摘要:
An apparatus comprising an application cross-stratum optimization (CSO) gateway (ACG) configured to communicate with a plurality of servers at an application layer, and a network CSO gateway (NCG) coupled to the ACG via an application-network interface (ANI) and configured to communicate with a plurality of network nodes at a plurality of network layers below the application layer, wherein the ANI allows joint application-network resource allocation, provisioning, and optimization. Also disclosed is a network apparatus implemented method comprising receiving at a service controller in a service plane a resource reservation request from an application controller coupled to an application plane to enable an application for a user, computing a path for the application, allocating the resource for the path at a network plane using network maintained databases, and forwarding a response with the allocated resource to the application plane via the service controller and the application controller.
摘要:
An apparatus comprising an application cross-stratum optimization (CSO) gateway (ACG) configured to communicate with a plurality of servers at an application layer, and a network CSO gateway (NCG) coupled to the ACG via an application-network interface (ANI) and configured to communicate with a plurality of network nodes at a plurality of network layers below the application layer, wherein the ANI allows joint application-network resource allocation, provisioning, and optimization. Also disclosed is a network apparatus implemented method comprising receiving at a service controller in a service plane a resource reservation request from an application controller coupled to an application plane to enable an application for a user, computing a path for the application, allocating the resource for the path at a network plane using network maintained databases, and forwarding a response with the allocated resource to the application plane via the service controller and the application controller.
摘要:
Method and apparatus for exchanging route prefix limit parameters and performing route processing based on multi-level, e.g., three levels of prefix limit parameters between BGP peers in a network running BGP protocol. Further, a route refresh BGP message and/or a soft-notify BGP message may be used to exchange prefix limit related information, according to certain embodiments.
摘要:
The invention includes systems and methods to extend security from enterprise networks to wide-area networks by allowing secure connectivity to the enterprise layer 2 network across a wide-area layer 3 network, such as the Internet
摘要:
A Virtual Communication Environment to support virtual switching engines for layer 2 switches is described. The virtual layer 2 switching engines allow many virtual switches to be created in a CPU or across multiple CPUs in switching hardware. The virtual switch engines reduce the inter-communication costs in memory, CPU, inter-process bandwidth, and fabric bandwidth. This reduction in the cost per Virtual Switch device allows either more virtual switches to be contained within a control plane or more applications per switch control plane.
摘要:
This invention has two mechanisms: Dynamic AS switching for AS confederations and Dynamic AS switching. The Dynamic AS switching for AS confederation mechanism provides a mechanism for an Autonomous System within an AS confederation to survive disconnection from the rest of the Autonomous Systems within the AS Confederation. This invention provides a mechanism for the AS within the AS confederation to use a pre-agreed upon fail-over to the internal AS, so its eBGP connections will not be reset. The Dynamic AS switching mechanisms allows to peers to re-negotiate AS number changes in any Autonomous Systems the peer represent without dropping the BGP peering session.
摘要:
Extensions to the ES-IS protocol are described which include virtual nodes and virtual sub-network identifiers. Techniques for selecting a physical IS forwarder amongst multiple candidates in a virtual node may include tie-breaking mechanisms based on pre-emption values supported by the ES-IS extensions Embodiments allow integration between ES-IS based broadcast networks supporting the Internet Protocol (IP) and the Virtual Router Redundancy Protocol (VRRP). In some embodiments, this integration is accomplished in part by translating packet data units between ES-IS and versions of VRRP. In some such embodiments, nodes on an internetwork maintain concurrent state tables for ES-IS and VRRP.
摘要:
An apparatus comprising a service network and a plurality of Layer 2 networks at a plurality of different physical locations coupled to the service network via a plurality of edge nodes at the Layer 2 networks, wherein the edge nodes are configured to maintain a plurality of Internet Protocol (IP) addresses of a plurality of hosts across the Layer 2 networks, and wherein the IP addresses of the hosts in each of the Layer 2 networks are mapped by the other Layer 2 networks to a Media Access Control (MAC) address of each of the edge nodes in the same Layer 2 networks of the hosts.
摘要:
Policy domains are introduced, which include methods and algorithms for ensuring policy consistency within defined regions of one or more communications networks. Examples of such policies include network functions such as routing, filtering, security, authentication, information summarization and expansion. These policies may be organized into hierarchies of policy categories. The policy domains include mechanisms for adding and deleting policies while preserving consistency, as well as mechanisms for allowing fast synchronization and convergence of policies between local databases resident different nodes/peers in the networks. Policy domains may delineated by pre-existing logical topologies, such as autonomous systems, or may have evolving boundaries.
摘要:
Packet formats for routing protocols which combine link state and path vector routing techniques are described. Such protocols are referred to as Link State Path Vector (LSPV) protocols. Embodiments of the invention include extensions to protocols such as the Border Gateway Protocol (BGP) and Intermediate Standard to Intermediate Standard (IS-IS). Embodiments also include packet formats for LSPV protocols which align the bytes of the one or more LSPV protocols with bytes in formats for protocols in the prior art.