摘要:
In one embodiment, a method includes receiving, by a first autonomous system border router (ASBR) of a first autonomous system (AS), a first plurality of provider-provisioned media access control (B-MAC) addresses via Interior Border Gateway Protocol (I-BGP). Each of first plurality of B-MAC addresses is associated with a provider edge (PE) device of the first AS. The first ASBR sends the first plurality of B-MAC addresses to a second ASBR of a second AS using Exterior Border Gateway Protocol (E-BGP). The first ASBR also receives via E-BGP a second plurality of B-MAC addresses each of which is associated with a PE device of the second AS. The first ASBR then distributes the second plurality of B-MAC addresses to each of the PE devices of the first AS using I-BGP.
摘要:
In one embodiment, a method includes receiving, by a first autonomous system border router (ASBR) of a first autonomous system (AS), a first plurality of provider-provisioned media access control (B-MAC) addresses via Interior Border Gateway Protocol (I-BGP). Each of first plurality of B-MAC addresses is associated with a provider edge (PE) device of the first AS. The first ASBR sends the first plurality of B-MAC addresses to a second ASBR of a second AS using Exterior Border Gateway Protocol (E-BGP). The first ASBR also receives via E-BGP a second plurality of B-MAC addresses each of which is associated with a PE device of the second AS. The first ASBR then distributes the second plurality of B-MAC addresses to each of the PE devices of the first AS using I-BGP.
摘要:
In one embodiment, a method includes receiving, by a first autonomous system border router (ASBR) of a first autonomous system (AS), a first plurality of provider-provisioned media access control (B-MAC) addresses via Interior Border Gateway Protocol (I-BGP). Each of first plurality of B-MAC addresses is associated with a provider edge (PE) device of the first AS. The first ASBR sends the first plurality of B-MAC addresses to a second ASBR of a second AS using Exterior Border Gateway Protocol (E-BGP). The first ASBR also receives via E-BGP a second plurality of B-MAC addresses each of which is associated with a PE device of the second AS. The first ASBR then distributes the second plurality of B-MAC addresses to each of the PE devices of the first AS using I-BGP.
摘要:
Various techniques for exchanging control messages in order to gracefully reroute multicast traffic are disclosed. For example, one method involves sending a join message for a multicast group towards a root of a new multicast tree and forwarding multicast traffic, addressed to the multicast group, on a current multicast tree until an acknowledgment corresponding to the join message is received. The new multicast tree can be identified in response to detection of a topology change within the network. Until the acknowledgment is received, multicast traffic that is received via the new multicast tree can be dropped.
摘要:
Methods and apparatus for identifying a best path from a plurality of equal cost paths while accounting for service level agreement (SLA) metrics are disclosed. According to one aspect of the present invention, a method for routing a packet that has a payload using a node includes obtaining the packet, and adding an address of the node to the payload. Adding the address of the node to the payload creates an augmented packet. The method also includes identifying at least one element to which the augmented packet is to be routed, and providing the augmented packet to that element. In one embodiment, the method also includes storing ingress and egress timestamps associated with the node.
摘要:
In one embodiment, a first network device may receive a request for an identifier of at least one target to service a client. The first network device may obtain an identifier of each of two or more targets. The first network device may then determine whether to redirect the request. The first network device may redirect the request to a second network device according to a result of the determining step, where the first network device is in a first autonomous system and the second network device is in a second autonomous system.
摘要:
In one embodiment, an apparatus comprises logic for optimizing network resources usage. The logic is operable to store IGP information, where the IGP information includes a set of attribute values associated with each of a set of content servers. When the logic receives a request for content from a remote peer, the logic determines one or more content servers that can provide the requested content. The logic then retrieves, from the IGP information, a plurality of attribute values associated with a non-looping path from each of the one or more content servers. For each of the one or more content servers, the retrieved attribute values include: one or more capacity values indicating capacities of one or more communication links on the non-looping path from that content server; and one or more utilization values indicating utilizations of the one or more communication links on the non-looping path from that content server. The logic then selects a content server based on the retrieved attribute values, and causes the request for the content to be sent to the selected content server.
摘要:
Customer edge (CE) to CE device verification checks initiate routes from available CEs as a set of path verification messages, destined for remote CE routes serving a remote VPN. An extended community attribute, included among the attributes of the path verification message, stores the identity of the originating CE router. The path verification message propagates across the network, and transports the identity of the originating CE router because the originator identity is not overwritten by successive routing. Upon receipt by the remote CE, the originator is determinable from the extended community attribute. A further reachability field is also included in the extended community attribute and indicates whether per CE or per prefix is appropriate for the particular route in question. In this manner, CE-CE connectivity checks identify CEs which are reachable from other CEs. Accordingly, such a mechanism allows for route reachability aggregation on a per-CE or per-prefix reachability basis.
摘要:
A system receives a packet at a first node. The packet is destined for a second node. The system identifies a full routing node from a plurality of network devices. The full routing node is capable of providing routing information for each of the nodes within the plurality of network devices. The plurality of network devices comprises a subset of nodes, and a subset of full routing nodes. The subset of nodes is not capable of providing routing information for each of the nodes within the plurality of network devices. The system transmits the packet to the full routing node for future transmission to the second node.
摘要:
A method of managing forwarding of data in a first autonomous system (AS) is described. The first AS includes a plurality of border routers having inter-domain links to one or more remote AS's and an associated exterior communications protocol. The border routers use an interior communications protocol with other border routers in the first AS using primary tunnels. The method comprises the steps, performed at a first border router having a primary route via an inter-domain link to a remote AS, of constructing an alternate route to the remote AS via second border router in the first AS, instigating a backup tunnel to the second border router upon failure of the primary route and sending a failure message to the other border routers.