摘要:
Systems and methods for link discovery and verification technique that minimize the need for line termination resources that generate and interpret packets. Of two nodes verifying a link to one another, only one node need have any line termination capability. The node lacking line termination capability simply loops back packets generated by the other node thus verifying the link. Thus, an optical cross-connect can verify links to a wide variety of node types by employing a single line termination unit capable of terminating any suitable packet type. Alternatively, a router can verify connectivity to an optical cross-connect even when the optical cross-connect lacks any line termination capability at all. This saves greatly on implementation costs for optical networks.
摘要:
Systems and methods for link discovery and verification technique that minimize the need for line termination resources that generate and interpret packets. Of two nodes verifying a link to one another, only one node need have any line termination capability. The node lacking line termination capability simply loops back packets generated by the other node thus verifying the link. Thus, an optical cross-connect can verify links to a wide variety of node types by employing a single line termination unit capable of terminating any suitable packet type. Alternatively, a router can verify connectivity to an optical cross-connect even when the optical cross-connect lacks any line termination capability at all. This saves greatly on implementation costs for optical networks.
摘要:
Systems and methods for link discovery and verification that minimize the need for line termination resources to generate and interpret packets. To verify a link between two nodes, a first of the nodes toggles light or another signal output by one of its ports while the other node attempts to detect the toggling through its own ports. A link is therefore verified between the port that is toggling and the port that detects the toggling. This link verification technique does not require packet termination capability at either node. Furthermore, this link verification technique is very simple and may be executed very quickly even at nodes having a very large number of ports to which links maybe established.
摘要:
Systems and methods for link discovery and verification that minimize the need for line termination resources to generate and interpret packets. According to one aspect of the present invention, a method for operating a first node in a data communication network to verify connectivity to a second node includes sending a request for verification of connectivity to the second node that identifies an IP address of the first node, a port of the first node, and an IP address of the second node. The method also includes toggling a signal emitted by the port, and notifying the second node of a toggling mode of the port. Finally, the method includes receiving a first message from the second node indicating whether the second node detected the toggling. The request for verification of connectivity is sent on a control channel via a control message separate from the signal and the first message.
摘要:
Systems and methods for link discovery and verification technique that minimize the need for line termination resources that generate and interpret packets. Of two nodes verifying a link to one another, only one node need have any line termination capability. The node lacking line termination capability simply loops back packets generated by the other node thus verifying the link. Thus, an optical cross-connect can verify links to a wide variety of node types by employing a single line termination unit capable of terminating any suitable packet type. Alternatively, a router can verify connectivity to an optical cross-connect even when the optical cross-connect lacks any line termination capability at all. This saves greatly on implementation costs for optical networks.
摘要:
Techniques are provided for detecting connectivity failures within an OTV network using CFM. In an embodiment, a method and apparatus for using E-OAM to accurately test connectivity in an OTV network is provided. In an embodiment, one method comprises: in a first edge router that is in a local area network (LAN) and that is coupled to a core network: maintaining, for each node of the LAN, a mapping of a source address to one or more delivery multicast groups, each delivery multicast group comprising a set of other edge routers, each of the other edge routers having a connection to a distinct LAN; receiving a frame from a particular source node of a particular source address; sending the frame to a plurality of the delivery multicast groups that are mapped, in the mapping, to the particular source address.
摘要:
In one embodiment, a path computation client (PCC) generates a path computation request and transmits the path computation request to a path computation element (PCE). The PCC receives from the PCE a response including path segments defining a path, at least one of the path segments being an encrypted path segment that has been encrypted according to an encryption algorithm associated with a remote domain. The PCC then generates a path reservation message that includes the encrypted path segment. This is done without decrypting the encrypted path segment at the PCC. The PCC transmits the path reservation message to one or more nodes along the path, which may be capable of decrypting the encrypted path segment.
摘要:
A technique retrieves computed path segments across one or more domains of a computer network in accordance with a stateful (“semi-stateful”) path computation element (PCE) model. The stateful PCE model includes a data structure configured to store one or more path segments computed by a PCE in response to a path computation request issued by a Path Computation Client (PCC). Notably, each computed path segment stored in the data structure is identified by an associated path-key value (“path key”). The path segment and path key contents of the data structure are temporarily saved (“cached”) at a predetermined location in the network for a configurable period of time.
摘要:
In response to a failure within a sub-network of a heterogeneous network, an external device is signaled that the failure has occurred by inclusion of an encoded identifier of the failure location with the signaling. The encoded identifier enables identification of the failure location within the sub-network while masking the identity of the failure location to the external device, and may be realized by using an encrypted sub-object or a token that is associated with the failure location information, which remains stored within the sub-network. The external device responds by issuing a path-establishment message indicating that a new communications path should be established and should exclude the failure location as identified by the encoded identifier, which is included in the path-establishment message. A device within the sub-network responds by determining whether a path segment for the new communications path can be provided while excluding the failure location as identified by the encoded identifier from the path-establishment message, and further path-setup functions are performed based on the determination.
摘要:
A technique retrieves computed path segments across one or more domains of a computer network in accordance with a stateless Path Computation Element (PCE) model. The stateless PCE model includes one or more PCEs configured to compute one or more path segments through the domains in response to a path computation request issued by, e.g., a Path Computation Client (PCC). Notably, each computed path segment is encrypted as a data structure to preserve confidentiality across the domains. Each PCE then cooperates to return a path computation response, including the encrypted path segments and an explicit route object (ERO) containing compressed path descriptions of the computed path segments, to the PCC.