H04L12/4675

Logical Router Comprising Disaggregated Network Elements

A logical router includes disaggregated network elements that function as a single router and that are not coupled to a common backplane. The logical router includes spine elements and leaf elements implementing a network fabric with front panel ports being defined by leaf elements. Control plane elements program the spine units and leaf to function a logical router. The control plane may define operating system interfaces mapped to front panel ports of the leaf elements and referenced by tags associated with packets traversing the logical router. Redundancy and checkpoints may be implemented for a route database implemented by the control plane elements. The logical router may include a standalone fabric and may implement label tables that are used to label packets according to egress port and path through the fabric.

Logical Router Comprising Disaggregated Network Elements

A logical router includes disaggregated network elements that function as a single router and that are not coupled to a common backplane. The logical router includes spine elements and leaf elements implementing a network fabric with front panel ports being defined by leaf elements. Control plane elements program the spine units and leaf to function a logical router. The control plane may define operating system interfaces mapped to front panel ports of the leaf elements and referenced by tags associated with packets traversing the logical router. Redundancy and checkpoints may be implemented for a route database implemented by the control plane elements. The logical router may include a standalone fabric and may implement label tables that are used to label packets according to egress port and path through the fabric.

Dynamic Burn Slot Allocator

An information handling system receives a media access control address associated with a device installed in a burn slot, and determines a virtual private network that is associated with the media access control address. The system also determines a switch port in a network switch that corresponds to the virtual private network, and dynamically assigns the switch port that corresponds to the virtual private network to the device installed in the burn slot. The system instructs the network switch to route packets of data associated with the virtual private network via the switch port to the device installed in the burn slot.

Ring protection network division

Examples herein involve dividing a ring protection network into multiple ring protection networks. Examples include detecting a disconnection in a ring protection network, determining whether an owner of the ring protection network is in a new ring protection network divided from the ring protection network, and establishing an owner of the new ring protection network based on whether the owner of the ring protection network is in the new ring protection network.

METHOD AND APPARATUS FOR IMPLEMENTING A FLEXIBLE VIRTUAL LOCAL AREA NETWORK
20200153660 · 2020-05-14 ·

A method and apparatus for implementing a virtual local area network. The method includes determining a global virtual local area network for transmitting a data frame in response to receiving the data frame at a first switch, encapsulating the data frame based at least in part on said determination and transmitting it to at least one second switch over the determined global virtual local area network. The data frame is received at the second switch and an identifier of the global virtual local area network is obtained according to the data frame. Based at least in part on the identifier of the global virtual local area network, it is determined that which local virtual local area network served by the second switch the de-capsulated data frame can be sent to.

System and method for managing site-to-site VPNs of a cloud managed network

A management server includes a configuration and management module processing server configuration information, including a VPN peer list and VLAN/subnet settings. The management server automatically calculates the VPN configuration information, including the VPN peer subnet route information identifying which of the subnets participating in the VPN are behind which of the routers and keys to establish VPN tunnels between those routers participating in the VPN. Each of the routers participating in the VPN includes a VPN tunnel with the other routers participating in the VPN, a set of data structures storing data identifying contact information for each of the subnets participating in the VPN, a combination of an IP address and port to reach one of routers that that subnet is behind, and a forwarding module to forward traffic between the subnets.

Method, system, and apparatus for classifying uplink and downlink traffic in networks

The disclosed computer-implemented method for classifying uplink and downlink traffic in networks may include (1) maintaining a routing table that includes a plurality of routes that define paths to a plurality of network destinations in connection with a network, (2) receiving a packet to be routed toward a network destination based at least in part on a route that defines a path to the network destination in connection with the MPLS network, (3) identifying, within the routing table, the route that defines the path to the network destination, (4) determining, based at least in part on the route identified within the routing table, whether the packet represents uplink or downlink traffic, and then (5) classifying the packet as uplink or downlink traffic based at least in part on the determination. Various other methods, systems, and apparatuses are also disclosed.

NODE PROTECTION FOR BUM TRAFFIC FOR MULTI-HOMED NODE FAILURE

Techniques are described for facilitating node protection for Broadcast, unknown Unicast, and Multicast (BUM) traffic for a multi-homed node failure. For example, each VTEP (e.g., PE device) may advertise a protected VTEP address that indicates an IP address of a remote PE device that is to be protected in the event of a node failure. In the event a multi-homed PE device fails, the ingress PE device sends a BUM packet including the protected VTEP address for the failed node. When an egress PE device receives the BUM packet, the egress PE device determines whether the BUM packet includes the protected VTEP address and whether the egress PE device is operating as a backup designated forwarder (DF). If the BUM packet includes the protected VTEP address and the egress PE device is a backup DF, the egress PE device forwards the BUM traffic to the ESI.

SCALABLE TENANT NETWORKS
20200119951 · 2020-04-16 ·

Template-driven locally calculated policy updates for virtualized machines in a datacenter environment are described. A central control and monitoring node calculates and pushes down policy templates to local control and monitoring nodes. The templates provide boundaries and/or a pool of networking resources, from which the local control and monitoring node is enabled to calculate policy updates for locally instantiated virtual machines and containers.

Method, apparatus, and system for selecting network device

Embodiments of the present invention disclose apparatuses. The apparatus includes a program instructing hardware and a computer readable storage medium coupled to the hardware and storing programming instructions for execution by the hardware, the programming instructions instruct the hardware to: receive a network device selection message sent by a first network device, where the network device selection message contains a virtual local area network (VLAN) mapping capability identifier of the first network device and a device identifier of the first network device; when determining that both the apparatus and the first network device have VLAN mapping capability according to local VLAN mapping capability and the VLAN mapping capability identifier of the first network device, select a network device for executing VLAN mapping according to sizes or a sequence of a local device identifier and the device identifier of the first network device.