摘要:
In one embodiment, a method includes detecting a change in network topology and broadcasting a transient unconditional unpruning message to all nodes in the network. The message is configured to instruct each network element receiving the message to start a phase timer in response to the broadcast message; unprune its operational ports; and, upon expiration of the phase timer, prune its ports in accordance with the results of a pruning protocol.
摘要:
In one embodiment, a method includes detecting a change in network topology and broadcasting a transient unconditional unpruning message to all nodes in the network. The message is configured to instruct each network element receiving the message to start a phase timer in response to the broadcast message; unprune its operational ports; and, upon expiration of the phase timer, prune its ports in accordance with the results of a pruning protocol.
摘要:
A technique is provided for mitigating loops in Ethernet networks. A first port in an Ethernet device receives an Ethernet frame. The frame includes a source identifier, a destination identifier, and a Virtual Local Area Network Identifier (VLAN ID). According to various embodiments, the VLAN ID (VID) has the encoding of both a community group as well as a source bridge ID. A VID database is accessed using the destination identifier and the VID to determine whether the first port has ingress enabled. A filtering database is accessed to determine an egress port for forwarding the Ethernet frame.
摘要:
The present invention provides improved unicast routing, multicast routing and unicast load sharing as compared with conventional methods. Preferred implementations of the invention provide improvements to IEEE 802.1Q. According to preferred aspects of the invention, each bridge is the root of its own multiple spanning tree instance (“MSTI”). Preferred implementations of the invention require no learning of media access control (“MAC”) addresses on the backbone of a network. Some methods of the invention can resolve spanning tree asymmetries. Preferred implementations of the invention require a very low computational load for control protocols.
摘要:
Various systems and methods that allow multiple aggregation protocol sessions to be established in a daisy chain network are disclosed. One method involves sending a first aggregation protocol packet and a first session identifier associated therewith to a first network device via a first interface and sending a second aggregation protocol packet and a second session identifier associated therewith to a second network device via the first interface.
摘要:
A broadband access node includes a port for connection with a Digital Subscriber Line and a processor to run code that implements a virtual maintenance end point (vMEP). The vMEP translates an IEEE 802.1ag Loopback Message (LBM) received from a device on an Ethernet access network into a legacy operations and maintenance (OAM) message that is transmitted to a residential gateway (RG) device. The legacy OAM message determines a link-level connectivity status between broadband access node and the RG device. The vMEP also transmits a reply message back to the device on an Ethernet access network in compliance with the IEEE 802.1ag specification. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. 37 CFR 1.72(b).
摘要:
A method for data communication across a layer 2 bridged network having two or more edge nodes configured for receiving and transmitting multiprotocol data packets. The method includes creating a pseudowire circuit across the bridged network, receiving data packets at one of the edge nodes, encapsulating data packets into pseudowire frames, encapsulating the pseudowire frames inside MAC frames, and transmitting the encapsulated frames over the carrier bridged network.
摘要:
An encapsulation mechanism efficiently transports packets between ports of different switches in a network on the basis of, inter alia, virtual local area network (VLAN) associations among those ports. The switches are preferably interconnected by a novel interswitch link (ISL) mechanism that appends ISL destination and source information, along with ISL error detection information, to VLAN-modified packets. The ISL mechanism keeps the VLAN associations of the packets intact during transfer between the switches in accordance with a high-performance switching bus architecture.
摘要:
In particular embodiments, a first switch implementing a first virtual local area network (VLAN) registration protocol and connected to a first end of the trunk detects whether a second switch connected to a second end of the trunk implements the first VLAN registration protocol. In an embodiment, the second switch may send an unsolicited message to the first switch indicating the VLAN registration protocol implemented by the second switch. The first switch may then determine the VLAN registration protocol implemented by the second switch. Alternatively, the first switch may send a solicited message to the second switch. By receiving a response to the solicited message, the first switch can determine that the second switch implements the first VLAN registration protocol. In response to determining that the second switch implements the first VLAN registration protocol, the first switch may enable a pruning technique in accordance with the first VLAN registration protocol.
摘要:
A technique efficiently manages bandwidth (BW) registration for multiple spanning tree options in a computer network. According to the novel technique, an entry bridge determines multiple spanning tree paths to other bridges of the network (namely, one or more available spanning trees rooted at one or more bridges of the network) and determines a utilized (registered) BW on each of those paths. Upon receiving a request to initiate BW registration for a data flow to a destination end point, e.g., from an application source end point, the entry bridge selects one of the spanning tree paths to utilize for the data flow. Selection of the spanning tree path from among the multiple available paths may be based on (i) available bandwidth of the paths, (ii) a shortest of the paths, and (iii) a lowest bridge identifier ID for the bridge root for the path. The entry bridge sends a registration message for the data flow towards the destination end point along the selected spanning tree path. If successful, the data flow is transmitted on the selected path. If not, the entry bridge attempts to register the data flow on a next best alternate spanning tree, e.g., until a successful registration or until a determination that no further alternate spanning trees exist.