Patent classifications
H04L12/467
TIME DIVISION CONTROL OF VIRTUAL LOCAL AREA NETWORK (VLAN) TO ACCOMMODATE MULTIPLE VIRTUAL APPLICATIONS
Disclosed methods define VLAN time slots for one or more VLANs within an HCI environment. A management resource may control virtual application access to each VLAN in accordance with the VLAN time slots wherein only one virtual application may connect to the VLAN during a VLAN time slot. Disclosed methods may define VLAN time slots for each of the plurality of virtual applications. The VLAN time slots may be defined dynamically, wherein durations of the VLAN time slots may be re-calculated each VLAN cycle. A duration of the VLAN time slot for a particular virtual application may be determined based on the number of packets transmitted by the virtual application during a previous VLAN cycle. Each VLAN time slot may include an active interval, for transmitting packets, and an inactive interval. Each active interval may include a fixed duration base interval and a variable duration dynamic interval.
Fast provisioning of machines using network cloning
Some embodiments of the invention provide a method for cloning a set of one or more applications implemented by a first set of machines connected through a first logical network that defines a virtual private cloud (VPC) in a set of one or more datacenters. The method detects that the first logical network does not have sufficient resources to process a set of network traffic destined for the set of one or more applications implemented by the first set of machines. Based on said detecting, the method uses a set of network configuration data that configures a set of logical forwarding elements (LFEs) of the first logical network to define a cloned, second logical network for connecting a cloned, second set of machines that implement a second set of one or more applications. The method uses the cloned, second logical network to process at least a subset of the network traffic destined to the set of applications.
Automatic virtual local area network (VLAN) provisioning in data center switches
Techniques are described for automatic provisioning of virtual local area networks (VLANs) on server-facing ports of access switches included in a data center network. Conventionally, VLANs are pre-configured on all server-facing ports of access switches. The techniques described in this disclosure enable automatic provisioning of VLANs on server-facing ports of access switches triggered by traffic received on the ports. The techniques include a feature in a forwarding plane of an access switch that is configured to detect data packets received for an unknown VLAN on a port, and notify a control plane of the access switch of the unknown VLAN on the port. In response to the notification from the forwarding plane, the control plane may authorize and provision the VLAN on the port. The techniques described in this disclosure include hardware-assisted software provisioning of an unknown VLAN on a given port of an access switch.
Integrated console and network management access using an out-of-band-management device
A bidirectional out-of-band management (OOBM) dongle comprises a serial port for receiving console traffic from a console port of a managed switch and an Ethernet port for receiving management port traffic from a management port of the managed switch. In operation, the OOBM dongle multiplexes, via an optional adapter, the console traffic and the management port traffic and generates Ethernet traffic that is then communicated, via an OOBM port on the dongle, to an OOBM switch port of an OOBM switch that acts as a power sourcing device for the OOBM dongle.
Communication Method and Apparatus
In a communication method, when a terminal device initiates establishment of a session of an Ethernet type, a virtual local area network management function entity in a communications system may determine a virtual local area network identifier of a user group to which the terminal device belongs. In this way, a user plane function entity in the session of the terminal device may allocate a plurality of virtual ports to a virtual local area network whose identifier is the virtual local area network identifier and may broadcast the Ethernet broadcast frame on the plurality of virtual ports.
Methods and systems for selectively processing virtual local area network (VLAN) traffic from different networks while allowing flexible VLAN identifier assignment
Methods and systems for selectively processing VLAN traffic from different networks while allowing flexible VLAN identifier assignment are disclosed. According to one aspect, a layer 2 switch includes a virtual switch identifier data structure that associates a VLAN identifier extracted from a layer 2 frame and a port identifier corresponding to a port on which a frame is received with a virtual switch identifier. The virtual switch identifier is used to select a per-virtual-switch data structure, such as a forwarding table. The per-virtual-switch data structure is used to control processing of the layer 2 frame on a per-virtual-switch basis. The per-virtual-switch data structure may also be updated separately from the data structures assigned to other virtual switches.
Fault-tolerant, frame-based communication system
A packet-switched, fault-tolerant, vehicle communication internetwork (100, 400, 500) comprising port-based VLANs. Two or more VLANs are embodied where a source node (110, 410, 510,610) comprises two or more network interface circuits (130,140, 415,425, 515,525, 630,640), and where looping is precluded via specific VLAN tagging and switch ports (131-134, 200, 300, 420, 430, 435, 445, 455, 465, 535, 540, 545, 560, 575, 585, associated with at least one specific VLAN. A destination node (120, 440, 450, 460, 570, 580, 590, 620) may feedback packets to the source node via a general VLAN tag along pathways associated with the two or more specific outgoing VLAN tags.
Relay system and switching device
When a frame is received at a first port, a MCLAG learning frame transmitting unit generates a MCLAG learning frame containing a source MAC address of the frame and transmits it from a bridge port to a peer device. When the MCLAG learning frame is received and the MCLAG learning frame contains a source MAC address and does not contain a MCLAG identifier, a MCLAG learning frame receiving unit learns a second correspondence relation between a port identifier of the bridge port and the source MAC address to an address table.
SCALABLE PHYSICAL LOOP DETECTION IN NON-NATIVE VIRTUAL LOCAL AREA NETWORKS (VLANS)
Systems and methods for detecting physical loops in both native and non-native VLANs are provided. According to one embodiment, a processing resource of a network switch detects a physical loop in a non-native Virtual Local Area Network (VLAN) by configuring a set of one or more network chips (e.g., an ASIC) associated with an interface associated with the non-native VLAN of multiple interfaces of the network switch to provide an indication (e.g., a Media Access Control (MAC) address or a packet) regarding a MAC move event detected on the interface. Responsive to receipt of the indication, it is determined whether a number of MAC move events for the interface meets an event count threshold within each unit of time (e.g., one or more seconds) of multiple consecutive units of time. When the determination is affirmative, the existence of the physical loop is identified.
RESILIENT ZERO TOUCH PROVISIONING
An example branch gateway includes processing circuitry, memory including instructions, and a plurality of ports. The branch gateway transmits, from a plurality of ports, a first broadcast message. The branch gateway receives, in response to the first broadcast message, response messages on respective ports. The branch gateway determines, based on a receipt order of the response messages, an identifying address from a first response message. The branch gateway assigns the respective port for each response message to a unique VLAN. The branch gateway determines, for each port assigned to a unique VLAN, a link health parameter. The branch gateway selects a primary port to connect to an activation server of a WAN. The branch gateway selects a secondary port to connect to the activation server.