Shared Risk Group Vicinities and Methods
First Claim
1. A method of managing risk in a network, comprising:
- computing a first path between a source and a destination within the network;
computing a second path between the source and the destination within the network; and
comparing a first location of a first network element in the first path to a second location of a second network element in the second path, the first location is based on a first location-based risk identifier assigned to the first network element prior to computation of the first path, the second location is based on a second location-based risk identifier assigned to the second network element prior to computation of the second path, and the first network element and the second network element have a shared risk when the first location is within a predetermined threshold distance of the second location.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of managing risk in a network including computing a first path between a source and a destination within the network, computing a second path between the source and the destination within the network, comparing a first risk zone of a first network element in the first path to a second risk zone of a second network element in the second path, the first risk zone is based on a first location-based risk identifier assigned to the first network element prior to computation of the first path, the second risk zone is based on a second location-based risk identifier assigned to the second network element prior to computation of the second path, and an overlap of the first risk zone and the second risk zone indicates that the first network element and the second network element have a shared risk.
-
Citations
20 Claims
-
1. A method of managing risk in a network, comprising:
-
computing a first path between a source and a destination within the network; computing a second path between the source and the destination within the network; and comparing a first location of a first network element in the first path to a second location of a second network element in the second path, the first location is based on a first location-based risk identifier assigned to the first network element prior to computation of the first path, the second location is based on a second location-based risk identifier assigned to the second network element prior to computation of the second path, and the first network element and the second network element have a shared risk when the first location is within a predetermined threshold distance of the second location. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of managing risk in a network, comprising:
-
computing a first path between a source and a destination within the network; computing a second path between the source and the destination within the network; and comparing a first risk zone of a first network element in the first path to a second risk zone of a second network element in the second path, the first risk zone is based on a first location-based risk identifier assigned to the first network element prior to computation of the first path, the second risk zone is based on a second location-based risk identifier assigned to the second network element prior to computation of the second path, and an overlap of the first risk zone and the second risk zone indicates that the first network element and the second network element have a shared risk. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A risk management device for managing risk in a network, comprising:
-
a processor operably coupled to a memory; and a risk management module stored in memory that, when executed by the processor, is configured to; compute a first path between a source and a destination within the network; compute a second path between the source and the destination within the network; and compare a first risk zone of a first network element in the first path to a second risk zone of a second network element in the second path, the first risk zone is based on a first location-based risk identifier assigned to the first network element prior to computation of the first path, the second risk zone is based on a second location-based risk identifier assigned to the second network element prior to computation of the second path, and an overlap of the first risk zone and the second risk zone indicates that the first network element and the second network element have a shared risk. - View Dependent Claims (19, 20)
-
Specification