Abstract:
Systems, methods and computer readable media for mobility integration with fabric-enabled networks are described. Some implementations can include a method comprising terminating, using one or more processors, an access tunnel at an edge switch of a fabric-enabled network, and establishing, using the one or more processors, a mobility tunnel with the edge switch. The method can also include mapping, using the one or more processors, a mobility network to a service identifier associated with the mobility network. The method can further include forwarding, using the one or more processors, traffic for the mobility network from the edge switch to another edge switch across the fabric enabled network, wherein the traffic includes the service identifier.
Abstract:
One or more implementations can include methods, systems and computer readable media for multi-threaded multipath processing. In some implementations, the method can include determining that a next hop for a destination includes a first next hop and a second next hop. The method can also include generating a first packet having a first destination address based on a nickname of a remote switch and on an identifier of a first path. The method can further include generating a second packet having a second destination address based on the nickname of the remote switch and on an identifier of a second path.
Abstract:
Some implementations provide a capability of limiting or blocking configuration of network services based on network service mode and type advertisements. An example method can include providing a network service having a service mode and a service type, and generating a network service advertisement message including a service identifier, a service mode portion and a service type portion. The method can also include populating the service mode portion with a first value corresponding to a service mode of the network service and populating the service type portion with a second value corresponding to a service type of the network service. The method can further include forwarding the network service advertisement message from a first system to one or more other systems via a network.
Abstract:
Implementations generally relate to data transmission in networks. In some implementations, a method includes determining communication paths in a network, where the communication paths connect a plurality of network nodes, and where the network nodes include one or more edge devices and one or more core devices. The method further includes determining if a forwarding information base (FIB) is permitted at at least one network node. The method further includes filtering one or more packets at the at least one network node if the FIB is not permitted. The method further includes enabling traffic flow of one or more packets at the at least one network node if the FIB is permitted.
Abstract:
Systems, methods and computer readable media for network loop detection and prevention are described. Some implementations can include a computerized method comprising detecting, at a first switch, a loop condition in a network, and generating, at the first switch, a localize loop message having an instance count and a path list. The method can also include setting, at the first switch, the instance count of the localize loop message to a first value, and transmitting, from the first switch, the localize loop message to a second switch. The method can further include detecting, at the second switch, a loop in the network; and sending, from the second switch, a localize loop response message to the first switch.
Abstract:
A method, system and computer readable medium for advertising and interoperating Layer 2 VPN services from an access node to a core network. The method can include executing, using one or more processors, a routing protocol on an access node to establish adjacency with a core network node in an access mode. The method can also include mapping, using the one or more processors, an access network Layer 2 service identifier to a core network service identifier. The method can further include advertising, using the one or more processors, a mapping for the L2VPN service to the core network node. The method can also include sending, using the one or more processors, network traffic from the access node to the core network node without core network encapsulation.
Abstract:
Methods, systems and computer readable media for network service type and mode advertisement are described. In some implementations, a method can include providing a network service having a service mode and a service type, and generating a network service advertisement message including a service identifier, a service mode portion and a service type portion. The method can also include populating the service mode portion with a first value corresponding to a service mode of the network service and populating the service type portion with a second value corresponding to a service type of the network service. The method can further include forwarding the network service advertisement message from a first system to one or more other systems via a network.
Abstract:
Methods, systems and computer readable media for network migration as described. The method can include receiving, at a processor, an indication to initiate a migrate start. The method can also include initiating, at the processor, a migrate start including forwarding traffic in a first protocol based on a first table while building a second table to forward traffic in a second protocol different from the first protocol. The method can further include performing a migrate cutover when it is determined that one or more MAC addresses for an active session have been learned and stored in the table. The method can also include completing a migration when an indication is received to complete the migration. The method can also include aborting the migration based on a received indication to abort the migration.
Abstract:
Systems, methods and computer readable media for mobility integration with fabric-enabled networks are described. Some implementations can include a method comprising terminating, using one or more processors, an access tunnel at an edge switch of a fabric-enabled network, and establishing, using the one or more processors, a mobility tunnel with the edge switch. The method can also include mapping, using the one or more processors, a mobility network to a service identifier associated with the mobility network. The method can further include forwarding, using the one or more processors, traffic for the mobility network from the edge switch to another edge switch across the fabric enabled network, wherein the traffic includes the service identifier.
Abstract:
A method, system and computer readable medium for advertising and interoperating Layer 2 VPN services from an access node to a core network. The method can include executing, using one or more processors, a routing protocol on an access node to establish adjacency with a core network node in an access mode. The method can also include mapping, using the one or more processors, an access network Layer 2 service identifier to a core network service identifier. The method can further include advertising, using the one or more processors, a mapping for the L2VPN service to the core network node. The method can also include sending, using the one or more processors, network traffic from the access node to the core network node without core network encapsulation.