摘要:
Packet switch operating methods and packet switches assign a packet to a virtual interface. The virtual interface is associated with a plurality of tunnels. One of the plurality is designated a primary tunnel configured to accept packets. Other tunnels of the plurality are designated as backup tunnels and are configured to reject packets. The methods and packet switches also determine which of the plurality of tunnels is the primary tunnel and determine a packet switch port associated with the primary tunnel. The methods and packet switches egress the packet via the primary tunnel on the packet switch port associated with the primary tunnel.
摘要:
This invention includes methods and packet switches that modify duplicate packets to have different transport formats. A packet switch receives a plurality of duplicate packets from a switching fabric and modifies two or more of the duplicate packets so that the modified duplicate packets have different transport identifiers. The packet switch then transmits one of the duplicate packets on each of a plurality of ports of the packet switch.
摘要:
This document describes tools that forward data packets having tags conforming to different formats. In one embodiment, the tools receive a data packet on each of a plurality of ports, each data packet comprising a tag conforming to a different format. The tools relay the data packets to a port capable of transmitting tags conforming to a plurality of formats. In another embodiment, the tools receive a plurality of data packets on a source port comprising a plurality of logical source ports, each of which is associated with a unique tag. At least one data packet is received on each logical source port. Each data packet includes the tag associated with the logical source port on which the data packet is received. The tools map each data packet to one of a plurality of virtual switches based on the logical source port on which the data packet is received.
摘要:
This invention includes tools that prevent forwarding of a packet to a control plane of a packet switch. The tools receive a packet comprising indicia suggesting that the packet be forwarded to a control plane of a packet switch. After receiving the packet, the tools may modify the packet to prevent the packet from being forwarded to the control plane, intercept the packet before it is received by the control plane, or otherwise prevent the packet from being forwarded to the control plane. The tools may also forward the packet from a source port of a packet switch to a destination port of the packet switch without forwarding the packet to the control plane of the packet switch.
摘要:
A method, a statistics subsystem, and a system use a combination of commercially available high speed memory and high density low speed memory to mitigate cost, space, control, and power issues associated with storing counters for statistics updates, while meeting the growing width and depth needs of multi-hundred gigabit Carrier Class data network devices. The method, statistics subsystem, and system offer a Counter Management Algorithm (CMA) that relies on rollover bits stored within data of counters. An update to the low speed memory is substantially faster than a rollover time for the counter in the high speed memory thereby allowing statistics to be cached in the high speed memory while updates take place to the low speed memory.
摘要:
This document describes tools useful in relaying a data stream from a data device to a network tunnel, such as by injecting in-band control messages without impacting a data rate. For example, the tools may receive data packets on a first link and then relay the data packets to a data device on a second link. While doing so, the tools may periodically free an amount of link time by reducing the length of the relayed data packets by reducing the length of a header of each data packet. The tools may then consume the freed link time by sending a control message on the second link to the data device.
摘要:
This invention includes tools that prevent forwarding of a packet to a control plane of a packet switch. The tools receive a packet comprising indicia suggesting that the packet be forwarded to a control plane of a packet switch. After receiving the packet, the tools may modify the packet to prevent the packet from being forwarded to the control plane, intercept the packet before it is received by the control plane, or otherwise prevent the packet from being forwarded to the control plane. The tools may also forward the packet from a source port of a packet switch to a destination port of the packet switch without forwarding the packet to the control plane of the packet switch.
摘要:
This invention includes methods and packet switches that translate a packet between a switching format and a transport format. One packet switch receives a packet intended for a destination port of a packet switch from a switching fabric of the packet switch and determines, based on the destination port, a treatment to be applied to the packet. The packet switch then applies the treatment to the packet prior to forwarding the packet to the destination port. The treatment may include adding a transport identifier to the packet.
摘要:
This document describes tools useful in relaying a data stream from a data device to a network tunnel, such as by enabling virtual switching using a provisional identifier to conceal a user identifier. These tools, for example, may use an inexpensive switch module to create virtual switch instances. To do so, the tools may assign data packets to a virtual switch instance by mapping the data packets to a particular provisional identifier and then modifying the data packets to include the provisional identifier. The switch module may then forward the data packets based on the provisional identifier rather than on the user identifier. The tools may remove the provisional identifier before forwarding the data packets to a destination.
摘要:
Packet switch operating methods and packet switches provision a plurality of tunnels on a packet switch by associating each of the plurality of tunnels with a packet switch port and by configuring the packet switch to modify packets relayed by the tunnel to include a transport identifier associated with the tunnel. The tunnels of the plurality relay packets when permitted by a tunnel index. The plurality of tunnels and the tunnel index are associated with a virtual interface. The methods and packet switches also permit a first tunnel of the plurality of tunnels to relay packets by configuring the tunnel index to indicate the first tunnel. The tunnel index indicates only one tunnel. The methods and packet switches also enable a second tunnel of the plurality of tunnels to relay packets by configuring the tunnel index to indicate the second tunnel, thereby preventing the first tunnel from relaying packets.