摘要:
In one embodiment, non-eligible distance vector protocol paths are used as backup paths. In one embodiment, the distance vector protocol is Enhanced Interior Gateway Protocol (EIGRP) and unless a path is a feasible successor for a destination, the path is not eligible as a backup path. Therefore, if there is no feasible successor, there is no eligible backup path. One embodiment avoids an initial delay in finding a replacement path for traffic by determining and installing a non-eligible backup path (e.g., a path that is not a feasible successor) in one or more forwarding tables. In this manner, the router can immediately forward packets over this non-eligible backup path until, for example, forwarding in the network can converge in light of the primary path being no longer available.
摘要:
In one embodiment, non-eligible distance vector protocol paths are used as backup paths. In one embodiment, the distance vector protocol is Enhanced Interior Gateway Protocol (EIGRP) and unless a path is a feasible successor for a destination, the path is not eligible as a backup path. Therefore, if there is no feasible successor, there is no eligible backup path. One embodiment avoids an initial delay in finding a replacement path for traffic by determining and installing a non-eligible backup path (e.g., a path that is not a feasible successor) in one or more forwarding tables. In this manner, the router can immediately forward packets over this non-eligible backup path until, for example, forwarding in the network can converge in light of the primary path being no longer available.
摘要:
Methods and apparatus for allowing a traffic level switch associated with an automatic protection switching (APS) topology to occur transparently and without reconverging routing are described. According to one aspect of the present invention, a method for providing protection switching configuration information associated with a router arrangement to includes identifying a first interface and a second interface of the router arrangement as an APS group. The method also includes providing information regarding the APS group to a process that implements a routing protocol. Providing the information regarding the group includes identifying the first interface as a primary interface and identifying the second interface as a backup interface that is arranged to protect the primary interface.
摘要:
In one embodiment, a Link State Advertisement (LSA) is received from a first router in a network at a second router in the network. The LSA advertises an address of an interface of the first router. The second router determines whether the LSA includes a transit-only identification that indicates the interface of the first router is a transit-only interface. If the LSA does not include a transit-only identification, the second router installs the advertised address of the interface of the first router in a Router Information Base (RIB) of the second router. If the LSA does include a transit-only identification, the second router declines to install the advertised address of the interface of the first router in the RIB of the second router.
摘要:
In one embodiment, a system, method, and apparatus for preventing excessive transmission of routing information in a communications network occurs by receiving a network routing address at a connection node in a communications network, the network routing address allowing the transmission of data packets from a source node to a destination node in the communications network; determining a longest summary route covering a path to the destination node; creating a list comprising a summary of all neighbor connection nodes of the connection node; and transmitting an update of the longest summary route of the network routing address towards all neighbor nodes advertising a destination address comprising a shorter address prefix, wherein the transmitting process occurs sequentially beginning with a first neighbor connection node entered in the list.
摘要:
In one embodiment, information is signaled between aggregating routers indicating the components of aggregated addresses. This information is used to dynamically leak, or deaggregate, specific parts of the aggregated address space to reduce sub-optimal routing and possibly prevent routing black holes from occurring in a network.
摘要:
A first node of a network may send a multicast discovery message comprising a domain identifier of the first node. The first node may also send a single-hop discovery message to one or more single-hop neighbors of the first node. The single-hop discovery message may comprise the domain identifier of the first node. A plurality of neighbor discovery messages may be received. At least one node of the network may be identified through the neighbor discovery messages. A level of trust may be determined for each identified node of the network based on at least one of the neighbor discovery messages.
摘要:
In one embodiment, a method and apparatus of controlling transmission of data packets in a communications network includes designating all networking devices in a portion of the communications network as either hubs or spokes, communicating a link-state advertisement to each connected hub and spoke in the portion of the communications network, computing a shortest path tree at all the hubs and the spokes based on the link-state advertisement, the computing including truncating the shortest path tree at the hubs only for links leading from the spoke to the hub, creating a routing table at each of the hub and the spoke based on the truncated shortest path tree, and transmitting the data packets in the communications network based on the link-state advertisement. The shortest path tree includes all data transmission routes in the tree except links leading from a spoke to a hub.
摘要:
A first node of a network may send a multicast discovery message comprising a domain identifier of the first node. The first node may also send a single-hop discovery message to one or more single-hop neighbors of the first node. The single-hop discovery message may comprise the domain identifier of the first node. A plurality of neighbor discovery messages may be received. At least one node of the network may be identified through the neighbor discovery messages. A level of trust may be determined for each identified node of the network based on at least one of the neighbor discovery messages.
摘要:
A system for hiding transit-only interfaces in a network. When a routing system is advertising a transit-only interface, the advertisement is marked to indicate the address is a transit-only interface. A routing system receives the advertisement and detects the identifier of the transit-only interface and does not store the address in the Router Information Base of the routing system.