Using Security Levels in Optical Network
First Claim
1. A method of path computation through nodes of a communications network from an ingress node to an egress node, to meet a desired security level against unauthorised physical access to the path, the method having the steps of:
- receiving a request for selection of a new path through the nodes and links of the network, using a record of a connectivity of the nodes and links and having indications of a security level associated with at least some parts of the nodes and links, the security level being indicative of security against unauthorised physical access to the path, andselecting the path according to at least the indications of security level, and according to the desired security level for the path.
1 Assignment
0 Petitions
Accused Products
Abstract
Path computation through nodes of a communications network to meet a desired security level against unauthorised physical access to the path, involves receiving a request (200) for selection of a new path, and using a record (210) of connectivity of the nodes and links with indications of a security level against unauthorised physical access to the path. This can enable the path routing to be made so as to assure a given level of security of the underlying hardware of nodes and links, in networks where not all parts can provide such security. Nodes can report their current security levels to update the record. A previously selected path can be validated by comparing indicated current security levels of the nodes of the path with the desired security level.
24 Citations
20 Claims
-
1. A method of path computation through nodes of a communications network from an ingress node to an egress node, to meet a desired security level against unauthorised physical access to the path, the method having the steps of:
-
receiving a request for selection of a new path through the nodes and links of the network, using a record of a connectivity of the nodes and links and having indications of a security level associated with at least some parts of the nodes and links, the security level being indicative of security against unauthorised physical access to the path, and selecting the path according to at least the indications of security level, and according to the desired security level for the path. - View Dependent Claims (2, 3, 4, 5, 6, 16)
-
-
7. A method of validating a chosen path through nodes of a communications network from an ingress node to an egress node, to meet a desired security level for the path against unauthorised physical access to the path, having the steps of:
-
sending a request to each of the nodes of the chosen path to indicate a security level for at least part of the path through that node, the security level being indicative of security against unauthorised physical access to the path and comparing the indicated security levels for the nodes with the desired level to validate the chosen path. - View Dependent Claims (8, 9, 10)
-
-
11. A method of reporting a current security level at a node to a record of a connectivity of nodes and links of a communications network, the record also having indications of security levels associated with at least some parts of the nodes and links, the method having the steps of:
-
detecting at the node a current level of security against unauthorised physical access to parts of a path through the node, and sending an indication of the detected current level of security to the record, for updating the record with the current security level. - View Dependent Claims (12, 13, 14, 15)
-
-
17. A node of a communications network configured to cooperate with a remote path computation element to validate a chosen path through nodes of the communications network from an ingress node to an egress node, to meet a desired security level for the path against unauthorised physical access to the path, the node having:
-
a security level monitoring part configured to detect a current level of security against unauthorised physical access to parts of the chosen path through the node, an interface part configured to receive a request from the path computation element for an indication of the current security level for at least part of the chosen path through that node, and configured to send the indication to the path computation element in response to the request. - View Dependent Claims (18, 19)
-
-
20. (canceled)
Specification