Abstract:
Various systems and methods for preventing loops. For example, one method involves receiving a multicast data packet at a node. The node is coupled to a local area network (LAN). An internet protocol (IP) prefix is assigned to the LAN. The method involves determining whether a source address included in the packet is covered by the IP prefix. Depending on the direction of travel of the multicast data packet and whether or not the source address is covered by the IP prefix, the node determines whether a loop exists.
Abstract:
Various systems and methods for performing fast fail-over. For example, one method involves receiving a packet at a node. The packet is received at the node in response to a designated forwarder (DF) detecting loss of communication between the DF and a receiver node. The method also involves determining that the first packet was received via a tunnel. The method also involves forwarding the first packet and initiating a DF election. Forwarding the first packet and initiating the DF election are performed in response to determining that the first packet was received via the tunnel.
Abstract:
Various systems and methods for performing bit indexed explicit replication (BIER). For example, one method involves receiving a first bit string at a node, encapsulating a packet with the first bit string, and forwarding the packet. The method also involves receiving a second bit string at the node and selecting the second bit string. The method also involves encapsulating a second packet with the second bit string and forwarding the second packet.
Abstract:
Methods and network devices are disclosed for traffic-engineered forwarding through a new form of bit indexed explicit replication. In one embodiment, a method includes receiving at a first node in a network a message comprising a message bit array, and comparing bit values at one or more bit positions in the message bit array to one or more entries in a forwarding table stored at the first node. The one or more bit positions correspond in this embodiment to links in the network. This embodiment of the method further includes forwarding the message over a link represented in the forwarding table if a result of the comparing indicates that the link is included in a path to be taken by the message. In a further embodiment of the method, the message is a multicast message and forwarding the message comprises forwarding a replica of the multicast message.
Abstract:
Various systems and methods for performing bit indexed explicit replication (BIER). For example, one method involves receiving a membership request at a node. The membership request is received from a host and the membership request identifies a multicast group. In response to receiving the membership request, the node generates a membership message. The membership message includes information identifying the multicast group and information identifying the node. The node transmits the membership to an overlay participant that stores a bit string associated with the multicast group.
Abstract:
Disclosed is the generation of a bit-indexed forwarding table (BIFT) that can include a plurality of entries, each such entry corresponding to a bit position of a plurality of bit positions, where each such bit position represents an egress network node of a plurality of egress network nodes, and the generating configures the BIFT to be used in forwarding a packet to one or more of the plurality of egress network nodes, based at least in part on a bit string in the packet. The generating includes selecting a bit position of the plurality of bit positions as a selected bit position, creating an entry of the plurality of entries (where the entry corresponds to the selected bit position), identifying a neighbor node associated with the selected bit position, and updating one or more fields of the entry with neighbor information regarding the neighbor node.
Abstract:
Various systems and methods for performing bit indexed explicit replication (BIER). For example, one method involves receiving a membership message that was generated by an egress router, where the membership message comprises information identifying a multicast group, and information identifying a plurality of egress routers. The method identifies at least one bit position in the membership message that is associated with the first egress router, where at least one bit position of the plurality of bit positions is associated with the first egress router. The method also records membership of the first egress router in the multicast group, where the membership is recorded in a bit of a group membership table, and the bit corresponds to the bit position identified in the membership message.
Abstract:
Methods, devices and computer readable storage media for performing bit indexed explicit replication (BIER) are disclosed. One embodiment of a method includes obtaining, at an egress node of a network, a bit position assigned to the egress node. This embodiment also includes sending an outgoing advertisement to other nodes in the network, where the outgoing advertisement identifies the egress node and the assigned bit position. The bit position is within a bit mask comprising bits in a plurality of bit positions, and each bit position corresponds to a respective egress node of the network.
Abstract:
Disclosed is the generation of a bit-indexed forwarding table (BIFT) that can include a plurality of entries, each such entry corresponding to a bit position of a plurality of bit positions, where each such bit position represents an egress network node of a plurality of egress network nodes, and the generating configures the BIFT to be used in forwarding a packet to one or more of the plurality of egress network nodes, based at least in part on a bit string in the packet. The generating includes selecting a bit position of the plurality of bit positions as a selected bit position, creating an entry of the plurality of entries (where the entry corresponds to the selected bit position), identifying a neighbor node associated with the selected bit position, and updating one or more fields of the entry with neighbor information regarding the neighbor node.
Abstract:
Various systems and methods for performing fast fail-over. One method involves electing a first node as a designated forwarder node and electing a second node as a backup designated forwarder node. Prior to detecting a loss of connectivity between the designated forwarder node and the local network, the method elects both the designated forwarder node and the backup designated forwarder node, and the designated forwarder node forwards to a core network at least a first packet received from a local network. Subsequent to detecting a loss of connectivity, using the backup designated forwarder node to forward an instance of a second packet to the core network. In one embodiment, the backup designated forwarder node forwards an instance of the second packet, via a tunnel, to the designated forwarder node, which then forwards the instance of the second packet to the core network following the loss of connectivity.