摘要:
A method for forwarding a packet may include generating, by a first hash function module, a first hash value based on data included within the packet. The method may also include generating, by a second hash function module, a second hash value based on data included within the packet. The method may additionally include determining, by a first hash region integral to a memory and associated with the first hash function module, whether an index location of the first hash region corresponding to the first hash value includes an entry. Moreover, the method may include determining, by a second hash region integral to a memory and associated with the second hash function module, whether an index location of the second hash region corresponding to the second hash includes an entry. The method may further include, in response to a determination that at least one of the index location of the first hash region corresponding to the first hash value and the index location of the second hash region corresponding to the second hash value includes an entry, forwarding the packet based on forwarding information included within the entry.
摘要:
In one embodiment, a method for telecommunications includes steps of receiving a first packet through a first port, and determining whether the first packet arrived over a protected path. If the first packet arrived over a protected path, the method also includes the steps of hashing a source address of the first packet, adding a first entry into a forwarding table, and adding a second entry into the forwarding table. The protected path is coupled to at least the first port and a second port. The first entry includes the result of hashing the packet, and an identification of the first port. The second entry includes the result of hashing the packet, and an identification of the second port.
摘要:
In one embodiment, a method for telecommunications includes steps of receiving a first packet through a first port, and determining whether the first packet arrived over a protected path. If the first packet arrived over a protected path, the method also includes the steps of hashing a source address of the first packet, adding a first entry into a forwarding table, and adding a second entry into the forwarding table. The protected path is coupled to at least the first port and a second port. The first entry includes the result of hashing the packet, and an identification of the first port. The second entry includes the result of hashing the packet, and an identification of the second port.
摘要:
A method may include receiving, at a network interface of a first network element, an Internet Group Management Protocol (IGMP) message from a second network element. The method may also include updating first multicast group data associated with the network interface based on the received IGMP message, the first multicast group data including one or more entries setting forth a multicast group and one or more other network elements which are members of the multicast group. The method may additionally include determining whether the second network element is the sole member of its multicast group based on the IGMP message and the first multicast group data. The method may further include forwarding the IGMP message to a switching element of the first network element in response to determining that the second network element is the sole member of its multicast group, the switching element communicatively coupled to the network interface.
摘要:
A network element coupled to a communication network is described. The network element includes multiple switching units. The switching units may be configured to independently implement a Spanning Tree Protocol (xSTP) processing in a completely distributed manner including each of the switching units independently calculating an external spanning tree for the network element in the communication network. The network element may act as a single bridge to other network elements in a bridging domain of the communication network.
摘要:
Methods and systems for improved address table flushing in distributed switching systems may be provided. In accordance with embodiments of the disclosure, a switch may include a plurality of line cards and a processor. Each line card may including a table of addresses. The processor may be configured to, in response to receipt of a plurality of simultaneous requests, each request a request to flush addresses associated with a particular flooding domain present on the switch, perform flushing of addresses based on an aggregate number of address entries for each particular flooding domain associated with the requests.
摘要:
Cooling systems and apparatus for electronic devices and related methods are disclosed. An example electronic device includes a housing including a cover; a keyboard carried by the housing, the keyboard including keycaps, at least a portion of the keycaps protruding relative to the cover, a first gap between a first one of the keycaps and the cover; a backlight carried by the housing, the backlight including a first opening; and a fan carried by the housing, the first opening defining an airflow path in the housing between the fan and the first gap.
摘要:
In accordance with embodiments of the present disclosure, a method is provided for communicating multicast traffic. The method may include in response to receipt of multicast control traffic at a network element to be communicated to a protection switching group, communicating the multicast control traffic to each of a working path and a protection path of the protection switching group. The method may also include in response to receipt of multicast control traffic via either of the working path and the protection path, processing the multicast control traffic as if the multicast control traffic was received via both the working path and the protection path.
摘要:
A switch includes a processor coupled to a memory, one or more forwarding tables residing within the memory, and one or more ports. The ports are associated with a plurality of virtual local area networks and a plurality of bridge domains. Each of the bridge domains is associated with one of the forwarding tables, and each of the forwarding tables is associated with one of the bridge domains. The processor is configured to assign a first tag to a received packet, assign a second tag to the received packet, look up the destination address of the received packet in one of the forwarding tables, and selectively flood the ports of the active bridge domain with a copy of the received packet. The active bridge domain includes one of the plurality of bridge domains. The active bridge domain is associated with the ingress port of the received packet.
摘要:
In accordance with embodiments of the present disclosure, a switch may include a processor and a plurality of line cards, each line card including a table of addresses. The processor may be configured to: (i) read, from a first line card of the plurality of line cards, addresses relating to all flooding domains present on the first line card; (ii) store the addresses read from the first line card on a memory accessible to the processor; (iii) determine a second line card of the plurality of line cards, the second line card having the presence of at least one flooding domain not present on the first line card; (iv) read, from the second line card, addresses relating to all flooding domains present on the second line card; and (v) store the addresses read from the second line card on the memory.