会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 23. 发明授权
    • Comprehensive model for VPLS
    • VPLS综合模型
    • US08213435B2
    • 2012-07-03
    • US11117250
    • 2005-04-28
    • Ali Sajassi
    • Ali Sajassi
    • H04L12/28G06F15/16
    • H04L12/2898H04L12/4645H04L12/465H04L12/4691
    • A VPLS model is implemented in a network-facing provider edge (n-PE) device configured to receive a packet from an access network; the packet having a first Virtual Local Area Network (VLAN) tag of a first predetermined bit length. The n-PE device mapping the service instance identifier of the first VLAN tag into a second VLAN tag of a second predetermined bit length greater than the first predetermined bit length, the second VLAN tag identifying a Virtual Private LAN Service (VPLS) instance. The n-PE device then sends the packet with the second VLAN tag across a service provider (SP) core network via a pseudowire (PW) that functions as a logical link to another PE device. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. 37 CFR 1.72(b).
    • 在面向网络的提供商边缘(n-PE)设备中实现VPLS模型,其被配置为从接入网络接收分组; 该分组具有第一预定比特长度的第一虚拟局域网(VLAN)标签。 n-PE设备将第一VLAN标签的服务实例标识符映射到大于第一预定比特长度的第二预定比特长度的第二VLAN标签,第二VLAN标签标识虚拟专用LAN服务(VPLS)实例。 然后,n-PE设备通过用作到另一个PE设备的逻辑链路的伪线(PW)在服务提供商(SP)核心网络上发送具有第二VLAN标签的分组。 要强调的是,该摘要被提供以符合要求抽象的规则,允许搜索者或其他读者快速确定技术公开内容的主题。 提交它的理解是,它不会用于解释或限制权利要求的范围或含义。 37 CFR 1.72(b)。
    • 25. 发明申请
    • Failure protection for access ring topology
    • 接入环拓扑失效保护
    • US20100315946A1
    • 2010-12-16
    • US12456100
    • 2009-06-10
    • Samer SalamAli Sajassi
    • Samer SalamAli Sajassi
    • H04L1/00H04L12/26H04L12/28
    • H04L45/28H04L12/437H04L12/4641H04L45/50H04L45/68
    • In one embodiment, a method includes configuring a first node, located at an edge of a core network and connected to an access ring, with a maintenance end point for a virtual local area network on a port connecting the first node to the access ring. The first node operates in an active mode for the virtual local area network and is in communication with a second node located at the edge of the core network and connected to the access ring. The method further includes receiving and processing at a processor at the first node, continuity check messages from access nodes on the access ring, synchronizing the first node with the second node, and communicating from the first node to the second node to initiate switching of the second node from a backup mode to the active mode for the virtual local area network upon identification of a failure.
    • 在一个实施例中,一种方法包括在连接第一节点到接入环的端口上配置位于核心网的边缘并连接到接入环的第一节点,其具有用于虚拟局域网的维护端点。 第一节点以虚拟局域网的活动模式运行,并且与位于核心网络边缘并连接到接入环的第二节点进行通信。 该方法还包括在第一节点处的处理器处接收和处理来自接入环上的接入节点的连续性检查消息,使第一节点与第二节点同步,以及从第一节点到第二节点的通信,以启动 第二节点从备份模式到虚拟局域网的活动模式。
    • 26. 发明申请
    • OPTIMIZED FORWARDING FOR PROVIDER BACKBONE BRIDGES WITH BOTH I&B COMPONENTS (IB-PBB)
    • 具有两个I&B组件(IB-PBB)的提供者背桥的优化转向
    • US20100158024A1
    • 2010-06-24
    • US12342917
    • 2008-12-23
    • Ali SajassiFrancois Edouard Tallet
    • Ali SajassiFrancois Edouard Tallet
    • H04L12/56
    • H04L12/4625H04L12/4633H04L12/4641H04L45/00H04L45/66
    • In one embodiment, when a frame is directed to one or more customer instance ports (CIPs) of a switch having received the frame, the frame (a “local frame”) may be forwarded on the one or more CIPs based on only a customer space (C-space) lookup operation. Also, if the frame is not directed to any CIPs of the switch, the frame (a “transient frame”) may be forwarded on at least one or more provider backbone ports (PBPs) of the switch based on only a backbone space (B-space) lookup operation. For example, a unicast frame may be forwarded based on whether the frame terminates at the switch having received the frame (to a CIP of the switch), while a multicast frame may be forwarded based on determining whether an instance service identifier (I-SID) of the frame maps to a local VLAN ID (L-VID) at the switch (to any CIPs servicing that L-VID).
    • 在一个实施例中,当帧被定向到已经接收到帧的交换机的一个或多个客户实例端口(CIP)时,该帧(“本地帧”)可以仅基于客户端在一个或多个CIP上转发 空间(C空间)查找操作。 而且,如果该帧不是指向交换机的任何CIP,那么帧(“瞬态帧”)可以仅在一个主干空间(B)的交换机的至少一个或多个提供商骨干端口(PBP)上转发 -space)查找操作。 例如,可以基于帧在接收到帧的交换机(到交换机的CIP)是否终止,而可以基于确定实例服务标识符(I-SID)来转发多播帧来转发单播帧 )映射到交换机处的本地VLAN ID(L-VID)(用于为L-VID提供服务的任何CIP)。
    • 29. 发明申请
    • System and method for DSL subscriber identification over ethernet network
    • 通过以太网网络进行DSL用户识别的系统和方法
    • US20060245439A1
    • 2006-11-02
    • US11117017
    • 2005-04-28
    • Ali Sajassi
    • Ali Sajassi
    • H04L12/56
    • H04L12/465H04L12/2881H04L12/66H04L45/00
    • A DSLAM aggregation topology VLAN bundling mechanism includes an edge device port that receives a packet from a Digital Subscriber Line Access Multiplexer (DSLAM) device, the packet including an inner Virtual Local Area Network (VLAN) tag that identifies a Digital Subscriber Line (DSL) subscriber. A processor of the edge device adds an outer VLAN tag to the packet, the outer VLAN tag identifying the DSLAM and a destination server coupled to an Ethernet access network. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. 37 CFR 1.72(b).
    • DSLAM聚合拓扑VLAN绑定机制包括从数字用户线路接入复用器(DSLAM)设备接收分组的边缘设备端口,该分组包括标识数字用户线路(DSL)的内部虚拟局域网(VLAN)标签, 订户。 边缘设备的处理器将一个外部VLAN标签添加到数据包,外部VLAN标签标识DSLAM,以及一个目标服务器耦合到以太网接入网络。 要强调的是,该摘要被提供以符合要求抽象的规则,允许搜索者或其他读者快速确定技术公开内容的主题。 提交它的理解是,它不会用于解释或限制权利要求的范围或含义。 37 CFR 1.72(b)。