Abstract:
A method and apparatus for including network security information in a frame is disclosed. Network security information (330) is included in a secure portion of overhead of a frame (340). The network security information is configured to facilitate network security. A network device (600) configured to process a frame is also disclosed. The frame includes frame security information and network security information. The frame security information is configured to facilitate securing a portion of overhead of the frame, and the network security information is located in the secure portion of the overhead of the frame and is configured to facilitate network security.
Abstract:
Delivering every packet of a stream simultaneously along two different paths gives a high assurance that the destination will receive at least one of them, even if a single failure occurs. The present idea uses the topology protocols to know when to regenerate a dual stream after one failure occurs, so that the dual delivery, and thus assurance against further failures, is maintained.
Abstract:
In one embodiment, a physical (PHY) layer (lower protocol stack layer) of a device may add a timestamp to a received frame, and pass the frame and timestamp up the protocol stack toward a synchronization (sync) recognition layer (upper protocol stack layer). The sync recognition layer determines whether the frame relates to synchronization, and if so, places the timestamp into a data structure along with a frame association for recovery by follow up processing. Conversely, in another embodiment, the sync recognition layer may add to a frame for transmission a frame ID having an indication of whether to timestamp the frame and may pass the frame and frame ID down the protocol stack toward the FY layer. The FY layer determines whether the frame ID indicates that the frame is to be time stamped, and if so, places a timestamp corresponding to frame transmission into a data structure with the frame ID.
Abstract:
A system and method detects and responds to failures occurring in a virtual switch. The virtual switch is formed from two or more physical switches interconnected by a Virtual Switch Link (VSL). One physical switch is elected the Master, and it executes a link aggregation protocol for the virtual switch. If the VSL fails, one of the other physical switches assumes that it should become the Master for the virtual switch, and it begins executing the link aggregation protocol. By adding information unique to the physical switches in the control packets of the link aggregation protocol, remote switches can identify when the VSL fails, and report this condition to the original Master. In response, the original Master or the new Master takes corrective action.
Abstract:
A method of implementing a spanning tree protocol for a wireless network conforming to a wireless network standard, the spanning tree protocol substantially conforming to the IEEE 802.1 standard, including a first wireless bridging node wirelessly transmitting BPDU information to other wireless bridging nodes of the network or wirelessly receiving BPDU information from other wireless bridging nodes, the BPDU information encapsulated in one or more control/management frames, e.g., beacon or probe response frames of the wireless network standard, the BPDU information relating to a spanning tree topology containing the first and other wireless bridging nodes.
Abstract:
A system and method monitors links in a computer network and rapidly detects failures of such links. Network entities (106) disposed at opposite ends of a link are provided with failure detection engines (210) that signal their presence to each other. Thereafter, each failure detection engine ensures that its entity transmits a continuous stream to the other entity by sending either data frames (204) or newly defined failure detection packets. If an interruption in this continuous stream is detected, then the failure detection engine (210) concludes that the link has failed. In response, the failure detection engine preferably notifies other applications or protocols of the failure, and causes the link to be shut-down.
Abstract:
A technique efficiently manages bandwidth (BW) registration for multiple spanning tree options in a computer network. According to the novel technique, an entry bridge determines multiple spanning tree paths to other bridges of the network (namely, one or more available spanning trees rooted at one or more bridges of the network) and determines a utilized (registered) BW on each of those paths. Upon receiving a request to initiate BW registration for a data flow to a destination end point, e.g., from an application source end point, the entry bridge selects one of the spanning tree paths to utilize for the data flow. Selection of the spanning tree path from among the multiple available paths may be based on (i) available bandwidth of the paths, (ii) a shortest of the paths, and (iii) a lowest bridge identifier ID for the bridge root for the path. The entry bridge sends a registration message for the data flow towards the destination end point along the selected spanning tree path. If successful, the data flow is transmitted on the selected path. If not, the entry bridge attempts to register the data flow on a next best alternate spanning tree, e.g., until a successful registration or until a determination that no further alternate spanning trees exist.
Abstract:
A system and method efficiently conveys Virtual Local Area Network (VLAN) membership information across a bridged network. In particular, an intermediate network device, such as a bridge, includes a plurality of ports for interconnecting entities s of a computer network. For each port, a Generic Attribute Registration Protocol (GARP) participant is established that has a compact GARP VLAN Registration Protocol (GVRP) application component and a GARP Information Declaration (GID) component. The GID component operates a plurality of state machines to maintain registration state for all of the VLANs of which the port has been made aware. The compact- GVRP application component further includes an encoder/decoder unit that collapses VLAN registration information according to an encoding algorithm. The collapsed VLAN registration information is then loaded into a single compact-GVRP PDU message for transmission from the respective port. The encoder/decoder unit also recovers encoded VLAN registration from received compact-GVRP PDU messages for operating the state machines.
Abstract:
A system maps network messages between a customer Virtual Local Area Network (VLAN) domain and a provider VLAN domain. Specifically, one or more ports of an intermediate network device includes frame mapping logic and may further include a plurality of highly flexible, programmable mapping tables. In accordance with the invention, a received frame associated with a customer VLAN is mapped to a provider VLAN that is selected as a function of the frame's customer VLAN and the particular port on which the frame is received. The frame may also be mapped to a provider CoS value that is selected as a function of the frame's customer CoS value, customer VLAN and the port on which the frame is received The provider VLAN designation and provider CoS value may be appended to the frame. Forwarding decisions within the provider domain are based, at least in part, on the frame's provider VLAN designation and provider CoS value.
Abstract:
A method and system for multi-bridge LAN aggregation is disclosed. The method includes aggregating a plurality of LAN coupling a host (356) to a first (342) and a second (344) intermediate network device. The system includes an intermediate network device. The intermediate network device includes a multi-bridge engine (404). The multi-bridge engine (404) includes a tunnel engine (410) coupled to a bridge interconnect port (412) and a first physical port (402).