Abstract:
Example embodiments are in a form of a system, corresponding electronics card (or apparatus), or corresponding method. Some embodiments include a multi-channel optical layer system. According to some embodiments, the system may include a network interface layer, an adapter layer, and an optical function layer. The adapter layer may learn functions and/or corresponding specifications from the function layer. The adapter layer may configure the adapter layer itself to interoperate between the network interface layer and the optical function layer. The adapter layer may provide flexibility in the size of configured functionality. The adapter layer may reduce cost of configuration (or reconfiguration) because functions may be discretized. New markets may be reached because of this reduced cost, as well as due to smaller size configurations (of hardware and software), reduced electronics, reduced power, and improved thermal cooling requirements for lesser-developed network configurations.
Abstract:
A procedure for managing network traffic, and a system that operates in accordance with the procedure. Performance monitoring data is received from multiple network elements that define one or more paths along a network tunnel. The performance monitoring data includes data on network utilization. There is a detection of whether network utilization through the network tunnel exceeds an overflow threshold or an underflow threshold based on the performance monitoring data. A new path and new network elements are determined for the network tunnel, and instructions are transmitted to the network elements on the network to implement the new path.
Abstract:
To perform protection switching between tunnels in a network, Y.1731-based APS messages are often sent from a management system to nodes at the tunnels' end-points. If the management system is located near one node (local node) and far away from the other node (remote node), the APS message, which operates at the Ethernet service layer, travels to the remote node slower than traffic over the tunnels. This slower transmission time may prevent the remote node from performing a switch within a desired timeframe. The disclosed embodiments include a 1:1 bidirectional VLAN-based protection arrangement that accomplishes a 50 millisecond switching time without using Y.1731-based APS messages. The embodiments accomplish this by sending a switching command from the management system to the local node and modifying a message already traveling from the local node to the remote node to include a switching message that causes the remote node to perform the switch.
Abstract:
A method and/or network system is able to perform an in-service software upgrade (“ISSU”) using virtualization technology while ongoing network service is maintained. After receipt of an upgrade signal such as a command of software upgrade, a new or second virtual machine (“VM”) is created in response to the upgrade signal. After downloading the new version of program to the second VM while maintaining the first version of program running on the first VM, the process for providing network management begins to migrate from the first version of program to the new version of program. The process simultaneously facilitates ISSU for a data-path module such as a line card to convert from the previous version of software to the new version of the software.
Abstract:
A procedure for transferring wavelengths, and a system that operates in accordance with the procedure. The system comprises at least one network terminal, each including a switch and a controller. A plurality of wavelength sets are applied to the switch. The controller is arranged to operate the switch such that the switch (a) selects at least one wavelength from at least one of the plurality of wavelength sets, based on electrical monitoring at a port module external to the network terminal, and (b) outputs the at least one wavelength to an output of the at least one network terminal.
Abstract:
A procedure for evaluating a network, and a system, apparatus, and computer program that operate in accordance with the procedure. The procedure includes aggregating packet information from one or more sources in a network, and executing a correlation algorithm to determine traffic flow information based on the packet information. The aggregating includes obtaining information from a header of a packet being communicated in the network, in one example embodiment. In another example, the executing includes tracing a traffic flow from a source node to a destination node, and the tracing includes determining, based on the packet information, each link by which the traffic flow is communicated from the source node to the destination node.
Abstract:
A procedure for transferring wavelengths, and a system that operates in accordance with the procedure. The system comprises at least one network terminal, each including a switch and a controller. A plurality of wavelength sets are applied to the switch. The controller is arranged to operate the switch such that the switch (a) selects at least one wavelength from at least one of the plurality of wavelength sets, based on electrical monitoring at a port module external to the network terminal, and (b) outputs the at least one wavelength to an output of the at least one network terminal.
Abstract:
Example embodiments include an optical networking system (e.g., apparatus) and corresponding method. According to some embodiments, a plurality of shelves may be interconnected to form a daisy chain, each shelf including unpowered passive optical modules and the daisy chain including an active module having a passive power communication source. The passive power communication source may distribute passive power to memory devices on the one unpowered passive optical networking modules. The memory devices may provide respective communication as a function of interconnections of the daisy chain and passive power distributed by the passive power communication source. Advantages include unique identification of the memory devices without requiring active power to their corresponding modules, and continuous discovery and inventory of such memory devices. Such embodiments may also help network planners better manage and end-to-end optical circuit which may reduce amplification or regeneration nodes creating a more cost efficient solution.
Abstract:
To perform protection switching between tunnels in a network, Y.1731-based APS messages are often sent from a management system to nodes at the tunnels' end-points. If the management system is located near one node (local node) and far away from the other node (remote node), the APS message, which operates at the Ethernet service layer, travels to the remote node slower than traffic over the tunnels. This slower transmission time may prevent the remote node from performing a switch within a desired timeframe. The disclosed embodiments include a 1:1 bidirectional VLAN-based protection arrangement that accomplishes a 50 millisecond switching time without using Y.1731-based APS messages. The embodiments accomplish this by sending a switching command from the management system to the local node and modifying a message already traveling from the local node to the remote node to include a switching message that causes the remote node to perform the switch.
Abstract:
The disclosed methods, apparatus, and systems allow safe and easy deployment of amplifier products that exceed laser safe limits without the need for fiber testing and characterization or OTDR techniques. One example embodiment is a method for ensuring eye safety in an optical network. The example method includes detecting optical connectivity between an output of a transmit amplifier and a passive optical processing element. The transmit amplifier is located at a first network node and is configured to output optical power greater than eye-safe level. The passive optical processing element is located at a second network node and is configured to guarantee a reduction of a maximum optical power level at an output side of the passive optical processing element to an eye-safe optical level. The detecting occurs at the first network node, and the transmit amplifier is enabled or disabled as a function of detection of the optical connectivity.