Abstract:
Techniques are described for providing fast convergence in the event of a link failure in an all-active multi-homed Ethernet virtual private network. A provide edge (PE) network device may pre-configure an interface next hop and secondary next hops. The secondary next hops may be logical links to other PE network devices in the same Ethernet segment. In the event of a link failure in the interface next hop between the PE network device and a customer edge (CE) network device, the PE network device may be configured to forward data traffic to the CE network device using the secondary next hops. In the event of a link failure between the PE network device and a core network, the PE network device may be configured to send an out-of-service message to the CE network device that instructs the CE network device to stop sending traffic to the PE network device.
Abstract:
Techniques are described for providing fast convergence in the event of a link failure in an all-active multi-homed Ethernet virtual private network. A provide edge (PE) network device may pre-configure an interface next hop and secondary next hops. The secondary next hops may be logical links to other PE network devices in the same Ethernet segment. In the event of a link failure in the interface next hop between the PE network device and a customer edge (CE) network device, the PE network device may be configured to forward data traffic to the CE network device using the secondary next hops. In the event of a link failure between the PE network device and a core network, the PE network device may be configured to send an out-of-service message to the CE network device that instructs the CE network device to stop sending traffic to the PE network device.
Abstract:
The disclosed computer-implemented method may include (1) identifying a plurality of network paths within a network, (2) identifying a plurality of network services offered via the network, (3) creating a virtual path topology that represents a select grouping of the network paths that (A) originate from a single ingress node within the network and (B) lead to a plurality of egress nodes within the network, (4) mapping at least one of the network services to the virtual path topology, and (5) providing the at least one of the network services to at least one computing device via at least one of the network paths included in the select grouping represented by the virtual path topology. Various other methods, systems, and computer-readable media are also disclosed.
Abstract:
A device receives policy information associated with configuring a network, and receives network information associated with the network. The device determines, based on the network information, that the policy information is associated with implementation of egress peer engineering techniques for the network, and identifies, based on the network information, a first set of destinations of the network that satisfies a particular threshold bandwidth. The device assigns costs and bandwidths to the first set of destinations based on the policy information, and monitors bandwidth utilization by the first set of destinations. The device processes information associated with the first set of destinations, with a model, based on the bandwidth utilization and based on the egress peer engineering techniques, to generate a first set of ranked destinations, and causes traffic in the network to be managed based on the first set of ranked destinations and the policy information.
Abstract:
A device receives policy information associated with configuring a network, and receives network information associated with the network. The device determines, based on the network information, that the policy information is associated with implementation of egress peer engineering techniques for the network, and identifies, based on the network information, a first set of destinations of the network that satisfies a particular threshold bandwidth. The device assigns costs and bandwidths to the first set of destinations based on the policy information, and monitors bandwidth utilization by the first set of destinations. The device processes information associated with the first set of destinations, with a model, based on the bandwidth utilization and based on the egress peer engineering techniques, to generate a first set of ranked destinations, and causes traffic in the network to be managed based on the first set of ranked destinations and the policy information.