Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Spare channel

Subclass of:

370 - Multiplex communications

370216000 - FAULT RECOVERY

370225000 - Bypass an inoperative channel

Patent class list (only not empty are listed)

Deeper subclasses:

Entries
DocumentTitleDate
20130044590METHOD OF TRANSCEIVING SIGNAL IN WIRELESS COMMUNICATION SYSTEM AND APPARATUS THEREOF - A method of processing a signal at a network node of a wireless communication system is disclosed. The method comprises detecting a problem of a first interface; and transmitting a first message to the user equipment via a second interface for suspending data transmission through the second interface. Also, the method further comprises transmitting a second message to the user equipment via the second interface for resuming data transmission through the second interface, if a recovery of the problem of the first interface is completed. Preferably, the method further comprises transmitting a third message to the user equipment via the second interface for releasing connection between the network node and the user equipment, if a recovery of the problem of the first interface is failed.02-21-2013
20130044589SHARED PATH RECOVERY SCHEME - A connection-oriented network has a first working path (W02-21-2013
20130044591ENABLING LOAD BALANCING FOR MPLS-TP - A method of and a device for enabling load balancing for Multiprotocol Label Switching Transport Profile (MPLS-TP) are provided. The method is applied to a process of transmitting data between two Provider Edge (PE) devices that adopt a protection mechanism of primary and backup tunnels. The method comprises allocating, by a source PE device located at a head node of a tunnel, traffic to each of the primary and backup tunnels in a current transmission period based on transmission performance information about each of the primary and backup tunnels in a previous transmission period fed back by a destination PE device located at a tail node of the tunnel, when a set transmission period comes; and obtaining, by said source PE device, the traffic allocated to each of the tunnels and transmitting data to the destination PE device via the corresponding tunnels.02-21-2013
20090219809Redundant mux cnfiguration - A system and method in accordance with the principles of the present invention prevents data from being permanently lost when external interference causes packet loss, and the interference is long enough in duration to cause adjacent packets to be lost. A data packet stream is transmitted. A redundant data packet stream also is transmitted so that any interference does not cause permanent packet loss, since either the original data packet stream or the redundant data packet stream arrives. In one embodiment, the redundant data packet stream is a delayed transmission. In another embodiment, the data packet stream is transmitted over one link and the redundant data packet stream is transmitted over another link. One implementation of the present invention includes a hybrid multiplexer and redundant communications links. When performance of one link degrades, the hybrid multiplexer switches the traffic to the other link.09-03-2009
20080259789METHOD AND APPARATUS FOR RE-ESTABLISHING ANONYMOUS DATA TRANSFERS - One embodiment of the present method and apparatus for re-establishing anonymous data transfers between a first endpoint and a second endpoint in a network includes receiving, from a first node, the identity of a second node connected to the first node, where at least the first node is a neighbor node. A third node (a neighbor node) is then selected, and instructed to connect to the second node in order to establish a link for the path. In this manner, the first endpoint and the second endpoint remain unknown at least to each other (e.g., where “unknown” means that neither endpoint knows any identifying information, such as network address, about the other endpoint), and likely to all other nodes in the path as well. In another embodiment, a failure is detected at a neighbor node, where the neighbor node is part of an original path between the first endpoint and the second endpoint. The neighbor node's repair server is contacted for a repair node associated with the neighbor node, and a connection to the repair node is made such that the path is established in a manner that maintains anonymity of the first endpoint and the second endpoint relative to each other.10-23-2008
20100074105MULTI-HOP WIRELESS BACKHAUL NETWORK AND METHOD - Some embodiments of the invention provide an implementation for a multi-hop wireless backhaul network. These embodiments can advantageously be deployed in dense urban areas and/or co-located with wireless access nodes, such as base-stations of a cellular wireless communication system. Preferably wireless links between constituent network nodes are set-up hierarchically. A basic result of this is that peer-to-peer (child-to-child) communication is generally prohibited and circuits are forced to conform to a topology. The multi-hop wireless backhaul network may be used to carry delay sensitive, high-density last mile circuit traffic over Non-Line-Of-Sight (NLOS) broadband radio links. Moreover, some embodiments of the invention provide a method of path-healing for re-routing of circuit traffic from circuits that have experienced catastrophic failures.03-25-2010
20100074104Method and apparatus for handling abnormal situation in EGPRS system - A method and apparatus for an enhanced general packet radio service (EGPRS) system is provided. A plurality of temporary block flows (TBFs) are established or reconfigured. If fast ACK/NACK reporting (FANR) activation for one TBF is inconsistent with FANR activation for another TBF, the allocated TBFs are aborted.03-25-2010
20130077481NETWORK SYSTEM AND NETWORK REDUNDANCY METHOD - In a network system in which a switch forwarding packets and a control server determining route information are separated, it is desired to achieve a redundancy of the control channel by an out-of-band control channel and an in-band control channel, when the switch receives a control message regarding the flow entry registration and the like based on the route information from the control server. Specifically, the separated switch and control server are connected by a control channel for sending and receiving the control message. The switch is not only connected to a control server via an out-of-band control channel by a route dedicated to the control message, but also connected to another control server via an in-band control channel by a route which is common with a normal data communication for determining the route information, to achieve a redundancy of the control channel.03-28-2013
20130039171METHODS AND APPARATUSES FOR FREQUENCY SPECTRUM SHARING - Techniques are provided for frequency spectrum sharing that allows secondary operators to access a frequency band of a primary operator without interfering with the primary operator's use of the band, while ensuring service continuity for devices of the secondary operators. For example, there is provided a method that may involve identifying an outage on a first channel of a plurality of channels of a spectrum, wherein each of the plurality of channels is allocated to one of a plurality of operators. The method may involve migrating all mobile stations in communication over the first channel of the plurality of channels to at least one other channel of the plurality of channels during the outage.02-14-2013
20130039170METHOD AND APPARATUS FOR PROVIDING AN UPLINK OVER AN ACCESS RING - A method for providing an uplink over an access ring comprising access devices and at least one aggregation device, wherein each device of said access ring has ring interfaces connecting said device to neighboring devices in said access ring, wherein one access device of said access ring is configured as a ring master device which sends connectivity check messages on both its ring interfaces around said access ring to itself to detect a connectivity failure in said access ring, and wherein said ring master device changes a state of one of its ring interfaces depending on the detection result.02-14-2013
20130033981METHOD AND SYSTEM FOR DISTRIBUTING NETWORK TRAFFIC AMONG MULTIPLE DIRECT HARDWARE ACCESS DATAPATHS - A system for distributing network traffic among direct hardware access datapaths, comprising: a processor; one or more activated PNICs; a host operating system; and a virtual machine (VM). Each activated PNIC sends and receives data packets over a network. Each activated PNIC is configured with a virtual function. The VM includes a VNIC and a virtual link aggregator configured to maintain a list identifying each activated PNIC. Virtual function mappings for the VM associate the VM with virtual functions for the activated PNICs. The virtual link aggregator selects the first activated PNIC for servicing a network connection and determines a virtual function for the first activated PNIC. The VNIC for the first activated PNIC uses the virtual function to directly transfer network traffic for the network connection between the VM and the first activated PNIC.02-07-2013
20130033980COMMUNICATIONS SYSTEM PROVIDING ENHANCED CHANNEL SWITCHING FEATURES BASED UPON MODULATION FIDELITY AND RELATED METHODS - A wireless communications system includes a base station, and a communications device configured to communicate with the base station via different wireless communications channels using a modulation standard wherein a received modulation differs from a transmitted modulation (e.g., due to environmental conditions) as measured by a modulation fidelity value. The base station and the communications device are configured to cooperate to determine respective modulation fidelity values associated with a current channel and an alternate channel based upon an estimated modulation fidelity calculated from the received modulation, and to selectively switch between the current channel and the alternate channel based upon the determined modulation fidelity values.02-07-2013
20100046366METHODS AND SYSTEMS FOR PROVIDING A FAILOVER CIRCUIT FOR REROUTING LOGICAL CIRCUIT DATA - Methods and systems are provided to provide a failover circuit for rerouting logical circuit data. In accordance with an example method, an alternate communication path to route data for a logical circuit is identified. The logical circuit includes a communication path through first and second local access and transport areas and an inter-exchange carrier between the first and second local access and transport areas. A currently unused logical circuit is selected to communicate the data over the alternate communication path. The currently unused logical circuit traverses a failover network to reroute the data around the inter-exchange carrier. The currently unused logical circuit is designated as a failover circuit to reroute the data for the logical circuit.02-25-2010
20100110883METHOD AND SYSTEM FOR DETERMINING ALTERNATE PATHS - An approach is provided for determining alternative paths. Information is stored specifying a set of available paths among network elements within a connection-oriented network. The available paths are sorted according to a predetermined criterion. The sorted paths are selectively filtered based on either a particular one of the network elements, a region associated with one or more of the network elements, or a combination thereof.05-06-2010
20090154346METHOD AND APPARATUS FOR PROVIDING A MULTICAST SERVICE WITH MULTIPLE TYPES OF PROTECTION AND RECOVERY - A multicast service method and apparatus for providing multicast service with various types of protections and recoveries. The method includes splitting a multicast service into a plurality of unidirectional point-to-point services from a source node to each sink node, where a signaling message of each unidirectional point-to-point services is independent of one another; establishing, at the source node which publishes the multicast service, one or more label switch paths for each unidirectional point-to-point service with the signaling messages; and receiving a notification message when a failure occurs in the network, where the notification message carries ID(s) of one or more label switch paths that are affected by the failure; establishing, by the source node, a recovered label switch path or a new backup label switch path in response to the notification message.06-18-2009
20090154345METHOD AND NETWORK NODES FOR REPORTING AT LEAST ONE DROPPED-OUT CONNECTION PATH WITHIN A COMMUNICATION NETWORK - A network node in the communication network is a target network node, connected by a first communication path with at least one first and one second network node, connected to each other by means of a further communication path. A routing table is held in each network node. The direct communication path from the first network node to the target network node is entered in the routing table of the first network node as the primary routing path and the path leading from the first network node to the second network node and then to the target network node is entered as the reserve routing path. An analogous entry is made in the routing table of the second network node. The relevant reserve routing path is only used on disruption of the primary routing path. A disruption in the primary communication path, provided between the first network node and the target network node is reported by the first network node, by means of a message sent to the second network node. This controls the second network node such that, on a drop-out of the primary connection path thereof to the target network node, a transmission of data packets to the target network node by means of the reverse routing path, leading from the second network node to the target network node via the first network node, is prevented.06-18-2009
20120213063Disjoint Path Computation Algorithm - A network element implementing Multiprotocol Label Switching to automatically create an optimal deterministic back-up Label Switch Path (LSP) that is maximally disjointed from a primary LSP to provide a reliable back up to the primary LSP. The network element receives a request for a generation of an LSP, determines that the request for the generation of the LSP is for the back-up LSP, locates each link of the primary LSP in a traffic engineering database, modifies each link of the primary LSP to have a link cost significantly greater than an actual link cost to discourage use of each link of the primary LSP in the back-up LSP, executes a Constrained Shortest Path First algorithm to obtain the back-up LSP, wherein the back-up LSP has a maximum disjointedness from the primary LSP due to a modified cost of each link of the primary LSP, and returns the back-up LSP.08-23-2012
20130083652APPARATUS AND METHOD OF SHARED MESH PROTECTION SWITCHING - A method of performing protection switching in which congestion does not occur at a shared segment and that can rapidly perform linear protection switching while using an 1-phase automatic protection switching protocol is provided. An end node that requests protection switching awaits by a time that is previously set to a timer and stops use of a shared protection segment for a standby time of the end node and thus traffic that is injected to a shared node reduces, whereby a congestion situation of a shared protection segment does not occur and thus a protection switching protocol is prevented from abnormally operating.04-04-2013
20120182866SYSTEM AND METHOD FOR VIRTUAL FABRIC LINK FAILURE RECOVERY - Aggregation switches are connected to an edge node by a multi-chassis link aggregation group and a virtual fiber link provides a connection for exchange of information between the aggregation switches regarding MAC addressing to synchronize MAC address tables across the aggregation switches. When failure of the virtual fiber link is detected, the multi-chassis link aggregation group is reconfigured into two or more link aggregates with each link aggregate connecting the edge node to one of the aggregation switches. A spanning tree protocol is initiated over the link aggregates to prevent loops in the network. MAC address tables are flushed and relearned with the two or more link aggregates.07-19-2012
20120182865Systems, Methods, and Apparatuses for Managing the Flow of Traffic in Data Networks - Methods or systems for management and/or optimization of at least a portion of a data network by generating a set of paths between each origin and destination pair, pruning the set of paths to generate a pruned set of paths; and computing an optimum path between each origin and destination pair. Methods and systems for generating a diverse set of path options for the routing of traffic within at least a portion of a network comprising: generating a set of paths between each origin and destination pair; and pruning the set of paths to generate a pruned set of diverse path options within at least a portion of a network.07-19-2012
20130070586Scaling OAM for Point-to-Point Trunking - A shared (proxy) OAM session is performed in a packet-based network on behalf of a plurality of connections. First and second connections are each routed between respective nodes of the network for carrying data traffic. The second connection shares a portion of the routing of the first connection. The shared OAM session is performed along a path which is co-routed with at least part of the shared portion of the routing of the first connection and the second connection. Failure notification signalling is propagated to an endpoint node of each of the first and second connections when the shared OAM session indicates a failure has occurred. The use of a shared OAM session reduces processing at nodes and reduces OAM traffic. Each connection can be a trunk, such as a PBT/PBB-TE trunk, or a service carried within a trunk.03-21-2013
20130088954WIRELESS COMMUNICATION DEVICE - A disclosed wireless communication device performing transmission and reception in a time-division manner includes an antenna, a transmission unit, a reception unit, a transmission/reception switchover unit, a first path switchover unit, a directional coupler, a second path switchover unit, a first fault diagnosis unit, and a second fault diagnosis unit. The second fault diagnosis unit causes the second path switchover unit to form a reflection signal input path; causes a second transmission signal level-adjusted for fault diagnosis to be outputted from the transmission unit; acquires a signal level of a reflection signal from the antenna inputted from the directional coupler into the reception unit; and determines whether or not a transmission radio wave is normally emitted from the antenna based on the signal level of the reflection signal.04-11-2013
20090323522Node apparatus and path setup method - A node apparatus includes: a control unit setting up a path; a path setup time measuring unit measuring path setup time required to set up the path; a path setup time reporting unit reporting the path setup time to another node apparatus on a communication network; a path setup time storage unit storing the path setup time measured at another node apparatus on the communication network when the measured path setup time is reported from the other node apparatus; and an alternate path determining unit determining a path based on the path setup time of each node apparatus stored in the setup time storage unit.12-31-2009
20120218884MPLS FAST RE-ROUTE USING LDP (LDP-FRR) - MPLS (Multiprotocol Label Switching) fast re-routing using LDP (Label Distribution Protocol) is described. A first network element in a MPLS network receives a first label advertised from a second network element in the MPLS network. The first network element computes a shortest path tree (SPT) to reach a destination network element under a potential failure condition. The second network element is a nexthop of the first network element in the computed SPT and is not upstream from the potential failure condition. The first network element advertises a second label to one or more third network elements for a backup LDP LSP (Label Switched Path) that will serve as a backup when the potential failure condition is realized. The third network element(s) are upstream neighbors on the computed SPT with respect to the first network element. The first network element installs a swap action from the second label to the first label.08-30-2012
20090092044SELECTOR IN SWITCHING MATRIX, LINE REDUNDANT METHOD, AND LINE REDUNDANT SYSTEM - There is provided a line redundant method for implementation of line switching in a switching matrix, including the bridge step of outputting a data signal to a plurality of redundant lines in the switching matrix, and the selector step of selecting only a data signal, of a plurality of data signals input from another switching matrix other than the switching matrix through the plurality of redundant lines, which is input through a redundant line required in the switching matrix, and not selecting the data signals input to the switching matrix through the lines other than the required redundant line. A line redundant system for implementing this method is also provided.04-09-2009
20090092043Providing an abstraction layer in a cluster switch that includes plural switches - In a communications network, a cluster switch is provided, where the cluster switch has plural individual switches. An abstraction layer is provided in the cluster switch, such that an interface having a set of ports is provided to upper layer logic in the cluster switch. The set of ports includes a collection of ports of the individual switches. Control traffic and data traffic are communicated over virtual tunnels between individual switches of the cluster switch, where each virtual tunnel has an active channel and at least one standby channel.04-09-2009
20110058472PROTECTION/RESTORATION OF MPLS NETWORKS - In a multi-protocol label system (MPLS) carrying data, a working path carries data from a starting point or node to a destination point or node via a working path. The working path includes the switches and physical media linking starting point and the destination point. MPLS system reliability is enhanced by way of a protection path, over which data can be carried from the starting point to the destination point upon a detected failure along the working path. Upstream messages inform one or more MPLS switching systems to make a switchover from a working path to a protection path.03-10-2011
20130058210METHOD AND SYSTEM FOR INTERRUPT THROTTLING AND PREVENTION OF FREQUENT TOGGLING OF PROTECTION GROUPS IN A COMMUNICATION NETWORK - A method may include determining a first number of events occurring during a first threshold detection duration. The method may further include causing processing of events to cease for a particular throttling duration in response to determining that the first number of events occurring during the threshold detection duration is greater than a predetermined threshold. The method may also include determining a second number of events occurring during a second threshold detection duration. Additionally, the method may include, in response to determining that the first number of events occurring during the first threshold detection duration is greater than the predetermined threshold and that the second number of events occurring during the second threshold detection duration is greater than the predetermined threshold: increasing the time of the particular throttling duration; and causing processing of events to cease for the increased particular throttling duration.03-07-2013
20120224475METHODS AND SYSTEMS FOR AUTOMATICALLY IDENTIFYING A LOGICAL CIRCUIT FAILURE IN A DATA NETWORK - A disclosed example method to identify a failure in a logical circuit involves receiving non-requested trap data from a plurality of switches forming a logical circuit. The logical circuit spans first, second, and third logical networks. The example method also involves polling first and second switches of the logical circuit exclusive of others of the plurality of switches of the logical circuit. The first switch forms a first network-to-network interface between the first logical network and the second logical network. The second switch forms a second network-to-network interface between the second logical network and the third logical network. The first and second switches are selected for polling based on the trap data indicating a problem at the first and second switches. The example method also involves identifying a failure of the logical circuit without manual intervention based on the polling.09-06-2012
20120224474SYSTEMS AND METHODS FOR DISTRIBUTED DATA ROUTING IN A WIRELESS NETWORK - Various systems and methods described herein relate to distributed data routing over a wireless network. An exemplary method comprises receiving routing data by a routing element of a point to point wireless network, the routing data comprising routing criteria and a plurality of path identifiers which identify a plurality of paths through the wireless network, storing the routing data by the routing element, receiving a packet of data, determining a destination node of the packet of data, the destination node being identified using the routing data as accessible by two or more paths of the plurality of paths, determining, based on the routing criteria of the routing data, at least one path of the plurality of paths to transmit the packet of data to reach the destination node, and transmitting the packet of data to a first node of the determined at least one path of the wireless network.09-06-2012
20130064076MULTI-HOP WIRELESS BACKHAUL NETWORK AND METHOD - Some embodiments of the invention provide an implementation for a multi-hop wireless backhaul network. These embodiments can advantageously be deployed in dense urban areas and/or co-located with wireless access nodes, such as base-stations of a cellular wireless communication system. Preferably wireless links between constituent network nodes are set-up hierarchically. A basic result of this is that peer-to-peer (child-to-child) communication is generally prohibited and circuits are forced to conform to a topology. The multi-hop wireless backhaul network may be used to carry delay sensitive, high-density last mile circuit traffic over Non-Line-Of-Sight (NLOS) broadband radio links. Moreover, some embodiments of the invention provide a method of path-healing for re-routing of circuit traffic from circuits that have experienced catastrophic failures.03-14-2013
20130188477DISTRIBUTED CONTROL OF A FAIL-TO-WIRE SWITCH FOR A NETWORK COMMUNICATION LINK - A fail-to-wire (FTW) module preserves a primary data path connection from an upstream computer to a downstream computer if there is any kind of failure in a breakout data path to a breakout system. The FTW module provides switches between the incoming data network data and the breakout system such that when the breakout system encounters a failure, the switches are de-activated to bypass the breakout system. The switches in the FTW module are activated by a system health signal controlled by a health monitor in the breakout system. The health monitor provides intelligent switch control based on alerts from a variety of control points. These control points include firmware, hardware, thermal sensors, subsystem operating systems, subsystem software applications, and appliance tamper logic in order to determine if the FTW module switches should be in an active or inactive state.07-25-2013
20130188478Method and a System for Providing a Flexible Secondary Data Path - A method and an apparatus for providing a flexible secondary data path control, said method comprising the steps of: detecting (S07-25-2013
20090238067DATA TRANSMISSION - In a data transmission system having a plurality of transmitters connected in a ring configuration, a band monitoring unit in each of the plurality of transmitters monitors the bandwidths of a first and a second transmission path between one of the transmitters that comprise the ring and a first and a second transmitter on both sides of said transmitter, respectively. A protection execution unit executes protection processing by setting up a bypass path for each of the first and second transmission paths. Further, when the bandwidth of the first or second transmission path acquired by the band monitoring unit decreases below a threshold, and only when any one of the transmitters comprising the ring and the other transmitters is not executing protection processing, the protection execution unit executes protection processing for the first or second transmission path which is determined to have a bandwidth smaller than the threshold.09-24-2009
20090303874TRANSMISSION NETWORK, TRANSMISSION APPARATUS, CHANNEL SWITCHING METHOD AND PROGRAM FOR TRANSMISSION NETWORK - A transmission network according to the present invention includes an ingress transmission apparatus and relay or egress transmission apparatuses in network channel setting terms, wherein the ingress transmission apparatus includes a switching table in which to register in advance a channel to switch to from a certain channel in the network; a path calculation unit which calculates a channel path in said network and searches for a path to set; a channel switching unit which switches a failed channel in the network to a channel registered in the switching table or a channel searched by a path calculation unit, and a channel setting/removal unit which sends a SET CHANNEL or REMOVE CHANNEL instruction to the relay or egress transmission apparatus.12-10-2009
20090010154Protection Scheme - A protection scheme for a metro optical network involves programming ingress nodes and egress nodes with a primary multicast label switched path (LSP) and a back-up LSP to provide one-to-one protection. The primary and back-up LSPs are configured prior to the occurrence of a network fault to allow the network to transmit multicast communication when the fault occurs. Particularly, multicast communications are sent on the primary LSP during normal operation. However, when a network fault occurs, the nodes also send a duplicate multicast communication over the back-up LSP. Configuring the primary and back-up LSPs prior to the fault occurring avoids the need for signalling to establish a working LSP after a fault occurs.01-08-2009
20120113804BROADBAND COMMUNICATION APPARATUS AND METHOD FOR IMPLEMENTING TELEPHONE SERVICE - A broadband communication apparatus includes a broadband communication module, configured to provide an interaction channel between a terminal and a broadband network; a wireless communication module, configured to provide an interaction channel between the terminal and a wireless network; a monitoring module, connected with the broadband communication module, and configured to trigger a switching module when detecting a failure of the interaction channel between the terminal and the broadband network; and the switching module, configured to connect the interaction channel between the terminal and the broadband network, and when triggered by the monitoring module, configured to connect the interaction channel between the terminal and the wireless network.05-10-2012
20120113803REDUNDANT PSEUDOWIRES FOR BORDER GATEWAY PATROL-BASED VIRTUAL PRIVATE LOCAL AREA NETWORK SERVICE MULTI-HOMING ENVIRONMENTS - A method performed by a provider edge device includes generating pseudo-wire tables based on virtual private local area network service advertisements from other provider edge devices, where the provider edge device services customer edge devices, and establishing pseudo-wires with respect to the other provider edge devices, based on the pseudo-wire tables, where the pseudo-wires include an active pseudo-wire and at least one standby pseudo-wire with respect to each of the other provider edge devices. The method also includes generating and advertising VPLS advertisement to the other provider edge devices, detecting a communication link failure associated with one of the customer edge devices in which the provider edge device services, and determining whether the at least one standby pseudo-wire needs to be utilized because of the communication link failure.05-10-2012
20120236711DOUBLE RING NETWORK SYSTEM AND COMMUNICATION CONTROL METHOD THEREOF, AND TRANSMISSION STATION, AND PROGRAM FOR TRANSMISSION STATIONS - A double ring network system configured with two or more transmission stations each including a pair of bi-directionally communicative communication ports, including any adjacent two transmission stations as terminal stations, and any transmission station as a base, as mutually connected in a ring form by communication ports through a transmission line, for intercommunications between transmission stations, in which the transmission stations are each adapted to determine whether or not frame signals are received from adjacent transmission stations, transmit route identifying frame signals for identification of routes to adjacent transmission stations, when having failed in reception, and set own station as a terminal station substituting for a current terminal station, when having received no responses to the route identifying frames from adjacent transmission stations, so they are kept from arriving at ring-like connected subsequent transmission stations.09-20-2012
20120236710SYSTEM AND METHOD FOR SETTING REDUNDANT PATH SEGMENTS IN A MULTI-RING COMMUNICATION NETWORK - In a multi-ring communication network, first and second rings include first and second connection nodes, respectively, that are adjacently connected to each other. The first connection node receives, from adjacent nods, traffic information storing a pair of input and output node identifiers in association with each of storage areas included in a frame to be transmitted, where the input node identifier identifies an adjacent node from which data is inputted, and the output node identifier identifies an adjacent node to which the data is outputted. When the received traffic information includes the output node identifier identifying the second connection node, the first connection node sets a plurality of redundant path segments each including the second connection node, based on the received traffic information, where the plurality of redundant path segments includes a currently-used path segment.09-20-2012
20130163412SYSTEM AND METHOD FOR SETTING A PATH TO AN ACCESS POINT ACROSS A WIRELESS MESH NETWORK - A node within a wireless mesh network performs a path analysis on an advertised path to an access point that has a cost value less than the cost value of the current primary path to the access point. Depending on the cost value difference between the respective cost values of the advertised path and the current primary path, the node may perform a different type of path analysis. Based on the result of that path analysis, the node may change paths to the access point and use the advertised path as the primary path. Further, the node maintains a secondary path so that, in the event that the primary path fails, the node can default to using the secondary path.06-27-2013
20130163413LAYERED CONTROL OF SERVICE INTERFACE FOR A BREAKOUT COMPONENT IN A MOBILE DATA NETWORK - Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. A breakout component in the radio access network breaks out data coming from a basestation, and performs one or more mobile network services at the edge of the mobile data network based on the broken out data. The breakout component includes a service interface that performs primary control by one system, and backup control by a different system.06-27-2013
20090245102NETWORK BACKUP SYSTEM AND METHOD - A network backup system and method are proposed. The network backup system provides a function for automatically switching network connection lines when a network connection line fails to provide a normal connection, thereby allowing a user to keep processing data transmission via a network system, without any interruption, and data transmission efficiency of the network system to be effectively enhanced.10-01-2009
20110280123Multicast label distribution protocol node protection - In one embodiment, a method includes receiving at a router, a multicast label distribution protocol message comprising local node information for a protected node and one or more leaf nodes downstream of the protected node in a primary label switched path, creating one or more backup label switched paths to the one or more leaf nodes, detecting a failure at the protected node, and forwarding at the router, traffic for the one or more leaf nodes to the one or more backup label switched paths. An apparatus for multicast label distribution protocol node protection is also disclosed.11-17-2011
20090310483NETWORK DEVICE AND LINK SWITCHING METHOD - A network device connecting a plurality of Ethernet links, includes: an Ethernet maintenance and administration section for periodically checking whether a link fault occurs on each Ethernet link; a link manager for updating link status information for each Ethernet link according to a check result of the Ethernet link; and a link switching processor for switching from a fault-detected Ethernet link to another Ethernet link according to link status information of the Ethernet links.12-17-2009
20110122767ORTHOGONAL VECTOR DSL - A wire-based infrastructure capable of delivering high data rates is described herein. A transmission system, reception system, and/or repeater uses wire-mapping code matrices to reduce interference in multi-wire cables to increase the data rate provided by such multi-wire cables. More particularly, code mapping matrices are applied to transmission and/or received input signals to generate a mapped signal for each output wire or corresponding to each input wire such that each mapped signal comprises a different combination of all of the input signals. Different ones of the wire-mapped signals are ultimately transmitted on different wires. In so doing, the present invention facilitates crosstalk reduction, and therefore, provides a technique that increases the data rate available on multi-wire cables.05-26-2011
20110194408FAULT TOLERANT MODE FOR 100BASET ETHERNET - Today, 100BaseT is commonly used in industrial Ethernet application. As a result of being in such an environment, Ethernet cables are subject to abuse, which can result in costly failures and repairs. Here, a system is provided that enables use of remaining and largely undamaged twisted-pairs within Ethernet cables to maintain 100BaseT connections without costly repairs and failures.08-11-2011
20100008222Routing Method in a Label Switching Network - A head router (01-14-2010
20110075554E-SPRING (G.8032) INTERWORKING TO PROVIDE ACCESS PROTECTION - A method of enabling a resilient interface between a first node and a G.8032 Ethernet ring. A Link Aggregation Group (LAG) comprising respective links is provided between the first node and at least two ring nodes of the Ethernet ring. An aggregation function is instantiated at the first node, for distributing subscriber traffic to the links of the LAG in a conventional manner. A first one of the ring nodes is designated as Active, and each of the other ones of the ring nodes are designated as Inactive. At each Inactive ring node, a logical block is imposed on its respective link of the LAG, such that subscriber traffic between the first node and the Ethernet ring is routed by the aggregation function only through the respective link between the first node and the Active ring node.03-31-2011
20130021903Method, Apparatus and System for Dual-Homing Protection Switching - The invention discloses a method for dual-homing protection switching. The method includes: when the bidirectional forwarding detection (BFD) state of a Pseudo Wire (PW) is DOWN, the Provider Edge (PE) disenabling the Ethernet Operation, Administration and Maintenance (OAM) function of a port connected with a Customer Edge (CE); and the CE which has started a master and standby link switching function switching the service traffic to a standby link. The invention also provides corresponding apparatus and system. The invention reduces the influence of network failure on the service, decreases service unavailable probability and improves the service reliability.01-24-2013
20130021902Method for Determining Downlink Time Reference - Disclosed is a method for determining downlink time reference, including: a terminal taking a downlink primary component carrier as a time reference and determining an absolute time to send uplink data according to a time advance based on the time reference. Also disclosed is a method for determining downlink time reference, including: a terminal taking a downlink component carrier which performs random access, or a downlink component carrier corresponding to an uplink component carrier, or another downlink component carrier within a same frequency band as the downlink component carrier corresponding to the uplink component carrier as a time reference, and determining an absolute time to send uplink data according to a time advance based on the time reference.01-24-2013
20120099427METHOD AND ARRANGEMENT FOR ENABLING LINK STATUS PROPAGATION - A system and method for implementation of a process that propagates a link status across a media converter system implemented in a telecom and/or data com network is provided. More specifically, the system comprise XAUI and PMA/PMD interfaces that support both a copper cable and the different types of SFP+/SFP fiber-optic pluggable modules for accessing a host system and a remote link partner, respectively. With the method, the link statuses at both the copper and fiber-optic link sides of the media converter system are being monitored, such that a change of link status at one side of the media converter system will automatically be propagated across the media converter system to the other side, by dynamically enabling or disabling a respective XAUI or PMD transmitter at the opposite side of a physical layer device (PHY) of the media converter system.04-26-2012
20120099426METHOD, SYSTEM, AND DEVICE FOR FORWARDING DATA FRAMES - The present disclosure discloses a method, system, and device for forwarding data frames, and relates to the communication field. The method includes: An upstream near-end device in a faulty part of a working tunnel activates a segmental protection tunnel after receiving a data frame when a part of the working tunnel fails, where the start node of the segmental protection tunnel is the upstream near-end device and the end node of the segmental protection tunnel is a downstream near-end device in the faulty part; the upstream near-end device forwards the data frame to the downstream near-end device through the segmental protection tunnel; and the data frame at the downstream near-end device is forwarded to the destination device through the faultless part of the working tunnel. The present disclosure provides segmental protection for the PBB TE tunnel.04-26-2012
20110299388Implementation Method for Protocol Channel in Ethernet Protection - An implementation method for a protocol channel in Ethernet protection, and the method comprises: setting a block point of the protocol channel in Ethernet protection domain; in the protection domain, the protocol channel maintaining unblocked or maintaining unblocked or blocked synchronously with protected data channel in the protection domain depending on the type of the block point.12-08-2011
20110292791COMMUNICATION NETWORK SYSTEM, DATA TRANSMISSION METHOD, AND NODE APPARATUS - A communication network system includes a processor, and a plurality of node apparatuses using a protocol to establish paths therebetween, wherein the processor determines each of the node apparatuses to be a packet source or a packet destination, and operates to detect an occurrence of failure in two paths being established between the packet source and the packet destination in the communication network system, and wherein the processor transmits packet data including user data through one of the two paths, and when one of the node apparatuses detects an occurrence of a failure in one of the two paths, the processor changes the path to the other path.12-01-2011
20100034081NETWORK CONNECTION APPARATUS AND A METHOD THEREOF - A network connection apparatus includes, a pair of line interface circuits which accommodates each transmission line provided to interface with the circuit-switched network, composes an active line and a standby line of the redundant configuration, and mutually converts data used in the circuit-switched network and a packet used in the packet-switched network; and a packet processing unit which interfaces with the packet-switched network and performs a sending and receiving process of the packet between the line interface circuit and the packet-switched network. The packet processing unit transmits the packet received only from the line interface circuit of the active line to the packet-switched network, and transmits the packet received from the packet-switched network to both of the line interface circuits of the active line and the standby line. The line interface circuit acquires the packet transmitted from the packet processing unit when a destination MAC address included in the packet coincides with a first MAC address which is given to own line interface circuit or a second MAC address which is given to the other line interface circuit of pair for the redundant configuration.02-11-2010
20100039935Deactivating a Packet Tunnel Based On At Least One Performance Characteristic - Network operating methods provide a first packet switch coupled to a second packet switch via a primary packet tunnel having an active status and one or more inactive backup packet tunnels having an inactive status. The methods access data describing at least one performance characteristic of the primary packet tunnel and, based at least on the data, deactivate the primary packet tunnel while still operational and activate one of the backup packet tunnels. Network operating methods provide a first device coupled to a second device via an active primary packet tunnel and one or more inactive backup packet tunnels, access data describing performance characteristics of the one or more backup packet tunnels, and, based at least on the data, deactivate the primary packet tunnel and activate one of the backup packet tunnels.02-18-2010
20100142370PROTECTING CONNECTION TRAFFIC USING FILTERS - A connection between network nodes in a communication network is backed up. A failover label-switched path (LSP) is created starting at a first network node of a connection and ending 06-10-2010
20100128603METHOD FOR THE RECONFIGURATION OF A COMMUNICATIONS NETWORK - A method for reconfiguring a communication network is provided. A first network uses a first network protocol and a second network uses a second network protocol, the two networks being connected by two data links. A first data link is initialized as activated and a second data link is initialized as deactivated. A failure of the first data link is detected by a first bridge of the second network, the first bridge being connected to the first data link. A first data packet is generated by the first bridge and is transmitted to a second bridge of the second network, the second bridge being connected to the second data link. The first data packet is received and processed by the second bridge. The first data packet contains information which initiates a partial implementation of the first network protocol on a port of the second bridge and an activation of the second data link.05-27-2010
20120033549Method and System for Implementing Network Element-Level Redundancy - According to one embodiment, a method may include communicatively coupling a first network element to a second network element via a first path of a point-to-point network. The method may also include communicatively coupling the first network element to a third network element via a second path of the point-to-point network. The method may further include configuring the first path and the second path as paths of a linear protected switching connection such that traffic associated with a service and communicated via one of the first path and the second path may be switched over to the other of the first path and the second path in response to an event.02-09-2012
20110199896Pseudowire Protection Using a Standby Pseudowire - Providing protection to network traffic includes sending a Pseudowire protection configuration parameter for configuring a standby Pseudowire between a source node and a destination node, receiving a Pseudowire configuration acknowledgement indicating whether the Pseudowire protection configuration parameter has been accepted by the destination node, and in the event that the Pseudowire protection configuration parameter has been accepted by the destination node, using the standby Pseudowire, wherein the standby Pseudowire's configured based at least in part on the Pseudowire protection configuration parameter.08-18-2011
20090103432NON-DISRUPTIVE DATA PATH UPGRADE USING TARGET MOBILITY - Described are computer-based methods and apparatuses, including computer program products, for non-disruptive data path modification using target mobility. A management server is in communication with a switching fabric. The switching fabric is in communication with a host and a data storage element. The management server creates a takeover target based on a primary target, where the primary target is part of a virtual data path between the host and the data storage. The switching fabric, through the direction of the server, modifies metadata associated with the virtual data path to expose the takeover target so that the takeover target becomes part of the virtual data path. The management server unexposes the primary target so that the primary target is no longer part of the virtual data path. The delay between exposing the takeover target and unexposing the primary target is sufficiently small to prevent an error condition from occurring at the host.04-23-2009
20090296572TUNNEL ESTABLISHING METHOD, NETWORK NODE DEVICE AND NETWORK SYSTEM - A network node device, a network system and a tunnel establishing method are disclosed. The method is that, when establishing Multi-Protocol Label Switching tunnels, the network node device providing aggregate links, through which Multi-Protocol Label Switching tunnels pass, determines physical bandwidth resources for establishing Multi-Protocol Label Switching tunnels. Since Multi-Protocol Label Switching Traffic Engineering tunnels are directly bundled to physical ports and Link Aggregation is taken as a manner for improving bandwidth, the forward plane each Multi-Protocol Label Switching Traffic Engineering tunnel may obtain the bandwidth allocated by the control plane, and simultaneously, the bandwidth of the Link Aggregation is fully utilized, so as to carry Multi-Protocol Label Switching Traffic Engineering traffic as much as possible, thereby achieving the goal of improving link bandwidth with the Link Aggregation technology.12-03-2009
20100110885METHOD, NETWORK ELEMENT DEVICE AND NETWORK SYSTEM FOR ESTABLISHING CONNECTION BETWEEN MAINTENANCE NODE AND BASE STATION - A method for establishing a connection between a maintenance node and a base station includes the following steps: the base station switches over to a preset standby Operation & Maintenance (OM) channel when an main OM channel fails and sends to the maintenance node via the standby OM channel a notification that the base station has switched over to the standby OM channel; and the maintenance node establishes a connection with the base station over the standby OM channel by using a standby Internet Protocol (IP) address of the base station after receiving the notification. A base station is also provided.05-06-2010
20100110884Method for reconfiguring a communications network - A method of reconfiguring a communications network is provided. A first network using a first network protocol and a second network using a second network protocol are connected by a master data link initialized as activated and two slave data links initialized as inactivated. A failure of the master data link or a slave data link is detected by a master bridge of the second network, the master bridge being connected to the master data link. A first data packet is generated by the master bridge and is transmitted to a slave bridge of the second network, the slave bridge being connected to a slave data link. The slave bridge is selected by the master bridge according to a selection rule. The first data packet contains information which initiates a partial execution of the first network protocol on a port of the slave bridge and an activation of the slave data link by the first network protocol.05-06-2010
20120269058Cross-Layer Reconfiguration Method for Surviving Multiple-Link Network Failures - A second link in a network is reconfigured after failure of a first link, so that multiple-link failures may be survived. After receipt of an OSPF link state advertisement (LSA) indicating use of a backup path b10-25-2012
20100061231MULTI-DOMAIN NETWORK AND METHOD FOR MULTI-DOMAIN NETWORK - Each domain of a multi-domain network collects intra-domain routing information relating to that domain and makes a reduced view of that information available to other domains of the network, and in which each domain of the network uses its own intra-domain routing information together with the reduced-view routing information from the other domains to form a logical view of the network so as to enable that domain to make an end-to-end route selection decision.03-11-2010
20100157794METHOD FOR FINDING PROTECTED PATH IN MESH NETWORKS - A method of finding a primary communication path in a mesh network, which would be at once a protected path having a fully guaranteed segmented node or node-link protection. The method comprises defining a required protection type and further selecting each specific path segment of the desired communication path based on initial user's requirements and topology information of the network. Each specific node path segment N for the communication path is selected upon ensuring that it can be protected in the network by a node backup path satisfying the initial user's requirements. Each specific link path segment L for the communication path is chosen if it can be protected in the network by a link backup path satisfying the initial user's requirements and if the node path segment N to which segment L leads cannot be protected by a suitable node backup path.06-24-2010
20090034413Redundancy for point-to-multipoint and multipoint-to-multipoint ethernet virtual connections - A method and system for redundancy in Ethernet Virtual Connections (EVCs) are disclosed. In one embodiment, a method includes transmitting continuity check messages from a node in an Ethernet Virtual Connection connecting at least one root node and a plurality of leaf nodes in a point-to-multipoint or multipoint-to-multipoint connection, identifying a failure in a primary path between the root node and the leaf nodes, switching to a backup path, and advertising the switching to the backup path to at least one node.02-05-2009
20090252033SYSTEM AND METHOD OF DISTRIBUTING MEDIA CONTENT - Systems and methods to distribute media content are provided. A particular method includes receiving first link weighting factors and second link weighting factors at a router of a node of a multicast network and determining a primary path to a next hop node based on the first link weighting factors. Additionally, the method includes determining a backup path from a router of the primary path to the next hop node based on the second link weighting factors. The backup path does not overlap any primary path between two nodes of the network. Further, the method includes receiving a data packet from a parent node and routing a copy of the data packet from the router to the next hop node via the backup path, when a network link related to the router has failed. The method also includes routing data packets via a re-configured multicast tree that excludes the failed link.10-08-2009
20130182563Method of Enhanced Connection Recovery and Loss-less DATA Recovery - An enhanced connection recovery upon lost RRC connection due to radio link failure (RLF) or handover failure (HOF) is proposed. A UE first establishes an RRC connection in a source cell in a mobile communication network. Later on, the UE detects a failure event and starts an RRC reestablishment procedure in a target cell to restore the RRC connection. In a first novel aspect, a fast NAS recovery process is applied to reduce the outage time in the target cell. In a second novel aspect, context fetching is used to reduce the outage time in the target cell. In a third novel aspect, a loss-less reestablishment procedure is proposed to reduce data loss during the connection recovery.07-18-2013
20130182562TECHNIQUES FOR DETERMINING LOCAL REPAIR PATHS USING CSPF - Techniques for computing a path for a local repair connection to be used to protect a connection traversing an original path from an ingress node to an egress node. The computed path originates at a node (start node) in the original path and terminates at another node (end node) in the original path that is downstream from the start node. A Constraint Shortest Path First (CSPF) algorithm may be used to compute the path. The computed path is such that it satisfies one or more constraints and does not traverse a path from a first node in the original path to a second node in the original path, wherein the first and second nodes are upstream from the start node in the original path and the second node is downstream from the first node in the original path. A local repair connection may then be signaled using the computed path.07-18-2013
20130121139FAIL TO WIRE REMOVABLE MODULE FOR NETWORK COMMUNICATION LINK - A fail-to-wire (FTW) module that preserves a primary data path connection from an upstream computer to a downstream computer if there is any kind of failure in a breakout data path to a breakout system. The FTW module provides switches between the incoming data network data and the breakout system such that when the breakout system encounters a failure, the switches are de-activated to bypass the breakout system. The switches in the FTW module are activated by a system health signal from the breakout system. The breakout system can be serviced without interrupting the data network connections since the FTW module can be extracted from the failed breakout system with data network connections intact. The FTW module is preferably a compact modular element that fits within the breakout chassis and is easily inserted and removed from the breakout system during servicing operations.05-16-2013
20130121140METHOD OF SHARED MESH PROTECTION SWITCHING - A method of performing shared mesh protection switching in a sharing node is provided. The method includes: receiving a request message from a first terminal node, having detected a signal failure of a working path; copying the request message and forwarding a request message to an adjacent node on a first protection path of a plurality of protection paths; determining whether a sharing resource is available; transmitting, if a sharing resource is available, an available message to a second terminal node forming a pair with the first terminal node; and receiving a response message from the second terminal node, having received the available message from all sharing nodes on the first protection path.05-16-2013
20130121142METHOD AND APPARATUS FOR FORWARDING MULTICAST TRAFFIC - Embodiments of the present invention provide a method and an apparatus for forwarding multicast traffic. The method includes: receiving a third multicast join message; in response to the third multicast join message, sending a first multicast join message to a first upstream router, and establishing an active path; in response to the third multicast join message, sending a second multicast join message to a second upstream router, and establishing a standby path; and sending multicast traffic to the multicast receiver through the active path, where the standby path does not forward the multicast traffic. In the foregoing embodiments, the standby path that does not forward the multicast traffic is established beforehand, so that when a fault occurs in the active path, the standby path established beforehand can be used to forward the multicast traffic.05-16-2013
20090257348REDUNDANT ETHERNET AUTOMATIC PROTECTION SWITCHING ACCESS TO VIRTUAL PRIVATE LAN SERVICES - Embodiments disclosed herein provide redundant connectivity between an Ethernet Automatic Protection Switching (EAPS) access network and a Virtual Private LAN Service (VPLS) network. A first VPLS node is provided to function as an EAPS controller node. A second VPLS node is provided to function as an EAPS partner node. The first and second VPLS nodes are linked by a pseudowire and an EAPS shared-link. Additional EAPS nodes are also provided. The additional EAPS nodes are linked to each other and one of the additional EAPS nodes is designated as a master node. Links are also established between the VPLS nodes and the EAPS nodes such that one or more EAPS rings are formed. Each EAPS ring includes the shared-link between the first and second VPLS nodes. The EAPS rings are monitored to detect link failures. When a failure of the pseudowire shared-link between the first and second VPLS nodes is detected, all pseudowire links associated with the first VPLS node are disabled if any of the EAPS nodes has a path to both of the VPLS nodes. Otherwise, the existing pseudowire links associated with the first VPLS node are maintained.10-15-2009
20100265820FAULT PROCESSING METHOD, SYSTEM AND EXCHANGING DEVICE BASED ON INDUSTRY ETHERNET NETWORK - A fault processing method based on industry Ethernet network, wherein exchanging devices in the network are connected by mutual redundant double links, wherein work link is in working state, the spare link is in spare state, and the method includes: detecting connection states of the double links between the exchanging devices in the network (10-21-2010
20120195191CONNECTIVITY FAULT MANAGEMENT TRAFFIC INDICATION EXTENSION - A method for detecting a mismatch between a first port and a second port includes determining whether a destination address associated with the second port and a virtual local access network identifier (VID) for a service instance monitored by a first maintenance end point are included in a table of the first port. The method further includes setting a traffic field in a first continuity check message. The method additionally includes receiving, at the first maintenance end point, a second continuity check message that includes a traffic field. The method also includes detecting a mismatch when the value of the traffic field in the second continuity check message does not match the value of the traffic field in the first continuity check message.08-02-2012
20090257349DATAGRAM RELAYING APPARATUS WITH LOAD DISTRIBUTING FUNCTION - A datagram relaying apparatus includes a plurality of protocol terminating units, and a destination determining processor. The destination determining processor includes a path selecting section which determines a transfer destination route for a stream of packets received from any of the protocol terminating units. The path selecting section determines whether or not transfer of the received stream of packets to the transfer destination route is in an inhibition state, and selects another transfer destination route when the transfer of the packet to the transfer destination route is in the inhibition state.10-15-2009
20100149968Vehicle Active Network - A vehicle active network (06-17-2010
20100165837METHOD AND APPARATUS FOR TESTING BACKUP SITES IN A VOICE OVER INTERNET PROTOCOL NETWORK - In one embodiment, the present invention is a method and apparatus for testing backup sites in a Voice over Internet Protocol network. In one embodiment, a method for testing a backup site in a communications network includes simulating, in the network, a failed customer call and outputting an indicator to indicate whether the failed customer call was successfully re-routed from a primary site to the backup site. The testing of the backup site occurs in a manner that minimizes impact to the routing of customer calls destined for the primary site.07-01-2010
20100002578Resiliency Schemes in Communications Networks - A connection oriented communications network 01-07-2010
20130215739ROUTING METHOD FOR A WIRELESS MULTI-HOP NETWORK - Disclosed is a routing method named lock routing for a wireless multi-hop network, which can be based on next-hop routing and source routing and named next-hop lock routing and source lock routing respectively. The routing method utilizes traffic packets to monitor the link quality and utilizes local broadcast to help a source node keep track of the varying network topology in order to update a route path to a destination node. In local broadcast, routing control messages can be forwarded by path nodes and neighbors of an old route path, which reduces the routing control overhead and enhances the network scalability. A route update process can be triggered by the link quality and the path node state and is used to maintain ongoing traffic flows and extend the network lifetime.08-22-2013
20130215740METHOD AND APPARATUS FOR AUTOMATIC VPN LOGIN ON INTERFACE SELECTION - A method and device for automatic login of a virtual private network on an interface change, the method: associating a virtual private network profile with a plurality of connection interfaces, each connection interface within the plurality of connection interfaces having a priority; monitoring the plurality of connection interfaces for availability; if a connection interface with a higher priority than the connection interface currently used by the virtual private network becomes available, utilizing the higher priority connection interface for the virtual private network; and if the connection interface currently used by the virtual private network becomes unavailable, transferring the virtual private network to a highest priority available connection interface within the plurality of connection interfaces.08-22-2013
20100226246PSEUDOWIRE TUNNEL REDUNDANCY - The invention is directed to providing pseudowire tunnel redundancy for VPLS and VLL services in the form of automatic protection switching of the service from a primary pseudowire tunnel to a backup pseudowire tunnel upon detection of a failure affecting the primary pseudowire tunnel. Embodiments of the invention monitor event notifications reported by a network management entity for an indication of a failure affecting the primary pseudowire tunnel; and responsive to detecting the indication, switch a service carried by the primary pseudowire tunnel to the backup pseudowire tunnel. Such event notifications include those corresponding to any of provider edge routers, interface ports, service access points, spokes, and tunnel endpoints that are related to operation of the primary pseudowire tunnel09-09-2010
20100208584COMMUNICATION NODE APPARATUS, COMMUNICATION SYSTEM, AND PATH RESOURCE ASSIGNMENT METHOD - In a communication system, including a plurality of communication node apparatuses, for establishing a path for communication by exchanging a message among the plurality of communication node apparatuses, before establishing a path, an identifier of a path for which reuse of resources of the path to be established is permitted or inhibited is determined, and the determined identification information is included in a control message so that the path is established. A communication node apparatus in which the path has been established determines availability of reuse of resources the path based on the identification information in the control message. When an event such as failure occurrence, occurrence of resource reuse or dissolution of resource reuse occurs, the communication node apparatus executes path priority change processing, so that priority can be changed such that resource reuse can be performed most efficiently.08-19-2010
20090290488TRANSMISSION SYSTEM, PATH CONTROL METHOD AND TRANSMISSION DEVICE - The present invention is a transmission system, a path control method, and a transmission device, and is the path control method in the transmission system forming a virtual concatenation group by virtually concatenating each path signal transmitted through a plurality of paths being a logical communication path, which manages an active state and a stand-by state of member paths of the virtual concatenation group and when there is abnormality in any of the member paths in the active state, controls any of the member paths in the stand-by state to the active state in place of the abnormal member path, thereby realizing more flexible and efficient path level redundancy.11-26-2009
20090073875Method, apparatus and program storage device for providing mutual failover and load-balancing between interfaces in a network - A method, apparatus and program storage device for providing mutual failover and load-balancing between interfaces in a network is disclosed. An active virtual interface and a passive virtual interface are provided for each of a first and a second computer interface. The active virtual interface of the first computer interface is communicatively coupled with the passive virtual interface of the second interface. The active virtual interface of the second computer interface is communicatively coupled with the passive virtual interface of the first computer interface. Data flow is directed over each of the first computer interface-active virtual interface and second computer interface active virtual interface when the first and second computer interface is available, else data flow is directed to the active virtual interface and passive virtual interface of an available first or second interface.03-19-2009
20090168647Interworking an Ethernet Ring Network and an Ethernet Network with Traffic Engineered Trunks - Interworking an Ethernet Ring network with an Ethernet network with traffic engineered trunks (PBT network) enables traffic engineered trunks to be dual homed to the Ethernet ring network to enable for protection switching between active and backup trunk paths in the PBT network. In one embodiment, the active path will terminate at a first bridge node on the Ethernet ring network and the backup path will terminate at a second bridge node on the Ethernet ring network. Trunk state information is exchanged between the bridge nodes to enable the bridge nodes to determine which of the active and backup paths should be used to forward data on the trunk. Upon a change in trunk state, a flush message is transmitted on the Ethernet ring network to enable the nodes on the Ethernet ring network to relearn the path to the new responsible bridge node.07-02-2009
20130128728METHOD AND SYSTEM FOR SWITCHING APS SERVICE CHANNEL AND AUTOMATIC PROTECTION SWITCHING DEVICE - A method and a system for switching an APS service channel, and an automatic protection switching device are disclosed. The method includes: a first recovered side reaches a wait-to-restore (WTR) state when the first recovered side receives information about transition to the WTR state from a second recovered side if a current state of the first recovered side is a first No Request (NR) state and if a state prior to transition to the first NR state is a Signal Fail (SF) state; and the first recovered side reaches a second NR state upon expiry of a WTR time of the first recovered side after receiving WTR time expiry information sent by the second recovered side. Therefore, the user can know the WTR state of the first recovered side clearly.05-23-2013
20100296394AUTOMATIC PROTECTION SWITCHING OF VIRTUAL CONNECTIONS - A method and system provision a first virtual connection between a first device and a second device; and provision a second virtual connection between the first device and a third device. A first bridge function is configured to control switching associated with the first virtual connection. A second bridge function is configured to control switching associated with the second virtual connection. A parent bridge function is configured to control switching on the first bridge function and the second bridge function, wherein the first virtual connection comprises an active connection and the second virtual connection comprises a standby connection, and wherein the parent bridge function switches traffic to the second bridge device upon determining that the first virtual connection has failed.11-25-2010
20110110227RADIO-LINK RELIABILITY USING MULTI-CARRIER CAPABILITY IN WIRELESS BROADBAND SYSTEMS - Embodiments of a system and methods for improving radio link reliability using multi-carrier capability in wireless systems are generally described herein. Other embodiments may be described and claimed.05-12-2011
20110110226Disjoint Path Computation Algorithm - A network element implementing Multiprotocol Label Switching to automatically create an optimal deterministic back-up Label Switch Path (LSP) that is maximally disjointed from a primary LSP to provide a reliable back up to the primary LSP. The network element receives a request for a generation of an LSP, determines that the request for the generation of the LSP is for the back-up LSP, locates each link of the primary LSP in a traffic engineering database, modifies each link of the primary LSP to have a link cost significantly greater than an actual link cost to discourage use of each link of the primary LSP in the back-up LSP, executes a Constrained Shortest Path First algorithm to obtain the back-up LSP, wherein the back-up LSP has a maximum disjointedness from the primary LSP due to a modified cost of each link of the primary LSP, and returns the back-up LSP.05-12-2011
20110026397CONNECTIVITY FAULT MANAGEMENT TRAFFIC INDICATION EXTENSION - A method in a Maintenance Association Endpoint, MEP, for controlling traffic between a first network element and a second network element connected by a working Traffic Engineering Service Instance, TESI, and a protection TESI. The first network element sets a Traffic field in a Connectivity Check Message, CCM, sent to the second network element. The Traffic field may be set by utilizing a reserved bit within a Flags field of the CCM. The Traffic field indicates which TESI is being utilized to transport the traffic. The second network element takes action to control the traffic based upon a value of the Traffic field in the received CCM. When the Traffic field value in the received CCM does not match the Traffic field value in CCMs sent from the second network element for a predefined period of time, the second network element moves the traffic from its current TESI to the other TESI.02-03-2011
20100172237Building backup tunnels for fast reroute in communications networks - In one embodiment, a method includes identifying at a node, a destination for which a primary path is defined between the node and the destination, transmitting a request message to a neighbor node for routing information for a backup path between the node and the destination, receiving a reply message containing an address identifying the backup path, and building a backup tunnel to the address. The request message includes at least one node identified as a node to be avoided in the backup path and a request cost. An apparatus for building backup tunnels is also disclosed.07-08-2010
20110116367Systems, Methods And Computer Readable Media For Utilizing Spare Capacity Of Links Within A Network - Systems, methods and computer-readable media for utilizing spare link capacities of links within a communications network are described. According to one aspect, a method for utilizing spare network capacity on a communications network includes determining a spare capacity of a plurality of links within the communications network. Upon determining the spare capacity of the plurality of links, a portion of the plurality of links according to the spare capacity of the plurality of links is selected. A standby network including the selected portion of the plurality of links is established, and traffic is routed through the standby network.05-19-2011
20100080120PROTECTED-FAR-NODE-BASED SOLUTION FOR FAULT-RESILIENT MPLS/T-MPLS MULTICAST SERVICES - A system and method providing fault resilient multicast services using a network topology in which a source node communicates with a plurality of receiver nodes via at least two disjoint paths in which at least one receiver node is provisioned according to a 1+1 protection mechanism.04-01-2010
20090080327Mechanism and method for non-service affecting APS protection for MLPPP bundles on routing systems - A method of non-service affecting APS protection for MLPPP bundles on routing systems, and associated mechanism, including one or more of the following: specifying a working MLPPP bundle and a protection MLPPP bundle; specifying MLPPP parameters; associating the working MLPPP bundle and the protection MLPPP bundle with an APS circuit; bringing up an MLPPP session; changing an operational status of the working MLPPP bundle; synchronizing MLPPP state information between the working MLPPP bundle and the protection MLPPP bundle; and driving an operational status of the protection MLPPP bundle based on said changing the operational status of the working MLPPP bundle.03-26-2009
20110249552REDUNDANT ETHERNET AUTOMATIC PROTECTION SWITCHING ACCESS TO VIRTUAL PRIVATE LAN SERVICES - Embodiments disclosed herein provide redundant connectivity between an Ethernet Automatic Protection Switching (EAPS) access network and a Virtual Private LAN Service (VPLS) network. A first VPLS node is provided to function as an EAPS controller node. A second VPLS node is provided to function as an EAPS partner node. The first and second VPLS nodes are linked by a pseudowire and an EAPS shared-link. Additional EAPS nodes are also provided. The additional EAPS nodes are linked to each other and one of the additional EAPS nodes is designated as a master node. Links are also established between the VPLS nodes and the EAPS nodes such that one or more EAPS rings are formed. Each EAPS ring includes the shared-link between the first and second VPLS nodes. The EAPS rings are monitored to detect link failures. When a failure of the pseudowire shared-link between the first and second VPLS nodes is detected, all pseudowire links associated with the first VPLS node are disabled if any of the EAPS nodes has a path to both of the VPLS nodes. Otherwise, the existing pseudowire links associated with the first VPLS node are maintained.10-13-2011
20120120793METHODS AND APPARATUS FOR PROTECTING A COMMUNICATIONS NETWORK - The invention relates in general to a communications network, and more particularly, to methods and apparatus for protecting such a network. The methods and apparatus disclose the providision path protection in a communications network (05-17-2012
20100302938Systems and Methods for Protecting a Trunk with Multiple Trunks - A system and method for protecting a trunk with multiple trunks may select a primary path on a first trunk for which to place a corresponding bypass tunnel on a second trunk. The system and method may further select one or more alternate trunks using a constraint-based trunk-selection algorithm. The system and method may further determine if at least one of the selected alternate trunks has sufficient priority bandwidth. In the event that one or more alternate trunks have priority bandwidths larger than the physical bandwidth of the primary path, the system and method may select an alternate trunk from the one or more alternate trunks having priority bandwidths larger than the physical bandwidth of the primary path based on a pre-determined order of priority bandwidth.12-02-2010
20080247309Method And Device For Realizing Primary-Backup Protective Of Low Order Cross Apparatus - A method and device are used for realizing primary-backup protective of low order cross apparatus of SDH low order virtual container deploy based on switching network. The method includes distributing multicast ID as the destination address of code flow of high order virtual container, wherein the high order virtual container includes SDH low order virtual container to be deployed and the multicast ID is directed respectively to the port connected to the two or more than two low order cross apparatuses in switching network; closing the connected channel between the switching network and said backup low order cross apparatus; and opening the connected channel between the switching network and one of the backup low order cross apparatus when the primary low order cross apparatus fails. The method can efficiently perform primary-backup rearrangement when SDH low order virtual container is deployed based on switching network.10-09-2008
20080253283Methods and Apparatus for Effective On-Line Backup Selection for Failure Recovery in Distributed Stream Processing Systems - A failure recovery framework to be used in cooperative data stream processing is provided that can be used in a large-scale stream data analysis environment. Failure recovery supports a plurality of independent distributed sites, each having its own local administration and goals. The distributed sites cooperate in an inter-site back-up mechanism to provide for system recovery from a variety of failures within the system. Failure recovery is both automatic and timely through cooperation among sites. Back-up sites associated with a given primary site are identified. These sites are used to identify failures within the primary site including failures of applications running on the nodes of the primary site. The failed applications are reinstated on one or more nodes within the back-up sites using job management instances local to the back-up sites in combination with previously stored state information and data values for the failed applications. In additions to inter-site mechanisms, each one of the plurality of sites employs an intra-site back-up mechanism to handle failure recoveries within the site.10-16-2008
20110096661REDUNDANCY IN VOICE AND DATA COMMUNICATIONS SYSTEMS - A method includes receiving information at an interface circuit and providing the information from the interface circuit to a processing circuit through a direct communications path between the interface circuit and a processing circuit, which processes the information received from the interface circuit. The method further includes providing the information from the interface circuit to the processing circuit via a crosspoint switch in response to a failure of the direct communications path, wherein the direct communication does not pass through the crosspoint switch.04-28-2011
20100214910PROTECTED VARIABLE DATA RATE COMMUNICATION SYSTEMS - A protected point-to-point ACM communication system including at least a first component and a second component configured to provide live functionality and backup functionality for each other, at least a first receiver and a second receiver configured to receive an ACM transmission, one or more quality detectors configured to estimate quality of the received transmission of at least the first receiver and the second receiver, wherein at least one of the quality detectors is configured to estimate the quality of the received transmission using blind detection, and a controller configured to switch the live functionality of the protected point-to-point ACM communication system from one of the first component and the second component to another of the first component and the second component, based, at least partly, on the estimated qualities of the received transmissions of at least the first receiver and the second receiver. Related apparatus and methods are also described.08-26-2010
20100067373REDUNDANCY IN VOICE AND DATA COMMUNICATIONS SYSTEM - Apparatus is used in communicating in a data and voice communication system. The apparatus includes a line card and a crosspoint switch in communication with the line card. The apparatus also includes an accelerator card in communication with the line card and the crosspoint switch. The crosspoint switch is configured to provide a redundant communications path between the line card and the accelerator card.03-18-2010
20100067372SYSTEM AND METHOD FOR USING AN ALTERNATIVE WIRE PAIR FOR COMMUNICATION ON INITIAL WIRE PAIR FAILURE - A system and method for using an alternative wire pair for communication on initial wire pair failure. Upon detection of a failure in a wire pair, an alternative set of one or more wire pairs can be used to support the Ethernet communication. In one embodiment, the alternative wire pairs are kept in a hot standby mode to enable almost instantaneous switching. In another embodiment, an enhanced autonegotiation process is used to automatically identify the alternative set of wire pairs that can support the Ethernet communication.03-18-2010
20120063302RANDOM ACCESS DESIGN IN A MULTIPLE COMPONENT CARRIER COMMUNICATION NETWORK - User equipment, systems, apparatuses, methods and/or computer program products are provided to facilitate random access procedures in a wireless communication network. The selection and utilization of uplink and downlink component carriers for conducting contention-free and contention-based random access procedures is facilitated in a multiple component carrier system, where a user equipment is configured with multiple uplink and downlink component carriers. This Abstract is provided for the sole purpose of complying with the Abstract requirement rules that allow a reader to quickly ascertain the disclosed subject matter. It is therefore to be understood that it should not be used to interpret or limit the scope or the meaning of the claims.03-15-2012
20100214909P2MP TRAFFIC PROTECTION IN MPLS-TP RING TOPOLOGY - In a connection-oriented network a point-to-multipoint working path is established between a source node and a plurality of destination nodes using a number of working path intermediate nodes. A point-to-multipoint protection path is established for possible points of failure in the working path. Each protection path connects a first working path intermediate node upstream of a point of failure and destination nodes of the working path downstream of the first working path intermediate node. The point-to-multipoint protection path only connects to destination nodes of the working path and working path intermediate nodes which must be transited to reach the destination nodes of the working path.08-26-2010
20120307629SOURCE ROUTING CONVERGENCE IN CONSTRAINED COMPUTER NETWORKS - In one embodiment, a source routing device (e.g., root device) pre-computes diverse source-routed paths to one or more nodes in a computer network. Upon receiving a particular packet, the device forwards the particular packet on a source-routed first path of the pre-computed diverse paths. In the event the device implicitly detects failure of the first path, then it forwards a copy of the particular packet on a source-routed second path of the pre-computed diverse paths in response. In one embodiment, implicit failure detection comprises seeing a second (repeated) packet with the same identification within a certain time since the first packet, and the second packet is forwarded on the second path. In another embodiment, implicit failure detection comprises not seeing a link-layer acknowledgment returned or receiving an error notification from a node along the broken path, and a stored copy of the particular packet is forwarded on the second path.12-06-2012
20120307630METHOD OF SUPERVISING A NODE IN A COMMUNICATION SYSTEM - A method of supervising a node in a communication system, the communication system comprising a OAM system, a Femto node controlled by the OAM system, and a first communication path between the node and the OAM system, the method comprising the steps of: determining that the node is unable to receive commands sent by the OAM system via the first communication path; establishing a second communication path between the node and the supervising entity via a cellular network; and sending a trigger message to the node via the second communication path to initiate a communication path set up on the first communication path towards the OAM system.12-06-2012
20100157793PROVIDER EDGE-CONTROLLED REDUNDANCY USING PSEUDO LINK AGGREGATION CONTROL PROTOCOL - In one embodiment, a system comprises a plurality of provider edge (PE) devices, the PE devices having a plurality of ports; and a pseudo-link aggregation control protocol (LACP) module instantiated for each of the ports. The pseudo-LACP module allows the PE devices to support dual-homing of an access side, the access side including either an access node or an access network, without running any control protocol for redundancy on the access side.06-24-2010
20110063973Fast upstream source failure detection - One example embodiment of the method includes receiving first control packets, by a first node, from a source node. The first control packets indicate the status of the source node. Whether the source node is operational and if a connection path between the first node and the source node is operational is determined based on the received first control packets. The method further includes sending a second control packet to a downstream node if the source node is non-operational, or the connection is non-operational. The second control packet includes at least one value indicating the source node is unreliable.03-17-2011
20120155253NODE REPAIR IN A MESH NETWORK - In embodiments of the present invention improved capabilities are described for sensing a change in a network topology using a discovery node in a mesh network; transmitting an explore frame, based at least in part on the sensed change, from the discovery node to a destination node using an intermediate node; receiving a response to the explore frame from the destination node; determining at least one functional network route from the discovery node to the destination node based at least in part on route information received in association with the response to the explore frame, wherein the route information includes a node path; and transmitting an instruction to the destination node from the discovery node based on a reverse node path.06-21-2012
20110317551COMMUNICATION DEVICE AND METHOD - A communication device includes a processor that is operative to perform actions, including, determining whether a failure occurs in a regular communication channel to transmit a packet to another communication device, selecting, upon determining that the failure occurs in the regular communication channel, a backup communication channel for transmitting the packet, determining, upon selecting the backup communication channel, whether the backup communication channel is shared by the regular communication channel and another regular communication channel, changing, upon determining that the backup communication channel is shared, a priority assigned to the packet transmitted from the regular communication channel to the backup communication channel, and controlling the transmission of the packet in accordance with the changed priority.12-29-2011
20110317552METHOD OF CONFIGURING RADIO CONNECTION IN MULTI-CARRIER SYSTEM - A method of configuring a radio connection by a mobile station (MS) in a multi-carrier system includes receiving carrier aggregation information on a plurality of aggregated carriers from a base station (BS), performing a radio connection to the BS by using at least one first carrier among the plurality of aggregated carriers, and reestablishing a radio connection to the BS by using a second carrier when an error occurs in the radio connection.12-29-2011
20110085441METHOD AND APPARATUS FOR PROVISIONING A BACKUP SIGNALING CHANNEL - In one embodiment, the present disclosure is a method and apparatus for provisioning a backup signaling channel. In one embodiment, a method for provisioning a backup D channel in a media gateway includes provisioning a primary D channel on a first media gateway card in the media gateway and provisioning the backup D channel on a second media gateway card in the media gateway that is different from the first media gateway card, wherein the backup D channel backs up the primary D channel.04-14-2011
20120155254PACKET RELAY APPARATUS - A packet relay apparatus of the type that can virtually use in the interlocking arrangement a plurality of apparatuses includes a link optimization adjustment part and a packet analyzing unit, automatically judges the mode of flow of communication and traffic and optimizes the line that is mainly operated, to manage the traffic flowing through a control port and make up for band insufficiency of the control port.06-21-2012
20120026867Method of M:1 Protection - An apparatus comprising a first segment endpoint bridge (SEB) configured to couple to a second SEB via a plurality of path segments, wherein the path segments comprise a working segment and a plurality of candidate protection segments, wherein the candidate protection segments comprise a protection segment that is configured to protect the working segment, wherein the candidate protection segments other than the protection segment do not protect the working segment, wherein one first state variable is used to maintain each of the candidate protection segments, and wherein a plurality of second state variables are used to maintain each of the working segment and the protection segment.02-02-2012
20110090788METHOD AND APPARATUS FOR PROVIDING AN INTELLIGENT BACK-UP INTERNET PROTOCOL (IP) CONNECTION - A method, computer readable medium and apparatus for providing a back-up internet protocol (IP) connection are disclosed. For example, the method monitors a primary IP connection to a subscriber premises, detects a failure or a degradation of the primary IP connection to the subscriber premises and activates a back-up IP connection to the subscriber premises.04-21-2011
20100172238SYSTEM AND METHOD FOR ETHERNET PROTECTION SWITCHING IN A PROVIDER BACKBONE BRIDGING TRAFFIC ENGINEERING DOMAIN - A system and method of providing Ethernet protection switching in a PBB-TE Domain. Two PBB-TE trunks are established between a first B-component and a second B-component. Each trunk includes two unidirectional Ethernet Switching Paths (ESPs), each associated with a possibly different VLAN identifier. Data traffic is mapped onto the first PBB-TE trunk, where the first PBB-TE trunk corresponds to a working entity and the second PBB-TE trunk corresponds to a backup protection entity. Data traffic is sent via a first ESP of the first trunk associated with a first VID and a second ESP of the first trunk associated with a second VID. The two PBB-TE trunks are monitored for faults. Upon detecting a fault on one of the PBB-TE trunks, data traffic is remapped onto the other PBB-TE trunk via a third ESP associated with a third VID and a fourth ESP associated with a fourth VID.07-08-2010
20110103222SIGNAL TRANSMISSION METHOD AND TRANSMISSION DEVICE - A signal transmission method includes causing each of a plurality of nodes to transfer, using the actually used line, a second signal in a second layer, in which one or a plurality of first signals in a first layer are contained, to a node adjacent in the first or the second direction when each of the plurality of nodes transmits or receives the first signal, when no failure occurs in a transmission path in a network, and causing a first node, located at an end of a failure point, to switch a transmission direction of the second signal and to send out the second signal to the backup line, and causing a second node, which is a transmission source or a reception destination of the first signal, to select one of the first and second directions, when a failure occurs in the transmission path in the network.05-05-2011
20100290341SYSTEMS AND METHODS FOR PROVIDING MULTIPLE COMMUNICATION SERVICES OVER EXISTING TWISTED PAIR ACCESS LINES - Systems and methods are described for providing a plurality of communication services over existing access lines such as twisted pair access lines. These services include voice, audio/video, and data communication services, the so-called “triple play” of services. The use of existing communication lines enables these services to be provided at a relatively low cost. Remote terminals are located close to subscriber premises to reduce the length of the existing communication lines connecting subscribers to the network. Data associated with a plurality of communication services may be statistically multiplexed onto the communication lines. Subscribers are provided with the capability to dynamically select services, including the capability to select audio/video signals from a set containing audio/video broadcast signals. The systems and methods enable data to be transported efficiently through the backbone network interconnecting central offices. Capabilities comparable the capabilities of coaxial cable systems are provided at a lower cost than alternative approaches, such as running fiber all the way to the subscriber premises.11-18-2010
20120213062METHOD OF TWO-STAGE ADAPTIVE FREQUENCY HOPPING FOR CLUSTERED WIRELESS SENSOR NETWORK - A method of two-stage adaptive frequency hopping for a clustered wireless sensor network, including: a) building a clustered wireless sensor network; b) defining a superframe structure based on IEEE 802.15.4 according to a topology of the clustered wireless sensor network; c) extending a beacon frame payload based on a beacon frame format of an IEEE 802.15.4 Media Access Control (MAC) layer; and d) performing a two-stage adaptive frequency hopping mechanism on nodes based on the above superframe structure and the extended beacon frame of the IEEE 802.15.4 MAC layer.08-23-2012
20120314567METHOD AND APPARATUS OF RECOVERING BACKHAUL LINK FAILURE BETWEEN BASE STATION AND RELAY NODE - A method and apparatus for recovering a backhaul link failure between a base station and a relay node is provided. The relay node receives information on a plurality of relay subframes used for relaying signals between the base station and the relay node. When a backhaul link failure is detected, the relay node determines at least one reserved subframe except the plurality of relay subframes and receives information to recover the backhaul link failure on a control channel in the at least one reserved subframe.12-13-2012
20120134263Method and path computation element for improving service restoration speed in transmission network - The disclosure provides a method for improving a service restoration speed in a transmission network, comprising: in a service set-up process, the PCE receives a route computation request including restoration attributes and constraint conditions from a Path Computation Client (PCC), and computes and saves the restoration routes available for the service according to the constraint conditions; and, when receiving the restoration route computation request for the service from the PCC, the PCE selects a route from the restoration routes locally saved and available for the service according to the selection conditions included in the restoration route computation request and sends it to the PCC which restores the service by the received route. The disclosure further provides a PCE.05-31-2012
20120250500Apparatus and Method for Spare Capacity Allocation on Dual Link Failures - A method implemented by an apparatus for providing spare capacity allocation (SCA) for dual link failures in a network, comprising computing the SCA for each of a plurality of flows in the network for a plurality of primary backup paths corresponding to a plurality of disjoint working paths for the flows using a first integer linear programming (ILP) model, computing the SCA for each of the flows for a plurality of secondary backup paths corresponding to the disjoint working paths and the primary backup paths using a second ILP model and the computed spare capacity information for the primary backup paths, and aggregating the computed SCA for the primary backup paths and the secondary backup paths for all the flows.10-04-2012
20100271939CONTROL OF RADIO LINKS IN A MULTIPLE CARRIER SYSTEM - Methods, systems and apparatuses for controlling radio links in a multiple carrier wireless communication system are disclosed. A method can include aggregating control functions from at least two carriers onto one carrier to form an anchor carrier and one or more associated secondary carriers; establishing communication links for the anchor carrier and each secondary carrier; and controlling communication based on the anchor carrier.10-28-2010
20100271938TRANSMISSION APPARATUS, METHOD FOR TRANSMISSION, AND TRANSMISSION SYSTEM - Transmitting a frame through a working path and a protection path is accomplished by detecting a failure occurring on the working path; changing a first destination address in the frame to a second destination address in accordance with the result of the detecting; and transmitting the frame after the changing to the protection path.10-28-2010
20090086626METHODS AND SYSTEMS FOR AUTOMATICALLY REROUTING LOGICAL CIRCUIT DATA FROM A LOGICAL CIRCUIT FAILURE TO A DEDICATED BACKUP CIRCUIT IN A DATA NETWORK - A method and system are provided for automatically rerouting logical circuit data from a physical circuit failure in a data network. When a failure in a logical circuit is detected, a label or services name associated with the logical circuit is automatically associated with a logical circuit identifier utilized for identifying the logical circuit in the 10 data network. Once the logical circuit is associated with the logical circuit identifier, the logical circuit data may be automatically rerouted to a “failover network,” thereby minimizing lost data until the failure in the logical circuit is resolved. The logical failover circuit may be an already existing logical circuit provisioned over a dedicated backup physical circuit in the data network.04-02-2009
20120188869ADAPTIVE MULTI-REDUNDANT RING NETWORK SYSTEM AND METHOD FOR SELECTING DETOUR - Disclosed is an adaptive multi-redundant ring network system using a 2 port Ethernet communication module capable of selecting a path, the network system including a main network system including a first main control unit and a plurality of first slaves; and a sub-network system including a second main control unit and a plurality of second slaves, wherein each of the plurality of first slaves and each of the plurality of second slaves include 2-port Ethernet communication modules, and each of the plurality of first slaves, each of the plurality of second slaves, the first slave and the second slave are selectively connected via the 2-port Ethernet communication modules.07-26-2012
20090016214Method and system for network recovery from multiple link failures - A method and system for fast and reliable network recovery from multiple link failures that detect the presence of an isolated node or segment in the network and determine whether one of the failed links, flanked by two blocked ports, is restored. Upon determining that at least one remaining link on the network remains in a failed state, a message is transmitted to all network links to indicate that one failed link is restored, and to unblock the ports flanking the restored link. The method and system of the present invention then flush the forwarding tables of all nodes, and network traffic resumes on the new network topology.01-15-2009
20120230185System and Method for Advertising a Composite Link in Interior Gateway Protocol and/or Interior Gateway Protocol-Traffic Engineering - An apparatus comprising a composite link comprising a plurality of component links including non-homogeneous links and positioned between two nodes that may be adjacent physically or logically, wherein the composite link is advertised as an Internal Gateway Protocol (IGP) link, an IGP-Traffic Engineering (IGP-TE) link, or both. Also included is a network component comprising an advertising module coupled to a composite link that comprises a plurality of component links including non-homogeneous links and configured to advertise the composite link as an Internal Gateway Protocol (IGP) link, IGP-Traffic Engineering (IGP-TE) link, or both, using a plurality of TE parameters associated with the component links.09-13-2012
20110122768Management of Network Capacity to Mitigate Degradation of Network Services During Maintenance - In accordance with a method of managing network capacity, simulation data is received from a simulation system based on at least one metric associated with a plurality of communication links interconnecting at least two endpoints. The simulation data indicates impact of a communication link to be taken offline a plurality of alternate communication links. It is determined whether the simulation data associated with at least one communication link satisfies at least one predetermined criterion. Further, at least one metric of the simulation system is periodically updated based on real-time data associated with the plurality of communication links. The simulation data from the simulation system based on the updated at least one metric is received. Thereafter, load from the communication link to be taken offline is selectively moved to an alternate communication link based on whether the simulation data associated with the alternate communication link satisfies the at least one predetermined criterion.05-26-2011
20110038258METHOD AND SYSTEM FOR SERVICE PROTECTION - A method for service protection is disclosed, which is applied to a 1:n switching technique. The method includes the following steps. A source end sends a service to a work transmission entity, the work transmission entity performs performance monitoring through the transmitted service, a sink end receives the service from the work transmission entity; when a Signal Degrade (SD) fault occurs at the work transmission entity, the source end sends the service to the work transmission entity and a protection transmission entity simultaneously, and the sink end selects to receive the service from the protection transmission entity; the protection transmission entity performs the performance monitoring through the transmitted service; when the SD fault occurs at both the work transmission entity and the protection transmission entity, the sink end still receives the service from the protection transmission entity. A system for service protection is also disclosed. Technical solutions enable the service to get valid protection during the transmission process, and avoid frequent switching of the service, thereby improving the service quality.02-17-2011
20120269057ACTIVE/STANDBY SWITCHING METHOD SYSTEM CONTROL UNIT AND COMMUNICATION SYSTEM - The present invention discloses an active/standby switching method,which includes: sending, by a first system control unit, a detection packet to a peer network element according to a set detection cycle; when the first system control unit receives an active/standby switching instruction, stopping sending the detection packet, so that transmission link switching is triggered when the first system control unit stops sending the detection packet in a set timeout period, and simultaneously starting, by the first system control unit, a switching timer; and when it is detects that a value of the switching timer reaches a switching timing value, performing a reset operation to complete active/standby switching, where the switching timing value is greater than the timeout period. Therefore, in the situation that active/standby switching is performed, a packet loss of a service data packet is reduced, and service continuity and reliability are ensured.10-25-2012
20120287780TUNING ROUTING METRICS TO REDUCE MAXIMUM LINK UTILIZATION AND/OR PROVIDE FAILURE RESILIENCY - A metric tuning technique optimizes the maximum link utilization of a set of links incrementally. Changes to the metric are constrained to be metric increases to divert routes from select links, thereby minimizing the number of changes required to achieve the optimization by avoiding the potential cascade of changes caused by attracting routes to a link. An interactive user interface is provided to allow a user to specify limits and constraints, and to select the sets of links to be addressed, including, for example, only the links that exceed a given link utilization threshold, the links having the highest link utilizations, the links having the highest failure effect, and so on. This incremental optimization technique is also used to optimize network resiliency by minimizing the network degradation caused by the failure of one or more links.11-15-2012
20120287779NETWORK AND FAULT RECOVERY METHOD - A ring network of a multicast label switch path scheme includes a transmitting node and receiving nodes connected to form a ring. A signal input to the transmitting node is branched to be transmitted in first and second different directions to first and second receiving nodes through first and second working paths, respectively, in the ring network. The first and second receiving nodes define terminal points of the first and second working paths, respectively, from the transmitting node. A first backup path is set from the first receiving node to the transmitting node, and a second backup path is set from the second receiving node to the transmitting node. The first backup path is in an opposite direction to the first working path and the second backup path is in an opposite direction to the second working path.11-15-2012
20120287778TRANSMISSION APPARATUS AND PATH SWITCHING METHOD - There is provided a transmission apparatus including a receiver unit configured to receive, from a network on a first layer, fault information regarding the network on the first layer, and a generator unit configured to generate, based on the fault information received by the receiver unit, switch information used to switch a transmission path of a network on a second layer higher than the first layer.11-15-2012
20120243407Bandwidth management for MPLS fast rerouting - Certain exemplary embodiments provide a method comprising: in a network at a node located on a label switched path: selecting a backup path to respond to a failure; and for each link along the backup path, reserving a backup bandwidth, wherein the backup bandwidth is sufficient to reroute traffic around the failure.09-27-2012
20120243406Use of Sub Path Maintenance Elements (SPMES) for Multiprotocol Label Switching (MPLS) Shared Mesh Protection - Embodiments of the invention include a computer-implemented method of shared backup path computation in an multiprotocol label switching (MPLS) network, the shared backup path to be used upon a failure of at least one working path of the MPLS network.09-27-2012
20080232247Network traffic demotion - A method and apparatus for demoting network traffic are disclosed. In one embodiment, a method includes transmitting traffic associated with a session over a first path, and maintaining state information identifying the first path as a forwarding path for the session. Traffic associated with the session is rerouted from the first path to a second path following a network failure and the rerouted traffic is marked so that at least a portion of the rerouted traffic can be dropped at any point in the network if rerouting causes network congestion.09-25-2008
20130170340Dynamically Adjusting Active Members in Multichassis Link Bundle - In one embodiment, active links are added to, and removed from, a multichassis link bundle with one side of the multichassis link bundle terminated on multiple devices of a multichassis device. In one embodiment, adding active links includes selecting which particular device to which to add an active link to the multichassis link bundle based on a device priority of each of the multiple devices, with a device priority of a given device being based on a current number of active links associated with the given device.07-04-2013
20130170341SYSTEM AND METHOD FOR ESTABLISHING A VOICE OVER IP SESSION - A method, computer program product, and computer system for establishing a Voice over IP (VoIP) session. One or more computing devices initiate the VoIP session between a plurality of devices. A first communication channel is established as an active channel for a first computing device of the plurality of devices, where the active channel is fully enabled for use by the first computing device. A second communication channel is established as a passive channel for the first computing device while maintaining the active channel, where the passive channel is at least partially enabled for use by the first computing device.07-04-2013
20130201822COMPUTER NETWORK METHOD AND DEVICE USING LINK AGGREGATION - A method and device of link aggregation in computer networking, wherein data originally scheduled for forwarding by a scheduled data port are diverted for forwarding by a backup data port assigned to the scheduled data port upon detection that the scheduled data port is connected to a data link which is not capable of data traffic even though the data port is still a selected port.08-08-2013
20130142036Fast Repair of a Bundled Link Interface Using Packet Replication - In one embodiment, a packet switching device sends packets to be sent from a single link of a bundled link interface to multiple egress network processing units (on a same or different line cards). A single one of these multiple egress network processing units is configured to be in the active mode sending particular sets of packets. The other egress network processing units are configured for these particular sets of packets to be in the non-active mode, and hence, will correspondingly drop these particular sets of packets. In case of failure, an egress network processing unit can quickly (e.g., changing a flag) be changed to the active mode to quickly reduce or eliminate loss of packets.06-06-2013
20080219156Communication Network Protection Systems - A communication network protection system made up of interconnected networks, at least one of which has an automatic control plane (for example ASTN) among which are terminal interconnecting nodes. With the terminal interconnection nodes, termed primary nodes, are associated corresponding secondary terminal nodes wherein a secondary terminal node is used to realize a protection circuit in case of failure of the associated primary node.09-11-2008
20130094355METHOD FOR FAST-RE-ROUTING (FRR) IN COMMUNICATION NETWORKS - A method is described to enable carrying out a fast reroute protection technique which provides both link and node protection without traffic duplication, without the need to distinguish between link and node failures, and without replicating traffic. The technique covers concurrent Working and backup logical path failures, and in particular LSP logical paths. The method is adapted to provide a “Dual Failure Protection” (DFP), and is expandable to various multi-failure scenarios.04-18-2013
20130114403Path Segment Protecting p-Cycles - This disclosure introduces a significant extension to the method of p-cycles for network protection. The main advance is the generalization of the p-cycle concept to protect multi-span segments of contiguous working flow, not only spans that lie on the cycle or directly straddle the p-cycle. This effectively extends the p-cycle technique to include path protection, or protection of any flow segment along a path, as well as the original span protecting use of p-cycles. It also gives an inherent means of transit flow protection against node loss. We present a capacity optimization model for the new scheme and compare it to prior p-cycle designs and other types of efficient mesh-survivable networks. Results show that path-segment-protecting p-cycles (“flow p-cycles” for short) have capacity efficiency near that of a path-restorable network without stub release. An immediate practical impact of the work is to suggest the of use flow p-cycles to protect transparent optical express flows through a regional network.05-09-2013
20130114404NODE AND METHOD FOR THE HANDLING OF SERVING GATEWAY PARTIAL FAILURE - Example embodiments presented herein are directed towards improved handling during Serving Gateway (SGW) partial failures. Some of the example embodiments are directed towards a Mobility Management Entity (MME) configured to alter a S4 Serving General Packet Radio Service Support Node (S4-SGSN) that a SGW partial failure has occurred. Some of the example embodiments are directed towards a Packet Data Network Gateway (PGW) being informed that ISR for a user equipment is activated, this the PGW will save any MME related identification information for a user equipment undergoing a mobility procedure when ISR is activated.05-09-2013
20130100801PROVIDER BACKBONE BRIDGING - PROVIDER BACKBONE TRANSPORT INTERNETWORKING - An Ethernet virtual switched sub-network (VSS) is implemented as a virtual hub and spoke architecture overlaid on hub and spoke connectivity built of a combination of Provider Backbone Transport (spokes) and a provider backbone bridged sub-network (hub). Multiple VSS instances are multiplexed over top of the PBT/PBB infrastructure. A loop free resilient Ethernet carrier network is provided by interconnecting Provider Edge nodes through access sub-networks to Provider Tandems to form Provider Backbone Transports spokes with a distributed switch architecture of the Provider Backbone Bridged hub sub-network. Provider Backbone transport protection groups may be formed from the Provider Edge to diversely homed Provider Tandems by defining working and protection trunks through the access sub-network. The Provider Backbone Transport trunks are Media Access Control (MAC) addressable by the associated Provider Edge address or by a unique address associated with the protection group in the Provider Backbone Bridged network domain.04-25-2013
20130100800Method, Apparatus, and System for Switching Communication Path - Embodiments of the present invention provide a method, an apparatus, and a system for switching a communication path. The method for switching a communication path includes: receiving, by an access network device, a data packet for implementing a communication service between a terminal and a first media source; learning, by the access network device, according to the data packet, that a local exchange path between the terminal and the first media source is unavailable; and transferring, by the access network device, the data packet via a detour path, where the data packet is also used by a channel control device on the detour path to control the terminal to disconnect from the detour path and establish a local exchange path between the terminal and a second media source, and where the second media source is in coverage of an access network device currently providing a service for the terminal.04-25-2013
20130128727SYSTEM AND METHOD FOR BACKUP COMMUNICATION OVER ETHERNET - A system and method for providing backup communications over an Ethernet cable are disclosed. A backup communication system (BCS) is provided as part of a networked (TCP/IP) hospital communication system. The BCS is coupled to an Ethernet cable used for normal TCP/IP communications. When TCP/IP communications are interrupted, the BCS receives patient call signals from patient room terminals over a secondary communication mode of the Ethernet cable, and transmits those call signals to a nurses' station. The call signals are transmitted as voltage coded data such as voltage pulses or static levels. The voltage can include call information. 10V can represent a normal patient call, 15V can represent a patient emergency call, and 24V can represent a code call. Information can be relayed back to the room terminals using the same signaling technique. Thus, basic communications can be achieved when TCP/IP communications are unavailable. Other embodiments are disclosed and claimed.05-23-2013
20130135991METHOD OF LOCALIZING A FAILURE OCCURRING ALONG A TRANSMISSION PATH - A method of localizing failures occurring along a transmission path is provided. A data signal is transmitted along the transmission path, which comprises a path segment. A first network node performs a tandem connection monitoring source function of a tandem connection. A second network node monitors the transmission along the path segment, by performing a tandem connection monitoring sink function. When the first network node detects a failure of the data signal, the first network node enters information indicating a data signal failure into the data signal's overhead field. When the second network node detects a failure by the tandem connection monitory sink function, the second network node enters information into the overhead field. When a third network node detects a failure of the data signal, the third network node uses the information in the overhead field to determine whether the failure occurred within or outside of the path segment.05-30-2013
20130135993SYSTEM AND METHOD FOR ROUTING DATA ON A PACKET NETWORK - The disclosed embodiments include system and method for routing communications over a communications network. In one embodiment, a determination is made as to whether to establish a communication along a communication path based on network performance information. The disclosed embodiments provide several alternatives for establishing the communication and improving communications along the communication path in response to a determination that at least one network node along the communication path is impaired or congested.05-30-2013
20130135992METHOD AND SYSTEM FOR MANAGING HIGH CAPACITY TRAFFIC OFFLOAD IN AN IP NETWORK NUCLEUS IN THE TRANSPORT LAYER - The invention relates to a method and system for coordinating and automating the processes of IP traffic offload in transport technology, minimizing the operational problems associated with the configuration of IP and transport layers. The system consists of two main components, a transit traffic management module integrated into a network operator and a routing module for generating new links integrated into each of the IP network nodes.05-30-2013
20080198741Method for Providing Alternative Paths as a Rapdid Reaction to the Failure of a Link Between Two Routing Domains - The present disclosure relates to a method for providing substitute routes in rapid response to the failure of a link between two routing domains in a packet-oriented network. After the failure of a link has been identified, substitute routes are provided for routes which have been interrupted by said failure by locally selecting alternative routes and propagating messages along the substitute routes. In order to provide substitute routes, an inter-domain router checks whether the router contains a substitute route. If there is no substitute route, a request message is transmitted to at least one adjacent inter-domain router and the transmission of at least one substitute route is thus requested. If there is a substitute route in the adjacent inter-domain router, the inter-domain router making the enquiries is informed of this in a response message. The present disclosure thus results in the improved provision of substitute routes in response to disruptions in inter-domain routing.08-21-2008
20120257495Fail-safe communication systems and methods - Various embodiments of a fail-safe communication system in which certain communication components fail, the system detects the failure, and the system maintains communication by routing data sets to different communication components. In various embodiments, the communication components fail on the network side. In various embodiments, the communication components fail on the remote side. In various embodiments, there are methods for fail-safe communication in which a system detects communication component failure, and routes data sets to other communication components.10-11-2012
20120275299METHODS AND SYSTEMS TO REROUTE DATA IN A DATA NETWORK - A disclosed example method involves determining a first quality of service parameter associated with a failed logical circuit, and a second quality of service parameter associated with a logical failover circuit. When the first quality of service parameter is equal to or less than the second quality of service parameter, data from the failed logical circuit is rerouted to the logical failover circuit without requiring authorization from a customer to communicate the data at the second quality of service parameter. When the second quality of service parameter is a lower level of quality than the first quality of service parameter, the customer is prompted for authorization to communicate the data via the logical failover circuit at the second quality of service parameter. When authorization is received, the data is rerouted to the logical failover circuit. When authorization is denied, the data is not rerouted to the logical failover circuit.11-01-2012
20120281527Re-Establishment of Component Carriers in a Wireless Communication System - Re-establishment methods and control apparatuses for causing performance of the methods is disclosed. In a method, when data is communicated on a configured set of component carriers, a trigger for connection re-establishment is detected. At least one component carrier in the configured set is identified, the component carrier being such that it can be used for connection re-establishment. Connection re-establishment is then requested through the at least one identified component carrier.11-08-2012
20130121141METHOD, DEVICE, AND SYSTEM FOR LINK AGGREGATION FAILURE PROTECTION - A method for link aggregation failure protection includes: receiving failure information including a failure location and an identity of more than one corresponding logical link, a failed physical link and more than one physical link form an LAG, each physical link in the LAG corresponds to logical links with a same identity, and the logical links with the same identity in the LAG correspond to an RSP device of a backbone layer and a receiving device of an access layer and forward data separately through more than two aggregation devices at an aggregation layer locating between the backbone layer and the access layer; according to the failure information, bundling a logical link corresponding to the failed physical link with a logical link corresponding to a physical link without failure in the LAG to form a logical LAG; and transmitting, through the logical LAG, data sent to the failed physical link.05-16-2013
20130194915Radio Access Parameter Tuning - There is provided a solution for performing radio access parameter tuning. The solution includes obtaining first predetermined characteristics related to users who experienced a radio link failure, obtaining second predetermined characteristics related to the users who are according to a predetermined rule prone to a radio link failure, and determining, based on the obtained second predetermined characteristics in addition to the obtained first predetermined characteristics, whether radio access parameter tuning is to be performed or not.08-01-2013
20120092986System And Method For Computing A Backup Egress Of A Point-To-Multi-Point Label Switched Path - An apparatus for requesting computation of a backup egress path comprising a processor configured to send a path computation element (PCE) protocol (PCEP) request (PCReq) message requesting computation of the backup egress path to protect against a fault in a primary egress path of a Point to Multi-Point (P2MP) or Point-to-Point (P2P) label switched path (LSP), wherein the backup egress path extends from a previous-hop internal node of the primary egress node of the P2MP or P2P LSP to a backup egress node. A method for advertising or discovering a backup egress path computation capability comprising exchanging a message that indicates that a PCE comprises a backup egress path computation capability.04-19-2012
20130208584MOBILE STATION, BASE STATION, AND RELAY STATION FOR A WIRELESS ACCESS SYSTEM - Protocol structure of a mobile station, base station or relay station in a wireless access system is provided. The protocol structure includes a first function block configured to perform radio resource control and management as a MAC layer and to reside on a control plane, and a second function block configured to perform medium access control as the MAC layer and to reside on the control plane and a data plane. The first function block includes various function blocks for supporting high reliability.08-15-2013

Patent applications in class Spare channel