摘要:
Methods, devices, and systems for selecting a link of a link group based on contents of a concealed header are disclosed. A network node operating method includes a first network node receiving a packet and concluding that a link group connecting the first network node to a second network node will forward the packet to the second network node. The method further includes determining that the packet includes a tunnel header and an original header concealed by the tunnel header, selecting one link from among a set of parallel links of the link group based at least on one or more fields of the concealed original header, and forwarding the packet to the second network node via the selected link.
摘要:
Packet switch operating methods and packet switches assign a packet to a virtual interface. The virtual interface is associated with a plurality of tunnels. One of the plurality is designated a primary tunnel configured to accept packets. Other tunnels of the plurality are designated as backup tunnels and are configured to reject packets. The methods and packet switches also determine which of the plurality of tunnels is the primary tunnel and determine a packet switch port associated with the primary tunnel. The methods and packet switches egress the packet via the primary tunnel on the packet switch port associated with the primary tunnel.
摘要:
This invention includes methods and packet switches that modify duplicate packets to have different transport formats. A packet switch receives a plurality of duplicate packets from a switching fabric and modifies two or more of the duplicate packets so that the modified duplicate packets have different transport identifiers. The packet switch then transmits one of the duplicate packets on each of a plurality of ports of the packet switch.
摘要:
This document describes tools that forward data packets having tags conforming to different formats. In one embodiment, the tools receive a data packet on each of a plurality of ports, each data packet comprising a tag conforming to a different format. The tools relay the data packets to a port capable of transmitting tags conforming to a plurality of formats. In another embodiment, the tools receive a plurality of data packets on a source port comprising a plurality of logical source ports, each of which is associated with a unique tag. At least one data packet is received on each logical source port. Each data packet includes the tag associated with the logical source port on which the data packet is received. The tools map each data packet to one of a plurality of virtual switches based on the logical source port on which the data packet is received.
摘要:
This document describes tools that enable data network equipment to use its permitted data rate or physical maximum rate even if one of its links fail or it transmits more data on some links than others. To do so, the tools may track how much of a permitted data rate is used by a group of physical links. If the group is using more than the permitted data rate, the tools may limit the group to that rate. If some of the physical links in the group fail, the tools enable the group to use either its permitted data rate or the physical maximum rate of the group. In addition, the tools allow unique permitted data rates in two directions by a group of physical links. The tools may be used at ingress or egress modules within equipment depending upon the application and implementation.
摘要:
This document describes tools useful in relaying a data stream from a data device to a network tunnel, such as by enabling virtual switching using a provisional identifier to conceal a user identifier. These tools, for example, may use an inexpensive switch module to create virtual switch instances. To do so, the tools may assign data packets to a virtual switch instance by mapping the data packets to a particular provisional identifier and then modifying the data packets to include the provisional identifier. The switch module may then forward the data packets based on the provisional identifier rather than on the user identifier. The tools may remove the provisional identifier before forwarding the data packets to a destination.
摘要:
This document describes tools useful in relaying a data stream from a data device to a network tunnel, such as by enabling virtual switching using a provisional identifier to conceal a user identifier. These tools, for example, may use an inexpensive switch module to create virtual switch instances. To do so, the tools may assign data packets to a virtual switch instance by mapping the data packets to a particular provisional identifier and then modifying the data packets to include the provisional identifier. The switch module may then forward the data packets based on the provisional identifier rather than on the user identifier. The tools may remove the provisional identifier before forwarding the data packets to a destination.
摘要:
Packet switch operating methods and packet switches provision a plurality of tunnels on a packet switch by associating each of the plurality of tunnels with a packet switch port and by configuring the packet switch to modify packets relayed by the tunnel to include a transport identifier associated with the tunnel. The tunnels of the plurality relay packets when permitted by a tunnel index. The plurality of tunnels and the tunnel index are associated with a virtual interface. The methods and packet switches also permit a first tunnel of the plurality of tunnels to relay packets by configuring the tunnel index to indicate the first tunnel. The tunnel index indicates only one tunnel. The methods and packet switches also enable a second tunnel of the plurality of tunnels to relay packets by configuring the tunnel index to indicate the second tunnel, thereby preventing the first tunnel from relaying packets.
摘要:
A system is provided for prioritizing and queuing traffic from a plurality of data streams. The system includes a queuing structure, processing circuitry, and a search engine. The queuing structure has a plurality of queues. The search engine is implemented on the processing circuitry and is configured to search and edit the queues in order to manage traffic at a given instance in time by traversing each of the queues in a predetermined manner to identify and remove eligible entries from each queue that need to be transmitted. The traffic was previously classified as to type and traffic elements were previously loaded onto selected queues with other traffic elements having a similar traffic type. A method is also provided.
摘要:
This document describes tools useful in relaying a data stream from a data device to a network tunnel, such as by injecting in-band control messages without impacting a data rate. For example, the tools may receive data packets on a first link and then relay the data packets to a data device on a second link. While doing so, the tools may periodically free an amount of link time by reducing the length of the relayed data packets by reducing the length of a header of each data packet. The tools may then consume the freed link time by sending a control message on the second link to the data device.