会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明授权
    • System and method for PE-node protection
    • PE节点保护的系统和方法
    • US07693047B2
    • 2010-04-06
    • US11287801
    • 2005-11-28
    • James GuichardJean-Philippe VasseurClarence FilsfilsPeter De Vriendt
    • James GuichardJean-Philippe VasseurClarence FilsfilsPeter De Vriendt
    • G01R31/08H04L12/28
    • H04L45/04H04L45/02H04L45/22H04L45/28H04L45/50H04L45/54
    • A novel fast reroute (FRR) technique is provided for quickly and efficiently rerouting selected types of network traffic in response to a node or link failure at the edge of a computer network. According to the technique, the network includes first and second edge devices that function as “FRR mates,” such that network traffic originally destined for one FRR mate may be quickly rerouted to the other without having to wait for conventional network convergence. When an edge device receives rerouted packets originally destined for its FRR mate, the device responds by forwarding only those rerouted packets matching the selected traffic types; rerouted packets that do not match the selected traffic types are dropped or otherwise discarded. The first and second edge devices may be statically configured as FRR mates, e.g., by a network administrator, or they may be configured to automatically detect their compatibility as FRR mates.
    • 提供了一种新颖的快速重路由(FRR)技术,用于响应于计算机网络边缘的节点或链路故障,快速有效地重新路由所选类型的网络流量。 根据该技术,该网络包括用作“FRR配对”的第一和第二边缘设备,使得最初发往一个FRR配对的网络业务可能被快速重新路由到另一个,而不必等待传统的网络融合。 当边缘设备接收到最初发往FRR配置的重新路由的报文时,设备只通过转发与所选流量类型匹配的那些重新路由的报文进行响应; 与所选流量类型不匹配的重路由数据包将被丢弃或以其他方式丢弃。 第一和第二边缘设备可以被静态配置为FRR配对,例如由网络管理员,或者它们可以被配置为自动检测它们作为FRR配对的兼容性。
    • 5. 发明申请
    • System and method for PE-node protection
    • PE节点保护的系统和方法
    • US20070121486A1
    • 2007-05-31
    • US11287801
    • 2005-11-28
    • James GuichardJean-Philippe VasseurClarence FilsfilsPeter De Vriendt
    • James GuichardJean-Philippe VasseurClarence FilsfilsPeter De Vriendt
    • H04J1/16
    • H04L45/04H04L45/02H04L45/22H04L45/28H04L45/50H04L45/54
    • A novel fast reroute (FRR) technique is provided for quickly and efficiently rerouting selected types of network traffic in response to a node or link failure at the edge of a computer network. According to the technique, the network includes first and second edge devices that function as “FRR mates,” such that network traffic originally destined for one FRR mate may be quickly rerouted to the other without having to wait for conventional network convergence. When an edge device receives rerouted packets originally destined for its FRR mate, the device responds by forwarding only those rerouted packets matching the selected traffic types; rerouted packets that do not match the selected traffic types are dropped or otherwise discarded. The first and second edge devices may be statically configured as FRR mates, e.g., by a network administrator, or they may be configured to automatically detect their compatibility as FRR mates.
    • 提供了一种新颖的快速重路由(FRR)技术,用于响应于计算机网络边缘的节点或链路故障,快速有效地重新路由所选类型的网络流量。 根据该技术,网络包括用作“FRR配对”的第一和第二边缘设备,使得最初发往一个FRR配对的网络业务可以被快速地重新路由到另一个,而不必等待传统的网络融合。 当边缘设备接收到最初发往FRR配置的重新路由的报文时,设备只通过转发与所选流量类型匹配的那些重新路由的报文进行响应; 与所选流量类型不匹配的重路由数据包将被丢弃或以其他方式丢弃。 第一和第二边缘设备可以被静态配置为FRR配对,例如由网络管理员,或者它们可以被配置为自动检测它们作为FRR配对的兼容性。
    • 6. 发明授权
    • System and methods for network path detection
    • 网络路径检测的系统和方法
    • US07433320B2
    • 2008-10-07
    • US11048077
    • 2005-02-01
    • Stefano PrevidiJames N. GuichardJean-Philippe VasseurDavid D. Ward
    • Stefano PrevidiJames N. GuichardJean-Philippe VasseurDavid D. Ward
    • H04L12/28H04L12/46
    • H04L45/026H04L43/0811H04L45/26H04L45/28H04L63/0272
    • Customer edge (CE) to CE device verification checks initiate routes from available CEs as a set of path verification messages, destined for remote CE routes serving a remote VPN. An extended community attribute, included among the attributes of the path verification message, stores the identity of the originating CE router. The path verification message propagates across the network, and transports the identity of the originating CE router because the originator identity is not overwritten by successive routing. Upon receipt by the remote CE, the originator is determinable from the extended community attribute. A further reachability field is also included in the extended community attribute and indicates whether per CE or per prefix is appropriate for the particular route in question. In this manner, CE-CE connectivity checks identify CEs which are reachable from other CEs. Accordingly, such a mechanism allows for route reachability aggregation on a per-CE or per-prefix reachability basis.
    • 客户端(CE)到CE设备验证检查从可用的CE启动路由作为一组路径验证消息,目的地是服务于远程VPN的远程CE路由。 包含在路径验证消息的属性之间的扩展团体属性存储始发CE路由器的身份。 路径验证消息通过网络传播,并传输始发CE路由器的身份,因为始发方身份不会被连续路由覆盖。 远程CE收到后,发起者可以从扩展团体属性中确定。 扩展社区属性中还包括另外的可访问性字段,并指示每个CE或每个前缀是否适合所讨论的特定路由。 以这种方式,CE-CE连接检查可以识别可从其他CE接入的CE。 因此,这种机制允许基于每个CE或每个前缀可达性的路由可达性聚合。
    • 7. 发明授权
    • Methods and apparatus based on message transmission times
    • 基于消息传输时间的方法和设备
    • US07471636B2
    • 2008-12-30
    • US11063803
    • 2005-02-23
    • Jean-Philippe VasseurStefano PrevidiJames N. GuichardDavid D. Ward
    • Jean-Philippe VasseurStefano PrevidiJames N. GuichardDavid D. Ward
    • H04L12/26
    • H04L12/56
    • A data communication device (e.g., a router) originates a network configuration message in response to a network topology change or so as to refresh a configuration message. The data communication device encodes a timestamp in the network configuration message. The timestamp indicates a time of originating the network configuration message. Further, the data communication device transmits the network configuration message over the network to other network devices that, in turn, initiate further broadcast of at least a portion of contents of the network configuration message. Based on the timestamp of the network configuration message, the data communication devices receiving the network configuration message identify transmission time value indicating how long the network configuration message takes to be conveyed over the network to the other network devices. The data communication devices utilize the transmission time value as a timeout period for determining whether a data communication device failure occurs.
    • 数据通信设备(例如,路由器)响应于网络拓扑变化而发起网络配置消息,以便刷新配置消息。 数据通信设备对网络配置消息中的时间戳进行编码。 时间戳表示发起网络配置消息的时间。 此外,数据通信设备通过网络将网络配置消息发送到其他网络设备,其进一步发起网络配置消息的至少一部分内容的进一步广播。 基于网络配置消息的时间戳,接收网络配置消息的数据通信设备识别表示网络配置消息通过网络传送到其他网络设备多长时间的传输时间值。 数据通信设备利用传输时间值作为用于确定数据通信设备故障是否发生的超时周期。
    • 8. 发明申请
    • DYNAMIC SHARED RISK NODE GROUP (SRNG) MEMBERSHIP DISCOVERY
    • 动态共享风险代码组(SRNG)会员发现
    • US20120117252A1
    • 2012-05-10
    • US13350356
    • 2012-01-13
    • Jean-Philippe VasseurJim GuichardRobert Raszuk
    • Jean-Philippe VasseurJim GuichardRobert Raszuk
    • G06F15/173G06F15/16
    • H04L45/04H04L45/02H04L45/28
    • In one embodiment, a network device determines identities of each peer device in a second routing domain attached to edge devices in a first routing domain. The network device associates each address prefix reachable in the second routing domain with an identity of each peer device in the second routing domain that advertised the address prefix and with an identity of one or more edge devices in the first routing domain to which that peer device is attached. The network device determines an address prefix is associated with a same identity of a peer device in the second routing domain but with different edge devices in the first routing domain. The network device assigns the different edge devices in the first routing domain associated with the determined address prefix to a shared risk node group (SRNG).
    • 在一个实施例中,网络设备确定连接到第一路由域中的边缘设备的第二路由域中的每个对等设备的身份。 网络设备将第二路由域中可达到的每个地址前缀与第二路由域中的每个对等设备的标识相关联,该第二路由域中的每个对等体设备通告地址前缀,并且与该对等设备的第一路由域中的一个或多个边缘设备的标识 被附上。 网络设备确定地址前缀与第二路由域中的对等设备的相同标识相关联,但与第一路由域中的不同边缘设备相关联。 网络设备将与确定的地址前缀相关联的第一路由域中的不同边缘设备分配给共享风险节点组(SRNG)。
    • 9. 发明授权
    • Loop prevention technique for MPLS using two labels
    • 使用两个标签的MPLS环路防护技术
    • US07633859B2
    • 2009-12-15
    • US11046163
    • 2005-01-26
    • Clarence FilsfilsJim GuichardJean-Philippe VasseurStefano B. PrevidiRobert Raszuk
    • Clarence FilsfilsJim GuichardJean-Philippe VasseurStefano B. PrevidiRobert Raszuk
    • H04L12/56
    • H04L45/00H04L45/18H04L45/22H04L45/28H04L45/50H04W12/02
    • A fast reroute (FRR) technique is implemented at the edge of a network. In accordance with the technique, if an edge device detects a node or link failure that prevents it from communicating with a neighboring routing domain, the edge device reroutes at least some data packets addressed to that domain to a backup edge device which, in turn, forwards the packets to the neighboring domain. The rerouted packets are designated as being “protected” (i.e., rerouted) data packets before they are forwarded to the backup edge device. To differentiate which data packets are protected and which are not, the backup edge device employs different sets of VPN label values for protected and non-protected network traffic. That is, the backup edge device may allocate two different VPN label values for at least some destination address prefixes that are reachable through the neighboring domain: a first VPN label value for FRR protected traffic and a second VPN label value for non-protected traffic. Upon receiving a data packet containing a protected VPN label value, the backup edge device is not permitted to reroute the packet a second time, e.g., in response to another inter-domain node or link failure, thereby preventing loops from developing at the edge of the network.
    • 在网络边缘实现快速重路由(FRR)技术。 根据该技术,如果边缘设备检测到阻止其与相邻路由域通信的节点或链路故障,则边缘设备将至少一些寻址到该域的数据分组重新路由到备用边缘设备, 将数据包转发到相邻域。 重新路由的数据包在被转发到备份边缘设备之前被指定为“保护”(即重新路由)数据分组。 为了区分哪些数据包受到保护,哪些数据包不受保护,备份边缘设备对受保护和未受保护的网络流量采用不同的VPN标签值集合。 也就是说,备份边缘设备可以为可通过相邻域到达的至少一些目的地地址前缀分配两个不同的VPN标签值:用于FRR保护的业务的第一VPN标签值和用于非保护业务的第二VPN标签值。 在接收到包含受保护的VPN标签值的数据分组时,不允许备份边缘设备第二次重新路由该分组,例如响应于另一个域间节点或链路故障,从而防止循环在 网络。
    • 10. 发明授权
    • Dynamic shared risk node group (SRNG) membership discovery
    • 动态共享风险节点组(SRNG)成员资格发现
    • US08228786B2
    • 2012-07-24
    • US11101134
    • 2005-04-07
    • Jean-Philippe VasseurJim GuichardRobert Raszuk
    • Jean-Philippe VasseurJim GuichardRobert Raszuk
    • G01R31/08G06F11/00G08C15/00H04J1/16H04J3/14H04L1/00H04L12/26H04L12/28H04L12/56
    • H04L45/04H04L45/02H04L45/28
    • A technique is provided for dynamically discovering shared risk node group (SRNG) memberships of a plurality of interconnected edge devices in a computer network. According to the technique, each edge device “learns” the identities of its directly-attached peer devices situated in neighboring routing domains, e.g., by establishing an interior or exterior gateway routing protocol session with each peer. Thereafter, each edge device advertises the identities of its learned peers to the other interconnected edge devices. Preferably, the peer identities are distributed in novel “peer-router” extended community attributes transported in Border Gateway Protocol (BGP) messages. After an edge device has learned the identity of its own peers and received the identities of the other edge devices' peers, the device can automatically detect SRNG memberships in the computer network. Specifically, edge devices that advertise the same peer are determined to participate in the same SRNG.
    • 提供了一种用于动态发现计算机网络中的多个互连边缘设备的共享风险节点组(SRNG)成员资格的技术。 根据该技术,每个边缘设备例如通过建立与每个对等体的内部或外部网关路由协议会​​话,“学习”其位于相邻路由域中的直接附着的对等设备的身份。 此后,每个边缘设备将其学习的对等体的标识通告给其他互连的边缘设备。 优选地,对等体身份分布在在边界网关协议(BGP)消息中传送的新颖的“对等路由器”扩展社区属性中。 在边缘设备已经学习了自己的对等体的身份并且接收到其他边缘设备的对等体的身份之后,设备可以自动检测计算机网络中的SRNG成员资格。 具体来说,宣告同一对等体的边缘设备被确定为参与相同的SRNG。