H04L45/128

Non-overlapping secured topologies in a distributed network fabric
11095549 · 2021-08-17 · ·

Networks comprising multiple non-overlapping communication topologies are presented. The networks can include a fabric of interconnected network nodes capable of providing multiple communication paths among edge devices. A topology manager constructs communication topologies according to restriction criteria based on required security levels (e.g., top secret, secret, unclassified, etc.). Established topologies do not have overlapping networking infrastructure to within the bounds of the restriction criteria as allowed by the security levels.

Traffic availability in a cellular communication network

A network node and a method performed in a network node of a cellular communication network comprising the steps of obtaining an indicator to secure a traffic availability for a connection, wherein the traffic availability is related to how likely the connection will remain operable, determining whether the network node can secure resources to support the traffic availability, allocating resources for the connection when resources can support the traffic availability, and transmitting a positive response when the network node can secure resources to support the traffic availability.

SERVICE CHAIN DESIGNING DEVICE, SERVICE CHAIN DESIGNING METHOD, AND SERVICE CHAIN DESIGNING PROGRAM
20210226743 · 2021-07-22 ·

[Problem] To design a redundant configuration for a virtualized network function with excellent cost efficiency while improving reliability of entire service chain.

[Solution] A service chain design apparatus 1 includes a redundancy target VNF determining unit 13 that defines, as importance of each VNF, at least one of the number of service chains using the VNF or the number of accommodated users in the service chains using the VNF, and determines a VNF having high importance as a redundancy target VNF, and a redundancy determining unit 31 that determines, when importance of the redundancy target VNF determined by the redundancy target VNF determining unit 13 exceeds a predetermined threshold, the redundancy target VNF having the importance exceeding the predetermined threshold as a redundancy execution VNF.

Method and apparatus for path computation

A method and apparatus for path computation includes generating, by a Path Computation Client (PCC), a path computation element communication protocol (PCEP) message, whereby the PCEP message comprises a characteristic associated with a level of protection of a Protection Label Switch path (LSP) with a Working LSP; and transmitting, by the PCC, the PCEP message to a Path Computation Element (PCE), for path computation.

MULTIPOINT REDUNDANT NETWORK DEVICE PATH PLANNING FOR PROGRAMMABLE NETWORKS

Disclosed are systems and methods for path planning in a programmable communications network with multipoint nodes. The multipoint nodes include nodes with multiple connections to the programmable communication network. Path planning determines source multipoint nodes and destination multipoint nodes. Paths are planned to avoid redundant delivery of messages to a single interface of the multipoint nodes. A network controller programs network communications devices with the determined paths. Multipoint nodes may include multipoint devices or traditional tie points.

ADAPTIVE MULTIPATH ROUTING FAILURE RECOVERY IN A WIRELESS NETWORK
20210168903 · 2021-06-03 ·

A method for operating a wireless network including a plurality of nodes, the method including: each node generating a set of paths to a head node; initiating an adaptive failure recovery method in the event of a source node sending a message data packet upstream and a discovery node encountering a failed node, wherein the discovery node is a node on a path taken by the message data packet from the source node to a destination node, the adaptive recovery failure method including: collecting, at the discovery node, relevant data, the relevant data comprising: a hop-distance between the failed node and the source node; a count of estimated extra hops required to deliver the data packet using a hop-distance recovery method; a count of estimated extra hops required to deliver the data packet using a multipath recovery method; and a latency time for the hop-distance recovery method.

ROUTE DETECTION METHOD AND NETWORK DEVICE

A method includes: establishing, by a first network device, a first BMP session with a second network device, and establishing a second BMP session with a third network device; receiving a first BGP route set sent by the second network device, where the first BGP route set includes a BGP route sent by the second network device to the third network device; receiving a second BGP route set sent by the third network device, where the second BGP route set includes the BGP route received by the third network device from the second network device; and when detecting that the second BGP route set includes a first BGP route but the first BGP route set does not include the first BGP route, determining the first BGP route as an unavailable route.

Packet forwarding method and device
10992574 · 2021-04-27 · ·

The present invention provides a packet forwarding method and device. The method comprises: a first node receiving a packet for forwarding, wherein a destination address of the packet is a second node; the first node identifying, from topologies generated in advance, a target topology corresponding to the packet, wherein the topologies generated in advance comprise a first topology and a second topology generated according to an MRT algorithm, and a third topology obtained according to an SPF algorithm, wherein the first topology, the second topology and the third topology are different from one another; and the first node identifying, from the target topology, a next hop node for forwarding to the second node, and forwarding the packet to the next hop node. The present invention achieves an object of combining a segmented routing network and an MRT function.

SYSTEMS AND METHODS FOR PROVIDING MULTIPLE DISJOINTED PATHS TO CORE NETWORK AT FIRST-MILE ACCESS
20210111990 · 2021-04-15 ·

The present disclosure addresses single point of failure at first mile network connectivity for endpoint devices. A system includes two or more first hop nodes each providing a downstream endpoint device connectivity to a core network via a corresponding second hop node. Each first hop node is configured to determine an identifier of the corresponding second hop node; and send a message to the endpoint device to create multiple disjointed paths to the core network for the endpoint device, each message including a network identifier associated with the first hop nodes and the identifier of the corresponding second hop node, the endpoint device being configured to select at least one first hop node and the corresponding second hop node to establish a path to the core network.

Secure and reliable on-demand source routing in an information centric network

A method implemented by a first content network element (NE) in an information centric network (ICN), the method comprising receiving, by a receiver, an interest packet through a first interface, wherein a header of the interest packet comprises a path filter, the path filter being associated with one or more segments on a path from a consumer to a producer, modifying, by a processor coupled to the receiver, the path filter based on information identifying one or more previous content NEs or one or more next content NEs on the path to produce a modified path filter, and transmitting, by a transmitter coupled to the receiver, the interest packet with the modified path filter to the next content NE.