H04L45/68

Methods and Systems for Efficient Virtualization of Inline Transparent Computer Networking Devices
20230179563 · 2023-06-08 ·

Network devices that are inserted inline into network links and process in-transit packets may significantly improve their packet-throughput performance by not assigning L3 IP addresses and L2 MAC addresses to their network interfaces and thereby process packets through a logical fast path that bypasses the slow path through the operating system kernel. When virtualizing such Bump-In-The-Wire (BITW) devices for deployment into clouds, the network interfaces must have L3 IP and L2 MAC addresses assigned to them. Thus, packets are processed through the slow path of a virtual BITW device, significantly reducing the performance. By adding new logic to the virtual BITW device and/or configuring proxies, addresses, subnets, and/or routing tables, a virtual BITW device can process packets through the fast path and potentially improve performance accordingly. For example, the virtual BITW device may be configured to enforce a virtual path (comprising the fast path) through the virtual BITW device.

Individual Virtual Private Local Area Network Service Conversion to a Different Virtual Private Network Service

In one embodiment, a plurality of virtual private local area network services (VPLSs) are operated among a plurality of packet switching devices, with the plurality of VPLSs including a first VPLS and a different second VPLS. In response to a conversion declaration including a particular Service Instance VLAN ID (I-SID), the first VPLS corresponding to the particular I-SID is converted to a different type of virtual private network (VPN) service, while continuing to operate the different second VPLS which is not related to the particular I-SID. In one embodiment, the different type of VPN service is Provider Backbone Bridging Ethernet VPN (PBB-EVPN). In one embodiment, the conversion declaration is a Border Gateway Protocol (BGP) Network Layer Reachability Information (NLRI) of Route Type 3 Inclusive Multicast Ethernet Tag (IMET) route.

Method, apparatus, and system for managing label of access network
09800498 · 2017-10-24 · ·

The present invention relates to the field of network communications. An Optical Line Terminal (OLT) allocates a Pseudo Wire (PW) label of an access segment PW for a port, and establishes a corresponding relationship between the port information and the PW label; and carries the corresponding relationship between the port information and the PW label in a label management message, and sends the label management message to an Optical Network Unit (ONU) so that the ONU updates a forwarding table, in which the label management message adopts an access network management protocol. As a consequence, a problem of supporting Pseudo Wire Emulation Edge-to-Edge (PWE3) on a data plane of an access segment of an access network is solved under the conditions that device complexity of the ONU is not increased and a configuration of the ONU is slightly changed.

Method, apparatus, and system for managing label of access network
11258705 · 2022-02-22 · ·

The present invention relates to the field of network communications. An Optical Line Terminal (OLT) allocates a Pseudo Wire (PW) label of an access segment PW for a port, and establishes a corresponding relationship between the port information and the PW label; and carries the corresponding relationship between the port information and the PW label in a label management message, and sends the label management message to an Optical Network Unit (ONU) so that the ONU updates a forwarding table, in which the label management message adopts an access network management protocol. As a consequence, a problem of supporting Pseudo Wire Emulation Edge-to-Edge (PWE3) on a data plane of an access segment of an access network is solved under the conditions that device complexity of the ONU is not increased and a configuration of the ONU is slightly changed.

Call routing discovery for telephony networks

An example path discovery system includes a memory and processing circuitry in communication with the memory. The processing circuitry is configured to obtain routing script metadata associated with a telephony network, to parse routing logic implemented by one or more nodes of the telephony network, to emulate, using the routing script metadata and the parsed routing logic, a traversal path for a call through the telephony network, the emulated traversal path including the one more nodes for which the routing logic is parsed, to store, to the memory, the emulated traversal path and respective final states of runtime variables associated with the one or more nodes included in the emulated traversal path, and to generate, in a machine-readable format, one or more reports indicating a destination of the emulated traversal path in the telephony network and an ingress of the emulated traversal path with respect to the telephony network.

Data transmission method, device, and system

Embodiments of the present application disclose a data transmission method, device, and system, and belong to the field of communications technologies. The method includes: receiving and temporarily storing, by a first node device, a designated service group sent by a second node device; and when the first node device needs to forward multiple SAToP or CESoPSN service packets in the temporarily stored designated service group, determining, by the first node device, whether an asynchronous SAToP or CESoPSN service packet exists in the designated service group, and if yes, acquiring, by the first node device, an adjustment value for the asynchronous SAToP or CESoPSN service packet according to a preset rule, and adjusting the asynchronous SAToP or CESoPSN service packet according to the adjustment value, so that the multiple SAToP or CESoPSN service packets in the designated service group are transmitted synchronously.

Pseudowire protection using a standby pseudowire
09749249 · 2017-08-29 · ·

Providing protection to network traffic includes sending a Pseudowire protection configuration parameter for configuring a standby Pseudowire between a source node and a destination node, receiving a Pseudowire configuration acknowledgement indicating whether the Pseudowire protection configuration parameter has been accepted by the destination node, and in the event that the Pseudowire protection configuration parameter has been accepted by the destination node, using the standby Pseudowire, wherein the standby Pseudowire's configured based at least in part on the Pseudowire protection configuration parameter.

Method for supporting SNCP over packet network
09735864 · 2017-08-15 · ·

A method is presented for supporting SNCP over a packet network connecting to two SDH sub-networks and transporting one or more SDH paths that are SNCP-protected in both SDH sub-networks. The packet network connects to each of two sub-network interconnection points by a working path and a protection path. The packet sub-network may provide the same type of path protection as an SDH sub-network using SNCP, while avoiding bandwidth duplication.

Data-plane driven fast protection mechanism for MPLS pseudowire services

In one embodiment, a source transmits one or more data packets to a destination over a primary pseudowire (PW). When a device on the primary PW detects a downstream failure of the primary PW, and in response to receiving one or more data packets from a source from the failed primary PW, the device adds a loopback packet identifier to the one or more received data packets, and returns the one or more data packets with the loopback packet identifier to the source upstream on the primary PW. Accordingly, in response to receiving the data packet returned with a loopback packet identifier from the primary PW (in response to the downstream failure), the source retransmits the one or more data packets to the destination over a backup PW.

Method and system for reducing packet loss in a service protection scheme

A method for reducing packet loss includes: performing automatic and real-time adjustment to cost values of a first route and a second route, so that the cost value of the corresponding route of the primary pseudo wire (PW) is lower than that of the corresponding route of the secondary PW. A corresponding system is also provided. Automatic and real-time adjustment to cost values of the first route and the second route, enable the cost value of the corresponding route of the primary PW to be lower than that of the corresponding route of the secondary PW, and therefore enable the downlink traffic not passing through the PW that just recovers from a failure, thereby reducing packet loss when the downlink traffic passes through the PW while the primary PW just recovers from a failure.