Subchannel security at the optical layer

a security and optical layer technology, applied in the field of network optimization, can solve the problems of not being able to address certain significant realities of existing sdn networks, unable to solve solutions, and unable to purchase popular dvds, etc., and achieve the effects of facilitating sdn flow optimization, facilitating decision-making, and minimizing network congestion

Inactive Publication Date: 2014-07-10
SONUS NETWORKS
View PDF41 Cites 60 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0029]In accordance with the present invention, various embodiments of novel methods and architectures are disclosed to address these problems. A System Environment Monitor is employed to extract from the network both real-time and historical Network Metrics at the Infrastructure Layer, as well as Application Metadata at the Application Layer. Network analytics facilitate decisions based upon the differing characteristics of Application Components and lower-level hardware components across multiple DTTs. In response, an SDN Controller generates modified sets of SDN Flows, and implements them in real time across a mixed technology (multi-DTT) network in a manner that avoids disrupting existing SDN Flows and other real-time network traffic.
[0030]This real-time automated feedback loop facilitates optimizations of SDN Flows to minimize network congestion and achieve various desired QoS objectives that are relevant to particular applications (Application Optimization), as well as to the entire system (System Optimization). Predictive Optimization is also employed based on the historical performance of applications and lower-level network hardware over time, using simulation to determine whether proposed changes to a set of SDN Flows yields an overall improvement in network performance or efficiency.

Problems solved by technology

At a more conceptual level, purchasing a popular DVD on “Black Friday” at Amazon, for example, may take longer than on other days due to an unusually high number of concurrent users.
These “solutions,” however, fail to address certain significant realities of existing SDN networks.
One such reality is the fact that implementing revised SDN Flows often disrupts existing SDN Flows (to be modified), as well as other real-time network traffic.
Applications running on the network may, as a result of these attempted optimizations, experience downtime or errors that, in some cases, can be quite costly.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Subchannel security at the optical layer
  • Subchannel security at the optical layer
  • Subchannel security at the optical layer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040]In the detailed embodiments described below, it should be noted that the physical form in which architectural components, processes and other functionality is embodied can vary from dedicated computer hardware to software running on a general-purpose computer to a myriad of hybrid implementations allocating such functionality among different hardware and software components. It should be noted that even software components are typically embodied in physical non-transitory storage media (i.e., memory), such as hard disk drives, flash memory, etc.

[0041]FIG. 1A is a block diagram illustrating one embodiment of an SDN Network 100a of the present invention, including a centralized SDN Controller 110 and a System Environment Monitor 115 for monitoring network nodes and extracting and analyzing real-time data reflecting the performance of SDN Network 100a at various levels of abstraction, including the Application Layer (containing various Application Components 120) and the lower-le...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention includes various novel systems and methods for dynamically modifying WDM transmission and receive steps (individually or in combination), including encoding client signals, mapping them to subchannels within or across ITU channels, modulating them onto subcarrier frequencies, and multiplexing them together for optical transmission. By dynamically modifying one or more of these processing steps over time (as well as encrypting underlying client signals), additional security is provided at the physical (optical) layer of an optical network, thereby greatly enhancing overall network security. Tunable lasers are employed to generate respective subcarrier frequencies, which represent subchannels of an ITU channel to which client signals are mapped. Client circuits are divided and combined with one another before being mapped to individual subchannels within and across ITU channels, thereby facilitating desired optical routing, switching, concatenation and protection of the client circuits mapped to those subchannels across the nodes of a WDM network.

Description

CROSS REFERENCE TO RELATED APPLICATIONS[0001]This application is a continuation in part of U.S. patent application Ser. No. 14 / 063,955, filed Oct. 25, 2013, entitled “SUBCHANNEL SECURITY AT THE OPTICAL LAYER”, which is a continuation of U.S. patent application Ser. No. 13 / 031,594, filed Feb. 21, 2011, entitled “Subchannel Security at the Optical Layer”, which claims the benefit, pursuant to 35 U.S.C. §119(e), of (i) U.S. Provisional Patent Application No. 61 / 306,925, filed Feb. 22, 2010, entitled “Subchannel Security at the Optical Layer”, each of which is hereby incorporated by reference in its entirety.BACKGROUND[0002]1. Field of Art[0003]The present invention relates generally to network optimization, and more particularly to non-disruptive optimization of SDN Flows across different data transfer technologies based on real-time monitoring of application-level metadata and infrastructure-level network metrics.[0004]2. Description of Related Art[0005]Software-defined networking (SD...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): H04J14/02
CPCH04J14/0227H04J14/0298H04L63/08H04K1/003H04K1/10H04L67/56H04L41/122H04L41/0816H04L41/0823H04L41/12H04L41/145H04L43/0823H04L43/14H04L45/14
Inventor GRAHAM, TREVORWALKER, SCOTTMCKEE, ALANMAY, KARLMYSLINSKI, PIOTRKING, RICHARD
Owner SONUS NETWORKS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products