Abstract:
In one embodiment, when an ingress provider edge (PE) device of a computer network domain receives a frame at the ingress PE device destined to a destination media access control (MAC) address, it can determine whether the frame was received on a root or leaf Ethernet ingress segment, and also whether the destination MAC address is located via a root or leaf Ethernet segment. Accordingly, the ingress PE device may either drop or forward the frame based on the ingress Ethernet segment and destination MAC address Ethernet segment being either a root or a leaf, respectively.
Abstract:
In one embodiment, a method includes processing network data models at a network device configured to operate in a network comprising one or more network components associated with one of the network data models, generating representations of the network data models, the representations comprising labels for elements in the network data models, comparing the labels associated with leaf nodes of the network data models to identify matching leaf nodes, comparing the labels associated with parent nodes of the matching leaf nodes to identify a strength of matching, and mapping at least two of the network data models at the network device based on the strength of matching for use in a network application. An apparatus and logic are also disclosed herein.
Abstract:
In one embodiment, an exploratory linktrace is initiated from an initiating network device with an exploratory linktrace message (ELM) having a target address. Each network device receiving the ELM may then propagate the ELM on a plurality of its ports to a plurality of downstream network devices based on the target address. In addition, each receiving network device returns an exploratory linktrace reply (ELR) for each of the plurality of ports, where each ELR is returned according to one or more mechanisms to mitigate stormed replies to the initiating network device.
Abstract:
In one embodiment, a method includes identifying at a network device, metrics associated with constraints of an optimization problem, receiving values for the metrics from a stream reasoner, obtaining an initial solution of the optimization problem from a linear programming solver based on the values of the metrics, and instructing the linear programming solver to calculate a new solution to the optimization problem when the stream reasoner indicates that the constraints of the optimization problem are violated. An apparatus and logic are also disclosed herein.
Abstract:
In one embodiment, a method includes a method includes obtaining traffic, determining a host Media Access Control (MAC) address, and determining a host Internet Protocol (IP) address using the traffic. The method also includes generating an Ethernet virtual private network (E-VPN) MAC route advertisement that includes both the host MAC address and the host IP address and generating an IP virtual private network (IP-VPN) route advertisement that includes the host IP address.
Abstract:
A method is provided in one example and includes receiving a current bandwidth characteristic for a link, where the current bandwidth characteristic is determined under fading conditions associated with signal propagation on the link. The method can also include calculating a new cost for the link that is different from a nominal cost associated with a nominal bandwidth of the link without the fading conditions. The method could also include routing at least a portion of a plurality of flows that are to traverse the link away from the link based, at least in part, on the new cost. Another example method includes receiving the current bandwidth characteristic for the link, comparing the current bandwidth characteristic with a preconfigured low watermark corresponding to a class-specific MTR topology associated with a class of traffic traversing the link, and removing the link from the MTR topology based on the current bandwidth characteristic.
Abstract:
In one embodiment, when an ingress provider edge (PE) device of a computer network domain receives a frame at the ingress PE device destined to a destination media access control (MAC) address, it can determine whether the frame was received on a root or leaf Ethernet ingress segment, and also whether the destination MAC address is located via a root or leaf Ethernet segment. Accordingly, the ingress PE device may either drop or forward the frame based on the ingress Ethernet segment and destination MAC address Ethernet segment being either a root or a leaf, respectively.
Abstract:
In one embodiment, an aggregation device is configured to aggregate traffic of a plurality of customer edge (CE) devices into a single bridge-domain. The aggregation device receives connectivity fault management (CFM) packets of a CFM protocol from the plurality of CE devices. Each received CFM packet includes a media access control (MAC) address of an access port of the CE device from which the CFM packet was transmitted. The aggregation device detects conflicting MAC addresses between access ports of CE devices by comparing MAC addresses of the received CFM packets. The aggregation device notifies one or more of the plurality of CE devices of the conflict.
Abstract:
In one embodiment, a method includes obtaining a first indication from a first source included in an Ethernet ring and obtaining a second indication from a second source associated with a provider edge (PE) node The method also includes determining when the first indication and the second indication are indicative of a direct failure of the PE node and determining when the first indication and the second indication are indicative of a ring partition failure associated with the Ethernet ring. The direct failure of the PE node is identified when it is determined that the first indication and the second indication are indicative of the direct failure of the PE node, and the ring partition failure associated with the Ethernet ring is identified when it is determined that the first indication and the second indication are indicative of the ring partition failure associated with the Ethernet ring.
Abstract:
A method provided in one example embodiment includes detecting a first current bandwidth of a first link in a network ring, where the first current bandwidth indicates a signal degradation on the first link. The method also includes determining whether the first current bandwidth has degraded more than a second current bandwidth of a second link in the network ring, where the second current bandwidth indicates a signal degradation on the second link. The method further includes routing one or more network flows away from the first link if the first current bandwidth has degraded more than the second current bandwidth.