摘要:
Customer virtual local area networks (C-VLANs) connecting multiple LAN segments are set up through a provider network (12). Provider edge bridges (PEs) are coupled to customer edge bridges (CEs) to provide a transparent link between LAN segments. To determine whether a backdoor link is used in the C-VLAN topology, PEs monitor MAC address from a predetermined time after a TCN is received to determine if there are contradictory addresses or new addresses relative to the existing MAC address tables (or forwarding databases) that are indicative of a backdoor link. If so, an unlearning message is sent to bridges in the provider domain. In another embodiment, CEs set a snoop bit to indicate which TCNs must be snooped.
摘要:
A Layer 2 device configured for providing at least one of bridging and switching functionality in a local area network comprising computer readable instructions for providing GVRP functionality and computer-readable instructions for limiting the number of dynamic VLANs that the GVRP functionality creates on a Layer 2 device of a local area network and on all ports of a data plane card of the Layer 2 device.
摘要:
A manner of providing for re-convergence in a dual homing network following the failure of one of the dual homing links. When such a failure is detected, the port roles are recomputed using an xSTP protocol. Prior to the completion of the computation, the operEdge variable is set to true, typically resulting in a more rapid re-convergence that may achieve sub 50 ms performance. When the computation is complete, the operEdge variable is reset to “false. The xSTP protocol may be, for example, RSTP or MSTP. The invention may be implemented in a CE device attached to a VPLS core or other network, and may be used in a LAG environment.
摘要:
A protocol for discovering a silent device, such as a printer, attached to a mobile port of a switching node. A command is transmitted to the switching node for associating an IP address for the silent device to a particular virtual local area network (VLAN). Entry of the command causes the switching node to start searching for the silent device on the mobile ports. As part of the searching process, an ARP request with the IP address provided in the command is sent to each mobile port of the switching node. When the silent device responds with its MAC address in an ARP reply message, the MAC address is learned in a layer 2 table used for making forwarding decisions of data units received by the switching node. Furthermore, the port where the silent device was discovered, that is, the port receiving the ARP reply message, is associated with the VLAN of the silent device.
摘要:
In a method for enabling facilitation of re-convergence, designation information for a first port of each one of a plurality of bridges in a multi-bridge ring is received and designation information for a second port of each one of a plurality of bridges in a multi-bridge ring is received. The first port of each one of a plurality of bridges is a first direction Ring Rapid Spanning Tree Protocol (RRSTP) port and the second port of each one of a plurality of bridges is a second direction RRSTP port. The first direction around the ring (e.g., a forward direction) is opposite the second direction around said ring (e.g., a backward direction). A first reserved MAC address is associated with the first direction port of each one of the bridges and a second reserved MAC address is associated with the second direction port of each one of the bridges.
摘要:
A bridge (e.g., IEEE 802.1 bridge) and a method are described herein which ensure the proper propagation of a “cut” within a bridged network (e.g., Ethernet-based bridged network). In one embodiment, the bridge has a port role transitions (PRT) state machine which uses a first condition represented as (proposed && !agree) to transit to an X_PROPOSED state and a second condition represented as (! proposed && allSynced && !agree) ∥ (proposed && agree) to transit to an X_AGREED state (where X represents “ROOT”, “ALTERNATE” and “MASTER”). The first condition and the second condition are both defined such that the X_PROPOSED state is always entered before the X_AGREED state which ensures the proper propagation of a “cut” within the bridged network.
摘要:
A Layer 2 device configured for providing at least one of bridging and switching functionality in a local area network comprising computer readable instructions for providing GVRP functionality and computer-readable instructions for limiting the number of dynamic VLANs that the GVRP functionality creates on a Layer 2 device of a local area network and on all ports of a data plane card of the Layer 2 device.