Rama S.
Rama S. Apalla, Nashua, NH US
Patent application number | Description | Published |
---|---|---|
20130077625 | EXTENSION OF THE INTERPRETATION AND DEFINITION OF THE IS-IS TLV/SUB-TLV - Techniques disclosed herein include systems and methods for improving efficiency of multicast state generation within Shortest Path Bridging (SPB) networks. Techniques include using an IS-IS TLV structure with new multicast state computation rules for SPB Networks. SPB Networks use a TLV field for the I-SID Address (and equivalent TLV fields defined in different IETF/IEEE drafts) and node nicknames to signal information that is used to compute a multicast state required to provide L2 Services over a given SPB Network. The I-SID Address TLV is set or filled to carry various items of information. These items of information can include Backbone Media Access Control (B-MAC), Virtual Local Area Network Identifier (VID), I-SID[Transmit, Receive Bit], etc. | 03-28-2013 |
20130077626 | SEPARATION OF EDGE AND ROUTING/CONTROL INFORMATION FOR MULTICAST OVER SHORTEST PATH BRIDGING - Techniques disclosed herein include systems and methods for providing a scalable solution to transmit edge IP Multicast sender information in a Shortest Path Bridging (SPB) network. Control information is exchanged between Ingress Backbone Edge Bridges and Egress Backbone Edge Bridges using Multicast Flow Specific and type-length-value (TLV) structures, or other control messages, to announce available multicast streams at ingress nodes within the SPB network. Such exchanges of control messages trigger sending SPB specific Intermediate System To Intermediate System (IS-IS) TLV control message with path computation information via IS-IS control messages. This second set of control messages is exchanged within the SPB network and includes source-specific multicast stream information that is used by Backbone Core Bridges to establish a multicast forward state and compute multicast forwarding paths. Multicast data traffic can then be transmitted through the SPB network using a one-to-many distribution model. | 03-28-2013 |
Rama S. Appalla, Nashua, NH US
Patent application number | Description | Published |
---|---|---|
20130077628 | METHOD TO ROUTE MULTICAST DATA IN SPB NETWORK BY ESTABLISHING THE VIRTUAL PIM ADJACENCY ACROSS THE SPB NETWORKS IN A SINGLE PIM DOMAIN - Techniques disclosed herein include systems and methods that extend Protocol Independent Multicast (PIM) protocols to Shortest Path Bridging (SPB) technology. This includes connecting an IP multicast domain across an SPB network. SPB edge routers, also known as Backbone Edge Bridges, form virtual adjacencies with each other. As such, SPB edge routers maintain such PIM adjacency without sending Hello messages. Backbone Edge Bridges (BEBs) are discovered using null Intermediate System To Intermediate System (IS-IS) Internet Protocol Multicast (IPMC) type-length-value (TLV) control messages. Each PIM-enabled BEB records other PIM-enabled BEBs as an adjacent PIM-router in response to receiving a NULL IPMC TLV from those BEBs. Accordingly, PIM-enabled BEBs form a full mesh virtual adjacency between each other and can thereby encapsulate PIM control messages sent and received between two access networks connected to the SPB network. | 03-28-2013 |
20130136122 | USING MULTIPLE IGMP QUERIERS IN A LAYER 2 NETWORK - Techniques disclosed herein include systems and methods for extending an IGMP broadcast domain (multicast domain) across a transport network without implementing IGMP snooping within the core of the transport network, yet while providing efficient transport within the core of the transport network. Techniques include dividing a single IGMP interface into multiple IGMP domains or sub-domains. A separate Querier is then elected for each IGMP domain using the single IGMP interface. Edge nodes of the transport network can be configured as the multiple IGMP Queriers, and then re-distribute sender information via a separate routing protocol. Requests can then be sent using the transport network control messaging or routing protocol instead of IGMP snoop messages to advertise multicast data streams in between the multiple IGMP domains (across the transport network). Traffic can then delivered efficiently between isolated access networks of a single Service Layer 2 Network. | 05-30-2013 |
Rama S. Vykunda, Round Rock, TX US
Patent application number | Description | Published |
---|---|---|
20110161395 | SYNTHETIC TRANSACTION MONITORING AND MANAGEMENT OF SCRIPTS - According to an embodiment of the invention, a system to improve synthetic transaction monitoring and management scripts may include an object provided by a web-server. The system may also include a testing tool configured to interact with the object, set a verification point based upon the object, and collect contextual information about the object. The system may further include a synthetic transaction script configured to test the object's performance and availability based upon the testing tool's interactions with the object, the verification point, and the collected contextual information about the object. | 06-30-2011 |
Rama S. Vykunta, Round Rock, TX US
Patent application number | Description | Published |
---|---|---|
20110004926 | Automatically Handling Proxy Server and Web Server Authentication - A mechanism is provided for automatically handling server authentication. Responsive to receiving a response to a synthetic transaction from a server, a determination is made as to whether the response contains an authentication challenge. If the response contains the authentication challenge, the response is parsed to identify one or more attributes associated with the authentication challenge. A determination is made as to whether one or more attributes associated with each realm in a set of realms stored in a realm list matches the one or more attributes associated with the authentication challenge. If there is a match, an authentication response to the authentication challenge is generated for the matched realm. The authentication response is then sent automatically to the server in order to authenticate the synthetic transaction. | 01-06-2011 |