摘要:
In one embodiment, a method associated with a multiple I-service registration protocol (MIRP) includes receiving into an 802.1ah I-component an MVRP TCN from an 802.1ad component. The TCN may be received, for example, from an 802.1ad bridge. The TCN may identify an affected service using an S-VID. Therefore, the example method may include identifying the S-VID specified by the TCN. The method may also include identifying I-SIDs related to the S-VID. The I-SIDs may be identified by consulting an S-VID to I-SID translation table associated with the 802.1ah I-component. The method may also include providing an 802.1ah MIRP PDU to another 802.1ah component. The MIRP PDU may be based on the MVRP TCN and on the I-SID.
摘要:
In one embodiment, a method includes receiving configuration data at a particular node of a first set of multiple nodes. The configuration data includes data that indicates a particular zero or more instances for which the particular node is primary among multiple virtual local area network (VLAN) instances to be forwarded. It is determined whether a VLAN indicated in a data packet received at the particular node is included in the particular instances for which the particular node is primary. If so, then the data packet is forwarded. In another embodiment, multiple nodes are configured to perform as a single virtual node, and the single virtual node is configured to forward data packets for the multiple VLAN.
摘要:
A mechanism that provides congruent forwarding paths for unicast and multicast data traffic over a service provider core network includes issuing, by a receiver edge node, a request to join a multicast tree structure. A unicast path from the receiver edge node to a source node of the provider network is then established using a special message that contains an identifier. The identifier allows the unicast path through the core network to be aligned with the multicast tree structure. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims.
摘要:
A VPLS model is implemented in a network-facing provider edge (n-PE) device configured to receive a packet from an access network; the packet having a first Virtual Local Area Network (VLAN) tag of a first predetermined bit length. The n-PE device mapping the service instance identifier of the first VLAN tag into a second VLAN tag of a second predetermined bit length greater than the first predetermined bit length, the second VLAN tag identifying a Virtual Private LAN Service (VPLS) instance. The n-PE device then sends the packet with the second VLAN tag across a service provider (SP) core network via a pseudowire (PW) that functions as a logical link to another PE device. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. 37 CFR 1.72(b).
摘要:
In one embodiment, a method includes obtaining, at a first provider edge (PE) included a plurality of PEs multi-homed to a first customer edge (CE), traffic intended for the first CE, wherein the traffic includes a first indication, the first indication being configured to identify the traffic as flood traffic. A forwarding PE included in the plurality of PEs suitable to use to forward the traffic to the first CE is identified based on identifying traffic as the flood traffic. The method also includes determining whether the first PE is the forwarding PE, and providing the traffic to the first CE using the first PE when it is determined that the first PE is the forwarding PE. When it is determined that the first PE is not the forwarding PE, the traffic is filtered using the first PE.
摘要:
In one embodiment, a method is provided for congestion mitigation. In this method, a congestion level of data flows along a path is monitored relative to a threshold. Here, each data flow is associated with a flow identifier. Based on detection that the congestion level exceeds the threshold, the flow identifier of a number (e.g., one or more) of the data flows is changed to a different flow identifier. This change results in the number of the data flows redirected to a different path. In an alternate embodiment, another method is provided for congestion avoidance. In this method, a data flow transmitted along a single path is received, and the data flow is split into multiple micro data flows. A different flow identifier is then assigned to each micro data flow. This change results in the multiple micro data flows distributed along multiple different paths.
摘要:
A first multicast data packet can be received by a particular edge node, forwarded from another network element in a network, the first packet including data received from a particular device interfacing with the network through a first edge node. The first packet is multicast by the first edge node. The particular edge node is included in a redundancy group including at least one other edge node. The first multicast data packet is examined to identify a first hint corresponding to the particular device. In response to identifying the particular device, it is determined that the particular edge node does not interface with the particular device. It is further determined that the particular edge node is designated as a forwarding node for the redundancy group. Based on these determinations, the first packet is forwarded by the particular edge node while preventing looping and duplicate packet delivery.
摘要:
In one embodiment, a method includes obtaining an indication that a device is attached to a provider edge. The device has a media access control (MAC) address, wherein the device was previously attached to a first provider edge (PE) of a Multiprotocol Label Switching (MPLS) network. The method also includes issuing a first advertisement that identifies the MAC address. The first advertisement includes a first MAC address mobility attribute arranged to indicate a number of times the MAC address has moved with respect to the MPLS network.
摘要:
A provider edge (PE) node of a network operates to send a trace path message over the network to a receiver PE node, the trace path message recording a list of intermediate nodes of a unicast path from the PE node to the receiver PE node; and receive a join message initiated from the receiver PE node, the join message using the list to propagate to the source PE node through the intermediate nodes such that a branch of a multicast tree is aligned with the unicast path. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. 37 CFR 1.72(b).
摘要:
In certain embodiments, monitoring a flow set to detect faults includes identifying, by a first maintenance end point, a flow set comprising flows that utilize a paths from the first maintenance end point through one or more intermediate nodes to a second maintenance end point. Continuity check messages are generated. Each continuity check message is formatted as a data packet that an intermediate node forwards. Each continuity check message comprises a header comprising a maintenance indicator. The continuity check messages are transmitted on the flows to allow the second maintenance end point to monitor the paths.