摘要:
An example embodiment includes a network element. The network element includes an ingress port, an ingress line card, a link aggregation group (LAG) including multiple egress ports, and a distributor. The ingress port receives multiple packets including flood traffic. The ingress line card separates the packets into buckets. The distributor is configured to allocate the buckets to the egress ports, transmit the buckets to the egress ports, and when a failed egress port is identified, reallocate the buckets from the failed egress port to at least one functional egress port while continuing to transmit the buckets to functional egress ports of the LAG.
摘要:
A system includes a network element. The network element includes multiple egress ports configured as a LAG, an ingress port, and a distributor. The ingress port is configured to receive multiple packets including at least one flood domain. Additionally, the distributor is configured to access a virtual local area network identifier (VID) of each flood domain. Based on the VID and the number of egress ports in the LAG, the distributor is configured to select a representative egress port from the multiple egress ports. The distributor additionally forwards packets of each flood domain to the egress port of the LAG which is selected as the representative egress port for that flood domain.
摘要:
A method and system for priority based (1:1)n Ethernet protection. The method and system includes assigning a priority to each of the flows associated with a working path. Upon fail of one or more of the working paths checking available bandwidth and priority of the flows. Once the request is complete, switching one or more flows to the protection path based on at least the priority of the flow, the bandwidth of the working path and the available bandwidth on the protection path. If a newly failed working path has a higher priority flow then dropping a flow from the protection path to a pending state. Once a working path has recovered, reverting the flow back to the working path and possibly admitting pending data to the protection path if the bandwidth and prioritization requirements are met.
摘要:
In accordance with embodiments of the present disclosure, a method and system may include receiving a plurality of packets comprising flood traffic of a bridged VLAN domain at an ingress line card port. The system and method may further include splitting the packets into multiple internal streams and forwarding the packets associated with the internal streams to a switch fabric. The system and method may further include forwarding each packet associated with a particular internal stream to one or more egress line cards associated with the internal stream. The system and method may further include mapping each internal stream to a single egress port of the egress line card, the single egress port comprising one of a plurality of egress ports associated with a LAG. The system and method may further include recovery from a port failure.
摘要:
In accordance with embodiments of the present disclosure, a method and system may include receiving a plurality of packets comprising flood traffic of a bridged VLAN domain at an ingress line card port. The system and method may further include splitting the packets into multiple internal streams and forwarding the packets associated with the internal streams to a switch fabric. The system and method may further include forwarding each packet associated with a particular internal stream to one or more egress line cards associated with the internal stream. The system and method may further include mapping each internal stream to a single egress port of the egress line card, the single egress port comprising one of a plurality of egress ports associated with a LAG. The system and method may further include recovery from a port failure.
摘要:
A method for priority-based protection includes assigning a priority to each of a plurality of flows associated with a plurality of working paths, wherein each of the plurality of the flows has a unique priority. The method also includes determining that one or more of the working paths has failed, and determining the available bandwidth on a protection path upon the failure of the one or more of the working paths. In addition, the method includes determining the priority of the flows on the one or more failed working paths, and switching two or more flows from the one or more failed working paths to the protection path based on at least the priority of the two or more flows, the bandwidth of the working path and the available bandwidth on the protected path.