H04L12/465

Simulation signal light generation device and simulation signal light generation method

The present disclosure intends to provide an optical signal from an ONU according to a desired service usage state without using the ONU and an OLT. A simulated signal light generation apparatus 10 according to the present disclosure is a simulated signal light generation apparatus 10 for simulating an uplink signal light generated in an optical network unit (ONU) in a passive optical network (PON), and the apparatus includes a usage state control unit 11 that sets a service usage state of the ONU, a signal generation unit 12 that generates an uplink signal frame according to the usage state set by the usage state control unit 11, and an electrical/optical conversion unit 13 that converts an electrical signal from the signal generation unit 12 into an optical signal, and the optical signal from the electrical/optical conversion unit 13 is repeatedly transmitted to an optical fiber core 22.

Method and apparatus for searching for maintenance end point (MEP), and storage medium

Provided is a method and apparatus for searching for a Maintenance End Point (MEP), and a storage medium. The method includes that: a chip of the MEP parses an obtained packet; the chip of the MEP determines whether a field of the parsed packet matches a field in a combination of a port and a Virtual Local Area Network (VLAN); and in a case where the field of the parsed packet matches the field in the combination of the port and the VLAN, the chip of the MEP determines that the MEP is found successfully.

LOOP PREVENTION SYSTEM

A loop prevention system includes a plurality of networking devices that are coupled together to form a Layer Two (L2) domain and at least a portion of the plurality of networking devices are coupled together in a physical loop configuration. A networking device included in the plurality of networking devices may include at least one L2 domain connection that couples the networking device to at least one of the plurality of networking devices in the L2 domain, and an edge connection that connects the networking device to a computing device that is outside of the L2 domain. The networking device may receive a data frame via the edge connection. The networking device then generates a loop breaker data frame by tagging the data frame with a loop breaker tag and forwards the loop breaker data frame via the at least one L2 domain connection.

AUTOMATED CONNECTIVITY TO CLOUD RESOURCES

The present technology pertains to receiving a tag associating at least one routing domain in an on-premises site with at least one virtual network in a cloud environment associated with a cloud service provider. The present technology also pertains to the automation of populating route and propagation tables with the cloud service provider.

Local-bias forwarding of L2 multicast, unknown unicast, and broadcast traffic for an ethernet VPN

In general, techniques are described for forwarding L2 BUM traffic within an Ethernet Virtual Private Network (EVPN) by implementing a forwarding preference for local interfaces of a PE device for broadcast domains in the EVPN. For example, a method includes receiving, by a first provider edge (PE) device of a plurality of PE devices configured with an EVPN instance comprising one or more broadcast domains reachable by a plurality of Ethernet segments connecting the plurality of PE devices to a plurality of customer edge (CE) devices, first EVPN routes; and configuring, by the first PE device in response to determining the first EVPN routes indicate the first PE device has a local interface for each of the plurality of Ethernet segments, forwarding information of the first PE device to cause the first PE device to perform local-bias forwarding of layer 2 (L2) packets for the EVPN instance.

EVPN PACKET FORWARDING METHOD, SYSTEM, STORAGE MEDIUM, AND TERMINAL
20220368628 · 2022-11-17 ·

Disclosed are a method and a system for EVPN message forwarding, a non-transitory computer-readable storage medium and a terminal device. The method includes: reading an Ethernet segment identifier (ESI) label from a message if the message contains the ESI label after receiving the message from an upstream device, and obtaining a port for an Ethernet segment (ES) corresponding to the ESI label according to the ESI label; reading an egress port for the message; and discarding the message if the port for the ES corresponding to the ESI label obtained according to the ESI label is the same as the egress port for the message.

VXLAN packet encapsulation and policy execution method, and VXLAN device and system
11588665 · 2023-02-21 · ·

In a virtual extensible local area network (VXLAN) packet encapsulation and policy execution method, a communications device determines an application identifier for identifying an application type of an Ethernet frame, and places the application identifier in a VXLAN header. Another device may directly execute a corresponding policy based on the application identifier in the VXLAN header and without analyzing a packet.

SYSTEMS AND METHODS FOR ESTABLISHING A BACKUP SECURE COMMUNICATION LINK IN AN ELECTRIC POWER DISTRIBUTION SYSTEM

A controller for an electric power distribution system includes processing circuitry and a memory that includes instructions. The instructions, when executed by the processing circuitry, are configured to cause the processing circuitry to determine that a first switch of the electric power distribution system is a primary switch communicatively coupled to an intelligent electronic device (IED) of the electric power distribution system, determine that a second switch of the electric power distribution system is a backup switch communicatively coupled to the IED, and distribute a first copy of a security association key (SAK) to the first switch and a second copy of the SAK to the second switch in response to determining that the first switch is the primary switch and the second switch is the backup switch to enable the first switch and the second switch to establish respective media access control security (MACsec) communication links with the IED.

Invalidating cached flow information in a cloud infrastructure

Techniques for managing the distribution of configuration information that supports the flow of packets in a cloud environment are described. In an example, a virtual network interface card (VNIC) hosted on a network virtualization device NVD receives a first packet from a compute instance associated with the VNIC. The VNIC determines that flow information to send the first packet on a virtual network is unavailable from a memory of the NVD. The VNIC sends, via the NVD, the first packet to a network interface service, where the network interface service maintains configuration information to send packets on the substrate network and is configured to send the first packet on the substrate network based on the configuration information. The NVD receives the flow information from the network interface service, where the flow information is a subset of the configuration information. The NVD stores the flow information in the memory.

Systems and methods for hierarchical access control across devices in a network environment

Access control systems and methods herein successfully overcome ACL group width limitations of existing designs by splitting an ACL group across different units, e.g., to create two ACL groups that each has a relatively smaller width. In embodiments, availability of ACL space is increased by hierarchically splitting an ACL table to fit into different two coupled devices and modifying certain fields carrying metadata in packets that are exchanged between the devices, such that one chipset may carry information about the lookup of another. In embodiments, an ACL group for a port extender is created by selectively creating a sub-group with qualifiers that fit within an available group width, and moving the remaining qualifiers to a controlling bridge to achieve the desired functionality.