摘要:
A switch discovers active neighboring peer devices of a switch. Such discovery includes facilitating communication of Link Aggregation Control Protocol Data Units (LACPDUs) for identifying a unique peer identifier assigned to each one of the neighboring peer devices. In response to discovering the active neighboring peer devices, the switch automatically assigning a link aggregation key to each one of a plurality of physical links over which the switch and one of the active neighboring peer devices communicate respective ones of the LACPDUs. Thereafter, the switch facilitates logically aggregation all of the physical links dependent upon the link aggregation key.
摘要:
A stack switch for performing pass-through forwarding operations, assigning stack switch identifiers to a plurality of stack switches, temporarily disabling supervision messages exchanged by stack switches, and electing a primary master stack switch is disclosed. In the pass-through mode, the stack switch automatically forwards packets between stack ports independent of their destination address to maintain connectivity between adjacent stack switches while conventional bridging and routing operations are disabled. The sequential identifiers are also preferably assigned in accordance with the sequential position of the various stack switches to better reflect the topology of those switches. The switch is also preferably adapted to temporarily disable the transmission of supervision messages between stack switches to prevent re-assignment of network management functions when switch resources are low. The switch may execute a stack switch identifier numbering scheme based on the time the switch became operational.
摘要:
A micro-mobility network routing system and method implementing a protocol that extends the macro mobility support of Mobile IP to support micro mobility is disclosed which permits a more efficient and easily implemented Internet routing protocol for network devices to be affected. The macro mobility feature herein refers to the notion in which the mobile node gains access to the Internet, while retaining the same IP address. This concept is used only once when the mobile node enters the coverage area of a foreign domain (eventually its home domain). The concept of micro mobility within this context eases routing packets to the mobile node while its moves within the foreign network. The present invention implements these new features via the use of message compositions and protocol extensions that extend the prior art Mobile IP protocols.
摘要:
A stack switch for performing pass-through forwarding operations, assigning stack switch identifiers to a plurality of stack switches, temporarily disabling supervision messages exchanged by stack switches, and electing a primary master stack switch is disclosed. In the pass-through mode, the stack switch automatically forwards packets between stack ports independent of their destination address to maintain connectivity between adjacent stack switches while conventional bridging and routing operations are disabled. The sequential identifiers are also preferably assigned in accordance with the sequential position of the various stack switches to better reflect the topology of those switches. The switch is also preferably adapted to temporarily disable the transmission of supervision messages between stack switches to prevent re-assignment of network management functions when switch resources are low. The switch may execute a stack switch identifier numbering scheme based on the time the switch became operational.
摘要:
The invention integrates a plurality of separate stack switches into a unified system of switches under a common configuration and management architecture. The switches, preferably stack switches, may be distributed throughout a local area network (LAN) and need not be co-located. One preferred embodiment supports fail-safe operations to minimize the disruption caused when a stack switch becomes inoperative. In another preferred embodiment, the stack switches are enabled with a system-wide address table and quality of service mapping matrix with which each switch can effectively provision system bandwidth.
摘要:
A stack switch for performing pass-through forwarding operations, assigning stack switch identifiers to a plurality of stack switches, temporarily disabling supervision messages exchanged by stack switches, and electing a primary master stack switch is disclosed. In the pass-through mode, the stack switch automatically forwards packets between stack ports independent of their destination address to maintain connectivity between adjacent stack switches while conventional bridging and routing operations are disabled. The sequential identifiers are also preferably assigned in accordance with the sequential position of the various stack switches to better reflect the topology of those switches. The switch is also preferably adapted to temporarily disable the transmission of supervision messages between stack switches to prevent re-assignment of network management functions when switch resources are low. The switch may execute a stack switch identifier numbering scheme based on the time the switch became operational.
摘要:
A stack switch for performing pass-through forwarding operations, assigning stack switch identifiers to a plurality of stack switches, temporarily disabling supervision messages exchanged by stack switches, and electing a primary master stack switch is disclosed. In the pass-through mode, the stack switch automatically forwards packets between stack ports independent of their destination address to maintain connectivity between adjacent stack switches while conventional bridging and routing operations are disabled. The sequential identifiers are also preferably assigned in accordance with the sequential position of the various stack switches to better reflect the topology of those switches. The switch is also preferably adapted to temporarily disable the transmission of supervision messages between stack switches to prevent re-assignment of network management functions when switch resources are low. The switch may execute a stack switch identifier numbering scheme based on the time the switch became operational.
摘要:
A protocol for discovering a silent device, such as a printer, attached to a mobile port of a switching node. A command is transmitted to the switching node for associating an IP address for the silent device to a particular virtual local area network (VLAN). Entry of the command causes the switching node to start searching for the silent device on the mobile ports. As part of the searching process, an ARP request with the IP address provided in the command is sent to each mobile port of the switching node. When the silent device responds with its MAC address in an ARP reply message, the MAC address is learned in a layer 2 table used for making forwarding decisions of data units received by the switching node. Furthermore, the port where the silent device was discovered, that is, the port receiving the ARP reply message, is associated with the VLAN of the silent device.
摘要:
The invention is a method and apparatus for registering a mobile node in both home and in foreign domains. A base station informs a base station router of the presence of a mobile entering the base station's coverage area by sending a mobile node advertisement message to a base station router. In addition, the mobile node sends a mobile IP registration request to the base station router. The base station router appends a base station router extension message to the mobile IP registration request (which contains an IP address of the base station router) and forwards the mobile IP registration request to a main access router. The main access router appends a multicast address extension to the mobile IP registration reply. The multicast address extension contains the multicast address allocated for the mobile node.
摘要:
System and method for implementing a port mapping technique in a switch of a communications network, wherein the switch includes a plurality of ports including user ports and network ports, are described. In one embodiment, the method comprises identifying a first portion of the ports as user ports; identifying a second portion of the ports as network ports; assigning a plurality of the user ports to a first session; and preventing user ports assigned to the first session from interacting with one another.