Abstract:
Packet switch operating methods and packet switches receive an Ethernet packet from an Ethernet provider network and create a plurality of duplicates of the received Ethernet packet. The methods and switches then modify the duplicates by assign a same service instance identifier and a different packet tunnel identifier to each of the duplicates and then forward the modified duplicates to packet tunnels associated with the packet tunnel identifiers. Other methods and packet switches receive an Ethernet packet including a service instance identifier from a packet tunnel and prevent the received Ethernet packet from being forwarded to another packet tunnel associated with the service instance identifier. Packet tunnel networks including Ethernet provider networks and edge bridges fully connected by packet tunnels. The edge bridges are configured to prevent packets received from one of the tunnels from being forwarded to other tunnels.
Abstract:
Packet switch operating methods and packet switches use a first port of forwarding circuitry of the packet switch to receive first packets and transmit second packets. The methods and packet switches mirror the first and second packets on a second port of the forwarding circuitry, encapsulate the mirrored packets with a transport identifier, and transmit the encapsulated packets using a third port of the forwarding circuitry.
Abstract:
Packet switch operating methods and packet switches receive a packet on a first port of the packet switch. The packet is addressed to a device that is in communication with a second port of forwarding circuitry of the packet switch and the packet has an Ethernet destination address field and an Ethernet source address field. The Ethernet destination address field includes a first address and the Ethernet source address field includes a second address. The methods and packet switches also forward the packet to an output queue associated with a third port of the forwarding circuitry, forward the packet from the output queue to the first port, and modify the packet so that the Ethernet destination address field comprises the second address instead of the first address.
Abstract:
Methods, devices, and systems for selecting a link of a link group based on contents of a concealed header are disclosed. A network node operating method includes a first network node receiving a packet and concluding that a link group connecting the first network node to a second network node will forward the packet to the second network node. The method further includes determining that the packet includes a tunnel header and an original header concealed by the tunnel header, selecting one link from among a set of parallel links of the link group based at least on one or more fields of the concealed original header, and forwarding the packet to the second network node via the selected link.
Abstract:
Network operating methods provide a first packet switch configured to send a plurality of packets from the first packet switch to a second packet switch via a network path traversing one or more intermediate packet switches, access data describing at least one performance characteristic of the network path, and based on the data, modify a rate at which the first packet switch sends the plurality of packets to the second packet switch via the path. Network management methods receive data describing at least one performance characteristic of a network path having a first endpoint on a first packet switch, a second endpoint on a second packet switch, the network path traversing one or more intermediate packet switches and, based on the received data, instruct the first packet switch to modify a rate at which the first packet switch sends packets to the second packet switch via the network path.
Abstract:
Packet switch operating methods and packet switches receive an Ethernet packet including a customer destination address and select one of a plurality of packet tunnel identifiers based on the customer destination address. The packet switch then modifies the received Ethernet packet by adding the selected packet tunnel identifier and forwards the modified packet to a packet tunnel associated with the selected packet tunnel identifier. Other methods and packet switches receive Ethernet packets including a same service virtual local area network identifier value from a first Ethernet network and forward one of the received Ethernet packets to a second Ethernet network via a first packet tunnel and forward another of the received Ethernet packets to a third Ethernet network via a second packet tunnel. Packet tunnel networks including Ethernet provider networks and edge bridges fully connected by packet tunnels having two endpoints.
Abstract:
Network operating methods provide a first packet switch configured to send a plurality of packets from the first packet switch to a second packet switch via a network path traversing one or more intermediate packet switches, access data describing at least one performance characteristic of the network path, and based on the data, modify a rate at which the first packet switch sends the plurality of packets to the second packet switch via the path. Network management methods receive data describing at least one performance characteristic of a network path having a first endpoint on a first packet switch, a second endpoint on a second packet switch, the network path traversing one or more intermediate packet switches and, based on the received data, instruct the first packet switch to modify a rate at which the first packet switch sends packets to the second packet switch via the network path.
Abstract:
This document describes tools that forward data packets to trusted ports and prevent data packets from egressing non-trusted ports. To do so, the tools receive a data packet having a destination address specifying that the data packet be forwarded to a set of ports associated with a domain. The tools identify a subset of the set of ports as trusted ports and forward the data packet to the subset. The tools prevent the data packet from egressing non-trusted ports of the set. In one embodiment, the tools may classify a port as trusted. To do so, the tools receive a configuration communication identifying trusted devices. The tools broadcast a request to the trusted devices and receive a reply from a reply device on a reply port. The tools determine that the reply device is one of the trusted devices and mark the reply port as a trusted port.
Abstract:
Network operating methods provide a first packet switch configured to send a plurality of packets from the first packet switch to a second packet switch via a network path traversing one or more intermediate packet switches, access data describing at least one performance characteristic of the network path, and based on the data, modify a rate at which the first packet switch sends the plurality of packets to the second packet switch via the path. Network management methods receive data describing at least one performance characteristic of a network path having a first endpoint on a first packet switch, a second endpoint on a second packet switch, the network path traversing one or more intermediate packet switches and, based on the received data, instruct the first packet switch to modify a rate at which the first packet switch sends packets to the second packet switch via the network path.
Abstract:
This document describes tools that withhold a data packet from a switch port despite its destination address. In one embodiment, the tools may receive a port description identifying a set of switch ports. The tools configure the set of ports so that data packets exchanged through the switch by interested entities that would otherwise be forwarded to uninterested entities are instead withheld from the uninterested entities. In another embodiment, the tools may configure a data-packet switch according to a port description identifying a set of ports and a subset of the set of ports. The tools receive a data packet that includes a broadcast destination address on a receive port and then determine, based on the port description, whether the receive port belongs to the subset. If the receive port does not belong to the subset the data packet is withheld from the other ports of the set.