摘要:
A method and apparatus providing highly scalable server load balancing are disclosed. Data packets from a client are routed through one or more routers to a server load balancer, which is selected from among a plurality of server load balancers in a network. In response to receiving a request packet, a particular server site to process the client request is selected. A first path to a second router associated with the particular server site, and a second path to a server load-balancing device associated with the second router, are determined. A mapping of flow identifying information, associated with the packet, to a first label value that identifies the first path and to a second label value that identifies the second path, is created. The first label value and the second label value are stored in the packet. All subsequent packets associated with the client request are forwarded to the server load-balancing device based on looking up the first label value and second label value in the mapping. As a result, a network is scalable to process and load-balance numerous client requests, which are efficiently routed to the site, server load-balancer, and server that are handling the request.
摘要:
IPv6 traffic may be carried through an MPLS IPv4 network without the use of IPv6-over-IPv4 tunneling. This provides great savings in overhead, signaling, and state information storage and also allows for routing through the MPLS IPv4 network to adjust in response to changes in network state. In one embodiment, an edge node of an MPLS IPv4 network resolves a destination IPv6 network of a received IPv6 packet to an MPLS label switched path. The resolution exploits received inter-domain routing information. This information identifies the IPv4 address of an egress node that is usable as a gateway to the destination network. Within the inter-domain routing information, the IPv4 address may be encoded in IPv6 format.
摘要:
A router (10) in a packet-based telecommunications system receives incoming packets that may have “shim” headers between their link-layer and network-layer headers. The shim header contains one or stack entries, each of which includes a label, and the router can employ the label in the top stack entry as direct index into a forwarding table that the router uses to forward the packet. Among the forwarding table's contents is a pointer to a replacement data structure (62). To assemble an outgoing packet to be forwarded in the incoming packet's place, the router replaces the incoming packet's link-layer header and any top shim-header stack entry with the replacement data structure. The router employs this mechanism (1) to impose a shim header on packets that did not have them previously, (2) to replace shim-header stack entries for forwarding to subsequent routers, and (3) to remove shim headers.
摘要:
A router has a first interface to receive a packet from an external autonomous system and a second interface to transmit the packet as an outgoing packet to a border router. A processing engine places a first tag on the outgoing packet in accordance with a standard tag switching protocol. A shared field in the outgoing packet has at least one bit to indicate a use of the shared field, the at least one bit set by the processing engine to indicate the shared field carries a second tag, the second tag indicating a route from the border router to a destination of the packet.
摘要:
A method, apparatus and computer program product for routing data within a packet-switched network using a PW wherein the PW is terminated directly on the layer-3 routing device such that certain services and applications can be utilized is presented. The method, apparatus and computer program product receives an encapsulated layer-2 Protocol Data Unit (PDU) from a pseudowire emulating a service. The encapsulation is removed from the encapsulated layer-2 PDU and a layer-2 circuit associated with the pseudowire is terminated. The circuit is treated as an interface and the PDU is forwarded based on upper layer protocol information within the PDU.
摘要:
Systems and methods for link discovery and verification that minimize the need for line termination resources to generate and interpret packets. According to one aspect of the present invention, a method for operating a first node in a data communication network to verify connectivity to a second node includes sending a request for verification of connectivity to the second node that identifies an IP address of the first node, a port of the first node, and an IP address of the second node. The method also includes toggling a signal emitted by the port, and notifying the second node of a toggling mode of the port. Finally, the method includes receiving a first message from the second node indicating whether the second node detected the toggling. The request for verification of connectivity is sent on a control channel via a control message separate from the signal and the first message.
摘要:
IPv6 traffic may be carried through an MPLS IPv4 network without the use of IPv6-over-IPv4 tunneling. This provides great savings in overhead, signaling, and state information storage and also allows for routing through the MPLS IPv4 network to adjust in response to changes in network state. In one embodiment, an edge node of an MPLS IPv4 network resolves a destination IPv6 network of a received IPv6 packet to an MPLS label switched path. The resolution exploits received inter-domain routing information. This information identifies the IPv4 address of an egress node that is usable as a gateway to the destination network. Within the inter-domain routing information, the IPv4 address may be encoded in IPv6 format.
摘要:
IPv6 traffic may be carried through an MPLS IPv4 network without the use of IPv6-over-IPv4 tunneling. An IPv6 packet is sent through the MPLS IPv4 network through a label switched path (LSP). The IPv6 packet is encapsulated with a label stack associated with the LSP. A second level label is used in the label stack (in addition to the label associated with the LSP). This second level label provides important benefits.
摘要:
Systems and methods for link discovery and verification technique that minimize the need for line termination resources that generate and interpret packets. Of two nodes verifying a link to one another, only one node need have any line termination capability. The node lacking line termination capability simply loops back packets generated by the other node thus verifying the link. Thus, an optical cross-connect can verify links to a wide variety of node types by employing a single line termination unit capable of terminating any suitable packet type. Alternatively, a router can verify connectivity to an optical cross-connect even when the optical cross-connect lacks any line termination capability at all. This saves greatly on implementation costs for optical networks.
摘要:
In a communications-networking autonomous system consisting of an OSPF domain, autonomous-system border routers (I-ASBR and E-ASBR) cause exchange of hierarchical forwarding labels whose hierarchies are based on OSPF areas. A border router transmits into the domain an OSPF LSA Update message containing an AS-External LSA whose External Route Tag field other routers interpret as specifying a label to be used for forwarding. When that LSA is flooded into the OSPF domain, area border routers respond by flooding new LSAs created from the received one by replacing the label contained in the External Route Tag field with labels that specify their forwarding tables' locations containing information for forwarding to the originating autonomous system border router. In so doing, they enable packets destined for an extra-domain location to be forwarded through the autonomous system without requiring non-border routers to allocate labels to the exterior location or to border routers outside their areas. This enables a networking backbone to conserve its label space even though it carries a large variety of external traffic.