Mark Townsley

Mark Townsley

San Francisco, California, United States
5K followers 500+ connections

Articles by Mark

Activity

Join now to see all activity

Experience

  • Cisco Meraki Graphic

    Cisco Meraki

    San Francisco, California

  • -

    Paris Area, France

  • -

    Paris, France

  • -

  • -

    Paris

  • -

    RTP, NC & Paris, France

  • -

  • -

  • -

  • -

    Research Triangle Park, NC

  • -

    Research Triangle Park, NC

  • -

    Raleigh-Durham, North Carolina Area

  • -

    College Park, Maryland

  • -

    Washington D.C. Metro Area

  • -

  • -

    Birmingham, Alabama

  • -

    Birmingham, Alabama

  • -

    Huntsville, Alabama

  • -

    Huntsville, Alabama

  • -

    United States

Education

Volunteer Experience

  • Co-Founder, Vice-Président of the Board

    American Musical Theater Live! Paris

    - Present 10 years 4 months

    Arts and Culture

    AMT Live! is a Franco-American non-profit association dedicated to contemporary musical theater in Paris, France. https://amtlive.org/about/

  • The A.C.T. Conservatory Graphic

    Board Member

    The A.C.T. Conservatory

    - Present 2 years 6 months

    Arts and Culture

Publications

  • 6LB: Scalable and Application-Aware Load Balancing with Segment Routing

    IEEE/ACM Transactions on Networking

    Network load-balancers generally either do not take the application state into account, or do so at the cost of a centralized monitoring system. This paper introduces a load-balancer running exclusively within the IP forwarding plane, ı.e., in an application protocol agnostic fashion - yet which still provides application-awareness and makes real-time, decentralized decisions. To that end, IPv6 Segment Routing is used to direct data packets from a new flow through a chain of candidate servers…

    Network load-balancers generally either do not take the application state into account, or do so at the cost of a centralized monitoring system. This paper introduces a load-balancer running exclusively within the IP forwarding plane, ı.e., in an application protocol agnostic fashion - yet which still provides application-awareness and makes real-time, decentralized decisions. To that end, IPv6 Segment Routing is used to direct data packets from a new flow through a chain of candidate servers, until one decides to accept the connection, based solely on its local state. This way, applications themselves naturally decide on how to fairly share incoming connections, while incurring minimal network overhead, and no out-of-band signaling. A consistent hashing algorithm, as well as an in-band stickiness protocol, allow for the proposed solution to be able to be reliably distributed across a large number of instances. Performance evaluation by means of an analytical model and actual tests on different workloads (including a Wikipedia replay as a realistic workload) show significant performance benefits in terms of shorter response times, when compared with the traditional random load-balancer. In addition, this paper introduces and compares kernel bypass high-performance implementations of both 6LB and the state-of-the-art load-balancer, showing that the significant system-level benefits of 6LB are achievable with a negligible data-path CPU overhead.

    Other authors
    See publication
  • SRLB: The Power of Choices in Load Balancing with Segment Routing

    Proceedings of the 37th IEEE International Conference on Distributed Computing Systems (ICDCS), 2017.

    This paper introduces a load-balancer running exclusively within the IP forwarding plane, yet which provides application-awareness and makes real-time, decentralized decisions. IPv6 Segment Routing is used to direct data packets from a new flow through a chain of candidate servers, until one decides to accept the connection, based on its local state. This way, applications themselves naturally decide on how to share incoming connections, while incurring minimal network overhead, and no…

    This paper introduces a load-balancer running exclusively within the IP forwarding plane, yet which provides application-awareness and makes real-time, decentralized decisions. IPv6 Segment Routing is used to direct data packets from a new flow through a chain of candidate servers, until one decides to accept the connection, based on its local state. This way, applications themselves naturally decide on how to share incoming connections, while incurring minimal network overhead, and no out-of-band signaling. Tests on different workloads – including realistic workloads such as replaying actual Wikipedia access traffic towards a set of replica Wikipedia instances – show significant performance benefits, in terms of shorter response times, when compared to a traditional random load-balancer.

    Other authors
    See publication
  • A Study of LoRa: Long Range & Low Power Networks for the Internet of Things

    Sensors

    LoRa is a long-range, low-power, low-bitrate, wireless telecommunications system, promoted as an infrastructure solution for the Internet of Things: end-devices use LoRa across a single wireless hop to communicate to gateway(s), connected to the Internet and which act as transparent bridges and relay messages between these end-devices and a central network server. This paper provides an overview of LoRa and an in-depth analysis of its functional components. The physical and data link layer…

    LoRa is a long-range, low-power, low-bitrate, wireless telecommunications system, promoted as an infrastructure solution for the Internet of Things: end-devices use LoRa across a single wireless hop to communicate to gateway(s), connected to the Internet and which act as transparent bridges and relay messages between these end-devices and a central network server. This paper provides an overview of LoRa and an in-depth analysis of its functional components. The physical and data link layer performance is evaluated by field tests and simulations. Based on the analysis and evaluations, some possible solutions for performance enhancements are proposed.

    Keywords: LoRa; Internet of Things; long range; low power

    Other authors
    See publication
  • A Method for Reusing a TCP Fast Open Cookie Across Multiple Server IP Addresses

    A method is provided for reusing the Transmission Control Protocol (TCP) Fast Open cookie, the method comprising either one or both of first and second approaches. The first approach involves explicitly having a server supply together with TCP Fast Open Cookie the prefix length that this Cookie covers. The second approach involves the client doing a best-match of previously contacted servers, and attempting to reuse the cookie from another server to make the new connection, and if that cookie…

    A method is provided for reusing the Transmission Control Protocol (TCP) Fast Open cookie, the method comprising either one or both of first and second approaches. The first approach involves explicitly having a server supply together with TCP Fast Open Cookie the prefix length that this Cookie covers. The second approach involves the client doing a best-match of previously contacted servers, and attempting to reuse the cookie from another server to make the new connection, and if that cookie works, use this fact to make more general assumptions for future connections.

    Other authors
    See publication
  • RFC 6619: Scalable Operation of Address Translators with Per-Interface Bindings

    IETF (Standards Track)

    This document explains how to employ address translation in networks that serve a large number of individual customers without requiring a correspondingly large amount of private IPv4 address space.

    Other authors
    See publication
  • RFC 6127: IPv4 Run-Out and IPv4-IPv6 Co-Existence Scenarios

    IETF (Informational)

    When IPv6 was designed, it was expected that the transition from IPv4 to IPv6 would occur more smoothly and expeditiously than experience has revealed. The growth of the IPv4 Internet and predicted depletion of the free pool of IPv4 address blocks on a foreseeable horizon has highlighted an urgent need to revisit IPv6 deployment models. This document provides an overview of deployment scenarios with the goal of helping to understand what types of additional tools the industry needs to assist…

    When IPv6 was designed, it was expected that the transition from IPv4 to IPv6 would occur more smoothly and expeditiously than experience has revealed. The growth of the IPv4 Internet and predicted depletion of the free pool of IPv4 address blocks on a foreseeable horizon has highlighted an urgent need to revisit IPv6 deployment models. This document provides an overview of deployment scenarios with the goal of helping to understand what types of additional tools the industry needs to assist in IPv4 and IPv6 co-existence and transition.

    This document was originally created as input to the Montreal co-existence interim meeting in October 2008, which led to the rechartering of the Behave and Softwire working groups to take on new IPv4 and IPv6 co-existence work. This document is published as a historical record of the thinking at the time, but hopefully will also help readers understand the rationale behind current IETF tools for co-existence and transition.

    Other authors
    See publication
  • RFC 6085: Address Mapping of IPv6 Multicast Packets on Ethernet

    IETF (Standards Track)

    When transmitting an IPv6 packet with a multicast destination
    address, the IPv6 destination address is mapped to an Ethernet link-
    layer multicast address. This document clarifies that a mapping of
    an IPv6 packet with a multicast destination address may in some
    circumstances map to an Ethernet link-layer unicast address.

    Other authors
    See publication
  • RFC 5889: IP Addressing Model in Ad Hoc Networks

    IETF (Informational)

    This document describes a model for configuring IP addresses and subnet prefixes on the interfaces of routers which connect to links with undetermined connectivity properties.

    Other authors
    See publication
  • RFC 5969: IPv6 Rapid Deployment on IPv4 Infrastructures (6rd) -- Protocol Specification

    IETF (Standards Track)

    This document specifies an automatic tunneling mechanism tailored to advance deployment of IPv6 to end users via a service provider's IPv4 network infrastructure. Key aspects include automatic IPv6 prefix delegation to sites, stateless operation, simple provisioning, and service, which is equivalent to native IPv6 at the sites that are served by the mechanism.

    Other authors
    See publication
  • TR-187 "IPv6 for PPP Broadband Access"

    Broadband Forum

    This document defines the Broadband network architecture and the nodal requirements to provide IPv6 services over PPP Broadband Access

    Other authors
  • RFC 4965: CableLabs - IETF Standardization Collaboration

    IETF (Informational)

    This document describes the collaboration and liaison relationship between the Internet Engineering Task Force (IETF) and the Cable Television Laboratories, Inc. (CableLabs).

    Other authors
    See publication
  • RFC 4817: Encapsulation of MPLS over Layer 2 Tunneling Protocol Version 3

    IETF (Standards Track)

    The Layer 2 Tunneling Protocol, Version 3 (L2TPv3) defines a protocol for tunneling a variety of payload types over IP networks. This document defines how to carry an MPLS label stack and its payload over the L2TPv3 data encapsulation. This enables an application that traditionally requires an MPLS-enabled core network, to utilize an L2TPv3 encapsulation over an IP network instead.

    Other authors
    See publication
  • RFC 4719: Transport of Ethernet Frames over Layer 2 Tunneling Protocol Version 3 (L2TPv3)

    IETF (Standards Track)

    This document describes the transport of Ethernet frames over the Layer 2 Tunneling Protocol, Version 3 (L2TPv3). This includes the transport of Ethernet port-to-port frames as well as the transport of Ethernet VLAN frames. The mechanism described in this document can be used in the creation of Pseudowires to transport Ethernet frames over an IP network.

    See publication
  • RFC 4623: Pseudowire Emulation Edge-to-Edge (PWE3) Fragmentation and Reassembly

    IETF (Standards Track)

    This document defines a generalized method of performing fragmentation for use by Pseudowire Emulation Edge-to-Edge (PWE3) protocols and services.

    Other authors
    See publication
  • RFC 4591: Frame Relay over Layer 2 Tunneling Protocol Version 3 (L2TPv3)

    IETF (Standards Track)

    The Layer 2 Tunneling Protocol, Version 3, (L2TPv3) defines a protocol for tunneling a variety of data link protocols over IP networks. This document describes the specifics of how to tunnel Frame Relay over L2TPv3, including frame encapsulation, virtual-circuit creation and deletion, and status change notification.

    See publication
  • RFC 4454: Asynchronous Transfer Mode (ATM) over Layer 2 Tunneling Protocol Version 3 (L2TPv3)

    http://tools.ietf.org/html/rfc4454

    The Layer 2 Tunneling Protocol, Version 3 (L2TPv3) defines an extensible tunneling protocol to transport layer 2 services over IP networks. This document describes the specifics of how to use the L2TP control plane for Asynchronous Transfer Mode (ATM) Pseudowires and provides guidelines for transporting various ATM services over an IP network.

    Other authors
    See publication
  • RFC 4349: High-Level Data Link Control (HDLC) Frames over Layer 2 Tunneling Protocol, Version 3 (L2TPv3)

    IETF (Standards Track)

    The Layer 2 Tunneling Protocol, Version 3, (L2TPv3) defines a protocol for tunneling a variety of data link protocols over IP networks. This document describes the specifics of how to tunnel High-Level Data Link Control (HDLC) frames over L2TPv3.

    Other authors
    See publication
  • RFC 3931: Layer Two Tunneling Protocol - Version 3 (L2TPv3)

    IETF (Standards Track)

    This document describes "version 3" of the Layer Two Tunneling Protocol (L2TPv3). L2TPv3 defines the base control protocol and encapsulation for tunneling multiple Layer 2 connections between two IP nodes. Additional documents detail the specifics for each data link type being emulated.

    Other authors
    See publication
  • RFC 3817: Layer 2 Tunneling Protocol (L2TP) Active Discovery Relay for PPP over Ethernet (PPPoE)

    IETF (Informational)

    L2TP Active Discovery Relay for PPPoE describes a method to relay Active Discovery and Service Selection functionality from PPPoE over the reliable control channel within L2TP. Two new L2TP control message types and associated PPPoE-specific Attribute Value Pairs (AVPs) for L2TP are defined. This relay mechanism provides enhanced integration of a specific feature in the PPPoE tunneling protocol with L2TP.

    Other authors
    See publication
  • RFC 3437: Layer-Two Tunneling Protocol Extensions for PPP Link Control Protocol Negotiation

    IETF (Standards Track)

    This document defines extensions to the Layer Two Tunneling Protocol (L2TP) for enhanced support of link-specific Point to Point Protocol (PPP) options. PPP endpoints typically have direct access to the common physical media connecting them and thus have detailed knowledge about the media that is in use. When the L2TP is used, the two PPP peers are no longer directly connected over the same physical media. Instead, L2TP inserts a virtual connection over some or all of the PPP connection by…

    This document defines extensions to the Layer Two Tunneling Protocol (L2TP) for enhanced support of link-specific Point to Point Protocol (PPP) options. PPP endpoints typically have direct access to the common physical media connecting them and thus have detailed knowledge about the media that is in use. When the L2TP is used, the two PPP peers are no longer directly connected over the same physical media. Instead, L2TP inserts a virtual connection over some or all of the PPP connection by tunneling PPP frames over a packet switched network such as IP. Under some conditions, an L2TP endpoint may need to negotiate PPP Link Control Protocol (LCP) options at a location which may not have access to all of the media information necessary for proper participation in the LCP negotiation. This document provides a mechanism for communicating desired LCP options between L2TP endpoints in advance of PPP LCP negotiation at the far end of an L2TP tunnel, as well as a mechanism for communicating the negotiated LCP options back to where the native PPP link resides.

    Other authors
    See publication
  • RFC 3438, BCP 68: Layer Two Tunneling Protocol (L2TP) Internet Assigned Numbers Authority (IANA) Considerations Update

    IETF (Best Current Practice)

    This document describes updates to the Internet Assigned Numbers Authority (IANA) considerations for the Layer Two Tunneling Protocol (L2TP).

    See publication
  • RFC 2661: Layer Two Tunneling Protocol "L2TP"

    IETF

    L2TP facilitates the tunneling of PPP packets across an intervening network in a way that is as transparent as possible to both end-users and applications. It is used widely in Broadband networks all over the world, as well as end-user initiated VPNs as it is available by default on Windows, Apple iOS, Android, etc.

    Other authors
    See publication
  • Decision Making Assistant for Integrated Product and Process Design Environment

    Symposium on Timely Realization of Affordable Military Systems Through Enhanced Manufacturing Technology - Albuquerque, NM

    We present a decision making assistant tool utilizing an integrated product and process design environment for manufacturing applications. Specifically, we target microwave modules which use electro-mechanical components and require optimal solutions to reduce cost, improve quality, and gain leverage in time to market the product. This tool will assist the product and process designer by suggesting alternative manufacturing designs while increasing productivity by enhancing cooperation and…

    We present a decision making assistant tool utilizing an integrated product and process design environment for manufacturing applications. Specifically, we target microwave modules which use electro-mechanical components and require optimal solutions to reduce cost, improve quality, and gain leverage in time to market the product. This tool will assist the product and process designer by suggesting alternative manufacturing designs while increasing productivity by enhancing cooperation and coordination through a common design interface. We consider a mult-objective optimization model that determines components and processes for a given conceptual design for microwave modules. This model outputs a set of solutions that are Pareto-Optimal with respect to cost, quality, and other metrics. In addition, we identify highly significant system integration issues for manufacturing applications. Finally, we propose an architecture which will serve as a building block to our continuing research in virtual manufacturing applications.

    Other authors
    • John R. Baras
    • Ramesh K. Karne
    • Michael O. Ball
    • Sridhar Bashyam
    • Abraham Kebede
    • Jim Williams
    • Feng Huang
    • Vinai S. Trichur
    • Manish Karir
    • Asaf Inbar
  • Neural Networks for Signal Processing and Analysis - A Clustering Approach

    Proceedings of the Fifth Workshop on Neural Networks: NASA/Defense - An International Conference on Computational Intelligence: Neural Networks, Fuzzy Systems, Evolutionary Programming and Virtual Reality (WNN93/FNN93, San Francisco, California)

    Abstract: As in the process of simulation, the process of analysis of a dataset using neural networks provides useful insight into the character of the existing data and the significance of characteristics which might be included in the simulation of additional sets. In this paper, an artificial neural network strategy is used to partition an available set of target images into clusters within each target category. The objective is to produce partitions of each category of a target which will…

    Abstract: As in the process of simulation, the process of analysis of a dataset using neural networks provides useful insight into the character of the existing data and the significance of characteristics which might be included in the simulation of additional sets. In this paper, an artificial neural network strategy is used to partition an available set of target images into clusters within each target category. The objective is to produce partitions of each category of a target which will be of use in further analysis of the sample space of all images of interest. The algorithm suggested is not the only way to accomplish this task, but it illustrates some procedures that may be of use in many types of classification. The objective is to obtain generalizable results from a sample set with unequal sample sizes for the categories considered. The procedures followed indicate that average RMS error generated by each image is a strong indication of the sensitivity of the images tested to the ANN classification scheme implemented. The average RMS error per image identified those which were difficult to distinguish from other target types better than visual inspection of the images. Once these images were identified, visual inspection of these similarities confirmed the results and suggested techniques for reducing these similarities in future runs. The image tested were known to be intractable to separation by conventional techniques, so this suggestion for a procedure to indicate distinguishing characteristics provided useful information as well as insight into the design of an ANN system for signal processing and analysis.

    Other authors
    • Mary Lou Padgett
    • T. A. Roppel
    • C. C. Raad
    • T. Graf von Haslingen
  • Intelligent Sensor Fusion - A Clustering Approach

    Southeastern Simulation Conference - Huntsville, AL (SESC '93)

    Intelligent sensor fusion is necessary at times to provide needed information about images which belong to categories not clearly separable by input from a single sensor. This paper suggests an approach to testing the sensitivity of a training set of images to the particular artificial neural network (ANN) paradigm selected. The clusters observed are treated as a feature of the set of images which has been detected by the set of ANN's employed in the analysis. Jackknifing a subset of the…

    Intelligent sensor fusion is necessary at times to provide needed information about images which belong to categories not clearly separable by input from a single sensor. This paper suggests an approach to testing the sensitivity of a training set of images to the particular artificial neural network (ANN) paradigm selected. The clusters observed are treated as a feature of the set of images which has been detected by the set of ANN's employed in the analysis. Jackknifing a subset of the available images allows measurement of the average RMS error generated by each image and comparison of these averages with the confusion matrix results for various decision thresholds. The image producing the largest average RMS errors were found to exhibit that trait fairly consistently when hidden layer node number and training samples were varied. These target image types were used to train a jackknifed set of ANN's to classify the targets. Each pair of image types were also used to train a jackknifed set of ANN's in a similar fashion. When the images in each experiment were separated into clusters within a target category, significant properties of the images were revealed. Such factors as flight number, rotation and intensity level were noticed, after visual inspection, to closely correlate with the clustering observed. Removing an entire cluster of high average RMS error images from each category of image resulted in extremely poor performance in some cases. Forcing these same images to be part of each training set and jackknifing the remaining images produced excellent results. ... The approach presented is not the only way to evaluate the potential strengths and weaknesses of a training set, but it strengthens validation procedures.

    Other authors
    • M. L. Padgett
    • T. Roppel
    • C. C. Raad
    • T. Graf von Haslingen

Patents

  • Partial reassembly and fragmentation for decapsulation

    Issued US 10,038,766

    In one embodiment, a decapsulating network device receives a plurality of encapsulated packet fragments of an original packet, and decapsulates them into respective decapsulated packet fragments. The decapsulating network device caches an inner header of the original packet from one of the decapsulated packet fragments, and in response to caching the inner header, and for each particular decapsulated packet fragment as it is received and decapsulated: prepends the inner header and fragmentation…

    In one embodiment, a decapsulating network device receives a plurality of encapsulated packet fragments of an original packet, and decapsulates them into respective decapsulated packet fragments. The decapsulating network device caches an inner header of the original packet from one of the decapsulated packet fragments, and in response to caching the inner header, and for each particular decapsulated packet fragment as it is received and decapsulated: prepends the inner header and fragmentation information to the particular decapsulated packet fragment; and forwards the particular decapsulated packet fragment with the prepended inner header and fragmentation information from the decapsulating network device toward a destination of the original packet.

    Other inventors
  • Segment routing support in MPEG dash

    Issued US 9,992,251

    According to one aspect, a method includes identifying a request for a piece of content, and obtaining a Moving Picture Expert Group (MPEG) Dynamic Adaptive Streaming over HTTP (DASH) manifest after identifying the request for the piece of content. The method also includes identifying at least one location at which the piece of content is located using the DASH manifest, wherein the at least one location at which the piece of content is located is a location from which the piece of content is…

    According to one aspect, a method includes identifying a request for a piece of content, and obtaining a Moving Picture Expert Group (MPEG) Dynamic Adaptive Streaming over HTTP (DASH) manifest after identifying the request for the piece of content. The method also includes identifying at least one location at which the piece of content is located using the DASH manifest, wherein the at least one location at which the piece of content is located is a location from which the piece of content is arranged to be fetched.

    Other inventors
  • Transitioning between communication protocols between networks

    Issued US 9,191,318 and 9,781,035 (continuation)

    A method is provided in one particular example and may include obtaining routing information for a natively supported Internet protocol of a first network that uses a first routing policy; identifying a route with a tunnel endpoint using the routing information, where the tunnel endpoint supports transitioning between a plurality of Internet protocols; generating tunnel information for the route; and sending the route and the tunnel information to a network element in a second network that uses…

    A method is provided in one particular example and may include obtaining routing information for a natively supported Internet protocol of a first network that uses a first routing policy; identifying a route with a tunnel endpoint using the routing information, where the tunnel endpoint supports transitioning between a plurality of Internet protocols; generating tunnel information for the route; and sending the route and the tunnel information to a network element in a second network that uses a second routing policy.

    Other inventors
  • Pseudowire (PW) switching type-length-value (TLV)

    Issued US 8,838,829 and 9,654,379 (continuation)

    A method and apparatus for providing information in a network by way of a Pseudowire switching TLV is presented. A second device in the network receives a first message having information relating to a first device in the network. The second device appends information relating to the second device (by way of a Pseudowire switching TLV) to the first message, resulting in a second message. The second message is then forwarded to a third device in the network.

    Other inventors
  • Load balancing manipulation of packet flows within a transport conduit

    Issued US 8,868,775

    Disclosed are, inter alia, methods, apparatus, computer-readable media, mechanisms, and means for load balancing manipulation of packet flows within a transport conduit (e.g., a tunnel, pseudo wire, etc.), typically using a load balancing value which is independent of standard routing-based parameters (e.g., source address, destination address, source port, destination port, protocol type, etc.). A load balancing value is included in encapsulated packets transported across a network using a…

    Disclosed are, inter alia, methods, apparatus, computer-readable media, mechanisms, and means for load balancing manipulation of packet flows within a transport conduit (e.g., a tunnel, pseudo wire, etc.), typically using a load balancing value which is independent of standard routing-based parameters (e.g., source address, destination address, source port, destination port, protocol type, etc.). A load balancing value is included in encapsulated packets transported across a network using a transport conduit. This load balancing value can be used to load balance the individual flows/microflows within the transport conduit.

    Other inventors
  • Automated Transitioning Between Different Communication Protocols in a Network

    Issued US 8,848,702 and 10,015,092 (continuation)

    One embodiment includes, inter alia, methods, apparatus, computer-storage media, mechanisms, and/or means associated with automated transitioning between different communication protocols in a network. In one embodiment, automatic transition routers are automatically discovered along with the knowledge of what non-native protocols need to be transported across a network. Communication pathways are automatically established as needed to transport these non-native protocols. One embodiment is…

    One embodiment includes, inter alia, methods, apparatus, computer-storage media, mechanisms, and/or means associated with automated transitioning between different communication protocols in a network. In one embodiment, automatic transition routers are automatically discovered along with the knowledge of what non-native protocols need to be transported across a network. Communication pathways are automatically established as needed to transport these non-native protocols. One embodiment is particularly useful in transitioning a network from one protocol to another, such as from Internet Protocol version 4 to version 6.

    Other inventors
  • Techniques for distributing network provider digital content to customer premises nodes

    Issued US 8,824,464

    Techniques for distributing digital content include receiving provider content over a network connection at a customer premises node located on premises of a first customer. The provider content is offered by a network service provider different from the first customer. Provider data based on the provider content is stored in non-volatile storage on the customer premises node of the first customer. It is determined whether conditions are satisfied for sending the provider content to a second…

    Techniques for distributing digital content include receiving provider content over a network connection at a customer premises node located on premises of a first customer. The provider content is offered by a network service provider different from the first customer. Provider data based on the provider content is stored in non-volatile storage on the customer premises node of the first customer. It is determined whether conditions are satisfied for sending the provider content to a second customer different from the first customer. If it is determined that such conditions are satisfied, then the provider data is retrieved from the non-volatile storage, and data based on the provider data is sent over the network connection for receipt by the second customer. Thereby a customer premises node serves as a cache of provider content for other customer premises nodes on the same last mile segment or access network.

    Other inventors
  • Deterministic session load-balancing and redundancy of access servers in a computer network

    Issued US 8,782,256

    In one embodiment, for each port of an access node in an access-based computer network, one access server of a plurality of access servers is configured as a preferred access server for that port. Upon receiving a session initiation message at a particular port, the access node forwards the session initiation message to one or more of the access servers based on the configured preferred access server for the particular port.

    Other inventors
  • Deterministic session load-balancing and redundancy of access servers in a computer network

    Issued US 9,491,234

    In one embodiment, for each port of an access node in an access-based computer network, one access server of a plurality of access servers is configured as a preferred access server for that port. Upon receiving a session initiation message at a particular port, the access node forwards the session initiation message to one or more of the access servers based on the configured preferred access server for the particular port.

    Other inventors
  • Limiting of network device resources responsive to IPv6 originating entity identification

    Issued US 8,699,515

    Methods, apparatus, computer-storage media, mechanisms, and means associated therewith are used to limit network device resources based on the identification of the Internet Protocol version 6 (IPv6) originating entity (e.g., subscriber of a network carrier). As an IPv6 originating entity will typically be assigned 264 or more valid IPv6 addresses, the originating entity may send packets with a source address of any of these valid IPv6 addresses and still be compliant with Internet standards…

    Methods, apparatus, computer-storage media, mechanisms, and means associated therewith are used to limit network device resources based on the identification of the Internet Protocol version 6 (IPv6) originating entity (e.g., subscriber of a network carrier). As an IPv6 originating entity will typically be assigned 264 or more valid IPv6 addresses, the originating entity may send packets with a source address of any of these valid IPv6 addresses and still be compliant with Internet standards and/or other specifications (e.g., RFCs). By determining the originating entity and controlling the allocation of network device resources based on the originating entity (in contrast to on a per valid IPv6 address basis), a network service provider can manage its network device resources, such as in a manner to prevent a depletion of resources caused by an originating entity using a plethora valid IPv6 addresses, or a malicious denial-of-service attack.

    Other inventors
  • System and method for providing quality inter-domain network time transport

    Issued US 8,416,763

    A method is provided in one example embodiment and includes providing a time protocol assistant associated with a time-synchronized domain (TSD). The TSD includes a set of nodes that are synchronized to a same time source. The TSD has defined egress and ingress edge points where bidirectional measurements can be made and the egress and ingress edge points are coupled to the time protocol assistant. The method also includes synchronizing one or more packets flowing through a network that…

    A method is provided in one example embodiment and includes providing a time protocol assistant associated with a time-synchronized domain (TSD). The TSD includes a set of nodes that are synchronized to a same time source. The TSD has defined egress and ingress edge points where bidirectional measurements can be made and the egress and ingress edge points are coupled to the time protocol assistant. The method also includes synchronizing one or more packets flowing through a network that includes the TSD through the same time source. In more specific embodiments, the nodes are synchronized to the same time source via the network and the same time source is a grandmaster clock that synchronizes one or more transparent clocks. In yet other embodiments, the transparent clocks manipulate precision time protocol (PTP) packets sent by the grandmaster clock.

    Other inventors
  • IPv6 addressing over non-IPv6 systems

    Issued US 8,400,943

    A system includes an access node having an associated identifier. The access node is configured to insert the identifier into a network connection request. The system includes an IP edge service node connected to the access node and configured to receive the network connection request. The IP edge service node is further configured to store the inserted identifier and to insert the identifier into an Internet protocol version 6 (IPv6) address request transmitted according to dynamic host…

    A system includes an access node having an associated identifier. The access node is configured to insert the identifier into a network connection request. The system includes an IP edge service node connected to the access node and configured to receive the network connection request. The IP edge service node is further configured to store the inserted identifier and to insert the identifier into an Internet protocol version 6 (IPv6) address request transmitted according to dynamic host configuration protocol version 6 (DHCPv6) through an established network connection based on the network connection request. The system further includes a server configured to receive the IPv6 address request and assign an IPv6 address based on the IPv6 address request.

    Other inventors
  • Techniques for encapsulating point to point (PPP) over Ethernet frames

    Issued US 8,204,080

    Techniques for negotiating Point-to-Point Protocol (PPP) sessions over an Ethernet network include receiving configuration data that indicates a first node is connected to a second node thorough an Ethernet network that supports Ethernet frame payload sizes larger than 1500 octets. Request data is received at the first node from the second node. The request data indicates a request for PPP communications between the first node and the second node using a requested PPP payload size greater than…

    Techniques for negotiating Point-to-Point Protocol (PPP) sessions over an Ethernet network include receiving configuration data that indicates a first node is connected to a second node thorough an Ethernet network that supports Ethernet frame payload sizes larger than 1500 octets. Request data is received at the first node from the second node. The request data indicates a request for PPP communications between the first node and the second node using a requested PPP payload size greater than 1492 octets. A particular PPP payload size greater than 1492 octets is determined. Response data is sent from the first node to the second node. The response data indicates that the particular PPP payload size greater than 1492 octets is to be used for PPP communications between the first node and the second node. These techniques allow better utilization of Ethernet Jumbo, Giant and Baby Giant frames.

    Other inventors
    • Iain T. Lockyer
  • Redundant pseudowires between Ethernet access domains

    Issued US 8,175,078

    A computer network includes first and second Ethernet access domain networks, each of Ethernet access domain networks including a user-facing provider edge (u-PE) device, and a stack group of network-facing provider edge (n-PE) devices coupled with the u-PE device, the n-PE devices running a bidding protocol to select one of the n-PE devices as a primary n-PE device for a single pseudowire connection path between the first and second Ethernet access domain networks. It is emphasized that this…

    A computer network includes first and second Ethernet access domain networks, each of Ethernet access domain networks including a user-facing provider edge (u-PE) device, and a stack group of network-facing provider edge (n-PE) devices coupled with the u-PE device, the n-PE devices running a bidding protocol to select one of the n-PE devices as a primary n-PE device for a single pseudowire connection path between the first and second Ethernet access domain networks. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims.

    Other inventors
  • Redundant pseudowires between ethernet access domains

    Issued US 8,625,412

    A computer network includes first and second Ethernet access domain networks, each of Ethernet access domain networks including a user-facing provider edge (u-PE) device, and a stack group of network-facing provider edge (n-PE) devices coupled with the u-PE device, the n-PE devices running a bidding protocol to select one of the n-PE devices as a primary n-PE device for a single pseudowire connection path between the first and second Ethernet access domain networks. It is emphasized that this…

    A computer network includes first and second Ethernet access domain networks, each of Ethernet access domain networks including a user-facing provider edge (u-PE) device, and a stack group of network-facing provider edge (n-PE) devices coupled with the u-PE device, the n-PE devices running a bidding protocol to select one of the n-PE devices as a primary n-PE device for a single pseudowire connection path between the first and second Ethernet access domain networks. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. 37 CFR 1.72(b).

    Other inventors
  • System and methods for identifying network path performance

    Issued US 8,160,055

    A pseudowire verification framework gathers and maintains status of individual pseudowires by aggregating the state of the individual node hops defining the pseudowire. The framework provides complete assessment of a network by gathering status feedback from network nodes (forwarding entities) that are inaccessible directly from a requesting node by employing an intermediate forwarding entity as a proxy for inquiring on behalf of the requesting node. Therefore, status regarding inaccessible…

    A pseudowire verification framework gathers and maintains status of individual pseudowires by aggregating the state of the individual node hops defining the pseudowire. The framework provides complete assessment of a network by gathering status feedback from network nodes (forwarding entities) that are inaccessible directly from a requesting node by employing an intermediate forwarding entity as a proxy for inquiring on behalf of the requesting node. Therefore, status regarding inaccessible pseudowires is obtainable indirectly from nodes able to “see” the particular pseudowire. Configurations further assess multihop pseudowires including a plurality of network segments; in which each segment defines a pseudowire hop including forwarding entities along the pseudowire path. In this manner, pseudowire health and status is gathered and interrogated for nodes (forwarding) entities unable to directly query the subject pseudowire via intermediate forwarding entities.

    Other inventors
  • Techniques for migrating a point to point protocol to a protocol for an access network

    Issued US 8,086,749

    Techniques for managing a persistent session associated with a particular Media Access Control (MAC) include determining at a broadband remote access server whether an elapsed time since a data packet is received with the particular MAC address exceeds a threshold time. If so, then point-to-point protocol (PPP) control data is sent in a data link protocol payload that is encapsulated in a data packet with an Ethernet destination field that indicates the particular MAC address. The PPP control…

    Techniques for managing a persistent session associated with a particular Media Access Control (MAC) include determining at a broadband remote access server whether an elapsed time since a data packet is received with the particular MAC address exceeds a threshold time. If so, then point-to-point protocol (PPP) control data is sent in a data link protocol payload that is encapsulated in a data packet with an Ethernet destination field that indicates the particular MAC address. The PPP control data indicates a request for an echo. It is determined whether a data packet with the particular MAC address in an Ethernet source field is received within a particular time interval. If not, then a session associated with the particular MAC address is terminated. These techniques allow PPP control plane functionality while utilizing IP over Ethernet for the data plane.

    Other inventors
  • System and method for providing quality inter-domain network time transport

    Issued US 8,064,485

    A method is provided in one example embodiment and includes providing a time protocol assistant associated with a time-synchronized domain (TSD). The TSD includes a set of nodes that are synchronized to a same time source. The TSD has defined egress and ingress edge points where bidirectional measurements can be made and the egress and ingress edge points are coupled to the time protocol assistant. The method also includes synchronizing one or more packets flowing through a network that…

    A method is provided in one example embodiment and includes providing a time protocol assistant associated with a time-synchronized domain (TSD). The TSD includes a set of nodes that are synchronized to a same time source. The TSD has defined egress and ingress edge points where bidirectional measurements can be made and the egress and ingress edge points are coupled to the time protocol assistant. The method also includes synchronizing one or more packets flowing through a network that includes the TSD through the same time source. In more specific embodiments, the nodes are synchronized to the same time source via the network and the same time source is a grandmaster clock that synchronizes one or more transparent clocks. In yet other embodiments, the transparent clocks manipulate precision time protocol (PTP) packets sent by the grandmaster clock.

    Other inventors
  • Techniques for oversubscribing edge nodes for virtual private networks

    Issued US 8,059,527

    Techniques for operating a network interface include automatically determining whether communications are terminated over a particular attachment circuit on a network interface on an intermediate network node at an edge of a provider network, whereby a sign of death (SOD) on the particular attachment circuit is indicated. The attachment circuit is switched with a particular virtual private network that is a link layer virtual private network (VPN) encapsulated in a higher layer protocol. The…

    Techniques for operating a network interface include automatically determining whether communications are terminated over a particular attachment circuit on a network interface on an intermediate network node at an edge of a provider network, whereby a sign of death (SOD) on the particular attachment circuit is indicated. The attachment circuit is switched with a particular virtual private network that is a link layer virtual private network (VPN) encapsulated in a higher layer protocol. The provider network is a packet-switched network. The network interface is for a direct communication link to a customer network node outside the provider network. If it is determined that there is an indication of the SOD, then a new network action is initiated in response to the SOD on the particular attachment circuit. These techniques allow for automatic logging of usage, billing, and fault detection, as well as for over-subscription of network resources for multiple VPNs.

    Other inventors
  • Simple virtual private network for small local area network

    Issued US 8,050,267

    In one embodiment, a method includes establishing a control channel across a wide area network (WAN) from a first gateway that has a first public internetwork layer (L3) address to a second gateway that has a second public L3 address. Each gateway connects a local area network (LAN) to the WAN. Negotiations over the control channel establish a first set of private L3 addresses for the first LAN and a non-overlapping second set for the second LAN. A different address from the first set is…

    In one embodiment, a method includes establishing a control channel across a wide area network (WAN) from a first gateway that has a first public internetwork layer (L3) address to a second gateway that has a second public L3 address. Each gateway connects a local area network (LAN) to the WAN. Negotiations over the control channel establish a first set of private L3 addresses for the first LAN and a non-overlapping second set for the second LAN. A different address from the first set is provided for each different node in the first LAN. A discovery packet is received from the first LAN. The discovery packet is encapsulated in a tunnel packet directed to the second public L3 address. The tunnel packet is sent over the WAN to the second gateway which extracts the discovery packet. The second gateway sends the discovery packet over the second LAN.

    Other inventors
  • Psuedowire termination directly on a router

    Issued US 7,516,224 and 8,001,252 (continuation)

    A method, apparatus and computer program product for routing data within a packet-switched network using a PW wherein the PW is terminated directly on the layer-3 routing device such that certain services and applications can be utilized is presented. The method, apparatus and computer program product receives an encapsulated layer-2 Protocol Data Unit (PDU) from a pseudowire emulating a service. The encapsulation is removed from the encapsulated layer-2 PDU and a layer-2 circuit associated…

    A method, apparatus and computer program product for routing data within a packet-switched network using a PW wherein the PW is terminated directly on the layer-3 routing device such that certain services and applications can be utilized is presented. The method, apparatus and computer program product receives an encapsulated layer-2 Protocol Data Unit (PDU) from a pseudowire emulating a service. The encapsulation is removed from the encapsulated layer-2 PDU and a layer-2 circuit associated with the pseudowire is terminated. The circuit is treated as an interface and the PDU is forwarded based on upper layer protocol information within the PDU.

    Other inventors
  • Techniques for distributing network provider digital content to customer premises nodes

    Issued US 7,986,686

    Techniques for distributing digital content include receiving provider content over a network connection at a customer premises node located on premises of a first customer. The provider content is offered by a network service provider different from the first customer. Provider data based on the provider content is stored in non-volatile storage on the customer premises node of the first customer. It is determined whether conditions are satisfied for sending the provider content to a second…

    Techniques for distributing digital content include receiving provider content over a network connection at a customer premises node located on premises of a first customer. The provider content is offered by a network service provider different from the first customer. Provider data based on the provider content is stored in non-volatile storage on the customer premises node of the first customer. It is determined whether conditions are satisfied for sending the provider content to a second customer different from the first customer. If it is determined that such conditions are satisfied, then the provider data is retrieved from the non-volatile storage, and data based on the provider data is sent over the network connection for receipt by the second customer. Thereby a customer premises node serves as a cache of provider content for other customer premises nodes on the same last mile segment or access network.

    Other inventors
  • Techniques for replacing point to point protocol with dynamic host configuration protocol

    Issued US 7,853,708

    Techniques for providing remote access to a service provider network include exchanging multiple Dynamic Host Configuration Protocol (DHCP) formatted messages instead of any Point to Point Protocol (PPP) message to provide all PPP functions for accessing a service provider network from a customer node. The service provider network is on provider premises and the customer node is on customer premises different from the provider premises. The DHCP format is used to exchange authentication…

    Techniques for providing remote access to a service provider network include exchanging multiple Dynamic Host Configuration Protocol (DHCP) formatted messages instead of any Point to Point Protocol (PPP) message to provide all PPP functions for accessing a service provider network from a customer node. The service provider network is on provider premises and the customer node is on customer premises different from the provider premises. The DHCP format is used to exchange authentication messages, user profile data on Authentication, Authorization and Accounting (AAA) servers, or session keep-alive echo messages, alone or in some combination. When all are message types are combined, these techniques provide a remote access server (RAS) with the capability to perform all functions presently provided by PPP processes. In some combinations, these techniques allow a modified DHCP server to replace a legacy AAA server.

    Other inventors
  • Techniques for customer self-provisioning of edge nodes for a virtual private network

    Issued US 7,778,199

    Techniques for configuring a particular network interface on a particular node at an edge of a provider network to support a particular virtual private network include receiving customer input data. The provider network is a packet-switched network and the particular virtual private network is a link layer virtual private network. The customer input data indicates a topology for customer equipment devices outside the provider network on the particular virtual private network, and may include…

    Techniques for configuring a particular network interface on a particular node at an edge of a provider network to support a particular virtual private network include receiving customer input data. The provider network is a packet-switched network and the particular virtual private network is a link layer virtual private network. The customer input data indicates a topology for customer equipment devices outside the provider network on the particular virtual private network, and may include properties for corresponding interfaces that connect the customer equipment devices to the edge nodes. Based on the customer input data, configuration data is determined for configuring the particular interface at the particular node. The particular node is caused to configure the particular interface based on the configuration data without human intervention. Among other effects, these techniques support zero-touch provisioning of virtual private networks.

    Other inventors
  • Method and apparatus for packet loss detection

    Issued US 7,773,611

    Conventional network packet traffic loss/drop monitoring mechanisms, such as that employed for pseudowire, IP flow and tunnel traffic monitoring, do not process or diagnose the aggregate counts from both endpoints of a particular pseudowire. A packet loss and detection mechanism periodically exchanges traffic packet counts to maintain an accurate diagnosis of the pseudowire health from either endpoint. Further, the raw packet counts are analyzed to identify misrouted and lost packets, as both…

    Conventional network packet traffic loss/drop monitoring mechanisms, such as that employed for pseudowire, IP flow and tunnel traffic monitoring, do not process or diagnose the aggregate counts from both endpoints of a particular pseudowire. A packet loss and detection mechanism periodically exchanges traffic packet counts to maintain an accurate diagnosis of the pseudowire health from either endpoint. Further, the raw packet counts are analyzed to identify misrouted and lost packets, as both should be considered to assess network health and congestion. The pseudowire statistics are maintained for each pseudowire emanating from a particular edge router, providing a complete view of pseudowire traffic affecting a particular edge router. Such statistics are beneficial for problem detection, diagnosis, and for verification of throughput criteria such as those expressed in Quality of Service (QOS) terms and/or SLAs (service level agreements).

    Other inventors
  • Techniques for using first sign of life at edge nodes for a virtual private network

    Issued US 7,769,037

    Techniques for configuring a particular network interface on a particular node at an edge of a provider network to support a particular virtual private network include receiving customer input data. The provider network is a packet-switched network and the particular virtual private network is a link layer virtual private network. The customer input data indicates a topology for customer equipment devices outside the provider network on the particular virtual private network, and may include…

    Techniques for configuring a particular network interface on a particular node at an edge of a provider network to support a particular virtual private network include receiving customer input data. The provider network is a packet-switched network and the particular virtual private network is a link layer virtual private network. The customer input data indicates a topology for customer equipment devices outside the provider network on the particular virtual private network, and may include properties for corresponding interfaces that connect the customer equipment devices to the edge nodes. Based on the customer input data, configuration data is determined for configuring the particular interface at the particular node. The particular node is caused to configure the particular interface based on the configuration data without human intervention. Among other effects, these techniques support zero-touch provisioning of virtual private networks.

    Other inventors
  • Access device-based fragmentation and interleaving support for tunneled communication sessions

    Issued US 7,761,508

    Link fragmentation and interleaving at an access device located between a point to point link and a tunneled connection is provided. A method of access device-based link fragmentation and interleaving is also provided. The method includes receiving frames through a tunnel from a network server, fragmenting at least some of the frames from the network server, and sending fragmented and unfragmented frames over a data link to an endpoint device. The frames may be multilink point to point protocol…

    Link fragmentation and interleaving at an access device located between a point to point link and a tunneled connection is provided. A method of access device-based link fragmentation and interleaving is also provided. The method includes receiving frames through a tunnel from a network server, fragmenting at least some of the frames from the network server, and sending fragmented and unfragmented frames over a data link to an endpoint device. The frames may be multilink point to point protocol (MLPPP) frames and the frames may be received through a layer two tunneling protocol (L2TP) tunnel. The method can include scanning a frame for PPP options and removing options related to MLPPP negotiation and then forwarding the frame to a network server.

    Other inventors
  • Scalable virtual private local area network service

    Issued US 7,751,399

    In one embodiment, a method includes receiving a data link layer packet, such as an Ethernet packet, at a local provider edge node in a provider network from a first customer edge node of multiple customer edge nodes connected directly to the local provider edge node. A tunnel data packet for a particular tunneling protocol is generated. The tunnel data packet includes tunnel data that indicates tunnel termination at a different provider edge in the provider network. The tunnel data packet also…

    In one embodiment, a method includes receiving a data link layer packet, such as an Ethernet packet, at a local provider edge node in a provider network from a first customer edge node of multiple customer edge nodes connected directly to the local provider edge node. A tunnel data packet for a particular tunneling protocol is generated. The tunnel data packet includes tunnel data that indicates tunnel termination at a different provider edge in the provider network. The tunnel data packet also includes customer identifier data and the data link layer packet. The customer identifier data uniquely indicates a customer associated with the first customer edge node. The tunnel data packet is sent over the provider network.

    Other inventors
  • System and method for providing multicast delivery in a network environment

    Issued US 9,559,855

    A method is provided in one example and includes receiving signaling data associated with a request for a multicast channel, the request includes an Internet protocol version 6 (IPv6) source and an IPv6 group address. The method may also include identifying an Internet protocol version 4 (IPv4) source and an IPv4 group address to be mapped to the IPv6 source and the IPv6 group address. The signaling data can be converted from a first protocol to a second protocol. The converted signaling data…

    A method is provided in one example and includes receiving signaling data associated with a request for a multicast channel, the request includes an Internet protocol version 6 (IPv6) source and an IPv6 group address. The method may also include identifying an Internet protocol version 4 (IPv4) source and an IPv4 group address to be mapped to the IPv6 source and the IPv6 group address. The signaling data can be converted from a first protocol to a second protocol. The converted signaling data can be communicated to a network element. In more particular embodiments, the network element is an IP edge router configured to join the multicast channel and stream data in response to receiving the converted signaling data. The IP edge router can be configured to perform an encapsulation operation to transport IPv6 multicast packets within an IPv4 multicast channel.

    Other inventors
  • Methods and apparatus for implementing VPN services

    Issued US 7,668,178

    Implementation of a VPN service such as a VPLS (Virtual Private Local area network Service) is performed utilizing a two-stage process. A first stage of the two-stage process involves providing notification of whether a PE (Provider Edge) router in a label-switching network has VPLS capability. Notification can include broadcasting a message from a PE router to remote PE routers in the label-switching network to indicate whether the broadcasting PE router is VPLS enabled. A second stage of the…

    Implementation of a VPN service such as a VPLS (Virtual Private Local area network Service) is performed utilizing a two-stage process. A first stage of the two-stage process involves providing notification of whether a PE (Provider Edge) router in a label-switching network has VPLS capability. Notification can include broadcasting a message from a PE router to remote PE routers in the label-switching network to indicate whether the broadcasting PE router is VPLS enabled. A second stage of the two-stage process involves, based on receiving a notification that a PE router is VPLS enabled, generating a query message to discover a set of VPLS instances to which the broadcasting PE router belongs. In this way, a given PE router generating the query message can identify other PE routers in the label-switching network associated with the same VPLS for purposes of setting up the VPLS in the label-switching network.

    Other inventors
  • Techniques for authenticating a subscriber for an access network using DHCP

    Issued US 7,624,181

    Techniques for authenticating a user for access to an IP network include receiving from the user's host a DHCP request which includes user identifier data. A random challenge value is determined and sent to the user's host in a DHCP message format. A response message that includes a response value is received from the user's host in DHCP format. A verification value is determined based on a password value associated with the user identifier value in an AAA server and the current challenge value…

    Techniques for authenticating a user for access to an IP network include receiving from the user's host a DHCP request which includes user identifier data. A random challenge value is determined and sent to the user's host in a DHCP message format. A response message that includes a response value is received from the user's host in DHCP format. A verification value is determined based on a password value associated with the user identifier value in an AAA server and the current challenge value using a secure process that renders impractical an attempt to derive the password. If it is determined that the response value does not match the verification value, then a DHCP offer is prevented from being sent to the user's host in response to the DHCP request. Thus, a user is authenticated using DHCP instead of PPP.

    Other inventors
  • System and methods for sending trace messages

    Issued US 7,599,303

    A traceroute mechanism enables responses to the traceroute to reach the originating router (originator) along a multihop pseudowire (PW). A traceroute message includes an accumulator operable to count hops along a MH-PW, implemented as a time-to-live (TTL) field, as is known in the art. An originator router employs multiple TTL values, and decrements one of the TTL "accumulators" for each hop. At the ultimate (terminal) router defining the end of the multihop PW, a TTL in the return message is…

    A traceroute mechanism enables responses to the traceroute to reach the originating router (originator) along a multihop pseudowire (PW). A traceroute message includes an accumulator operable to count hops along a MH-PW, implemented as a time-to-live (TTL) field, as is known in the art. An originator router employs multiple TTL values, and decrements one of the TTL "accumulators" for each hop. At the ultimate (terminal) router defining the end of the multihop PW, a TTL in the return message is set to the number of hops traveled by the traceroute. The difference between the accumulator and the initial TTL value determines the number of hops traveled by the traceroute message, and hence the number of hops back to the originating node. The traceroute return message, now having a TTL set to the number of hops of the counterpart traceroute, reaches the originator when the TTL value is decremented to zero.

    Other inventors
  • Layer-two interworking applied to L2-L3 pseudowires

    Issued US 7,593,398

    A method and apparatus for performing Layer 2 (L2) interworking is presented. A L2 Protocol Data Unit (PDU) is received at an L2 Switching Entity (SE). The L2 PDU is converted to a normalized Pseudowire (PW) PDU. The normalized PW PDU is then forwarded to a Layer 3 (L3) Routing Entity (RE). The normalized PDU may be in the form of a predetermined L2 protocol or a L2 agnostic protocol.

    Other inventors
  • Techniques for establishing subscriber sessions on an access network using DHCP

    Issued US 7,568,040

    Techniques for supporting subscriber sessions for access to an IP network include receiving from a first node at a different second node, a Dynamic Host Configuration Protocol (DHCP) formatted echo-request message. The echo-request message includes a DHCP option field that holds data that indicates an echo-request type. In response to receiving the echo-request message, the second node sends to the first node a DHCP formatted echo-reply message that corresponds to the echo-request message. The…

    Techniques for supporting subscriber sessions for access to an IP network include receiving from a first node at a different second node, a Dynamic Host Configuration Protocol (DHCP) formatted echo-request message. The echo-request message includes a DHCP option field that holds data that indicates an echo-request type. In response to receiving the echo-request message, the second node sends to the first node a DHCP formatted echo-reply message that corresponds to the echo-request message. The echo-reply message includes a DHCP option field that holds data that indicates an echo-reply type. When received by the first node, the echo-response message causes the first node to determine a connected state with the second node. Point to Point Protocol (PPP) keep-alive messages between a customer premises node and a remote access server gateway to an IP network may be replaced by these DHCP echo-request and echo-reply messages.

    Other inventors
  • Limiting of network device resources responsive to IPv6 originating entity identification

    Issued US 8,699,515

    Methods, apparatus, computer-storage media, mechanisms, and means associated therewith are used to limit network device resources based on the identification of the Internet Protocol version 6 (IPv6) originating entity (e.g., subscriber of a network carrier). As an IPv6 originating entity will typically be assigned 2.sup.64 or more valid IPv6 addresses, the originating entity may send packets with a source address of any of these valid IPv6 addresses and still be compliant with Internet…

    Methods, apparatus, computer-storage media, mechanisms, and means associated therewith are used to limit network device resources based on the identification of the Internet Protocol version 6 (IPv6) originating entity (e.g., subscriber of a network carrier). As an IPv6 originating entity will typically be assigned 2.sup.64 or more valid IPv6 addresses, the originating entity may send packets with a source address of any of these valid IPv6 addresses and still be compliant with Internet standards and/or other specifications (e.g., RFCs). By determining the originating entity and controlling the allocation of network device resources based on the originating entity (in contrast to on a per valid IPv6 address basis), a network service provider can manage its network device resources, such as in a manner to prevent a depletion of resources caused by an originating entity using a plethora valid IPv6 addresses, or a malicious denial-of-service attack.

    Other inventors
  • Techniques for zero touch provisioning of edge nodes for a virtual private network

    Issued US 7,535,856

    A method and apparatus for configuring a network interface to support a virtual private network includes storing configuration data at a server on a host computer on the provider network. It is determined whether conditions are satisfied for sending the configuration data to a particular node at an edge of the provider network. If it is determined that conditions are satisfied, then the configuration data is sent to the particular node to cause the particular node to configure a particular…

    A method and apparatus for configuring a network interface to support a virtual private network includes storing configuration data at a server on a host computer on the provider network. It is determined whether conditions are satisfied for sending the configuration data to a particular node at an edge of the provider network. If it is determined that conditions are satisfied, then the configuration data is sent to the particular node to cause the particular node to configure a particular interface for supporting a virtual private network over the provider network based on the configuration data without human intervention. The provider network is a packet-switched network and the particular virtual private network is a link layer virtual private network. The particular node is different from the host. The particular interface is for a direct communication link to a customer network node outside the provider network.

    Other inventors
  • Techniques for zero touch provisioning of edge nodes for a virtual private network

    Issued US 7,535,856

    A method and apparatus for configuring a network interface to support a virtual private network includes storing configuration data at a server on a host computer on the provider network. It is determined whether conditions are satisfied for sending the configuration data to a particular node at an edge of the provider network. If it is determined that conditions are satisfied, then the configuration data is sent to the particular node to cause the particular node to configure a particular…

    A method and apparatus for configuring a network interface to support a virtual private network includes storing configuration data at a server on a host computer on the provider network. It is determined whether conditions are satisfied for sending the configuration data to a particular node at an edge of the provider network. If it is determined that conditions are satisfied, then the configuration data is sent to the particular node to cause the particular node to configure a particular interface for supporting a virtual private network over the provider network based on the configuration data without human intervention. The provider network is a packet-switched network and the particular virtual private network is a link layer virtual private network. The particular node is different from the host. The particular interface is for a direct communication link to a customer network node outside the provider network.

    Other inventors
  • Techniques for encapsulating point to point protocol (PPP) over Ethernet frames

    Issued US 7,525,972

    Techniques for negotiating Point-to-Point Protocol (PPP) sessions over an Ethernet network include receiving configuration data that indicates a first node is connected to a second node thorough an Ethernet network that supports Ethernet frame payload sizes larger than 1500 octets. Request data is received at the first node from the second node. The request data indicates a request for PPP communications between the first node and the second node using a requested PPP payload size greater than…

    Techniques for negotiating Point-to-Point Protocol (PPP) sessions over an Ethernet network include receiving configuration data that indicates a first node is connected to a second node thorough an Ethernet network that supports Ethernet frame payload sizes larger than 1500 octets. Request data is received at the first node from the second node. The request data indicates a request for PPP communications between the first node and the second node using a requested PPP payload size greater than 1492 octets. A particular PPP payload size greater than 1492 octets is determined. Response data is sent from the first node to the second node. The response data indicates that the particular PPP payload size greater than 1492 octets is to be used for PPP communications between the first node and the second node. These techniques allow better utilization of Ethernet Jumbo, Giant and Baby Giant frames.

    Other inventors
    • Iain Lockyer
  • IPv6 addressing over non-IPv6 systems

    Issued US 8,400,943

    A system includes an access node having an associated identifier. The access node is configured to insert the identifier into a network connection request. The system includes an IP edge service node connected to the access node and configured to receive the network connection request. The IP edge service node is further configured to store the inserted identifier and to insert the identifier into an Internet protocol version 6 (IPv6) address request transmitted according to dynamic host…

    A system includes an access node having an associated identifier. The access node is configured to insert the identifier into a network connection request. The system includes an IP edge service node connected to the access node and configured to receive the network connection request. The IP edge service node is further configured to store the inserted identifier and to insert the identifier into an Internet protocol version 6 (IPv6) address request transmitted according to dynamic host configuration protocol version 6 (DHCPv6) through an established network connection based on the network connection request. The system further includes a server configured to receive the IPv6 address request and assign an IPv6 address based on the IPv6 address request.

    Other inventors
  • Techniques for migrating a point to point protocol to a protocol for an access network

    Issued US 7,483,996

    Techniques for exchanging point to point protocol (PPP) information among network nodes using an arbitrary network protocol include determining whether a PPP payload includes PPP control data. If so, then an outbound protocol frame is generated with the PPP control data in a payload and with an outbound protocol type field that indicates PPP control data. The outbound protocol frame is sent to a server which uses the PPP control data. The outbound protocol is different from PPP and from PPP…

    Techniques for exchanging point to point protocol (PPP) information among network nodes using an arbitrary network protocol include determining whether a PPP payload includes PPP control data. If so, then an outbound protocol frame is generated with the PPP control data in a payload and with an outbound protocol type field that indicates PPP control data. The outbound protocol frame is sent to a server which uses the PPP control data. The outbound protocol is different from PPP and from PPP over Ethernet (PPPoE) and from PPP over Asynchronous Transfer Mode (ATM) protocol (PPPoA). The outbound protocol may be Ethernet or ATM Adaptation Layer (AAL) or some other protocol. These techniques allow PPP control plane functionality while utilizing IP over Ethernet for the data plane.

    Other inventors
  • Techniques for Zero Touch Provisioning of Edge Nodes for a Virtual Private Network By Pushing Configuration from a Server

    Issued US 7,420,933

    A method and apparatus for configuring a network interface to support a virtual private network includes storing configuration data at a server on a host computer on the provider network. It is determined without human intervention whether conditions are satisfied for sending the configuration data to a particular node at an edge of the provider network without receiving a request message from the particular node. If it is determined that conditions are satisfied, then the configuration data is…

    A method and apparatus for configuring a network interface to support a virtual private network includes storing configuration data at a server on a host computer on the provider network. It is determined without human intervention whether conditions are satisfied for sending the configuration data to a particular node at an edge of the provider network without receiving a request message from the particular node. If it is determined that conditions are satisfied, then the configuration data is sent to the particular node to cause the particular node to configure a particular interface for supporting a virtual private network over the provider network based on the configuration data. The particular node is different from the host. These techniques allow changes in configuration data to be pushed to provider edge nodes without human intervention.

    Other inventors

Languages

  • English

    -

  • French (Advanced Intermediate)

    -

Recommendations received

More activity by Mark

View Mark’s full profile

  • See who you know in common
  • Get introduced
  • Contact Mark directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Mark Townsley in United States

Add new skills with these courses