摘要:
Disclosed herein are various embodiments for constructing an abstract domain topology. In one embodiment, a Path Computation Element (PCE) is configured as a parent PCE to at least one child PCE. Each of the child PCEs is responsible for providing path computational services for a domain. Communication is established between the parent PCE and the at least one child PCE. The parent PCE receives from each of its child PCEs domain connection information corresponding to the domain of each child PCE. The parent PCE builds and maintains an abstract domain topology based on the domain connection information that it receives from its child PCEs. In one embodiment, the domain connection information is communicated from the child PCE to the parent PCE by adding a new notificationtype (NT) and notification-value (NV) to a notification object in a Path Computation Element Communication Protocol (PCEP) notification message.
摘要:
In a first edge node coupled to a first site, a method of migrating control of at least one virtual private network (VPN) to a central controller, the method comprising taking over a native border gateway protocol (BGP) peer session with a second edge node coupled to a second site, using a first software agent: taking over and maintaining a BGP peer session with a second edge node connected to a second site, receiving a VPN label from the central controller and sending the VPN label to the second edge node via the BGP peer session, and receiving first VPN routes from the second site via the BGP peer session and sending the first VPN routes to the central controller.
摘要:
Methods of computing a flooding topology (FT) for a network are presented. The methods include a process for computing a FT that includes all nodes in the network and a process for ensuring that all nodes in the FT have at least two links in the FT. Some of the methods minimize a number of links of the nodes in the FT. Some of the methods also constrain some of the nodes in the FT to a maximum number of links. Some of the methods compute a first FT for nodes whose maximum number of links in the FT equal their number of links in the network, then compute a second FT for remaining nodes in the network, then combines the two FTs to compute a complete FT for the network.