H04L45/68

Preventing failure processing delay
11206176 · 2021-12-21 · ·

A method and device for preventing a failure processing delay are provided in the disclosure. In an example, when the number of queue elements in an equivalence class time-window queue reaches a set threshold (denoted as N) in a set time-window, it means that there are N Bidirectional Forwarding Detection (BFD) sessions in the same equivalence class set, that detect Down events. It thus can be intelligently inferred that a public network path carrying the N BFD sessions breaks down. For processing a failure in time and reducing data stream loss on an upper layer, the present disclosure may allow reporting a corresponding Down event for each BFD session in the equivalence class set to which the N BFD sessions belong.

Systems and methods for integrating a broadband network gateway into a 5G network

In one embodiment, a method includes configuring a router to act as a BNG and establishing, by the router, a connection between CPE and the BNG. The method also includes receiving, by the router, end-user and access parameters and communicating, by the router, the end-user and access parameters to one or more 5G NFs by interacting with one or more SBIs. The method further includes allowing, by the router, the CPE access to the one or more 5G NFs in response to communicating the end-user and access parameters to the one or more 5G NFs.

Method for EVPN and VPLS Active-Active Integration, Device, and System
20220174006 · 2022-06-02 ·

An Ethernet virtual private network (EVPN) and a virtual private local area network (LAN) service (VPLS) active-active integration network includes a group of multi-homed provider edges (PEs) including a plurality of PEs on an EVPN side. The group of multi-homed PEs are all coupled to a same PE device on a VPLS side using inter-network pseudo wires (PWs). The inter-network PWs are configured to forward traffic between the group of multi-homed PEs on the EVPN side and the PE device on the VPLS side. The forwarding is performed based on specific preset rules using the inter-network PWs.

APPLICATION WIRE
20220124032 · 2022-04-21 ·

A method includes, at a node associated with a multiprotocol label switching system (MPLS) network, identifying information associated with an application flow based on one or more unencapsulated packet headers of the application flow or based on an ingress data stream that includes the application flow. The method further includes, in response to identifying the information, and based on stored data that maps application flows with pseudowires, determining a number of pseudowires corresponding to paths through the MPLS network, where the stored data indicates, for a sending device application, a distributed mapping of the application flow via at least one of the number of pseudowires, and communicating data related to the sending device application via at least one of the number of pseudowires.

Systems and methods for integrating a broadband network gateway into a 5G network

In one embodiment, a method includes configuring a router to act as a BNG and establishing, by the router, a connection between CPE and the BNG. The method also includes receiving, by the router, end-user and access parameters and communicating, by the router, the end-user and access parameters to one or more 5G NFs by interacting with one or more SBIs. The method further includes allowing, by the router, the CPE access to the one or more 5G NFs in response to communicating the end-user and access parameters to the one or more 5G NFs.

Systems and methods for providing transparent ethernet private line services using static pseudo-wire configuration

The present disclosure is directed to enabling transparency for network traffic through an off-net site using the concept of static Pseudo-Wire (PW) of arriving data packets at a Network Interface Device (NID). In one aspect, a method of providing transparent Ethernet private line service includes receiving, at a network interface device of an enterprise network, a packet, the enterprise network being configured to receive the Ethernet private line service from a service provider; determining, by the network interface device, whether the packet is a raw data packet or a statically pseudo-wired packet; and performing, by the network interface device, a pseudo-wire encapsulation process if the packet is the raw data packet or a pseudo-wire de-capsulation process if the packet is the statically pseudo-wired packet, prior to delivering the packet to a corresponding destination.

Method, apparatus, and system for selecting network device

An apparatus includes a program instructing hardware and a computer readable storage medium coupled to the hardware and storing programming instructions for execution by the hardware. The programming instructions instruct the hardware to: receive a network device selection message sent by a first network device, where the network device selection message contains a virtual local area network (VLAN) mapping capability identifier of the first network device and a device identifier of the first network device; when determining that both the apparatus and the first network device have VLAN mapping capability according to local VLAN mapping capability and the VLAN mapping capability identifier of the first network device, select a network device for executing VLAN mapping according to sizes or a sequence of a local device identifier and the device identifier of the first network device.

Methods and systems for efficient virtualization of inline transparent computer networking devices

Network devices that are inserted inline into network links and process in-transit packets may significantly improve their packet-throughput performance by not assigning L3 IP addresses and L2 MAC addresses to their network interfaces and thereby process packets through a logical fast path that bypasses the slow path through the operating system kernel. When virtualizing such Bump-In-The-Wire (BITW) devices for deployment into clouds, the network interfaces must have L3 IP and L2 MAC addresses assigned to them. Thus, packets are processed through the slow path of a virtual BITW device, significantly reducing the performance. By adding new logic to the virtual BITW device and/or configuring proxies, addresses, subnets, and/or routing tables, a virtual BITW device can process packets through the fast path and potentially improve performance accordingly. For example, the virtual BITW device may be configured to enforce a virtual path (comprising the fast path) through the virtual BITW device.

Methods and Systems for Efficient Virtualization of Inline Tansparent Computer Netwokring Devices
20230336522 · 2023-10-19 ·

Network devices that are inserted inline into network links and process in-transit packets may significantly improve their packet-throughput performance by not assigning L3 IP addresses and L2 MAC addresses to their network interfaces and thereby process packets through a logical fast path that bypasses the slow path through the operating system kernel. When virtualizing such Bump-In-The-Wire (BITW) devices for deployment into clouds, the network interfaces must have L3 IP and L2 MAC addresses assigned to them. Thus, packets are processed through the slow path of a virtual BITW device, significantly reducing the performance. By adding new logic to the virtual BITW device and/or configuring proxies, addresses, subnets, and/or routing tables, a virtual BITW device can process packets through the fast path and potentially improve performance accordingly. For example, the virtual BITW device may be configured to enforce a virtual path (comprising the fast path) through the virtual BITW device.

METHOD FOR SUPPORTING SNCP OVER PACKET NETWORK
20230024620 · 2023-01-26 ·

A method is presented for supporting SNCP over a packet network connecting to two SDH sub-networks and transporting one or more SDH paths that are SNCP-protected in both SDH sub-networks. The packet network connects to each of two sub-network interconnection points by a working path and a protection path. The packet sub-network may provide the same type of path protection as an SDH sub-network using SNCP, while avoiding bandwidth duplication.