Identifying nodes in a ring network

Information

  • Patent Grant
  • 9998337
  • Patent Number
    9,998,337
  • Date Filed
    Tuesday, December 20, 2016
    8 years ago
  • Date Issued
    Tuesday, June 12, 2018
    6 years ago
  • Inventors
  • Original Assignees
  • Examiners
    • Weidner; Timothy J
    Agents
    • Hamilton, DeSanctis & Cha LLP
Abstract
Methods and systems for determining a token master on a ring network are provided. According to one embodiment, a ring controller of a first blade participating in the ring network receives an indication that an arbitration token originated by an originating blade has been received. The ring controller compares the priorities of the originating blade and the first blade. When the priority of the originating blade is higher, the ring controller transmits the arbitration token to the next blade. When the priority of the originating blade is lower, the ring controller sets the first blade as the originating blade and transmits the arbitration token to the next blade. When the priorities are equal, the ring controller assumes the role of the token master, which is responsible for periodically transmitting a discovery marker onto the ring network to facilitate topology discovery.
Description
COPYRIGHT NOTICE

Contained herein is material that is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction of the patent disclosure by any person as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all rights to the copyright whatsoever. Copyright © 2001-2016, Fortinet, Inc.


BACKGROUND

Field


Embodiments of the present invention generally relate to computer networks and more particularly to the identification of nodes on a ring network.


Description of the Related Art


The interest in the computer networks is growing every day, as more and more users want the capability to access information at remote locations. A computer network is composed of nodes and the communication links between the nodes. In order for a first node to access information at a remote node, the first node must have a way to know that the remote node exists. Thus, the nodes in the network need configuration information that described the topology of the other nodes in the network.


In prior networks, a predetermined master node would send a query to every node address asking whether a node exists at that address. When the master node received acknowledgment back, it would then know at which addresses other nodes existed. Whenever nodes were added to or removed from the network, the master node needed to repeat these queries to determine the new node topology, which was a time-consuming task. Thus, these prior networks suffered from heavy network traffic and performance problems. Further, if the master node was removed or disabled, the network had no way of determining the network topology.


Hence, there is a need for a solution that overcomes the problems of the prior art and provides an improved technique for determining network topology.


SUMMARY

Methods and systems are described for determining a token master on a ring network. According to one embodiment, a ring controller of a first blade of multiple blades participating in the ring network receives an indication that an arbitration token originated by an originating blade has been received. The ring controller compares the priority of the originating blade to the priority of the first blade. When the priority of the originating blade is higher, then the ring controller transmits the arbitration token to the next blade in the ring network. When the priority of the originating blade is lower, then the ring controller sets the first blade as the originating blade and transmits the arbitration token to the next blade. When the priority of the originating blade is equal, then the ring controller assumes the role of the token master, which is responsible for periodically transmitting a discovery marker onto the ring network to facilitate topology discovery by the blades.


Other features of embodiments of the present invention will be apparent from the accompanying drawings and from the detailed description that follows.





BRIEF DESCRIPTION OF THE DRAWINGS

Embodiments of the present invention are illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which like reference numerals refer to similar elements and in which:



FIG. 1 is a block diagram of the hardware and operating environment in which different embodiments of the invention can be practiced.



FIG. 2 is a block diagram of a multi-blade system connected via a ring network, according to an embodiment of the invention.



FIG. 3 is a flowchart of master blade arbitration logic, according to an embodiment of the invention.



FIG. 4 is a flowchart of the master blade functions, according to an embodiment of the invention.



FIG. 5 is a flowchart of blade discovery logic, according to an embodiment of the invention.



FIG. 6 describes a discovery marker data structure, according to an embodiment of the invention.





DETAILED DESCRIPTION

Methods, systems and data structure are described for facilitating identification of nodes in a ring network. In the following detailed description of exemplary embodiments of the invention, reference is made to the accompanying drawings, which form a part hereof, and in which is shown by way of illustration specific exemplary embodiments in which the invention may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the invention, and it is to be understood that other embodiments may be utilized and that logical, mechanical, electrical, and other changes may be made without departing from the scope of the present invention. The following detailed description is, therefore, not to be taken in a limiting sense.


In the figures, the same reference number is used throughout to refer to an identical component which appears in multiple figures. Signals and connections may be referred to by the same reference number or label, and the actual meaning will be clear from its use in the context of the description.


Some portions of the detailed descriptions that follow are presented in terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the ways used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self-consistent sequence of steps leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form to electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like. It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussions, terms such as “processing,” “computing,” “calculating,” “determining,” “displaying,” or the like, refer to the action and processes of a computer system, or similar computing device, that manipulates and transforms data represented as physical (e.g., electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission, or display devices.



FIG. 1 is a diagram of the hardware and operating environment in conjunction with which embodiments of the invention may be practiced. The description of FIG. 1 is intended to provide a brief, general description of suitable computer routing hardware and a suitable computing environment in conjunction with which the invention may be implemented. Although not required, the invention is described in the general context of computer-executable instructions, such as program modules, being executed by a computer, such as a personal computer or a server computer. Generally, program modules include routines, programs, objects, components, data structures, etc., that perform particular tasks or implement particular abstract data types.


As shown in FIG. 1, system 100 includes service processing switch 110, access routers 104, and network 116. In one embodiment, service processing switch 110 provides switching, routing, and computing resources that can be allocated by a service provider to customers. In one embodiment, service processing switch 110 is the IPSX 9000 service processing switch from CoSine Communications, Inc. But, the invention is not limited to any particular switch, router, or service processing hardware.


Service processing switch 110 includes one or more blades 112. In some embodiments, blades 112 have a type associated with them. Examples of blade types include processing functions such as network blades, control blades, trunk blades, and processor blades. Network blades provide interfaces to different types of networks. Control blades provide system management and accounting functions to service processing system 110. Trunk blades provide access to high speed trunk networks. Processor blades provide general purpose computer processors that in some embodiments provide firewall, intrusion detection, or directory services. Blades are communicably coupled to one another via a packet ring or rings, as further described below with reference to FIG. 2. Referring again to FIG. 1, each blade includes ring controller 145, which contains logic for interfacing to a ring network that connects the blades, as further described below with reference to FIGS. 3-5.


Referring again to FIG. 1, each of blades 112 includes one or more processing elements 114. Processing elements 114 includes CPUs and memory that provide computing resources for the blade, as further described below with reference to FIG. 2. Referring again to FIG. 1, the invention is not limited to any particular number of processing elements on a blade, nor is the invention limited to any particular number of blades in a service processing switch 110. Software tasks, in some embodiments, are split up such that one processor operates on one part of the data and another processor operates on another part of the data. In other embodiments, the various processing portions of a task all run on a single processor, multiprocessing with other tasks that share that processor. Thus, the hardware provides scalability, where low-end systems include few processors that do all the work, and high-end systems include one hundred or more processors and the work is distributed among the processors for greater speed and throughput.


Service processing system 110 is typically communicably coupled to a network 116, of example the Internet. Network 116 can also be a Wide Area Network (WAN), a Local Area Network (LAN), or a private network. Service processing system 110 is also typically communicatively coupled to a plurality of customer networks 102 via customer access routers 104.



FIG. 2 is a block diagram of a multi-blade system connected via a ring network within service processing system 110, according to an embodiment of the invention. In some embodiments, each of two network rings 210 and 220 communicatively connect blades 112-1, 112-2, and 112-3 together. Although three blades are shown, in another embodiment any number can be present. Blade 112-1 contains processor 230-1 and memory 240-1 connected via system bus 250-1. Blade 112-1 also contains ring controller 145-1. Blade 112-2 contains processor 230-2 and memory 240-2 connected via system bus 250-2. Blade 112-1 also contains ring controller 145-2. Blade 112-3 contains processor 230-3 and memory 240-3 connected via system bus 250-3. Blade 112-1 also contains ring controller 145-3. Each blade optionally includes other hardware; for example although only one processor and memory are shown in the blades, each can contain multiple processors and multiple memories, as previously described above with reference to FIG. 1.


Referring again to FIG. 2, each memory 240-1, 240-2, and 240-3 contains respective topology information for the other blades 242-1, 242-2, and 242-3, which contains a discovery marker's connection state, the control blade master state, and blade characteristics. The topology information is further described below with reference to FIG. 5.


Referring again to FIG. 2, network ring 210 is a primary ring, which connects the blades in one direction, and network ring 220 is a protect ring, which connects the blades in the opposite direction. Primary ring 210 is used for normal packet transmission and reception, unless a break is detected in the ring as a result of blade failure or removal. When connection faults are detected, the affected blades begin using protect ring 220 to bypass the bad or missing connection. The packet ring hardware manages and discovers topology changes, and provides software with a current topology map, as further described below with reference to FIGS. 4 and 5.


Blade 112-1 contains primary-ring receive port 261-1, primary-ring transmit port 262-1, protect-ring transmit port 263-1, and protect-ring receive port 264-1. Blade 112-2 contains primary-ring receive port 261-2, primary-ring transmit port 262-2, protect-ring transmit port 263-2, and protect-ring receive port 264-2. Blade 112-3 contains primary-ring receive port 261-3, primary-ring transmit port 262-3, protect-ring transmit port 263-3, and protect-ring receive port 264-3.


Rings 210 and 220 are packet-passing rings. Each packet 270 placed in the rings includes a data portion 272 and a processor element identifier (PEID 274), which identifiers the destination processor for the packet. If the PEID matches a processor on its particular blade, the blade 112 passes the packet to the proper processor; if not, the packet is forwarded to the next blade. Although packet 270 is shown as traveling in ring 220, it can also travel in ring 210.


Although the embodiment of FIG. 2 has been described in the context of a network of blades within a switch, the invention applies equally to any nodes in a network, whether the nodes are contained within the same housing, located within the same room, or situated vast geographical distances apart.


In the previous section, a system level overview of the operation of exemplary embodiments of the invention was described. In this section, the particular methods of the invention performed by an operating environment executing an exemplary embodiment are described. In one embodiment the methods to be performed constitute computer programs made up of computer-executable instructions. But, in other embodiments the methods can be implemented using hardware in lieu of a processor-based system. Describing the methods enables one skilled in the art to develop such programs including such instructions to carry out the methods on suitable computers (the processor of the computer executing the instructions from computer-readable media). Describing the methods also enables one skilled in the art to develop hardware to carry out the described methods.



FIG. 3 is a flowchart of token master blade arbitration logic, according to an embodiment of the invention. The functions described in FIG. 3 are carried out by any of blades 112. Packet rings 210 and 220 use a token arbitration scheme, allowing one blade (the blade that has most recently received a token marker) to transmit locally generated packets. A token marker is a one-cycle message with a unique encoding. At power-up, or after a connection state transition, a token may not be present in the packet ring. When this happens, a single blade takes responsibility for generating a token, so that packet transmission can proceed. This single blade is referred to as the token master blade, and the token master arbitration logic is described as follows.


Control begins at block 300. Control then continues to block 305 where an event is received at the blade. Control then continues to block 310 where blade 112 determines whether the event previously received at block 305 was a token timeout period expiration event. The token timeout period can expire, for example, when a blade insertion/removal event causes token loss or when no token has yet been generated following power-up.


If the determination at block 310 is true, then control continues to block 315 where blade 112 transmits an arbitration token on the ring network. In this way, a blade generates an arbitration token whenever a token timeout period has passed without detecting the arrival of a token. In one embodiment, the token timeout period is calculated by multiplying (max system blade count*(max packet delay+ring I/O latency)*clock period). In this token-based ring network, an arbitration token is passed around the nodes of the ring, and only the node that currently has the token has permission to send a packet on the ring. Control then returns to block 305, as previously described above.


If the determination at block 310 is false, then control continues to block 320 where blade 112 determines whether an arbitration token arrived event occurred at block 305. If the determination at block 320 is false, then control continues to block 321 where processing for other events occurs. Control then returns to block 305, as previously described above.


If the determination at block 320 is true, then control continues to block 322 where blade 112 determines whether the time-to-live field in the received arbitration token exceeds the time-to-live threshold. If the determination at block 322 is true, then control continues to block 324 where blade 112 discards the arbitration token. Control then returns to block 305 as previously described above.


If the determination at block 322 is false, then control continues to block 325 where blade 112 compares the arbitration token blade ID with its own local blade ID. From block 325, control continues to block 330 where blade 112 determines whether the arbitration token blade ID is a lower priority than the ring controller blade ID. If the determination at block 330 is true, then control continues to block 335 where blade 112 replaces the token blade ID with the ID of the ring controller. Control then continues to block 336 where blade 112 resets the time-to-live field in the arbitration token. Control then continues to block 345 where blade 112 transmits the token to the next blade in the ring. Control then returns to block 305, as previously described above.


If the determination at block 330 is false, the control continues to block 350 where blade 112 determines whether the arbitration token blade ID is at a higher priority than the ring controller blade ID. If the determination at block 350 is true, then control continues to block 340 where blade 112 increments the time-to-live field in the arbitration token. Control then controls to block 345, as previously described above.


If the determination at block 350 is false, then the arbitration token blade ID has an equal priority to the ring controller blade ID, so control continues to block 355 where blade 112 makes itself the token master blade and converts the received arbitration token to a normal packet transmission token. Thus, once the arbitration token previously generated at block 315 is passed all the way around the ring network and back to this blade unmodified by any higher priority blade, this blade becomes the master blade. Control then continues to block 345, as previously described above.



FIG. 4 is a flowchart of the token master blade functions, according to an embodiment of the invention. A blade became a token master blade as previously described above with reference to blocks 315 and 355. Control begins at block 400. Control then continues to block 410 where the master blade transmits a discovery marker. A discovery marker is further described below with reference to FIG. 6. Control then continues to block 420 where the master blade determines whether a period of time has expired since the last discovery marker was transmitted. If the determination at block 420 is false, then control returns to block 420. If the determination at block 420 is true, then control returns to block 410. In this way, the master blade periodically transmits a discovery marker.



FIG. 5 is a flowchart of blade discovery logic, according to an embodiment of the invention. Control begins at block 500. Control then continues to block 500 where blade 112 receives a packet from the packet ring. Control then continues to block 507 where blade 112 determines whether the packet contains any discovery markers. If the determination at block 507 is false, then control continues to block 512 where other types of packets are handled. Control then returns to block 505, as previously described above.


If the determination at block 507 is true, then control continues to block 510 where blade 112 determines whether any of the discovery markers in the packet were sent by the master blade. A blade discovery marker was sent at block 410, as previously described above with reference to FIG. 4.


Referring again to FIG. 5, if the determination at block 510 is true, then control continues to block 515 where blade 112 clears its topology information (242-1, 242-2, or 242-3, depending on the blade) for all known blades. Control then continues to block 520 where blade 112, for each marker in the packet, stores the topology information for the blade associated with the marker.


If the determination at block 510 is false, then control continues directly to block 520, as previously described above.


From block 520, control then continues to block 525 where blade 112 determines whether its own discovery marker is present in the packet. If the determination is false, then control continues to block 530 where blade 112 adds its own discovery marker to the end of the packet, including its own topology information. Control then continues to block 540 where blade 112 sends the packet to the next blade in the ring. Control then returns to block 505, as previously described above.


If the determination at block 525 is true, the control continues to block 535 where blade 112 removes its own discovery marker from the packet. Control then continues to block 530, as previously described above.


In this way all blades in the packet ring see a discovery marker and associated topology information for every other active blade.



FIG. 6 describes discovery marker data structure 600, according to an embodiment of the invention. Discovery marker data structure 600 includes packet ring master field 605, control blade master field 610, blade characteristics field 615, connection state field 620, blade ID field 625, and marker field 630.


Packet ring master field 605 contains an indication of whether the originating blade is the current packet ring token master blade. Control blade master field 610 contains an indication of whether the blade is the control blade master. Blade characteristics field 615 specifies per-blade characteristics, which is information that can be used to distinguish the features of the blade.


Connection state field 620 contains an indication of the blade's current connection state for its primary and protect ring neighbors. Connection state field 620 allows blades to only switch-in a neighboring blade when both blades agree that the connection is good. It also allows a blade that detect a connection fault to notify their neighbor before switching out. This prevents situations where one side of a connection switches while the other side does not, causing a long-term break in the packet ring.


Blade ID field 625 contains a slot identifier for the associated blade. Marker field 630 identifies this marker as a blade discovery marker.

Claims
  • 1. A method comprising: receiving, by a ring controller of a first blade of a plurality of blades participating in a ring network, an indication that an arbitration token originated by an originating blade of the plurality of blades has been received, wherein each blade of the plurality of blades has a priority;comparing, by the ring controller, the priority of the originating blade to the priority of the first blade;when the priority of the originating blade is higher than the priority of the first blade, then transmitting, by the ring controller, the arbitration token to a next blade of the plurality of blades;when the priority of the originating blade is lower than the priority of the first blade, then setting, by the ring controller, the first blade as the originating blade and transmitting the arbitration token to the next blade; andwhen the priority of the originating blade is equal to the priority of the first blade, then assuming, by the ring controller, a role of a token master, wherein the token master is responsible for periodically transmitting a discovery marker onto the ring network, wherein the discovery marker facilitates topology discovery by the plurality of blades.
  • 2. The method of claim 1, further comprising: receiving, by the ring controller, an indication that a token timeout period for receipt of an arbitration token has expired; andresponsive to the indication, transmitting, by the ring controller, a new arbitration token onto the ring network, wherein possession of the arbitration token or the new arbitration token by a blade of the plurality of blades represents permission for the blade to transmit network traffic on the ring network.
  • 3. The method of claim 2, wherein the token timeout period has expired as a result of (i) loss of the arbitration token due to insertion or removal of one of the plurality of blades or (ii) the arbitration token not yet being generated following power-up of a switch of which the plurality of blades are a part.
  • 4. The method of claim 2, further comprising: prior to said comparing, by the ring controller, the priority of the originating blade to the priority of the first blade, determining, by the ring controller, whether a time-to-live (TTL) threshold has been exceeded based on a TTL field contained in the arbitration token; andwhen the TTL threshold has been exceeded, then discarding, by the ring controller, the arbitration token.
  • 5. The method of claim 4, further comprising prior to said transmitting, by the ring controller, the arbitration token to a next blade of the plurality of blades, incrementing, by the ring controller, the TTL field.
  • 6. The method of claim 4, further comprising prior to said transmitting the arbitration token to the next blade, resetting, by the ring controller, the TTL field.
  • 7. The method of claim 1, wherein each blade of the plurality of blades includes an identifier (ID) and wherein the priority of a particular blade of the plurality of blades is represented by the ID of the particular blade.
  • 8. The method of claim 7, wherein the arbitration token contains an originating blade ID field and wherein said setting, by the ring controller, the first blade as the originating blade comprises setting the originating blade ID field to the ID of the first blade.
  • 9. The method of claim 2, wherein the token timeout period is determined based on a maximum blade count, a maximum packet delay, a latency of the ring network and a clock period.
  • 10. The method of claim 9, wherein the token timeout period comprises the maximum blade count*(the maximum packet delay+the latency)*the clock period.
  • 11. A non-transitory computer-readable storage medium embodying a set of instructions, which when executed by a ring controller of a first blade of a plurality of blades participating in a ring network, cause the ring controller to perform a method comprising: receiving an indication that an arbitration token originated by an originating blade of the plurality of blades has been received, wherein each blade of the plurality of blades has a priority;comparing the priority of the originating blade to the priority of the first blade;when the priority of the originating blade is higher than the priority of the first blade, then transmitting the arbitration token to a next blade of the plurality of blades;when the priority of the originating blade is lower than the priority of the first blade, then setting the first blade as the originating blade and transmitting the arbitration token to the next blade; andwhen the priority of the originating blade is equal to the priority of the first blade, then assuming a role of a token master, wherein the token master is responsible for periodically transmitting a discovery marker onto the ring network, wherein the discovery marker facilitates topology discovery by the plurality of blades.
  • 12. The non-transitory computer-readable storage medium of claim 11, wherein the method further comprises: receiving an indication that a token timeout period for receipt of an arbitration token has expired; andresponsive to the indication, transmitting a new arbitration token onto the ring network, wherein possession of the arbitration token or the new arbitration token by a blade of the plurality of blades represents permission for the blade to transmit network traffic on the ring network.
  • 13. The non-transitory computer-readable storage medium of claim 12, wherein the token timeout period has expired as a result of (i) loss of the arbitration token due to insertion or removal of one of the plurality of blades or (ii) the arbitration token not yet being generated following power-up of a switch of which the plurality of blades are a part.
  • 14. The non-transitory computer-readable storage medium of claim 12, wherein the method further comprises: prior to said comparing the priority of the originating blade to the priority of the first blade, determining whether a time-to-live (TTL) threshold has been exceeded based on a TTL field contained in the arbitration token; andwhen the TTL threshold has been exceeded, then discarding the arbitration token.
  • 15. The non-transitory computer-readable storage medium of claim 14, wherein the method further comprises prior to said transmitting the arbitration token to a next blade of the plurality of blades, incrementing the TTL field.
  • 16. The non-transitory computer-readable storage medium of claim 14, wherein the method further comprises prior to said transmitting the arbitration token to the next blade, resetting the TTL field.
  • 17. The non-transitory computer-readable storage medium of claim 11, wherein each blade of the plurality of blades includes an identifier (ID) and wherein the priority of a particular blade of the plurality of blades is represented by the ID of the particular blade.
  • 18. The non-transitory computer-readable storage medium of claim 17, wherein the arbitration token contains an originating blade ID field and wherein said setting the first blade as the originating blade comprises setting the originating blade ID field to the ID of the first blade.
  • 19. The non-transitory computer-readable storage medium of claim 12, wherein the token timeout period is determined based on a maximum blade count, a maximum packet delay, a latency of the ring network and a clock period.
  • 20. The non-transitory computer-readable storage medium of claim 19, wherein the token timeout period comprises the maximum blade count*(the maximum packet delay+the latency)*the clock period.
CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No. 14/828,277, filed Aug. 17, 2015, now U.S. Pat. No. 9,602,303, which is a continuation of U.S. patent application Ser. No. 13/532,771, filed Jun. 25, 2012, now U.S. Pat. No. 9,143,351, which is a continuation of U.S. patent application Ser. No. 12/762,362, filed Apr. 18, 2010, now U.S. Pat. No. 8,208,409, which is a divisional of U.S. patent application Ser. No. 11/460,977, now U.S. Pat. No. 7,890,663, filed on Jul. 29, 2006, which is a divisional of U.S. patent application Ser. No. 09/894,471, now U.S. Pat. No. 7,181,547, filed on Jun. 28, 2001, each of which are hereby incorporated by reference in their entirety for all purposes.

US Referenced Citations (210)
Number Name Date Kind
4590468 Stieglitz May 1986 A
4667287 Allen et al. May 1987 A
4667323 Engdahl et al. May 1987 A
4726018 Bux et al. Feb 1988 A
5473599 Li et al. Dec 1995 A
5490252 Macera et al. Feb 1996 A
5568525 de Nijs et al. Oct 1996 A
5581705 Passint et al. Dec 1996 A
5598414 Walser et al. Jan 1997 A
5633866 Callon May 1997 A
5745778 Alfieri Apr 1998 A
5784648 Duckwall Jul 1998 A
5812819 Rodwin et al. Sep 1998 A
5825772 Dobbins et al. Oct 1998 A
5841973 Kessler et al. Nov 1998 A
5875290 Bartfai et al. Feb 1999 A
5881236 Dickey Mar 1999 A
5892924 Lyon et al. Apr 1999 A
5920702 Lyon et al. Jul 1999 A
5963555 Takase et al. Oct 1999 A
5987521 Arrowood et al. Nov 1999 A
6014382 Takihiro et al. Jan 2000 A
6014669 Slaughter et al. Jan 2000 A
6032193 Sullivan Feb 2000 A
6047330 Stracke Apr 2000 A
6069895 Ayandeh May 2000 A
6081508 West et al. Jun 2000 A
6085238 Yuasa et al. Jul 2000 A
6098110 Witkowski et al. Jul 2000 A
6108699 Moiin Aug 2000 A
6118791 Fichou et al. Sep 2000 A
6137777 Vaid et al. Oct 2000 A
6141349 Ikeda et al. Oct 2000 A
6169739 Isoyama Jan 2001 B1
6169793 Godwin et al. Jan 2001 B1
6175867 Taghadoss Jan 2001 B1
6192051 Lipman Feb 2001 B1
6220768 Barroux Apr 2001 B1
6226788 Schoening et al. May 2001 B1
6243580 Garner Jun 2001 B1
6246682 Roy et al. Jun 2001 B1
6249519 Rangachar Jun 2001 B1
6260072 Rodriguez Jul 2001 B1
6260073 Walker et al. Jul 2001 B1
6266695 Huang et al. Jul 2001 B1
6269099 Borella Jul 2001 B1
6278708 Von Hammerstein et al. Aug 2001 B1
6286038 Reichmeyer et al. Sep 2001 B1
6295297 Lee Sep 2001 B1
6298130 Galvin Oct 2001 B1
6304557 Nakazumi Oct 2001 B1
6330602 Law et al. Dec 2001 B1
6338092 Chao et al. Jan 2002 B1
6405262 Vogel et al. Jun 2002 B1
6414595 Scrandis et al. Jul 2002 B1
6434619 Lim et al. Aug 2002 B1
6438612 Ylonen et al. Aug 2002 B1
6449650 Westfall et al. Sep 2002 B1
6463061 Rekhter et al. Oct 2002 B1
6466976 Alles et al. Oct 2002 B1
6493349 Casey Oct 2002 B1
6526056 Rekhter et al. Feb 2003 B1
6532088 Dantu Mar 2003 B1
6542502 Herring et al. Apr 2003 B1
6549954 Lambrecht et al. Apr 2003 B1
6556544 Lee Apr 2003 B1
6608816 Nichols Aug 2003 B1
6611522 Zheng et al. Aug 2003 B1
6636516 Yamano Oct 2003 B1
6639897 Shiomoto et al. Oct 2003 B1
6658013 de Boer et al. Dec 2003 B1
6697359 George Feb 2004 B1
6697360 Gai et al. Feb 2004 B1
6738371 Ayres May 2004 B1
6769124 Schoening et al. Jul 2004 B1
6775267 Kung Aug 2004 B1
6785224 Uematsu et al. Aug 2004 B2
6820210 Daruwalla et al. Nov 2004 B1
6822958 Branth et al. Nov 2004 B1
6862279 Imai et al. Mar 2005 B1
6868082 Allen et al. Mar 2005 B1
6883170 Garcia Jul 2005 B1
6920146 Johnson et al. Jul 2005 B1
6922774 Meushaw et al. Jul 2005 B2
6938097 Vincent Aug 2005 B1
6944128 Nichols Sep 2005 B2
6944168 Paatela et al. Sep 2005 B2
6954429 Horton et al. Oct 2005 B2
6982987 Cain Jan 2006 B2
6985438 Tschudin Jan 2006 B1
6985956 Luke et al. Jan 2006 B2
7002965 Cheriton Feb 2006 B1
7020143 Zdan Mar 2006 B2
7028333 Tuomenoska et al. Apr 2006 B2
7042848 Santiago et al. May 2006 B2
7062642 Langrind et al. Jun 2006 B1
7082477 Sadhasivam et al. Jul 2006 B1
7089293 Gronser et al. Aug 2006 B2
7096383 Talaugon et al. Aug 2006 B2
7096495 Warrier et al. Aug 2006 B1
7111072 Matthews et al. Sep 2006 B1
7116665 Balay et al. Oct 2006 B2
7117530 Lin Oct 2006 B1
7159031 Larkin et al. Jan 2007 B1
7161904 Hussain et al. Jan 2007 B2
7174372 Sarkar Feb 2007 B1
7177311 Hussain et al. Feb 2007 B1
7181547 Millet Feb 2007 B1
7181766 Bendinelli et al. Feb 2007 B2
7203192 Desai et al. Apr 2007 B2
7263106 Matthews et al. Apr 2007 B2
7225259 Ho et al. May 2007 B2
7266120 Cheng et al. Sep 2007 B2
7272643 Sarkar et al. Sep 2007 B1
7278055 Talugon et al. Oct 2007 B2
7313614 Considine et al. Dec 2007 B2
7337221 Radi et al. Feb 2008 B2
7340535 Alam Mar 2008 B1
7376125 Hussain et al. May 2008 B1
7376827 Jiao May 2008 B1
7386010 Solomon et al. Jun 2008 B2
7389358 Matthews Jun 2008 B1
7499419 Balay et al. Mar 2009 B2
7522604 Hussain et al. Apr 2009 B2
7580373 Millet Aug 2009 B2
7668087 Hussain et al. Feb 2010 B2
7720053 Hussain et al. May 2010 B2
7881244 Balay et al. Feb 2011 B2
7890663 Millet Feb 2011 B2
7933269 Cheng et al. Apr 2011 B2
8208409 Millet Jun 2012 B2
8213347 Balay et al. Jul 2012 B2
8369258 Balay et al. Feb 2013 B2
8953513 Balay et al. Feb 2015 B2
9124555 Sun et al. Sep 2015 B2
9143351 Millet Sep 2015 B2
9160716 Sun et al. Oct 2015 B2
9185050 Desai et al. Nov 2015 B2
9331961 Desai et al. May 2016 B2
9509638 Desai et al. Nov 2016 B2
9602303 Millet Mar 2017 B2
20010043571 Jang et al. Nov 2001 A1
20010048661 Clear et al. Dec 2001 A1
20010052013 Munguia et al. Dec 2001 A1
20020062344 Ylonen et al. May 2002 A1
20020066034 Schlossberg et al. May 2002 A1
20020075901 Perlmutter et al. Jun 2002 A1
20020097872 Barbas et al. Jul 2002 A1
20020099849 Alfieri et al. Jul 2002 A1
20020116529 Hayden Aug 2002 A1
20020145981 Klinker et al. Oct 2002 A1
20020152373 Sun Oct 2002 A1
20020186661 Santiago et al. Dec 2002 A1
20020186667 Mor et al. Dec 2002 A1
20020191604 Mitchell et al. Dec 2002 A1
20030033401 Poisson et al. Feb 2003 A1
20030063348 Posey Apr 2003 A1
20030081559 Matuoka May 2003 A1
20030091021 Trossen et al. May 2003 A1
20030093557 Giraud et al. May 2003 A1
20030108041 Aysan Jun 2003 A1
20030115308 Best et al. Jun 2003 A1
20030117954 De Neve et al. Jun 2003 A1
20030120806 Clune et al. Jun 2003 A1
20030131228 Tworney Jul 2003 A1
20030169747 Wang Sep 2003 A1
20030185221 Deikman et al. Oct 2003 A1
20030200295 Roberts et al. Oct 2003 A1
20030212735 Hicok et al. Nov 2003 A1
20030223361 Hussain et al. Dec 2003 A1
20030223406 Balay Dec 2003 A1
20040006601 Bernstein et al. Jan 2004 A1
20040037279 Zelig Feb 2004 A1
20040042416 Ngo et al. Mar 2004 A1
20040078772 Balay Apr 2004 A1
20040095934 Cheng et al. May 2004 A1
20040141521 George Jul 2004 A1
20050047407 Desai Mar 2005 A1
20050083927 Lien et al. Apr 2005 A1
20050147095 Guerrero et al. Jul 2005 A1
20050163115 Dontu et al. Jul 2005 A1
20060087969 Santiago et al. Apr 2006 A1
20060265519 Millet Nov 2006 A1
20070058648 Millet Mar 2007 A1
20070064704 Balay Mar 2007 A1
20070073733 Matthews Mar 2007 A1
20070083528 Matthews et al. Apr 2007 A1
20070104119 Sarkar May 2007 A1
20070109968 Hussain May 2007 A1
20070110062 Balay et al. May 2007 A1
20070115979 Balay May 2007 A1
20070121579 Matthews May 2007 A1
20070127382 Hussain Jun 2007 A1
20070147368 Desai Jun 2007 A1
20070291755 Cheng et al. Sep 2007 A1
20080013470 Kopplin Jan 2008 A1
20080016389 Talugon Jan 2008 A1
20090225754 Balay et al. Sep 2009 A1
20100142527 Balay et al. Jun 2010 A1
20100189016 Millet Jul 2010 A1
20110122872 Balay et al. May 2011 A1
20130022049 Millet Jan 2013 A1
20130156033 Balay et al. Jun 2013 A1
20150019859 Sun et al. Jan 2015 A1
20150095636 Sun et al. Apr 2015 A1
20150195098 Cheng et al. Jul 2015 A1
20150358210 Millet Dec 2015 A1
20160142384 Sun May 2016 A1
20160308788 Desai et al. Oct 2016 A1
20170195289 Sun et al. Jul 2017 A1
Foreign Referenced Citations (5)
Number Date Country
0051290 Aug 2000 WO
0076152 Dec 2000 WO
0163809 Aug 2001 WO
0223855 Mar 2002 WO
0310323 Dec 2003 WO
Non-Patent Literature Citations (120)
Entry
Notice of Allowance for U.S. Appl. No. 14/178,215 dated Jul. 15, 2015.
Non-Final Rejection for U.S. Appl. No. 14/714,270 dated Jul. 29, 2015.
Notice of Allowance for U.S. Appl. No. 12/762,362 dated May 22, 2012.
Non-Final Rejection for U.S. Appl. No. 12/762,362 dated Feb. 2, 2012.
Notice of Allowance for U.S. Appl. No. 11/460,977 dated Dec. 27, 2010.
Non-Final Rejection for U.S. Appl. No. 11/460,977 dated Jul. 2, 2010.
Restriction Requirement for U.S. Appl. No. 11/460,977 dated Mar. 5, 2010.
Notice of Allowance for U.S. Appl. No. 13/532,771 dated Aug. 17, 2015.
Non-Final Rejection for U.S. Appl. No. 14/866,898 dated Dec. 4, 2015.
Notice of Allowance for U.S. Appl. No. 14/543,797 dated Sep. 1, 2015.
Non-Final Rejection for U.S. Appl. No. 11/556,159 dated Jan. 22, 2009.
Notice of Allowance for U.S. Appl. No. 11/556,159 dated Jul. 9, 2009.
Non-Final Rejection for U.S. Appl. No. 14/633,981 dated Feb. 11, 2016.
Notice of Allowance for U.S. Appl. No. 15/008,270 dated May 18, 2016.
Non-Final Rejection for U.S. Appl. No. 15/184,897 dated Sep. 29, 2016.
Notice of Allowance for U.S. Appl. No. 15/071,995 dated Oct. 24, 2016.
Notice of Allowance for U.S. Appl. No. 14/828,277 dated Dec. 14, 2016.
Non-Final Rejection for U.S. Appl. No. 14/828,277 dated Jul. 19, 2016.
Non-Final Rejection for U.S. Appl. No. 15/469,094 dated Jun. 14, 2017.
Office Action dated Nov. 5, 2003 for U.S. Appl. No. 09/661,130.
Notice of Allowance dated Jun. 14, 2007 for U.S. Appl. No. 10/067,106.
Office Action dated Nov. 16, 2006 for U.S. Appl. No. 10/067,106.
Office Action dated Jun. 3, 2004 for U.S. Appl. No. 09/663,483.
Office Action dated Aug. 21, 2003 for U.S. Appl. No. 09/663,483.
Office Action dated May 5, 2004 for U.S. Appl. No. 09/661,637.
Notice of Allowance dated Jul. 30, 2007 for U.S. Appl. No. 09/663,485.
Office Action dated Jan. 11, 2007 for U.S. Appl. No. 09/663,485.
Office Action dated Dec. 21, 2004 for U.S. Appl. No. 09/663,485.
Office Action dated May 14, 2004 for U.S. Appl. No. 09/663,485.
Office Action dated Sep. 8, 2003 for U.S. Appl. No. 09/663,485.
Lawrence, J. Lang et al.“Connecting Remote FDDI Installations with Single-Mode Fiber, Dedicated Lines, or SMDS.” Jul. 1990; ACM SIGCOMM Computer Communication Review. vol. 20, Issue 3; pp. 72-82.
IEEE Potentials Publication; “Local Area Networks” Dec. 1995/Jan. 1996; pp. 6. http://www.ece.uc.edu/-paw/potentials/sample.
Office Action dated Oct. 18, 2007 for U.S. Appl. No. 09/663,483.
Office Action dated Oct. 16, 2007 for U.S. Appl. No. 09/661,130.
Office Action dated Nov. 28, 2007 for U.S. Appl. No. 09/952,520.
Notice of Allowance dated Dec. 1, 2004 for U.S. Appl. No. 09/661,636.
Office Action dated May 28, 2004 for U.S. Appl. No. 09/661,636.
Office Action dated Nov. 18, 2003 U.S. Appl. No. 09/661,636.
Office Action dated Dec. 28, 2006 for U.S. Appl. No. 09/661,130.
Office Action dated Oct. 18, 2004 for U.S. Appl. No. 09/661,130.
Office Action dated Oct. 26, 2006 for U.S. Appl. No. 09/894,471.
Office Action dated Dec. 14, 2004 for U.S. Appl. No. 09/894,471.
Notice of Allowance dated Nov. 7, 2006 for U.S. Appl. No. 09/771,346.
Office Action dated Jul. 18, 2006 for U.S. Appl. No. 09/771,346.
Office Action dated Jan. 25, 2005 for U.S. Appl. No. 09/771,346.
Office Action dated Mar. 26, 2004 for U.S. Appl. No. 09/771,346.
Notice of Allowance dated Nov. 19, 2006 for U.S. Appl. No. 10/163,162.
Office Action dated May 5, 2006 for U.S. Appl. No. 10/163,162.
Notice of Allowance dated Jan. 4, 2007 for U.S. Appl. No. 10/163,261.
Office Action dated Nov. 3, 2006 for U.S. Appl. No. 10/163,261.
Office Action dated Nov. 7, 2006 for U.S. Appl. No. 10/163,071.
Office Action dated Aug. 8, 2007 for U.S. Appl. No. 09/663,457.
Office Action dated May 17, 2007 for U.S. Appl. No. 09/663,457.
Office Action dated Apr. 22, 2005 for U.S. Appl. No. 09/663,457.
Office Action dated Aug. 27, 2004 for U.S. Appl. No. 09/663,457.
Office Action dated Dec. 11, 2003 for U.S. Appl. No. 09/663,457.
Notice of Allowance dated Nov. 21, 2006 for U.S. Appl. No. 09/663,484.
Office Action dated Feb. 24, 2006 for U.S. Appl. No. 09/663,484.
Office Action dated Apr. 6, 2005 for U.S. Appl. No. 09/663,484.
Office Action dated May 6, 2004 for U.S. Appl. No. 09/663,484.
Office Action dated Aug. 12, 2003 for U.S. Appl. No. 09/663,484.
Notice of Allowance dated Jan. 4, 2007 for U.S. Appl. No. 09/894,471.
Office Action dated Jun. 1, 2006 for U.S. Appl. No. 10/163,071.
Office Action dated Dec. 2, 2005 for U.S. Appl. No. 10/163,071.
Notice of Allowance dated Nov. 29, 2006 for U.S. Appl. No. 10/163,079.
Office Action dated Oct. 27, 2006 for U.S. Appl. No. 10/163,079.
Office Action dated May 17, 2006 for U.S. Appl. No. 10/163,079.
Notice of Allowance dated Jul. 17, 2007 for U.S. Appl. No. 10/298,815.
Office Action dated Feb. 23, 2007 for U.S. Appl. No. 10/298,815.
Notice of Allowance dated Jun. 27, 2005 for U.S. Appl. No. 10/232,979.
Notice of Allowance dated Jul. 5, 2007 for U.S. Appl. No. 11/466,098.
Office Action dated May 22, 2006 for U.S. Appl. No. 10/163,261.
Notice of Allowance dated Jul. 27, 2006 for U.S. Appl. No. 10/163,073.
Office Action dated May 30, 2007 for U.S. Appl. No. 10/273,669.
Office Action dated Sep. 21, 2006 for U.S. Appl. No. 10/273,669.
Office Action dated Feb. 21, 2006 for U.S. Appl. No. 10/273,669.
Notice of Allowance dated Aug. 14, 2007 for U.S. Appl. No. 10/163,071.
Office Action dated Jul. 3, 2007 for U.S. Appl. No. 10/163,071.
Office Action dated Aug. 1, 2007 for U.S. Appl. No. 10/163,260.
Office Action dated Apr. 13, 2007 for U.S. Appl. No. 10/163,260.
Office Action dated Dec. 21, 2006 for U.S. Appl. No. 10/163,260.
Office Action dated May 18, 2006 for U.S. Appl. No. 10/163,260.
Office Action dated Sep. 11, 2007 for U.S. Appl. No. 09/661,637.
Office Action dated Feb. 8, 2007 for U.S. Appl. No. 09/661,637.
Office Action dated Dec. 23, 2004 for U.S. Appl. No. 09/661,637.
Non-Final Office Action for U.S. Appl. No. 09/952,520, dated May 30, 2008.
Fowler, D., “VPNs Become a Virtual Reality.” Netnews, Apr./May 1998. pp. 1-4.
Non-Final Office Action for U.S. Appl. No. 11/556,697, dated Jul. 9, 2008.
Non-Final Office Action for U.S. Appl. No. 09/663,457, dated Jul. 15, 2008.
Restriction Requirement for U.S. Appl. No. 10/991,970, dated Jul. 15, 2008.
Final Office Action for U.S. Appl. No. 10/650,298, dated Sep. 3, 2008.
Final Office Action for U.S. Appl. No. 10/991,969, dated Sep. 22, 2008.
Chan, Mun C. et al., “An architecture for broadband virtual networks under customer control.” IEEE Network Operations and Management Symposium. Apr. 1996. pp. 135-144.
Chan, Mun C. et al “Customer Management and Control of Broadband VPN Services.” Proc. Fifth IFIP/IEEE International Symposium of Integrated Network Management. May 1997. pp. 301-314.
Gasparro, D.M., “Next-Gen VPNs: The Design Challenge.” Data Communications. Sep. 1999. pp. 83-95.
Hanaki, M. et al., “LAN/WAN management integration using ATM CNM interface.” IEEE Network Operations Management Symposium, vol. 1. Apr. 1996. pp. 12-21.
Kapustka, S., “CoSine Communications Move VPNs ‘Into the Cloud’ with the Leading Managed IP Service Delivery Platform.” http://wwwcosinecom.com/news/pr_5_24.html. Press Release, CoSine Communications. 1995. p. 5.
Keshav, S., “An Engineering Approach to Computer Networking: ATM networks, the internet, and the telephone network.” Reading Mass: Addison-Wesley, Addison-Wesley Professional Computing Series. 1992. pp. 318-324.
Kim, E.C. et al., “The Multi-Layer VPN Management Architecture.” Proc. Sixth IFIP/IEEE International Symposium on Integrated Network Management. May 1999. pp. 187-200.
Rao, J.R., Intranets and VPNs: Strategic Approach. 1988 Annual Review of Communications. 1998. pp. 669-674.
Tanenbaum, A.S., “Computer Networks.” Upper Saddle River, N.J.: Prentice Hall PTR, 3rd Edition. 1996. pp. 348-364.
European Search Report for PCT/US03/37009 (dated Jul. 4, 2004) 2 pgs.
International Search Report for PCTUS03/17674. 6 pgs.
Notice of Allowance for U.S. Appl. No. 12/328,858 dated May 25, 2012.
Final Office Action for U.S. Appl. No. 12/328,858, dated Dec. 6, 2011.
Non-Final Office Action for U.S. Appl. No. 12/328,858, dated Apr. 15, 2011.
Notice of Allowance for U.S. Appl. No. 10/949,943 dated Jan. 9, 2009.
Non-Final Rejection for U.S. Appl. No. 10/949,943 dated Feb. 14, 2008.
Notice of Allowance for U.S. Appl. No. 12/467,304 dated Dec. 13, 2010.
Non-Final Rejection for U.S. Appl. No. 12/467,304 dated Oct. 18, 2010.
Tsiang et al. “RFC 2892, The Cisco SRP MAC Layer Protocol.” Aug. 2000, pp. 1-52.
Zhang et al. “Token Ring Arbitration Circuits for Dynamic Priority Algorithms” IEEE, 1995, pp. 74-77.
Notice of Allowance for U.S. Appl. No. 13/015,880 dated Dec. 5, 2012.
Non-Final Rejection for for U.S. Appl. No. 13/015,880 dated Oct. 2, 2012.
Notice of Allowance for U.S. Appl. No. 13/756,071 dated Jun. 30, 2014.
Non-Final Rejection for U.S. Appl. No. 13/756,071 dated Jun. 6, 2014.
Non-Final Rejection for U.S. Appl. No. 13/532,771 dated Jan. 29, 2015.
Notice of Allowance for U.S. Appl. No. 15/469,094 dated Sep. 21, 2017.
Notice of Allowance for U.S. Appl. No. 15/192,115 dated Sep. 25, 2017.
Non-Final Rejection for U.S. Appl. No. 15/071,097 dated Sep. 27, 2017.
Related Publications (1)
Number Date Country
20170104638 A1 Apr 2017 US
Divisions (1)
Number Date Country
Parent 09894471 Jun 2001 US
Child 11460977 US
Continuations (3)
Number Date Country
Parent 14828277 Aug 2015 US
Child 15385492 US
Parent 13532771 Jun 2012 US
Child 14828277 US
Parent 12762362 Apr 2010 US
Child 13532771 US
Continuation in Parts (1)
Number Date Country
Parent 11460977 Jul 2006 US
Child 12762362 US