摘要:
In particular embodiments, a first switch implementing a first virtual local area network (VLAN) registration protocol and connected to a first end of the trunk detects whether a second switch connected to a second end of the trunk implements the first VLAN registration protocol. In an embodiment, the second switch may send an unsolicited message to the first switch indicating the VLAN registration protocol implemented by the second switch. The first switch may then determine the VLAN registration protocol implemented by the second switch. Alternatively, the first switch may send a solicited message to the second switch. By receiving a response to the solicited message, the first switch can determine that the second switch implements the first VLAN registration protocol. In response to determining that the second switch implements the first VLAN registration protocol, the first switch may enable a pruning technique in accordance with the first VLAN registration protocol.
摘要:
In particular embodiments, a first switch implementing a first virtual local area network (VLAN) registration protocol and connected to a first end of the trunk detects whether a second switch connected to a second end of the trunk implements the first VLAN registration protocol. In an embodiment, the second switch may send an unsolicited message to the first switch indicating the VLAN registration protocol implemented by the second switch. The first switch may then determine the VLAN registration protocol implemented by the second switch. Alternatively, the first switch may send a solicited message to the second switch. By receiving a response to the solicited message, the first switch can determine that the second switch implements the first VLAN registration protocol. In response to determining that the second switch implements the first VLAN registration protocol, the first switch may enable a pruning technique in accordance with the first VLAN registration protocol.
摘要:
A technique efficiently manages bandwidth (BW) registration for multiple spanning tree options in a computer network. According to the novel technique, an entry bridge determines multiple spanning tree paths to other bridges of the network (namely, one or more available spanning trees rooted at one or more bridges of the network) and determines a utilized (registered) BW on each of those paths. Upon receiving a request to initiate BW registration for a data flow to a destination end point, e.g., from an application source end point, the entry bridge selects one of the spanning tree paths to utilize for the data flow. Selection of the spanning tree path from among the multiple available paths may be based on (i) available bandwidth of the paths, (ii) a shortest of the paths, and (iii) a lowest bridge identifier ID for the bridge root for the path. The entry bridge sends a registration message for the data flow towards the destination end point along the selected spanning tree path. If successful, the data flow is transmitted on the selected path. If not, the entry bridge attempts to register the data flow on a next best alternate spanning tree, e.g., until a successful registration or until a determination that no further alternate spanning trees exist.
摘要:
A system and method creates multiple, symmetric spanning trees within a network. Bridges within the network generate, send and process Spanning Tree Protocol (STP) control messages that are updated as they are propagated across the network to reflect the paths followed by the messages. The bridges, moreover, utilize the path indication value of received STP control messages to compute the spanning trees. The path indication values are preferably derived from the sum of Bridge Identifiers (IDs) corresponding to the bridges through which the STP control message has passed from the root bridge to the current bridge processing the STP control message. Each bridge also tags newly received messages with the Virtual Local Area Network (VLAN) identifier (VID) associated with the spanning tree for which the bridge is the root, thereby causing the messages to follow more optimal paths through the network.
摘要:
The present invention provides a power negotiation protocol that enables PDs and PSEs to negotiate the amount of inline power that a PD consumes and the corresponding PSE provides. This power negotiation allows the PDs provide fine-grained power consumption level to PSEs, and the PSEs are able to manage inline power efficiently using the negotiation protocol of the present invention. The PDs can ask the PSEs for more power when needed rather than having to constantly reserve the maximum amount of power they can consume at all times. Similarly, the PDs can release reservation of excess power when their respective power requirements decrease. The PSEs can limit the amount of power that can be consumed by the PD, thereby providing the ability for an administrator to control how much power a given PD can consume.
摘要:
A technique is provided for mitigating loops in Ethernet networks. A first port in an Ethernet device receives an Ethernet frame. The frame includes a source identifier, a destination identifier, and a Virtual Local Area Network Identifier (VLAN ID). According to various embodiments, the VLAN ID (VID) has the encoding of both a community group as well as a source bridge ID. A VID database is accessed using the destination identifier and the VID to determine whether the first port has ingress enabled. A filtering database is accessed to determine an egress port for forwarding the Ethernet frame.
摘要:
The present invention provides improved unicast routing, multicast routing and unicast load sharing as compared with conventional methods. Preferred implementations of the invention provide improvements to IEEE 802.1Q. According to preferred aspects of the invention, each bridge is the root of its own multiple spanning tree instance (“MSTI”). Preferred implementations of the invention require no learning of media access control (“MAC”) addresses on the backbone of a network. Some methods of the invention can resolve spanning tree asymmetries. Preferred implementations of the invention require a very low computational load for control protocols.
摘要:
Various systems and methods that allow multiple aggregation protocol sessions to be established in a daisy chain network are disclosed. One method involves sending a first aggregation protocol packet and a first session identifier associated therewith to a first network device via a first interface and sending a second aggregation protocol packet and a second session identifier associated therewith to a second network device via the first interface.
摘要:
A broadband access node includes a port for connection with a Digital Subscriber Line and a processor to run code that implements a virtual maintenance end point (vMEP). The vMEP translates an IEEE 802.1ag Loopback Message (LBM) received from a device on an Ethernet access network into a legacy operations and maintenance (OAM) message that is transmitted to a residential gateway (RG) device. The legacy OAM message determines a link-level connectivity status between broadband access node and the RG device. The vMEP also transmits a reply message back to the device on an Ethernet access network in compliance with the IEEE 802.1ag specification. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. 37 CFR 1.72(b).
摘要:
A method for data communication across a layer 2 bridged network having two or more edge nodes configured for receiving and transmitting multiprotocol data packets. The method includes creating a pseudowire circuit across the bridged network, receiving data packets at one of the edge nodes, encapsulating data packets into pseudowire frames, encapsulating the pseudowire frames inside MAC frames, and transmitting the encapsulated frames over the carrier bridged network.