Routing protocols and algorithms, referred to collectively as “Link State Path Vector” (LSPV) techniques, are described. The LSPV allows the application of link-state techniques, such as flooding, to path vector protocols. Routing peers may be organized to form multiple levels of hierarchy. The LSPV mechanisms enable these peers to (1) exchange routing information via virtual links and (2) calculate the best network routes in light of the routing information. Routes may be selected on the basis of both topological distance and network policy. Such metrics may be determined by combining otherwise orthogonal metrics for IGPs and EGPs.
Protocols, data structures, algorithms, architectures, and methodologies are described for securing, compressing, and transmitting data in networks. The invention includes data structures for transmission in networks referred to as “network components.” Network components may form nested structures, and may be processed recursively. Features supported by network components, which perform multiple functions including (1) reducing the data exchanged in networks by replacing repeating information with identification numbers and (2) securing data sent in networks at a detailed level of granularity. Network components also allow the use of link-state protocols for supporting large Network Information Bases, such as BGP. Formats of network components may be constructed and/or altered in real-time, or determined from protocol definitions by automated techniques.
Establishment And Enforcement Of Policies In Packet-Switched Networks
Policy domains are introduced, which include methods and algorithms for ensuring policy consistency within defined regions of one or more communications networks. Examples of such policies include network functions such as routing, filtering, security, authentication, information summarization and expansion. These policies may be organized into hierarchies of policy categories. The policy domains include mechanisms for adding and deleting policies while preserving consistency, as well a mechanisms for allowing fast synchronization and convergence of policies between local databases resident different nodes/peers in the networks. Policy domains may be delineated by pre-existing logical topologies, such as autonomous systems, or may have evolving boundaries.
Systems And Methods For Combining And Extending Routing Protocols
Packet formats for routing protocols which combine link state and path vector routing techniques are described. Such protocols are referred to as Link State Path Vector (LSPV) protocols. Embodiments of the invention include extensions to protocols such as the Border Gateway Protocol (BGP) and Intermediate Standard to Intermediate Standard (IS-IS). Embodiments also include packet formats for LSPV protocols which align the bytes of the one or more LSPV protocols with bytes in formats for protocols in the prior art.
Systems And Methods To Support Quality Of Service In Communications Networks
Susan Hares - Saline MI, US John Tavs - Palo Alto CA, US
International Classification:
G06F015/16
US Classification:
709232000
Abstract:
Systems and methods are described for supporting Quality of Service assurances for communication by and between software applications over a best-efforts networks. Characteristic signatures are generated and referenced to segregate traffic on the network into discrete flows. Traffic engineering protocols, such as MPLS, are used to generate discrete paths in the best-efforts network, and flows are routed on such paths based on pre-set policies. The state of individual paths and the network at large are continuously monitored in order to re-map flows on paths and maintain the QoS assurances.
Systems And Methods For Virtual Broadcast Subnetworks
Extensions to the ES-IS protocol are described which include virtual nodes and virtual sub-network identifiers. Techniques for selecting a physical IS forwarder amongst multiple candidates in a virtual node may include tie-breaking mechanisms based on pre-emption values supported by the ES-IS extensions Embodiments allow integration between ES-IS based broadcast networks supporting the Internet Protocol (IP) and the Virtual Router Redundancy Protocol (VRRP). In some embodiments, this integration is accomplished in part by translating packet data units between ES-IS and versions of VRRP. In some such embodiments, nodes on an internetwork maintain concurrent state tables for ES-IS and VRRP.
Secure, Standards-Based Communications Across A Wide-Area Network
Nehru Bhandaru - Sudbury MA, US Michael Cook - Lexington MA, US Webster Gaidos - Stow MA, US Susan Hares - Saline MI, US Owais Hassan - Andover MA, US Michael Carrafiello - Hudson NH, US Albert Lew - Medford MA, US David Morris - Lexington MA, US Martin Mueller - Shrewsbury MA, US Michael Vakulenko - Zichron Yaacov, IL
International Classification:
G06F015/16
US Classification:
709236000, 709232000
Abstract:
The invention includes systems and methods to extend security from enterprise networks to wide-area networks by allowing secure connectivity to the enterprise layer 2 network across a wide-area layer 3 network, such as the Internet
Virtualization Of Control Software For Communication Devices
Wenjing Chu - Sunnyvale CA, US James Li - Sunnyvale CA, US Bisong Tao - San Jose CA, US Susan Hares - Saline MI, US
International Classification:
G06F 9/44 G06F 15/173
US Classification:
719320000, 709223000
Abstract:
A method and system for virtualization of control software for a communication device is disclosed. A virtual communication environment is provided to support the virtualization of communication devices. Such a virtual communication environment creates, links and manages virtual communication processes that are associated with the virtual communication devices.