Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

259 results about "Core router" patented technology

A core router is a router designed to operate in the Internet backbone, or core. To fulfill this role, a router must be able to support multiple telecommunications interfaces of the highest speed in use in the core Internet and must be able to forward IP packets at full speed on all of them. It must also support the routing protocols being used in the core. A core router is distinct from an edge router: edge routers sit at the edge of a backbone network and connect to core routers.

Transporting multicast over MPLS backbone using virtual interfaces to perform reverse-path forwarding checks

A mechanism is provided in which multicast reverse path forwarding can be performed at a provider network egress edge router wherein core routers of the provider network are not configured to support multicast protocols or point-to-multipoint LSPs. An embodiment of the present invention provides for the creation of virtual interfaces in the egress edge router element during configuration of a multicast connection in response to a subscriber request. A virtual interface will be associated with an upstream ingress edge router element and that ingress edge router element is provided a label associated with the virtual interface. Such a label can then be included in datastream packets transmitted through the provider network. The label can then be used by reverse path forward checking at the egress edge router element to ascertain whether the multicast datastream is being received by the correct upstream interface (e.g., the virtual interface associated with the ingress edge router element). In such a manner, core network router elements of the provider's network need not be configured to process multicast transmissions as such, nor need the core router elements be configured to use the same network protocols as those used by the customer networks (e.g., customer networks can use IPv6 while the core network routers can use IPv4).
Owner:CISCO TECH INC

Network system and method for guaranteeing multi-type service quality

The invention discloses a network system and a method for guaranteeing multi-type service quality. A service perception module and a pre-labeling module are arranged in a source host and used for perceiving sent service data packets and pre-labeling the grouped data packets with different semantic priorities for sending according to the perception information when a network layer is encapsulated.An edge router and a core router are provided with a multi-service agent respectively. The edge router is also provided with an acceptance controller for mapping the semantic priorities of the service data packets into network priorities and distributing the service data packets to the corresponding service agents. The homogeneous service agents in all the routers are interconnected to form virtual topologies, and each virtual topology is provided with an independent routing table for routing selection of the service data packets of different priorities on the corresponding virtual topologiesrespectively. Service routing of high priority is guaranteed, and influence on low priority services is reduced as much as possible; and the invention also provides a method for setting link weights,which distributes the network traffic to each link more uniformly and improves the throughput rate.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Attack traffic protection system, method and device, electronic equipment and storage medium

The invention relates to the technical field of network security, in particular to an attack traffic protection system, method and device, electronic equipment and a storage medium, which are used forproviding an automatic hierarchical protection method and improving the protection efficiency, and the system comprises: a core router cluster used for forwarding received mirror image traffic of traffic to be processed to an attack detection module; an attack detection module which is used for detecting the mirror image flow, generating alarm information after the attack traffic is detected, andreporting the alarm information to the central centralized control module; and a central centralized control module which is used for determining the attack type of the attack traffic according to the traffic feature information in the alarm information, wherein if the attack type comprises a bandwidth consumption type attack, the core router cluster is enabled to protect the to-be-processed flow, and if the attack type comprises the resource consumption type attack, the cleaning module is enabled to protect the to-be-processed flow. Since automatic layered protection is performed according to the flow characteristic information of the attack flow, the protection efficiency is improved.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Sharing IP network resources

A system and method for sharing access to an internet protocol (IP) network among multiple internet service providers (ISPs) uses multiprotocol label switching (MPLS). End-users are coupled to a broadband customer access network. Each end-user is also associated with at least one of the ISPs. An aggregation router interfaces the customer access network with a network backbone. The network backbone includes a border router for interfacing between the network backbone and the network of an ISP. When the border router is activated, it creates a forwarding equivalency class (FEC) corresponding to the ISP. The border router stores a label for the FEC and the interface for reaching the ISP in an FEC table. The border router advertises the label binding for the FEC to all upstream nodes. An intermediate node receiving the label binding creates its own FEC table, associates a new label with the FEC, and advertises the new label binding to its upstream nodes. The aggregation router receives and builds a FEC table containing the label bindings for all ISPs reachable over the network backbone. When the aggregation router receives a data packet from an end-user, the aggregation router determines the ISP associated with the end-user, labels the data packet with the label corresponding to the FEC for that ISP, and routes the packet on the network backbone. The packet eventually reaches the border router, which pops off the label and passes the packet to the ISP.
Owner:AT HOME BONDHOLDERS LIQUIDATING TRUST +1

Sharing IP network resources

A system and method for sharing access to an internet protocol (IP) network among multiple internet service providers (ISPs) uses multiprotocol label switching (MPLS). End-users are coupled to a broadband customer access network. Each end-user is also associated with at least one of the ISPs. An aggregation router interfaces the customer access network with a network backbone. The network backbone includes a border router for interfacing between the network backbone and the network of an ISP. When the border router is activated, it creates a forwarding equivalency class (FEC) corresponding to the ISP. The border router stores a label for the FEC and the interface for reaching the ISP in an FEC table. The border router advertises the label binding for the FEC to all upstream nodes. An intermediate node receiving the label binding creates its own FEC table, associates a new label with the FEC, and advertises the new label binding to its upstream nodes. The aggregation router receives and builds a FEC table containing the label bindings for all ISPs reachable over the network backbone. When the aggregation router receives a data packet from an end-user, the aggregation router determines the ISP associated with the end-user, labels the data packet with the label corresponding to the FEC for that ISP, and routes the packet on the network backbone. The packet eventually reaches the border router, which pops off the label and passes the packet to the ISP.
Owner:AT HOME BONDHOLDERS LIQUIDATING TRUST

Packet transmission method based on network dual exit and exit router

The invention provides a message transmission method based on double output-ports of the network and output-port routers, which are applied in a data centre network containing two output-port routers, and a connection is established between the two outlet-port routers; after receiving a request message from the (ISP) network side of a service supplier, each output-port router merely conducts the displacement of destination address, and creates a conversation information containing the source address of the request message and the destination address after the displacement, and then sends the request message; after receiving the message from the network side of the data center, by judging whether the self creates the conversation information containing the source address of the message and the destination address, if yes, the output-port router replaces the source address of the message by a public network address of the output-port routers and then transmits the public network address to the ISP gateway of the next hop; otherwise, the output-port router transmits the message to the other output-port router connected with the output-port router. The invention is favorable for realizing safety precautions of the servers in the data center network and improving the security of the data center network.
Owner:NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products