摘要:
A switch includes a processor coupled to a memory, one or more forwarding tables residing within the memory, and one or more ports. The ports are associated with a plurality of virtual local area networks and a plurality of bridge domains. Each of the bridge domains is associated with one of the forwarding tables, and each of the forwarding tables is associated with one of the bridge domains. The processor is configured to assign a first tag to a received packet, assign a second tag to the received packet, look up the destination address of the received packet in one of the forwarding tables, and selectively flood the ports of the active bridge domain with a copy of the received packet. The active bridge domain includes one of the plurality of bridge domains. The active bridge domain is associated with the ingress port of the received packet.
摘要:
In accordance with embodiments of the present disclosure, a switch may include a processor and a plurality of line cards, each line card including a table of addresses. The processor may be configured to: (i) read, from a first line card of the plurality of line cards, addresses relating to all flooding domains present on the first line card; (ii) store the addresses read from the first line card on a memory accessible to the processor; (iii) determine a second line card of the plurality of line cards, the second line card having the presence of at least one flooding domain not present on the first line card; (iv) read, from the second line card, addresses relating to all flooding domains present on the second line card; and (v) store the addresses read from the second line card on the memory.
摘要:
In one embodiment, the internal path traversed by packets between two user visible interface, selected by a user, is displayed. The path displayed includes internal interfaces traversed by the packets. First and second count values showing the packets traversing each displayed internal interface at the beginning and end of a selected time period are also displayed. A delta, being the difference between the first and second count values for each internal interface indicates the number of packets traversing the interface during the time period and can be analyzed to determine the identity of a packet processing hardware logic block where packets might be getting dropped.
摘要:
A method for priority-based protection includes assigning a priority to each of a plurality of flows associated with a plurality of working paths, wherein each of the plurality of the flows has a unique priority. The method also includes determining that one or more of the working paths has failed, and determining the available bandwidth on a protection path upon the failure of the one or more of the working paths. In addition, the method includes determining the priority of the flows on the one or more failed working paths, and switching two or more flows from the one or more failed working paths to the protection path based on at least the priority of the two or more flows, the bandwidth of the working path and the available bandwidth on the protected path.
摘要:
A method may include, by a first network interface: receiving a packet having a flow via a first port of the first network interface; examining the packet to determine an ingress local forwarding identifier (LFID) associated with the flow of the packet; converting the ingress LFID to a global forwarding identifier (GFID) of the network element; and forwarding the packet to a switching element. The method may also include, by the switching element: determining a second network interface for egress of the packet based on the GFID; and forwarding the packet to the second network interface. The method may further include, by the second network interface: converting the GFID to an egress LFID associated with the flow of the packet; and forwarding the packet to a second port of the second network interface and a flow of the second network interface based on the egress LFID.
摘要:
In accordance with embodiments of the present disclosure, a switch may include a processor and a plurality of line cards, each line card including a table of addresses. The processor may be configured to: (i) read, from a first line card of the plurality of line cards, addresses relating to all flooding domains present on the first line card; (ii) store the addresses read from the first line card on a memory accessible to the processor; (iii) determine a second line card of the plurality of line cards, the second line card having the presence of at least one flooding domain not present on the first line card; (iv) read, from the second line card, addresses relating to all flooding domains present on the second line card; and (v) store the addresses read from the second line card on the memory.
摘要:
A method for reducing memory entries in a ternary content-addressable memory may include determining if a first entry and a second entry are associated with the same data value. The method may also include determining if the first entry can be masked such that searching the memory with the content value of either of the first entry or the second entry returns the same data value. The method may further include, in response to determining that the first entry and a second entry are associated with the same data value and determining that the first entry can be masked such that addressing the memory with the content value of either of the first entry or the second entry returns the same data value: (i) masking the first entry such that addressing the memory with the content value of either of the first entry or the second entry returns the same data value; and (ii) deleting the second entry.
摘要:
A method for networked communications includes receiving, on an inbound port, a frame to be forwarded, mapping the received frame to a flooding domain, determining an inbound port through which a frame is received, wherein the plurality of ports includes the inbound port, determining a destination address of the received frame, and determining one or more of the plurality of ports through which the received frame is to be forwarded. If the line card contains a port that is part of the flooding domain, the method includes populating a forwarding table associated with the line card with information regarding the received frame and information regarding the flooding domain. If the line card contains no ports that are part of the flooding domain, the method includes populating no forwarding tables associated with the line card with information regarding the received frame and information regarding the flooding domain.
摘要:
In one embodiment, a switch includes a processor coupled to a memory, one or more forwarding tables residing within the memory, and one or more ports. The one or more ports are associated with a plurality of virtual local area networks. The one or more ports are associated with a plurality of bridge domains. Each of the bridge domains is associated with one of the forwarding tables, and each of the forwarding tables is associated with one of the bridge domains. The processor is configured to assign a first tag to a received packet, the first tag comprising an identification of an active bridge domain, assign a second tag to the received packet, look up the destination address of the received packet in one of the forwarding tables, and if the destination address is not found in the forwarding table, and selectively flood the one or more ports of the active bridge domain with a copy of the received packet. The active bridge domain includes one of the plurality of bridge domains. The active bridge domain is associated with the ingress port of the received packet. The second tag includes an identification of one of the plurality of virtual local area networks.
摘要:
A method may include creating an L3-L2 database on a first switch, the database having one or more entries, each entry: (a) associating a Level 3 (L3) unique identifier associated with a virtual local area network (VLAN) communicatively coupled to the first switch to a Level 2 (L2) unique identifier associated with the VLAN, and (b) associating the L3 unique identifier with a port of the first switch. The method may also include receiving a network packet at the first switch. The method may additionally include determining if a destination VLAN for the network packet has a corresponding entry in the L3-L2 database. The method may further include switching the network packet to the port in response to a determination that the destination VLAN for the network packet has a corresponding entry in the L3-L2 database, such that the packet is communicated to one of: (a) the destination VLAN, and (b) a second switch intermediate to the first switch and the destination VLAN.