Abstract:
In one embodiment, a plurality of virtual private local area network services (VPLSs) are operated among a plurality of packet switching devices, with the plurality of VPLSs including a first VPLS and a different second VPLS. In response to a conversion declaration including a particular Service Instance VLAN ID (I-SID), the first VPLS corresponding to the particular I-SID is converted to a different type of virtual private network (VPN) service, while continuing to operate the different second VPLS which is not related to the particular I-SID. In one embodiment, the different type of VPN service is Provider Backbone Bridging Ethernet VPN (PBB-EVPN). In one embodiment, the conversion declaration is a Border Gateway Protocol (BGP) Network Layer Reachability Information (NLRI) of Route Type 3 Inclusive Multicast Ethernet Tag (IMET) route.
Abstract:
Systems, methods, and computer-readable media for flushing of Customer Media Access Control (C-MAC) addresses in a PBB-EVPN network are disclosed. A first provider edge (PE) device can maintain a plurality of service instances configured on a first interface. The first PE device can detect at least one failed ethernet virtual circuit (EVC) on the first interface and identify at least one service instance from the plurality of service instances that is associated with the at least one failed EVC. The PE device can send, to a second PE device, a C-MAC flush notification message that identifies the at least one service instance and the message can cause the second PE device to remove C-MAC addresses corresponding to the at least one service instance and the B-MAC address for the first interface.
Abstract:
In one embodiment, a plurality of virtual private local area network services (VPLSs) are operated among a plurality of packet switching devices, with the plurality of VPLSs including a first VPLS and a different second VPLS. In response to a conversion declaration including a particular Service Instance VLAN ID (I-SID), the first VPLS corresponding to the particular I-SID is converted to a different type of virtual private network (VPN) service, while continuing to operate the different second VPLS which is not related to the particular I-SID. In one embodiment, the different type of VPN service is Provider Backbone Bridging Ethernet VPN (PBB-EVPN). In one embodiment, the conversion declaration is a Border Gateway Protocol (BGP) Network Layer Reachability Information (NLRI) of Route Type 3 Inclusive Multicast Ethernet Tag (IMET) route.
Abstract:
In one embodiment, when an ingress provider edge (PE) device of a computer network domain receives a frame at the ingress PE device destined to a destination media access control (MAC) address, it can determine whether the frame was received on a root or leaf Ethernet ingress segment, and also whether the destination MAC address is located via a root or leaf Ethernet segment. Accordingly, the ingress PE device may either drop or forward the frame based on the ingress Ethernet segment and destination MAC address Ethernet segment being either a root or a leaf, respectively.
Abstract:
Techniques for stitching multicast trees in a multiple data center environment. According to one embodiment, a technique for stitching multicast trees is provided, which includes determining, at an edge device of a data center, one or more Virtual Local Area Networks (VLANs) assigned to the edge device as a result of a designated forwarder election. An assigned forwarder message is sent by the edge device to one or more devices on the data center, the assigned forwarder message advertising the edge device as a designated forwarder for the VLANs assigned to the edge device. For each of the VLANs assigned to the edge device, the assigned forwarder message causes the edge device to be included in a multicast tree for the VLAN when the assigned forwarder message is received by specific ones of the devices in the data center that are associated with the VLAN.
Abstract:
In one embodiment, a particular autonomous system border router (ASBR), in a control-plane media access control (MAC) learning (CPML) network, discovers other ASBRs in the CPML network, the particular ASBR and other ASBRs interconnected with respective ASBRs of a data-plane MAC learning (DPML) network. The particular ASBR calculates one or more internal shortest path first (SPF) trees rooted respectively at each of the other ASBRs in the CPML network, and upon receiving a MAC advertisement route for a given MAC address with a given next-hop IP address, it may determine a distance from the particular and each other ASBR in the CPML network to the given IP address based on the internal SPF trees. In response to the distance from the particular ASBR being shorter than the distance from each other ASBR, the particular ASBR is designated as a designated forwarder (DF) for traffic sourced from the given MAC address.
Abstract:
In one embodiment, one or more point-to-point (P2P) services are established between attachment circuits on provider edge (PE) devices in a computer network, and each of the one or more P2P services (e.g., Virtual Private Wire Service, VPWS) are associated with an Ethernet virtual private network (E-VPN) Ethernet Auto-Discovery (A-D) route, where links between the PE devices and customer edge (CE) devices are configured as Ethernet interfaces with Ethernet tagging. As such, the Ethernet A-D route may then be exchanged for each P2P service attachment circuit, and forwarding can be performed on the one or more P2P services without performing a media access control (MAC) address lookup and without performing MAC learning.
Abstract:
In one embodiment, a method includes obtaining a first indication from a first source included in an Ethernet ring and obtaining a second indication from a second source associated with a provider edge (PE) node The method also includes determining when the first indication and the second indication are indicative of a direct failure of the PE node and determining when the first indication and the second indication are indicative of a ring partition failure associated with the Ethernet ring. The direct failure of the PE node is identified when it is determined that the first indication and the second indication are indicative of the direct failure of the PE node, and the ring partition failure associated with the Ethernet ring is identified when it is determined that the first indication and the second indication are indicative of the ring partition failure associated with the Ethernet ring.