摘要:
A method and system for multi-bridge LAN aggregation is disclosed. The method includes aggregating a plurality of LANs coupling a host to a first and a second intermediate network device. The system includes an intermediate network device. The intermediate network device includes a multi-bridge engine. The multi-bridge engine includes a tunnel engine coupled to a bridge interconnect port and a first physical port.
摘要:
In one embodiment, a bridge may receive a first convergence proposal on a root port from an upstream adjacent bridge of a computer network, and in response, may transmit a second convergence proposal downstream on each non-edge designated port of the bridge without syncing the non-edge designated ports. The bridge may then return a convergence agreement to the adjacent bridge in response to the non-edge designated ports having received a returned convergence agreement (or in response to having only edge designated ports). Also, according to embodiments, the adjacent bridge blocks a link to the root port until the convergence proposal(s) and agreement(s) travel end-to-end.
摘要:
In one embodiment, a method associated with a multiple I-service registration protocol (MIRP) includes receiving into an 802.1ah I-component an MVRP TCN from an 802.1ad component. The TCN may be received, for example, from an 802.1ad bridge. The TCN may identify an affected service using an S-VID. Therefore, the example method may include identifying the S-VID specified by the TCN. The method may also include identifying I-SIDs related to the S-VID. The I-SIDs may be identified by consulting an S-VID to I-SID translation table associated with the 802.1ah I-component. The method may also include providing an 802.1ah MIRP PDU to another 802.1ah component. The MIRP PDU may be based on the MVRP TCN and on the I-SID.
摘要:
A grand computer network is formed from layer 2 (L2) networking technology in which groups of Provider L2 bridges are organized into formations, and different formations are interconnected via network-network interface (NNI) links. Customer sites are coupled to the formations. Customers identify their traffic, e.g., frames, by labeling or tagging it with a Customer Virtual Local Area Network (VLAN) Identifier (C-VLAN ID) or Customer Service Instance (CSI). Within the formations, the C-VLAN ID is mapped to a Service VLAN ID (S-VLAN ID) or Provider Service Instance (PSI), and the S-VLAN ID is appended to the customer traffic. The PSIs are hierarchical, such that each PSI belongs to at most one other “outer” or higher-level PSI, but may itself own any number of “inner” or lower-level PSIs. As a given frame traverses through the different formations of the Grand Network via the NNI links, the frame acquires an encapsulation, sheds an encapsulation or exchanges its current encapsulation for a different one. Bridges within the formations run a Hierarchical Spanning Tree Program (HSTP) to block intra-formation loops, and a GARP L2-NNI Registration Protocol (GLRP) to block inter-formation loops.
摘要:
A system and method automatically configures the interfaces of an intermediate network device. A discovery process operating at the device detects the identity or type of network entities actually coupled to the device's interfaces. Utilizing the identity or type of detected entities, a look-up is performed to obtain a configuration macro specially defined for each detected network entity. The retrieved configuration macros are executed and applied at the respective interfaces. During operation, the intermediate network device continues to monitor the identity and type of entities actually coupled to its interfaces. If a change is detected, such as an entity moving from a first to a second interface, the specially defined configuration macro for that entity floats from the first to the second interface where it is executed and applied.
摘要:
A method and apparatus for including network security information in a frame is disclosed. Network security information is included in a secure portion of overhead of a frame. The network security information is configured to facilitate network security. A network device configured to process a frame is also disclosed. The frame includes frame security information and network security information. The frame security information is configured to facilitate securing a portion of overhead of the frame, and the network security information is located in the secure portion of the overhead of the frame and is configured to facilitate network security.
摘要:
In one embodiment, a network device receives on a first port a first spanning tree protocol (STP) control message including a first path-tracking field corresponding to a given spanning tree instance in a network. The first path-tracking field includes a value based on one or more other network devices that have propagated the first STP control message. The network device receives on a second port a second STP control message including a second path-tracking field corresponding to the given spanning tree instance. The second path-tracking field includes a value based on one or more other network devices that have propagated the second STP control message. The network device utilizes the values from the first path-tracking field and the second path-tracking field to select a root port for the given spanning tree instance.
摘要:
A system and method creates multiple, symmetric spanning trees within a network. Bridges within the network generate, send and process Spanning Tree Protocol (STP) control messages that are updated as they are propagated across the network to reflect the paths followed by the messages. The bridges, moreover, utilize the path indication value of received STP control messages to compute the spanning trees. The path indication values are preferably derived from the sum of Bridge Identifiers (IDs) corresponding to the bridges through which the STP control message has passed from the root bridge to the current bridge processing the STP control message. Each bridge also tags newly received messages with the Virtual Local Area Network (VLAN) identifier (VID) associated with the spanning tree for which the bridge is the root, thereby causing the messages to follow more optimal paths through the network.
摘要:
In one embodiment, a physical (PHY) layer (lower protocol stack layer) of a device may add a timestamp to a received frame, and pass the frame and timestamp up the protocol stack toward a synchronization (sync) recognition layer (upper protocol stack layer). The sync recognition layer determines whether the frame relates to synchronization, and if so, places the timestamp into a data structure along with a frame association for recovery by followup processing. Conversely, in another embodiment, the sync recognition layer may add to a frame for transmission a frame ID having an indication of whether to timestamp the frame and may pass the frame and frame ID down the protocol stack toward the PHY layer. The PHY layer determines whether the frame ID indicates that the frame is to be timestamped, and if so, places a timestamp corresponding to frame transmission into a data structure with the frame ID.
摘要:
In one embodiment, a transmitting node may be configured to transmit a wireless advertisement frame over a computer network, wherein the frame includes a source address of a reachable node being advertised, a destination address to which the reachable node is to be advertised, a transmitter address of the transmitting node, and a receiver address of a wireless access point to which the wireless advertisement frame is to be received. Also, the wireless access point may be configured to receive the wireless advertisement frame from the network, and in response, transmit a reflected wireless advertisement frame having the source address of the reachable node, the destination address to which the reachable node is to be advertised, a transmitter address of the access point, and a receiver address that indicates the reflected frame is to be accepted by any appropriate receiver excluding the transmitting node.