Patent classifications
H04L45/68
Access Layer-2 Virtual Private Network From Layer-3 Virtual Private Network
In an example, a network device may receive a L3VPN packet of which an egress label edge router (LER) is the network device, and acquire an adjacency index of an adjacency entry in an adjacency table according to the destination IP address of the inner IP datagram from the L3VPN packet. The network device may acquire a PW extended index of a PW extended entry in a PW extended table and a private network layer-2 header for the inner IP datagram from an adjacency entry having the adjacency index. By using the private network layer-2 header and a public network label, a private network label and a public network layer-2 header in a PW extended entry having the PW extended index, the network device may encapsulate the inner IP datagram into a L2VPN packet and forward the L2VPN packet through a physical egress interface in the PW extended entry.
Pseudo wire load sharing method and device
A pseudo wire load sharing method, applied to a scenario in which a first provider edge PE device is separately connected to at least one second PE device by using at least two PWs includes receiving, by the first PE device, a data flow from a customer edge CE device, and forwarding the data flow to a PW trunk interface, where the PW trunk interface is associated with at least two active PWs; and performing, by the first PE device, load sharing processing on the data flow, and forwarding the data flow by using the at least two active PWs.
Enhanced hierarchical virtual private local area network service (VPLS) system and method for Ethernet-Tree (E-Tree) services
A network apparatus comprising a trunk end point associated with an Ethernet-tree (E-Tree) service in a network domain and configured to forward a frame that comprises a tag according to the tag in the frame, wherein the tag in the frame is a root tag that indicates a root source of the frame or a leaf tag that indicates a leaf source of the frame, and wherein the trunk end point is coupled to a second end point associated with the E-tree service outside the network domain.
Method for supporting SNCP over packet network
A method is presented for supporting SNCP over a packet network connecting to two SDH sub-networks and transporting one or more SDH paths that are SNCP-protected in both SDH sub-networks. The packet network connects to each of two sub-network interconnection points by a working path and a protection path. The packet sub-network may provide the same type of path protection as an SDH sub-network using SNCP, while avoiding bandwidth duplication.
Dynamic L2VPN pseudowire signaling through segment routing
Systems and methods include receiving a pseudowire configuration for a pseudowire with a second network element; configuring the pseudowire as segment routing; adding the pseudowire configuration in link state advertisements (LSAs) that are flooding in a network via an interior gateway protocol (IGP); and maintaining a state of the pseudowire based on the flooding. The state is maintained without using label distribution protocol (LDP) or border gateway protocol-auto discovery (BGP-AD).
SIGNALING IP ADDRESS MOBILITY IN ETHERNET VIRTUAL PRIVATE NETWORKS
In some examples, a provider edge device provides L2 virtual bridge connectivity for at least one customer network using an EVPN instance and L3 routing using an IRB interface that is a L3 routing interface assigned to the EVPN instance; the provider edge device obtains an indication of a new binding for an endpoint device of the at least one customer network, the new binding comprising a first L2 address and a L3 address that are assigned to the endpoint device; and the provider edge device outputs, in response to determining the provider edge device stores a prior binding for the endpoint device of a second L2 address and the L3 address that are assigned to the endpoint device, an EVPN route comprising an indication of the new binding and an indication the new binding is an updated binding of the prior binding for the endpoint device.
Forward packet with edge device
When a User Edge Device (UED) receives a unicast packet from a user side, the UED searches in a Media Access Control (MAC) table. When a matching entry in the MAC table is found, the UED forwards the unicast packet locally. When no matching entry in the MAC table is found, the UED transmits the unicast packet to a Network Edge Device (NED). When the UED receives a broadcast packet from the user side, the UED broadcasts the broadcast packet within a same Virtual Local Area Network (VLAN) of a local site and forwards to the NED.
Application wire
Transferring data over a network includes identifying an application flow and mapping the application flow to a network bound connection.
Enhanced hierarchical virtual private local area network service (VPLS) system and method for ethernet-tree (E-tree) services
A network apparatus comprising a trunk end point associated with an Ethernet-tree (E-Tree) service in a network domain and configured to forward a frame that comprises a tag according to the tag in the frame, wherein the tag in the frame is a root tag that indicates a root source of the frame or a leaf tag that indicates a leaf source of the frame, and wherein the trunk end point is coupled to a second end point associated with the E-tree service outside the network domain.
Overload functionality in overlay networks
In general, techniques are generally described for reducing or preventing transient black-holing of network traffic in an overlay network. A method includes executing, by a network device included in a link state domain, an Interior Gateway Protocol (IGP) to exchange link-state messages with at least one remote network device in the link-state domain; generating, by the network device, an IGP link-state message that includes link overload information to overload a link in the link-state domain that couples the network device to the remote network device; and sending, by the network device and to the at least one other network device, the IGP link-state message that includes the link overload information to direct the remote network device to stop sending network traffic to the network device using the overloaded link.