Patent classifications
H04L45/1283
ACHIEVING HIGHLY AVAILABLE AUTONOMOUS SYSTEMS (AS) IN A SOURCE-SELECTED PATH ROUTING NETWORK
The present application refers to a method and a system for reliably forwarding data packets in a source-selected path routing network including a plurality of autonomous systems. For this purpose, a data plane of each of the plurality of autonomous systems that comprises one or more border routers and a control plane of each of the plurality of autonomous systems that comprises a control service are split into two or more shards. Each of said shards contains exactly one control service and at least one border router and is responsible for processing, storing and propagating path information only for a subset of existing links between an autonomous system and a neighboring autonomous system within the source-selected path routing network. Hence, in the source-selected path routing network, each individual shard is not critical and thus can fail without compromising the availability of the entire system.
Methods for Multi-Lane Discovery with Partially Disjoint Paths
A method for multilane path discovery between a first node and a second node in a wireless mesh network, the method being performed by an intermediate node and comprising: receiving, by the intermediate node, a path request for establishing a path between the first and second nodes, wherein the path request comprises node count information related to the path between the first and second nodes; determining, by the intermediate node, that the received node count information is less than or equal to node count information, corresponding to a path between the first and second nodes, that is stored in a discovery table of the intermediate node; and updating, by the intermediate node, the stored node count information with the received node count information.
NETWORK MANAGEMENT BASED ON ASSESSMENT OF TOPOLOGICAL ROBUSTNESS AND CRITICALITY OF ASSETS
A system and method of managing a network that includes assets are described. The method includes modeling the network as a directed graph with each of the assets represented as a node and determining alternative paths to each node from each available corresponding source of the node. The method also includes computing upstream robustness of each node, computing upstream robustness of the network, and computing downstream criticality of each node. Managing the network and each asset of the network is based on the upstream robustness and the downstream criticality of each node.
Non-overlapping secured topologies in a distributed network fabric
Networks comprising multiple non-overlapping communication topologies are presented. The networks can include a fabric of interconnected network nodes capable of providing multiple communication paths among edge devices. A topology manager constructs communication topologies according to restriction criteria based on required security levels (e.g., top secret, secret, unclassified, etc.). Established topologies do not have overlapping networking infrastructure to within the bounds of the restriction criteria as allowed by the security levels.
Gateway link management between disjoint subnetworks in a CDMA MANET
Joining subnets in mobile ad-hoc network (MANET) environment. A method includes, based on SNR, power and data rate information between a first gateway node for a first subnet and a second gateway node for a second subnet, determining a rate at which the first and the second subnets can connect if nodes in the first subnet reduce signal transmit rate to a predetermined level. The method further includes as a result of determining that the determined rate meets or exceeds a predetermined threshold, then joining the first and second subnets by joining the first and second subnets via the first and second gateway nodes and causing nodes in the first subnet to reduce signal transmit rate to the predetermined level.
DATA LINK ERROR FEEDBACK SIGNALING
A data link error feedback signaling system includes a transmitting network device and a receiving network device. The receiving network device may be operable to receive a network data unit from the transmitting network device over a data link, detect an error in the network data unit, and provide data link integrity information based on the error to the transmitting network device. The receiving network device may provide the data link integrity information by marking the data link flawed in a routing protocol, transmitting the data link integrity information via an informational protocol, and so on. The transmitting network device may respond to the data link integrity information, such as by marking the data link less preferred, marking the data link down, transmitting an alarm regarding the data link to a network operator, omitting taking an action upon determining that errors are below an error threshold, and so on.
Data link error feedback signaling
A data link error feedback signaling system includes a transmitting network device and a receiving network device. The receiving network device may be operable to receive a network data unit from the transmitting network device over a data link, detect an error in the network data unit, and provide data link integrity information based on the error to the transmitting network device. The receiving network device may provide the data link integrity information by marking the data link flawed in a routing protocol, transmitting the data link integrity information via an informational protocol, and so on. The transmitting network device may respond to the data link integrity information, such as by marking the data link less preferred, marking the data link down, transmitting an alarm regarding the data link to a network operator, omitting taking an action upon determining that errors are below an error threshold, and so on.
Non-Overlapping Secured Topologies In A Distributed Network Fabric
Networks comprising multiple non-overlapping communication topologies are presented. The networks can include a fabric of interconnected network nodes capable of providing multiple communication paths among edge devices. A topology manager constructs communication topologies according to restriction criteria based on required security levels (e.g., top secret, secret, unclassified, etc.). Established topologies do not have overlapping networking infrastructure to within the bounds of the restriction criteria as allowed by the security levels.
Non-overlapping secured topologies in a distributed network fabric
Networks comprising multiple non-overlapping communication topologies are presented. The networks can include a fabric of interconnected network nodes capable of providing multiple communication paths among edge devices. A topology manager constructs communication topologies according to restriction criteria based on required security levels (e.g., top secret, secret, unclassified, etc.). Established topologies do not have overlapping networking infrastructure to within the bounds of the restriction criteria as allowed by the security levels.
Satisfying service demands in data communication networks
Techniques for identifying service paths for satisfying a service demand in a data communication network are disclosed. Aspects include identifying a plurality of vertices in a communications route cycle, the communications route cycle alternating through the plurality of vertices and a plurality of edges in a sequence; identifying a plurality of internal paths in the communications route cycle, each of the plurality of internal paths is disjoint to the plurality of edges; identifying a first internal path and a second internal path among the plurality of internal paths as a crossing pair of internal paths; detecting a failure of at least two edges among the plurality of edges; and identifying, based on the communications route cycle and the identified crossing pair of internal paths, a service path that satisfies the service demand in response to detecting the failure of the at least two edges.