摘要:
In one embodiment, software code in a respective computer system such as one or more data communication devices establishes multiple layer 2 network links between a first data communication device and a second data communication device. The first data communication device and the second data communication device include corresponding layer 3 interfaces enabling layer 3 network communications over each of the multiple layer 2 network links. The first and second data communication devices route traffic over one (e.g., a primary layer 2 link) of the multiple layer 2 network links using the layer 3 network communications. The private links are media independent. Upon detection of a failure associated with the primary layer 2 link, the data communication devices can automatically switch to sending traffic over a backup link of the multiple layer 2 network links without disrupting publicly advertised routing topology information.
摘要:
In one embodiment, software code in a respective computer system such as one or more data communication devices establishes multiple layer 2 network links between a first data communication device and a second data communication device. The first data communication device and the second data communication device include corresponding layer 3 interfaces enabling layer 3 network communications over each of the multiple layer 2 network links. The first and second data communication devices route traffic over one (e.g., a primary layer 2 link) of the multiple layer 2 network links using the layer 3 network communications. The private links are media independent. Upon detection of a failure associated with the primary layer 2 link, the data communication devices can automatically switch to sending traffic over a backup link of the multiple layer 2 network links without disrupting publicly advertised routing topology information.
摘要:
Customer edge (CE) to CE device verification checks initiate routes from available CEs as a set of path verification messages, destined for remote CE routes serving a remote VPN. An extended community attribute, included among the attributes of the path verification message, stores the identity of the originating CE router. The path verification message propagates across the network, and transports the identity of the originating CE router because the originator identity is not overwritten by successive routing. Upon receipt by the remote CE, the originator is determinable from the extended community attribute. A further reachability field is also included in the extended community attribute and indicates whether per CE or per prefix is appropriate for the particular route in question. In this manner, CE-CE connectivity checks identify CEs which are reachable from other CEs. Accordingly, such a mechanism allows for route reachability aggregation on a per-CE or per-prefix reachability basis.
摘要:
A path verification protocol (PVP) which enumerates a series of messages sent to a set of nodes, or routers, along a suspected path identifies forwarding plane problems for effecting changes at the control plane level. The messages include a command requesting interrogation of a further remote node for obtaining information about the path between the node receiving the PVP message and the further remote node. The node receiving the PVP message replies with a command response indicative of the outcome of attempts to reach the further remote node. The series of messages collectively covers a set of important routing points along a path from the originator to the recipient. The aggregate command responses to the series of PVP messages is analyzed to identify not only whether the entire path is operational, but also the location and nature of the problem.
摘要:
A data communication device (e.g., a router) originates a network configuration message in response to a network topology change or so as to refresh a configuration message. The data communication device encodes a timestamp in the network configuration message. The timestamp indicates a time of originating the network configuration message. Further, the data communication device transmits the network configuration message over the network to other network devices that, in turn, initiate further broadcast of at least a portion of contents of the network configuration message. Based on the timestamp of the network configuration message, the data communication devices receiving the network configuration message identify transmission time value indicating how long the network configuration message takes to be conveyed over the network to the other network devices. The data communication devices utilize the transmission time value as a timeout period for determining whether a data communication device failure occurs.
摘要:
In one embodiment, a method includes receiving, by a first autonomous system border router (ASBR) of a first autonomous system (AS), a first plurality of provider-provisioned media access control (B-MAC) addresses via Interior Border Gateway Protocol (I-BGP). Each of first plurality of B-MAC addresses is associated with a provider edge (PE) device of the first AS. The first ASBR sends the first plurality of B-MAC addresses to a second ASBR of a second AS using Exterior Border Gateway Protocol (E-BGP). The first ASBR also receives via E-BGP a second plurality of B-MAC addresses each of which is associated with a PE device of the second AS. The first ASBR then distributes the second plurality of B-MAC addresses to each of the PE devices of the first AS using I-BGP.
摘要:
In one embodiment, a method includes receiving, by a first autonomous system border router (ASBR) of a first autonomous system (AS), a first plurality of provider-provisioned media access control (B-MAC) addresses via Interior Border Gateway Protocol (I-BGP). Each of first plurality of B-MAC addresses is associated with a provider edge (PE) device of the first AS. The first ASBR sends the first plurality of B-MAC addresses to a second ASBR of a second AS using Exterior Border Gateway Protocol (E-BGP). The first ASBR also receives via E-BGP a second plurality of B-MAC addresses each of which is associated with a PE device of the second AS. The first ASBR then distributes the second plurality of B-MAC addresses to each of the PE devices of the first AS using I-BGP.
摘要:
Various techniques for exchanging control messages in order to gracefully reroute multicast traffic are disclosed. For example, one method involves sending a join message for a multicast group towards a root of a new multicast tree and forwarding multicast traffic, addressed to the multicast group, on a current multicast tree until an acknowledgment corresponding to the join message is received. The new multicast tree can be identified in response to detection of a topology change within the network. Until the acknowledgment is received, multicast traffic that is received via the new multicast tree can be dropped.
摘要:
Methods and apparatus for identifying a best path from a plurality of equal cost paths while accounting for service level agreement (SLA) metrics are disclosed. According to one aspect of the present invention, a method for routing a packet that has a payload using a node includes obtaining the packet, and adding an address of the node to the payload. Adding the address of the node to the payload creates an augmented packet. The method also includes identifying at least one element to which the augmented packet is to be routed, and providing the augmented packet to that element. In one embodiment, the method also includes storing ingress and egress timestamps associated with the node.
摘要:
In one embodiment, a first network device may receive a request for an identifier of at least one target to service a client. The first network device may obtain an identifier of each of two or more targets. The first network device may then determine whether to redirect the request. The first network device may redirect the request to a second network device according to a result of the determining step, where the first network device is in a first autonomous system and the second network device is in a second autonomous system.