Patent classifications
H04L45/127
Method and System for Surveillance System Management
An exemplary surveillance system is provided having a plurality of data generating devices, and nodes for data handling of the data streams generated form the data generating devices. The system may be configured to fragment the data streams and store the fragments among the plurality of nodes of the system. The system may be configured to redundantly transmit data through the nodes so the fragmented data stream arrive at the desired location for storage. The data transmission may permit redirection or retransmission based on node or data transmission failure.
SCALABLE AND PROGRAMMABLE MECHANISM FOR TARGETED IN-SITU OAM IMPLEMENTATION IN SEGMENT ROUTING NETWORKS
The present technology provides a system and method for implementing targeted collection of in-situ Operation, Administration and Maintenance data from select nodes in a Segment Routing Domain. The selection is programmable and is implemented by setting an iOAM bit in the function arguments field of a Segment Identifier. In this way only the nodes associated with local Segment Identifiers (Function field of a Segment Identifier) with an iOAM argument bit are directed to generate iOAM data. The iOAM data generated by target nodes may be stored in TLV field of the segment routing header. The Segment Routing packet is then decapsulated at a Segment Routing egress node and the Header information with the collected iOAM data is sent to a controller entity for further processing, analysis and/or monitoring.
SYSTEMS AND METHODS FOR CONFIGURING A COMMUNICATIONS NETWORK
Systems and methods are disclosed for configuring a communications network. In disclosed embodiments, a set of permissible service link decompositions and a set of basic service links may be obtained for the communications network. A spanning subset of service links for the communications may be generated. Generation of the spanning subset may include selecting a decomposition of a first service link from a set of permissible service link decompositions; updating the set of permissible service link decompositions based on the selected decomposition; and updating the set of basic service links using the updated set of permissible service link decompositions. In some embodiments, obtaining the set of permissible service link decompositions can include generating a set of permissible service link decompositions by traversing decomposition graphs generated for each of the service links. In some embodiments, the communications network can be configured to satisfy network demands using the spanning subset.
Non-overlapping secured topologies in a distributed network fabric
Networks comprising multiple non-overlapping communication topologies are presented. The networks can include a fabric of interconnected network nodes capable of providing multiple communication paths among edge devices. A topology manager constructs communication topologies according to restriction criteria based on required security levels (e.g., top secret, secret, unclassified, etc.). Established topologies do not have overlapping networking infrastructure to within the bounds of the restriction criteria as allowed by the security levels.
DISTRIBUTED LEDGER-BASED AD-HOC SYSTEM, APPARATUS AND METHOD USING FINGERPRINT VERIFICATION
A system, method and apparatus for routing traffic in ad-hoc networks. A routing blockchain network processes routing node information proposals received from manager nodes of network clusters. Performance metrics, including content integrity metrics, of one or more nodes in the system are validated using distributed ledger techniques and provided to the manager nodes as updates to each manager node's routing information. The manager nodes further determine routing paths for ad-hoc communication requests based on an authentication record that defines conditions necessary to route traffic streams in association with a particular resource or destination, one of the conditions comprising a minimum content integrity metric. Data may be transmitted in data segments, each data segment associated with a particular original fingerprint. The data segments and associated fingerprints are provided to routing nodes and, ultimately, to a destination node. One or more of the nodes in the routing path performs verification of the integrity of the data segments comparing locally-generated fingerprints to original fingerprints generated by a source node. Fingerprint information may be stored by a fingerprint blockchain network for accountability and tracking purposes.
Data processing method, device, and system
A data processing method, a device, and a system, for performing different processing on data packets of varying degrees of importance in a same service flow, where the data processing method includes: A first device receiving a first data packet from a third device, where the first data packet carries transmission requirement indication information of the first data packet, where the first device is any intermediate device between a source device and a target device that correspond to the first data packet, and where the third device is a previous-hop device adjacent to the first device on a transmission path from the source device to the target device; the first device determining, based on the transmission requirement indication information of the first data packet, a processing policy corresponding to the first data packet; and the first device processing the first data packet according to the processing policy.
BIER FORWARDING ENTRY CONSTRUCTION METHOD, APPARATUS, AND SYSTEM
A bit index explicit replication (BIER) forwarding entry construction method is provided. The method includes receiving, by a second network device, a first message sent by a first network device, where the first message includes a host routing prefix of the first network device, first BIER information, and second BIER information. The first BIER information includes a bit index forwarding table identifier (BIFT ID) of the first network device, the second BIER information includes a bit forwarding router identifier (BFR ID) of at least one bit forwarding router (BFR) in a first area. The second network device constructs a BIER forwarding entry based on the first BIER information, the second BIER information, and the host routing prefix.
Method and apparatus for determining access path of content delivery network
Embodiments of the present disclosure relate to a method, apparatus, electronic device for determining an access path of a content delivery network, and a computer readable medium. A method may include: acquiring, in response to determining that an edge node receiving a user request fails to cache a requested resource, access performance information of each node in the content delivery network, and determining a target path from the edge node receiving the user request via a preset node corresponding to a requested target source station in the content delivery network to the target source station based on the access performance information of the each node in the content delivery network, where the preset node pre-establishes a connection with the requested target source station, and a distance between the preset node and the target source station meets a preset distance condition.
METHOD FOR FORWARDING PACKET ON SR NETWORK, DEVICE, AND SYSTEM
A method for processing a packet on an SR network is provided, including: receiving a packet, where a packet header of the packet includes a destination address field, a first pointer, a second pointer, and a list used to process the packet, the list includes a plurality of sequentially arranged identifiers, and a value of the first pointer and a value of the second pointer jointly indicate a location of a first identifier in the plurality of identifiers in the list; determining the first identifier based on the value of the first pointer and the value of the second pointer; and copying the first identifier to the destination address field. In this method, a CL pointer is set in the packet header to jointly form a two-dimensional pointer with an SL pointer, to indicate a location of a C-SID in a SID list.
Systems and methods for configuring a communications network
Systems and methods are disclosed for configuring a communications network. In disclosed embodiments, a set of permissible service link decompositions and a set of basic service links may be obtained for the communications network. A spanning subset of service links for the communications may be generated. Generation of the spanning subset may include selecting a decomposition of a first service link from a set of permissible service link decompositions; updating the set of permissible service link decompositions based on the selected decomposition; and updating the set of basic service links using the updated set of permissible service link decompositions. In some embodiments, obtaining the set of permissible service link decompositions can include generating a set of permissible service link decompositions by traversing decomposition graphs generated for each of the service links. In some embodiments, the communications network can be configured to satisfy network demands using the spanning subset.