Abstract:
Various systems and methods for performing fast fail-over. For example, one method involves electing a first node as a designated forwarder node and electing a second node as a backup designated forwarder node, where the designated forwarder node is used to forward at least a first packet to a downstream node. The method further involves detecting a loss of connectivity between the designated forwarder node and a downstream receiver node, where the designated forwarder node and the backup designated forwarder node are both elected prior to the loss of connectivity occurring. Moreover, subsequent to detecting the loss of connectivity, the method uses the backup designated forwarder node to forward at least a second packet to the downstream receiver node.
Abstract:
Various systems and methods for bypassing one or more non-capable nodes. For example, one method involves a capable node determining that an adjacent node is non-capable, where capable nodes are configured to implement a data plane capability and non-capable nodes are not. The method then involves identifying a downstream node that is capable. The downstream node is on a shortest path. The method also involves generating information that identifies a tunnel to the downstream node.
Abstract:
In one embodiment, a device in a network sends a first multicast message to a plurality of destinations in the network. The first multicast message includes a first bitmap that identifies the destinations. The device receives one or more acknowledgements from a subset of the destinations. The device determines a retransmission bitmap that identifies those of the plurality of destinations that did not acknowledge the first multicast message, based on the received one or more acknowledgements. The device sends a retransmission multicast message to those of the plurality of destinations that did not acknowledge the first multicast message. The retransmission multicast message includes the retransmission bitmap.
Abstract:
In one embodiment, a first device in a multicast label distribution (mLDP) network receives a first label mapping message that includes IPv4 and IPv6 addresses of a root node of a multicast tree. The first device also receives a second label mapping message from a second device that identifies the multicast tree and includes one of: the IPv4 address or the IPv6 address of the root node. The first device determines that the second label mapping message is associated with the multicast tree. In response to determining that the second label mapping message is associated with the multicast tree, the first device adds the second device to the multicast tree.
Abstract:
Various systems and methods for performing fast fail-over. For example, one method involves receiving a packet at a node. The packet is received at the node in response to a designated forwarder (DF) detecting loss of communication between the DF and a receiver node. The method also involves determining that the first packet was received via a tunnel. The method also involves forwarding the first packet and initiating a DF election. Forwarding the first packet and initiating the DF election are performed in response to determining that the first packet was received via the tunnel.
Abstract:
Various systems and methods for preventing loops. For example, one method involves receiving a multicast data packet at a node. The node is coupled to a local area network (LAN). An internet protocol (IP) prefix is assigned to the LAN. The method involves determining whether a source address included in the packet is covered by the IP prefix. Depending on the direction of travel of the multicast data packet and whether or not the source address is covered by the IP prefix, the node determines whether a loop exists.
Abstract:
Various systems and methods for preventing loops. For example, one method involves receiving a multicast data packet at a node. The node is coupled to a local area network (LAN). An internet protocol (IP) prefix is assigned to the LAN. The method involves determining whether a source address included in the packet is covered by the IP prefix. Depending on the direction of travel of the multicast data packet and whether or not the source address is covered by the IP prefix, the node determines whether a loop exists.
Abstract:
Various systems and methods for performing fast fail-over. For example, one method involves receiving a packet at a node. The packet is received at the node in response to a designated forwarder (DF) detecting loss of communication between the DF and a receiver node. The method also involves determining that the first packet was received via a tunnel. The method also involves forwarding the first packet and initiating a DF election. Forwarding the first packet and initiating the DF election are performed in response to determining that the first packet was received via the tunnel.
Abstract:
Various systems and methods for performing bit indexed explicit replication (BIER). For example, one method involves receiving a first bit string at a node, encapsulating a packet with the first bit string, and forwarding the packet. The method also involves receiving a second bit string at the node and selecting the second bit string. The method also involves encapsulating a second packet with the second bit string and forwarding the second packet.
Abstract:
Methods and network devices are disclosed for traffic-engineered forwarding through a new form of bit indexed explicit replication. In one embodiment, a method includes receiving at a first node in a network a message comprising a message bit array, and comparing bit values at one or more bit positions in the message bit array to one or more entries in a forwarding table stored at the first node. The one or more bit positions correspond in this embodiment to links in the network. This embodiment of the method further includes forwarding the message over a link represented in the forwarding table if a result of the comparing indicates that the link is included in a path to be taken by the message. In a further embodiment of the method, the message is a multicast message and forwarding the message comprises forwarding a replica of the multicast message.