Patent classifications
H04L45/1283
Non-Overlapping Secured Topologies In A Distributed Network Fabric
Networks comprising multiple non-overlapping communication topologies are presented. The networks can include a fabric of interconnected network nodes capable of providing multiple communication paths among edge devices. A topology manager constructs communication topologies according to restriction criteria based on required security levels (e.g., top secret, secret, unclassified, etc.). Established topologies do not have overlapping networking infrastructure to within the bounds of the restriction criteria as allowed by the security levels.
Control apparatus, network node and method for interchanging data via a data network
A control apparatus includes a first apparatus for ascertaining at least one primary data path between a first and a second data terminal device, which are connected to a data network, a second apparatus for selecting one of the ascertained primary data paths and a third apparatus for ascertaining at least one alternative data path between the first and the second data terminal device, which alternative data path has no common transmission links with the selected primary data path. A corresponding network node and a corresponding method for operating the apparatus are also described.
ROUTING MULTIPLE DATA STREAMS SIMULTANEOUSLY IN WIRELESS NETWORKS
A method and apparatus for routing multiple data streams simultaneously through independent routes between multiple-input-multiple-output (MIMO) stations in a mesh network. The disclosed feature allows transmission of multiple data streams via multiple routes from a source station (STA) to a destination station (STA), which are both MIMO capable, even though the relay STAs in between can be a single-input-single-output (SISO) STA. An extended routing request (RREQ) and routing reply (RREP) frames are utilized which provide a primary and secondary flag indication, which is utilized in combination with advanced programming for setting path cost metrics to assure independence of primary and secondary routes.
Network management based on assessment of topological robustness and criticality of assets
A system and method of managing a network that includes assets are described. The method includes modeling the network as a directed graph with each of the assets represented as a node and determining alternative paths to each node from each available corresponding source of the node. The method also includes computing upstream robustness of each node, computing upstream robustness of the network, and computing downstream criticality of each node. Managing the network and each asset of the network is based on the upstream robustness and the downstream criticality of each node.
System and method for restoration in a multimedia IP network
Disclosed herein are systems, methods, and computer readable media for modifying IP backbone link weights such that multicast traffic and unicast traffic will not travel on a same path between nodes. The method comprises assigning link weights to nodes within an IP backbone such that multicast forwarding paths and unicast forwarding paths are failure disjoint, and delivering undelivered multicast packets using IP unicast encapsulation to the loopback address of next hop router on a multicast tree upon link/interface failure.
Protection against dual failures for resilient two layer networks
A method comprising identifying a physical ring in a physical layer of a network according to a logical ring in a logical layer of the network, wherein the logical ring is formed from a plurality of nodes interconnected by a plurality of logical links, and wherein the physical ring is formed from at least the plurality of nodes interconnected by a first plurality of physical links, computing a plurality of cross cord paths across the physical ring, and mapping the logical ring onto the physical layer to provide dual physical link failure survivability by determining primary paths and secondary paths for the plurality of logical links over the physical ring and the plurality of cross cord paths such that a secondary path of a first of the plurality of logical links is non-overlapping with a primary path of a second of the plurality of logical links.
Network management based on assessment of topological robustness and criticality of assets
A system and method of managing a network that includes assets are described. The method includes modeling the network as a directed graph with each of the assets represented as a node and determining alternative paths to each node from each available corresponding source of the node. The method also includes computing upstream robustness of each node, computing upstream robustness of the network, and computing downstream criticality of each node. Managing the network and each asset of the network is based on the upstream robustness and the downstream criticality of each node.
Method for Acquiring Cross-Domain Separation Paths, Path Computation Element and Related Storage Medium
A method for acquiring a cross-domain separation path includes: when receiving a cross-domain separation path computation request, acquiring K pairs of candidate separation domain sequences according to a cross-domain network abstraction topology; traversing the K pairs of sequences, generating corresponding intra-domain path computation requests for various domains through which candidate separation domain sequences in the network pass to transmit; when receiving at least one pair of intra-domain paths for the request, configuring each of the at least one pair of intra-domain paths to a corresponding position in the K pairs of sequences, to form K pairs of candidate cross-domain separation paths; and determining one pair of cross-domain separation paths from the K pairs of paths as a computation result of the cross-domain separation path computation request to transmit. There are also disclosed another method for acquiring a cross-domain separation path, a path computation element, and a computer storage medium.
Network management based on assessment of topological robustness and criticality of assets
A system and method of managing a network that includes assets are described. The method includes modeling the network as a directed graph with each of the assets represented as a node and determining alternative paths to each node from each available corresponding source of the node. The method also includes computing upstream robustness of each node, computing upstream robustness of the network, and computing downstream criticality of each node. Managing the network and each asset of the network is based on the upstream robustness and the downstream criticality of each node.
Identification of robust wireless routing paths
There is provided mechanisms for routing packets between a terminal device and a control system node via intermediate nodes on wireless paths in a wireless network. A method includes obtaining information on disturbances of wireless paths used for communicating packets of a traffic flow between the intermediate nodes in the wireless network. The method includes determining, based on the information on disturbances, mutual correlation between the disturbances of the wireless paths. The method includes routing the packets of the traffic flow between the terminal device and the control system node via some of the intermediate nodes and along disjoint wireless paths, whereby the packets are transmitted in parallel on the disjoint wireless paths, and wherein the disjoint wireless paths have mutual correlation not higher than a threshold correlation value.