Patent application number | Description | Published |
20090010153 | Fast remote failure notification - A method and system for failure notification at a remote node in communication with a local node are disclosed. The local node is configured for faster failure detection than the remote node. In one embodiment, the method includes establishing a failure monitoring session between the local node and the remote node, receiving at the remote node, a failure notification from the local node, the failure notification sent using a protocol of the failure monitoring session, and rerouting traffic at the remote node in response to the failure notification. | 01-08-2009 |
20090010171 | Scaling BFD sessions for neighbors using physical / sub-interface relationships - In one embodiment, an apparatus includes a physical port and a plurality of logical sub-interfaces under the physical port. The physical port and the logical sub-interfaces are configured as a Bidirectional Forwarding Detection (BFD) neighbor group. The physical port being configured to run BFD sessions to detect failures at a first rate that is substantially faster as compared to a second rate of BFD sessions to detect failures on the logical sub-interfaces. The physical port notifies the logical sub-interfaces of a BFD failure at the physical port, with the logical sub-interfaces shutting down responsive to the notification. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. | 01-08-2009 |
20090144390 | OPTIMIZING NETWORK RESOURCES USAGE WITHIN AN ADMINISTRATIVE BOUNDARY - In one embodiment, an apparatus comprises logic for optimizing network resources usage. The logic is operable to store IGP information, where the IGP information includes a set of attribute values associated with each of a set of content servers. When the logic receives a request for content from a remote peer, the logic determines one or more content servers that can provide the requested content. The logic then retrieves, from the IGP information, a plurality of attribute values associated with a non-looping path from each of the one or more content servers. For each of the one or more content servers, the retrieved attribute values include: one or more capacity values indicating capacities of one or more communication links on the non-looping path from that content server; and one or more utilization values indicating utilizations of the one or more communication links on the non-looping path from that content server. The logic then selects a content server based on the retrieved attribute values, and causes the request for the content to be sent to the selected content server. | 06-04-2009 |
20100008361 | CARRIER'S CARRIER WITHOUT CUSTOMER-EDGE-TO-CUSTOMER-EDGE BORDER GATEWAY PROTOCOL - According to one aspect of the present invention, a method includes obtaining a first advertisement at a first provider edge (PE) device from a first customer edge (CE) device that is associated with a virtual private network, and sending a second advertisement on a control plane path associated with a border gateway protocol after obtaining the first advertisement. The first PE device has a routing and forwarding table. The first advertisement identifies a plurality of local routes associated with the first VPN, and includes a first indication that information relating to the plurality of local routes is not to be stored in the routing and forwarding table. The second advertisement identifies the local routes, an address of the first CE device, and the first CE device as a next hop. | 01-14-2010 |
20100149969 | BFD rate-limiting and automatic session activation - A system and method for bidirectional forwarding detection (BFD) rate-limiting and automatic BFD session activation includes tracking a total bidirectional forwarding detection (BFD) packet rate for a line card (LC) of the node, and rejecting operations associated with creation of a new BFD session that would cause the total BFD packet rate to exceed a predetermined maximum rate. The new BFD session is stored in a state on the node and the operations of the new BFD session are automatically retried at a time when doing so would not exceed the predetermined maximum rate. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. 37 CFR 1.72(b). | 06-17-2010 |
20110064407 | Power save mode for lightpaths - A method for communicating optically between nodes of an optical network, including forming, between a first node and a second node of the network, a set of lightpaths, each of the set of lightpaths having a respective configuration, and transferring communication traffic between the first and second nodes via the set of lightpaths. The method also includes forming a determination for the set of lightpaths that a communication traffic level associated therewith is less than a predetermined threshold, and in response to the determination, removing a lightpath having a given configuration from the set of lightpaths to form a reduced set of lightpaths. The method further includes transferring the communication traffic between the first and second nodes via the reduced set of lightpaths, while reducing a level of power consumption in the removed lightpath and while maintaining the given configuration of the removed lightpath. | 03-17-2011 |
20140248051 | Power Save Mode for Lightpaths - A method for communicating optically between nodes of an optical network, including forming, between a first node and a second node of the network, a set of lightpaths, each of the set of lightpaths having a respective configuration, and transferring communication traffic between the first and second nodes via the set of lightpaths. The method also includes forming a determination for the set of lightpaths that a communication traffic level associated therewith is less than a predetermined threshold, and in response to the determination, removing a lightpath having a given configuration from the set of lightpaths to form a reduced set of lightpaths. The method further includes transferring the communication traffic between the first and second nodes via the reduced set of lightpaths, while reducing a level of power consumption in the removed lightpath and while maintaining the given configuration of the removed lightpath. | 09-04-2014 |
Patent application number | Description | Published |
20100243232 | Magnetic Slip Retention for Downhole Tool - A downhole tool, such as a packer or liner hanger, has a mandrel on which slips are disposed for engaging a surrounding tubular downhole. When the tool is being run in or out of the hole, at least one magnetic component magnetically retains the slip adjacent the mandrel so the slip can be held away from the surrounding tubular. When the tool is set downhole, the initial magnetic retention can be broken, and the slips can be moved away from the mandrel to engage the surface of the surrounding tubular. | 09-30-2010 |
20100243235 | Packer Providing Multiple Seals and Having Swellable Element Isolatable from the Wellbore - A packer provides multiple seals when deployed downhole. Exposed to an activating agent, a swellable element on the packer's mandrel expands radially outward to form a seal with the borehole wall. One or more deformable elements, such as compressible packers or cup packers, are disposed on the mandrel adjacent the swellable element. These deformable element deform outward to the surrounding borehole wall to at least partially isolate the downhole annulus and the swellable element. Bias units releasably affixed on the tool adjacent the deformable elements can deform the elements. These bias unit can be released either by swelling of the swellable element or by fluid pressure. Once released, the bias units are axially biased toward the deformable elements to deform them. In this way, the packer can form multiple seals with the borehole wall, and the deformable elements can isolate the swellable element from the downhole annulus, which can keep the swellable element from degrading or being overly extruded. | 09-30-2010 |
20110048740 | SECURING A COMPOSITE BRIDGE PLUG - A filament wound composite tube is inserted into a non-metallic mandrel below the core to support the core when holding pressure in the top annulus. The tube has a close-fit tolerance to the inner surface of the mandrel. The tube is secured in place with pins through a mule shoe, such that the bore of the tube is not impeded. Alternately, a retainer with wickers is disposed in the mandrel below the core to support the core when holding pressure in the top annulus. The wickers are biased to engage with an inner surface of the mandrel, holding the insert in place under pressure. Axial movement of the core downward further engages the wickers with the mandrel, helping to support the load. | 03-03-2011 |
20110192613 | Cluster Opening Sleeves for Wellbore - A downhole sleeve has an insert movable in the sleeve's bore from a closed condition to an opened condition when a ball dropped in the bore engages an indexing seat in the sliding sleeve. In the closed condition, the insert prevents communication between the bore and the sleeve's port, while the insert in the opened condition permits communication between the bore and port. Keys of a seat extend into the bore to engage the ball and to move the insert open. After opening, the keys retract so the ball can pass through the sleeve to another cluster sleeve or to an isolation sleeve of an assembly. Insets or buttons disposed in the sleeve's port temporarily maintain fluid pressure in the sleeve's bore so that a cluster of sleeves can be opened before treatment fluid dislodges the button to treat the surrounding formation through the open port. | 08-11-2011 |
20120031608 | Filler Rings for Swellable Packers - A swellable packer with an enhanced sealing ability comprises a tubular body, a swellable element, and a filler ring disposed about the tubular body between the tubular body and the swellable element. The filler ring is formed of a material harder than the swellable element. The filler ring enhances the sealing ability of the swellable packer. Any number of filler rings may be used. The filler ring or rings may be fixed to the tubular body or may be unfixed. | 02-09-2012 |
20120043070 | Magnetic Slip Retention for Downhole Tool - A downhole tool, such as a packer or liner hanger, has a mandrel on which slips are disposed for engaging a surrounding tubular downhole. When the tool is being run in or out of the hole, at least one magnetic component magnetically retains the slip adjacent the mandrel so the slip can be held away from the surrounding tubular. When the tool is set downhole, the initial magnetic retention can be broken, and the slips can be moved away from the mandrel to engage the surface of the surrounding tubular. | 02-23-2012 |
20120055684 | Arrangement of Isolation Sleeve and Cluster Sleeves Having Pressure Chambers - For wellbore fluid treatment, sliding sleeves deploy on tubing in a wellbore annulus. Operators deploy a plug down the tubing to a first sleeve. The plug seats in this first sleeve, and pumped fluid pressure opens the first sleeve and communicates from the tubing to the wellbore annulus. In the annulus, the fluid pressure creates a pressure differential between the wellbore annulus pressure and a pressure chamber on second sleeves on the tubing. The resulting pressure differential opens the second sleeves so that fluid pressure from the tubing can communicate through the second open sleeves. Using this arrangement, one sleeve can be opened in a cluster of sleeves without opening all of them at the same time. The deployed plug is only required to open the fluid pressure to the annulus by opening the first sleeve. The pressure chambers actuate the second sleeves to open up the tubing to the annulus. | 03-08-2012 |
20120305265 | Cluster Opening Sleeves for Wellbore - A downhole sleeve has an insert movable in the sleeve's bore from a closed condition to an opened condition when a ball dropped in the bore engages an indexing seat in the sliding sleeve. In the closed condition, the insert prevents communication between the bore and the sleeve's port, while the insert in the opened condition permits communication between the bore and port. Keys of a seat extend into the bore to engage the ball and to move the insert open. After opening, the keys retract so the ball can pass through the sleeve to another cluster sleeve or to an isolation sleeve of an assembly. Insets or buttons disposed in the sleeve's port temporarily maintain fluid pressure in the sleeve's bore so that a cluster of sleeves can be opened before treatment fluid dislodges the button to treat the surrounding formation through the open port. | 12-06-2012 |
20130043042 | Multiple Shift Sliding Sleeve - A system of sliding valves wherein the inserts of multiple sliding valves may be shifted to an open position using a single shifting ball. Each individual sliding valve has a movable insert that, depending upon the position of the insert within the sliding valve, may either block or permit fluid to radially flow between the interior and exterior of the sliding valve. The insert has a profile about the interior of the movable insert allowing a shifting tool to connect to and move the insert so that fluid may be prevented from entering the interior portion of the sliding sleeve. | 02-21-2013 |
20140166292 | Sliding Sleeve Having Deformable Ball Seat - A sliding sleeve opens with a deployed ball. The sleeve has a seat disposed in the housing, and the seat has segments biased outward from one another with a C-ring or other biasing element. Initially, the seat has an expanded state in the sliding sleeve so that the seats segments expand outward against the housing's bore. When an appropriately sized ball is deployed downhole, the ball engages the expanded seat. Fluid pressure applied against the seated ball moves the seat into the inner sleeve's bore. As this occurs, the seat contracts, which increases the engagement area of the seat with the ball. Eventually, the seat reaches the shoulder in the inner sleeve so that pressure applied against the seated ball now moves the inner sleeve in the housing to open the sliding sleeve's flow port. | 06-19-2014 |
20150152713 | METHOD AND APPARATUS FOR TREATING A WELLBORE - The present invention generally concerns the treatment of hydrocarbon-bearing formations adjacent a wellbore. In one embodiment, fracturing jobs are performed through the use of subs disposed in a casing string having profiles that interact with profiles formed on retractable keys of a tool. | 06-04-2015 |
Patent application number | Description | Published |
20120044940 | FLOODING-BASED ROUTING PROTOCOL HAVING AVERAGE-RATE AND BURST-RATE CONTROL - An enhanced, flooding-based routing protocol is described that provides burst-rate and average-rate flow control. A routing device comprises a network interfaces configured to send and receive packets over a layer-two (L2) communication medium. A flooding-based link state routing protocol executes on a processor of the routing device to maintain network topology information for a network and establish an adjacency with a peer router over the layer-two (L2) communication medium. A database of the routing device stores a minimum packet interval and a credit specified by the peer router for the adjacency. When sufficient credit has been allocated to the L2 communication medium, a scheduler of the router dequeues link state messages from an outbound packet queue and floods each of the link state messages to the L2 communication medium while maintaining at least the specified minimum packet interval between each of the plurality of link state messages. | 02-23-2012 |
20120044947 | FLOODING-BASED ROUTING PROTOCOL HAVING DATABASE PRUNING AND RATE-CONTROLLED STATE REFRESH - An enhanced, flooding-based link state routing protocol is described that provides pruning of link state data and, when needed, rate-controlled refresh of the pruned link state data from other routers of the flooding domain. A routing device comprises a network interface to send and receive packets over a layer-two (L2) communication medium. The routing device includes a control unit coupled to the network interface, and a flooding-based link state routing protocol executing on a processor of the control unit. The link-state routing protocol establishes an adjacency with a peer router. A database of the routing device includes entries that store a plurality of link state messages for a flooding domain of the link state routing protocol, wherein at least one of the entries in the database stores a partial link state message having a header portion and a payload having pruned link state data. | 02-23-2012 |
20120144066 | DYNAMICALLY GENERATING APPLICATION-LAYER TRAFFIC OPTIMIZATION PROTOCOL MAPS - In general, techniques are described for using routing information obtained by operation of network routing protocols to dynamically generate network and cost maps for an application-layer traffic optimization (ALTO) service. For example, an ALTO server of an autonomous system (AS) receives routing information from routers of the AS by listening for routing protocol updates outputted by the routers and uses the received topology information to dynamically generate a network map of PIDs that reflects a current topology of the AS and/or of the broader network that includes the AS. Additionally, the ALTO server dynamically calculates inter-PID costs using received routing information that reflects current link metrics. The ALTO server then assembles the inter-PID costs into a cost map that the ALTO server may provide, along with the network map, to clients of the ALTO service. | 06-07-2012 |
20120224506 | ADVERTISING TRAFFIC ENGINEERING INFORMATION WITH THE BORDER GATEWAY PROTOCOL - In general, techniques are described for distributing traffic engineering (TE) link information across network routing protocol domain boundaries using a routing protocol. In one example, a network device logically located within a first routing protocol domain includes a routing protocol module executing on a control unit to execute an exterior gateway routing protocol. The routing protocol module of the network device receives an exterior gateway routing protocol advertisement from a router logically located within a second routing protocol domain and decodes traffic engineering information for a traffic engineering link from the exterior gateway routing protocol advertisement. A path computation module of the network device computes a traffic engineered path by selecting the traffic engineering link for inclusion in the traffic engineered path based on the traffic engineering information. | 09-06-2012 |
20130121211 | FLOODING-BASED ROUTING PROTOCOL HAVING DATABASE PRUNING AND RATE-CONTROLLED STATE REFRESH - An enhanced, flooding-based link state routing protocol is described that provides pruning of link state data and, when needed, rate-controlled refresh of the pruned link state data from other routers of the flooding domain. A routing device comprises a network interface to send and receive packets over a layer-two (L2) communication medium. The routing device includes a control unit coupled to the network interface, and a flooding-based link state routing protocol executing on a processor of the control unit. The link-state routing protocol establishes an adjacency with a peer router. A database of the routing device includes entries that store a plurality of link state messages for a flooding domain of the link state routing protocol, wherein at least one of the entries in the database stores a partial link state message having a header portion and a payload having pruned link state data. | 05-16-2013 |
20130265894 | NETWORK AVAILABILITY ANALYTICS - In one embodiment, a method includes receiving at a network device, route convergence measurements and traffic demand measurements from a plurality of routers, and computing network availability based on the measurements at the network device. The route convergence measurements are associated with route computations at the routers and the traffic demand measurements include portions of a demand matrix associated with the routers. An apparatus and logic are also disclosed herein. | 10-10-2013 |
20130286846 | PATH WEIGHTED EQUAL-COST MULTIPATH - Routers balance network traffic among multiple paths through a network according to an amount of bandwidth that can be sent on an outgoing interface computed for each of the paths. For example, a router receives a link bandwidth for network links that are positioned between the first router and a second router of the network, and selects a plurality of forwarding paths from the first router to the second router. Upon determining that one of the network links is shared by multiple of the plurality of forwarding paths, the router computes a path bandwidth for each of the plurality of forwarding paths so as to account for splitting of link bandwidth of the shared network link across the multiple forwarding paths that share the network link. The router assigns packet flows to the forwarding paths based at least on the computed amount of bandwidth for each of the forwarding paths. | 10-31-2013 |
20130322236 | CONGESTION MANAGMENT FOR FIBRE CHANNEL OVER ETHERNET OVER WIDE AREA NETWORKS - In general, techniques are described for mapping WAN conditions to appropriate back-pressure mechanisms at the WAN edges to improve the performance of delay and/or loss-sensitive applications. In one example, a system includes a wide area network having a provider edge (PE) router to establish a Fibre Channel over Ethernet (FCoE) pseudowire over the wide area network. A Lossless Ethernet network attaches, by an attachment circuit, to the FCoE pseudowire at the PE router. A Fibre Channel Fabric connects to the Lossless Ethernet network and to a storage device that provides data for transmission over the wide area network by the FCoE pseudowire. The PE router detects a defect in the FCoE pseudowire and, in response to detecting the defect in FCoE pseudowire, injects an FCoE flow control extension into the Lossless Ethernet network by the attachment circuit. | 12-05-2013 |
20130336108 | GLOBAL STATE RESYNCHRONIZATION FOR PATH COMPUTATION ELEMENT FAILURE DURING A REOPTIMIZATION PROCESS - In one embodiment, a router initiates reroutes of one or more tunnels at the router as part of optimization of a plurality of tunnels in a computer network, and stores an original state of the one or more tunnels at the router prior to the optimization. By detecting whether path computation element (PCE) failure occurs prior to completion of the optimization, the router may revert to the original state of the one or more tunnels in response to PCE failure prior to completion of the optimization. | 12-19-2013 |
20130336109 | ORDERED FLOODING REQUESTS FOR PATH COMPUTATION ELEMENTS - In one embodiment, a stateful path computation element (PCE) in a computer network determines a need to route at least a threshold number of tunnels, and in response, triggers a routing update from a determined set of routers. Having updated the routing information and available network resources for the set of routers, the stateful PCE may then compute the tunnels based on the update. | 12-19-2013 |
20130336159 | DISTRIBUTED STATEFUL PATH COMPUTATION ELEMENT OVERLAY ARCHITECTURE - In one embodiment, a particular device in a computer network maintains a locally owned tunnel-state table, and joins a distributed hash table (DHT) ring. In addition, the locally owned tunnel-state table is shared with other devices of the DHT ring to establish a DHT-owned tunnel-state table. The particular device (and other devices) determines ownership of link-state advertisements (LSAs) for a specific portion of a traffic engineering database (TED) according to the DHT ring. As such, when the particular device (or any device) computes a path for a tunnel using a local TED, the particular device may request permission to use resources along the computed path that were advertised in particular LSAs from owners of those particular LSAs when not owned by the particular device. | 12-19-2013 |
20130336315 | ALLOCATING AND DISTRIBUTING LABELS FOR PACKET ENCAPSULATION - In one example, a network device receives a packet to be forwarded according to a label switching protocol, determines a service to be performed on the packet by a service network device, sends a label request message to the service network device, wherein the label request message indicates support for labels having a particular length, wherein the particular length is larger than twenty bits (e.g., forty bits), and wherein the label request message specifies the service to be performed on the packet, receives, in response to the label request message, a label mapping message defining a label of the particular length, appends the label to the packet to form a Multi-Protocol Label Switching (MPLS)-encapsulated packet, and forwards the MPLS-encapsulated packet according to the label switching protocol. | 12-19-2013 |
20130343174 | SERVICE PLANE TRIGGERED FAST REROUTE PROTECTION - Techniques are described for detecting failure or degradation of a service enabling technology function independent from an operational state of a service node hosting the service enabling technology function. For example, a service node may provide one or more service enabling technology functions, and service engineered paths may be traffic-engineered through a network to service node network devices that host a service enabling technology function. A monitor component at the service layer of the service node can detect failure or degradation of one or more service enabling technology functions provided by the service node. The monitor component reports detection of failure or degradation to a fault detection network protocol in a forwarding plane of the service node. The fault detection network protocol communicates with an ingress router of a service engineered path to trigger fast reroute by the ingress of traffic flows to bypass the affected service enabling technology function. | 12-26-2013 |
20130346470 | DISTRIBUTED PROCESSING OF NETWORK DEVICE TASKS - Techniques are described for distributing network device tasks across virtual machines executing in a computing cloud. A network device includes a network interface to send and receive messages, a routing unit comprising one or more processors configured to execute a version of a network operating system, and a virtual machine agent. The virtual machine agent is configured to identify a virtual machine executing at a computing cloud communicatively coupled to the network device, wherein the identified virtual machine executes an instance of the version of the network operating system, to send, using the at least one network interface and to the virtual machine, a request to perform a task, and to receive, using the at least one network interface and from the virtual machine, a task response that includes a result of performing the task. The routing unit is configured to update the network device based on the result. | 12-26-2013 |
20140003232 | FEEDBACK LOOP FOR SERVICE ENGINEERED PATHS | 01-02-2014 |
20140334295 | Symmetric Service Chain Binding - A plurality of network nodes are deployed in a network, each network node configured to apply a service function to traffic that passes through the respective network nodes. A controller generates information for a service chain that involves application to traffic of one or more service functions at corresponding ones of the plurality of network nodes along a forward path through the one or more network nodes. The controller identifies one or more of the service functions within the service chain that is stateful. When one or more of the service functions of the service chain is stateful, the controller generates information for a reverse path through the one or more service nodes for the one or more stateful service functions. The controller binds a forward chain identifier for the forward path with a reverse chain identifier for the reverse path for the service chain. | 11-13-2014 |
20140334488 | Data Plane Learning of Bi-Directional Service Chains - Techniques are provided to decouple service chain structure from the underlying network forwarding state and allow for data plane learning of service chain forwarding requirements and any association between services function state requirements and the forward and reverse forwarding paths for a service chain. In a network comprising a plurality of network nodes each configured to apply a service function to traffic that passes through the respective network node, a packet is received at a network node. When the network node determines that the service function it applies is stateful, it updates context information in a network service header of the packet to indicate that the service function applied at the network node is stateful and that traffic for a reverse path matching the classification criteria is to be returned to the network node. | 11-13-2014 |
20140351452 | Chaining Service Zones by way of Route Re-Origination - Presented herein are techniques for use in a network environment that includes one or more service zones, each service zone including at least one instance of an in-line application service to be applied to network traffic and one or more routers to direct network traffic to the at least one service, and a route target being assigned to a unique service zone to serve as a community value for route import and export between routers of other service zones, destination networks or source networks via a control protocol. An edge router in each service zone or destination network advertises routes by its destination network prefix tagged with its route target. A service chain is created by importing and exporting of destination network prefixes by way of route targets at edge routers of the service zones or source networks. | 11-27-2014 |
20140362682 | Determining the Operations Performed Along a Service Path/Service Chain - Presented herein are techniques performed in a network comprising a plurality of network nodes each configured to apply one or more service functions to traffic that passes the respective network nodes in a service path. At a network node, an indication is received of a failure or degradation of one or more service functions or applications applied to traffic at the network node. Data descriptive of the failure or degradation is generated. A previous service hop network node at which a service function or application was applied to traffic in the service path is determined. The data descriptive of the failure or degradation is communicated to the previous service hop network node. | 12-11-2014 |
20140362857 | Stacking Metadata Contexts for Service Chains - Presented herein are techniques useful in a network comprising a plurality of network nodes each configured to apply one or more service functions to traffic that passes through the respective network nodes. A network node receives packets encapsulated in a service header that includes information defining a variable set of context headers stacked into an association of metadata that is relevant to one or more service functions within a service path comprised of one or more network nodes. The network node interprets a forwarding state and a next-hop network node for the service path from the service header, and determines a service action or associated metadata from the set of context headers. | 12-11-2014 |
20140365634 | Programmable Network Analytics Processing via an Inspect/Apply-Action Applied to Physical and Virtual Entities - Techniques are provided to programming network analytics processing in virtual and physical network devices, useful for software-defined networking (SDN). A controller, e.g., a so-called SDN controller, is configured to identify a control-plane or data-plane flow originating, terminating or transiting a physical or virtual network element. The controller generates one or more network analytics processing actions to be performed by the physical or virtual network element based on inspection of traffic by the physical or virtual network element. The controller forms or generates an inspect/apply-action message containing information identifying the control-plane or data-plane flow for inspection and the one or more network analytics processing actions to be performed. The inspect/apply-action message is sent to the physical or virtual network element. | 12-11-2014 |
20150244628 | ADVERTISING TRAFFIC ENGINEERING INFORMATION WITH BORDER GATEWAY PROTOCOL - In general, techniques are described for distributing traffic engineering (TE) link information across network routing protocol domain boundaries using a routing protocol. In one example, a network device logically located within a first routing protocol domain includes a routing protocol module executing on a control unit to execute an exterior gateway routing protocol. The routing protocol module of the network device receives an exterior gateway routing protocol advertisement from a router logically located within a second routing protocol domain and decodes traffic engineering information for a traffic engineering link from the exterior gateway routing protocol advertisement. A path computation module of the network device computes a traffic engineered path by selecting the traffic engineering link for inclusion in the traffic engineered path based on the traffic engineering information. | 08-27-2015 |
20160006651 | Stacking Metadata Contexts for Service Chains - Presented herein are techniques useful in a network comprising a plurality of network nodes each configured to apply one or more service functions to traffic that passes through the respective network nodes. A network node receives packets encapsulated in a service header that includes information defining a first set of context headers stacked into an association of metadata that is relevant to one or more service functions within a service path comprised of one or more network nodes. The network node performs at least one of the service functions in the service path and rewrites the service header with a second set of context headers. The second set of context headers include metadata derived from performing the service function(s) at the network node. | 01-07-2016 |
20160099867 | DATA PLANE LEARNING OF BI-DIRECTIONAL SERVICE CHAINS - Techniques are provided to decouple service chain structure from the underlying network forwarding state and allow for data plane learning of service chain forwarding requirements and any association between services function state requirements and the forward and reverse forwarding paths for a service chain. In a network comprising a plurality of network nodes each configured to apply a service function to traffic that passes through the respective network node, a packet is received at a network node. When the network node determines that the service function it applies is stateful, it updates context information in a network service header of the packet to indicate that the service function applied at the network node is stateful and that traffic for a reverse path matching the classification criteria is to be returned to the network node. | 04-07-2016 |
Patent application number | Description | Published |
20120169812 | CONSUMABLE SUPPLY ITEM, FLUID RESERVOIR AND RECIRCULATION SYSTEM FOR MICRO-FLUID APPLICATIONS - A consumable supply item for an imaging device holds an initial or refillable volume of ink. An interior retains the ink while exit and return ports define openings through a housing to fluidly communicate the interior to the imaging device. The opening of the return port is larger than the opening of the exit port. The design slows the return of fluid to the housing which minimizes air bubbles or frothiness in the fluid. During use, ink depletes toward a bottom surface of the interior beneath which the ink is prevented from occupying. A housing section below the interior retains a portion of the exit port so that a bottom of the opening of the exit port is substantially horizontally aligned with the bottom surface. It prevents stranding ink beneath the exit port. Further embodiments include port configuration, construction, and modular components, to name a few. | 07-05-2012 |
20120169813 | CONSUMABLE SUPPLY ITEM, FLUID RESERVOIR AND RECIRCULATION SYSTEM FOR MICRO-FLUID APPLICATIONS - A housing defines a fluid reservoir for an imaging device. One or more exterior walls define a volume for holding ink to set a fluid backpressure in the imaging device. An opening in the walls is positioned for overflowing excessive ink from the volume to maintain the fluid backpressure within a predetermined operating range. Fluid inlets and outlets connect the reservoir to both a supply item and an ejection head. Ink flows into the reservoir from the supply item. It fills until the fluid rises to a height where it overflows back to the supply item. Less full reservoirs fill as the pump operates, while full reservoirs simultaneously return fluid back to their supply containers. Fluid does not spill from the walls. | 07-05-2012 |
20120218356 | CONSUMABLE SUPPLY ITEM WITH CAPACITIVE FLUID LEVEL DETECTION FOR MICRO-FLUID APPLICATIONS - A consumable supply item for an imaging device holds an initial or refillable volume of fluid. Its housing defines an interior having a pair of opposed electrodes. The electrodes define a capacitance that varies in response to an amount of liquid between them. A volume space filled by the liquid varies along a length of the electrodes. The design facilitates abrupt changes in capacitance values at each change in the volume space. Devices can recalibrate fluid levels at these changes. Electrode interior surfaces face one another. At least one electrode has an open region, such as a hole or a cutout of material. In another design, a support material connects to each electrode to provide mechanical stability and create a region preventing filling by the liquid. Further embodiments contemplate material selection, construction, and modularity, to name a few. | 08-30-2012 |
20150352856 | CONSUMABLE SUPPLY ITEM WITH FLUID SENSING FOR MICRO-FLUID APPLICATIONS - A consumable supply item for an imaging device holds an initial or refillable volume of ink. A housing defines an interior having a pair of opposed electrodes. The electrodes have a capacitance that varies in response to an amount of liquid between them. A controller energizes one electrode and receives an output reading from the other. The controller processes the reading on board the housing and supplies it as a digital data stream to the imaging device during use. A memory stores calibration values for an empty and full housing. The controller writes back to the memory present fluid levels obtained from the output reading of the electrode. An enable output allows operation or not of a fluid pump in the imaging device. Materials, construction, modularity, and fluid communication ports are further embodiments, to name a few. | 12-10-2015 |
20150375516 | CONSUMABLE SUPPLY ITEM WITH FLUID SENSING AND PUMP ENABLE FOR MICRO-FLUID APPLICATIONS - A consumable supply item for an imaging device holds an initial or refillable volume of ink. A housing defines an interior having a pair of opposed electrodes. The electrodes have a capacitance that varies in response to an amount of liquid between them. A controller energizes one electrode and receives an output reading from the other. The controller processes the reading on board the housing and supplies it as a digital data stream to the imaging device during use. A memory stores calibration values for an empty and full housing. The controller writes back to the memory present fluid levels obtained from the output reading of the electrode. An enable output allows operation or not of a fluid pump in the imaging device. Materials, construction, modularity, and fluid communication ports are further embodiments, to name a few. | 12-31-2015 |