WO2010068237A2 - Deterministic session load-balancing and redundancy of access servers in a computer network - Google Patents

Deterministic session load-balancing and redundancy of access servers in a computer network Download PDF

Info

Publication number
WO2010068237A2
WO2010068237A2 PCT/US2009/006168 US2009006168W WO2010068237A2 WO 2010068237 A2 WO2010068237 A2 WO 2010068237A2 US 2009006168 W US2009006168 W US 2009006168W WO 2010068237 A2 WO2010068237 A2 WO 2010068237A2
Authority
WO
WIPO (PCT)
Prior art keywords
access
port
session initiation
node
initiation message
Prior art date
Application number
PCT/US2009/006168
Other languages
French (fr)
Other versions
WO2010068237A3 (en
Inventor
Wojciech Dec
William Townsley
Francois Le Faucheur
Original Assignee
Cisco Technology, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cisco Technology, Inc. filed Critical Cisco Technology, Inc.
Priority to EP09774993.1A priority Critical patent/EP2351330B1/en
Priority to CN200980125667.1A priority patent/CN102084638B/en
Publication of WO2010068237A2 publication Critical patent/WO2010068237A2/en
Publication of WO2010068237A3 publication Critical patent/WO2010068237A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0806Configuration setting for initial configuration or provisioning, e.g. plug-and-play
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1027Persistence of sessions during load balancing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network

Definitions

  • the present disclosure relates generally to computer networks, and, more particularly, to access technologies featuring access devices (e.g., multiplexing access nodes and access servers), for example, digital subscriber lines (DSL).
  • access devices e.g., multiplexing access nodes and access servers
  • DSL digital subscriber lines
  • a user/client is generally allowed to open multiple sessions/connections on port of access device.
  • various networks use multiple/redundant access servers, such as Network Access Servers (NAS) or Broadband Remote Access Servers (BRAS), in order to provide a redundant pair of IP (Internet Protocol) termination points.
  • NAS Network Access Servers
  • BRAS Broadband Remote Access Servers
  • a user is often connected to each of these multiple access servers via an access node, such as a DSL Access Multi- plexer (DSLAM).
  • DSL Access Multi- plexer DSL Access Multi- plexer
  • a user may establish a first session (e.g., a point-to-point protocol over Ethernet or "PPPoE" session from one device in a subscriber's home) on a first access server, while a second session from the same user (e.g., another PPPoE session from another device is the same subscriber home) may be established on a second access server.
  • a first session e.g., a point-to-point protocol over Ethernet or "PPPoE" session from one device in a subscriber's home
  • a second session from the same user e.g., another PPPoE session from another device is the same subscriber home
  • redundant servers may provide load- balancing features in this manner, they do not allow for easily coordinating these split resources, such that any subscriber agreements/policies (e.g., only a single video on demand session allowed from a particular user) are generally difficult to enforce.
  • Fig. 1 illustrates an example computer network
  • Fig. 2 illustrates an example access node
  • Fig. 3 illustrates an example access server
  • Fig. 4 illustrates an example session initiation message
  • Fig. 5 illustrates an example procedure for deterministic session load balancing and redundancy
  • Fig. 6 illustrates an example procedure for ensuring preferred access server response in accordance with one or more embodiments
  • Fig. 7 illustrates an example procedure for an alternative embodiment of configuring a preferred access server port.
  • one access server of a plurality of access servers is configured as a preferred access server for that port.
  • the access node Upon receiving a session initiation message at a particular port, the access node forwards the session initiation message to one or more of the access servers based on the configured preferred access server for the particular port.
  • the preferred access server may be con- figured on the access server or on the access node, and the message may be modified by the access node to include an indication (e.g., port ID or preferred access server indicator) or to be unicast to the preferred access server, only.
  • a computer network is a geographically distributed collection of nodes intercon- nected by communication links and segments for transporting data between end nodes, such as personal computers and workstations.
  • Many types of networks are available, with the types ranging from local area networks (LANs) to wide area networks (WANs).
  • LANs typically connect the nodes over dedicated private communications links located in the same general physical location, such as a building or campus.
  • WANs typically connect geographically dispersed nodes over long-distance communications links, such as common carrier telephone lines, optical lightpaths, synchronous optical networks (SONET), or synchronous digital hierarchy (SDH) links.
  • SONET synchronous optical networks
  • SDH synchronous digital hierarchy
  • the nodes typically commu- nicate over the network by exchanging discrete frames or packets of data according to predefined protocols, such as the Transmission Control Protocol/Internet Protocol (TCP/IP).
  • TCP/IP Transmission Control Protocol/Internet Protocol
  • a protocol consists of a set of rules defining how the nodes interact with each other.
  • Fig. 1 is a schematic block diagram of an example computer network 100 illustra- tively comprising nodes/devices, such as one or more clients devices 105 interconnected with a WAN 110 (e.g., the Internet) via an access node and two or more access servers interconnected by links as shown.
  • a portion of the network 100 is an access-based computer network, such as a digital subscriber line (DSL) network comprising clients 105, the access node (e.g., a DSL Access Multiplexer, or "DSLAM”), and the two or more access servers (e.g., Broadband Remote Access Servers, or "BRAS”), as may be appreciated by those skilled in the art.
  • DSL digital subscriber line
  • DSL DSL Access Multiplexer
  • BRAS Broadband Remote Access Servers
  • network access devices may be any type of access or aggregation device that may be used in a similar manner (e.g., Ethernet switches, Network Access Servers or "NAS,” etc.), and client devices 105 may be subscriber devices, e.g., home devices or customer premise equipment (CPE), such as a set-top-box, a cable mo- dem, a personal computer (PC), etc.
  • CPE customer premise equipment
  • any number of nodes, devices, links, etc. may be used in the computer network, and that the view shown herein is for simplicity.
  • Data packets may be exchanged among the devices of the computer network 100 using predefined network communication protocols such as the Transmission Control Protocol/Internet Protocol (TCP/IP), User Datagram Protocol (UDP), Asynchronous Transfer Mode (ATM) protocol, Frame Relay protocol, Internet Packet Exchange (IPX) protocol, etc.
  • TCP/IP Transmission Control Protocol/Internet Protocol
  • UDP User Datagram Protocol
  • ATM Asynchronous Transfer Mode
  • IPX Internet Packet Exchange
  • the links connecting the subscriber/client devices 105 to the network access device (DSLAM) of a service provider network may utilize, e.g., DSL technology, Cable modems, etc., while the links within the provider network (e.g., DSLAM to BRAS) may be ATM, Ethernet, etc., as will be understood by those skilled in the art.
  • unicast data transfer involves forwarding a data packet from a single sending process of an end node ("source") to a single receiving process of an end node (“receiver”) on the computer network.
  • source a sending process of an end node
  • receiver a single receiving process of an end node
  • multicast a multicast data transfer
  • a “broadcast” data transfer i.e., broadcast forwarding or “broadcasting” is where the destination of the data packet issued by a source is all of the receivers on the network (e.g., to a certain end point, such as a domain edge or a particular type of receiver, e.g., DSLAM to a plurality of BRAS, as described herein).
  • Fig. 2 is a schematic block diagram of an example node/device 200 that may be advantageously used with one or more embodiments described herein, e.g., as an access node (e.g., DSLAM).
  • the access node comprises a plurality of network interfaces (or "ports") 210, one or more processors 220, and a memory 240 interconnected by a system bus 250.
  • the network interfaces/ports 210 contain the mechanical, electrical, and signaling circuitry for communicating data over physical links coupled to the network 100.
  • the network interfaces may be configured to transmit and/or receive data using a variety of different communication protocols, including, inter alia, TCP/IP, UDP, ATM, syn- chronous optical networks (SONET), wireless protocols, Frame Relay, Ethernet, Fiber Distributed Data Interface (FDDI), etc.
  • a physical network interface 210 may also be used to implement one or more virtual network interfaces, such as for Virtual Private Network (VPN) access, known to those skilled in the art.
  • the memory 240 comprises a plurality of storage locations that are addressable by the processor(s) 220 and the network interfaces/ports 210 for storing software programs and data structures associated with the embodiments described herein.
  • the processor(s) 220 may comprise necessary elements or logic adapted to execute the software programs and manipulate the data structures, such as a configuration table 246 as described herein.
  • An operating system 242 e.g., the Internetworking Operating System, or IOSTM, of Cisco Systems, Inc.
  • IOSTM Internetworking Operating System
  • portions of which are typically resident in memory 240 and executed by the processor(s) functionally organizes the access node by, inter alia, invoking network operations in support of software processes and/or services executing on the device.
  • These software processes and/or services may comprise "access node” process/services 244 and a timer process 248, each as described in further detail below. It will be apparent to those skilled in the art that other types of processors and memory, including various computer-readable media, may be used to store and execute program instructions pertaining to the inventive technique described herein.
  • Fig. 3 is a schematic block diagram of an example node/device 300 that may be advantageously used with one or more embodiments described herein, e.g., as an access server (e.g., BRAS).
  • the access server comprises a plurality of network interfaces (or "ports") 310, one or more processors 320, and a memory 340 interconnected by a system bus 350.
  • the memory 340 comprises a plurality of storage locations that are addressable by the processor(s) 320 and the network interfaces/ports 310 for storing soft- ware programs and data structures associated with the embodiments described herein, such as a configuration table 346 as described herein.
  • An operating system 342 e.g., the Internetworking Operating System, or IOSTM, of Cisco Systems, Inc.
  • IOSTM Internetworking Operating System
  • portions of which are typically resident in memory 340 and executed by the processor(s) functionally organizes the access node by, inter alia, invoking network operations in support of software processes and/or services executing on the device.
  • These software processes and/or ser- vices may comprise "access server" process/services 344 as described in further detail below.
  • the access node 200 e.g., DSLAM
  • access servers 300 e.g., BRASes
  • access node process/services 244 and access server process/services 344 may each contain computer executable instructions executed by respective processors 220/320 to perform functions related to corresponding access technologies.
  • such processes may comprise conventional operation according to access nodes (e.g., DSLAMs) and access servers (e.g., BRASes) as will be understood by those skilled in the art, in addition to those features as described herein with reference to one or more embodiments of the disclosure.
  • a typical access technology session may be initiated by a client/subscriber request ("session initiation message") 400 being broadcast via an access node to all interconnected access servers.
  • the access node transmits the messages 400a,b to the access servers, which respond to the client.
  • the first server to respond to the client is selected for the session, and any subsequent data of that session is sent to that one server (or "controller").
  • Access node process 244 and access server process 344 may thus execute functions relating to this procedure, in addition to other functions as will be understand and as will be described further herein.
  • BRASes point-to-point protocol over Ethernet
  • IPoE IP over Ethernet
  • BRASes access servers
  • shared segment shared segment
  • two access servers may be located on a shared segment, e.g., a VLAN, that is used to connect one or more access nodes, with each access node having multiple subscriber ports feeding traffic into that VLAN.
  • a user e.g., client device 105
  • a session initiation message e.g., a PPPoE "PADI” or IPoE "DHCP” message, as will be under- stood
  • PADI PPPoE
  • DHCP IPoE
  • Each access server responds with a session reply message (e.g., a "PADO" message or DHCP reply message), and the current client protocol implementation makes the client select the access server whose reply is the first to arrive as the access server with which the client will attempt to establish a session/connection (e.g., by sending a "PADR,” etc., as will also be understood).
  • a session reply message e.g., a "PADO" message or DHCP reply message
  • While this feature does offer a manner in which load-balancing (e.g., PPP load balancing) may be performed, it also introduces a problem of enforcing an access-line policy across the two sessions on two separate access servers.
  • load-balancing e.g., PPP load balancing
  • access- line policies may include, e.g., per access-line scheduling/shaping and per access line admission control, each of which are very common operator requirements for a particular network.
  • CAC per access node uplink call admission control
  • one access server e.g., BRAS
  • BRAS BRAS
  • the access node Upon receiving a session initiation message 400 at a particular port, the access node forwards the session initiation message to one or more of the access servers based on the configured preferred access server for the particular port.
  • the preferred access server may be configured on the access server or on the access node, and the message may be modified by the access node to include an indication (e.g., port ID or preferred access server indicator) or to be unicast to the preferred access server, only.
  • the techniques described herein may be performed by hardware, software, and/or firmware, such as in accordance with a general "access node” or “access server” processes/services 244/344, depending upon which device is performing the particular action.
  • These processes and/or services may be configured to operate in accordance with certain protocols, and in accordance with the techniques described herein.
  • these processes may be configured to perform any one (or more) of three mechanisms targeted at specific problems identified within a corresponding network in which the access device is located.
  • each mechanism solves the same problem in a slightly different way, but each, at its core, is directed to the same general technique mentioned above (and throughout).
  • the first mechanism requires only control- plane level changes, utilizing modified/additional features of an access node control pro- tocol operating between the access node and the access server (e.g., ANCP).
  • the second requires additional information to be inserted by an access node (e.g., DSLAM) snooping control packets/frames (e.g., PPPoE or DHCP packets), and can operate in networks whether or not an access node control protocol (such as ANCP) is implemented.
  • the third mechanism requires data-plane changes to the access node, but is transparent to the access servers (e.g., BRASes).
  • ports 210 on an access node may be directly provisioned (configured) to prefer a given access server.
  • any partition e.g., physical or virtual
  • any partition e.g., physical or virtual
  • a preferred access server for that partition e.g., with granularity anywhere between a single port-basis to entire access node-basis.
  • illustrative ports 1-100 of an access node may be configured to have BRASl as a preferred access server, while ports 101-200 of that access node may be configured to prefer BRAS2, etc.
  • all ports on a given access node may all be provisioned to prefer a given access server, e.g., ports 1-200 of DSLAMl (not shown) are configured to prefer BRASl, ports 1-200 of DSLAM2 a configured to prefer BRAS2, etc.
  • this information is generally configured by a provisioning system on the access node, and in certain embodiments may be transferred to the access servers.
  • an access node control protocol e.g., ANCP
  • an access server e.g., BRAS
  • BRAS access server
  • IETF Internet Engineering Task Force
  • the protocol currently allows for access servers to exchange information regarding an "active/backup server" controller setup, where each access server knows its respective status.
  • ANCP also has a quick failure detection of the ANCP adjacency, allowing a rapid switch to the backup controller in the event of an active server failure.
  • active-active setup the access node (e.g., DSLAM) is provisioned with ports
  • This information may be communicated via ANCP with extensions to the ANCP protocol, such that the access node "informs" the access servers of the preferred access server for each of its ports (thus, the access servers are configured to know the port identifica- tions (IDs) to which they are or are not the preferred access server).
  • this information may be stored (e.g., preconfigured before sessions are established) on the access node within configuration table 246, and on the access servers within configuration table 346.
  • a session initiation message (e.g., for PPPoE or DHCP) to es- tablish/originate a session
  • the message is "snooped" by the access node via current standard operation as will be understood by those skilled in the art.
  • Fig. 4 illustrates an example session initiation message 400, such as, e.g., a PADI or DHCP DISCOVER message, shown simplified for purpose of discussion herein as may be appreciated by those skilled in the art.
  • message 400 may comprise one or more headers 410 and a payload 420 to carry the information necessary for the requested session.
  • Header information 410 generally comprises various message type fields, address fields, etc., and according to one or more embodiments herein, an "inserted indicator" field 415. (Notably, while field 415 is shown within headers 410, other suitable placements may be made within the scope of the embodiments herein, e.g., within payload 420.)
  • an access node By snooping this message, an access node is able to monitor at least the header information to determine the type of message, its source and destination addresses, etc.
  • the access node may also insert port (or "line”) information into the message 400 (in field 415) that indicates the port ID of the port having received the mes- sage (i.e., the port on which the session would be established).
  • the access node then forwards the message 400 to the access servers, which receive the message having the inserted port information, i.e., the port ID. Based on this port ID, together with the information previously communicated via ANCP (the configured preferred access servers for each port), each access server can make a decision as to whether the message should be responded to or not. For instance, an access server may respond to the session initiation message if that access server is identified (or configured) as the preferred access server for the port ID in the session initiation message, or the access server may discard the message if it is not configured as the preferred access server.
  • each access server can make a decision as to how fast/slow to re- spond to the message. For example, instead of strictly responding or not responding, the access servers may respond without delay or with delay, depending on their status as a preferred access server for the port ID, such that the preferred access server will (most likely) respond first, thus being selected by the client for the session, accordingly. Notably, delaying the response (as opposed to discarding the message) is not as deterministic as the response/no response mechanism above.
  • the secondary access server will generally provide predictable behavior in most cases, and automatic failover in the event one access server fails (i.e., the delayed response will in effect become the first response received by the client if it is the only response). Also, prior to reconfiguration in the event of a failure, the user/client will timeout the session and send a new session initiation message 400, which again will result in the non- preferred access server being the first to respond (though delayed).
  • the first response e.g., PADO or DHCP OFFER
  • ANCP may be used to set up the control plane of the access servers, and then the data plane (access node's use of message 400) uses this setup to convey to the control plane which access node port the control plane traffic relates to, so that the access server can determine the preferred access server from the access node port.
  • ANCP provides an adjacency between the access node (e.g., DSLAM) and access server (e.g., BRAS) that is utilized to actively update the access servers with new port configurations, e.g., in general and/or in the event that one access server fails or otherwise becomes unavailable.
  • DSLAM access node
  • BRAS access server
  • This embodiment therefore, expands the notion of "active/standby" access server status by configuring the "status" on the access node (e.g., DSLAM) on a per-port basis, and distributing this information to the access servers for use accordingly.
  • a second embodiment described herein does not need ANCP to be present be- tween the access node and access servers, but changes the session protocols (e.g., PPPoE and DHCP) as well as the snooping function at the access node.
  • the preferred access servers for each port are configured on the access node, but this configuration is not transferred to the access servers. Instead, the access servers are configured to read "hints" within the session initiation messages 400.
  • the access node snoops the session initiation messages, and inserts (into field 415) a preference marker/indication of the preferred access server for the port on which the message was received at the access node.
  • This indication may be an access server ID/name, a preference number, etc.
  • the access servers may then receive the updated message 400, and interpret the indication to determine whether it is the preferred access server for the session. For instance, to respond to the session initiation message based on the indication, an access server may decide to respond without delay if it is the indicated preferred access server, or with a delay if it is not the preferred access server. (Note that in the event there is no indication present, the access servers may operate in a conventional manner, thus allowing for backward com- patibility.) Again, the delayed response is not completely deterministic, but does provide a predictable behavior under most circumstances, as well as desirable failover characteristics.
  • a third embodiment described herein does not need to change the session establishment protocols (e.g., DHCP or PPPoE), and is transparent to the access servers (e.g., BRAS). However, this embodiment has significant impact on the dataplane of the access node (e.g., DSLAM). Similar to the embodiments above, the preferred access servers for each port are configured on the access node. According to this embodiment, though, the access node intercepts a broadcast session initiation message 400 (e.g., PADI and DISCOVER messages), and forwards it to only the preferred access server based on the particular port on which the message 400 was received.
  • a broadcast session initiation message 400 e.g., PADI and DISCOVER messages
  • the access node transforms the broadcast (or multicast) messages into unicast messages to the preferred access server (e.g., either via configured MAC address, previously discovered access node MAC address, configured IP address in the case of DHCP, or by sending the message over a separate VLAN dedicated to a given access server, etc.).
  • the preferred access server e.g., either via configured MAC address, previously discovered access node MAC address, configured IP address in the case of DHCP, or by sending the message over a separate VLAN dedicated to a given access server, etc.
  • the access servers receive session initiation mes- sages 400 (PPPoE or DHCP messages) for ports only as dictated by the access node (e.g., DSLAM). Accordingly, there need not be any inserted indications (field 415) within the messages 400, since by only sending the message to a single preferred access server, the access server receiving the message is the preferred access server, and thus is the only access server that responds.
  • the access node may also employ failover techniques in the event that the preferred access server does not respond to the first unicast message passed.
  • the access node may monitor for returned responses from the preferred access server, such that if an initiated timer (248) elapses prior to detecting a response, the access node may fall back to a broadcast of the message to all corresponding access servers such that any available access server may still respond in order to establish the session in a conventional manner.
  • Fig. 5 illustrates an example procedure for deterministic session load balancing and redundancy in accordance with each of the one or more embodiments described herein.
  • the procedure 500 starts at step 505, and continues to step 510, where a preferred access server is configured for each port 210 of an associated access node (e.g., DSLAM). For instance, as described above, this configuration may take place on the access servers (e.g., BRASl and BRAS2) or on the access node.
  • a particular port of the access node receives a session initiation message 400, e.g., from a client device 105.
  • the access node inserts a port ID into the message 400, and forwards the message to each access server in step 520, accordingly.
  • each access server may determine whether it is the preferred access server for the port ID contained within the message in step 530. If not, in step 535 the access server may either discard the message, or may respond with a certain delay, as described above. If the access server is the preferred server, however, then in step 540 the server responds to the session initiation message (e.g., without delay) accordingly.
  • step 515 a particular port of the access node still receives a session initiation message 400, but now one of two options (“A" or "B") may be utilized.
  • A the access node inserts a preferred access server indication into the message 400, and forwards the message to each access server in step 545.
  • each access server may determine whether it is the preferred access server based on the indication contained within the message in step 550.
  • step 555 the access server may respond with a certain delay, while if the access server is the preferred server, however, then in step 540 the server may responds to the session initiation message (e.g., without delay).
  • a second option which may be performed by the access node replaces step 545 with step 560, where the access node unicasts the session initiation message 400 to only the preferred access server (e.g., transforming the multi/broadcast message into a unicast message).
  • a subroutine/process may be performed in step 565, particularly with reference to Fig. 6. Briefly, Fig.
  • step 6 illustrates an example procedure (sub-procedure) for ensuring preferred access server response in accordance with one or more embodiments described herein, e.g., where unicasting messages 400.
  • the procedure 600 starts at step 605 from Fig. 5, and continues to step 610, where a timer is initiated in response to unicasting the message 400 to the preferred access server. If, as described above, in step 615 the preferred access server has not responded to the session initiation message after expiration of the timer, then in step 620 the access node may then multicast the session initiation message to all associated access servers, and the sub-procedure 600 returns to Fig. 5 in step 625. If the preferred access server has responded in step 615, then the access node need not perform further action, and the sub-procedure returns to Fig. 5 without multicasting the message.
  • an access server receives the session initiation message (or a plurality of access servers, as from Fig. 6 as necessary), and in step 570 the receiving access server(s) respond to the message accordingly (e.g., only the preferred having received the unicast message, or each remaining access server in a conventional manner to ensure that at least one access server is available to the client).
  • the client device may select the first (or only) access server to respond for the session, accordingly.
  • the preferred access server is generally the selected access server (that is, apart from failure or misconfiguration or otherwise), thus allowing deterministic session load-balancing and redundancy as desired.
  • the procedure 500 ends in step 580.
  • the novel techniques described herein provide for deterministic session load-balancing and redundancy in an access-based computer network.
  • the novel techniques allow for one access server to be the preferred controller for each particular port of an access node, whereas before, one port could end up anywhere at any time, and there was no way of knowing which port or server would be coupled for an assigned sub- scriber session.
  • the techniques described above described three mecha- nisms that enable operators to specify at an access node which access server should be preferred for a given port (e.g., a port range).
  • Each mechanism solves the problem with varying degrees of impact on the access node (e.g., DSLAM), access server (e.g., BRAS), and associated protocols. Also, the dynamic aspects of one or more embodiments de- scribed herein alleviate the need for cumbersome and inefficient manual configuration.
  • the embodiments of the invention in their broader sense are not so limited, and may, in fact, be used with any access technology featuring access devices (e.g., DSL, Ethernet, wireless, etc.) and a shared medium with two or more subscriber termination nodes (access servers) interconnected with some form of multiplexing access node (e.g., switch, hub, etc.).
  • access devices e.g., DSL, Ethernet, wireless, etc.
  • access servers e.g., switch, hub, etc.
  • response messages from access servers sent through the access nodes may be used to dynamically determine a preferred access server port configuration.
  • a client may send a session initiation message (e.g., PPPoE PADI message) in step 710 to be received by an access node in step 715 at a particular port.
  • the access node may then forward the message to all access servers in step 720, and may receive a response (e.g., the first response) from an access server in step 725 in a conventional manner.
  • the access node may store the ID of the responsive ("preferred") access server, which is selected by the client device in step 735 (as in step 575 of Fig. 5 above).
  • the procedure 700 continues in step 750 to Fig. 5, where in step 545 or 560, the preferred access server is managed by the access node, accordingly.
  • the access node can dynamically determine a preferred access server for future requests on that same port.
  • the access nodes can ensure that arbitrary sets of sessions of an access node (e.g., given ports, or the entire access node) are advantageously handled by the same access server.
  • an access node e.g., given ports, or the entire access node
  • the components and/or elements described herein can be implemented as software, including a computer-readable medium having program instructions executing on a computer, hardware, firmware, or a combination thereof. Accordingly this description is to be taken only by way of example and not to otherwise limit the scope of the invention. Therefore, it is the object of the appended claims to cover all such variations and modifications as come within the true spirit and scope of the invention.

Abstract

In one embodiment, for each port (210) of an access node (200) in an access-based computer network, one access server (300) of a plurality of access servers is configured as a preferred access server for that port. Upon receiving a session initiation message (400) at a particular port, the access node (200) forwards the session initiation message (400) to one or more of th access servers (300) based on the configured preferred access server for the particular port.

Description

DETERMINISTIC SESSION LOAD-BALANCING AND REDUNDANCY OF ACCESS SERVERS IN A COMPUTER
NETWORK
TECHNICAL FIELD The present disclosure relates generally to computer networks, and, more particularly, to access technologies featuring access devices (e.g., multiplexing access nodes and access servers), for example, digital subscriber lines (DSL).
BACKGROUND
In computer networks utilizing access technologies, e.g., DSL, a user/client is generally allowed to open multiple sessions/connections on port of access device. In particular, various networks use multiple/redundant access servers, such as Network Access Servers (NAS) or Broadband Remote Access Servers (BRAS), in order to provide a redundant pair of IP (Internet Protocol) termination points. A user is often connected to each of these multiple access servers via an access node, such as a DSL Access Multi- plexer (DSLAM).
Currently, there is no deterministic way to predict which access server will be used for a particular session or port. Network operators (administrators), however, often wish to coordinate policies for subscribers (users) between the multiple access servers, such as for Quality of Service (QoS), call admission control (CAC), troubleshooting (e.g., which device is causing a problem), etc. Coordinating or otherwise administering these policies can prove difficult, though, since there is no way to deterministically predict or know where the sessions are being serviced. For instance, a user may establish a first session (e.g., a point-to-point protocol over Ethernet or "PPPoE" session from one device in a subscriber's home) on a first access server, while a second session from the same user (e.g., another PPPoE session from another device is the same subscriber home) may be established on a second access server. While redundant servers may provide load- balancing features in this manner, they do not allow for easily coordinating these split resources, such that any subscriber agreements/policies (e.g., only a single video on demand session allowed from a particular user) are generally difficult to enforce.
BRIEF DESCRIPTION OF THE DRAWINGS
Advantages of the invention may be better understood by referring to the follow- ing description in conjunction with the accompanying drawings in which like reference numerals indicate identically or functionally similar elements, of which:
Fig. 1 illustrates an example computer network; Fig. 2 illustrates an example access node; Fig. 3 illustrates an example access server; Fig. 4 illustrates an example session initiation message;
Fig. 5 illustrates an example procedure for deterministic session load balancing and redundancy;
Fig. 6 illustrates an example procedure for ensuring preferred access server response in accordance with one or more embodiments; and Fig. 7 illustrates an example procedure for an alternative embodiment of configuring a preferred access server port.
DESCRIPTION OF EXAMPLE EMBODIMENTS
OVERVIEW
According to embodiments of the disclosure, for each port of an access node in an access-based computer network, one access server of a plurality of access servers is configured as a preferred access server for that port. Upon receiving a session initiation message at a particular port, the access node forwards the session initiation message to one or more of the access servers based on the configured preferred access server for the particular port. For instance, in various embodiments, the preferred access server may be con- figured on the access server or on the access node, and the message may be modified by the access node to include an indication (e.g., port ID or preferred access server indicator) or to be unicast to the preferred access server, only.
DESCRIPTION
A computer network is a geographically distributed collection of nodes intercon- nected by communication links and segments for transporting data between end nodes, such as personal computers and workstations. Many types of networks are available, with the types ranging from local area networks (LANs) to wide area networks (WANs). LANs typically connect the nodes over dedicated private communications links located in the same general physical location, such as a building or campus. WANs, on the other hand, typically connect geographically dispersed nodes over long-distance communications links, such as common carrier telephone lines, optical lightpaths, synchronous optical networks (SONET), or synchronous digital hierarchy (SDH) links. The Internet is an example of a WAN that connects disparate networks throughout the world, providing global communication between nodes on various networks. The nodes typically commu- nicate over the network by exchanging discrete frames or packets of data according to predefined protocols, such as the Transmission Control Protocol/Internet Protocol (TCP/IP). In this context, a protocol consists of a set of rules defining how the nodes interact with each other.
Fig. 1 is a schematic block diagram of an example computer network 100 illustra- tively comprising nodes/devices, such as one or more clients devices 105 interconnected with a WAN 110 (e.g., the Internet) via an access node and two or more access servers interconnected by links as shown. Illustratively, a portion of the network 100 is an access-based computer network, such as a digital subscriber line (DSL) network comprising clients 105, the access node (e.g., a DSL Access Multiplexer, or "DSLAM"), and the two or more access servers (e.g., Broadband Remote Access Servers, or "BRAS"), as may be appreciated by those skilled in the art. Note that while DSL is described, those skilled in the art will understand that network access devices may be any type of access or aggregation device that may be used in a similar manner (e.g., Ethernet switches, Network Access Servers or "NAS," etc.), and client devices 105 may be subscriber devices, e.g., home devices or customer premise equipment (CPE), such as a set-top-box, a cable mo- dem, a personal computer (PC), etc. Further, those skilled in the art will understand that any number of nodes, devices, links, etc. may be used in the computer network, and that the view shown herein is for simplicity.
Data packets (e.g., messages 400) may be exchanged among the devices of the computer network 100 using predefined network communication protocols such as the Transmission Control Protocol/Internet Protocol (TCP/IP), User Datagram Protocol (UDP), Asynchronous Transfer Mode (ATM) protocol, Frame Relay protocol, Internet Packet Exchange (IPX) protocol, etc. For instance, the links connecting the subscriber/client devices 105 to the network access device (DSLAM) of a service provider network may utilize, e.g., DSL technology, Cable modems, etc., while the links within the provider network (e.g., DSLAM to BRAS) may be ATM, Ethernet, etc., as will be understood by those skilled in the art.
Note also that as used herein, "unicast" data transfer (i.e., unicast forwarding or "unicasting") involves forwarding a data packet from a single sending process of an end node ("source") to a single receiving process of an end node ("receiver") on the computer network. Also, where the destination of the data packet issued by a source may be more than one, but less than all of the receivers on the network, a "multicast" data transfer (i.e., multicast forwarding or "multicasting") may be used. Further, a "broadcast" data transfer (i.e., broadcast forwarding or "broadcasting") is where the destination of the data packet issued by a source is all of the receivers on the network (e.g., to a certain end point, such as a domain edge or a particular type of receiver, e.g., DSLAM to a plurality of BRAS, as described herein).
Fig. 2 is a schematic block diagram of an example node/device 200 that may be advantageously used with one or more embodiments described herein, e.g., as an access node (e.g., DSLAM). The access node comprises a plurality of network interfaces (or "ports") 210, one or more processors 220, and a memory 240 interconnected by a system bus 250. The network interfaces/ports 210 contain the mechanical, electrical, and signaling circuitry for communicating data over physical links coupled to the network 100. The network interfaces may be configured to transmit and/or receive data using a variety of different communication protocols, including, inter alia, TCP/IP, UDP, ATM, syn- chronous optical networks (SONET), wireless protocols, Frame Relay, Ethernet, Fiber Distributed Data Interface (FDDI), etc. Notably, a physical network interface 210 may also be used to implement one or more virtual network interfaces, such as for Virtual Private Network (VPN) access, known to those skilled in the art. The memory 240 comprises a plurality of storage locations that are addressable by the processor(s) 220 and the network interfaces/ports 210 for storing software programs and data structures associated with the embodiments described herein. The processor(s) 220 may comprise necessary elements or logic adapted to execute the software programs and manipulate the data structures, such as a configuration table 246 as described herein. An operating system 242 (e.g., the Internetworking Operating System, or IOS™, of Cisco Systems, Inc.), portions of which are typically resident in memory 240 and executed by the processor(s), functionally organizes the access node by, inter alia, invoking network operations in support of software processes and/or services executing on the device. These software processes and/or services may comprise "access node" process/services 244 and a timer process 248, each as described in further detail below. It will be apparent to those skilled in the art that other types of processors and memory, including various computer-readable media, may be used to store and execute program instructions pertaining to the inventive technique described herein.
Also, Fig. 3 is a schematic block diagram of an example node/device 300 that may be advantageously used with one or more embodiments described herein, e.g., as an access server (e.g., BRAS). The access server comprises a plurality of network interfaces (or "ports") 310, one or more processors 320, and a memory 340 interconnected by a system bus 350. The memory 340 comprises a plurality of storage locations that are addressable by the processor(s) 320 and the network interfaces/ports 310 for storing soft- ware programs and data structures associated with the embodiments described herein, such as a configuration table 346 as described herein. An operating system 342 (e.g., the Internetworking Operating System, or IOS™, of Cisco Systems, Inc.), portions of which are typically resident in memory 340 and executed by the processor(s), functionally organizes the access node by, inter alia, invoking network operations in support of software processes and/or services executing on the device. These software processes and/or ser- vices may comprise "access server" process/services 344 as described in further detail below.
In particular, as will be appreciated by those skilled in the art, the access node 200 (e.g., DSLAM) and access servers 300 (e.g., BRASes) may operate according to one or more access technologies, such as, e.g., DSL, Ethernet, etc. For instance, access node process/services 244 and access server process/services 344 may each contain computer executable instructions executed by respective processors 220/320 to perform functions related to corresponding access technologies. Illustratively, such processes may comprise conventional operation according to access nodes (e.g., DSLAMs) and access servers (e.g., BRASes) as will be understood by those skilled in the art, in addition to those features as described herein with reference to one or more embodiments of the disclosure.
For example, a typical access technology session may be initiated by a client/subscriber request ("session initiation message") 400 being broadcast via an access node to all interconnected access servers. The access node transmits the messages 400a,b to the access servers, which respond to the client. Generally, the first server to respond to the client is selected for the session, and any subsequent data of that session is sent to that one server (or "controller"). Access node process 244 and access server process 344 may thus execute functions relating to this procedure, in addition to other functions as will be understand and as will be described further herein. As noted above, network operators/administrators utilizing access technologies, such as PPPoE ("point-to-point protocol over Ethernet") or IPoE (IP over Ethernet) based subscriber sessions, together with multiple access servers (e.g., BRASes) on a common broadcast segment (shared segment) currently are unable to deterministically predict the access server which a given port of an access node (e.g., DSLAM) will use for a session. Typically, for instance, two access servers may be located on a shared segment, e.g., a VLAN, that is used to connect one or more access nodes, with each access node having multiple subscriber ports feeding traffic into that VLAN. According to conventional access protocols (e.g., PPPoE or IPoE), a user (e.g., client device 105) sends a session initiation message (e.g., a PPPoE "PADI" or IPoE "DHCP" message, as will be under- stood), which makes its way to the shared VLAN and is received by both access servers (e.g., BRASl and BRAS2). Each access server responds with a session reply message (e.g., a "PADO" message or DHCP reply message), and the current client protocol implementation makes the client select the access server whose reply is the first to arrive as the access server with which the client will attempt to establish a session/connection (e.g., by sending a "PADR," etc., as will also be understood). In this scenario, an operator has practically no way to predict which access server will be the one handling the subscriber's sessions, and is thus non-deterministic. Another problem arising from this behavior is that a second session/connection launched by the same subscriber could end up being served by a different access server. While this feature does offer a manner in which load-balancing (e.g., PPP load balancing) may be performed, it also introduces a problem of enforcing an access-line policy across the two sessions on two separate access servers. For example, such access- line policies may include, e.g., per access-line scheduling/shaping and per access line admission control, each of which are very common operator requirements for a particular network. Similarly, it also introduces a problem of enforcing an access-node-level policy across sessions which are managed by separate devices, such as per access node uplink call admission control (CAC), scheduling, shaping, troubleshooting, etc., as mentioned above.
Deterministic Session Load-Balancing and Redundancy According to embodiments of the disclosure, for each port of an access node (e.g.,
DSLAM) in an access-based computer network, one access server (e.g., BRAS) of a plurality of access servers is configured as a preferred access server for that port. Upon receiving a session initiation message 400 at a particular port, the access node forwards the session initiation message to one or more of the access servers based on the configured preferred access server for the particular port. For instance, in various embodiments, the preferred access server may be configured on the access server or on the access node, and the message may be modified by the access node to include an indication (e.g., port ID or preferred access server indicator) or to be unicast to the preferred access server, only.
Illustratively, the techniques described herein may be performed by hardware, software, and/or firmware, such as in accordance with a general "access node" or "access server" processes/services 244/344, depending upon which device is performing the particular action. These processes and/or services may be configured to operate in accordance with certain protocols, and in accordance with the techniques described herein. For instance, these processes may be configured to perform any one (or more) of three mechanisms targeted at specific problems identified within a corresponding network in which the access device is located. In particular, each mechanism solves the same problem in a slightly different way, but each, at its core, is directed to the same general technique mentioned above (and throughout). The first mechanism requires only control- plane level changes, utilizing modified/additional features of an access node control pro- tocol operating between the access node and the access server (e.g., ANCP). The second requires additional information to be inserted by an access node (e.g., DSLAM) snooping control packets/frames (e.g., PPPoE or DHCP packets), and can operate in networks whether or not an access node control protocol (such as ANCP) is implemented. The third mechanism requires data-plane changes to the access node, but is transparent to the access servers (e.g., BRASes).
Operationally, ports 210 on an access node may be directly provisioned (configured) to prefer a given access server. For instance, any partition (e.g., physical or virtual) of ports may be grouped together to have a preferred access server for that partition (e.g., with granularity anywhere between a single port-basis to entire access node-basis). For example, illustrative ports 1-100 of an access node (DSLAM) may be configured to have BRASl as a preferred access server, while ports 101-200 of that access node may be configured to prefer BRAS2, etc. Alternatively, all ports on a given access node may all be provisioned to prefer a given access server, e.g., ports 1-200 of DSLAMl (not shown) are configured to prefer BRASl, ports 1-200 of DSLAM2 a configured to prefer BRAS2, etc. Notably, this information is generally configured by a provisioning system on the access node, and in certain embodiments may be transferred to the access servers.
According to a first embodiment, in particular, an access node control protocol (e.g., ANCP) allows an access server (e.g., BRAS) to be assigned as the controller of a particular port or VLAN on an access node. (An illustrative description of ANCP may be found in the Internet Draft entitled Protocol for Access Node Control Mechanism in Broadband Networks, dated November 3, 2008, available from the Internet Engineering Task Force (IETF) as draft-ietf-ancp-protocol-04.txt.) For instance, the protocol currently allows for access servers to exchange information regarding an "active/backup server" controller setup, where each access server knows its respective status. Generally, all sessions are established with active servers only, and the backup or standby servers are used in the event of a failure. (Note that ANCP also has a quick failure detection of the ANCP adjacency, allowing a rapid switch to the backup controller in the event of an active server failure.) The problems faced above with regard to non-deterministic load- balancing and redundancy arises when multiple access servers (e.g., both BRASl and BRAS2) are in active mode ("active-active" setup). In this first embodiment, the access node (e.g., DSLAM) is provisioned with ports
(e.g., ranges) assigned to the interconnected access servers (e.g., BRASl and BRAS2). This information may be communicated via ANCP with extensions to the ANCP protocol, such that the access node "informs" the access servers of the preferred access server for each of its ports (thus, the access servers are configured to know the port identifica- tions (IDs) to which they are or are not the preferred access server). Illustratively, this information may be stored (e.g., preconfigured before sessions are established) on the access node within configuration table 246, and on the access servers within configuration table 346.
When a client sends a session initiation message (e.g., for PPPoE or DHCP) to es- tablish/originate a session, the message is "snooped" by the access node via current standard operation as will be understood by those skilled in the art. Fig. 4 illustrates an example session initiation message 400, such as, e.g., a PADI or DHCP DISCOVER message, shown simplified for purpose of discussion herein as may be appreciated by those skilled in the art. In particular, message 400 may comprise one or more headers 410 and a payload 420 to carry the information necessary for the requested session. Header information 410 generally comprises various message type fields, address fields, etc., and according to one or more embodiments herein, an "inserted indicator" field 415. (Notably, while field 415 is shown within headers 410, other suitable placements may be made within the scope of the embodiments herein, e.g., within payload 420.) By snooping this message, an access node is able to monitor at least the header information to determine the type of message, its source and destination addresses, etc. In addition, however, the access node may also insert port (or "line") information into the message 400 (in field 415) that indicates the port ID of the port having received the mes- sage (i.e., the port on which the session would be established).
The access node then forwards the message 400 to the access servers, which receive the message having the inserted port information, i.e., the port ID. Based on this port ID, together with the information previously communicated via ANCP (the configured preferred access servers for each port), each access server can make a decision as to whether the message should be responded to or not. For instance, an access server may respond to the session initiation message if that access server is identified (or configured) as the preferred access server for the port ID in the session initiation message, or the access server may discard the message if it is not configured as the preferred access server.
As a variant, each access server can make a decision as to how fast/slow to re- spond to the message. For example, instead of strictly responding or not responding, the access servers may respond without delay or with delay, depending on their status as a preferred access server for the port ID, such that the preferred access server will (most likely) respond first, thus being selected by the client for the session, accordingly. Notably, delaying the response (as opposed to discarding the message) is not as deterministic as the response/no response mechanism above. However, given that most clients respond to the first response (e.g., PADO or DHCP OFFER) received, introducing a delay for the secondary access server will generally provide predictable behavior in most cases, and automatic failover in the event one access server fails (i.e., the delayed response will in effect become the first response received by the client if it is the only response). Also, prior to reconfiguration in the event of a failure, the user/client will timeout the session and send a new session initiation message 400, which again will result in the non- preferred access server being the first to respond (though delayed).
According to this embodiment, then, ANCP (or similar protocols) may be used to set up the control plane of the access servers, and then the data plane (access node's use of message 400) uses this setup to convey to the control plane which access node port the control plane traffic relates to, so that the access server can determine the preferred access server from the access node port. Also, ANCP provides an adjacency between the access node (e.g., DSLAM) and access server (e.g., BRAS) that is utilized to actively update the access servers with new port configurations, e.g., in general and/or in the event that one access server fails or otherwise becomes unavailable. This embodiment, therefore, expands the notion of "active/standby" access server status by configuring the "status" on the access node (e.g., DSLAM) on a per-port basis, and distributing this information to the access servers for use accordingly.
A second embodiment described herein does not need ANCP to be present be- tween the access node and access servers, but changes the session protocols (e.g., PPPoE and DHCP) as well as the snooping function at the access node. According to this embodiment, the preferred access servers for each port are configured on the access node, but this configuration is not transferred to the access servers. Instead, the access servers are configured to read "hints" within the session initiation messages 400. In particular, similar to the mechanism described above, the access node snoops the session initiation messages, and inserts (into field 415) a preference marker/indication of the preferred access server for the port on which the message was received at the access node. This indication may be an access server ID/name, a preference number, etc. The access servers may then receive the updated message 400, and interpret the indication to determine whether it is the preferred access server for the session. For instance, to respond to the session initiation message based on the indication, an access server may decide to respond without delay if it is the indicated preferred access server, or with a delay if it is not the preferred access server. (Note that in the event there is no indication present, the access servers may operate in a conventional manner, thus allowing for backward com- patibility.) Again, the delayed response is not completely deterministic, but does provide a predictable behavior under most circumstances, as well as desirable failover characteristics.
A third embodiment described herein does not need to change the session establishment protocols (e.g., DHCP or PPPoE), and is transparent to the access servers (e.g., BRAS). However, this embodiment has significant impact on the dataplane of the access node (e.g., DSLAM). Similar to the embodiments above, the preferred access servers for each port are configured on the access node. According to this embodiment, though, the access node intercepts a broadcast session initiation message 400 (e.g., PADI and DISCOVER messages), and forwards it to only the preferred access server based on the particular port on which the message 400 was received. In other words, the access node transforms the broadcast (or multicast) messages into unicast messages to the preferred access server (e.g., either via configured MAC address, previously discovered access node MAC address, configured IP address in the case of DHCP, or by sending the message over a separate VLAN dedicated to a given access server, etc.).
In this manner, the access servers (e.g., BRASes) receive session initiation mes- sages 400 (PPPoE or DHCP messages) for ports only as dictated by the access node (e.g., DSLAM). Accordingly, there need not be any inserted indications (field 415) within the messages 400, since by only sending the message to a single preferred access server, the access server receiving the message is the preferred access server, and thus is the only access server that responds. Notably, the access node may also employ failover techniques in the event that the preferred access server does not respond to the first unicast message passed. For instance, the access node may monitor for returned responses from the preferred access server, such that if an initiated timer (248) elapses prior to detecting a response, the access node may fall back to a broadcast of the message to all corresponding access servers such that any available access server may still respond in order to establish the session in a conventional manner.
Accordingly, the techniques/mechanisms of the three embodiments described above each solves the same problem in a slightly different way, but they are all directed to the same general principles of configuring preferred access servers per port of an ac- cess node, forwarding the session initiation messages based on that configuration (e.g., with inserted indicators, as a unicast message, etc.), and in certain instances, responding from an access server based on the configurations. Fig. 5 illustrates an example procedure for deterministic session load balancing and redundancy in accordance with each of the one or more embodiments described herein. The procedure 500 starts at step 505, and continues to step 510, where a preferred access server is configured for each port 210 of an associated access node (e.g., DSLAM). For instance, as described above, this configuration may take place on the access servers (e.g., BRASl and BRAS2) or on the access node.
In the event that the configuration is on the access servers (e.g., using ANCP, de- scribed above), in step 515 a particular port of the access node receives a session initiation message 400, e.g., from a client device 105. In this embodiment, the access node inserts a port ID into the message 400, and forwards the message to each access server in step 520, accordingly. Upon receiving the session initiation message 400 in step 525, each access server may determine whether it is the preferred access server for the port ID contained within the message in step 530. If not, in step 535 the access server may either discard the message, or may respond with a certain delay, as described above. If the access server is the preferred server, however, then in step 540 the server responds to the session initiation message (e.g., without delay) accordingly.
Conversely, in the event that the configuration of preferred access servers in step 515 is on the access node, in step 515 a particular port of the access node still receives a session initiation message 400, but now one of two options ("A" or "B") may be utilized. According to a first option ("A"), the access node inserts a preferred access server indication into the message 400, and forwards the message to each access server in step 545. Here, upon receiving the session initiation message 400 in step 525, each access server may determine whether it is the preferred access server based on the indication contained within the message in step 550. If it is not the preferred access server, in step 555 the access server may respond with a certain delay, while if the access server is the preferred server, however, then in step 540 the server may responds to the session initiation message (e.g., without delay). Alternatively, a second option ("B") which may be performed by the access node replaces step 545 with step 560, where the access node unicasts the session initiation message 400 to only the preferred access server (e.g., transforming the multi/broadcast message into a unicast message). In this embodiment, as mentioned above, a subroutine/process may be performed in step 565, particularly with reference to Fig. 6. Briefly, Fig. 6 illustrates an example procedure (sub-procedure) for ensuring preferred access server response in accordance with one or more embodiments described herein, e.g., where unicasting messages 400. The procedure 600 starts at step 605 from Fig. 5, and continues to step 610, where a timer is initiated in response to unicasting the message 400 to the preferred access server. If, as described above, in step 615 the preferred access server has not responded to the session initiation message after expiration of the timer, then in step 620 the access node may then multicast the session initiation message to all associated access servers, and the sub-procedure 600 returns to Fig. 5 in step 625. If the preferred access server has responded in step 615, then the access node need not perform further action, and the sub-procedure returns to Fig. 5 without multicasting the message.
Returning to Fig. 5 from step 560 (or 565), in step 525 an access server receives the session initiation message (or a plurality of access servers, as from Fig. 6 as necessary), and in step 570 the receiving access server(s) respond to the message accordingly (e.g., only the preferred having received the unicast message, or each remaining access server in a conventional manner to ensure that at least one access server is available to the client).
Regardless of the configuration path, once an access server responds in steps 535, 540, 555, and/or 570, then the client device may select the first (or only) access server to respond for the session, accordingly. In this manner, the preferred access server is generally the selected access server (that is, apart from failure or misconfiguration or otherwise), thus allowing deterministic session load-balancing and redundancy as desired. The procedure 500 ends in step 580.
Advantageously, the novel techniques described herein provide for deterministic session load-balancing and redundancy in an access-based computer network. By configuring a preferred access server for each port of a corresponding access node, the novel techniques allow for one access server to be the preferred controller for each particular port of an access node, whereas before, one port could end up anywhere at any time, and there was no way of knowing which port or server would be coupled for an assigned sub- scriber session. In particular, the techniques described above described three mecha- nisms that enable operators to specify at an access node which access server should be preferred for a given port (e.g., a port range). Each mechanism solves the problem with varying degrees of impact on the access node (e.g., DSLAM), access server (e.g., BRAS), and associated protocols. Also, the dynamic aspects of one or more embodiments de- scribed herein alleviate the need for cumbersome and inefficient manual configuration.
While there have been shown and described illustrative embodiments that provide for deterministic session load-balancing and redundancy in an access-based computer network, it is to be understood that various other adaptations and modifications may be made within the spirit and scope of the present invention. For example, the embodiments have been shown and described herein with reference to example networks relating to DSL access (e.g., DSLAMs, BRASes, etc.). However, the embodiments of the invention in their broader sense are not so limited, and may, in fact, be used with any access technology featuring access devices (e.g., DSL, Ethernet, wireless, etc.) and a shared medium with two or more subscriber termination nodes (access servers) interconnected with some form of multiplexing access node (e.g., switch, hub, etc.).
In addition, other embodiments may also be considered within the scope of the techniques described above, such as allowing for communication between access servers to ensure consistent/coherent configuration and to dynamically modify the respond/discard (accept/deny) decisions based upon system conditions (e.g., bandwidth al- location, failures, real-time traffic conditions, etc.).
For instance, in one alternative embodiment, response messages from access servers sent through the access nodes may be used to dynamically determine a preferred access server port configuration. For example, with reference to Fig. 7, which illustrates a procedure 700 starting at step 705, a client may send a session initiation message (e.g., PPPoE PADI message) in step 710 to be received by an access node in step 715 at a particular port. The access node may then forward the message to all access servers in step 720, and may receive a response (e.g., the first response) from an access server in step 725 in a conventional manner. In step 730, the access node may store the ID of the responsive ("preferred") access server, which is selected by the client device in step 735 (as in step 575 of Fig. 5 above). Upon receiving another session initiation message at the access node in step 740, however, if the message is received on the same port as a previous message (step 745), then the procedure 700 continues in step 750 to Fig. 5, where in step 545 or 560, the preferred access server is managed by the access node, accordingly. In other words, based on the first responding access server to a session initiation message on a particular port of an access node, the access node can dynamically determine a preferred access server for future requests on that same port. In this manner, while not necessarily optimized for load-balancing, the access nodes can ensure that arbitrary sets of sessions of an access node (e.g., given ports, or the entire access node) are advantageously handled by the same access server. The foregoing description has been directed to specific embodiments of this invention. It will be apparent, however, that other variations and modifications may be made to the described embodiments, with the attainment of some or all of their advantages. For instance, it is expressly contemplated that the components and/or elements described herein can be implemented as software, including a computer-readable medium having program instructions executing on a computer, hardware, firmware, or a combination thereof. Accordingly this description is to be taken only by way of example and not to otherwise limit the scope of the invention. Therefore, it is the object of the appended claims to cover all such variations and modifications as come within the true spirit and scope of the invention.
What is claimed is:

Claims

CLAIMS L A method, comprising: configuring a preferred access server of a plurality of access servers for each port of an access node in an access-based computer network; receiving a session initiation message at a particular port of the access node; and forwarding the session initiation message to one or more of the access servers based on the configured preferred access server for the particular port.
2. The method as in claim 1, wherein configuring comprises: configuring the preferred access servers for each port on the access servers based on a port identification (ID).
3. The method as in claim 2, further comprising: utilizing an access node control protocol (ANCP) to configure the access servers.
4. The method as in claim 2, further comprising: inserting, by the access node, a port ID of the particular port into the session ini- tiation message; and responding to the session initiation message by the access servers based on the configuration and the port ID.
5. The method as in claim 4, wherein responding comprises: responding to the session initiation message in response to the access server being configured as the preferred access server for the port ID in the session initiation message; and 5 discarding the session initiation message in response to the access server not be-
6 ing configured as the preferred access server for the port ID in the session initiation mes-
7 sage.
1 6. The method as in claim 4, wherein responding comprises:
2 responding to the session initiation message without delay in response to the ac-
3 cess server being configured as the preferred access server for the port ID in the session
4 initiation message; and
5 responding to the session initiation message with delay in response to the access
6 server not being configured as the preferred access server for the port ID in the session
7 initiation message.
1 7. The method as in claim 1, wherein configuring comprises:
2 configuring the preferred access servers for each port on the access node.
1 8. The method as in claim 7, further comprising:
2 inserting, by the access node, a preferred access server indication based on the
3 particular port into the session initiation message; and
4 responding to the session initiation message by the access servers based on the in-
5 dication.
1 9. The method as in claim 8, wherein responding comprises:
2 responding to the session initiation message without delay in response to the ac-
3 cess server being the indicated preferred access server; and
4 responding to the session initiation message with delay in response to the access s server not being the indicated preferred access server. i
10. The method as in claim 7, further comprising: forwarding the session initiation message to only the preferred access server based on the configured preferred access server for the particular port.
11. The method as in claim 10, further comprising: initiating a timer in response to forwarding the session initiation message to the preferred access server; monitoring messages to determine whether the preferred access server responds; and in response to no response from the preferred access server, forwarding the ses- sion initiation message to the plurality of access servers.
12. The method as in claim 7, wherein configuring comprises: configuring each preferred access server for each port on the access node based on an initial session initiation message received at a given port of the access node and a first responding access server, wherein the preferred access server for any other session initiation messages received on the given port is the first responding server.
13. A system, comprising: a plurality of access servers in an access-based computer network; an access node interconnected with each of the access servers, the access node having one or more ports; and wherein a preferred access server of the plurality of access servers is configured for each port of the access node, and the access node is configured to forward a received session initiation message to one or more of the access servers based on the configured preferred access server for a particular port having received the session initiation mes- sage.
14. The system as in claim 13, wherein the preferred access server for each port is con- figured on the access servers based on a port identification (ID).
15. The system as in claim 14, wherein the access node is configured to insert a port ID of the particular port into the session initiation message, and the access servers are con- figured to respond to the session initiation message based on the configuration and the port ID.
16. The system as in claim 13, wherein the preferred access server for each port is con- figured on the access node.
17. The system as in claim 16, wherein the access node is configured to insert a preferred access server indication based on the particular port into the session initiation message, and the access servers are configured to respond to the session initiation message based on the indication.
18. The system as in claim 16, wherein the access node is configured to forward the ses- sion initiation message to only the preferred access server based on the configured pre- ferred access server for the particular port.
19. A node, comprising: one or more network ports adapted to interconnect with a plurality of access serv- ers and one or more client devices of an access-based computer network; a processor coupled to the network ports and adapted to execute one or more processes; and a memory configured to store an access node process executable by the processor, the access node process when executed operable to: i) receive a session initiation mes- sage from a client device at a particular port; and ii) forward the session initiation mes- sage to one or more of the access servers based on a configured preferred access server of the plurality of access servers for the particular port.
20. The node as in claim 19, wherein the access node process is further operable to: insert a port ID of the particular port into the session initiation message, wherein the access servers are configured to respond to the session initiation message based on the port ID.
21. The node as in claim 19, wherein the preferred access servers for each port is config- ured on the node, and the access node process is further operable to: insert a preferred access server indication based on the particular port into the ses- sion initiation message, wherein the access servers are configured to respond to the ses- sion initiation message based on the indication.
22. The node as in claim 19, wherein the preferred access servers for each port is config- ured on the node, and the access node process is further operable to: forward the session initiation message to only the preferred access server based on the configured preferred access server for the particular port.
23. A node, comprising: one or more network ports adapted to interconnect with an access node of an ac- cess-based computer network; a processor coupled to the network ports and adapted to execute one or more processes; and a memory configured to store an access server process executable by the proces- sor, the access server process when executed operable to: i) receive a session initiation message from the access node, the session initiation message having an indication of a preferred access server based on a particular port of the access node having received the session initiation message from a client device; and ii) respond to the session initiation message based on the indication.
24. The node as in claim 23, wherein the preferred access servers for each port is config- ured on the node based on a port identification (ID), the port ID being the indication in the session initiation message, and the access server process is further operable to: respond to the session initiation message in response to the node being the pre- ferred access server for the port ID; and discard the session initiation message in response to the access server not being configured as the preferred access server for the port ID.
25. The node as in claim 23, wherein the preferred access servers for each port is config- ured on the access node, the indication in the session initiation message being an indica- tion of the preferred access server, and the access server process is further operable to: respond to the session initiation message without delay in response to the node being the indicated preferred access server; and respond to the session initiation message with delay in response to the access server not being the indicated preferred access server.
PCT/US2009/006168 2008-11-26 2009-11-18 Deterministic session load-balancing and redundancy of access servers in a computer network WO2010068237A2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP09774993.1A EP2351330B1 (en) 2008-11-26 2009-11-18 Deterministic session load-balancing and redundancy of access servers in a computer network
CN200980125667.1A CN102084638B (en) 2008-11-26 2009-11-18 Deterministic session load-balancing and redundancy of access servers in a computer network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US12/323,805 US8782256B2 (en) 2008-11-26 2008-11-26 Deterministic session load-balancing and redundancy of access servers in a computer network
US12/323,805 2008-11-26

Publications (2)

Publication Number Publication Date
WO2010068237A2 true WO2010068237A2 (en) 2010-06-17
WO2010068237A3 WO2010068237A3 (en) 2010-12-29

Family

ID=42107587

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2009/006168 WO2010068237A2 (en) 2008-11-26 2009-11-18 Deterministic session load-balancing and redundancy of access servers in a computer network

Country Status (4)

Country Link
US (2) US8782256B2 (en)
EP (1) EP2351330B1 (en)
CN (1) CN102084638B (en)
WO (1) WO2010068237A2 (en)

Families Citing this family (175)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4727537B2 (en) * 2006-09-11 2011-07-20 富士通株式会社 Relay agent device and proxy address lending device
US9456054B2 (en) 2008-05-16 2016-09-27 Palo Alto Research Center Incorporated Controlling the spread of interests and content in a content centric network
EP2214374A1 (en) * 2009-01-30 2010-08-04 Hewlett-Packard Development Company, L.P. Communications system and method
US8867539B2 (en) 2009-09-18 2014-10-21 At&T Intellectual Property I, L.P. Multicast-unicast protocol converter
US8169893B1 (en) * 2009-09-23 2012-05-01 Cisco Technology, Inc. Quick detection of problematic link to support fast failover
CN102025476B (en) * 2009-09-23 2014-02-26 中兴通讯股份有限公司 Method for realizing user port positioning in BRAS (Broadband Remote Access Server) multicomputer backup scene and network system
US8923293B2 (en) 2009-10-21 2014-12-30 Palo Alto Research Center Incorporated Adaptive multi-interface use for content networking
US9098335B2 (en) 2009-12-23 2015-08-04 Citrix Systems, Inc. Systems and methods for managing spillover limits in a multi-core system
US8825859B2 (en) * 2009-12-23 2014-09-02 Citrix Systems, Inc. System and methods for mixed mode of IPv6 and IPv4 DNS of global server load balancing
US8635344B2 (en) * 2009-12-23 2014-01-21 Citrix Systems, Inc. Systems and methods for managing ports for RTSP across cores in a multi-core system
US8375436B2 (en) 2010-04-22 2013-02-12 Palo Alto Research Center Incorporated Session migration over content-centric networks
US8244881B2 (en) * 2010-08-06 2012-08-14 Palo Alto Research Center Incorporated Service virtualization over content-centric networks
CN101986645A (en) * 2010-10-27 2011-03-16 中兴通讯股份有限公司 Signaling transfer method, system and media server under multiple modules
CN102957718B (en) 2011-08-23 2018-04-03 中兴通讯股份有限公司 The method of User Agreement message synchronization between a kind of service node and service node
US8180289B1 (en) * 2011-09-26 2012-05-15 Google Inc. Public kiosk providing near field communication services
EP2568666A4 (en) * 2011-09-30 2014-01-08 Huawei Tech Co Ltd Ip address obtaining method and network access device
CN102420818A (en) * 2011-11-28 2012-04-18 中国联合网络通信集团有限公司 Network access control method, device and system
CN102905292B (en) * 2012-09-21 2015-06-10 中兴通讯股份有限公司 Mobile terminal network port management method and device
CN103780513B (en) * 2012-10-24 2018-08-10 中兴通讯股份有限公司 A kind of response method, system and relevant device based on the ponds BNG
US9280546B2 (en) 2012-10-31 2016-03-08 Palo Alto Research Center Incorporated System and method for accessing digital content using a location-independent name
US9179330B2 (en) * 2012-11-07 2015-11-03 Dell Products L.P. Virtual wireless networking
US9400800B2 (en) 2012-11-19 2016-07-26 Palo Alto Research Center Incorporated Data transport by named content synchronization
US10430839B2 (en) 2012-12-12 2019-10-01 Cisco Technology, Inc. Distributed advertisement insertion in content-centric networks
US9978025B2 (en) 2013-03-20 2018-05-22 Cisco Technology, Inc. Ordered-element naming for name-based packet forwarding
US20140297818A1 (en) * 2013-03-29 2014-10-02 Microsoft Corporation Parallel and Dynamic Interface Selection
US9173117B2 (en) * 2013-05-02 2015-10-27 Telefonaktiebolaget L M Ericsson (Publ) Enhancing a mobile backup channel to address a node failure in a wireline network
US9935791B2 (en) 2013-05-20 2018-04-03 Cisco Technology, Inc. Method and system for name resolution across heterogeneous architectures
US9185120B2 (en) 2013-05-23 2015-11-10 Palo Alto Research Center Incorporated Method and system for mitigating interest flooding attacks in content-centric networks
WO2015013901A1 (en) 2013-07-31 2015-02-05 华为技术有限公司 User management device, bng, bng user online method and system
US9444722B2 (en) 2013-08-01 2016-09-13 Palo Alto Research Center Incorporated Method and apparatus for configuring routing paths in a custodian-based routing architecture
US9667436B2 (en) * 2013-09-09 2017-05-30 British Telecommunications Public Limited Company Method and apparatus for communicating with an access node
EP2854335A1 (en) * 2013-09-30 2015-04-01 British Telecommunications public limited company Data network management
US9407549B2 (en) 2013-10-29 2016-08-02 Palo Alto Research Center Incorporated System and method for hash-based forwarding of packets with hierarchically structured variable-length identifiers
US9276840B2 (en) 2013-10-30 2016-03-01 Palo Alto Research Center Incorporated Interest messages with a payload for a named data network
US9282050B2 (en) 2013-10-30 2016-03-08 Palo Alto Research Center Incorporated System and method for minimum path MTU discovery in content centric networks
US9401864B2 (en) 2013-10-31 2016-07-26 Palo Alto Research Center Incorporated Express header for packets with hierarchically structured variable-length identifiers
US10101801B2 (en) 2013-11-13 2018-10-16 Cisco Technology, Inc. Method and apparatus for prefetching content in a data stream
US9311377B2 (en) 2013-11-13 2016-04-12 Palo Alto Research Center Incorporated Method and apparatus for performing server handoff in a name-based content distribution system
US10129365B2 (en) 2013-11-13 2018-11-13 Cisco Technology, Inc. Method and apparatus for pre-fetching remote content based on static and dynamic recommendations
US10089655B2 (en) 2013-11-27 2018-10-02 Cisco Technology, Inc. Method and apparatus for scalable data broadcasting
US9503358B2 (en) 2013-12-05 2016-11-22 Palo Alto Research Center Incorporated Distance-based routing in an information-centric network
US9379979B2 (en) 2014-01-14 2016-06-28 Palo Alto Research Center Incorporated Method and apparatus for establishing a virtual interface for a set of mutual-listener devices
US10098051B2 (en) 2014-01-22 2018-10-09 Cisco Technology, Inc. Gateways and routing in software-defined manets
US10172068B2 (en) 2014-01-22 2019-01-01 Cisco Technology, Inc. Service-oriented routing in software-defined MANETs
US9374304B2 (en) 2014-01-24 2016-06-21 Palo Alto Research Center Incorporated End-to end route tracing over a named-data network
US9954678B2 (en) 2014-02-06 2018-04-24 Cisco Technology, Inc. Content-based transport security
US9531679B2 (en) 2014-02-06 2016-12-27 Palo Alto Research Center Incorporated Content-based transport security for distributed producers
US9678998B2 (en) 2014-02-28 2017-06-13 Cisco Technology, Inc. Content name resolution for information centric networking
US10089651B2 (en) 2014-03-03 2018-10-02 Cisco Technology, Inc. Method and apparatus for streaming advertisements in a scalable data broadcasting system
US9836540B2 (en) 2014-03-04 2017-12-05 Cisco Technology, Inc. System and method for direct storage access in a content-centric network
US9473405B2 (en) 2014-03-10 2016-10-18 Palo Alto Research Center Incorporated Concurrent hashes and sub-hashes on data streams
US9626413B2 (en) 2014-03-10 2017-04-18 Cisco Systems, Inc. System and method for ranking content popularity in a content-centric network
US9391896B2 (en) 2014-03-10 2016-07-12 Palo Alto Research Center Incorporated System and method for packet forwarding using a conjunctive normal form strategy in a content-centric network
US9407432B2 (en) 2014-03-19 2016-08-02 Palo Alto Research Center Incorporated System and method for efficient and secure distribution of digital content
US9916601B2 (en) 2014-03-21 2018-03-13 Cisco Technology, Inc. Marketplace for presenting advertisements in a scalable data broadcasting system
US9363179B2 (en) 2014-03-26 2016-06-07 Palo Alto Research Center Incorporated Multi-publisher routing protocol for named data networks
US9363086B2 (en) 2014-03-31 2016-06-07 Palo Alto Research Center Incorporated Aggregate signing of data in content centric networking
US9716622B2 (en) 2014-04-01 2017-07-25 Cisco Technology, Inc. System and method for dynamic name configuration in content-centric networks
US10075521B2 (en) 2014-04-07 2018-09-11 Cisco Technology, Inc. Collection synchronization using equality matched network names
US9473576B2 (en) 2014-04-07 2016-10-18 Palo Alto Research Center Incorporated Service discovery using collection synchronization with exact names
US9390289B2 (en) 2014-04-07 2016-07-12 Palo Alto Research Center Incorporated Secure collection synchronization using matched network names
US9451032B2 (en) 2014-04-10 2016-09-20 Palo Alto Research Center Incorporated System and method for simple service discovery in content-centric networks
US9203885B2 (en) 2014-04-28 2015-12-01 Palo Alto Research Center Incorporated Method and apparatus for exchanging bidirectional streams over a content centric network
US9992281B2 (en) 2014-05-01 2018-06-05 Cisco Technology, Inc. Accountable content stores for information centric networks
US9609014B2 (en) 2014-05-22 2017-03-28 Cisco Systems, Inc. Method and apparatus for preventing insertion of malicious content at a named data network router
US9455835B2 (en) 2014-05-23 2016-09-27 Palo Alto Research Center Incorporated System and method for circular link resolution with hash-based names in content-centric networks
US9276751B2 (en) 2014-05-28 2016-03-01 Palo Alto Research Center Incorporated System and method for circular link resolution with computable hash-based names in content-centric networks
US9516144B2 (en) 2014-06-19 2016-12-06 Palo Alto Research Center Incorporated Cut-through forwarding of CCNx message fragments with IP encapsulation
US9537719B2 (en) 2014-06-19 2017-01-03 Palo Alto Research Center Incorporated Method and apparatus for deploying a minimal-cost CCN topology
US9467377B2 (en) 2014-06-19 2016-10-11 Palo Alto Research Center Incorporated Associating consumer states with interests in a content-centric network
US9426113B2 (en) 2014-06-30 2016-08-23 Palo Alto Research Center Incorporated System and method for managing devices over a content centric network
US9699198B2 (en) 2014-07-07 2017-07-04 Cisco Technology, Inc. System and method for parallel secure content bootstrapping in content-centric networks
US9672116B1 (en) * 2014-07-08 2017-06-06 EMC IP Holding Company LLC Backup using instinctive preferred server order list (PSOL)
US9621354B2 (en) 2014-07-17 2017-04-11 Cisco Systems, Inc. Reconstructable content objects
US9959156B2 (en) 2014-07-17 2018-05-01 Cisco Technology, Inc. Interest return control message
US9590887B2 (en) 2014-07-18 2017-03-07 Cisco Systems, Inc. Method and system for keeping interest alive in a content centric network
US9729616B2 (en) 2014-07-18 2017-08-08 Cisco Technology, Inc. Reputation-based strategy for forwarding and responding to interests over a content centric network
US9535968B2 (en) 2014-07-21 2017-01-03 Palo Alto Research Center Incorporated System for distributing nameless objects using self-certifying names
US9882964B2 (en) 2014-08-08 2018-01-30 Cisco Technology, Inc. Explicit strategy feedback in name-based forwarding
US9503365B2 (en) 2014-08-11 2016-11-22 Palo Alto Research Center Incorporated Reputation-based instruction processing over an information centric network
US9729662B2 (en) 2014-08-11 2017-08-08 Cisco Technology, Inc. Probabilistic lazy-forwarding technique without validation in a content centric network
US9391777B2 (en) 2014-08-15 2016-07-12 Palo Alto Research Center Incorporated System and method for performing key resolution over a content centric network
US9800637B2 (en) 2014-08-19 2017-10-24 Cisco Technology, Inc. System and method for all-in-one content stream in content-centric networks
US9467492B2 (en) 2014-08-19 2016-10-11 Palo Alto Research Center Incorporated System and method for reconstructable all-in-one content stream
US9497282B2 (en) 2014-08-27 2016-11-15 Palo Alto Research Center Incorporated Network coding for content-centric network
US10204013B2 (en) 2014-09-03 2019-02-12 Cisco Technology, Inc. System and method for maintaining a distributed and fault-tolerant state over an information centric network
US9553812B2 (en) 2014-09-09 2017-01-24 Palo Alto Research Center Incorporated Interest keep alives at intermediate routers in a CCN
US10069933B2 (en) 2014-10-23 2018-09-04 Cisco Technology, Inc. System and method for creating virtual interfaces based on network characteristics
US9590948B2 (en) 2014-12-15 2017-03-07 Cisco Systems, Inc. CCN routing using hardware-assisted hash tables
US9536059B2 (en) 2014-12-15 2017-01-03 Palo Alto Research Center Incorporated Method and system for verifying renamed content using manifests in a content centric network
US10237189B2 (en) 2014-12-16 2019-03-19 Cisco Technology, Inc. System and method for distance-based interest forwarding
US9846881B2 (en) 2014-12-19 2017-12-19 Palo Alto Research Center Incorporated Frugal user engagement help systems
US9473475B2 (en) 2014-12-22 2016-10-18 Palo Alto Research Center Incorporated Low-cost authenticated signing delegation in content centric networking
US10003520B2 (en) 2014-12-22 2018-06-19 Cisco Technology, Inc. System and method for efficient name-based content routing using link-state information in information-centric networks
US9660825B2 (en) 2014-12-24 2017-05-23 Cisco Technology, Inc. System and method for multi-source multicasting in content-centric networks
US9832291B2 (en) 2015-01-12 2017-11-28 Cisco Technology, Inc. Auto-configurable transport stack
US9916457B2 (en) 2015-01-12 2018-03-13 Cisco Technology, Inc. Decoupled name security binding for CCN objects
US9946743B2 (en) 2015-01-12 2018-04-17 Cisco Technology, Inc. Order encoded manifests in a content centric network
US9602596B2 (en) 2015-01-12 2017-03-21 Cisco Systems, Inc. Peer-to-peer sharing in a content centric network
US9954795B2 (en) 2015-01-12 2018-04-24 Cisco Technology, Inc. Resource allocation using CCN manifests
US9462006B2 (en) 2015-01-21 2016-10-04 Palo Alto Research Center Incorporated Network-layer application-specific trust model
US9552493B2 (en) 2015-02-03 2017-01-24 Palo Alto Research Center Incorporated Access control framework for information centric networking
US10333840B2 (en) 2015-02-06 2019-06-25 Cisco Technology, Inc. System and method for on-demand content exchange with adaptive naming in information-centric networks
US10075401B2 (en) 2015-03-18 2018-09-11 Cisco Technology, Inc. Pending interest table behavior
US10116605B2 (en) 2015-06-22 2018-10-30 Cisco Technology, Inc. Transport stack name scheme and identity management
US10075402B2 (en) 2015-06-24 2018-09-11 Cisco Technology, Inc. Flexible command and control in content centric networks
DE102015110494B4 (en) 2015-06-30 2021-08-12 Deutsche Telekom Ag Network access device and network service device for providing network access
US10701038B2 (en) 2015-07-27 2020-06-30 Cisco Technology, Inc. Content negotiation in a content centric network
US9986034B2 (en) 2015-08-03 2018-05-29 Cisco Technology, Inc. Transferring state in content centric network stacks
US10610144B2 (en) 2015-08-19 2020-04-07 Palo Alto Research Center Incorporated Interactive remote patient monitoring and condition management intervention system
US9832123B2 (en) 2015-09-11 2017-11-28 Cisco Technology, Inc. Network named fragments in a content centric network
US10355999B2 (en) 2015-09-23 2019-07-16 Cisco Technology, Inc. Flow control with network named fragments
US9977809B2 (en) 2015-09-24 2018-05-22 Cisco Technology, Inc. Information and data framework in a content centric network
US10313227B2 (en) 2015-09-24 2019-06-04 Cisco Technology, Inc. System and method for eliminating undetected interest looping in information-centric networks
US10454820B2 (en) 2015-09-29 2019-10-22 Cisco Technology, Inc. System and method for stateless information-centric networking
US10263965B2 (en) 2015-10-16 2019-04-16 Cisco Technology, Inc. Encrypted CCNx
US9794238B2 (en) 2015-10-29 2017-10-17 Cisco Technology, Inc. System for key exchange in a content centric network
US10009446B2 (en) 2015-11-02 2018-06-26 Cisco Technology, Inc. Header compression for CCN messages using dictionary learning
US9807205B2 (en) 2015-11-02 2017-10-31 Cisco Technology, Inc. Header compression for CCN messages using dictionary
US10021222B2 (en) 2015-11-04 2018-07-10 Cisco Technology, Inc. Bit-aligned header compression for CCN messages using dictionary
CA3005641C (en) * 2015-11-19 2021-10-12 Teloip Inc. System, apparatus and method for providing a virtual network edge and overlay with virtual control plane
US10097521B2 (en) 2015-11-20 2018-10-09 Cisco Technology, Inc. Transparent encryption in a content centric network
US9912776B2 (en) 2015-12-02 2018-03-06 Cisco Technology, Inc. Explicit content deletion commands in a content centric network
US10097346B2 (en) 2015-12-09 2018-10-09 Cisco Technology, Inc. Key catalogs in a content centric network
US10078062B2 (en) 2015-12-15 2018-09-18 Palo Alto Research Center Incorporated Device health estimation by combining contextual information with sensor data
CN105450779B (en) * 2015-12-31 2019-05-21 九阳股份有限公司 The method of one household appliance connection multiserver
US10257271B2 (en) 2016-01-11 2019-04-09 Cisco Technology, Inc. Chandra-Toueg consensus in a content centric network
US9949301B2 (en) 2016-01-20 2018-04-17 Palo Alto Research Center Incorporated Methods for fast, secure and privacy-friendly internet connection discovery in wireless networks
US10305864B2 (en) 2016-01-25 2019-05-28 Cisco Technology, Inc. Method and system for interest encryption in a content centric network
US10043016B2 (en) 2016-02-29 2018-08-07 Cisco Technology, Inc. Method and system for name encryption agreement in a content centric network
US10051071B2 (en) 2016-03-04 2018-08-14 Cisco Technology, Inc. Method and system for collecting historical network information in a content centric network
US10742596B2 (en) 2016-03-04 2020-08-11 Cisco Technology, Inc. Method and system for reducing a collision probability of hash-based names using a publisher identifier
US10038633B2 (en) 2016-03-04 2018-07-31 Cisco Technology, Inc. Protocol to query for historical network information in a content centric network
US10003507B2 (en) 2016-03-04 2018-06-19 Cisco Technology, Inc. Transport session state protocol
US9832116B2 (en) 2016-03-14 2017-11-28 Cisco Technology, Inc. Adjusting entries in a forwarding information base in a content centric network
US10212196B2 (en) 2016-03-16 2019-02-19 Cisco Technology, Inc. Interface discovery and authentication in a name-based network
US11436656B2 (en) 2016-03-18 2022-09-06 Palo Alto Research Center Incorporated System and method for a real-time egocentric collaborative filter on large datasets
US10067948B2 (en) 2016-03-18 2018-09-04 Cisco Technology, Inc. Data deduping in content centric networking manifests
US10091330B2 (en) 2016-03-23 2018-10-02 Cisco Technology, Inc. Interest scheduling by an information and data framework in a content centric network
US10033639B2 (en) 2016-03-25 2018-07-24 Cisco Technology, Inc. System and method for routing packets in a content centric network using anonymous datagrams
US10320760B2 (en) 2016-04-01 2019-06-11 Cisco Technology, Inc. Method and system for mutating and caching content in a content centric network
US9930146B2 (en) 2016-04-04 2018-03-27 Cisco Technology, Inc. System and method for compressing content centric networking messages
US10425503B2 (en) 2016-04-07 2019-09-24 Cisco Technology, Inc. Shared pending interest table in a content centric network
US10027578B2 (en) 2016-04-11 2018-07-17 Cisco Technology, Inc. Method and system for routable prefix queries in a content centric network
US10404450B2 (en) 2016-05-02 2019-09-03 Cisco Technology, Inc. Schematized access control in a content centric network
US10320675B2 (en) 2016-05-04 2019-06-11 Cisco Technology, Inc. System and method for routing packets in a stateless content centric network
US10547589B2 (en) 2016-05-09 2020-01-28 Cisco Technology, Inc. System for implementing a small computer systems interface protocol over a content centric network
US10063414B2 (en) 2016-05-13 2018-08-28 Cisco Technology, Inc. Updating a transport stack in a content centric network
US10084764B2 (en) 2016-05-13 2018-09-25 Cisco Technology, Inc. System for a secure encryption proxy in a content centric network
US10103989B2 (en) 2016-06-13 2018-10-16 Cisco Technology, Inc. Content object return messages in a content centric network
US10305865B2 (en) 2016-06-21 2019-05-28 Cisco Technology, Inc. Permutation-based content encryption with manifests in a content centric network
US10148572B2 (en) 2016-06-27 2018-12-04 Cisco Technology, Inc. Method and system for interest groups in a content centric network
US10009266B2 (en) 2016-07-05 2018-06-26 Cisco Technology, Inc. Method and system for reference counted pending interest tables in a content centric network
US9992097B2 (en) 2016-07-11 2018-06-05 Cisco Technology, Inc. System and method for piggybacking routing information in interests in a content centric network
US10122624B2 (en) 2016-07-25 2018-11-06 Cisco Technology, Inc. System and method for ephemeral entries in a forwarding information base in a content centric network
US10069729B2 (en) 2016-08-08 2018-09-04 Cisco Technology, Inc. System and method for throttling traffic based on a forwarding information base in a content centric network
US10956412B2 (en) 2016-08-09 2021-03-23 Cisco Technology, Inc. Method and system for conjunctive normal form attribute matching in a content centric network
US10033642B2 (en) 2016-09-19 2018-07-24 Cisco Technology, Inc. System and method for making optimal routing decisions based on device-specific parameters in a content centric network
US10212248B2 (en) 2016-10-03 2019-02-19 Cisco Technology, Inc. Cache management on high availability routers in a content centric network
US10447805B2 (en) 2016-10-10 2019-10-15 Cisco Technology, Inc. Distributed consensus in a content centric network
US10135948B2 (en) 2016-10-31 2018-11-20 Cisco Technology, Inc. System and method for process migration in a content centric network
US10243851B2 (en) 2016-11-21 2019-03-26 Cisco Technology, Inc. System and method for forwarder connection information in a content centric network
CN110089052B (en) 2016-12-21 2022-02-08 英国电讯有限公司 Network node and communication network
CN111182034A (en) * 2016-12-29 2020-05-19 北京华为数字技术有限公司 Load balancing method, device and equipment for user online
CN107659473A (en) * 2017-09-28 2018-02-02 努比亚技术有限公司 Connection control method, system, routing server and computer-readable recording medium
US10635334B1 (en) 2017-09-28 2020-04-28 EMC IP Holding Company LLC Rule based data transfer model to cloud
CN107769973B (en) * 2017-10-26 2021-01-26 新华三技术有限公司 Message forwarding method and device
US10754368B1 (en) 2017-10-27 2020-08-25 EMC IP Holding Company LLC Method and system for load balancing backup resources
US10942779B1 (en) 2017-10-27 2021-03-09 EMC IP Holding Company LLC Method and system for compliance map engine
US10834189B1 (en) 2018-01-10 2020-11-10 EMC IP Holding Company LLC System and method for managing workload in a pooled environment
US10509587B2 (en) 2018-04-24 2019-12-17 EMC IP Holding Company LLC System and method for high priority backup
US10769030B2 (en) 2018-04-25 2020-09-08 EMC IP Holding Company LLC System and method for improved cache performance
US10776225B2 (en) * 2018-06-29 2020-09-15 Hewlett Packard Enterprise Development Lp Proactive cluster compute node migration at next checkpoint of cluster cluster upon predicted node failure
DE112019006684T5 (en) * 2019-01-17 2021-11-18 Hewlett Packard Enterprise Development Lp SHORT-TERM LEASE ASSIGNMENT TO REDUCE NETWORK ADDRESS CONFLICTS IN DHCP FAILURE DEPLOYMENT
CN111352716B (en) * 2020-03-10 2024-03-01 深圳市腾讯计算机系统有限公司 Task request method, device and system based on big data and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080181233A1 (en) 2007-01-31 2008-07-31 Alcatel Lucent Redundant far-end pseudo-wire connectivity
EP1981217A1 (en) 2007-04-12 2008-10-15 Nokia Siemens Networks Oy Method for forwarding data packets in an access network and device

Family Cites Families (74)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5621728A (en) * 1994-09-12 1997-04-15 Bell Atlantic Network Services, Inc. Level 1 gateway controlling broadband communications for video dial tone networks
US6470389B1 (en) * 1997-03-14 2002-10-22 Lucent Technologies Inc. Hosting a network service on a cluster of servers using a single-address image
US7290288B2 (en) * 1997-06-11 2007-10-30 Prism Technologies, L.L.C. Method and system for controlling access, by an authentication server, to protected computer resources provided via an internet protocol network
US6516416B2 (en) * 1997-06-11 2003-02-04 Prism Resources Subscription access system for use with an untrusted network
US6122723A (en) * 1998-08-20 2000-09-19 International Business Machines Corporation Switching multi-initiator SCSI devices to a singular target bus
US6330246B1 (en) * 1998-08-21 2001-12-11 International Business Machines Corporation Method and system for switching SCSI devices utilizing an analog multiplexor
US7346695B1 (en) * 2002-10-28 2008-03-18 F5 Networks, Inc. System and method for performing application level persistence
US6615272B1 (en) * 1999-10-20 2003-09-02 Lantronix, Inc. Switch node for connecting a keyboard video mouse to selected servers in a interconnected switch node network
US7197556B1 (en) * 1999-10-22 2007-03-27 Nomadix, Inc. Location-based identification for use in a communications network
US6801533B1 (en) 1999-12-09 2004-10-05 Cisco Technology, Inc. System and method for proxy signaling in a digital subscriber line access multiplexer (DSLAM)
US6981180B1 (en) * 2000-03-16 2005-12-27 Akamai Technologies, Inc. Method and apparatus for testing request-response service using live connection traffic
US6732175B1 (en) * 2000-04-13 2004-05-04 Intel Corporation Network apparatus for switching based on content of application data
JP2001309053A (en) * 2000-04-26 2001-11-02 Nec Corp Ip address assigning system and its processing method
US6604142B1 (en) * 2000-05-05 2003-08-05 Telefonaktiebolaget Lm Ericsson (Publ) Method of filtering responses to gatekeeper discovery multicast request message
US7299291B1 (en) * 2000-05-18 2007-11-20 Akamai Technologies, Inc. Client-side method for identifying an optimum server
US20020078371A1 (en) * 2000-08-17 2002-06-20 Sun Microsystems, Inc. User Access system using proxies for accessing a network
US7325058B1 (en) 2000-11-13 2008-01-29 Cisco Technology, Inc. Method and system for controlling subscriber access in a network capable of establishing connections with a plurality of domain sites
US20020111995A1 (en) * 2001-02-14 2002-08-15 Mansour Peter M. Platform-independent distributed user interface system architecture
US20020129096A1 (en) * 2001-02-14 2002-09-12 Mansour Peter M. Platform-independent distributed user interface client architecture
US7155681B2 (en) * 2001-02-14 2006-12-26 Sproqit Technologies, Inc. Platform-independent distributed user interface server architecture
JP4501310B2 (en) * 2001-05-28 2010-07-14 株式会社日立製作所 Packet transfer device
EP1265414B1 (en) * 2001-06-06 2003-08-27 Alcatel Method for deploying a service and a method for configuring a network element in a communication network
US7328336B2 (en) * 2001-06-26 2008-02-05 Ncipher Corporation Ltd System and method for small-area system data processing
US7774492B2 (en) * 2001-07-26 2010-08-10 Citrix Systems, Inc. System, method and computer program product to maximize server throughput while avoiding server overload by controlling the rate of establishing server-side net work connections
US7047304B2 (en) * 2001-08-14 2006-05-16 The Directv Group, Inc. System and method for provisioning broadband service in a PPPoE network using a configuration domain name
CA2410172A1 (en) * 2001-10-29 2003-04-29 Jose Alejandro Rueda Content routing architecture for enhanced internet services
US7082122B2 (en) * 2001-12-24 2006-07-25 Innomedia Pte Ltd. Method and system for connecting to a proxy server with the lowest workload through a load balancing proxy server
US7161936B1 (en) 2001-12-28 2007-01-09 Cisco Technology, Inc. Method and system for distributing data communications utilizing a crossbar switch
US7484006B2 (en) * 2002-02-22 2009-01-27 Bea Systems, Inc. System and method for server network configuration and addressing
US7376140B1 (en) 2002-03-25 2008-05-20 Cisco Technology, Inc. System and method for assignment of ATM virtual circuits to queues in a DSLAM
US20040028055A1 (en) * 2002-07-26 2004-02-12 Lila Madour Differentiated accounting in a packet data network
US7315553B2 (en) * 2002-08-15 2008-01-01 Alcatel Lucent Integrated server module and method of resource management therefor
US7602788B2 (en) * 2002-11-04 2009-10-13 At&T Intellectual Property I, L.P. Peer to peer SVC-based DSL service
CA2512273C (en) * 2003-01-03 2009-12-15 Snowshore Networks, Inc. High performance transparent call distribution
EP1499066B1 (en) * 2003-07-14 2010-02-24 Alcatel Lucent Method for setting up a connection
US7516211B1 (en) * 2003-08-05 2009-04-07 Cisco Technology, Inc. Methods and apparatus to configure a communication port
JP2005073236A (en) * 2003-08-06 2005-03-17 Matsushita Electric Ind Co Ltd Relay server, relay server service management method, service providing system, and program
CN1286297C (en) * 2003-09-25 2006-11-22 华为技术有限公司 Method of realizing sign delivery of user's position
US20050165885A1 (en) * 2003-12-24 2005-07-28 Isaac Wong Method and apparatus for forwarding data packets addressed to a cluster servers
US7289488B2 (en) * 2004-01-09 2007-10-30 Cisco Technology, Inc. Method for automatically configuring a DSLAM to recognize customer premises equipment
CN101076978B (en) * 2004-01-16 2014-01-01 艾利森电话股份有限公司 Method for distributing loads among servers
JP2005236537A (en) * 2004-02-18 2005-09-02 Nec Access Technica Ltd Voip wireless telephone system and method using wireless lan
FI20045234A0 (en) * 2004-06-21 2004-06-21 Nokia Corp Transmission of data in a communication system
EP1655888A1 (en) * 2004-11-06 2006-05-10 TECON Technologies AG Method and system for identification of a subscriber and of the subscriber line for VoIP connections
JP4614128B2 (en) * 2004-12-10 2011-01-19 日本電気株式会社 Packet delivery system, PAN registration device, PAN management device, and packet transfer device
CN1791053A (en) * 2004-12-13 2006-06-21 杭州华为三康技术有限公司 Method for implementing optimization selection for multi server
US8549149B2 (en) * 2004-12-30 2013-10-01 Citrix Systems, Inc. Systems and methods for providing client-side accelerated access to remote applications via TCP multiplexing
US7688742B2 (en) * 2005-01-14 2010-03-30 Alcatel Lucent System and method for monitoring end nodes using ethernet connectivity fault management (CFM) in an access network
US8086709B2 (en) * 2005-04-04 2011-12-27 Telefonaktiebolaget L M Ericsson (Publ) Method and apparatus for distributing load on application servers
US9088669B2 (en) 2005-04-28 2015-07-21 Cisco Technology, Inc. Scalable system and method for DSL subscriber traffic over an Ethernet network
US7835370B2 (en) 2005-04-28 2010-11-16 Cisco Technology, Inc. System and method for DSL subscriber identification over ethernet network
CN100379316C (en) * 2005-07-05 2008-04-02 华为技术有限公司 Realization method and system for traditional terminal user accessing IMS domain
JP2007020000A (en) * 2005-07-08 2007-01-25 Ntt Docomo Inc Sip server, terminal equipment, subscriber information management device and communication control method
DE102005043239B4 (en) * 2005-09-09 2014-04-10 Nec Europe Ltd. Method for establishing and managing a connection
US9088619B2 (en) 2005-09-14 2015-07-21 Cisco Technology, Inc. Quality of service based on logical port identifier for broadband aggregation networks
US20070104227A1 (en) * 2005-11-07 2007-05-10 Norbert Rivera Distributed digital subscriber line access multiplexers and methods to operate the same
US7986686B2 (en) 2005-11-25 2011-07-26 Cisco Technology, Inc. Techniques for distributing network provider digital content to customer premises nodes
US7694011B2 (en) 2006-01-17 2010-04-06 Cisco Technology, Inc. Techniques for load balancing over a cluster of subscriber-aware application servers
US7639698B1 (en) * 2006-03-01 2009-12-29 Nortel Networks Limited Trusted multimedia communications
US20070280283A1 (en) * 2006-05-31 2007-12-06 Alcatel IGMP (Internet Group Management Protocol) connectivity verification
US8806045B2 (en) * 2006-09-01 2014-08-12 Microsoft Corporation Predictive popular content replication
US7630386B2 (en) * 2006-09-11 2009-12-08 Eci Telecom Ltd. Method for providing broadband communication service
US8004961B1 (en) * 2006-09-28 2011-08-23 National Semiconductor Corporation Independently configurable port redirection in a multi-port ethernet physical layer
US7821941B2 (en) * 2006-11-03 2010-10-26 Cisco Technology, Inc. Automatically controlling operation of a BRAS device based on encapsulation information
US8046479B2 (en) * 2006-11-07 2011-10-25 Telefonaktiebolaget Lm Ericsson (Publ) Media channel management
WO2008070952A1 (en) * 2006-12-14 2008-06-19 Bce Inc Method, system and apparatus for provisioning a communication client
NL1033102C2 (en) * 2006-12-21 2008-06-24 V S N Systemen B V Method for setting up a peer-to-peer connection between two communication media.
US9143558B2 (en) * 2007-05-09 2015-09-22 Radware, Ltd. Geographic resiliency and load balancing for SIP application services
MX2009013862A (en) * 2007-06-19 2010-04-22 Nokia Siemens Networks Oy Methods, apparatuses and computer program product for access domain selection for the media channel and the session control channel.
US8296438B2 (en) * 2007-07-11 2012-10-23 International Business Machines Corporation Dynamically configuring a router to find the best DHCP server
JP2009055327A (en) * 2007-08-27 2009-03-12 Hitachi Ltd Network system
US7716310B2 (en) * 2007-12-21 2010-05-11 Telefonaktiebolaget L M Ericsson (Publ) Method and Internet Protocol Television (IPTV) content manager server for IPTV servicing
US7889665B2 (en) * 2008-02-28 2011-02-15 Alcatel Lucent Bridge port MAC address discovery mechanism in ethernet networks
US8135850B2 (en) * 2008-11-25 2012-03-13 Citrix Systems, Inc. Systems and methods for load balancing real time streaming

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080181233A1 (en) 2007-01-31 2008-07-31 Alcatel Lucent Redundant far-end pseudo-wire connectivity
EP1981217A1 (en) 2007-04-12 2008-10-15 Nokia Siemens Networks Oy Method for forwarding data packets in an access network and device

Also Published As

Publication number Publication date
US20100131660A1 (en) 2010-05-27
US20140325039A1 (en) 2014-10-30
EP2351330A2 (en) 2011-08-03
CN102084638A (en) 2011-06-01
US8782256B2 (en) 2014-07-15
EP2351330B1 (en) 2018-07-25
US9491234B2 (en) 2016-11-08
CN102084638B (en) 2014-02-26
WO2010068237A3 (en) 2010-12-29

Similar Documents

Publication Publication Date Title
US9491234B2 (en) Deterministic session load-balancing and redundancy of access servers in a computer network
US10999125B1 (en) Inter-application communication via signal-routes
US8570857B2 (en) Resilient IP ring protocol and architecture
US9300563B2 (en) Technique for efficiently and dynamically maintaining bidirectional forwarding detection on a bundle of links
US9143439B2 (en) System and method for cluster link aggregation control in a network environment
US20070280232A1 (en) Dynamic delivery of multicast service notification messages
WO2012025063A1 (en) Cross-stratum optimization protocol
KR102050910B1 (en) Method and system to enable re-routing for home networks upon connectivity failure
US9331914B2 (en) Service specific bandwidth policy configuration in data networks
US6771645B1 (en) Packet relaying apparatus
EP3750073B1 (en) A method for seamless migration of session authentication to a different stateful diameter authenticating peer
JP4502692B2 (en) SVC / SPVC with L3IP forwarding
Cisco Bridging and IBM Networking Overview
Cisco Bridging and IBM Networking Overview
Cisco Bridging and IBM Networking Overview
Cisco Bridging and IBM Networking Overview
Cisco Bridging and IBM Networking Overview
Cisco Bridging and IBM Networking Overview
Cisco Bridging and IBM Networking Overview
Cisco Bridging and IBM Networking Overview
Cisco Access and Communication Servers Release Notes for Cisco IOS Release 11.0
Cisco Access and Communication Servers Release Notes for Cisco IOS Release 11.0
Cisco Access and Communication Servers Release Notes for Cisco IOS Release 11.0
JP2017182138A (en) Load balancing system
EP1981217A1 (en) Method for forwarding data packets in an access network and device

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 200980125667.1

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09774993

Country of ref document: EP

Kind code of ref document: A2

WWE Wipo information: entry into national phase

Ref document number: 4994/CHENP/2010

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 2009774993

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE