会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • Metro Ethernet Network With Scaled Broadcast and Service Instance Domains
    • 城域以太网网络与扩展广播和服务实例域
    • US20140198795A1
    • 2014-07-17
    • US14153669
    • 2014-01-13
    • Ali SajassiNorman W. Finn
    • Ali SajassiNorman W. Finn
    • H04L29/06
    • H04L69/22H04L12/18H04L12/2852H04L12/4645H04L12/465H04L12/4662H04L12/4691H04L45/16H04L49/351
    • A method of operation for a provider edge device of a core network includes receiving a customer frame from an access network; the customer frame having a first Virtual Local Area Network (VLAN) tag of a first predetermined bit length. The first VLAN tag including a service instance identifier. The service instance identifier of the first VLAN tag is then mapped into a second VLAN tag of a second predetermined bit length greater than the first predetermined bit length. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. 37 CFR 1.72(b).
    • 核心网络的提供商边缘设备的操作方法包括从接入网络接收客户帧; 所述客户帧具有第一预定位长度的第一虚拟局域网(VLAN)标签。 第一个VLAN标签包含服务实例标识符。 然后将第一VLAN标签的服务实例标识符映射到大于第一预定位长度的第二预定位长度的第二VLAN标签。 要强调的是,该摘要被提供以符合要求抽象的规则,允许搜索者或其他读者快速确定技术公开的主题。 提交它的理解是,它不会用于解释或限制权利要求的范围或含义。 37 CFR 1.72(b)。
    • 3. 发明授权
    • Single-homing and active-active multi-homing in a virtual private LAN service
    • 虚拟专用LAN服务中的单归属和主动主动多归属
    • US08724627B2
    • 2014-05-13
    • US13031909
    • 2011-02-22
    • Clarence FilsfilsSami BoutrosSamer M SalamAli Sajassi
    • Clarence FilsfilsSami BoutrosSamer M SalamAli Sajassi
    • H04L12/28
    • H04L12/4641H04L45/16H04L45/50H04L45/68
    • In one embodiment, single-homing and active-active multi-homing is provided in a Virtual Private LAN Service (VPLS). A customer edge node actively communicates frames of a same Virtual Private Network (VPN) instance with two or more VPLS nodes of a VPLS network. The VPLS nodes are configured to appropriately forward frames throughout the VPLS network: without looping of a frame sent by the same external node back to the same external node, without flooding multiple copies of a frame to the same external node, and while performing learning of addresses in forwarding tables of said VPLS nodes such that said forwarding tables of said VPLS nodes converge despite frames of the same LAN service being received by said at least two of said VPLS nodes from the same external node.
    • 在一个实施例中,在虚拟专用LAN服务(VPLS)中提供单归属和主动主动多归位。 客户边缘节点主动将相同虚拟专用网(VPN)实例的帧与VPLS网络的两个或多个VPLS节点进行通信。 VPLS节点被配置为在整个VPLS网络中适当地转发帧:不将相同外部节点发送的帧循环回相同的外部节点,而不会将帧的多个拷贝淹没到同一个外部节点,同时执行学习 在所述VPLS节点的转发表中的地址,使得所述VPLS节点的所述转发表收敛,尽管所述至少两个所述VPLS节点从相同外部节点接收到相同LAN服务的帧。
    • 8. 发明授权
    • Comprehensive model for VPLS
    • VPLS综合模型
    • US08213435B2
    • 2012-07-03
    • US11117250
    • 2005-04-28
    • Ali Sajassi
    • Ali Sajassi
    • H04L12/28G06F15/16
    • H04L12/2898H04L12/4645H04L12/465H04L12/4691
    • A VPLS model is implemented in a network-facing provider edge (n-PE) device configured to receive a packet from an access network; the packet having a first Virtual Local Area Network (VLAN) tag of a first predetermined bit length. The n-PE device mapping the service instance identifier of the first VLAN tag into a second VLAN tag of a second predetermined bit length greater than the first predetermined bit length, the second VLAN tag identifying a Virtual Private LAN Service (VPLS) instance. The n-PE device then sends the packet with the second VLAN tag across a service provider (SP) core network via a pseudowire (PW) that functions as a logical link to another PE device. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. 37 CFR 1.72(b).
    • 在面向网络的提供商边缘(n-PE)设备中实现VPLS模型,其被配置为从接入网络接收分组; 该分组具有第一预定比特长度的第一虚拟局域网(VLAN)标签。 n-PE设备将第一VLAN标签的服务实例标识符映射到大于第一预定比特长度的第二预定比特长度的第二VLAN标签,第二VLAN标签标识虚拟专用LAN服务(VPLS)实例。 然后,n-PE设备通过用作到另一个PE设备的逻辑链路的伪线(PW)在服务提供商(SP)核心网络上发送具有第二VLAN标签的分组。 要强调的是,该摘要被提供以符合要求抽象的规则,允许搜索者或其他读者快速确定技术公开内容的主题。 提交它的理解是,它不会用于解释或限制权利要求的范围或含义。 37 CFR 1.72(b)。
    • 10. 发明申请
    • Failure protection for access ring topology
    • 接入环拓扑失效保护
    • US20100315946A1
    • 2010-12-16
    • US12456100
    • 2009-06-10
    • Samer SalamAli Sajassi
    • Samer SalamAli Sajassi
    • H04L1/00H04L12/26H04L12/28
    • H04L45/28H04L12/437H04L12/4641H04L45/50H04L45/68
    • In one embodiment, a method includes configuring a first node, located at an edge of a core network and connected to an access ring, with a maintenance end point for a virtual local area network on a port connecting the first node to the access ring. The first node operates in an active mode for the virtual local area network and is in communication with a second node located at the edge of the core network and connected to the access ring. The method further includes receiving and processing at a processor at the first node, continuity check messages from access nodes on the access ring, synchronizing the first node with the second node, and communicating from the first node to the second node to initiate switching of the second node from a backup mode to the active mode for the virtual local area network upon identification of a failure.
    • 在一个实施例中,一种方法包括在连接第一节点到接入环的端口上配置位于核心网的边缘并连接到接入环的第一节点,其具有用于虚拟局域网的维护端点。 第一节点以虚拟局域网的活动模式运行,并且与位于核心网络边缘并连接到接入环的第二节点进行通信。 该方法还包括在第一节点处的处理器处接收和处理来自接入环上的接入节点的连续性检查消息,使第一节点与第二节点同步,以及从第一节点到第二节点的通信,以启动 第二节点从备份模式到虚拟局域网的活动模式。