Abstract:
In one embodiment, a first routing device establishes a virtual channel with a remote routing device in a G.8032 protocol Ethernet network ring. The first routing device and the remote routing device each being linked to a multi-homed routing device having Layer 2 connectivity to a core network. The multi-homed routing device is not configured with the G.8032 protocol. The first routing device identifies a link state from the first routing device to the multi-homed routing device. Layer 2 connectivity of the first routing device to the core network is controlled based upon the identified link state of the first routing device.
Abstract:
The present technology is directed to visualizing a Wi-Fi signal propagation in 3-D at various heights and locations. The present technology can calculate a radio frequency (RF) propagation pattern for a Wi-Fi access point (AP) based on a RF propagation model for the Wi-Fi AP and overlay the RF propagation pattern for the Wi-Fi AP over a visualization of the building plan to present a 3-D visualization of the RF propagation pattern of the 3-D space. In particular, the present technology can project a plurality of ray-paths in various directions in a 3-D space originated from the Wi-Fi AP and determine whether the ray-paths interface with objects defined in the building plan. The present technology can segment the respective ray-path into contiguous segments of substantially uniform mediums for each ray-path that interface with the objects and determine a RF signal strength at points along the contiguous segments of the ray-paths.
Abstract:
A method and system for redundancy in Ethernet Virtual Connections (EVCs) are disclosed. In one embodiment, a method includes transmitting continuity check messages from a node in an Ethernet Virtual Connection connecting at least one root node and a plurality of leaf nodes in a point-to-multipoint or multipoint-to-multipoint connection, identifying a failure in a primary path between the root node and the leaf nodes, switching to a backup path, and advertising the switching to the backup path to at least one node.
Abstract:
Systems, methods, and computer-readable media are disclosed for verifying proper implementation of remote certification of network devices. In one aspect, a method includes receiving, at a network node, computer-executable code for self-certifying the network node or at least a component thereof; executing, at the network node, the computer-executable code to obtain self-certification results; updating, at a trust module of the network node, an event log with the self-certification results; performing, by the network node, an attestation of the event log to generate a digital proof of authenticity of the network node; and sending, by the network node, the digital proof to a requesting node, the digital proof of authenticity enabling the requesting node to verify the network node prior to communication with the network node.
Abstract:
In one embodiment, a network device in a set of network devices obtains a pseudowire label for a Provider Edge (PE) device, where the pseudowire label corresponds to a Virtual Local Area Network (VLAN) on the PE device. In addition, the network device obtains a set of one or more MAC addresses reachable via the PE device, wherein the set of network devices support Ethernet Virtual Private Network (E-VPN) and are in the same redundancy group such that the set of network devices are coupled to the same customer edge device. The network device stores the pseudowire label in association with the set of one or more MAC addresses. The network device uses the pseudowire label to encapsulate traffic associated with the VLAN that is received from the customer edge device and destined to the set of MAC addresses reachable via the PE device.
Abstract:
A method and system for redundancy in Ethernet Virtual Connections (EVCs) are disclosed. In one embodiment, a method includes transmitting continuity check messages from a node in an Ethernet Virtual Connection connecting at least one root node and a plurality of leaf nodes in a point-to-multipoint or multipoint-to-multipoint connection, identifying a failure in a primary path between the root node and the leaf nodes, switching to a backup path, and advertising the switching to the backup path to at least one node.
Abstract:
In one embodiment, a first routing device establishes a virtual channel with a remote routing device in a G.8032 protocol Ethernet network ring. The first routing device and the remote routing device each being linked to a multi-homed routing device having Layer 2 connectivity to a core network. The multi-homed routing device is not configured with the G.8032 protocol. The first routing device identifies a link state from the first routing device to the multi-homed routing device. Layer 2 connectivity of the first routing device to the core network is controlled based upon the identified link state of the first routing device.
Abstract:
A method and system for redundancy in Ethernet Virtual Connections (EVCs) are disclosed. In one embodiment, a method includes transmitting continuity check messages from a node in an Ethernet Virtual Connection connecting at least one root node and a plurality of leaf nodes in a point-to-multipoint or multipoint-to-multipoint connection, identifying a failure in a primary path between the root node and the leaf nodes, switching to a backup path, and advertising the switching to the backup path to at least one node.
Abstract:
An example method executed by a semantic reasoner is disclosed. The method includes identifying, from a plurality of rules, one or more pairs of chained rules, and, from the one or more pairs of chained rules, assigning rules chained together to a respective rule-set of P rule-sets. The method also includes assigning individuals, from a plurality of individuals referenced by the plurality of rules, referenced by each rule-set of the P rule-sets to an individual-set associated with the each rule-set and mapping the rules from the each rule-set and the individuals from the individual-set associated with the each rule-set into a respective knowledge base instance associated with the each rule-set. Such a method ensures knowledge completeness and sound inference while allowing parallel semantic reasoning within a given stream window.