H04L12/723

Method for Utilization-based Traffic Throttling in a Wireless Mesh Network
20210367889 · 2021-11-25 ·

A system and method for managing congestion in a multi-hop wireless network, employing congestion notification messages. The technology has three main components: a mechanism at the Medium Access (MAC) layer for determining when a given source or transit node is deemed congested; a mechanism at the Network Layer (NL) determining how to propagate this information to applications, including suitably combining overload indications received from neighbors; and a mechanism at the Transport Layer (TL) of each source of traffic for determining when a source is generating excessive traffic, and combining it with Medium Access Control (MAC)-based overload indication from downstream nodes, thus providing a multi-layer approach to traffic throttling.

SEGMENTED TRACEROUTE FOR SEGMENT ROUTING TRAFFIC ENGINEERING
20210367867 · 2021-11-25 ·

Techniques are described for selectively pinging certain devices along a segment routing label switched path (LSP) to detect failures in the segment routing LSP. For example, an ingress device comprises one or more processors operably coupled to a memory that are configured to: in response to a request to verify connectivity of a segment routing LSP, configure a FEC stack specifying a stack of segment routing labels for the segment routing LSP; for each of the one or more devices identified from the FEC stack: generate a respective MPLS connectivity request packet for a respective device identified from an outermost FEC of the FEC stack; send the MPLS connectivity request packet to the respective device; receive an MPLS connectivity response packet that verifies connectivity of the respective device; and in response, update the FEC stack by removing the outermost FEC of the FEC stack that identifies the respective device.

Cell Site Gateway
20210359936 · 2021-11-18 · ·

A cell site gateway comprises a first interface, a second interface, and a third interface. The first interface is configured to communicate with a cellular base station. The second interface is configured to communicate with a network gateway. The third interface is configured to receive, from a control server, control information for a forwarding layer and comprising a first label and a second label. The forwarding layer is configured to: remove the first label from first packets received from the network gateway via the second interface; attach the second label to second packets received from the cellular base station; and transmit the second packets to the network gateway via the second interface.

PRIORITIZED COMMUNICATION SESSION ESTABLISHMENT IN COMPUTER NETWORKS
20210359956 · 2021-11-18 ·

Techniques are described for prioritized establishment of communication sessions. In one example, a network device parses a configuration file that defines a plurality of communication sessions of a routing protocol and includes priority values assigned to the communication sessions. The network device creates two or more lists of communication sessions for two or more of the priority values based on the configuration file, wherein each list of the two or more lists is created for a particular priority value of the priority values and defines one or more communication sessions of the plurality of communication sessions that are assigned the particular priority value. The network device then establishes the one or more communication sessions included in each list of the two or more lists according to an ordering based on the priority values associated with the two or more lists.

Message transmission method, access node, access controller, and access system
11178073 · 2021-11-16 · ·

A message transmission method, an access node, an access controller, and an access system, where in the method, a message is processed by an access controller instead of an access node such that the access node does not need to support a relay function, reducing operation and maintenance difficulties and costs. In the method, the access controller receives a first message from the access node, and the first message includes a first identifier. The access controller obtains a line identifier according to the first identifier. The access controller obtains a second message according to the line identifier, and the second message includes the line identifier. The access controller sends the second message to a relay server.

Neural network for secure data transport, system and method
11178050 · 2021-11-16 ·

This application discloses a neural network that also functions as a secure packet data network using an MPLS-type label switching technology. The neural network uses its intelligence to build and manage label switched paths (LSPs) to securely transport user packets and solve complex mathematical problems. This architecture is well suited to interconnect large numbers of processors or computers into a secure neural network exhibiting advanced intelligence which can be used for complex activities such as managing the power grid. However, the methods taught here can be applied to other data networks including ad-hoc, mobile, Information Centric, Content Centric, Sensor, and traditional IP packet networks, cell or frame-switched networks, time-slot networks and the like.

METHOD FOR CREATING INTER-DOMAIN BIDIRECTIONAL TUNNEL, COMMUNICATION METHOD AND DEVICE, AND STORAGE MEDIUM
20210352012 · 2021-11-11 ·

Provided is a method for creating an inter-domain bidirectional tunnel. The method includes: receiving, by a node, a path creation message sent by a path computation element, the path creation message including mapping path information for creating an inter-domain label switched path (LSP), and bidirectional tunnel instruction information, and obtaining, by the node, an actual transmission path, which is used for data transmission between intra-domain or inter-domain nodes, based on the mapping path information and the bidirectional tunnel instruction information. The present disclosure further provides a communication method, a communication device, and a computer-readable storage medium.

DiffServ Traffic Engineering compliant backup paths for Fast Reroute protection in MPLS
20210352006 · 2021-11-11 ·

A Point of Local Repair (PLR) network element includes one or more ports and circuitry connected thereto for forwarding and control, wherein the circuitry is configured to receive a PATH message for a Label Switched Path (LSP) tunnel in a Multiprotocol Label Switching (MPLS) network with a specified DiffSery Traffic Engineering (DSTE) Class Type, determine the DSTE Class Type based on the PATH message, and store the DSTE Class Type for the LSP tunnel to ensure a Facility Bypass tunnel used for the LSP tunnel supports the specified DSTE Class Type. The circuitry can be further configured to, responsive to a failure of the LSP tunnel, select the Facility Bypass tunnel for the LSP tunnel such that the Facility Bypass tunnel supports the specified DSTE Class Type.

CONTROL PROTOCOL FOR MULTI-PROTOCOL TRANSPONDER
20210350092 · 2021-11-11 ·

Example systems and methods for controlling communication protocols for multi-protocol interrogators are provided herein. In various implementations a multi-protocol interrogator is provided that is capable of exchanging data with a transponder according to a plurality of protocols and is configured to transmit a control signal indicating a preferred protocol from the plurality of protocols over a radio interface. Multi-protocol transponders are also provided that are configured to receive and recognize the control signal, and respond only on the signaled, preferred protocol.

EVPN signaling using Segment Routing
20210352007 · 2021-11-11 ·

A node in a Segment Routing network includes a plurality of ports and a switching fabric between the plurality of ports, wherein, for an Ethernet Virtual Private Network (EVPN)-Virtual Private Local Area Network Service (VPLS), a port is configured to transmit a packet with a plurality of Segment Identifiers (SID) including a destination SID that identifies a destination node of the packet, a service SID that identifies an EVPN Instance (EVI), and a source SID that identifies one of the node and an Ethernet Segment (ES) that includes the node. The port can be further configured to receive a second packet with a second plurality of SIDs, and learn a Media Access Control (MAC) address based on a second service SID and a second source SID, of the second packet.