Abstract:
Load balancing of client transactions, for the duration of a client session, in a Web site is implemented by a cluster of servers. An initial request in each client session is sent to the site load balancer, thus, greatly enhancing the capability of the site to accept new session requests. All subsequent requests from a client are forwarded directly to the server first selected so that the sessions cannot be later broken by the load balancer.
Abstract:
The Committed Information Rate (CIR) functionality is converted to an Adaptive Rate Base (ARB) mechanism. The solution is based on the interaction between a proactive setting of the Explicit Congestion Notifications (ECN) in the Frame Handler (FH) function of the switches and a converging Adaptive CIR algorithm in the Terminal Equipments. The result of this interaction is that when a logical bottleneck is in the process of settling in a switch, the CIR at the Terminating Equipment adapts itself to the throughput of the forming logical bottleneck. Henceforth, the logical bottleneck is exported at the boundary of the network within the Terminating Equipment. The end result is that the data sent by the data link control in the Terminating Equipment is paced so that the output matches that of the weakest point in the network, keeping it busy but not congested.
Abstract:
To assure a complete transmission of frames in communication protocol such as the X25 LAPB a timer is used. The integrity of the transmission is obtained by retransmitting Iframe that are not received. Thus, each frame that is sent is controlled by a timer, called Retry Timer or T1 Timer. A short T1 Timer may cause a de-synchronization of the protocol then a connection loss. The invention aims to avoid this problem. The principle is based on the fact that the T1 Timer value is defined not only according to the speed but also to the workload of the LINK (51). The invention aims to add automatically to the initial value of the T1 Timer a queue delay. This queue delay corresponds to the delay between the enqueue of a buffer pointer (11) and the transmission of this buffer (41) on the Link. Thus, T1 Timer becomes auto-adaptive. The invention consists in performing two actions. The first action is to measure dynamically the queue delay. For this purpose, a transmit scheduler (40) sets a marker (46) in a transmit queue (30). When the transmit scheduler dequeues this marker, it updates the Queue delay in a register (60) and re-enqueues the marker. The second action is to adapt dynamically the T1 Timer. After sending a frame, if the T1 Timer expires without reception of an acknowledgment, then T1 timer is started with another value corresponding the queue delay measured above. And if the timer expires again then the LAPB (10) starts a confirmation mechanism in order to retransmit the Iframe that is not received.
Abstract:
In one embodiment, a network of nodes is configured to communicate according to a configuration of a vertical ladder topology as well as monitoring communication in the network, and/or selectively controls whether or not provisioned particular links will be used. One embodiment colors nodes of the network (e.g., a wireless deterministic network) along different paths through the network and marks packets with the color of each traversed node to track a path taken by a packet. One embodiment sends a particular packet through the network and marks over which links the packet traverses and aggregates these traversed links of other copies of the particular packet. One embodiment controls whether or not the provisioned time slots are used based on flooding a control packet through the network with enable or disable information for each of these links.
Abstract:
In one embodiment, an initial path is established in a wireless deterministic network between a source and a destination through one or more intermediate nodes, which are typically informed of a required metric between the source and the destination for communicating a packet. The initial path is locally (e.g., without contacting a path computation engine) reconfigured to bypass at least one of the intermediate nodes creating a new path, with the new path meeting the requirement(s) of the metric. Note, “locally reconfiguring” refers to the network nodes themselves determining a replacement path without reliance on a path computation engine or other entity (e.g., network management system, operating support system) in determining the replacement path. In one embodiment, a network node not on the initial path replaces a node on the initial path while using the same receive and send timeslots used in the initial path.
Abstract:
One embodiment includes: forwarding a particular packet through an Available Routing Construct (ARC) chain topology network. In one embodiment, this forwarding includes: sending the particular packet by each particular non-edge node on an arc of the plurality of arcs receiving the particular packet to each sibling on the arc that did not send the particular packet to said particular non-edge node, while not sending the particular packet if it was received from both siblings of said particular edge node; and sending the particular packet to a respective child node on a second arc of the plurality of arcs by each particular edge node of two edge nodes on the arc after receiving the particular packet. In one embodiment, the network is a wireless deterministic network with pre-assigned time slots for receiving and subsequently sending a same particular packet by each node of the network.
Abstract:
One embodiment includes signaling, by a first network node to a transmission unit owner node, identifying one or more remaining wireless time slot-frequency pairings of a current transmission unit assigned to the first network node that will not be used by the first network node during the current transmission unit. The transmission unit owner node reassigns one or more of the remaining wireless time slot-frequency pairings to a second network node in the network to use during the current transmission unit. One embodiment includes communicating information between a first network node and a second network node using a particular time slot-frequency pairing, including a particular frame time from the second network node to the first network node, a particular acknowledgement time from the first network node to the second network node, and a particular acknowledgment of the acknowledgment time from the second network node to the first network node.
Abstract:
The present disclosure generally provides techniques for establishing a unique, ephemeral home address (hoa)/home agent address (ha′) address pair that may be limited to use in a session having a defined lifetime. Limiting the use of this dynamic address pair to a session lifetime and by preventing a mobile node from knowing the static address of a home agent may help protect the home agent from attacks.
Abstract:
In one embodiment, a method comprises creating, in a computing network, a loop-free routing topology comprising a plurality of routing arcs for reaching a destination network node, each routing arc comprising a first network node as a first end of the routing arc, a second network node as a second end of the routing arc, and at least a third network node configured for routing any network traffic along the routing arc toward the destination node via any one of the first or second ends of the routing arc, at least one of the first, second, or third network nodes are implemented as a ring-based network having a prescribed ring topology; and establishing loop-free label switched paths for reaching the destination network node via the routing arcs of the loop-free routing topology, the label switched paths independent and distinct from any attribute of the prescribed ring topology.
Abstract:
In one embodiment, a reactive routing computer network may be partitioned into diverse logical topologies, and a source node may transmit route request (RREQ) messages toward a destination node on each logical topology. In response, the source node may receive route reply (RREP) messages indicating routes to the destination node in each logical topology. The source node may thus select a route for each logical topology to reach the destination node, accordingly. In another embodiment, if partitioned logical topologies do not produce two or more routes or as a standalone embodiment, the source node may transmit RREQ messages toward the destination node without any corresponding logical topology. The destination node receives RREQ messages, and two or more routes from the source node to the destination node may be determined (e.g., by the destination or source node) based on the received RREQ messages at the destination node and path selection criteria.