摘要:
A network management and monitoring application employs diagnostic messages for confirming network path connectivity and identifying and locating connectivity faults. Diagnostic messages similar to conventional “ping” and “traceroute” messages traverse the network along a prescribed path for which diagnostic feedback is desired. The application receives and analyzes return messages sent from network entities along the path to ascertain connectivity issues on the path. The application receives layer 3 identifiers such as IP addresses, however performs diagnostic operations such as continuity checks based on layer 2 identifiers such as MAC (Media Access Control) identifiers because certain network entities operate on L2 identifiers and would otherwise evade a continuity check based on layer 3 identifiers. The monitoring application therefore performs continuity diagnostics such as ping and traceroute operations using L2 identifiers, therefore pinpointing problems with an L2 network forwarding entity such as a bridge that lies between L3 entities such as routers.
摘要:
A network management and monitoring application employs diagnostic messages for confirming network path connectivity and identifying and locating connectivity faults. Diagnostic messages similar to conventional “ping” and “traceroute” messages traverse the network along a prescribed path for which diagnostic feedback is desired. The application receives and analyzes return messages sent from network entities along the path to ascertain connectivity issues on the path. The application receives layer 3 identifiers such as IP addresses, however performs diagnostic operations such as continuity checks based on layer 2 identifiers such as MAC (Media Access Control) identifiers because certain network entities operate on L2 identifiers and would otherwise evade a continuity check based on layer 3 identifiers. The monitoring application therefore performs continuity diagnostics such as ping and traceroute operations using L2 identifiers, therefore pinpointing problems with an L2 network forwarding entity such as a bridge that lies between L3 entities such as routers.
摘要:
Techniques disclosed herein include systems and methods for improving multicast traffic operations in a Shortest Path Bridging (SPB) network by conveying bridging domain information of an incoming interface (IIF) when transporting multicast traffic over the SPB network. Techniques disclosed herein include modifying encapsulation packet header information of existing Mac-In-Mac fields to convey additional information that can be interpreted at edge nodes by modifying edge node interpretation of multicast data. Specifically, the value of the I-SID in the BMAC-DA field can be set to be different from the I-SID value in the I-TAG field. Carrying the L2 VSN I-SID value in the I-TAG allows the Egress BEBs to determine which VLAN/L2 VSN/Bridging-Domain of the IIF is in use, and then modify or preserve underlying header information accordingly.
摘要:
A Shortest Path Bridging (SPB) network provides a multicast traceroute using network identifiers such as IP addresses for the source and destination (multicast group). The network identifiers, which are based on layer 3 (IP) designations of the traced multicast group, are mapped to a network identifier of the multicast group (corresponding to a layer 2, or MAC address) and an associated Virtual Local Area Network (VLAN) which is used to transport the packets belonging to the multicast flow. Therefore, an operator issuing the traceroute command need not be familiar with the layer 2 concepts of the network, but rather need only supply the layer 3 (IP address) designations of the concerned entities.
摘要:
A Shortest Path Bridging (SPB) network provides a multicast traceroute using network identifiers such as IP addresses for the source and destination (multicast group). The network identifiers, which are based on layer 3 (IP) designations of the traced multicast group, are mapped to a network identifier of the multicast group (corresponding to a layer 2, or MAC address) and an associated Virtual Local Area Network (VLAN) which is used to transport the packets belonging to the multicast flow. Therefore, an operator issuing the traceroute command need not be familiar with the layer 2 concepts of the network, but rather need only supply the layer 3 (IP address) designations of the concerned entities.15
摘要:
Methods and apparatus provide for a network device(s) employing tree tracer processing of a data packet(s) and/or a response(s) in order to discover and graphically represent all the paths within a hierarchical tree of network devices for multicast traffic flows. Specifically, a first network device receives a data packet. The data packet provides a multicast target MAC address. The first network device forwards the data packet to a plurality of network devices, where each of the plurality of the network devices belong to a multicast group identified according to the multicast target MAC address. Based on receipt of the data packet, the first network device generates and transmits a first response to a source of the data packet. The first response indicates a placement of the first network device with respect to a hierarchical tree of the plurality of network devices belonging to the multicast group.
摘要:
Methods and apparatus provide for a network device(s) employing tree tracer processing of a data packet(s) and/or a response(s) in order to discover and graphically represent all the paths within a hierarchical tree of network devices for multicast traffic flows. Specifically, a first network device receives a data packet. The data packet provides a multicast target MAC address. The first network device forwards the data packet to a plurality of network devices, where each of the plurality of the network devices belong to a multicast group identified according to the multicast target MAC address. Based on receipt of the data packet, the first network device generates and transmits a first response to a source of the data packet. The first response indicates a placement of the first network device with respect to a hierarchical tree of the plurality of network devices belonging to the multicast group.
摘要:
Techniques disclosed herein include systems and methods for providing a scalable solution to transmit edge IP Multicast sender information in a Shortest Path Bridging (SPB) network. Control information is exchanged between Ingress Backbone Edge Bridges and Egress Backbone Edge Bridges using Multicast Flow Specific and type-length-value (TLV) structures, or other control messages, to announce available multicast streams at ingress nodes within the SPB network. Such exchanges of control messages trigger sending SPB specific Intermediate System To Intermediate System (IS-IS) TLV control message with path computation information via IS-IS control messages. This second set of control messages is exchanged within the SPB network and includes source-specific multicast stream information that is used by Backbone Core Bridges to establish a multicast forward state and compute multicast forwarding paths. Multicast data traffic can then be transmitted through the SPB network using a one-to-many distribution model.
摘要:
Techniques herein include systems and methods that extend functionality of transport networks including Transparent Interconnect of Lots of Links (TRILL) networks. Techniques include using a portion of information within transport device address encapsulation headers for purposes other than identifying source and destination device addresses. The system masks a portion of bits in an address header for an address lookup in forwarding tables of a transport network node. The remaining bits in the address field(s) become free bits that can be used for a variety of application purposes, such as flow identifier selection. By using information fields that already exist in encapsulation headers, such techniques provide additional information without increasing packet size or requiring new protocols. Embodiments can combine Equal-cost multi-path routing (ECMP) functionality, Reverse Path Forwarding (RPF) checks, and Time to live (TTL) protection at the same time.
摘要:
An OAM link trace message is sent from a source node to a target node in a link state protocol controlled Ethernet network. The link trace message using an 802.1ag format except, as a destination address, it uses either the unicast Ethernet MAC node ID of the target node, or the multicast destination address of the service instance. A method of network topology verification in a link state protocol controlled Ethernet network checks the link state protocol database at a node to ascertain the control plane topology view of at least part of the network. It then executes one or more Ethernet OAM commands from the node to ascertain the data plane topology view of the same part of the network. The control plane topology view of the network is compared to the data plane topology view of the network to see if they match. An error is flagged if they do not match.