Abstract:
A method is described and in one embodiment includes receiving a packet of a traffic flow at an ingress node of a communications network; routing the packet to an egress node of the communications network via a first path comprising a tunnel if the packet was received from a node external to the communications network; and routing the packet to the egress node of the communications network via a second path that does not traverse the tunnel if the packet was received from a node internal to the communications network. The first path is identified by a first Forwarding Information Base (“FIB”) entry corresponding to the flow and the second path is identified by a second FIB entry corresponding to the flow.
Abstract:
A method is described and in one embodiment includes receiving a packet of a traffic flow at an ingress node of a communications network; routing the packet to an egress node of the communications network via a first path comprising a tunnel if the packet was received from a node external to the communications network; and routing the packet to the egress node of the communications network via a second path that does not traverse the tunnel if the packet was received from a node internal to the communications network. The first path is identified by a first Forwarding Information Base (“FIB”) entry corresponding to the flow and the second path is identified by a second FIB entry corresponding to the flow.
Abstract:
A system and method for advertising out-of-resources (OOR) conditions for entities, such as nodes, line cards and data links, in a manner that does not involve using a maximum cost to indicate the entity is “out-of-resources.” According to the technique, an OOR condition for an entity is advertised in one or more type-length-value (TLV) objects contained in an advertisement message. The advertisement message is flooded to nodes on a data network to inform them of the entity's OOR condition. Head-end nodes that process the advertisement message may use information contained in the TLV object to determine a path for a new label switched path (LSP) that does not include the entity associated with the OOR condition.
Abstract:
Methods and systems are disclosed for enabling centralized path definition and policy with distributed path setup, and centralized path setup control with distributed path utilization constraints. In one example, a path computation client (PCC) requests, utilizing opaque PCE profile identifiers, path computation from a path computation element (PCE). The PCE profile identifier corresponds to path computation constraints, stored local to PCE, and are unknown to the PCC. Advantageously, the PCE profile identifiers allow the PCC to initiate path computation requests based on information local the PCC while leveraging centralized computation by the PCE. In another example, a PCE requests, utilizing opaque PCC profile identifiers, that a PCC initiate a path. The PCC profile identifier corresponds to path usage constraints, stored local to PCC, and are unknown to the PCE. Advantageously, the PCC identifiers allow the PCE to marshal path initiation while leveraging distributed resources to enforce compliance with usage parameters.
Abstract:
Utilizing the systems disclosed herein, a network element (in a network) controls, within another network, the constraints of a service, timing of the creation of the service, and selection a service on which a packet is transmitted. For example, a first network element (located in a first network) receives a request associated with initiating a service. The request is received from a second network element located in a second network and includes at least one path constraint. The first network element controls creation of the service in the first network on behalf of the second network element located in the second network by, e.g., identifying a path based, at least in part, on the at least one path constraint; and binding an identifier and an interface to the path, wherein the interface is associated with one or more operation to perform on any traffic that is labeled with the identifier.
Abstract:
A method is provided in one example embodiment and includes receiving a request to create a path through a network, wherein the path originates on a first network device and terminates on the second network device; identifying a first controller associated with the first network device, wherein the first controller proxies control plane functions for the first network device; identifying a second controller associated with the second network device, wherein the second controller proxies control plane functions for the second network device; and computing the path using the first controller as a source and the second controller as a destination. The first controller installs the computed path on the first network device and the second controller installs the computed path on the second network device.
Abstract:
Bandwidth usage for an existing communication tunnel between a first device and second device is monitored. A determination is made that additional bandwidth is required for communication between the first network device and the second network device. A determination is made that for the addition of the additional bandwidth would exceed available bandwidth for the existing tunnel. Additional bandwidth is established between the first network device and the second network device.
Abstract:
At a first network device, a plurality of paths through a network from a source network device to a destination network device are determined. A vacant bandwidth is calculated for each of the plurality of paths. A primary path is selected from the plurality of paths based on the vacant bandwidth, and a standby path is selected from the plurality of paths based on the vacant bandwidth.
Abstract:
Particular embodiments may enable setup and signaling of co-routed and non co-routed label switched paths (LSPs) of a bidirectional packet traffic engineering (TE) tunnel in an unambiguous manner with respect to provisioning of the LSPs/tunnel. A head-end node may set up the bidirectional packet TE tunnel by computing a forward (and possibly a reverse) direction LSP, and then signal the bidirectional TE tunnel utilizing, e.g., extensions to an associated Resource Reservation Protocol (RSVP) signaling method. The extensions to the associated RSVP signaling method include a plurality of additional Association Types of an Extended Association object carried in a RSVP Path message transmitted by the head-end node to the tail-end node over the forward direction LSP, wherein the additional Association Types explicitly identify the provisioning of the forward and reverse direction LSPs as co-routed or non co-routed.
Abstract:
Particular embodiments may enable setup and signaling of co-routed and non co-routed label switched paths (LSPs) of a bidirectional packet traffic engineering (TE) tunnel in an unambiguous manner with respect to provisioning of the LSPs/tunnel. A head-end node may set up the bidirectional packet TE tunnel by computing a forward (and possibly a reverse) direction LSP, and then signal the bidirectional TE tunnel utilizing, e.g., extensions to an associated Resource Reservation Protocol (RSVP) signaling method. The extensions to the associated RSVP signaling method include a plurality of additional Association Types of an Extended Association object carried in a RSVP Path message transmitted by the head-end node to the tail-end node over the forward direction LSP, wherein the additional Association Types explicitly identify the provisioning of the forward and reverse direction LSPs as co-routed or non co-routed.