摘要:
A network node includes a central processor card and a plurality of line cards. Each line card generates a maintenance association end point (MEP) entity that can respond to connectivity fault management (CFM) frames. The MEP entity on each line card periodically generates and transmits a multicast connectivity check message (CCM) to the other line cards in the network node. The CCM includes a card-information TLV and, optionally, a trunk-status TLV. Card-information TLVs include the slot number and card type of the transmitting line card. Trunk-status TLVs include the trunk state of each trunk supported by the transmitting line card. The line cards of the node consider a given line card to be down when three consecutive CCMs from that line card are missed. In response to recognizing a down line card, the other line cards can initiate an action, such as determine the trunks supported by the down line card and trigger a trunk switchover.
摘要:
A method, apparatus and computer program product for distribution of routing information used in a transport network is presented. In a transport network having a plurality of edge devices and core devices, a main instance of a protocol is used for shortest path and tree computation. A multicast tree is defined per Virtual Services Network (VSN) to distribute Link State Data Base (LSDB) updates that only apply to members of said VSN. Multicast trees are built using a secondary instance of the control protocol LSDB and wherein each VSN multicast tree represents a separate instance of the secondary instance of the control protocol LSD. LSDB updates are distributed that only apply to members of the VSN using the multicast tree for the VSN.
摘要:
A Shortest Path Bridging (SPB) network provides a multicast traceroute using network identifiers such as IP addresses for the source and destination (multicast group). The network identifiers, which are based on layer 3 (IP) designations of the traced multicast group, are mapped to a network identifier of the multicast group (corresponding to a layer 2, or MAC address) and an associated Virtual Local Area Network (VLAN) which is used to transport the packets belonging to the multicast flow. Therefore, an operator issuing the traceroute command need not be familiar with the layer 2 concepts of the network, but rather need only supply the layer 3 (IP address) designations of the concerned entities.
摘要:
A mirroring configuration employs an alternate usage of an existing messaging protocol and mechanism for propagating mirroring control for remote mirroring of data streams. A source routing entity, i.e. a router or switch through which the mirrored stream passes, identifies the stream as available for monitoring. The enabled stream propagates from a source network device, typically from a router port, to a mirroring destination in addition to the addressed destination. A stream identifier emulates an identifier from an alternate usage, such as a multicast group identifier for a multicast protocol, and activates mirroring by inserting the stream identifier in publish and join messages of the multicast protocol.
摘要:
Techniques disclosed herein include features and methods that extend functionality of provider networks including Provider Backbone Bridges (PBB) networks. Techniques include using a portion of information within Ethernet address encapsulation headers for purposes other than identifying source and destination device addresses. The system limits a number of bits in an address header that should be considered by a provider network node when doing an address lookup in forwarding tables of a provider network node, such as by masking the portion of bits or otherwise disregarding that portion of bits during address lookup. The remaining bits in the address field(s) become free bits that can be used for a variety of application purposes, such as flow path selection. By using information fields that already exist in the Mac-In-Mac (MIM) encapsulation header, such Techniques provide additional information without increasing packet size or requiring new protocols.
摘要:
Techniques disclosed herein include systems and methods for extending an IGMP broadcast domain (multicast domain) across a transport network without implementing IGMP snooping within the core of the transport network, yet while providing efficient transport within the core of the transport network. Techniques include dividing a single IGMP interface into multiple IGMP domains or sub-domains. A separate Querier is then elected for each IGMP domain using the single IGMP interface. Edge nodes of the transport network can be configured as the multiple IGMP Queriers, and then re-distribute sender information via a separate routing protocol. Requests can then be sent using the transport network control messaging or routing protocol instead of IGMP snoop messages to advertise multicast data streams in between the multiple IGMP domains (across the transport network). Traffic can then delivered efficiently between isolated access networks of a single Service Layer 2 Network.
摘要:
A transport network employs dual homing to an access network to provide connectivity from multiple network switches. Dual homing is a mechanism by which an access network employs pair of switches in the transport network as if it were connecting to a single device. Conventional arrangements for defining multiple paths from a transport network to an access network suffer from the shortcomings of potential routing loops, increased hops to the access network, and inability or inconsistency with forwarding to different types of access networks, and may involve redirecting traffic absent faults in the access network. The dual homed network switches identify the type of access network and perform switching logic corresponding to the access network type to provide comprehensive dual-homed support to the access network independently of the type of transport employed in the access network, and employ redirection only if there is a fault in the access network.
摘要:
Ethernet OAM MEPs are automatically configured in a link state protocol controlled Ethernet network. A node operating in the link state protocol controlled Ethernet network receives a Link State PDU (LSP) containing a TLV having a MEP associated with the Ethernet MAC node ID of a second node in the link state protocol controlled Ethernet network, where the path between the first and second node includes a plurality of links. The node updates a forwarding table to indicate an association between the MEP ID and a Ethernet MAC node ID of the second node. An Ethernet OAM maintenance endpoint is produced in a link state protocol controlled Ethernet network by hashing a Sys-ID to produce a MEP; storing the MEP in a TLV; and forwarding the TLV over the link state protocol controlled Ethernet network in an LSP.
摘要:
An OAM link trace message is sent from a source node to a target node in a link state protocol controlled Ethernet network. The link trace message using an 802.1ag format except, as a destination address, it uses either the unicast Ethernet MAC node ID of the target node, or the multicast destination address of the service instance. A method of network topology verification in a link state protocol controlled Ethernet network checks the link state protocol database at a node to ascertain the control plane topology view of at least part of the network. It then executes one or more Ethernet OAM commands from the node to ascertain the data plane topology view of the same part of the network. The control plane topology view of the network is compared to the data plane topology view of the network to see if they match. An error is flagged if they do not match.
摘要:
Network and performance monitoring in a link state protocol controlled Ethernet network. A first node receives a network layer monitoring command from a network layer monitoring requestor. The monitoring command is directed to a second node. The first node resolves the network layer monitoring command into one or more Ethernet OAM command(s); The first node sends the Ethernet OAM command(s) to the second node, receives the results of the Ethernet OAM command(s) from the second node; and returns the results of the Ethernet OAM command(s) in the form of a network layer response to the network layer monitoring requestor. Furthermore, network layer monitoring commands may be one or more performance monitoring commands, and the Ethernet OAM commands can include Y.1731 commands. An IP flow can be adjusted between the first node and the second node in response to the network layer response returned to the network layer monitoring requestor.