Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 112. Отображено 112.
06-08-2019 дата публикации

Virtual flow network in a cloud environment

Номер: US0010374972B2

A system and method for virtualizing a flow switch to be used by application providers in a cloud computing environment is provided. An application provider's packet handling rules are received by a cloud management system. The rules are translated from the application provider's overlay topology to the underlay data center topology. The underlay network elements involved in the received rules can be identified. A translated rule can be decomposed into a plurality of rule portions which are transmitted to the appropriate underlay network elements.

Подробнее
17-08-2006 дата публикации

Method and nodes for aggregating data traffic through unicast messages over an access domain using service bindings

Номер: US20060182146A1
Принадлежит:

The present invention relates to a method and nodes for performing data traffic aggregation over an access domain using service bindings. Upon receipt of a service request related message at an access edge node for a first device of a user domain, the service request related message identifying the first device of the user domain and one of the service provider domains, a service binding is created at the access edge node. The service binding rules data traffic between the first device of the user domain and the service provider domain by committing an access node serving the user domain and the access edge node in a manner of managing data traffic therebetween over the access domain. An access node serving the user domain for which the service request related message is received is informed of the created service binding. The created service binding is enforced at the access node and the access edge node for data traffic over the access domain between the first device of the user domain ...

Подробнее
12-09-2019 дата публикации

COMPUTING DEVICE AND METHOD FOR GENERATING A FABRIC-WIDE IPV6 ADDRESS

Номер: US20190281017A1
Принадлежит: Kaloom Inc.

Computing device and method for generating a fabric-wide IPv6 address in a data center comprising a plurality of fabrics. A configuration file is stored in a memory of a computing device. The configuration file comprises an Internet Protocol version 6 (IPv6) base prefix and a fabric identifier. A processing unit of the computing device determines a host identifier. The processing unit generates an IPv6 prefix, by combining the IPv6 base prefix stored in the configuration file and the fabric identifier stored in the configuration file. The processing unit generates an IPv6 address, by combining the IPv6 prefix and the host identifier. The processing unit further advertises the generated IPv6 address. 1. A computing device comprising:memory for storing a configuration file, the configuration file comprising an Internet Protocol version 6 (IPv6) base prefix and a fabric identifier; and determining a host identifier;', 'generating an IPv6 prefix by combining the IPv6 base prefix stored in the configuration file and the fabric identifier stored in the configuration file; and', 'generating an IPv6 address by combining the IPv6 prefix and the host identifier., 'a processing unit for2. The computing device of claim 1 , wherein the processing unit further advertises the generated IPv6 address.3. The computing device of claim 1 , wherein the IPv6 address begins with the IPv6 base prefix claim 1 , followed by the fabric identifier claim 1 , followed by optional zeros claim 1 , and terminates with the host identifier.4. The computing device of claim 1 , wherein the IPv6 base prefix is a/48 prefix.5. The computing device of claim 1 , wherein the fabric identifier is a 16 bits integer.6. The computing device of claim 1 , wherein the IPv6 prefix is a Unique Local Address (ULA) prefix or a public prefix.7. The computing device of claim 1 , wherein the host identifier is a 48 bits integer in hexadecimal format.8. The computing device of claim 7 , wherein the host identifier is a ...

Подробнее
29-06-2006 дата публикации

Adaptive router architecture using logical internal addressing

Номер: US20060140194A1
Принадлежит: Individual

A method and a related router comprising a network interface, a logical addressing module and a forwarding element card. The logical addressing module is capable of maintaining at least one local table associating at least one card of the router with at least a portion of at least one service provided by the router. The forwarding element card is capable of receiving a packet stream on the network interface, detecting that the packet stream requires further treatment from a further card of the router and, upon detection, consulting the local table to find an identifier, to which the further card is linked, based on information found in the packet stream before forwarding the packet stream toward the further card.

Подробнее
02-06-2020 дата публикации

Computing device and method for performing a fabric deployment in a data center

Номер: US0010673695B2
Принадлежит: KALOOM INC., KALOOM INC, Kaloom Inc.

Method and computing device performing a fabric deployment in a data center. The computing device stores a configuration file comprising first and second IPv6 base prefixes, and a fabric identifier. The computing device generates a host identifier, a fabric-wide IPv6 prefix by combining the first IPv6 base prefix and the fabric identifier, and a fabric-wide IPv6 address by combining the fabric-wide IPv6 prefix and the host identifier. The computing device determines a local node identifier and a local link identifier for a communication interface of the computing device. The computing device performs a (secure) neighbor discovery procedure for determining a remote node identifier and a remote link identifier for a communication interface of a remote computing device. The computing device generates a link IPv6 address based on the second IPv6 base prefix and at least some of: the local node and link identifiers, and the remote node and link identifiers.

Подробнее
16-02-2021 дата публикации

Computing device and method for generating a fabric-wide IPV6 address

Номер: US0010924454B2
Принадлежит: KALOOM INC., KALOOM INC, Kaloom Inc.

Computing device and method for generating a fabric-wide IPv6 address in a data center comprising a plurality of fabrics. A configuration file is stored in a memory of a computing device. The configuration file comprises an Internet Protocol version 6 (IPv6) base prefix and a fabric identifier. A processing unit of the computing device determines a host identifier. The processing unit generates an IPv6 prefix, by combining the IPv6 base prefix stored in the configuration file and the fabric identifier stored in the configuration file. The processing unit generates an IPv6 address, by combining the IPv6 prefix and the host identifier. The processing unit further advertises the generated IPv6 address.

Подробнее
14-05-2013 дата публикации

GMPLS based OAM provisioning

Номер: US0008441937B2

A method and network are described herein for provisioning Operations, Administration, and Maintenance (OAM) entities for a connection when setting-up the connection between an ingress edge node and an egress edge node.

Подробнее
27-04-2010 дата публикации

Decentralized node, access edge node, and access node for aggregating data traffic over an access domain, and method thereof

Номер: US0007706265B2

The present invention relates to a method, an access node, an access edge node and a decentralized node for aggregating data traffic over an access domain. The decentralized node corresponds to one of the service providers, and is located in closer proximity with user domains to be serviced. The decentralized node maintains over the access domain one or several Virtual Local Area Networks, for aggregating thereon data traffic to be exchanged with the user domains, on behalf of the service provider domain. To allow proper aggregation of the data traffic, service bindings are created and stored at the access edge node, and further stored at the decentralized node and at the access node. Therefore, aggregation of the data traffic between the decentralized node and the user domains over the access domain is performed in accordance with the created service bindings.

Подробнее
22-12-2020 дата публикации

Computing device and method for generating a link IPV6 address

Номер: US0010873500B2
Принадлежит: Kaloom Inc., KALOOM INC

Computing device (located in a fabric of a data center) and method for generating a link IPv6 address. The computing device determines a local node identifier and a local link identifier for a communication interface of the computing device. The computing device receives from a remote computing device a remote node identifier and a remote link identifier for a remote communication interface of the remote computing device. Based on a comparison of the local and remote node identifiers, the link IPv6 address is generated by using an IPv6 base prefix, the local node identifier, the remote node identifier, the local link identifier, the remote link identifier, and an indicator that the local node identifier is greater or lower than the remote node identifier. A network configuration of the computing device is performed by generating a fabric-wide IPv6 address and one or more link IPv6 address.

Подробнее
09-11-2006 дата публикации

Method for managing service bindings over an access domain and nodes therefor

Номер: US20060251055A1
Принадлежит:

The present invention relates to a method and nodes for managing service bindings over an access domain. For doing so, an access edge node is introduced in the access domain between a plurality of service providers and user domains, and an access node is introduced between the user domains and the access domain. The access edge node creates, modifies and removes service bindings and informs the access node of those creations, modifications and removals. Each service binding binds one of the user domain, the access node and the access edge node on data traffic handling over the access domain between the user domain and the service provider domain. More particularly, the service binding associates the user domain to a Virtual Local Area Network (VLAN) for the service provider domain on the access domain, controlled by the access edge node.

Подробнее
13-04-2021 дата публикации

Computing device and method for optimizing the tunneling of IP packets

Номер: US0010979247B2
Принадлежит: Kaloom Inc., KALOOM INC, KALOOM INC.

Computing devices and methods for transmitting and receiving optimized tunneling IP packets. At the entry point of a tunnel, an IP packet comprising at least one header is received. If data comprised in one of the at least one header of the received IP packet are redundant with data comprised in one or more tunneling header of a tunneling IP packet, then the redundant header is removed from the received IP packet. The tunneling IP packet encapsulating the received IP packet (with its redundant header removed) is transmitted. A header removal field is positioned in the tunneling IP packet to indicate the positive determination of redundancy. At the exit point of the tunnel, the tunneling IP packet is received. The header removal field and the one or more tunneling header of the tunneling IP packet are used for identifying the previous determination of redundancy and recreating the removed header.

Подробнее
04-08-2005 дата публикации

Adaptive router architecture

Номер: US20050169265A1
Принадлежит: Individual

A router and a router architecture comprising at least one network interface, a plurality of processing elements, at least one switching element and a plurality of forwarding elements. Each of the plurality of processing elements comprises at least one processing unit, wherein each processing unit is capable of processing network traffic to provide at least a portion of a network service. The switching element is capable of acting as a proxy of the plurality of processing elements while each of the plurality of forwarding elements is capable of receiving network traffic on the at least one network interface of the router and delegating processing of network traffic toward at least one of the plurality of processing elements through the at least one switching element.

Подробнее
30-03-2010 дата публикации

Adaptive router architecture

Номер: US0007688738B2

A router architecture with one or more network interfaces, processing, switching and forwarding elements, each which has one or more processing units capable of processing network traffic to provide at least a portion of a network service. The switching element is capable of acting as a proxy to the processing elements while each of the forwarding elements are capable of receiving network traffic on the network interface and are capable to delegate processing of network traffic toward processing elements through at least one switching element.

Подробнее
19-09-2019 дата публикации

COMPUTING DEVICE AND METHOD FOR PERFORMING A SECURE NEIGHBOR DISCOVERY

Номер: US20190288861A1
Принадлежит: Kaloom Inc.

Computing devices and method for performing a secure neighbor discovery. A local computing device transmits an encrypted local node identifier and an encrypted local challenge to a remote computing device. The remote computing device generates a local challenge response based on the local challenge; and transmits an encrypted remote node identifier and an encrypted local challenge response to the local computing device. The local computing device determines that the received local challenge response corresponds to an expected local challenge response generated based on the local challenge. The remote computing device further transmits an encrypted remote challenge. The local computing device generates a remote challenge response based on the remote challenge; and transmits an encrypted remote challenge response to the remote computing device. The remote computing device determines that the received remote challenge response corresponds to an expected remote challenge response generated based on the remote challenge.

Подробнее
12-08-2008 дата публикации

Adaptive router architecture enabling efficient internal communication

Номер: US0007411945B2

A router comprising a plurality of elements, each having an element identifier, subdivided into a plurality of groups of at least one element. Each group has a common identifier and each member within each group shares redundant capabilities. Each element is capable of communicating with another element by addressing information to the common identifier instead of the element identifier. Optionally, one element can be a member of more than one group. Another option suggests that all elements within a group share essential information associated with a service provided by the group. Another option is implemented through one element of the router identifying a primary element for a group, wherein the primary element serves requests addressed the corresponding common identifier. Yet another option suggests that one element is identified through configuration of the router as a primary element in its group to serve requests addressed to the common identifier.

Подробнее
12-08-2008 дата публикации

Distributed finite state machine

Номер: US0007411953B2

A finite state machine and a router adapted thereto for providing a service. The finite state machine is executed on a first and a second distinct hardware modules. The first module has access to a first memory and the second module has access to a second memory. The first and second memory are different and not shared therebetween. At least one transition between a first state and a second state of the finite state machine from the first module to the second module is performed by sending local information of the first module toward the second module. The local information at least indicates the second state of the finite state machine. Local information can be inserted by the router, for example, in a meta-data header.

Подробнее
22-05-2008 дата публикации

METHOD FOR AUTHENTICATING NOMADIC USER DOMAINS AND NODES THEREFOR

Номер: US20080120714A1
Принадлежит: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)

The present invention provides a method and nodes for authenticating nomadic users accessing service providers. An access edge node authenticates nomadic users when service requests are received therefrom. The access edge node hosts a plurality of service agents, where each service agent comprises transport parameters for access to one of the service providers. Upon receipt at the access edge node of a service request message identifying a service provider and a nomadic user, an identity of the nomadic user is authenticated and verification is made that a service agent corresponding to the identified service provider exists. If both the authentication and the verification are positive, an authenticated service binding is created, connecting the nomadic user, the service provider and the transport parameters. Then, an access node providing access to the nomadic user for which the service request message was received is informed of the authenticated service binding.

Подробнее
04-07-2023 дата публикации

Computing device and method for performing a secure neighbor discovery

Номер: US0011695575B2
Принадлежит: KALOOM Inc, KALOOM INC.

Computing devices and method for performing a secure neighbor discovery. A local computing device transmits an encrypted local node identifier and an encrypted local challenge to a remote computing device. The remote computing device generates a local challenge response based on the local challenge; and transmits an encrypted remote node identifier and an encrypted local challenge response to the local computing device. The local computing device determines that the received local challenge response corresponds to an expected local challenge response generated based on the local challenge. The remote computing device further transmits an encrypted remote challenge. The local computing device generates a remote challenge response based on the remote challenge; and transmits an encrypted remote challenge response to the remote computing device. The remote computing device determines that the received remote challenge response corresponds to an expected remote challenge response generated based on the remote challenge.

Подробнее
17-08-2006 дата публикации

Method and nodes for handling multicast messages

Номер: US20060184695A1
Принадлежит: Individual

The present invention relates to a method and nodes for handling multicast messages over an access domain. The method starts with the receipt of a multicast message from a service provider domain. The method pursues with the identification of a service agent corresponding to the service provider domain from which the multicast message is received. Then, the content of a Virtual Local Area Network (VLAN) Tag field of the multicast message is modified so as to correspond to the identified service agent. The modified multicast message is forwarded on the access domain. Upon receipt of the modified multicast message at an access node, the access node identifies at least one service binding related to the service agent identified in the VLAN Tag field of the received multicast message. For each related service binding, the access node adapts the VLAN Tag field of the multicast message so as to correspond to a local VLAN information, and forwards the adapted multicast message on a user port corresponding to the service binding. The invention also includes an access edge node and an access node adapted to perform the method of the present invention.

Подробнее
10-04-2018 дата публикации

Method and architecture for application mobility in distributed cloud environment

Номер: US0009942320B2

A method for moving application related records ( 220 ) between distributed cloud domains ( 206 a to 206 w ) when a user terminal ( 210 ) changes its physical location and a predetermined condition is fulfilled. The user terminal ( 210 ) is connected to a telecommunication network ( 201 ) and uses an application (App). The method determines that a user terminal location has changed at least from a first network area ( 202 ) of the telecommunication network ( 201 ) to a second network area ( 204 ), considering one or more constraints associated with (i) a location of the user terminal ( 210 ) in the second network area ( 204 ), (ii) a location of a cloud component of the application (App) in a first cloud domain ( 206 n ) associated with the first network area ( 201 ), and (iii) a location of a second cloud domain ( 206 w ) associated with the second network area ( 204 ), and moves, when the predetermined condition is fulfilled, the application related records ( 220 ) from the first cloud domain ( 206 n ) to the second cloud domain ( 206 w ).

Подробнее
11-05-2021 дата публикации

Computing device and method for performing a secure neighbor discovery

Номер: US0011005667B2
Принадлежит: Kaloom Inc., KALOOM INC

Computing devices and method for performing a secure neighbor discovery. A local computing device transmits an encrypted local node identifier and an encrypted local challenge to a remote computing device. The remote computing device generates a local challenge response based on the local challenge; and transmits an encrypted remote node identifier and an encrypted local challenge response to the local computing device. The local computing device determines that the received local challenge response corresponds to an expected local challenge response generated based on the local challenge. The remote computing device further transmits an encrypted remote challenge. The local computing device generates a remote challenge response based on the remote challenge; and transmits an encrypted remote challenge response to the remote computing device. The remote computing device determines that the received remote challenge response corresponds to an expected remote challenge response generated ...

Подробнее
13-07-2006 дата публикации

Adaptive router architecture providing a rate limiting mechanism

Номер: US20060153077A1
Принадлежит:

A router, a switching element card and a related method for providing a rate limiting mechanism in the router comprising a network interface, a forwarding element card connected to the network interface and the switching element card. The switching element card is capable of receiving the network traffic from the forwarding element card and applying a rate limiting mechanism on the network traffic before forwarding the network traffic to a further card of the router. The switching element card does so if the further card has a lower treatment rate than the forwarding element card and the rate limiting mechanism is applied based on the difference between the rate of the received network traffic and the treatment rate of the further card.

Подробнее
16-04-2009 дата публикации

SUPPORT OF TRIPLE PLAY SERVICES IN USER DEVICES

Номер: US20090097492A1
Принадлежит: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)

Several services offered by distinct service providers can be accessed from a single user device, through one or more gateways. To ensure quality of service control, each service provider allocates a distinct address to the user device. Distinct forwarding information bases and service mappings are defined at the user device, comprising one such forwarding information base for each service provider and one service mapping for each service type offered by a given service provider. The separate addresses allocated to the user device are related to the separate service mappings. Distinct virtual local area networks (VLANs) are defined, each containing one of the forwarding information base and one of the service mappings. Tags added to packets by the gateways and arriving at the user device are used to link the packets to the proper service provider and to the proper service type.

Подробнее
09-02-2010 дата публикации

Method and nodes for aggregating data traffic through unicast messages over an access domain using service bindings

Номер: US0007660253B2

The present invention relates to a method and nodes for performing data traffic aggregation over an access domain using service bindings. Upon receipt of a service request related message at an access edge node for a first device of a user domain, the service request related message identifying the first device of the user domain and one of the service provider domains, a service binding is created at the access edge node. The service binding rules data traffic between the first device of the user domain and the service provider domain by committing an access node serving the user domain and the access edge node in a manner of managing data traffic therebetween over the access domain. An access node serving the user domain for which the service request related message is received is informed of the created service binding. The created service binding is enforced at the access node and the access edge node for data traffic over the access domain between the first device of the user domain ...

Подробнее
07-09-2010 дата публикации

Method and nodes for handling multicast messages

Номер: US0007792996B2

The present invention relates to a method and nodes for handling multicast messages over an access domain. The method starts with the receipt of a multicast message from a service provider domain. The method pursues with the identification of a service agent corresponding to the service provider domain from which the multicast message is received. Then, the content of a Virtual Local Area Network (VLAN) Tag field of the multicast message is modified so as to correspond to the identified service agent. The modified multicast message is forwarded on the access domain. Upon receipt of the modified multicast message at an access node, the access node identifies at least one service binding related to the service agent identified in the VLAN Tag field of the received multicast message. For each related service binding, the access node adapts the VLAN Tag field of the multicast message so as to correspond to a local VLAN information, and forwards the adapted multicast message on a user port corresponding to the service binding. The invention also includes an access edge node and an access node adapted to perform the method of the present invention.

Подробнее
22-09-2011 дата публикации

Packet node for applying service path routing at the MAC layer

Номер: US20110228778A1
Принадлежит: TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)

A packet node and corresponding methods are provided for providing services to packets received at the packet node. At an ingress card, a packet is classified and a virtual media access control (VMAC) address is attached to the packet. The VMAC address identifies a service component for providing a service to the packet. Layer two switching of the packet is made within the packet node, based on the VMAC address. After processing of the packet by the service component, a new VMAC address is attached to the packet. Further layer two switching of the packet, based on the new VMAC address, may lead to further processing by another service component or to forwarding of the packet beyond the packet node.

Подробнее
01-05-2008 дата публикации

Decentralized node, access edge note, and access node for aggregating data traffic over an access domain, and method therefor

Номер: US20080101343A1
Принадлежит:

The present invention relates to a method, an access node, an access edge node and a decentralized node for aggregating data traffic over an access domain. The decentralized node corresponds to one of the service providers, and is located in closer proximity with user domains to be serviced. The decentralized node maintains over the access domain one or several Virtual Local Area Networks, for aggregating thereon data traffic to be exchanged with the user domains, on behalf of the service provider domain. To allow proper aggregation of the data traffic, service bindings are created and stored at the access edge node, and further stored at the decentralized node and at the access node. Therefore, aggregation of the data traffic between the decentralized node and the user domains over the access domain is performed in accordance with the created service bindings.

Подробнее
17-08-2006 дата публикации

Method and nodes for handling broadcast messages over an access domain

Номер: US20060184694A1
Принадлежит:

The present invention relates to a method and nodes for handling broadcast messages over an access domain. For doing so, an access node and an access edge node are adapted to allow tunnelling of broadcast messages within Unicast messages transmitted over the access domain. The access node receives broadcast messages from user domains, intercepts the broadcast messages and forwards the received broadcast messages to the access edge node in Unicast messages. The access edge node receives and identifies the tunnelled broadcast messages. Then, the identified tunnelled broadcast messages are detunneled by the broadcast handler at the access edge node and handled by the broadcast handler.

Подробнее
06-05-2010 дата публикации

MULTICAST AND BIDIRECTIONAL UNICAST SIGNALING IN SINGLE ROOT MULTIPOINT SERVICES USING RSVP-TE

Номер: US20100111086A1
Принадлежит: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)

A method for establishing a downstream multicast and a upstream and downstream unicast connections between a root and at least one leaf, the root and the at least one leaf being in a tree-type configuration, comprises: creating a downstream unicast label; and distributing the created downstream unicast label in a same signaling message as downstream multicast and upstream unicast labels from the root to the at least one leaf. A network node comprising such a downstream unicast label is used to carry out the method.

Подробнее
18-09-2008 дата публикации

APPLYING POLICIES FOR MANAGING A SERVICE FLOW

Номер: US20080228932A1
Принадлежит: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)

A method and an access domain node identify and manage a type of service offered by a service provider to user domains. A service template is prepared by the service provider, comprising an address of a server and a protocol identifier, as well as policies for controlling traffic for the service. Upon set up of a connection between a user domain and the service provider, an address of the user domain is added to the service template to produce a service flow management set. Every data packet exchanged between the user domain and the server, in either direction, is related to a service data flow for a given service type by checking for a match between a source address, a destination address, and a protocol type contained therein, with an appropriate service type. Policies from the service flow management set are used to manage the flow of data packets.

Подробнее
27-02-2014 дата публикации

TIMER VALUE NEGOTIATION FOR PATH CONFIGURATION BASED ON RSVP-TE

Номер: US20140056581A1
Принадлежит: TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)

The present invention relates to an ingress node () and methods therein for Operation Administration arid Maintenance, OAM related to Resource Reservation Protocol-Traffic Engineering, RSVP-TE5 for obtaining attributes for timer values being assigned to a connection from the ingress node () via intermediate nodes () to an egress node (), during configuration of die connection. An interval of suitable tinier values for the intermediate nodes is specified. Configuration attributes are obtained for a timer value within an interval that is acceptable by the intermediate nodes and the egress node, based on the specified interval of suitable timer values. The obtained configuration attributes are applied during configuration of the connection from the ingress node via the intermediate nodes to the egress node, if the obtained configuration attributes are appropriate to the ingress node. Fine-tuning of connection related timers can therefore be achieved, decreasing the overall recovery time and the overall overhead. 1. A method in an ingress node of a network for Operation Administration and Maintenance , OAM related to Resource Reservation Protocol-Traffic Engineering , RSVP-TE , for obtaining attributes for timer values being assigned to a connection from the ingress node via intermediate nodes to an egress node , during configuration of the connection , said method comprising:{'b': 202', '302, 'specifying an interval of suitable timer values (steps , ) for the intermediate nodes, based on Traffic Engineering information of one or more nodes in the network,'}{'b': 204', '406', '504', '602', '610, 'obtaining configuration attributes (steps , , , , ) for a timer value within an interval, during configuration of the connection from the ingress node via the intermediate nodes to the egress node, which interval is acceptable by the intermediate nodes and the egress node, based on the specified interval of suitable timer values, and'}{'b': 206', '410', '606, 'applying the ...

Подробнее
15-01-2019 дата публикации

Bottle shipping assembly

Номер: US0010179692B2
Принадлежит: SOLUTIONS ZENPAC INC., SOLUTIONS ZENPAC INC

The present invention relates to a bottle shipment assembly that can withstand shock and impact during shipping. The assembly can accommodate a wide variety of bottles, uses very little material such as HDPE and PVC, and is easily recyclable. There are three parts to the assembly: a neck portion that locks around the bottle's neck, a base portion that snugly fits around the bottle's bottom, and an exterior box that securely and immovably houses the bottle fitted with the neck portion and base portion. The neck portion has a center portion and two wings that move from inoperable to operable position. The center portion has with a head-engagement recess that slips over the bottle's neck. In operable position, the neck portion has a square configuration, and fits snugly inside the exterior box. The base portion also has a square configuration that fits snugly inside the exterior box.

Подробнее
01-02-2011 дата публикации

Method for managing service bindings over an access domain and nodes therefor

Номер: US0007881198B2

The present invention relates to a method and nodes for managing service bindings over an access domain. For doing so, an access edge node is introduced in the access domain between a plurality of service providers and user domains, and an access node is introduced between the user domains and the access domain. The access edge node creates, modifies and removes service bindings and informs the access node of those creations, modifications and removals. Each service binding binds one of the user domain, the access node and the access edge node on data traffic handling over the access domain between the user domain and the service provider domain. More particularly, the service binding associates the user domain to a Virtual Local Area Network (VLAN) for the service provider domain on the access domain, controlled by the access edge node.

Подробнее
23-02-2012 дата публикации

Methods and Devices for Point to Multipoint Traffic Path Encoding

Номер: US20120044936A1
Принадлежит: Telefonaktiebolaget L M Ericsson (publ)

The present invention relates to network nodes and methods that use an encoding scheme for encoding a point-to-multipoint traffic path from one ingress node to a plurality of egress nodes in, for example, a Multi-Protocol Label Switching network. According to the encoding scheme a so-called common ERO is used. The common ERO specifies a list consisting of nodes that are common to several sub paths in order to provide a compression mechanism that reduces the size of path messages that are used for signaling the point-to-multipoint traffic path.

Подробнее
17-08-2006 дата публикации

Method for aggregating data traffic over an access domain and nodes therefor

Номер: US20060182123A1
Принадлежит:

The present invention relates to a method and nodes for aggregating data traffic over an access domain carrying data traffic between a plurality of service providers and user domains. For doing so, an access edge node is introduced in the access domain between the plurality of service providers, and the user domains. The access edge node hosts a plurality of service agents, where each service agent controls a Virtual Local Area Network over the access domain for one of the service providers. Upon receipt of a service request related message identifying one of the service provider domain and one of the user domain, verification is made at the access edge node to identify whether a service agent corresponding to the service provider identified in the service request related message exists. If the verification is positive, the user domain is added to the Virtual Local Area Network corresponding to the requested service provider through the creation of a service binding at the access edge node ...

Подробнее
18-11-2010 дата публикации

GMPLS BASED OAM PROVISIONING

Номер: US20100290345A1
Принадлежит:

A method and network are described herein for provisioning Operations, Administration, and Maintenance (OAM) entities for a connection when setting-up the connection between an ingress edge node and an egress edge node.

Подробнее
17-12-2019 дата публикации

Method and architecture for application mobility in distributed cloud environment

Номер: US0010511662B2

A method for moving application related records between distributed cloud domains when a user terminal changes its physical location and a predetermined condition is fulfilled. The user terminal is connected to a telecommunication network and uses an application (App). The method determines that a user terminal location has changed at least from a first network area of the telecommunication network to a second network area, considering one or more constraints associated with (i) a location of the user terminal in the second network area, (ii) a location of a cloud component of the application (App) in a first cloud domain associated with the first network area, and (iii) a location of a second cloud domain associated with the second network area, and moves, when the predetermined condition is fulfilled, the application related records from the first cloud domain to the second cloud domain.

Подробнее
03-09-2013 дата публикации

Packet node for applying service path routing at the MAC layer

Номер: US0008526435B2

A packet node and corresponding methods are provided for providing services to packets received at the packet node. At an ingress card, a packet is classified and a virtual media access control (VMAC) address is attached to the packet. The VMAC address identifies a service component for providing a service to the packet. Layer two switching of the packet is made within the packet node, based on the VMAC address. After processing of the packet by the service component, a new VMAC address is attached to the packet. Further layer two switching of the packet, based on the new VMAC address, may lead to further processing by another service component or to forwarding of the packet beyond the packet node.

Подробнее
24-01-2012 дата публикации

GMPLS based OAM provisioning

Номер: US0008102774B2

A method and network are described herein for provisioning Operations, Administration, and Maintenance (OAM) entities for a connection when setting-up the connection between an ingress edge node and an egress edge node.

Подробнее
25-02-2014 дата публикации

Adaptive router architecture using logical internal addressing

Номер: US0008660112B2

A method and a related router comprising a network interface, a logical addressing module and a forwarding element card. The logical addressing module is capable of maintaining at least one local table associating at least one card of the router with at least a portion of at least one service provided by the router. The forwarding element card is capable of receiving a packet stream on the network interface, detecting that the packet stream requires further treatment from a further card of the router and, upon detection, consulting the local table to find an identifier, to which the further card is linked, based on information found in the packet stream before forwarding the packet stream toward the further card.

Подробнее
20-09-2011 дата публикации

Efficient path setup in a provider backbone bridge network

Номер: US0008023518B2

In a provider backbonetraffic engineering network, a method and a bridge node are provided for setting up path between edge bridges connected to customer premises. A first edge bridge advertises towards peer edge bridges a tuple comprising a port identity and a layer two address. When it needs to set up a path towards the first edge bridge, one of the peer edge bridges uses information in the tuple to compute a path label.

Подробнее
30-12-2014 дата публикации

Methods and devices for point to multipoint traffic path encoding

Номер: US0008923295B2

The present invention relates to network nodes and methods that use an encoding scheme for encoding a point-to-multipoint traffic path from one ingress node to a plurality of egress nodes in, for example, a Multi-Protocol Label Switching network. According to the encoding scheme a so-called common ERO is used. The common ERO specifies a list consisting of nodes that are common to several sub paths in order to provide a compression mechanism that reduces the size of path messages that are used for signaling the point-to-multipoint traffic path.

Подробнее
12-09-2019 дата публикации

COMPUTING DEVICE AND METHOD FOR GENERATING A LINK IPV6 ADDRESS

Номер: US20190280922A1
Принадлежит: Kaloom Inc.

Computing device (located in a fabric of a data center) and method for generating a link IPv6 address. The computing device determines a local node identifier and a local link identifier for a communication interface of the computing device. The computing device receives from a remote computing device a remote node identifier and a remote link identifier for a remote communication interface of the remote computing device. Based on a comparison of the local and remote node identifiers, the link IPv6 address is generated by using an IPv6 base prefix, the local node identifier, the remote node identifier, the local link identifier, the remote link identifier, and an indicator that the local node identifier is greater or lower than the remote node identifier. A network configuration of the computing device is performed by generating a fabric-wide IPv6 address and one or more link IPv6 address. 1. A computing device comprising:a communication interface;memory for storing a configuration file, the configuration file comprising an Internet Protocol version 6 (IPv6) base prefix; and determining a local node identifier for the communication interface;', 'determining a local link identifier for the communication interface;', 'receiving from a remote computing device via the communication interface a remote node identifier and a remote link identifier for a remote communication interface of the remote computing device;', 'comparing the local node identifier and the remote node identifier;', if the local node identifier is greater than the remote node identifier, combining the IPv6 base prefix stored in the configuration file, the local node identifier, the remote node identifier, the local link identifier and an indicator that the local node identifier is greater than the remote node identifier; and', 'if the local node identifier is lower than the remote node identifier, combining the IPv6 base prefix stored in the configuration file, the remote node identifier, the local ...

Подробнее
03-03-2020 дата публикации

Workload aware storage platform

Номер: US0010579272B2

A node is provided. The node includes a receiver configured to receive data from an application. The data includes at least one of an expected workload on a dataset by the application and at least one expected characteristic of the dataset. The node includes a processor. The node includes a memory containing instructions, executable by the processor, that cause the processor to: compare the received data to a multiple storage backend configurations, select a storage backend configuration from the multiple storage backend configurations based on the comparison, cause creation of the dataset in a first storage backend having the selected storage backend configuration, determine performance data associated with at least one of performance of the first storage backend and actual workload on the dataset by the application, and modify at least one storage parameter of the first storage backend based on the determined performance data.

Подробнее
10-09-2002 дата публикации

Lumber turning tool

Номер: US0006446785B1
Принадлежит: TREMBLAY BENOIT

A lumber turning device for use with a conveyer having spaced apart lumber moving therealong whereby the lumber may be turned through 180° so that all faces of the lumber may be visually inspected. A first arrangement has a four lobed member whereby a first one of the lobes will extend upwardly above the conveyer with a front surface facing a first lumber piece such that when the locked first lumber piece contacts the front surface of the first one of the lobes, the member will rotate and a rear face of an adjacent lobe will lift the lumber piece to rotate the same through 180°. Other embodiments illustrate members which may turn alternate pieces of lumber.

Подробнее
13-12-2011 дата публикации

Method for aggregating data traffic over an access domain and nodes therefor

Номер: US0008077619B2

A method and nodes for aggregating data traffic over an access domain between service providers and user domains. An access edge node is introduced in the access domain between service providers and user domains. The access edge node hosts service agents, each service agent controlling a Virtual Local Area Network (VLAN) over the access domain for one of the service providers. The access edge node verifies whether a service agent, corresponding to the service provider identified in a received service request, exists. If so, the user domain is added to the VLAN corresponding to the requested service provider by creating a service binding at the access edge node. An access node providing access to the access domain to the user domain is informed of the service binding. Data traffic between the user domain and the identified service provider is aggregated over the access domain according to the created service binding.

Подробнее
17-05-2012 дата публикации

GMPLS BASED OAM PROVISIONING

Номер: US20120120809A1
Принадлежит: Individual

A method and network are described herein for provisioning Operations, Administration, and Maintenance (OAM) entities for a connection when setting-up the connection between an ingress edge node and an egress edge node.

Подробнее
04-08-2005 дата публикации

Distributed finite state machine

Номер: US20050169286A1
Принадлежит:

A method, a router and a switching element card for providing a rate limiting mechanism in the router. Upon reception of a packet stream from a forwarding element card of the router at a first rate, it is determined that the packet stream is to be forwarded to a further card of the router. If the further card has a treatment rate lower than the first rate, the packet stream is passed to a rate limiting mechanism before being forwarded to the further card. Optionally, if the further card does not have a treatment rate lower than the first rate the packet stream is forwarded to the further card without being passed to the rate limiting mechanism.

Подробнее
12-09-2019 дата публикации

COMPUTING DEVICE AND METHOD FOR PERFORMING A FABRIC DEPLOYMENT IN A DATA CENTER

Номер: US20190280921A1
Принадлежит: Kaloom Inc.

Method and computing device performing a fabric deployment in a data center. The computing device stores a configuration file comprising first and second IPv6 base prefixes, and a fabric identifier. The computing device generates a host identifier, a fabric-wide IPv6 prefix by combining the first IPv6 base prefix and the fabric identifier, and a fabric-wide IPv6 address by combining the fabric-wide IPv6 prefix and the host identifier. The computing device determines a local node identifier and a local link identifier for a communication interface of the computing device. The computing device performs a (secure) neighbor discovery procedure for determining a remote node identifier and a remote link identifier for a communication interface of a remote computing device. The computing device generates a link IPv6 address based on the second IPv6 base prefix and at least some of: the local node and link identifiers, and the remote node and link identifiers.

Подробнее
27-07-2010 дата публикации

Applying policies for managing a service flow

Номер: US0007765312B2

A method and an access domain node identify and manage a type of service offered by a service provider to user domains. A service template is prepared by the service provider, comprising an address of a server and a protocol identifier, as well as policies for controlling traffic for the service. Upon set up of a connection between a user domain and the service provider, an address of the user domain is added to the service template to produce a service flow management set. Every data packet exchanged between the user domain and the server, in either direction, is related to a service data flow for a given service type by checking for a match between a source address, a destination address, and a protocol type contained therein, with an appropriate service type. Policies from the service flow management set are used to manage the flow of data packets.

Подробнее
21-09-2010 дата публикации

Method and nodes for performing bridging of data traffic over an access domain

Номер: US0007801039B2

The present invention relates to a method and nodes for performing bridging of data traffic over an access domain. For doing so, for data traffic received at an access node from a first user domain and destined to a second user domain, the access node identifies a service binding corresponding to the received data. Then, the access node tunnels the data traffic in a Unicast message addressed to an access edge node in accordance with the identified service binding. The tunnelled data traffic is then forwarded to the access edge node. The access edge node receives the tunnelled data traffic, and identifies the service binding corresponding to the received tunnelled data traffic. The access edge node then proceeds with redirecting the tunnelled data traffic to a second access node in accordance with the identified service binding therein. The redirected tunnelled data traffic is received at a second access node, where it is detunnelled and forwarded to the second user domain. The method also provides an access node and an access edge node for performing the invention.

Подробнее
30-04-2009 дата публикации

HANDLING IP DATAGRAM FRAGMENTS

Номер: US20090110003A1
Принадлежит: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)

Problems caused by Internet Protocol datagram fragmentation are solved by creating a session context for the datagram fragments without actually reassembling the datagram from its fragments. The session context enables treatment of the datagram without actually reassembling it. Processing fragments can be followed by forwarding the processed fragments to another node that can further fragment the IP datagram.

Подробнее
17-08-2006 дата публикации

Method and nodes for performing bridging of data traffic over an access domain

Номер: US20060184645A1
Принадлежит:

The present invention relates to a method and nodes for performing bridging of data traffic over an access domain. For doing so, for data traffic received at an access node from a first user domain and destined to a second user domain, the access node identifies a service binding corresponding to the received data. Then, the access node tunnels the data traffic in a Unicast message addressed to an access edge node in accordance with the identified service binding. The tunnelled data traffic is then forwarded to the access edge node. The access edge node receives the tunnelled data traffic, and identifies the service binding corresponding to the received tunnelled data traffic. The access edge node then proceeds with redirecting the tunnelled data traffic to a second access node in accordance with the identified service binding therein. The redirected tunnelled data traffic is received at a second access node, where it is detunnelled and forwarded to the second user domain. The method also ...

Подробнее
04-08-2005 дата публикации

Adaptive router architecture enabling efficient internal communication

Номер: US20050169276A1
Принадлежит:

A router comprising a plurality of elements, each having an element identifier, subdivided into a plurality of groups of at least one element. Each group has a common identifier and each member within each group shares redundant capabilities. Each element is capable of communicating with another element by addressing information to the common identifier instead of the element identifier. Optionally, one element can be a member of more than one group. Another option suggests that all elements within a group share essential information associated with a service provided by the group. Another option is implemented through one element of the router identifying a primary element for a group, wherein the primary element serves requests addressed the corresponding common identifier. Yet another option suggests that one element is identified through configuration of the router as a primary element in its group to serve requests addressed to the common identifier.

Подробнее
25-05-2010 дата публикации

Method and ingress node for handling fragmented datagrams in an IP network

Номер: US0007724776B2

Problems caused by Internet Protocol datagram fragmentation are solved by creating a session context for the datagram fragments without actually reassembling the datagram from its fragments. The session context enables treatment of the datagram without actually reassembling it. Processing fragments can be followed by forwarding the processed fragments to another node that can further fragment the IP datagram.

Подробнее
30-01-2020 дата публикации

Computing device and method for optimizing the tunneling of ip packets

Номер: US20200036553A1
Принадлежит: Kaloom Inc

Computing devices and methods for transmitting and receiving optimized tunneling IP packets. At the entry point of a tunnel, an IP packet comprising at least one header is received. If data comprised in one of the at least one header of the received IP packet are redundant with data comprised in one or more tunneling header of a tunneling IP packet, then the redundant header is removed from the received IP packet. The tunneling IP packet encapsulating the received IP packet (with its redundant header removed) is transmitted. A header removal field is positioned in the tunneling IP packet to indicate the positive determination of redundancy. At the exit point of the tunnel, the tunneling IP packet is received. The header removal field and the one or more tunneling header of the tunneling IP packet are used for identifying the previous determination of redundancy and recreating the removed header.

Подробнее
15-03-2018 дата публикации

Workload aware storage platform

Номер: US20180074724A1
Принадлежит: Telefonaktiebolaget LM Ericsson AB

A node is provided. The node includes a receiver configured to receive data from an application. The data includes at least one of an expected workload on a dataset by the application and at least one expected characteristic of the dataset. The node includes a processor. The node includes a memory containing instructions, executable by the processor, that cause the processor to: compare the received data to a multiple storage backend configurations, select a storage backend configuration from the multiple storage backend configurations based on the comparison, cause creation of the dataset in a first storage backend having the selected storage backend configuration, determine performance data associated with at least one of performance of the first storage backend and actual workload on the dataset by the application, and modify at least one storage parameter of the first storage backend based on the determined performance data.

Подробнее
14-05-2015 дата публикации

Bottle Shipping Assembly

Номер: US20150129447A1
Автор: Tremblay Benoit
Принадлежит:

The present invention relates to a bottle shipment assembly that can withstand shock and impact during shipping. The assembly can accommodate a wide variety of bottles, uses very little material such as HDPE and PVC, and is easily recyclable. There are three parts to the assembly: a neck portion that locks around the bottle's neck, a base portion that snugly fits around the bottle's bottom, and an exterior box that securely and immovably houses the bottle fitted with the neck portion and base portion. The neck portion has a center portion and two wings that move from inoperable to operable position. The center portion has with a head-engagement recess that slips over the bottle's neck. In operable position, the neck portion has a square configuration, and fits snugly inside the exterior box. The base portion also has a square configuration that fits snugly inside the exterior box. 1. A bottle shipment assembly comprising:a neck portion, said neck portion adapted to be locked around a substantial length of a neck of said bottle,a base portion, said base portion adapted to snugly fit around a bottom portion of said bottle, andan exterior box, said exterior box adapted to securely and immovably house said bottle fitted with said neck portion and said base portion,wherein said assembly is adapted to withstand shock and impact during shipping condition.2. A bottle shipment assembly according to claim 1 , wherein said neck portion comprises a center portion provided with two wings adapted to move from inoperable to operable position claim 1 , said center portion provided with a head engagement recess adapted to slip over the neck of said bottle.3. A bottle shipment assembly according to claim 2 , wherein said center portion has a substantially square configuration claim 2 , wherein outer perimeter of said center portion is adapted to snugly fit within the interior of said exterior box.4. A bottle shipment assembly according to claim 2 , wherein said wings comprise a male ...

Подробнее
15-07-2021 дата публикации

Computing device and method for performing a secure neighbor discovery

Номер: US20210218581A1
Принадлежит: Kaloom Inc

Computing devices and method for performing a secure neighbor discovery. A local computing device transmits an encrypted local node identifier and an encrypted local challenge to a remote computing device. The remote computing device generates a local challenge response based on the local challenge; and transmits an encrypted remote node identifier and an encrypted local challenge response to the local computing device. The local computing device determines that the received local challenge response corresponds to an expected local challenge response generated based on the local challenge. The remote computing device further transmits an encrypted remote challenge. The local computing device generates a remote challenge response based on the remote challenge; and transmits an encrypted remote challenge response to the remote computing device. The remote computing device determines that the received remote challenge response corresponds to an expected remote challenge response generated based on the remote challenge.

Подробнее
12-07-2018 дата публикации

METHOD AND ARCHITECTURE FOR APPLICATION MOBILITY IN DISTRIBUTED CLOUD ENVIRONMENT

Номер: US20180198859A1
Принадлежит:

A method for moving application related records between distributed cloud domains when a user terminal changes its physical location and a predetermined condition is fulfilled. The user terminal is connected to a telecommunication network and uses an application (App). The method determines that a user terminal location has changed at least from a first network area of the telecommunication network to a second network area, considering one or more constraints associated with (i) a location of the user terminal in the second network area, (ii) a location of a cloud component of the application (App) in a first cloud domain associated with the first network area, and (iii) a location of a second cloud domain associated with the second network area, and moves, when the predetermined condition is fulfilled, the application related records from the first cloud domain to the second cloud domain. 1. A method for moving application related records between distributed cloud domains when a user terminal changes its physical location and a predetermined condition is fulfilled , the user terminal being connected to a telecommunication network and using an application (App) , the method comprising:determining that a user terminal location has changed at least from a first network area of the telecommunication network to a second network area, wherein the second network area belongs either to the telecommunication network or to another telecommunication network;{'b': '2', 'considering one or more constraints associated with (i) a location of the user terminal in the second network area, (ii) a location of a cloud component (App) of the application (App) in a first cloud domain associated with the first network area, and (iii) a location of a second cloud domain associated with the second network area;'}evaluating whether the one or more constraints fulfill the predetermined condition for the second cloud domain and for the first cloud domain; andmoving the application related ...

Подробнее
19-11-2015 дата публикации

VIRTUAL FLOW NETWORK IN A CLOUD ENVIRONMENT

Номер: US20150334045A1
Принадлежит: TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)

A system and method for virtualizing a flow switch to be used by application providers in a cloud computing environment is provided. An application provider's packet handling rules are received by a cloud management system. The rules are translated from the application provider's overlay topology to the underlay data center topology. The underlay network elements involved in the received rules can be identified. A translated rule can be decomposed into a plurality of rule portions which are transmitted to the appropriate underlay network elements.

Подробнее
17-06-2003 дата публикации

Stackable container removably securable to a display card

Номер: CA2067875C
Принадлежит: Plastichange International Inc

A stackable container is disclosed which is removably secured to a display card. The container is molded from thin flexible sheet of transparent thermo-plastic material and is provided with retention tabs an the side wall of the receptacle portion of the container whereby the container can be disposed in snap retention fit within an opening formed in the display card. The display card contains information carrying means while the container cover is free of printed material to fully expose the product contained therein. The cover of the container is hinged to the receptacle portion, and has a recessed top wall portion for captive stacking of a plurality of these containers. The recessed top wall has a contour vertical wall which is dimensioned for friction fit in a recess inner circumferential ledge of the receptacle.

Подробнее
24-01-2000 дата публикации

A harvester for picking berries

Номер: CA2241386A1
Принадлежит: Benoit Tremblay Soudure Inc

The harvester for picking up berries comprises a frame adapted to be driven in a field of berries, a comb mounted between opposite sides of the frame and comprising a plurality of teeth extending substantially in a horizontal position to seize branches of berries as the frame is driven in the field. The harvester is provided with a sweeping system mounted on the frame above the comb for sweeping the berries of the branches seized by the comb. The sweeping system preferably comprises a brush parallel to the comb and comprising a rotatable shaft operatively mounted between the opposite sides of the frame and a plurality of bristles circumferencially distributed around the shaft. A conveyor is mounted between the sides of the frame for receiving the berries swept by the sweeping system. A berry harvester according to the present invention makes the berry harvesting very easy and efficient as it allows an important amount of berries to be picked up very rapidly. It is also very simple to use and is affordable.

Подробнее
19-08-2014 дата публикации

Method and nodes for performing bridging of data traffic over an access domain

Номер: CA2594432C
Принадлежит: Telefonaktiebolaget LM Ericsson AB

The present invention relates to a method and nodes for performing bridging of data traffic over an access domain. For doing so, for data traffic received at an access node from a first user domain and destined to a second user domain, the access node identifies a service binding corresponding to the received data. Then, the access node tunnels the data traffic in a Unicast message addressed to an access edge node in accordance with the identified service binding. The tunnelled data traffic is then forwarded to the access edge node. The access edge node receives the tunnelled data traffic, and identifies the service binding corresponding to the received tunnelled data traffic. The access edge node then proceeds with redirecting the tunnelled data traffic to a second access node in accordance with the identified service binding therein. The redirected tunnelled data traffic is received at a second access node, where it is detunnelled and forwarded to the second user domain. The method also provides an access node and an access edge node for performing the invention.

Подробнее
17-08-2006 дата публикации

Method and nodes for aggregating data traffic through unicast messages over an access domain using service bindings

Номер: CA2594429A1
Принадлежит: Individual

The present invention relates to a method and nodes for performing data traffic aggregation over an access domain using service bindings. Upon receipt of a service request related message at an access edge node for a first device of a user domain, the service request related message identifying the first device of the user domain and one of the service provider domains, a service binding is created at the access edge node. The service binding rules data traffic between the first device of the user domain and the service provider domain by committing an access node serving the user domain and the access edge node in a manner of managing data traffic therebetween over the access domain. An access node serving the user domain for which the service request related message is received is informed of the created service binding. The created service binding is enforced at the access node and the access edge node for data traffic over the access domain between the first device of the user domain and the service provider domain by removing a user device MAC address from Unicast messages exchanged therebetween over the access domain and replacing with a virtual MAC address recognized by the access node and the access edge node.

Подробнее
02-11-1993 дата публикации

Stackable container removably securable to a display card

Номер: CA2067875A1
Принадлежит: Plastichange International Inc

A stackable container is disclosed which is removably secured to a display card. The container is molded from thin flexible sheet of transparent thermo-plastic material and is provided with retention tabs an the side wall of the receptacle portion of the container whereby the container can be disposed in snap retention fit within an opening formed in the display card. The display card contains information carrying means while the container cover is free of printed material to fully expose the product contained therein. The cover of the container is hinged to the receptacle portion, and has a recessed top wall portion for captive stacking of a plurality of these containers. The recessed top wall has a contour vertical wall which is dimensioned for friction fit in a recess inner circumferential ledge of the receptacle.

Подробнее
14-05-2010 дата публикации

Multicast and bidirectional unicast signaling in single root multipoint services using rsvp-te

Номер: CA2742608A1
Принадлежит: Telefonaktiebolaget LM Ericsson AB

A method for establishing a downstream multicast and a upstream and downstream unicast connections between a root and at least one leaf, the root and the at least one leaf being in a tree-type configuration, comprises: creating a downstream unicast label; and distributing the created downstream unicast label in a same signaling message as downstream multicast and upstream unicast labels from the root to the at least one leaf. A network node comprising such a downstream unicast label is used to carry out the method.

Подробнее
14-05-2014 дата публикации

Packet node for applying service path routing at the mac layer

Номер: EP2548346B1
Автор: Benoit Tremblay, Eric Dyke
Принадлежит: Telefonaktiebolaget LM Ericsson AB

Подробнее
11-05-2015 дата публикации

Bottle shipping assembly

Номер: CA2869650A1
Автор: Benoit Tremblay
Принадлежит: SOLUTIONS ZENPAC Inc

The present invention relates to a bottle shipment assembly that can withstand shock and impact during shipping. The assembly can accommodate a wide variety of bottles, uses very little material such as HDPE and PVC, and is easily recyclable. There are three parts to the assembly: a neck portion that locks around the bottle's neck, a base portion that snugly fits around the bottle's bottom, and an exterior box that securely and immovably houses the bottle fitted with the neck portion and base portion. The neck portion has a center portion and two wings that move from inoperable to operable position. The center portion has with a head-engagement recess that slips over the bottle's neck. In operable position, the neck portion has a square configuration, and fits snugly inside the exterior box. The base portion also has a square configuration that fits snugly inside the exterior box.

Подробнее
26-07-2012 дата публикации

Timer value negotiation for path configuration based on rsvp-te

Номер: WO2012097878A1
Принадлежит: Telefonaktiebolaget lM Ericsson (publ)

The present invention relates to an ingress node (102, 700) and methods therein for Operation Administration arid Maintenance, OAM related to Resource Reservation Protocol- Traffic Engineering, RSVP-TE5 for obtaining attributes for timer values being assigned to a connection from the ingress node (102) via intermediate nodes (104, 106, 108, 110) to an egress node (112), during configuration of die connection. An interval of suitable tinier values for the intermediate nodes is specified. Configuration attributes are obtained for a timer value within an interval that is acceptable by the intermediate nodes and the egress node, based on the specified interval of suitable timer values. The obtained configuration attributes are applied during configuration of the connection from the ingress node via the intermediate nodes to the egress node, if the obtained configuration attributes are appropriate to the ingress node. Fine-tuning of connection related timers can therefore be achieved, decreasing the overall recovery time and the overall overhead.

Подробнее
02-03-2001 дата публикации

Lumber turning tool

Номер: CA2281349A1
Автор: Benoit Tremblay
Принадлежит: Individual

Подробнее
09-12-2009 дата публикации

Applying policies for managing a service flow

Номер: EP2130332A2
Принадлежит: Telefonaktiebolaget LM Ericsson AB

A method and an access domain node identify and manage a type of service offered by a service provider to user domains. A service template is prepared by the service provider, comprising an address of a server and a protocol identifier, as well as policies for controlling traffic for the service. Upon set up of a connection between a user domain and the service provider, an address of the user domain is added to the service template to produce a service flow management set. Every data packet exchanged between the user domain and the server, in either direction, is related to a service data flow for a given service type by checking for a match between a source address, a destination address, and a protocol type contained therein, with an appropriate service type. Policies from the service flow management set are used to manage the flow of data packets.

Подробнее
29-05-2008 дата публикации

Method for authenticating nomadic user domains and nodes therefor

Номер: WO2008062353A2
Принадлежит: Telefonaktiebolaget lM Ericsson (publ)

The present invention provides a method and nodes for authenticating nomadic users accessing service providers. An access edge node authenticates nomadic users when service requests are received therefrom. The access edge node hosts a plurality of service agents, where each service agent comprises transport parameters for access to one of the service providers. Upon receipt at the access edge node of a service request message identifying a service provider and a nomadic user, an identity of the nomadic user is authenticated and verification is made that a service agent corresponding to the identified service provider exists. If both the authentication and the verification are positive, an authenticated service binding is created, connecting the nomadic user, the service provider and the transport parameters. Then, an access node providing access to the nomadic user for which the service request message was received is informed of the authenticated service binding.

Подробнее
19-11-2015 дата публикации

Virtual flow network in a cloud environment

Номер: WO2015173759A1
Принадлежит: TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)

A system and method for virtualizing a flow switch to be used by application providers in a cloud computing environment is provided. An application provider's packet handling rules are received by a cloud management system. The rules are translated from the application provider's overlay topology to the underlay data center topology. The underlay network elements involved in the received rules can be identified. A translated rule can be decomposed into a plurality of rule portions which are transmitted to the appropriate underlay network elements.

Подробнее
31-01-2014 дата публикации

Applying policies for managing a service flow

Номер: PL2130332T3
Принадлежит: Ericsson Telefon Ab L M

Подробнее
15-05-2009 дата публикации

Verteilter automat

Номер: ATE430427T1
Принадлежит: Ericsson Telefon Ab L M

Подробнее
13-10-2010 дата публикации

Gmpls based oam provisioning

Номер: EP2238721A1
Принадлежит: Telefonaktiebolaget LM Ericsson AB

A method and network are described herein for provisioning Operations, Administration, and Maintenance (OAM) entities for a connection when setting-up the connection between an ingress edge node and an egress edge node.

Подробнее
15-01-2009 дата публикации

Verfahren und knoten zur handhabung von multicast-nachrichten

Номер: ATE418212T1
Принадлежит: Ericsson Telefon Ab L M

Подробнее
22-03-2017 дата публикации

Virtual flow network in a cloud environment

Номер: EP3143733A1
Принадлежит: Telefonaktiebolaget LM Ericsson AB

A system and method for virtualizing a flow switch to be used by application providers in a cloud computing environment is provided. An application provider's packet handling rules are received by a cloud management system. The rules are translated from the application provider's overlay topology to the underlay data center topology. The underlay network elements involved in the received rules can be identified. A translated rule can be decomposed into a plurality of rule portions which are transmitted to the appropriate underlay network elements.

Подробнее
06-07-2006 дата публикации

Adaptive router architecture using logical internal addressing

Номер: WO2006070295A1
Принадлежит: TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)

A method and a related router comprising a network interface, a logical addressing module and a forwarding element card. The logical addressing module is capable of maintaining at least one local table associating at least one card of the router with at least a portion of at least one service provided by the router. The forwarding element card is capable of receiving a packet stream on the network interface, detecting that the packet stream requires further treatment from a further card of the router and, upon detection, consulting the local table to find an identifier, to which the further card is linked, based on information found in the packet stream before forwarding the packet stream toward the further card.

Подробнее
30-10-2008 дата публикации

Method for authenticating nomadic user domains and nodes therefor

Номер: WO2008062353A3

The present invention provides a method and nodes for authenticating nomadic users accessing service providers. An access edge node authenticates nomadic users when service requests are received therefrom. The access edge node hosts a plurality of service agents, where each service agent comprises transport parameters for access to one of the service providers. Upon receipt at the access edge node of a service request message identifying a service provider and a nomadic user, an identity of the nomadic user is authenticated and verification is made that a service agent corresponding to the identified service provider exists. If both the authentication and the verification are positive, an authenticated service binding is created, connecting the nomadic user, the service provider and the transport parameters. Then, an access node providing access to the nomadic user for which the service request message was received is informed of the authenticated service binding.

Подробнее
07-10-2010 дата публикации

Methods and devices for point to multipoint traffic path encoding

Номер: WO2010114437A1
Принадлежит: Telefonaktiebolaget lM Ericsson (publ)

The present invention relates tonetwork nodes and methods that use an encoding scheme for encoding a point-to-multipointtraffic path (1) from one ingress node (2) to a pluralityof egress nodes (3) in e.g. a Multi-ProtocolLabel Switching network. According to the encoding scheme a so-called common ERO is used. The common ERO specifies a list consisting ofnodesthat are common to several sub paths (4) in order to provide a compression mechanism that reduces the size of path messages that are used for signaling the point-to-multipointtraffic path.

Подробнее
30-01-2020 дата публикации

Computing device and method for optimizing the tunneling of ip packets

Номер: WO2020019073A1
Принадлежит: Kaloom Inc

Computing devices and methods for transmitting and receiving optimized tunneling IP packets. At the entry point of a tunnel, an IP packet comprising at least one header is received. If data comprised in one of the at least one header of the received IP packet are redundant with data comprised in one or more tunneling header of a tunneling IP packet, then the redundant header is removed from the received IP packet. The tunneling IP packet encapsulating the received IP packet (with its redundant header removed) is transmitted. A header removal field is positioned in the tunneling IP packet to indicate the positive determination of redundancy. At the exit point of the tunnel, the tunneling IP packet is received. The header removal field and the one or more tunneling header of the tunneling IP packet are used for identifying the previous determination of redundancy and recreating the removed header.

Подробнее
29-08-1996 дата публикации

Distributeur automatique de lattes pour convoyeur de planches de bois

Номер: CA2143552A1
Принадлежит: Benoit Tremblay Soudure Inc

Le distributeur automatique de lattes est utilisé en combinaison avec un autre distributeur de lattes similaire sur un convoyeur de planches de bois comprenant une extrémité de chargement et une extrémité de déchargement et étant conçu pour déplacer dans une direction donnée des rangées de planches horizontales. Le distributeur de lattes comprend des colonnes, montées au-dessus de la charpente du convoyeur, pour entreposer les lattes et pour former un empilement de lattes. Les colonnes sont reliées à un moyen de distribution pouvant être actionné pour distribuer une par une les lattes entreposées dans les colonnes sur les planches déplacées par le convoyeur. Le distributeur comprend des pinces mobiles dans une direction verticale et s'étendant au-dessus du moyen de distribution. Ces pinces peuvent être actionnées pour saisir chacune des lattes distribuées par le moyen de distribution et pour déposer la latte saisie sur une des rangées de planches déplacées par le convoyeur. Le distributeur comprend également un moyen de contrôle pour synchroniser la mise en action du moyen de distribution avec la mise en action des pinces, de façon à ce que chacune des lattes empilées dans les colonnes soit déposée précisément et automatiquement sur une rangée correspondante de planches coplanaires déplacées par le convoyeur sous le distributeur de lattes. Le distributeur automatique de lattes a l'avantage de permettre un positionnement rapide, précis et peu coûteux de lattes entre les rangées d'un empilement de planches de bois en vue de leur séchage ou de leur entreposage.

Подробнее
17-08-2006 дата публикации

Method for aggregating data traffic over an access domain and nodes therefor

Номер: WO2006085233A2
Принадлежит: TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)

The present invention relates to a method and nodes for aggregating data traffic over an access domain carrying data traffic between a plurality of service providers and user domains. For doing so, an access edge node is introduced in the access domain between the plurality of service providers, and the user domains. The access edge node hosts a plurality of service agents, where each service agent controls a Virtual Local Area Network over the access domain for one of the service providers. Upon receipt of a service request related message identifying one of the service provider domain and one of the user domain, verification is made at the access edge node to identify whether a service agent corresponding to the service provider identified in the service request related message exists. If the verification is positive, the user domain is added to the a Virtual Local Area Network corresponding to the requested service provider through the creation of a service binding at the access edge node. Then, an access node providing access to the access domain to the user domain for which the service request related message was received is informed of the service binding, and the data traffic between the user domain and service provider identified in the service request related message is aggregated over the access domain in accordance with the created with the created service binding.

Подробнее
15-08-2010 дата публикации

Adaptive router-architektur

Номер: ATE475241T1
Принадлежит: Ericsson Telefon Ab L M

Подробнее
15-02-2011 дата публикации

Unterstützung von triple-play-diensten in benutzerendgeräten

Номер: ATE497307T1
Принадлежит: Ericsson Telefon Ab L M

Подробнее
17-08-2006 дата публикации

Method and nodes for handling broadcast messages over an access domain

Номер: WO2006085286A1
Принадлежит: TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)

The present invention relates to a method and nodes for handling broadcast messages over an access domain. For doing so, an access node and an access edge node are adapted to allow tunnelling of broadcast messages within Unicast messages transmitted over the access domain. The access node receives broadcast messages from user domains, intercepts the broadcast messages and forwards the received broadcast messages to the access edge node in Unicast messages. The access edge node receives and identifies the tunnelled broadcast messages. Then, the identified tunnelled broadcast messages are detunneled by the broadcast handler at the access edge node and handled by the broadcast handler.

Подробнее
13-01-2021 дата публикации

Computing device and method for performing a fabric deployment in a data center

Номер: EP3763084A1
Принадлежит: Kaloom Inc

Method and computing device performing a fabric deployment in a data center. The computing device stores a configuration file comprising first and second IPv6 base prefixes, and a fabric identifier. The computing device generates a host identifier, a fabric-wide IPv6 prefix by combining the first IPv6 base prefix and the fabric identifier, and a fabric-wide IPv6 address by combining the fabric-wide IPv6 prefix and the host identifier. The computing device determines a local node identifier and a local link identifier for a communication interface of the computing device. The computing device performs a (secure) neighbor discovery procedure for determining a remote node identifier and a remote link identifier for a communication interface of a remote computing device. The computing device generates a link IPv6 address based on the second IPv6 base prefix and at least some of: the local node and link identifiers, and the remote node and link identifiers.

Подробнее
08-02-2012 дата публикации

Methods and devices for point to multipoint traffic path encoding

Номер: EP2415212A1
Принадлежит: Telefonaktiebolaget LM Ericsson AB

The present invention relates tonetwork nodes and methods that use an encoding scheme for encoding a point-to-multipointtraffic path (1) from one ingress node (2) to a pluralityof egress nodes (3) in e.g. a Multi-ProtocolLabel Switching network. According to the encoding scheme a so-called common ERO is used. The common ERO specifies a list consisting ofnodesthat are common to several sub paths (4) in order to provide a compression mechanism that reduces the size of path messages that are used for signaling the point-to-multipointtraffic path.

Подробнее
18-08-2021 дата публикации

Computing device and method for optimizing the tunneling of ip packets

Номер: EP3827565A4
Принадлежит: Kaloom Inc

Подробнее
13-01-2021 дата публикации

Computing device and method for generating a link ipv6 address

Номер: EP3763082A1
Принадлежит: Kaloom Inc

Computing device (located in a fabric of a data center) and method for generating a link IPv6 address. The computing device determines a local node identifier and a local link identifier for a communication interface of the computing device. The computing device receives from a remote computing device a remote node identifier and a remote link identifier for a remote communication interface of the remote computing device. Based on a comparison of the local and remote node identifiers, the link IPv6 address is generated by using an IPv6 base prefix, the local node identifier, the remote node identifier, the local link identifier, the remote link identifier, and an indicator that the local node identifier is greater or lower than the remote node identifier. A network configuration of the computing device is performed by generating a fabric-wide IPv6 address and one or more link IPv6 address.

Подробнее
21-04-2021 дата публикации

Computing device and method for generating a link ipv6 address

Номер: EP3763082A4
Принадлежит: Kaloom Inc

Подробнее
12-09-2019 дата публикации

Computing device and method for generating a link ipv6 address

Номер: WO2019169481A1
Принадлежит: Kaloom Inc

Computing device (located in a fabric of a data center) and method for generating a link IPv6 address. The computing device determines a local node identifier and a local link identifier for a communication interface of the computing device. The computing device receives from a remote computing device a remote node identifier and a remote link identifier for a remote communication interface of the remote computing device. Based on a comparison of the local and remote node identifiers, the link IPv6 address is generated by using an IPv6 base prefix, the local node identifier, the remote node identifier, the local link identifier, the remote link identifier, and an indicator that the local node identifier is greater or lower than the remote node identifier. A network configuration of the computing device is performed by generating a fabric-wide IPv6 address and one or more link IPv6 address.

Подробнее
08-11-2006 дата публикации

Adaptive router architecture

Номер: EP1719306A1
Принадлежит: Telefonaktiebolaget LM Ericsson AB

A router architecture with one or more network interfaces, processing, switching and forwarding elements, each which has one or more processing units capable of processing network traffic to provide at least a portion of a network service. The switching element is capable of acting as a proxy to the processing elements while each of the forwarding elements are capable of receiving network traffic on the network interface and are capable to delegate processing of network traffic toward processing elements through at least one switching element.

Подробнее
11-08-2005 дата публикации

Adaptive router architecture

Номер: WO2005074204A1
Принадлежит: TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)

A router and a router architecture comprising at least one network interface, a plurality of processing elements, at least one switching element and a plurality of forwarding elements. Each of the plurality of processing elements comprises at least one processing unit, wherein each processing unit is capable of processing network traffic to provide at least a portion of a network service. The switching element is capable of acting as a proxy of the plurality of processing elements while each of the plurality of forwarding elements is capable of receiving network traffic on the at least one network interface of the router and delegating processing of network traffic toward at least one of the plurality of processing elements through the at least one switching element.

Подробнее
12-09-2019 дата публикации

Computing device and method for performing a fabric deployment in a data center

Номер: WO2019169482A1
Принадлежит: Kaloom Inc

Method and computing device performing a fabric deployment in a data center. The computing device stores a configuration file comprising first and second IPv6 base prefixes, and a fabric identifier. The computing device generates a host identifier, a fabric-wide IPv6 prefix by combining the first IPv6 base prefix and the fabric identifier, and a fabric-wide IPv6 address by combining the fabric-wide IPv6 prefix and the host identifier. The computing device determines a local node identifier and a local link identifier for a communication interface of the computing device. The computing device performs a (secure) neighbor discovery procedure for determining a remote node identifier and a remote link identifier for a communication interface of a remote computing device. The computing device generates a link IPv6 address based on the second IPv6 base prefix and at least some of: the local node and link identifiers, and the remote node and link identifiers.

Подробнее
27-01-2021 дата публикации

Computing device and method for performing a secure neighbor discovery

Номер: EP3769481A1
Принадлежит: Kaloom Inc

Computing devices and method for performing a secure neighbor discovery. A local computing device transmits an encrypted local node identifier and an encrypted local challenge to a remote computing device. The remote computing device generates a local challenge response based on the local challenge; and transmits an encrypted remote node identifier and an encrypted local challenge response to the local computing device. The local computing device determines that the received local challenge response corresponds to an expected local challenge response generated based on the local challenge. The remote computing device further transmits an encrypted remote challenge. The local computing device generates a remote challenge response based on the remote challenge; and transmits an encrypted remote challenge response to the remote computing device. The remote computing device determines that the received remote challenge response corresponds to an expected remote challenge response generated based on the remote challenge.

Подробнее
21-04-2021 дата публикации

Computing device and method for performing a secure neighbor discovery

Номер: EP3769481A4
Принадлежит: Kaloom Inc

Подробнее
07-09-2023 дата публикации

Computing device and method for performing a secure neighbor discovery

Номер: US20230283486A1
Принадлежит: Kaloom Inc

Computing devices and method for performing a secure neighbor discovery. A local computing device transmits an encrypted local node identifier and an encrypted local challenge to a remote computing device. The remote computing device generates a local challenge response based on the local challenge; and transmits an encrypted remote node identifier and an encrypted local challenge response to the local computing device. The local computing device determines that the received local challenge response corresponds to an expected local challenge response generated based on the local challenge. The remote computing device further transmits an encrypted remote challenge. The local computing device generates a remote challenge response based on the remote challenge; and transmits an encrypted remote challenge response to the remote computing device. The remote computing device determines that the received remote challenge response corresponds to an expected remote challenge response generated based on the remote challenge.

Подробнее
31-05-2023 дата публикации

Computing device and method for performing a secure neighbor discovery

Номер: EP3769481B1
Принадлежит: Kaloom Inc

Подробнее
26-09-2019 дата публикации

Computing device and method for performing a secure neighbor discovery

Номер: WO2019178671A1
Принадлежит: Kaloom Inc

Computing devices and method for performing a secure neighbor discovery. A local computing device transmits an encrypted local node identifier and an encrypted local challenge to a remote computing device. The remote computing device generates a local challenge response based on the local challenge; and transmits an encrypted remote node identifier and an encrypted local challenge response to the local computing device. The local computing device determines that the received local challenge response corresponds to an expected local challenge response generated based on the local challenge. The remote computing device further transmits an encrypted remote challenge. The local computing device generates a remote challenge response based on the remote challenge; and transmits an encrypted remote challenge response to the remote computing device. The remote computing device determines that the received remote challenge response corresponds to an expected remote challenge response generated based on the remote challenge.

Подробнее
25-06-2009 дата публикации

Handling ip datagram fragments

Номер: WO2009057001A3

Problems caused by Internet Protocol datagram fragmentation are solved by creating a session context for the datagram fragments without actually reassembling the datagram from its fragments. The session context enables treatment of the datagram without actually reassembling it. Processing fragments can be followed by forwarding the processed fragments to another node that can further fragment the IP datagram.

Подробнее
07-05-2009 дата публикации

Handling ip datagram fragments

Номер: WO2009057001A2
Принадлежит: Telefonaktiebolaget lM Ericsson (publ)

Problems caused by Internet Protocol datagram fragmentation are solved by creating a session context for the datagram fragments without actually reassembling the datagram from its fragments. The session context enables treatment of the datagram without actually reassembling it. Processing fragments can be followed by forwarding the processed fragments to another node that can further fragment the IP datagram.

Подробнее