摘要:
Nodes on a link state protocol controlled Ethernet network implement a link state routing protocol such as IS-IS. Nodes assign an IP address or I-SID value per VRF and then advertise the IP addresses or I-SID values in IS-IS LSAs. When a packet is to be forwarded on the VPN, the ingress node identifies the VRF for the packet and performs an IP lookup in customer address space in the VRF to determine the next hop and the IP address or I-SID value of the VRF on the egress node. The ingress node prepends an I-SID or IP header to identify the VRFs and then creates a MAC header to allow the packet to be forwarded to the egress node on the link state protocol controlled Ethernet network. When the packet is received at the egress node, the MAC header is stripped from the packet and the appended I-SID or IP header is used to identify the egress VRF. A customer address space IP lookup is then performed in the identified VRF on the egress node using the information in the client IP header to determine how to forward the packet. Customer reachability information within a VPN may be exchanged between VRFs using iBGP, or directly by using link state protocol LSAs tagged with the relevant I-SID.
摘要:
Multicast capabilities of a link state protocol controlled network are used to accelerate the flooding advertisement of topology change notifications within portions of the network. This flooding mechanism may be particularly efficient in a network with a large number of two-connected nodes such as a ring network architecture. A control plane specific multicast group address is used when flooding topology change notifications, and a process such as reverse path forwarding check is used as an additional control on forwarding of the notification to prevent looping of control plane packets. Two-connected nodes insert a forwarding entry into their FIB to enable frames containing the control message to be forwarded via the data plane on to the downstream node so that propagation of the control message along a chain of two-connected nodes may occur at data plane speeds.
摘要:
Super-absorbent polymer composites and a method for designing the composites are presented. A target weight of aqueous liquid to be absorbed is used in conjunction with a dryness quality value and, optionally, a porosity quality value to define types and masses of both super-absorbent polymer and a substruction meshwork which are intermixed to provide a composite which optimally minimizes free liquid and provides sustained tactile dryness after the targeted weight of aqueous liquid has been absorbed. In one form of the invention, the super-absorbent polymer and/or absorption composite derive from the use of computer-implemented determination of the absorption design-instance parameters.
摘要:
Nodes on an Ethernet network run a link state protocol on the control plane and install shortest path forwarding state into their FIBs to allow packets to follow shortest paths through the network without requiring MAC header replacement at each hop through the network. When a node learns an IP address, it will insert the IP address into its link state advertisement to advertise reachability of the IP address to the other nodes on the network. Each node will add this IP address to its link state database. If a packet arrives at an ingress node, the ingress node will read the IP address, determine which node on the link state protocol controlled Ethernet network is aware of the IP address, and construct a MAC header to forward the packet to the correct node. The DA/VID of the MAC header is the nodal MAC of the node that advertised the IP address. Unicast and multicast IP forwarding may be implemented.
摘要:
A system for interfacing a client system in a first network domain with a Provider Link State Bridging (PLSB) domain includes at least two Backbone Edge Bridges (BEBs) of the PLSB domain. Each BEB is an end-point of a connection in the first network domain to the client system and an end-point of at least a unicast path in the PLSB domain. An inter-node trunk is provided in the PLSB domain for interconnecting the BEBs. A phantom node is defined in the PLSB domain and is notionally located on the inter-node trunk. Each of the BEBs is configured such that: an ingress packet received from the client system via the connection in the first network domain is forwarded through a path notionally rooted at the phantom node; and an egress packet destined for the client system is forwarded to the client system through the connection in the first network domain.
摘要:
A set of critical nodes or links is identified on the network and alternate forwarding state is pre-computed and disseminated within a node such that, upon failure of one of the critical nodes/links, a minimal trigger will cause the alternate forwarding state to be used to forward traffic on the routed Ethernet mesh network. In one embodiment rather than storing full tables of alternate forwarding state, only the changes to the forwarding state required by an identified failure is stored by the network nodes. Upon occurrence of a failure on the network, the identified failure is used to select the alternate forwarding state.
摘要:
Each equal cost path is assigned a path ID created by concatenating an ordered set of link IDs which form the path through the network. The link IDs are created from the node IDs on either set of the link. The link IDs are sorted from lowest to highest to facilitate ranking of the paths. The low and high ranked paths are selected from this ranked list as the first set of diverse paths through the network. Each of the link IDs on each of the paths is then renamed, for example by inverting either all of the high node IDs or low node IDs. After re-naming the links, new path IDs are created by concatenating an ordered set of renamed link IDs. The paths are then re-ranked and the low and high re-ranked paths are selected from this re-ranked list as the second set of diverse paths.
摘要:
A shared (proxy) OAM session is performed in a packet-based network on behalf of a plurality of connections. First and second connections are each routed between respective nodes of the network for carrying data traffic. The second connection shares a portion of the routing of the first connection. The shared OAM session is performed along a path which is co-routed with at least part of the shared portion of the routing of the first connection and the second connection. Failure notification signalling is propagated to an endpoint node of each of the first and second connections when the shared OAM session indicates a failure has occurred. The use of a shared OAM session reduces processing at nodes and reduces OAM traffic. Each connection can be a trunk, such as a PBT/PBB-TE trunk, or a service carried within a trunk.
摘要:
The downstream IP packets of uni-cast services, such as Internet Access or Voice over IP network, are transported over the pseudo wire from service provider nodes at the metro hub to the access edge, whereupon they are converted to be transported on the first mile technology, such as a DSL loop, that serves the subscriber's residence. A television service provider delivers the collection of television channels through the regional network to an intermediate node, herein called the metro edge device. The function of the metro edge for downstream uni-cast traffic is to de-multiplex the downstream pseudo-wires coming on packet trunks from metro hubs, into a greater number of packet trunks leading to access edges. In this invention the metro edge device is operable to unicast individual selected channels to the subscriber's residence by adding copies of the IP packets of the selected channels into the downstream flow of packets in the subscriber's pseudo wire.
摘要:
A method is provided of planning routes and allocating route identifiers in a managed frame-forwarding network. The network comprises a plurality of nodes interconnected by links, with each node being arranged to forward data frames according to a combination of an identifier and a network address carried by a received data frame and forwarding instructions stored at the node. A first step of the method identifies a sub-set of nodes which are core nodes of the network. The remaining nodes are termed outlying nodes. A spanning tree is then built off each of the identified core nodes, with the spanning tree stopping one link short of any other core node. Each spanning tree defines a loop-free path between a core node at the root of the spanning tree and a set of outlying nodes. Connections are planned between roots of the spanning trees and a different identifier is allocated to each planned connection between a pair of spanning trees.