摘要:
A method of establishing a data connection between terminal switching nodes in a network and switching nodes for implementing the method. The method involves switching nodes participating in a network layer wavelength routing (WR) protocol to determine the next hop switching node for every possible combination of terminal nodes based on the network topology. The method also involves the switching nodes participating in a network layer wavelength distribution (ND) once the data connection is to be established. The WR protocol determines the path used through the network, while the WD protocol assigns wavelengths on each link between switching nodes. The wavelengths may be different on different optical links. The switching nodes include wavelength converters with an optical switch or optoelectronic converters with a digital electronic switch. A digital electronic switch can also provide signal reformatting. Advantages of using potentially different wavelengths along various segments of a single end-to-end connection yields increased wavelength efficiency.
摘要:
A system, device, and method for distributing access control information in a communication system uses a reliable multicast mechanism for distributing access control information by a main server to multiple access control devices. A dedicated multicast group is established for distributing the access control information, and each access control device joins the dedicated multicast group. A reliable multicast mechanism is used to distribute the access control information to the multicast group members. Each access la control device obtains the access control information using the reliable multicast mechanism, and stores the access control information in a database for later use in making receiver access control decisions.
摘要:
An apparatus and a method for layer-2 and layer-3 VPN discovery are disclosed. The apparatus is incorporated in a network, and the network includes a first carrier network. The first carrier network includes at least two layer-1 provider edge devices. Layer-1 VPN information is created within the first carrier network. BGP next hop information passes within the first carrier network. The BGP next hop information is for a selected one of the following: a layer-2 VPN-based provider edge device, a layer-3 VPN-based provider edge device, and a layer-2 and layer-3 VPN-based provider edge device. The network also includes a second carrier network within which the BGP next hop information is used for VPN discovery.
摘要:
An architecture which permits externalized management of services includes a number of management service capability (MSC) definitions. Each operator may associate a management service capability with a Service/Service Capability for managing various aspects of the Service/Service Capability. An interface enables a variety of different management systems to utilize a common MSC structure, independent of the information models, transport mechanisms and management interface of the system using the MSC. With such an arrangement, management related integration costs associated with integrating and bundling complex multi-media services is significantly reduced.
摘要:
A call request is sent to establish a telephony session over an Internet Protocol (IP) network between an originating terminal and a destination device. A message responsive to the call request is received from a node connected to the IP network. In response to receiving the message, local generation of a comfort indicator at the originating terminal is performed.
摘要:
A method of brokering a network resource 10 includes providing a service broker processor 12 and a service broker registry 13. On receiving a request at the service broker processor to register a network resource to provide a network service, the service broker processor authenticates the request and authorises registration in the service broker registry. A network client 14 is updated with the availability of the registered network resource so that on receiving a third party request for the network service, the network client requests allocation of the registered network resource. A bearer path 54 is set up between the third party 21 and the network resource 10 to provide the requested network service.
摘要:
A method of providing originator information to an intended communications recipient during establishment of a communication session includes reading, at an originating communication terminal, originator information carried by a device located with the originating terminal, and including at least some of the originator information in at least one signal transmitted by the originating communication terminal during establishment of the communication session for transmission to a communication terminal associated with the intended communications recipient.
摘要:
Forwarding state may be installed for sparse multicast trees in a link state protocol controlled Ethernet network by enabling intermediate nodes to install state for one or more physical multicast trees, each of which may have multiple logical multicast trees mapped to it. By mapping multiple logical multicasts to a particular physical multicast, and installing state for the physical multicast, fewer FIB entries are required to implement the multiple multicasts to reduce the amount of forwarding state in forwarding tables at the intermediate nodes. Mapping may be performed by destination nodes before advertising membership in the physical multicast, or may be performed by the intermediate nodes before installing state when a destination node advertises membership in a logical multicast. Intermediate nodes will install state for the physical multicast tree if they are on a shortest path between a source and at least one destination of one of the logical multicasts that has been mapped to the physical multicast.
摘要:
A consistent tie-breaking decision between equal-cost shortest (lowest cost) paths is achieved by comparing an ordered set of node identifiers for each of a plurality of end-to-end paths. Alternatively, the same results can be achieved, on-the-fly, as a shortest path tree is constructed, by making a selection of an equal-cost path using the node identifiers of the diverging branches of the tree. Both variants allow a consistent selection to be made of equal-cost paths, regardless of where in the network the shortest paths are calculated. This ensures that traffic flow between any two nodes, in both the forward and reverse directions, will always follow the same path through the network.
摘要:
Connectivity fault notification is provided by generating an alarm indication signal at a device that is logically adjacent to the fault, and forwarding the alarm indication signal upward through various levels to at least one client level entity. The alarm indication signal may be suppressed at any level for a service instance if service is restored at that level, or if a protection path prevents disruption of the service instance at that level, or auto-suppressed at an originating node based on number of times transmitted or elapsed time. The alarm indication signal may include a point of failure indicator such as the MAC address of the device that generates the alarm indication signal, or a failed resource identity such as an IEEE 802.1AB LLDP MAC Service Access Point (“MSAP”). Further, the alarm indication signal may be employed to trigger use of the protection path.