Patent classifications
H04L45/28
Host Routed Overlay with Deterministic Host Learning and Localized Integrated Routing and Bridging
Systems, methods, and devices for improved routing operations in a network computing environment. A system includes a virtual customer edge router and a host routed overlay comprising a plurality of host virtual machines. The system includes a routed uplink from the virtual customer edge router to one or more of the plurality of leaf nodes. The system is such that the virtual customer edge router is configured to provide localized integrated routing and bridging (IRB) service for the plurality of host virtual machines of the host routed overlay.
Host Routed Overlay with Deterministic Host Learning and Localized Integrated Routing and Bridging
Systems, methods, and devices for improved routing operations in a network computing environment. A system includes a virtual customer edge router and a host routed overlay comprising a plurality of host virtual machines. The system includes a routed uplink from the virtual customer edge router to one or more of the plurality of leaf nodes. The system is such that the virtual customer edge router is configured to provide localized integrated routing and bridging (IRB) service for the plurality of host virtual machines of the host routed overlay.
TRANSIENT LOOP PREVENTION IN ETHERNET VIRTUAL PRIVATE NETWORK EGRESS FAST REROUTE
A method by a network device functioning as a provider edge (PE) in an ethernet virtual private network (EVPN) to prevent transient loops between multi-home peer PEs. The method includes advertising a first EVPN label to one or more PEs that are multi-home peer PEs of the PE, advertising a second EVPN label to one or more PEs that are not multi-home peer PEs of the PE, receiving first traffic for a CE that is encapsulated with the first EVPN label as opposed to the second EVPN label, and discarding the first traffic in response to determining that a link between the PE and the CE is not operational and the first traffic for the CE is encapsulated with the first EVPN label.
METHOD AND COMPUTING DEVICES FOR ENFORCING PACKET ORDER BASED ON PACKET MARKING
Method and computing devices for enforcing packet order based on packet marking. Upon occurrence of a link failure, a first device reallocates traffic initially forwarded through the failed link to an alternative link and marks the reallocated traffic with a first flag. Upon recovery of the failed link, the reallocated traffic is forwarded again through the recovered link and marked with a second flag different from the first flag. A second device calculates a reference inter-packet time for received traffic marked with the first flag. For received traffic marked with the second flag, the second device calculates a current inter-packet time. The current inter-packet time is compared with the reference inter-packet time, to determine if the traffic marked with the second flag shall be forwarded immediately or if the forwarding shall be delayed.
METHOD AND COMPUTING DEVICES FOR ENFORCING PACKET ORDER BASED ON PACKET MARKING
Method and computing devices for enforcing packet order based on packet marking. Upon occurrence of a link failure, a first device reallocates traffic initially forwarded through the failed link to an alternative link and marks the reallocated traffic with a first flag. Upon recovery of the failed link, the reallocated traffic is forwarded again through the recovered link and marked with a second flag different from the first flag. A second device calculates a reference inter-packet time for received traffic marked with the first flag. For received traffic marked with the second flag, the second device calculates a current inter-packet time. The current inter-packet time is compared with the reference inter-packet time, to determine if the traffic marked with the second flag shall be forwarded immediately or if the forwarding shall be delayed.
DAISY CHAIN NETWORK OF SENSORS
Provided herein is a system and method for a sensor system on a vehicle. The sensor system comprises sensors connected with one another in a daisy chain communication network. The sensor system further comprises a controller connected to at least one of the sensors. The controller is configured to operate the vehicle based on data from the sensors and to operate the daisy chain communication network.
DAISY CHAIN NETWORK OF SENSORS
Provided herein is a system and method for a sensor system on a vehicle. The sensor system comprises sensors connected with one another in a daisy chain communication network. The sensor system further comprises a controller connected to at least one of the sensors. The controller is configured to operate the vehicle based on data from the sensors and to operate the daisy chain communication network.
Wireless access point and method for providing backup network connections
At least one hardware processor (111) in a wireless access point (110) in a first local network (120) managed by the wireless access point (110) routes traffic between wireless devices (121, 122) in the first local network (120) and a second network via a first interface (113, 114) configured for communication with wireless devices (121, 122) in the first local network (120) and a second interface (115) configured for communication with the second network and, upon determination that communication via the second interface (115) is impossible, connects (S460) through a third interface (113, 114) to a second wireless access (130) point as a wireless device in a second local network (140) managed by the second wireless access point (130) and routes (S470) traffic between the wireless devices (121, 122) in the first local network (120) and the second network via the first interface (113, 114) and the third interface (113, 114). This way a back-up connection can be provided.
Wireless access point and method for providing backup network connections
At least one hardware processor (111) in a wireless access point (110) in a first local network (120) managed by the wireless access point (110) routes traffic between wireless devices (121, 122) in the first local network (120) and a second network via a first interface (113, 114) configured for communication with wireless devices (121, 122) in the first local network (120) and a second interface (115) configured for communication with the second network and, upon determination that communication via the second interface (115) is impossible, connects (S460) through a third interface (113, 114) to a second wireless access (130) point as a wireless device in a second local network (140) managed by the second wireless access point (130) and routes (S470) traffic between the wireless devices (121, 122) in the first local network (120) and the second network via the first interface (113, 114) and the third interface (113, 114). This way a back-up connection can be provided.
Method and system for surveillance system management
Exemplary surveillance system is provided having a plurality of data generating devices, and nodes for data handling of the data streams generated from the data generating devices. The system may be configured to fragment the data streams and store the fragments among the plurality of nodes of the system. The system may be configured to redundantly transmit data through the nodes so the fragmented data stream arrive at the desired location for storage. The data transmission may permit redirection or retransmission based on node or data transmission failure.