H04L12/705

VXLAN packet processing method, device, and system

This application provides a VXLAN packet processing method, a device, and a system. After determining that a data packet sent by a CE device is a BUM packet, a PE device encapsulates the BUM packet to generate a VXLAN packet including an ESI label and a VXLAN packet including a BUM traffic label. The VXLAN packet including the ESI label is sent to an active-active gateway, so that the gateway can block forwarding of traffic to the CE device by using an interface configured with an ESI, to avoid a loop between the PE device and the CE device. The VXLAN packet including the BUM traffic label is sent to a remote PE, to block forwarding of the VXLAN packet to the CE device by using a secondary DF interface, thereby avoiding a multi-packet problem.

SYSTEM AND METHOD FOR USING INFINIBAND ROUTING ALGORITHMS FOR ETHERNET FABRICS IN A HIGH PERFORMANCE COMPUTING ENVIRONMENT
20210226851 · 2021-07-22 ·

Systems and methods for using InfiniBand routing algorithms for Ethernet fabrics in a high performance computing environment. The method can provide, at a computer comprising one or more microprocessors, a plurality of switches, a plurality of hosts, a topology provider (TP) module, a routing engine (RE) module, and a switch initializer (SI) module. The method can perform a discovery sweep, by the TP, of the plurality of hosts and the plurality of switches and assigns an address to each of the plurality of hosts and the plurality of switches. The method can calculate, by the routing engine, a routing map, based upon a routing scheme, for the plurality of hosts and the plurality of switches, the routing map comprising a plurality of forwarding tables. The method can configure, each of the plurality of switches with a forwarding table of the plurality of forwarding tables calculated by the routing engine.

Network interface cards, fabric cards, and line cards for loop avoidance in a chassis switch
11075834 · 2021-07-27 · ·

A network interface card installed in a chassis switch, which includes a switch device and a controller, is provided. The switch device includes a plurality of ports coupled to other network interface cards in the chassis switch, and each of the other network interface cards is a fabric card or a line card. The controller is configured to perform different acts according to the card type of the network interface card, wherein the acts constitute a specific process of path planning which may prevent loops from occurring in the communication paths of control packet delivery between multiple network interface cards in the chassis switch.

LOOP DETECTION IN MULTIPROTOCOL LABEL SWITCHING
20210258242 · 2021-08-19 ·

A router is configured for deployment in a network. The router includes a memory configured to store a first identifier that uniquely identifies the router in the network. The router also includes a processor configured to push the first identifier onto a first labeled data packet prior to transmission of the first labeled data packet. In response to detecting the first identifier in a second labeled data packet received from the network, the processor is configured to drop the second labeled data packet.

LOOP AVOIDANCE PROTOCOL
20210306252 · 2021-09-30 ·

Examples disclosed herein relate to a method comprising receiving a control packet originating from a originating network device. The control packet may have a control MAC address identifying the originating network device and the control packet is used for determining a traffic loop in a network including the first network device and the originating network device. The method may include determining, by the first network device, whether the control MAC address of the control packet matches a MAC address of the first network device. Wit is determined that the control MAC address of the control packet matches a MAC address of the first network device, the method may include determining that the match is indicative of the loop and blocking a port of the first network device that the control packet arrived on without blocking any other ports on the first network device. When it is determined that the control MAC address of the control packet does not match the MAC address of the first network device, the method may include transmitting the control packet to a second network device on the network without blocking any port on the first network device that received the control packet.

Inter-cloud communication method and related device, and inter-cloud communication configuration method and related device

An inter-cloud communication method, used to implement communication between two clouds, where virtual machines belonging to a same virtual network are created in the two clouds. A receive end cloud uses a gateway node as an entrance to external communication, and all data packets to be sent to a virtual machine in the receive end cloud are sent to the gateway node, thereby preventing a location change of the virtual machine from affecting a transmit end cloud. In addition, the data packet only needs to pass through the gateway node in the receive end cloud and a computing node on which the virtual machine that receives the data packet is located, that is, the data packet only needs two hops to reach a destination, thereby shortening a communication path, and improving inter-cloud communication efficiency.

Fast and loss-free local recovery by a RPL parent device

In one embodiment, a network device (e.g., a RPL router) executes fast local RPL recovery in a low power and lossy network (LLN). The network device, in response to becoming an orphan in a directed acyclic graph (DAG) topology, can utilize the data plane to maintain at least some data traffic by randomly forwarding the data traffic to identified neighbor devices, while eliminating children from the list of forwarders and by finding successors that can be used for re-parenting. Hence, when a RPL network device having lost its last feasible parent can avoid data loss and accelerate a re-parenting process using local repair in the data plane instead of the control plane of the routing protocol used to establish the DAG topology.

AVOIDING LOOPS BY PREVENTING FURTHER FAST REROUTE (FRR) AFTER AN EARLIER FRR
20210203598 · 2021-07-01 ·

In some cases, once Fast Reroute (FRR) has taken place (e.g., for MPLS protection), a further FRR is undesirable, and even detrimental. A mechanism to prevent a further FRR, once such a further FRR is determined to be potentially harmful, is described.

Data packet transmission method and border routing bridge device
11005763 · 2021-05-11 · ·

A data packet transmission method and a border routing bridge device, where the method includes receiving, by a first border routing bridge device of a first area, a first data packet sent by a border routing bridge device of a second area to the first area, determining, a device identifier group of the second area according to the first data packet, determining, from the device identifier group of the second area, according to the first data packet, a device identifier of a border routing bridge device used to forward a return data packet sent by the target device to the source device, and sending, by the first border routing bridge device, a second data packet carrying the determined device identifier to the target device, where the determined device identifier is used as a source routing bridge device identifier of the second data packet.

ROUTE DETECTION METHOD AND NETWORK DEVICE

A method includes: establishing, by a first network device, a first BMP session with a second network device, and establishing a second BMP session with a third network device; receiving a first BGP route set sent by the second network device, where the first BGP route set includes a BGP route sent by the second network device to the third network device; receiving a second BGP route set sent by the third network device, where the second BGP route set includes the BGP route received by the third network device from the second network device; and when detecting that the second BGP route set includes a first BGP route but the first BGP route set does not include the first BGP route, determining the first BGP route as an unavailable route.