Bit Indexed Explicit Replication For Professional Media Networks
First Claim
Patent Images
1. A method comprising:
- receiving a first bit string at a node;
encapsulating a first packet with the first bit string;
forwarding the first packet;
receiving a second bit string at the node;
selecting the second bit string;
encapsulating the second packet with the second bit string; and
forwarding the second packet.
1 Assignment
0 Petitions
Accused Products
Abstract
Various systems and methods for performing bit indexed explicit replication (BIER). For example, one method involves receiving a first bit string at a node, encapsulating a packet with the first bit string, and forwarding the packet. The method also involves receiving a second bit string at the node and selecting the second bit string. The method also involves encapsulating a second packet with the second bit string and forwarding the second packet.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving a first bit string at a node; encapsulating a first packet with the first bit string; forwarding the first packet; receiving a second bit string at the node; selecting the second bit string; encapsulating the second packet with the second bit string; and forwarding the second packet. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system comprising:
a first node configured to receive a first bit string at a node; encapsulate a first packet with the first bit string; forward the first packet; receive a second bit string at the node; select the second bit string; encapsulate the second packet with the second bit string; and forward the second packet. - View Dependent Claims (10, 11, 12, 13, 14)
-
15. A non-transitory computer readable storage medium comprising executable instructions, wherein a method is implemented in response to executing the instructions, the method comprising:
-
receiving a first bit string at a node; encapsulating a first packet with the first bit string; forwarding the first packet; receiving a second bit string at the node; selecting the second bit string; encapsulating the second packet with the second bit string; and forwarding the second packet. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification