WORLD WIDE PACKETS, INC. Patent applications |
Patent application number | Title | Published |
20100039935 | Deactivating a Packet Tunnel Based On At Least One Performance Characteristic - Network operating methods provide a first packet switch coupled to a second packet switch via a primary packet tunnel having an active status and one or more inactive backup packet tunnels having an inactive status. The methods access data describing at least one performance characteristic of the primary packet tunnel and, based at least on the data, deactivate the primary packet tunnel while still operational and activate one of the backup packet tunnels. Network operating methods provide a first device coupled to a second device via an active primary packet tunnel and one or more inactive backup packet tunnels, access data describing performance characteristics of the one or more backup packet tunnels, and, based at least on the data, deactivate the primary packet tunnel and activate one of the backup packet tunnels. | 02-18-2010 |
20100034115 | Modifying a Rate Based On At Least One Performance Characteristic - Network operating methods provide a first packet switch configured to send a plurality of packets from the first packet switch to a second packet switch via a network path traversing one or more intermediate packet switches, access data describing at least one performance characteristic of the network path, and based on the data, modify a rate at which the first packet switch sends the plurality of packets to the second packet switch via the path. Network management methods receive data describing at least one performance characteristic of a network path having a first endpoint on a first packet switch, a second endpoint on a second packet switch, the network path traversing one or more intermediate packet switches and, based on the received data, instruct the first packet switch to modify a rate at which the first packet switch sends packets to the second packet switch via the network path. | 02-11-2010 |
20090003337 | Determining the State of a Tunnel with Respect to a Control Protocol - Element managers and processes retrieve information from a first packet switch. The information is derived from layer-two (data link layer) control packets relayed from a second packet switch to the first packet switch via a tunnel. The layer-two control packets conform to a layer-two control protocol. Based at least in part on the retrieved information, the element managers and processes determine that the tunnel is configured to relay layer-two control packets conforming to the layer-two control protocol despite a desired tunnel configuration specifying that the tunnel should not be configured to relay layer-two control packets conforming to the layer-two control protocol. Element managers and processes may alternatively or additionally detect other discrepancies between the desired tunnel configuration and the tunnel. | 01-01-2009 |
20090003336 | Determining a Logical Neighbor of a Network Element - Element managers and processes receive, from a selected network element, first neighbor information describing a first neighboring network element directly connected to the selected network element and second neighbor information describing a different second neighboring network element directly connected to the selected network element. Based at least in part on the first neighbor information and the second neighbor information, the element managers and processes determine that the first neighboring network element is a logical neighbor that is connected by a tunnel to the selected network element and is coupled to the selected network element via one or more intermediate packet switches. | 01-01-2009 |
20090003333 | Obtaining Identification Information for a Neighboring Network Element - If a selected packet switch connected to a neighboring packet switch makes first information identifying the neighboring packet switch available, element managers and processes retrieve the first information from the selected packet switch. The first information is derived by the selected packet switch from communication via a first protocol between the selected packet switch and the neighboring packet switch. If the first information is not available to the element manager and if the selected packet switch makes second information identifying the neighboring packet switch available to the element manager, the element managers and processes retrieve the second information from the selected packet switch. The second information is derived from communication via a second protocol between the selected packet switch and the neighboring packet switch and the first and second protocols are different protocols. | 01-01-2009 |
20090003313 | Activating a Tunnel upon Receiving a Control Packet - Packet switch operating methods and packet switches receive, at a packet switch, a control packet from another packet switch. The packet switch and the other packet switch are coupled together by two or more tunnels. The control packet indicates that a particular one of the tunnels is active on the other packet switch. In response, the packet switch operating methods and packet switches activate the particular tunnel indicated by the received control packet on the packet switch. | 01-01-2009 |
20080291928 | Processing Packets of a Virtual Interface Associated with Tunnels - Packet switch operating methods and packet switches assign a packet to a virtual interface. The virtual interface is associated with a plurality of tunnels. One of the plurality is designated a primary tunnel configured to accept packets. Other tunnels of the plurality are designated as backup tunnels and are configured to reject packets. The methods and packet switches also determine which of the plurality of tunnels is the primary tunnel and determine a packet switch port associated with the primary tunnel. The methods and packet switches egress the packet via the primary tunnel on the packet switch port associated with the primary tunnel. | 11-27-2008 |
20080291910 | Transitioning a Virtual Interface from One Tunnel to Another Tunnel - Packet switch operating methods and packet switches provision a plurality of tunnels on a packet switch by associating each of the plurality of tunnels with a packet switch port and by configuring the packet switch to modify packets relayed by the tunnel to include a transport identifier associated with the tunnel. The tunnels of the plurality relay packets when permitted by a tunnel index. The plurality of tunnels and the tunnel index are associated with a virtual interface. The methods and packet switches also permit a first tunnel of the plurality of tunnels to relay packets by configuring the tunnel index to indicate the first tunnel. The tunnel index indicates only one tunnel. The methods and packet switches also enable a second tunnel of the plurality of tunnels to relay packets by configuring the tunnel index to indicate the second tunnel, thereby preventing the first tunnel from relaying packets. | 11-27-2008 |