摘要:
A system and method for identifying and forwarding traffic to/from Digital Subscriber Line Access Multiplexer (DSLAM) devices and feature servers without ambiguity includes a user-facing provider edge (u-PE) device that receives a customer frame from a DSLAM device, the customer frame being of a first format that includes a first Virtual Local Area Network (VLAN) tag of a first bit length. The first VLAN tag identifies a Digital Subscriber Line (DSL) subscriber. The customer frame is re-formatted by the u-PE device such that the first VLAN tag is mapped to a second VLAN tag of a second bit length greater than the first bit length, the second VLAN tag identifying a service instance of the Ethernet access network. The u-PE device encapsulating the customer frame inside a provider frame, with a provider source Media Access Control (MAC) address represents a MAC address associated with the DSLAM, and a provider destination MAC address represents a MAC address of a destination device.
摘要:
In one embodiment, a method includes determining when a predetermined period of time has elapsed, and determining whether at least a first message has been obtained on a first port of a node during the predetermined period of time when it is determined that the predetermined period of time has elapsed. The method also includes identifying the first port as being connected to a single-homed site when it is determined that the at least first message has not been obtained on the first port during the predetermined period of time. The first port is identified as being connected to a multi-homed network, a multi-homed device, or a hierarchical Ethernet segment when it is determined that the at least first message has been obtained on the first port during the predetermined period of time.
摘要:
A technique is provided for mitigating loops in Ethernet networks. A first port in an Ethernet device receives an Ethernet frame. The frame includes a source identifier, a destination identifier, and a Virtual Local Area Network Identifier (VLAN ID). According to various embodiments, the VLAN ID (VID) has the encoding of both a community group as well as a source bridge ID. A VID database is accessed using the destination identifier and the VID to determine whether the first port has ingress enabled. A filtering database is accessed to determine an egress port for forwarding the Ethernet frame.
摘要:
Methods, systems, and apparatus, including computer programs encoded on a storage media, for preventing looping and duplicate frame delivery in a network environment. A first control plane message is received from a first edge node in a plurality of edge nodes in a plurality of network elements of a network, the first control plane message identifying a first hint to be included in first multicast packets that include data originating from a first computing device interfaced with the first edge node and are forwarded to the network through the first edge node. A data record is stored identifying the association between the first hint and the first computing device. The data record is used to determine that multicast packets including the first hint originate from the first computing device and are not to be forwarded to the first computing device by edge nodes interfacing with the first computing device.
摘要:
An example method is provided that includes determining whether an address resolution protocol reply from a local machine has been received at an edge node; updating a local cache based on the reply from the local machine; and sending the reply to a plurality of edge nodes through a data plane of a data center interconnect. In more specific implementations, the method can include determining whether an address resolution protocol request has been received from the local machine. The method could also include updating a local machine cache based on the request. In certain implementations, the method can include determining whether the request is targeting the local machine; and dropping the request if the request is targeting the local machine. The method could also include sending the request through the data center interconnect if the request is not targeting the local machine.
摘要:
In one embodiment, a network device in a set of network devices obtains a pseudowire label for a Provider Edge (PE) device, where the pseudowire label corresponds to a Virtual Local Area Network (VLAN) on the PE device. In addition, the network device obtains a set of one or more MAC addresses reachable via the PE device, wherein the set of network devices support Ethernet Virtual Private Network (E-VPN) and are in the same redundancy group such that the set of network devices are coupled to the same customer edge device. The network device stores the pseudowire label in association with the set of one or more MAC addresses. The network device uses the pseudowire label to encapsulate traffic associated with the VLAN that is received from the customer edge device and destined to the set of MAC addresses reachable via the PE device.
摘要:
A method and system for redundancy in Ethernet Virtual Connections (EVCs) are disclosed. In one embodiment, a method includes transmitting continuity check messages from a node in an Ethernet Virtual Connection connecting at least one root node and a plurality of leaf nodes in a point-to-multipoint or multipoint-to-multipoint connection, identifying a failure in a primary path between the root node and the leaf nodes, switching to a backup path, and advertising the switching to the backup path to at least one node.
摘要:
A DSLAM aggregation topology VLAN bundling mechanism includes an edge device port that receives a packet from a Digital Subscriber Line Access Multiplexer (DSLAM) device, the packet including an inner Virtual Local Area Network (VLAN) tag that identifies a Digital Subscriber Line (DSL) subscriber. A processor of the edge device adds an outer VLAN tag to the packet, the outer VLAN tag identifying the DSLAM and a destination server coupled to an Ethernet access network. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. 37 CFR 1.72(b).
摘要:
In one embodiment, a system comprises a plurality of provider edge (PE) devices, the PE devices having a plurality of ports; and a pseudo-link aggregation control protocol (LACP) module instantiated for each of the ports. The pseudo-LACP module allows the PE devices to support dual-homing of an access side, the access side including either an access node or an access network, without running any control protocol for redundancy on the access side.
摘要:
In one embodiment, a Provider Backbone Edge Bridge (BEB) IEEE 802.1ah compliant apparatus includes a B-component having one or more provider backbone ports, and a first I-component coupled with the B-component, the first I-component being configured to support a S-tagged interface. A second I-component is also coupled with the B-component, the second I-component being configured to support a C-tagged interface, thereby facilitating direct connection to a device operating in compliance with IEEE 802.1Q specification. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure.