Patent application number | Description | Published |
20080259784 | Failure notification in a network having serially connected nodes - Multicast capabilities of a link state protocol controlled network are used to accelerate the flooding advertisement of topology change notifications within portions of the network. This flooding mechanism may be particularly efficient in a network with a large number of two-connected nodes such as a ring network architecture. A control plane specific multicast group address is used when flooding topology change notifications, and a process such as reverse path forwarding check is used as an additional control on forwarding of the notification to prevent looping of control plane packets. Two-connected nodes insert a forwarding entry into their FIB to enable frames containing the control message to be forwarded via the data plane on to the downstream node so that propagation of the control message along a chain of two-connected nodes may occur at data plane speeds. | 10-23-2008 |
20090168666 | Implementation of VPNs over a link state protocol controlled Ethernet network - Nodes on a link state protocol controlled Ethernet network implement a link state routing protocol such as IS-IS. Nodes assign an IP address or I-SID value per VRF and then advertise the IP addresses or I-SID values in IS-IS LSAs. When a packet is to be forwarded on the VPN, the ingress node identifies the VRF for the packet and performs an IP lookup in customer address space in the VRF to determine the next hop and the IP address or I-SID value of the VRF on the egress node. The ingress node prepends an I-SID or IP header to identify the VRFs and then creates a MAC header to allow the packet to be forwarded to the egress node on the link state protocol controlled Ethernet network. When the packet is received at the egress node, the MAC header is stripped from the packet and the appended I-SID or IP header is used to identify the egress VRF. A customer address space IP lookup is then performed in the identified VRF on the egress node using the information in the client IP header to determine how to forward the packet. Customer reachability information within a VPN may be exchanged between VRFs using iBGP, or directly by using link state protocol LSAs tagged with the relevant I-SID. | 07-02-2009 |
20090168780 | MPLS P node replacement using a link state protocol controlled ethernet network - When a MPLS Virtual Forwarding Entity (VFE) on a Link State Protocol Controlled Ethernet Network learns a forwarding equivalency class (FEC) to label binding from an attached MPLS-LER, it will determine an associated MAC address for the FEC, and advertise the FEC/label binding along with the MAC address. Nodes in the Ethernet network will install shortest path forwarding state for the MAC to the MPLS-VFE advertising the FEC/label binding. Each MPLS-VFEs on the Ethernet network that receive the advertisement will update its database and generate a label that is distributed to attached MPLS LERs using LDP. When the MPLS-LER needs to transmit traffic to the FEC, it will use the label provided by the MPLS-VFE. The MPLS-VFE maintains a mapping between the label and the MAC address so that it may use the MAC address to forward the packet across the Ethernet network. | 07-02-2009 |
20090232005 | IP Network and Performance Monitoring Using Ethernet OAM - Network and performance monitoring in a link state protocol controlled Ethernet network. A first node receives a network layer monitoring command from a network layer monitoring requestor. The monitoring command is directed to a second node. The first node resolves the network layer monitoring command into one or more Ethernet OAM command(s); The first node sends the Ethernet OAM command(s) to the second node, receives the results of the Ethernet OAM command(s) from the second node; and returns the results of the Ethernet OAM command(s) in the form of a network layer response to the network layer monitoring requestor. Furthermore, network layer monitoring commands may be one or more performance monitoring commands, and the Ethernet OAM commands can include Y.1731 commands. An IP flow can be adjusted between the first node and the second node in response to the network layer response returned to the network layer monitoring requestor. | 09-17-2009 |
20090232006 | Continuity Check Management in a Link State Controlled Ethernet Network - An OAM link trace message is sent from a source node to a target node in a link state protocol controlled Ethernet network. The link trace message using an 802.1ag format except, as a destination address, it uses either the unicast Ethernet MAC node ID of the target node, or the multicast destination address of the service instance. A method of network topology verification in a link state protocol controlled Ethernet network checks the link state protocol database at a node to ascertain the control plane topology view of at least part of the network. It then executes one or more Ethernet OAM commands from the node to ascertain the data plane topology view of the same part of the network. The control plane topology view of the network is compared to the data plane topology view of the network to see if they match. An error is flagged if they do not match. | 09-17-2009 |
20090234969 | Automatic MEP Provisioning in a Link State Controlled Ethernet Network - Ethernet OAM MEPs are automatically configured in a link state protocol controlled Ethernet network. A node operating in the link state protocol controlled Ethernet network receives a Link State PDU (LSP) containing a TLV having a MEP associated with the Ethernet MAC node ID of a second node in the link state protocol controlled Ethernet network, where the path between the first and second node includes a plurality of links. The node updates a forwarding table to indicate an association between the MEP ID and a Ethernet MAC node ID of the second node. An Ethernet OAM maintenance endpoint is produced in a link state protocol controlled Ethernet network by hashing a Sys-ID to produce a MEP; storing the MEP in a TLV; and forwarding the TLV over the link state protocol controlled Ethernet network in an LSP. | 09-17-2009 |
20090279536 | IP forwarding across a link state protocol controlled ethernet network - Nodes on an Ethernet network run a link state protocol on the control plane and install shortest path forwarding state into their FIBs to allow packets to follow shortest paths through the network without requiring MAC header replacement at each hop through the network. When a node learns an IP address, it will insert the IP address into its link state advertisement to advertise reachability of the IP address to the other nodes on the network. Each node will add this IP address to its link state database. If a packet arrives at an ingress node, the ingress node will read the IP address, determine which node on the link state protocol controlled Ethernet network is aware of the IP address, and construct a MAC header to forward the packet to the correct node. The DA/VID of the MAC header is the nodal MAC of the node that advertised the IP address. Unicast and multicast IP forwarding may be implemented. | 11-12-2009 |
20100316056 | TECHNIQUES FOR ROUTING DATA BETWEEN NETWORK AREAS - Techniques for routing data between network area are disclosed, In one particular exemplary embodiment, the techniques may be realized as a method for routing data between layer 2 network areas of backbone bridges comprising the steps of receiving data at a network element containing an internally terminated Network to Network Interface (NNI) for a plurality of network areas, identifying a destination address associated with the data, determining a network area of the plurality of network areas associated with the data, and performing one or more data flow treatments associated with the data using the internally terminated Network to Network Interface (NNI). | 12-16-2010 |
20110103263 | Implementation of VPNs over a Link State Protocol Controlled Ethernet Network - Nodes on a link state protocol controlled Ethernet network implement a link state routing protocol such as IS-IS. Nodes assign an IP address or I-SID value per VRF and then advertise the IP addresses or I-SID values in IS-IS LSAs. When a packet is to be forwarded on the VPN, the ingress node identifies the VRF for the packet and performs an IP lookup in customer address space in the VRF to determine the next hop and the IP address or I-SID value of the VRF on the egress node. The ingress node prepends an I-SID or IP header to identify the VRFs and then creates a MAC header to allow the packet to be forwarded to the egress node on the link state protocol controlled Ethernet network. When the packet is received at the egress node, the MAC header is stripped from the packet and the appended I-SID or IP header is used to identify the egress VRF. A customer address space IP lookup is then performed in the identified VRF on the egress node using the information in the client IP header to determine how to forward the packet. Customer reachability information within a VPN may be exchanged between VRFs using iBGP, or directly by using link state protocol LSAs tagged with the relevant I-SID. | 05-05-2011 |
20110255417 | AUTOMATIC MEP PROVISIONING IN A LINK STATE CONTROLLED ETHERNET NETWORK - Ethernet OAM MEPs are automatically configured in a link state protocol controlled Ethernet network. A node operating in the link state protocol controlled Ethernet network receives a Link State PDU (LSP) containing a TLV having a MEP associated with the Ethernet MAC node ID of a second node in the link state protocol controlled Ethernet network, where the path between the first and second node includes a plurality of links. The node updates a forwarding table to indicate an association between the MEP ID and a Ethernet MAC node ID of the second node. An Ethernet OAM maintenance endpoint is produced in a link state protocol controlled Ethernet network by hashing a Sys-ID to produce a MEP; storing the MEP in a TLV; and forwarding the TLV over the link state protocol controlled Ethernet network in an LSP. | 10-20-2011 |
20120233350 | TECHNIQUES FOR ROUTING DATA BETWEEN NETWORK AREAS - Techniques for routing data between network area are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for routing data between layer 2 network areas of backbone bridges comprising the steps of receiving data at a network element containing an internally terminated Network to Network Interface (NNI) for a plurality of network areas, identifying a destination address associated with the data, determining a network area of the plurality of network areas associated with the data, and performing one or more data flow treatments associated with the data using the internally terminated Network to Network Interface (NNI). | 09-13-2012 |
20120257514 | Failure Notification in a Network Having Serially Connected Nodes - Multicast capabilities of a link state protocol controlled network are used to accelerate the flooding advertisement of topology change notifications within portions of the network. This flooding mechanism may be particularly efficient in a network with a large number of two-connected nodes such as a ring network architecture. A control plane specific multicast group address is used when flooding topology change notifications, and a process such as reverse path forwarding check is used as an additional control on forwarding of the notification to prevent looping of control plane packets. Two-connected nodes insert a forwarding entry into their FIB to enable frames containing the control message to be forwarded via the data plane on to the downstream node so that propagation of the control message along a chain of two-connected nodes may occur at data plane speeds. | 10-11-2012 |
20120263075 | Method and Apparatus for Exchanging Routing Information and the Establishment of Connectivity Across Multiple Network Areas - Routes may be installed across multiple link state protocol controlled Ethernet network areas by causing ABBs to leak I-SID information advertised by BEBs in a L1 network area into an L2 network area. ABBs will only leak I-SIDs for BEBs where it is the closest ABB for that BEB. Where another ABB on the L2 network also leaks the same I-SID into the L2 network area from another L1 network area, the I-SID is of multi-area interest. ABBs will advertise I-SIDs that are common to the L1 and L2 networks back into their respective L1 network. Within each L1 and L2 network area, forwarding state will be installed between network elements advertising common interest in an ISID, so that multi-area paths may be created to span the L1/L2/L1 network areas. The L1/L2/L1 network structure may recurse an arbitrary number of times. | 10-18-2012 |
20120287795 | Continuity Check Management in a Link State Controlled Ethernet Network - An OAM link trace message is sent from a source node to a target node in a link state protocol controlled Ethernet network. The link trace message uses an 802.1 | 11-15-2012 |
20130229921 | METHOD AND APPARATUS FOR INTERNETWORKING ETHERNET AND MPLS NETWORKS - MPLS networks offering PW or VPLS services may be interconnected with Ethernet networks implemented according to 802.1ah or 802.1Qay. The MPLS network may be a core and offer services to the Ethernet access networks, or vise-versa. Additionally, a mixture of different types of access networks may be interconnected by an MPLS core or an Ethernet core. Both network interworking and service interworking are provided. OAM fault detection may be implemented via maintenance entities extending across the network or end to end depending on the combination of networks and services offered by the networks. | 09-05-2013 |
20130230050 | METHOD AND APPARATUS FOR INTERNETWORKING ETHERNET AND MPLS NETWORKS - MPLS networks offering PW or VPLS services may be interconnected with Ethernet networks implemented according to 802.1ah or 802.1Qay. The MPLS network may be a core and offer services to the Ethernet access networks, or vise-versa. Additionally, a mixture of different types of access networks may be interconnected by an MPLS core or an Ethernet core. Both network interworking and service interworking are provided. OAM fault detection may be implemented via maintenance entities extending across the network or end to end depending on the combination of networks and services offered by the networks. | 09-05-2013 |
20130235875 | METHOD AND APPARATUS FOR INTERNETWORKING ETHERNET AND MPLS NETWORKS - MPLS networks offering PW or VPLS services may be interconnected with Ethernet networks implemented according to 802.1ah or 802.1Qay. The MPLS network may be a core and offer services to the Ethernet access networks, or vise-versa. Additionally, a mixture of different types of access networks may be interconnected by an MPLS core or an Ethernet core. Both network interworking and service interworking are provided. OAM fault detection may be implemented via maintenance entities extending across the network or end to end depending on the combination of networks and services offered by the networks. | 09-12-2013 |
20140301244 | Method and Apparatus for Exchanging Routing Information and the Establishment of Connectivity Across Multiple Network Areas - Routes may be installed across multiple link state protocol controlled Ethernet network areas by causing ABBs to leak I-SID information advertised by BEBs in a L1 network area into an L2 network area. ABBs will only leak I-SIDs for BEBs where it is the closest ABB for that BEB. Where another ABB on the L2 network also leaks the same I-SID into the L2 network area from another L1 network area, the I-SID is of multi-area interest. ABBs will advertise I-SIDs that are common to the L1 and L2 networks back into their respective L1 network. Within each L1 and L2 network area, forwarding state will be installed between network elements advertising common interest in an ISID, so that multi-area paths may be created to span the L1/L2/L1 network areas. The L1/L2/L1 network structure may recurse an arbitrary number of times. | 10-09-2014 |