摘要:
In one embodiment, a method includes establishing a control channel across a wide area network (WAN) from a first gateway that has a first public internetwork layer (L3) address to a second gateway that has a second public L3 address. Each gateway connects a local area network (LAN) to the WAN. Negotiations over the control channel establish a first set of private L3 addresses for the first LAN and a non-overlapping second set for the second LAN. A different address from the first set is provided for each different node in the first LAN. A discovery packet is received from the first LAN. The discovery packet is encapsulated in a tunnel packet directed to the second public L3 address. The tunnel packet is sent over the WAN to the second gateway which extracts the discovery packet. The second gateway sends the discovery packet over the second LAN.
摘要:
In one embodiment, a method includes establishing a control channel across a wide area network (WAN) from a first gateway that has a first public internetwork layer (L3) address to a second gateway that has a second public L3 address. Each gateway connects a local area network (LAN) to the WAN. Negotiations over the control channel establish a first set of private L3 addresses for the first LAN and a non-overlapping second set for the second LAN. A different address from the first set is provided for each different node in the first LAN. A discovery packet is received from the first LAN. The discovery packet is encapsulated in a tunnel packet directed to the second public L3 address. The tunnel packet is sent over the WAN to the second gateway which extracts the discovery packet. The second gateway sends the discovery packet over the second LAN.
摘要:
In one embodiment, software code in a respective computer system such as one or more data communication devices establishes multiple layer 2 network links between a first data communication device and a second data communication device. The first data communication device and the second data communication device include corresponding layer 3 interfaces enabling layer 3 network communications over each of the multiple layer 2 network links. The first and second data communication devices route traffic over one (e.g., a primary layer 2 link) of the multiple layer 2 network links using the layer 3 network communications. The private links are media independent. Upon detection of a failure associated with the primary layer 2 link, the data communication devices can automatically switch to sending traffic over a backup link of the multiple layer 2 network links without disrupting publicly advertised routing topology information.
摘要:
A method, apparatus and computer program product for routing data within a packet-switched network using a PW wherein the PW is terminated directly on the layer-3 routing device such that certain services and applications can be utilized is presented. The method, apparatus and computer program product receives an encapsulated layer-2 Protocol Data Unit (PDU) from a pseudowire emulating a service. The encapsulation is removed from the encapsulated layer-2 PDU and a layer-2 circuit associated with the pseudowire is terminated. The circuit is treated as an interface and the PDU is forwarded based on upper layer protocol information within the PDU.
摘要:
A method, apparatus, computer product and structure is presented for representing and managing large amounts of information concerning networks of elements. While being useful for communication networks, it can be also usefully deployed in the context of other networks such as distribution and transportation networks. The method uses a hierarchical construct called “catalog”—a set of elements (which could be “atomic” elements or catalogs themselves)—to organize information about physical or abstract entities relevant for modeling the network. A matrix construct whose rows and columns constitute such elements are used to model connections at different levels of abstraction. A common framework and representation provided using these two constructs is shown to be useful for visualization, administration, configuration, modeling, monitoring and manipulation of the network.