within each L1 and L2 network area, forwarding state will be installed between network elements advertising common interest in an ISID, so that multi-area paths may be created to span the L1/L2/L1 network areas. The L1/L2/L1 network structure may recurse an arbitrary number of times.
摘要:
An apparatus comprising a node that uses a set of determined virtual local area network (VLAN) identifier (VIDs) to provide a hop limit for a packet forwarded by the node in a network. Also disclosed is a network component comprising a receiver that receives a packet comprising a VID that belongs to a determined set of ordered VIDs, a processor that substitutes the VID in the packet from the set of ordered VIDs and maps the VID to a next hop or instead drops the VID if the VID is a last ordered VID of the ordered VIDs, and a transmitter that forwards the packet comprising the substituted VID to the mapped next hop.
摘要:
Routes may be installed across multiple link state protocol controlled Ethernet network areas by causing ABBs to leak I-SID information advertised by BEBs a L1 network area into an L2 network area. ABBs will only leak I-SIDs for BEBs where it is the closest ABB for that BEB. Where another ABB on the L2 network also leaks the same I-SID into the L2 network area from another L1 network area, the I-SID is of multi-area interest. ABBs will advertise I-SIDs that are common to the L1 and L2 networks back into their respective L1 network. Within each L1 and L2 network area, forwarding state will be installed between network elements advertising common interest in an ISID, so that multi-area paths may be created to span the L1/L2/L1 network areas. ABBs may summarize BEB multicast trees such that the set of trees for a given I-SID transiting the ABB is condensed into a common tree. The L2 network may further be implemented as a second layer implemented using a L1/L2/L1 network structure, so that the L1/L2/L1 network structure may recurse an arbitrary number of times.
摘要:
Virtual routers that abstract photonic sub-domains are provided for GMPLS networks. A virtual router uses a link viability matrix to keep track of the set of viable connections between inputs and outputs of a photonic sub-domain. A virtual router may receive RSVP-TE signaling messages and either allocate a working input to output link pair or, if explicitly signaled, verify that the requested link is currently viable. A virtual router also advertises, in its link state updates, the current set of possible outputs for any input link. Shortest path computations can be implemented utilizing virtual routers by modifying a topology graph in accordance with the link viability matrix of the virtual router.