Patent classifications
H04L12/741
SERVICE INSERTION FORWARDING
Systems and methods associated with service insertion forwarding are disclosed. One example method includes building a service insertion address table. The service insertion address table may associate service insertion tunnels with device addresses based on payload source addresses retrieved from packets received via the service insertion tunnels. The method also includes forwarding a packet received from a source device to a destination device. The packet may be received from the source device via a source service insertion tunnel. The packet may be forwarded to the destination device via a destination service insertion tunnel. The destination service insertion tunnel may be associated with the destination device in the service insertion address table.
INTERNET PROTOCOL ENDPOINTS DATABASE IN A TELECOMMUNICATIONS NETWORK
Aspects of the present disclosure involve systems, methods, computer program products, and the like, for providing a directory or database of IP endpoints associated with users of a telecommunications network. The IP endpoints directory may be accessed by users or other networks to determine or obtain destinations within the network or accessible through the network that are associated with users or participants of the network. Through the database, networks and users may determine one or more endpoints for communications intended for a particular user. The results from the IP endpoint database may be then utilized to route communications along one or more routes through the network based on the information stored in the database.
SELECTIVE RULE MANAGEMENT BASED ON TRAFFIC VISIBILITY IN A TUNNEL
One embodiment of the present invention provides a switch. The switch includes a storage device, a rule management module, an inner packet module, and a packet processor. During operation, the rule management module obtains a rule associated with a data flow within tunnel encapsulation of a tunnel. This rule indicates how the flow is to be processed at the switch. The rule management module then applies an initial rule to a respective line card of the switch. The initial rule is derived from a virtual network identifier, which is associated with the tunnel, of the obtained rule. The inner packet module determines that a first inner packet, which is encapsulated with a first encapsulation header, belongs to the flow without decapsulating the first encapsulation header. The rule management module applies the obtained rule to a line card associated with an ingress port of the encapsulated first inner packet.
TECHNIQUES FOR MANAGING SOFTWARE DEFINED NETWORKING CONTROLLER IN-BAND COMMUNICATIONS IN A DATA CENTER NETWORK
According to one or more embodiments of this disclosure, a network controller in a data center network establishes a translation table for in-band traffic in a data center network, the translation table resolves ambiguous network addresses based on one or more of a virtual network identifier (VNID), a routable tenant address, or a unique loopback address. The network controller device receives packets originating from applications and/or an endpoints operating in a network segment associated with a VNID. The network controller device translates, using the translation table, unique loopback addresses and/or routable tenant addresses associated with the packets into routable tenant addresses and/or unique loopback addresses, respectively.
Bit Stream Switching In Lossy Network
Coding and decoding techniques are disclosed in which a plurality of coding parameter sets is transmitted between an encoder and a decoder, each of which is distinguishable from the others by a respective identifier. When a new frame of video is to be coded, an encoder may identify a coding parameter set to be applied during coding, it may code the new frame according to the identified coding parameter set, and it may transmit the coded frame to the decoder along with an identifier of the coding parameter set used during the coding. A plurality of coding parameter sets is persistent at an encoder and the decoder simultaneously.
Mapping PBT and PBB-TE traffic to VPLS and other services
Transferring data in a network is disclosed. Transferring includes receiving a Provider Backbone Transport (PBT) frame, identifying a plurality of location specific identifiers in the PBT frame, mapping the PBT frame to a service based at least in part on the plurality of location specific identifiers, formatting the PBT frame according to the service to obtain a service frame, and transferring the service frame to a network associated with the service.
Cable TV network broadband access system with distributed deployment and centralized control
The present invention provides a cable TV broadband access system with distributed deployment and centralized control, which comprises: a system terminal end, configured to receive and transmit uplink and downlink service data, and receive and respond to access control data and management control data; a system access end, configured to implement data format transformation and data forwarding or processing for said uplink and downlink service data, said access control data and said management control data of said system terminal end, and transmit, receive and respond to management control data of said system access end; a system head end, configured to implement management control and access control for said system access end and said system terminal end, and process, converge and forward said uplink and downlink service data. Said system uses a system architecture with three-stage distributed deployment and centralized control comprising a system terminal end, a system access end and a system head end, and it can not only realize the end-to-end control management and QoS priority assurance of the broadband data service, but can also realize easy network deployment, low comprehensive cost and high management efficiency.
In-line FIX packet translator
Certain embodiments provide systems and methods to perform in-line translation of message content according to FIX protocol variants in a trading system. An example method includes receiving, at a computing device, a message formatted according to a FIX protocol, the message including message content and a message wrapper, the message wrapper providing session and delivery information for the message to a target. The example method includes performing in-line translation of the message content of the received message to adjust the message content according to a predefined set of rules without affecting the message wrapper (with the possible exception of the message size) and message routing session. The example method includes facilitating routing of the message to the target based on the message wrapper.
Data packet routing method and device
The present invention provides a data packet routing method and device. When a Switch receives, form an SE, a traffic flow on which service processing is performed, the Switch can determine a forwarding rule of a corresponding service chain according to the traffic flow received from the SE, and route, according to the forwarding rule, a data packet received from the SE. Compared with a case in the prior art in which an SPC needs to deliver a forwarding rule corresponding to each traffic flow to a Switch, the embodiments of the present invention adopt the technical solutions in which the SPC only needs to deliver a forwarding rule corresponding to each service chain to the Switch, thereby reducing signaling interaction between the SPC and the Switch and saving a network overhead.
System and method for detecting network neighbor reachability
The disclosed system may include (1) a cache module, stored in memory, that stores a neighbor cache entry that specifies whether a neighbor of a network node is reachable according to a detection mechanism, (2) a timeout module, stored in memory, that specifies a timing interval in which to select a reachable time threshold, (3) a reception module, stored in memory, that receives event information about whether the neighbor is active, (4) a biasing module, stored in memory, that biases, based on the received event information about whether the neighbor is active, a selection of the reachable time threshold within the timing interval, and (5) a determination module, stored in memory, that determines whether the neighbor is reachable based at least in part on a determination of whether the selected reachable time threshold has been satisfied. Various other systems and methods are also disclosed.