摘要:
A VRRP router group can operate in either a standard VRRP mode or a distributed gateway mode in which all VRRP routers generate VRRP control packets but transmit those packets only to local access network-side hosts. The rate of VRRP control packet generation may be decreased in the distributed gateway mode relative to the standard mode. Moreover, VRRP router CPUs may cease processing of VRRP control packets in the distributed gateway mode.
摘要:
Embodiments herein include systems and methods for providing a mechanism for tunneled data transport within a dual homed access network. A tunnel manager, at a first network connectivity device in a transport network, identifies the transport network configured to interconnect at least two access networks for transporting data traffic between one or more end stations connected to the access networks. The first network connectivity device is coupled to a first access network. The tunnel manager identifies a second network connectivity device. The second network connectivity device is coupled to the first access network to provide the first access network dual homed access to the transport network via the first and second network connectivity devices. The tunnel manager creates a virtual tunnel that connects the first and second network connectivity devices to a third network connectivity device across the transport network. The virtual tunnel defines a same virtual tunnel having multiple paths such that the third network connectivity device learns a single virtual tunnel for device address learning.
摘要:
A method, apparatus and computer program product for resolving conflicting unicast advertisements in transport network is presented. A particular Backbone Virtual Local Area Network (BVLAN) as a first BVLAN (BVLAN1) on a first network device in a transport network. The first network device receives a first message from a second network device advertising a first Backbone Media Access Channel (BMAC) on a first BVLAN (BMAC1,BVLAN1). The first network device receives a second message from a third network device advertising the (BMAC1,BVLAN1). The (BMAC1,BVLAN1) is assigned to the device of the second network device and the third network device having a lower Identifier (ID) value, wherein the ID value comprises one of the group comprising an Intermediate System to Intermediate System (ISIS) system ID and a Shortest Path Bridging (SPB) bridge ID.
摘要:
Ethernet OAM MEPs are automatically configured in a link state protocol controlled Ethernet network. A node operating in the link state protocol controlled Ethernet network receives a Link State PDU (LSP) containing a TLV having a MEP associated with the Ethernet MAC node ID of a second node in the link state protocol controlled Ethernet network, where the path between the first and second node includes a plurality of links. The node updates a forwarding table to indicate an association between the MEP ID and a Ethernet MAC node ID of the second node. An Ethernet OAM maintenance endpoint is produced in a link state protocol controlled Ethernet network by hashing a Sys-ID to produce a MEP; storing the MEP in a TLV; and forwarding the TLV over the link state protocol controlled Ethernet network in an LSP.
摘要:
An OAM link trace message is sent from a source node to a target node in a link state protocol controlled Ethernet network. The link trace message uses an 802.1ag format except, as a destination address, it uses either the unicast Ethernet MAC node ID of the target node or the multicast destination address of the service instance. Network topology verification in a link state protocol controlled Ethernet network checks the link state protocol database at a node to ascertain the control plane topology view of at least part of the network. One or more Ethernet OAM commands from the node are executed to ascertain the data plane topology view of the same part of the network. The control plane topology view of the network is compared to the data plane topology view of the network to see if they match. An error is flagged if they do not match.
摘要:
Techniques herein include systems and methods that extend functionality of transport networks including Transparent Interconnect of Lots of Links (TRILL) networks. Techniques include using a portion of information within transport device address encapsulation headers for purposes other than identifying source and destination device addresses. The system masks a portion of bits in an address header for an address lookup in forwarding tables of a transport network node. The remaining bits in the address field(s) become free bits that can be used for a variety of application purposes, such as flow identifier selection. By using information fields that already exist in encapsulation headers, such techniques provide additional information without increasing packet size or requiring new protocols. Embodiments can combine Equal-cost multi-path routing (ECMP) functionality, Reverse Path Forwarding (RPF) checks, and Time to live (TTL) protection at the same time.
摘要:
Methods and apparatus provide for a network device(s) employing tree tracer processing of a data packet(s) and/or a response(s) in order to discover and graphically represent all the paths within a hierarchical tree of network devices for multicast traffic flows. Specifically, a first network device receives a data packet. The data packet provides a multicast target MAC address. The first network device forwards the data packet to a plurality of network devices, where each of the plurality of the network devices belong to a multicast group identified according to the multicast target MAC address. Based on receipt of the data packet, the first network device generates and transmits a first response to a source of the data packet. The first response indicates a placement of the first network device with respect to a hierarchical tree of the plurality of network devices belonging to the multicast group.
摘要:
A method, apparatus and computer program product for distribution of routing information used in a transport network is presented. In a transport network having a plurality of edge devices and core devices, a main instance of a protocol is used for shortest path and tree computation. A multicast tree is defined per Virtual Services Network (VSN) to distribute Link State Data Base (LSDB) updates that only apply to members of said VSN. Multicast trees are built using a secondary instance of the control protocol LSDB and wherein each VSN multicast tree represents a separate instance of the secondary instance of the control protocol LSD. LSDB updates are distributed that only apply to members of the VSN using the multicast tree for the VSN.
摘要:
Techniques disclosed herein include features and methods that extend functionality of provider networks including Provider Backbone Bridges (PBB) networks. Techniques include using a portion of information within Ethernet address encapsulation headers for purposes other than identifying source and destination device addresses. The system limits a number of bits in an address header that should be considered by a provider network node when doing an address lookup in forwarding tables of a provider network node, such as by masking the portion of bits or otherwise disregarding that portion of bits during address lookup. The remaining bits in the address field(s) become free bits that can be used for a variety of application purposes, such as flow path selection. By using information fields that already exist in the Mac-In-Mac (MIM) encapsulation header, such Techniques provide additional information without increasing packet size or requiring new protocols.
摘要:
A network node includes a central processor card and a plurality of line cards. Each line card generates a maintenance association end point (MEP) entity that can respond to connectivity fault management (CFM) frames. The MEP entity on each line card periodically generates and transmits a multicast connectivity check message (CCM) to the other line cards in the network node. The CCM includes a card-information TLV and, optionally, a trunk-status TLV. Card-information TLVs include the slot number and card type of the transmitting line card. Trunk-status TLVs include the trunk state of each trunk supported by the transmitting line card. The line cards of the node consider a given line card to be down when three consecutive CCMs from that line card are missed. In response to recognizing a down line card, the other line cards can initiate an action, such as determine the trunks supported by the down line card and trigger a trunk switchover.