US20160191462A1 - Message forwarding in a virtual local area network - Google Patents
Message forwarding in a virtual local area network Download PDFInfo
- Publication number
- US20160191462A1 US20160191462A1 US15/018,992 US201615018992A US2016191462A1 US 20160191462 A1 US20160191462 A1 US 20160191462A1 US 201615018992 A US201615018992 A US 201615018992A US 2016191462 A1 US2016191462 A1 US 2016191462A1
- Authority
- US
- United States
- Prior art keywords
- mac address
- network device
- aggregated
- message
- vlan
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 claims abstract description 33
- 230000002776 aggregation Effects 0.000 claims description 79
- 238000004220 aggregation Methods 0.000 claims description 79
- 230000006870 function Effects 0.000 claims description 8
- 230000004044 response Effects 0.000 claims 1
- 101100513046 Neurospora crassa (strain ATCC 24698 / 74-OR23-1A / CBS 708.71 / DSM 1257 / FGSC 987) eth-1 gene Proteins 0.000 description 19
- 230000008569 process Effects 0.000 description 16
- 101100367244 Arabidopsis thaliana SWA1 gene Proteins 0.000 description 11
- 238000012545 processing Methods 0.000 description 7
- 238000004891 communication Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 5
- 238000005538 encapsulation Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000007717 exclusion Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 230000005012 migration Effects 0.000 description 1
- 238000013508 migration Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000013468 resource allocation Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/50—Address allocation
- H04L61/5038—Address allocation for local use, e.g. in LAN or USB networks, or in a controller area network [CAN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4633—Interconnection of networks using encapsulation techniques, e.g. tunneling
-
- H04L61/6022—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4641—Virtual LANs, VLANs, e.g. virtual private networks [VPN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4641—Virtual LANs, VLANs, e.g. virtual private networks [VPN]
- H04L12/4675—Dynamic sharing of VLAN information amongst network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/04—Network management architectures or arrangements
- H04L41/046—Network management architectures or arrangements comprising network management agents or mobile agents therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
- H04L49/35—Switches specially adapted for specific applications
- H04L49/354—Switches specially adapted for specific applications for supporting virtual local area networks [VLAN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
- H04L61/2592—Translation of Internet protocol [IP] addresses using tunnelling or encapsulation
-
- H04L61/6095—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2101/00—Indexing scheme associated with group H04L61/00
- H04L2101/60—Types of network addresses
- H04L2101/618—Details of network addresses
- H04L2101/622—Layer-2 addresses, e.g. medium access control [MAC] addresses
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2101/00—Indexing scheme associated with group H04L61/00
- H04L2101/60—Types of network addresses
- H04L2101/695—Types of network addresses using masks or ranges of addresses
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
Definitions
- enterprise networks and data centres span across a number of geographically dispersed network sites. Similar services are deployed at the sites connected via layer 2 connectivity.
- virtual machines are allowed to migrate among data centers. The process of virtual machine migration may be transparent to users and in which case their IP addresses remain unchanged.
- FIG. 1 is a flowchart of an example process for message forwarding between geographically dispersed network sites
- FIG. 2 is a schematic diagram of an example network for message forwarding between geographically dispersed network sites
- FIG. 3 is a schematic diagram of an example message forwarding process applicable to aggregated layer devices and access layer devices in the network in FIG. 2 ;
- FIG. 4 is a schematic diagram of an example structure of a device capable of acting as an aggregation layer device or access layer device.
- edge devices In a network where Virtual Local Area Networks (VLANs) are deployed over geographically dispersed network sites, edge devices (also referred to as “aggregation layer device”) exchange MAC address information of host devices so that they are able to forward traffic within that VLAN.
- Each host device generally connects to an edge device via an access layer device, which may be a server etc.
- Each edge device stores a MAC address table with a destination host device's MAC address at a local or remote site. To forward a message to the host device, the edge device performs a MAC address table lookup to search for the host device's MAC address (i.e. destination MAC address) in the message.
- the present disclosure describes message forwarding in a network where Virtual Local Area Networks (VLANs) are deployed over geographically dispersed sites in a network that comprises a first aggregation layer device at a first site and second first aggregation layer device at a second site.
- VLANs Virtual Local Area Networks
- the first aggregation layer device learns Media Access Control (MAC) address information received from the second aggregation layer device.
- the MAC address information includes: a VLAN identifier (ID), an aggregated MAC address and an aggregated MAC address mask configured at the second site.
- ID VLAN identifier
- aggregated MAC address an aggregated MAC address mask configured at the second site.
- the first aggregation layer device searches for the MAC address information based on the VLAN ID and destination MAC address and forwards the message to the second aggregation layer device according to the MAC address information.
- the destination MAC address belongs to the same MAC address segment as the aggregated MAC address and searching for the MAC address information comprises mask matching based on the aggregated MAC address mask.
- MAC address aggregation is used to reduce the size of MAC address information learned and maintained by the first aggregation layer device. Instead of learning the individual MAC addresses of different host devices, the first aggregation layer device learns an aggregated MAC address that aggregates multiple MAC addresses of different host devices. In practice, since there are many host devices and access layer devices connected to an aggregation layer device, the size of the MAC address information may be significantly reduced by way of MAC address aggregation and mask matching during message forwarding.
- an aggregation layer device may be connected to over 500 servers (access layer devices). Each server may configure multiple MAC addresses, in which case the number of MAC addresses can easily reach if not exceed an upper storage limit of an aggregation layer device.
- the use of aggregated MAC addresses alleviates the need to store a large number of MAC addresses, thereby supporting deployment of large-scale data center network. Further, traffic relating to MAC address information advertisement is also reduced, alleviating the processing burden at the edge devices and within the network.
- the term “aggregation layer device” refers generally to a network device (e.g. switch etc.) deployed on an aggregation layer of the network 200 , and will be used interchangeably with “edge device” throughout the present disclosure.
- the aggregation layer (also known as convergence layer) facilitates message forwarding among access layer devices within a local site (e.g. Site A), or from a local site to a remote site (e.g. from Site A to Site B).
- the term “access layer device” refers generally to a network device (e.g. switch, server etc.) that is deployed on an access layer of the network to connect host devices to the aggregation layer device.
- MAC address information refers generally to information relating to MAC address, and may include an entry a local MAC address table learned via software and/or hardware.
- FIG. 2 is a schematic diagram of an example network 200 in which multiple edge devices 210 (e.g. SWA and SWB) at geographically dispersed network sites 212 (e.g. sites A and B) are connected via a core network 220 .
- the example network 200 may employ suitable technology, such as Ethernet Virtual Interconnect (EVI) and Overlay Transport Virtualization (OTV) etc.
- EVI Ethernet Virtual Interconnect
- OTV Overlay Transport Virtualization
- EVI is an advanced MAC in Internet Protocol (IP) technology for implementing the layer 2 virtual private network (L2VPN) technology in an IP-based core network 220 .
- IP Internet Protocol
- L2VPN layer 2 virtual private network
- a VPN instance may be established among different edge devices 210 .
- the example network 200 in FIG. 2 includes the following:
- the site network 212 represents a layer 2 network which operates independently and is connected to the core network 220 via at least one edge device 210 .
- the site network 212 also generally includes a host device (e.g. Host B in Site B) that is connected to the edge device 210 (e.g. SWB) via an access layer device 214 (e.g. SWB1).
- the edge devices 210 e.g. SWA and SWB
- access layer devices e.g. SWA1-N and SWB1-M
- host devices e.g. Hosts A-N at Site A and Hosts B-M at Site B
- the core network 220 represents a network that includes IP routing devices for providing interconnection between the geographically dispersed sites 212 .
- An overlay network 230 (e.g. EVI network) represents a virtual network established between edge devices 210 at geographically dispersed sites 212 and provides layer 2 interconnection between the sites to form a larger layer 2 forwarding domain.
- the network 230 (e.g. EVI network) includes virtual links 232 (e.g. EVI links) and virtual link interfaces (e.g. EVI-link interfaces) to carry layer 2 traffic of an extended VLAN between sites 212 .
- the virtual links 232 connecting the edge devices 210 of different sites 212 may be any suitable communication channels over a Layer 3 core network 220 .
- a physical communication medium may be virtualized to include multiple communication channels such that traffic of one communication channel is separated from that of a different communication channel (e.g. using a suitable identifier etc.).
- the virtual link may be a Layer 2 virtual link (e.g. virtual Ethernet link) tunnelled through the Layer 3 network using any suitable protocol (e.g. Generic Routing Encapsulation (GRE) etc.). Layer 2 traffic between sites is encapsulated with an IP header to reach its destination via the core network 120 .
- GRE Generic Routing Encapsulation
- neighbour discovery and MAC address learning are generally performed to form neighbouring relationship and exchange MAC address information.
- Neighbour discovery is performed by edge devices 210 to discover each other and form a neighbouring relationship prior to advertising their MAC address information.
- Any suitable protocol may be used for automatic neighbour discovery, such as EVI neighbour discovery protocol (ENDP) in an EVI network etc.
- EVI neighbour discovery protocol EVI neighbour discovery protocol
- ENDS EVI Neighbour Discovery Server
- ENDC EVI Neighbour Discovery Client
- the ENDS After learning information (e.g. IP address) of each ENDC in an EVI network instance via an EVI registration request, the ENDS distributes all received information to the ENDC via a registration reply message.
- the ENDC Upon receiving the reply message, the ENDC establishes an EVI link 232 with other ENDC.
- Edge devices 210 of all member sites 212 in an EVI network instance may carry out the same registration process, at the end of which each member automatically discovers all information of other members.
- An authentication function may also be configured to prevent malicious nodes from registering to the EVI network 230 .
- multiple ENDS may be configured to provide backup for each other.
- a virtual link 232 is established after the neighbour discovery process.
- the edge devices 210 notify each other of MAC address information of hosts and devices connected to the edge devices 210 .
- the MAC address information provides information relating unicast MAC address reachability and may be exchanged using any suitable protocol such as Intermediate System-to-Intermediate System (IS-IS) routing protocol etc.
- IS-IS Intermediate System-to-Intermediate System
- This routing protocol is independent from, and does not affect, routing protocols of the layer 3 network in the core network or within a site.
- configuring a tunnel interface on the edge device 210 will automatically initiate the IS-IS routing protocol without additional configuration, although parameters of the routing protocol may be adjusted.
- the IS-IS routing protocol When EVI is used for example, running the IS-IS routing protocol includes EVI IS-IS neighbour negotiation, link state protocol (LSP) updates and so on, and the messages involved are transmitted via the virtual links established by the neighbour discovery protocol.
- the IS-IS routing protocol runs on a point-to-point virtual connection between two edge devices. Each edge device 210 performs a unicast IP address encapsulation of the messages (e.g. Hello and LSP messages), copies and sends them to every remote edge device.
- Traffic may then be forwarded between sites once neighbouring relationship is established between edge devices and MAC address information exchanged.
- a local physical interface is used as an outgoing interface (e.g. EthN) to forward a message to a local destination MAC address.
- the outgoing interface is not a local physical interface, but a tunnel interface (e.g. EVI tunnel interface).
- the edge device e.g. SWA
- encapsulates the original Ethernet frame e.g. GRE encapsulation by adding an outer layer IP header, a link layer header and a check sum).
- the source IP address in the outer layer IP header is the IP address of a carrier interface of a tunnel interface
- the destination IP address is the IP address of the remote edge device (e.g. SWB) obtained by MAC address table lookup.
- MAC address aggregation may be used to reduce the size of MAC address information maintained and exchanged by aggregation layer devices 210 .
- a first aggregation layer device e.g. SWA
- learns MAC address information received from a second aggregation layer device e.g. SWB
- a VLAN ID e.g. 1
- aggregated MAC address e.g. 1
- aggregated MAC address mask aggregated MAC address mask
- the first aggregation layer device e.g. SWA
- the second aggregation layer device e.g. SWB
- MAC address aggregation reduces the size of MAC address information stored and processed by the aggregation layer devices.
- Blocks 360 and 370 which are applicable to the first aggregation layer device (e.g. SWA), are related to blocks 110 and 120 in FIG. 1 .
- first and second in FIG. 3 are merely used to indicate a “first aggregation layer device” (e.g. SWA) is forwarding a message to a “second aggregation layer device” (e.g. SWB).
- first and second do not indicate any specific sequence or order and the roles may be reversed when SWB sends a message to SWA.
- An aggregation layer device may be capable of acting as both the first aggregation device (message sender) and second aggregation layer device (message recipient).
- the former when SWA is forwarding a message to SWB, the former may also be referred to as the local device and the latter as the remote device from the perspective of SWA.
- each access layer device in a site network is configured with an aggregated MAC address and aggregated MAC mask.
- the aggregated MAC addresses configured on different access layer devices may be different from each other.
- the MAC addresses of host devices e.g. Host B to Host M at Site B
- the access layer device e.g. SWB1
- aggregated MAC address 0001-0001-0000 and aggregated MAC mask FFFF-FFFF-0000 are configured on access layer device SWA1 at site A.
- aggregated MAC address 0002-0002-0000 and aggregated MAC mask FFFF-FFFF-0000 may be configured on SWB1 at site B.
- the access layer device (e.g. SWB1 at Site B) assigns MAC addresses to its connected host devices based on the configured aggregated MAC address (e.g. 0002-0002-0000).
- the assigned MAC addresses belong to the same MAC address segment as the aggregated MAC address.
- the access layer device calculates MAC addresses that are within the MAC address segment of the aggregated MAC address before assigning the MAC addresses to the host devices in turn.
- each host device Upon receiving the assigned MAC address, each host device update its MAC address to the assigned MAC address.
- Any suitable protocol may be used to send the MAC addresses to the host devices (e.g. host B), such as Data Center Bridging Exchange (DCBX) by adding a Type-Length-Value (TLV) field in a DCBX protocol message as shown in Table 1.
- DCBX Data Center Bridging Exchange
- TLV Type-Length-Value
- SWA1 calculates a list a of MAC addresses that may be assigned to its connected host devices, e.g. host device A. Each host device corresponds to an interface of the access layer device. For example, SWA1 assigns MAC address 0001-0001-0001 to host device A, which is connected to SWA1 via interface P1 of SWA1. SWA1 stores the corresponding relationship between the interface and MAC address, i.e. P1->0001-0001-0001.
- SWB1 assigns MAC address 0002-0002-0002 to host device B. Since SWB1 is connected to host device B via interface P1, SWB1 also stores the relationship between P1->0002-0002-0002. When a message addressed to MAC address 0002-0002-0002 is received, the outgoing interface for the message is port P1 of SWB1.
- the host devices A and B are notified by SWA1 and SWB1 of their assigned MAC address (e.g. via a DCBX protocol message) and update their MAC address accordingly.
- the MAC address of host device A is updated to 0002-0002-0002, while host device B's MAC address is 0001-0001-0001.
- an access layer device notifies its aggregation layer device (e.g. SWB) of a VLAN ID, and the aggregated MAC address and aggregated MAC address mask configured at 310 .
- the VLAN ID identifies a VLAN whose traffic is permitted to pass through an interface of the access layer device.
- LLDP Link Layer Discovery Protocol
- the access layer device may send the VLAN ID, aggregated MAC address and aggregated mask to the aggregation layer device via an LLDP message with the following TLV fields.
- SWA1 is connected to SWA via port P2 of SWA1, which belongs to VLAN100 and VLAN200.
- SWA1 modifies the LLDP protocol message with added TLV fields identifying VLAN100 and VLAN200, aggregated MAC address 0001-0001-0000 and aggregated MAC mask FFFF-FFFF-0000.
- the LLDP protocol message is then sent to SWA via port P2.
- SWB1 is connected to SWB via port P2 of SWB1, which belongs to VLAN100 and VLAN200.
- SWB1 modifies the LLDP protocol message with added TLV fields identifying VLAN100 and VLAN200, aggregated MAC address 0002-0002-0000 and aggregated MAC mask FFFF-FFFF-0000, and sends the LLDP protocol message to SWB via port P2.
- an aggregation layer device learns the MAC address information that includes the VLAN ID, aggregated MAC address and aggregated MAC mask.
- the MAC address information is received from an access layer device (e.g. SWB1) via one of the interfaces of the aggregation layer device (e.g. Eth1 of SWB).
- learning the MAC address information may include first learning the MAC address information by software by adding a MAC address entry in a local software MAC address table. Each entry, which corresponds to a different VLAN ID, may include the VLAN ID, aggregated MAC address, aggregated MAC mask and outgoing interface information. The MAC address entry is then distributed to a hardware MAC address table for hardware matching of MAC address during message forwarding.
- the aggregation layer device may also prohibit hardware learning of MAC address information on the interface (e.g. Eth1 of SWB). Since an aggregated MAC address is used, it is not necessary for the interface to learn the individual MAC addresses of host devices at the site.
- SWB receives an LLDP protocol message from SWB1 via interface Eth1 and parses the information.
- SWB disables the hardware MAC address learning function on interface Eth1 and stores the following MAC address information.
- SWA receives an LLDP protocol message from SWA1 via interface Eth1 and parses the information. SWA disables the hardware MAC address learning function on interface Eth1 and stores the following MAC address information.
- the aggregation layer device finds an outgoing interface for a received message based on the aggregated MAC mask and a destination MAC address that is within the same MAC address segment of the aggregated MAC address.
- Mask matching is used instead of direct matching of the MAC address.
- hardware learning and advertisement of the MAC address may be performed as usual.
- the local MAC address information of one aggregation layer device is received by another aggregation layer device (e.g. SWA) via a virtual link (e.g. EVI tunnel).
- the MAC address information may be sent way of any suitable protocol, such as IS-IS etc.
- SWA and SWB notify each other of their MAC address information.
- the following tables show example MAC address information learned by SWA and SWB.
- the size of the MAC address information in Table 5 and Table 6 is significantly reduced compared to the case where the individual MAC address of each host device is learned.
- an aggregated MAC address and aggregated MAC mask are learned for each VLAN ID.
- an aggregation layer device e.g. SWA
- the aggregation layer device Upon receiving the message 372 via an interface, the aggregation layer device (e.g. SWA) may determine whether the hardware MAC address learning function of the interface is disabled. If yes, the aggregation layer device (e.g. SWA) does not learn the message's source MAC address. Based on the message's VLAN ID and destination MAC address, the aggregation layer device (e.g. SWA) looks up a local hardware MAC address table by way of mask matching.
- the hardware MAC address learning function of the interface is disabled. If yes, the aggregation layer device (e.g. SWA) does not learn the message's source MAC address. Based on the message's VLAN ID and destination MAC address, the aggregation layer device (e.g. SWA) looks up a local hardware MAC address table by way of mask matching.
- SWA receives an Ethernet message addressed to VLAN 100 and destination MAC address 0002-0002-0002 via interface Eth1. Since hardware MAC address learning is disabled on Eth1, SWA does not learn the source MAC address of the message. Based on the VLAN ID and destination MAC address in the Ethernet frame, SWA searches Table 5 by way of mask matching. The matching entry is as follows:
- the first aggregation layer device e.g. SWA
- the second aggregation layer device e.g. SWB
- the first aggregation layer device finds that an outgoing interface in the matching MAC address entry is a tunnel interface (e.g. EVI tunnel interface), and encapsulates the original Ethernet frame (e.g. GRE encapsulation).
- a tunnel interface e.g. EVI tunnel interface
- GRE encapsulation e.g. GRE encapsulation
- the source IP address in the outer layer IP header may be the IP address of a carrier interface of a tunnel interface associated with the virtual link between the first and second aggregation layer devices.
- the destination IP address of the message is ‘IP B’ in the matching MAC address entry in Table 7.
- the second aggregation layer device receives the message 392 via the virtual link (e.g. via tunnel interface), de-encapsulates the message and looks up a local hardware MAC address table using mask matching according to the VLAN ID, and destination MAC address in the received message. The message is then forwarded via a local interface according to information in the matching hardware MAC address table entry to reach a host device with the destination MAC address.
- the virtual link e.g. via tunnel interface
- SWB performs mask matching to find the following matching MAC address table entry.
- the outgoing interface in this case is a local interface, Eth1 at SWB.
- SWB forwards the Ethernet message via interface Eth1 to reach host device B with MAC address 0002-0002-0002.
- an example network device 400 that includes a processor 410 , a memory 420 and a network interface device 440 that communicate with each other via bus 430 .
- the processor 410 is to perform processes described herein with reference to FIG. 1 to FIG. 3 .
- the network device 400 may be capable of acting as an (a) aggregation layer device or (b) access layer device.
- the network device 400 is capable of acting as a first aggregation layer device (e.g. SWA) for message forwarding in a network where VLANs are deployed over geographically dispersed sites.
- the network e.g. FIG. 2
- the processor 410 of the network device 400 is to:
- Learn MAC address information received from the second aggregation layer device that includes: a VLAN ID an aggregated MAC address and an aggregated MAC address mask configured at the second site.
- the destination MAC address belongs to the same MAC address segment as the aggregated MAC address and searching for the MAC address information comprises mask matching based on the aggregated MAC address mask.
- the memory 420 may store any necessary data 422 for facilitating message forwarding between geographically dispersed network sites.
- the data 422 includes information relating to MAC address information discussed with reference to Tables 1 to 7.
- the MAC address information includes VLAN ID, aggregated MAC address, and aggregated MAC address mask.
- the memory 420 may store machine-readable instructions 424 executable by the processor 410 to cause the processor 410 to perform processes described herein with reference to FIG. 1 to FIG. 3 .
- the instructions 424 include receiving instruction 432 , processing instruction 434 and forwarding instruction 436 .
- the receiving instruction 432 is to receive MAC address information received from the second aggregation layer device that includes: a VLAN, an aggregated MAC address and an aggregated MAC address mask configured at the second site.
- the processing instruction 434 is to learn the MAC address information.
- the receiving instruction 432 is to further receive a message addressed to the VLAN ID and a destination MAC address.
- the processing instruction 434 is further to search for the MAC address information based on the VLAN ID and destination MAC address and the forwarding instruction 436 is to forward the message to the second aggregation layer device according to the MAC address information.
- the destination MAC address belongs to the same MAC address segment as the aggregated MAC address and searching for the MAC address information comprises mask matching based on the aggregated MAC address mask.
- the network device 400 is capable of acting as an aggregation layer device in a network deployed with EVI.
- the aggregation layer device includes an aggregated MAC entry learning module.
- An aggregated MAC entry learning module for (i) receiving from an interface a VLAN ID that is allowed to pass through a port of an access layer device, and an aggregated MAC address and a mask configured on the access layer device which are reported by the access layer device, (ii) learning MAC entries via software, distributing the entries to a hardware MAC table, and (iii) disabling the interface's function of hardware learning of MAC entries, (iv) sending all MAC entries learned via software to an aggregation layer device at the opposite terminal of an EVI tunnel.
- the aggregated MAC entry learning module is further for receiving from a non-local aggregation layer device the MAC entries learned via software, and distributing said MAC entries to a hardware MAC table.
- the MAC entries include VLAN ID that is allowed to pass through a port of an access layer device under said non-local aggregation layer device, an aggregated MAC address and a mask.
- a traffic forwarding module for receiving an Ethernet message from said interface. If the traffic forwarding module finds that the interface's function of hardware learning of MAC entries is disabled, the traffic forwarding module does not learn the message's source MAC address. Instead, based on the message's VLAN ID and destination MAC address, the traffic forwarding module is to search for a matching MAC entry in the local hardware MAC table by way of mask matching, and forward the message according to the matching MAC entry.
- the network device 400 is capable of acting as an access layer device (e.g. SWB1) in a network that includes a first aggregation layer device (e.g. SWA) at a first site, second first aggregation layer device (e.g. SWB) at a second site.
- an access layer device e.g. SWB1
- SWB1 an access layer device
- the access layer device may be connected to the first aggregation layer device and/or second aggregation layer device and includes a processor to: based on an aggregated MAC address and an aggregated MAC address mask configured at the access layer device, assign a MAC address to a host device connected to the access layer device, wherein the assigned MAC address belongs to the same MAC address segment as the aggregated MAC address.
- assigning the MAC address to the host device may include the access layer device sending the assigned MAC address to the host device via a Data Center Bridge Exchange (BCBX) protocol message with a Type-Length-Value (TLV) field carrying the assigned MAC address.
- BCBX Data Center Bridge Exchange
- TLV Type-Length-Value
- the instructions 424 may include appropriate instruction to perform the processes described throughout the present disclosure.
- the instructions 424 may be combined and divided to perform various processes as appropriate, such as receiving instruction 432 , processing instruction 434 and forwarding instruction 436 .
- the processing instruction 434 may be to, based on an aggregated MAC address and an aggregated MAC address mask configured at the access layer device, assign a MAC address to a host device connected to the access layer device, wherein the assigned MAC address belongs to the same MAC address segment as the aggregated MAC address.
- the network device 400 when acting as an access layer device, may include:
- An aggregated MAC reporting module for assigning MAC addresses for hosts coupled to the access layer device according to its configured aggregated MAC address.
- the hosts' MAC addresses and the aggregated MAC addresses of the access layer device may belong to the same MAC address segment.
- the aggregated MAC reporting module is further for reporting to an aggregation layer device the aggregated MAC address and mask and VLAN ID that is allowed to pass through the port of the access layer device.
- processors may be implemented by hardware (including hardware logic circuitry), software or firmware or a combination thereof.
- the term ‘processor’ is to be interpreted broadly to include a processing unit, ASIC, logic unit, or programmable gate array etc.
- the processes, methods and functional units may all be performed by the one or more processors 410 ; reference in this disclosure or the claims to a ‘processor’ should thus be interpreted to mean ‘one or more processors’.
- network interface device 440 Although one network interface device 440 is shown in FIG. 4 , processes performed by the network interface device 440 may be split among multiple network interface devices (not shown for simplicity). As such, reference in this disclosure to a ‘network interface device’ should be interpreted to mean ‘one or more network interface devices”.
- the processes, methods and functional units described in this disclosure may be implemented in the form of a computer software product.
- the computer software product is stored in a storage medium and comprises a plurality of instructions for making a processor to implement the methods recited in the examples of the present disclosure.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Small-Scale Networks (AREA)
Abstract
Description
- This application is a Continuation of commonly assigned and co-pending U.S. patent application Ser. No. 14/394,149, having a filing date of Oct. 13, 2014, which is a national stage filing under 35 U.S.C 371 of PCT application number PCT/CN2013/081522, having an international filing date of Aug. 15, 2013, which claims the benefit of priority from Chinese Patent Application Number CN201210422550.3, having a filing date of Oct. 30, 2012, the disclosures of which are hereby incorporated by reference in their entireties.
- In order to improve reliability and provide redundancy, enterprise networks and data centres span across a number of geographically dispersed network sites. Similar services are deployed at the sites connected via layer 2 connectivity. To facilitate dynamic resource allocation and management, virtual machines are allowed to migrate among data centers. The process of virtual machine migration may be transparent to users and in which case their IP addresses remain unchanged.
- By way of non-limiting examples, the present disclosure will be described with reference to the following drawings, in which:
-
FIG. 1 is a flowchart of an example process for message forwarding between geographically dispersed network sites; -
FIG. 2 is a schematic diagram of an example network for message forwarding between geographically dispersed network sites; -
FIG. 3 is a schematic diagram of an example message forwarding process applicable to aggregated layer devices and access layer devices in the network inFIG. 2 ; and -
FIG. 4 is a schematic diagram of an example structure of a device capable of acting as an aggregation layer device or access layer device. - In a network where Virtual Local Area Networks (VLANs) are deployed over geographically dispersed network sites, edge devices (also referred to as “aggregation layer device”) exchange MAC address information of host devices so that they are able to forward traffic within that VLAN. Each host device generally connects to an edge device via an access layer device, which may be a server etc. Each edge device stores a MAC address table with a destination host device's MAC address at a local or remote site. To forward a message to the host device, the edge device performs a MAC address table lookup to search for the host device's MAC address (i.e. destination MAC address) in the message.
- The present disclosure describes message forwarding in a network where Virtual Local Area Networks (VLANs) are deployed over geographically dispersed sites in a network that comprises a first aggregation layer device at a first site and second first aggregation layer device at a second site. Referring first to an example 100 in
FIG. 1 : - At 110, the first aggregation layer device learns Media Access Control (MAC) address information received from the second aggregation layer device. The MAC address information includes: a VLAN identifier (ID), an aggregated MAC address and an aggregated MAC address mask configured at the second site.
- At 120, when receiving a message addressed to the VLAN ID and a destination MAC address, the first aggregation layer device searches for the MAC address information based on the VLAN ID and destination MAC address and forwards the message to the second aggregation layer device according to the MAC address information. The destination MAC address belongs to the same MAC address segment as the aggregated MAC address and searching for the MAC address information comprises mask matching based on the aggregated MAC address mask.
- According to the example 100 in
FIG. 1 , MAC address aggregation is used to reduce the size of MAC address information learned and maintained by the first aggregation layer device. Instead of learning the individual MAC addresses of different host devices, the first aggregation layer device learns an aggregated MAC address that aggregates multiple MAC addresses of different host devices. In practice, since there are many host devices and access layer devices connected to an aggregation layer device, the size of the MAC address information may be significantly reduced by way of MAC address aggregation and mask matching during message forwarding. - For example, an aggregation layer device may be connected to over 500 servers (access layer devices). Each server may configure multiple MAC addresses, in which case the number of MAC addresses can easily reach if not exceed an upper storage limit of an aggregation layer device. The use of aggregated MAC addresses alleviates the need to store a large number of MAC addresses, thereby supporting deployment of large-scale data center network. Further, traffic relating to MAC address information advertisement is also reduced, alleviating the processing burden at the edge devices and within the network.
- Throughout the present disclosure, the term “aggregation layer device” refers generally to a network device (e.g. switch etc.) deployed on an aggregation layer of the
network 200, and will be used interchangeably with “edge device” throughout the present disclosure. The aggregation layer (also known as convergence layer) facilitates message forwarding among access layer devices within a local site (e.g. Site A), or from a local site to a remote site (e.g. from Site A to Site B). The term “access layer device” refers generally to a network device (e.g. switch, server etc.) that is deployed on an access layer of the network to connect host devices to the aggregation layer device. Further, the term “MAC address information” refers generally to information relating to MAC address, and may include an entry a local MAC address table learned via software and/or hardware. - Examples will be described with reference to accompanying drawings.
-
FIG. 2 is a schematic diagram of anexample network 200 in which multiple edge devices 210 (e.g. SWA and SWB) at geographically dispersed network sites 212 (e.g. sites A and B) are connected via acore network 220. Theexample network 200 may employ suitable technology, such as Ethernet Virtual Interconnect (EVI) and Overlay Transport Virtualization (OTV) etc. - EVI is an advanced MAC in Internet Protocol (IP) technology for implementing the layer 2 virtual private network (L2VPN) technology in an IP-based
core network 220. EVI is used to maintain routing and forwarding information atedge devices 210 of a site, without having to change routing and forwarding information of thecore network 220 and within thesite 212. A VPN instance may be established amongdifferent edge devices 210. - The
example network 200 inFIG. 2 includes the following: - The
site network 212 represents a layer 2 network which operates independently and is connected to thecore network 220 via at least oneedge device 210. Thesite network 212 also generally includes a host device (e.g. Host B in Site B) that is connected to the edge device 210 (e.g. SWB) via an access layer device 214 (e.g. SWB1). InFIG. 2 , the edge devices 210 (e.g. SWA and SWB) assume the role of aggregation layer devices while access layer devices (e.g. SWA1-N and SWB1-M) connect host devices (e.g. Hosts A-N at Site A and Hosts B-M at Site B) to the respective aggregation layer devices. - The
core network 220 represents a network that includes IP routing devices for providing interconnection between the geographicallydispersed sites 212. - An overlay network 230 (e.g. EVI network) represents a virtual network established between
edge devices 210 at geographically dispersedsites 212 and provides layer 2 interconnection between the sites to form a larger layer 2 forwarding domain. The network 230 (e.g. EVI network) includes virtual links 232 (e.g. EVI links) and virtual link interfaces (e.g. EVI-link interfaces) to carry layer 2 traffic of an extended VLAN betweensites 212. - The
virtual links 232 connecting theedge devices 210 ofdifferent sites 212 may be any suitable communication channels over a Layer 3core network 220. In one example, a physical communication medium may be virtualized to include multiple communication channels such that traffic of one communication channel is separated from that of a different communication channel (e.g. using a suitable identifier etc.). The virtual link may be a Layer 2 virtual link (e.g. virtual Ethernet link) tunnelled through the Layer 3 network using any suitable protocol (e.g. Generic Routing Encapsulation (GRE) etc.). Layer 2 traffic between sites is encapsulated with an IP header to reach its destination via thecore network 120. - To facilitate message forwarding between the geographically dispersed sites, neighbour discovery and MAC address learning are generally performed to form neighbouring relationship and exchange MAC address information.
- Neighbour discovery is performed by
edge devices 210 to discover each other and form a neighbouring relationship prior to advertising their MAC address information. Any suitable protocol may be used for automatic neighbour discovery, such as EVI neighbour discovery protocol (ENDP) in an EVI network etc. There are two entities in the discovery process: EVI Neighbour Discovery Server (ENDS) and EVI Neighbour Discovery Client (ENDC). After learning information (e.g. IP address) of each ENDC in an EVI network instance via an EVI registration request, the ENDS distributes all received information to the ENDC via a registration reply message. - Upon receiving the reply message, the ENDC establishes an
EVI link 232 with other ENDC.Edge devices 210 of allmember sites 212 in an EVI network instance may carry out the same registration process, at the end of which each member automatically discovers all information of other members. An authentication function may also be configured to prevent malicious nodes from registering to theEVI network 230. In order to guarantee the high reliability of the EVI network registration process, multiple ENDS may be configured to provide backup for each other. Avirtual link 232 is established after the neighbour discovery process. - After the neighbour discovery process, the
edge devices 210 notify each other of MAC address information of hosts and devices connected to theedge devices 210. The MAC address information provides information relating unicast MAC address reachability and may be exchanged using any suitable protocol such as Intermediate System-to-Intermediate System (IS-IS) routing protocol etc. This routing protocol is independent from, and does not affect, routing protocols of the layer 3 network in the core network or within a site. Generally, configuring a tunnel interface on theedge device 210 will automatically initiate the IS-IS routing protocol without additional configuration, although parameters of the routing protocol may be adjusted. - When EVI is used for example, running the IS-IS routing protocol includes EVI IS-IS neighbour negotiation, link state protocol (LSP) updates and so on, and the messages involved are transmitted via the virtual links established by the neighbour discovery protocol. The IS-IS routing protocol runs on a point-to-point virtual connection between two edge devices. Each
edge device 210 performs a unicast IP address encapsulation of the messages (e.g. Hello and LSP messages), copies and sends them to every remote edge device. - Traffic may then be forwarded between sites once neighbouring relationship is established between edge devices and MAC address information exchanged.
- For intra-site message forwarding (e.g. host A to host N within Site A), a local physical interface is used as an outgoing interface (e.g. EthN) to forward a message to a local destination MAC address.
- For inter-site message forwarding (e.g. host A at Site A to host B at Site B), the outgoing interface is not a local physical interface, but a tunnel interface (e.g. EVI tunnel interface). The edge device (e.g. SWA) encapsulates the original Ethernet frame (e.g. GRE encapsulation by adding an outer layer IP header, a link layer header and a check sum). For example, the source IP address in the outer layer IP header is the IP address of a carrier interface of a tunnel interface, and the destination IP address is the IP address of the remote edge device (e.g. SWB) obtained by MAC address table lookup.
- According to the present disclosure, MAC address aggregation may be used to reduce the size of MAC address information maintained and exchanged by
aggregation layer devices 210. In particular, to facilitate message forwarding between geographically dispersed sites (e.g. Site A and Site B), a first aggregation layer device (e.g. SWA) learns MAC address information received from a second aggregation layer device (e.g. SWB) that includes a VLAN ID, aggregated MAC address and aggregated MAC address mask; see 240 inFIG. 2 . - When receiving a message addressed to the VLAN ID and a destination MAC address (e.g. MAC address of Host B), the first aggregation layer device (e.g. SWA) searches for the MAC address information and forwards the message to the second aggregation layer device (e.g. SWB) according to the MAC address information. MAC address aggregation reduces the size of MAC address information stored and processed by the aggregation layer devices.
- An example will now be explained with reference to the diagram 300 in
FIG. 3 in which aggregation layer devices SWA and SWB exchange MAC address information to facilitate message forwarding.Blocks blocks FIG. 1 . - It will be appreciated that the terms “first” and “second” in
FIG. 3 are merely used to indicate a “first aggregation layer device” (e.g. SWA) is forwarding a message to a “second aggregation layer device” (e.g. SWB). The terms “first” and “second” do not indicate any specific sequence or order and the roles may be reversed when SWB sends a message to SWA. An aggregation layer device may be capable of acting as both the first aggregation device (message sender) and second aggregation layer device (message recipient). Further, when SWA is forwarding a message to SWB, the former may also be referred to as the local device and the latter as the remote device from the perspective of SWA. - Configuration of Aggregated MAC Address and Mask
- At 310 in
FIG. 3 , each access layer device in a site network (e.g. SWB1 at Site B) is configured with an aggregated MAC address and aggregated MAC mask. The aggregated MAC addresses configured on different access layer devices may be different from each other. Once configured, the MAC addresses of host devices (e.g. Host B to Host M at Site B) coupled to the access layer device (e.g. SWB1) appear transparent to the aggregation layer device. - In one example, aggregated MAC address 0001-0001-0000 and aggregated MAC mask FFFF-FFFF-0000 are configured on access layer device SWA1 at site A. Similarly, aggregated MAC address 0002-0002-0000 and aggregated MAC mask FFFF-FFFF-0000 may be configured on SWB1 at site B.
- MAC Address Assignment
- At 320 in
FIG. 3 , the access layer device (e.g. SWB1 at Site B) assigns MAC addresses to its connected host devices based on the configured aggregated MAC address (e.g. 0002-0002-0000). In particular, the assigned MAC addresses belong to the same MAC address segment as the aggregated MAC address. - In one example, the access layer device (e.g. SWB1) calculates MAC addresses that are within the MAC address segment of the aggregated MAC address before assigning the MAC addresses to the host devices in turn. Upon receiving the assigned MAC address, each host device update its MAC address to the assigned MAC address.
- Any suitable protocol may be used to send the MAC addresses to the host devices (e.g. host B), such as Data Center Bridging Exchange (DCBX) by adding a Type-Length-Value (TLV) field in a DCBX protocol message as shown in Table 1.
-
TABLE 1 New TLV field in a modified DCBX message Name of TLV Description Type Length Value MAC Distribution of 100 6 bytes MAC address MAC address - In the example in
FIG. 2 , based on aggregated MAC address 0001-0001-0000 and aggregated MAC mask FFFF-FFFF-0000, SWA1 calculates a list a of MAC addresses that may be assigned to its connected host devices, e.g. host device A. Each host device corresponds to an interface of the access layer device. For example, SWA1 assigns MAC address 0001-0001-0001 to host device A, which is connected to SWA1 via interface P1 of SWA1. SWA1 stores the corresponding relationship between the interface and MAC address, i.e. P1->0001-0001-0001. - Similarly, based on aggregated MAC address 0002-0002-0000 and aggregated MAC mask FFFF-FFFF-0000, SWB1 assigns MAC address 0002-0002-0002 to host device B. Since SWB1 is connected to host device B via interface P1, SWB1 also stores the relationship between P1->0002-0002-0002. When a message addressed to MAC address 0002-0002-0002 is received, the outgoing interface for the message is port P1 of SWB1.
- The host devices A and B are notified by SWA1 and SWB1 of their assigned MAC address (e.g. via a DCBX protocol message) and update their MAC address accordingly. The MAC address of host device A is updated to 0002-0002-0002, while host device B's MAC address is 0001-0001-0001.
- Advertisement of MAC Address Information
- At 330 in
FIG. 3 , an access layer device (e.g. SWB1) notifies its aggregation layer device (e.g. SWB) of a VLAN ID, and the aggregated MAC address and aggregated MAC address mask configured at 310. The VLAN ID identifies a VLAN whose traffic is permitted to pass through an interface of the access layer device. - Any suitable protocol, such as Link Layer Discovery Protocol (LLDP) etc., may be used. After establishing a LLDP neighbouring relationship with the aggregation layer device, the access layer device may send the VLAN ID, aggregated MAC address and aggregated mask to the aggregation layer device via an LLDP message with the following TLV fields.
-
TABLE 2 New TLV fields in a modified LLDP message Name of TLV Description Type Length Value Port permit VLAN ID 200 512 Bitmap format is used, 1 VLAN ID that is bytes indicating a VLAN ID is permitted to permitted to pass, 0 pass through indicating otherwise a port Aggregated Aggregated 201 6 Aggregated MAC address MAC MAC bytes of access layer device address address Aggregated Aggregated 202 6 Aggregated MAC mask MAC mask MAC mask bytes used for determining whether a MAC address belongs to the same MAC address segment as the aggregated MAC address - In the example in
FIG. 2 , SWA1 is connected to SWA via port P2 of SWA1, which belongs to VLAN100 and VLAN200. SWA1 modifies the LLDP protocol message with added TLV fields identifying VLAN100 and VLAN200, aggregated MAC address 0001-0001-0000 and aggregated MAC mask FFFF-FFFF-0000. The LLDP protocol message is then sent to SWA via port P2. - Similarly, SWB1 is connected to SWB via port P2 of SWB1, which belongs to VLAN100 and VLAN200. SWB1 modifies the LLDP protocol message with added TLV fields identifying VLAN100 and VLAN200, aggregated MAC address 0002-0002-0000 and aggregated MAC mask FFFF-FFFF-0000, and sends the LLDP protocol message to SWB via port P2.
- Local MAC Address Information Learning
- At 340 in
FIG. 3 , an aggregation layer device (e.g. SWB) learns the MAC address information that includes the VLAN ID, aggregated MAC address and aggregated MAC mask. The MAC address information is received from an access layer device (e.g. SWB1) via one of the interfaces of the aggregation layer device (e.g. Eth1 of SWB). - In one example, learning the MAC address information may include first learning the MAC address information by software by adding a MAC address entry in a local software MAC address table. Each entry, which corresponds to a different VLAN ID, may include the VLAN ID, aggregated MAC address, aggregated MAC mask and outgoing interface information. The MAC address entry is then distributed to a hardware MAC address table for hardware matching of MAC address during message forwarding.
- The aggregation layer device (e.g. SWB) may also prohibit hardware learning of MAC address information on the interface (e.g. Eth1 of SWB). Since an aggregated MAC address is used, it is not necessary for the interface to learn the individual MAC addresses of host devices at the site.
- In the example in
FIG. 2 , SWB receives an LLDP protocol message from SWB1 via interface Eth1 and parses the information. SWB disables the hardware MAC address learning function on interface Eth1 and stores the following MAC address information. -
TABLE 3 Local MAC address information at SWB VLAN MAC MAC Mask IF 100 0002-0002-0000 FFFF-FFFF-0000 Eth1 200 0002-0002-0000 FFFF-FFFF-0000 Eth1 - Similarly, SWA receives an LLDP protocol message from SWA1 via interface Eth1 and parses the information. SWA disables the hardware MAC address learning function on interface Eth1 and stores the following MAC address information.
-
TABLE 4 Local MAC address information at SWA VLAN MAC MAC Mask IF 100 0001-0001-0000 FFFF-FFFF-0000 Eth1 200 0001-0001-0000 FFFF-FFFF-0000 Eth1 - During message forwarding, the aggregation layer device finds an outgoing interface for a received message based on the aggregated MAC mask and a destination MAC address that is within the same MAC address segment of the aggregated MAC address. Mask matching is used instead of direct matching of the MAC address. For a destination MAC address that do not belong to the same MAC address segment, hardware learning and advertisement of the MAC address may be performed as usual.
- Remote MAC Address Information Learning
- At 360 in
FIG. 3 , the local MAC address information of one aggregation layer device (e.g. SWB) is received by another aggregation layer device (e.g. SWA) via a virtual link (e.g. EVI tunnel). The MAC address information may be sent way of any suitable protocol, such as IS-IS etc. - In the example in
FIG. 2 , SWA and SWB notify each other of their MAC address information. The following tables show example MAC address information learned by SWA and SWB. - At SWA:
-
TABLE 5 MAC address information at SWA VLAN MAC MAC Mask IF 100 0001-0001-0000 FFFF-FFFF-0000 Eth1 200 0001-0001-0000 FFFF-FFFF-0000 Eth1 100 0002-0002-0000 FFFF-FFFF-0000 IP B 200 0002-0002-0000 FFFF-FFFF-0000 IP B - At SWB:
-
TABLE 6 MAC address information at SWB VLAN MAC MAC Mask IF 100 0002-0002-0000 FFFF-FFFF-0000 Eth1 200 0002-0002-0000 FFFF-FFFF-0000 Eth1 100 0001-0001-0000 FFFF-FFFF-0000 IP A 200 0001-0001-0000 FFFF-FFFF-0000 IP A - It will be appreciated that the size of the MAC address information in Table 5 and Table 6 is significantly reduced compared to the case where the individual MAC address of each host device is learned. In particular, instead of learning the MAC address of host devices A-N at site A and B-M at site B, an aggregated MAC address and aggregated MAC mask are learned for each VLAN ID.
- Message Forwarding Based on Aggregated MAC Address
- At 370 in
FIG. 3 , when receiving amessage 372 addressed to a VLAN ID and a destination MAC address, an aggregation layer device (e.g. SWA) searches for the MAC address information learned at 360 inFIG. 3 . - Upon receiving the
message 372 via an interface, the aggregation layer device (e.g. SWA) may determine whether the hardware MAC address learning function of the interface is disabled. If yes, the aggregation layer device (e.g. SWA) does not learn the message's source MAC address. Based on the message's VLAN ID and destination MAC address, the aggregation layer device (e.g. SWA) looks up a local hardware MAC address table by way of mask matching. - For example, SWA receives an Ethernet message addressed to
VLAN 100 and destination MAC address 0002-0002-0002 via interface Eth1. Since hardware MAC address learning is disabled on Eth1, SWA does not learn the source MAC address of the message. Based on the VLAN ID and destination MAC address in the Ethernet frame, SWA searches Table 5 by way of mask matching. The matching entry is as follows: -
TABLE 7 Matching MAC address table entry VLAN MAC MAC Mask IF 100 0002-0002-0000 FFFF-FFFF-0000 IP B - At 380 in
FIG. 3 , the first aggregation layer device (e.g. SWA) forwards the message to the second aggregation layer device (e.g. SWB) according to the MAC address information. - In one example, the first aggregation layer device (e.g. SWA) finds that an outgoing interface in the matching MAC address entry is a tunnel interface (e.g. EVI tunnel interface), and encapsulates the original Ethernet frame (e.g. GRE encapsulation).
- The source IP address in the outer layer IP header may be the IP address of a carrier interface of a tunnel interface associated with the virtual link between the first and second aggregation layer devices. In this case, the destination IP address of the message is ‘IP B’ in the matching MAC address entry in Table 7.
- At 390 in
FIG. 3 , the second aggregation layer device (e.g. SWB) receives themessage 392 via the virtual link (e.g. via tunnel interface), de-encapsulates the message and looks up a local hardware MAC address table using mask matching according to the VLAN ID, and destination MAC address in the received message. The message is then forwarded via a local interface according to information in the matching hardware MAC address table entry to reach a host device with the destination MAC address. - For example, based on the
VLAN ID VLAN 100 and destination MAC address 0002-0002-0002 in the de-encapsulated message, SWB performs mask matching to find the following matching MAC address table entry. The outgoing interface in this case is a local interface, Eth1 at SWB. SWB forwards the Ethernet message via interface Eth1 to reach host device B with MAC address 0002-0002-0002. -
TABLE 8 Matching MAC address table entry VLAN MAC MAC Mask IF 100 0002-0002-0000 FFFF-FFFF-0000 Eth1 -
Example Network Devices 400 - The above examples can be implemented by hardware, software or firmware or a combination thereof. Referring to
FIG. 4 , anexample network device 400 that includes aprocessor 410, amemory 420 and anetwork interface device 440 that communicate with each other viabus 430. Theprocessor 410 is to perform processes described herein with reference toFIG. 1 toFIG. 3 . As will be discussed below, thenetwork device 400 may be capable of acting as an (a) aggregation layer device or (b) access layer device. - (a) Aggregation Layer Device
- In one example, the
network device 400 is capable of acting as a first aggregation layer device (e.g. SWA) for message forwarding in a network where VLANs are deployed over geographically dispersed sites. The network (e.g.FIG. 2 ) comprises the first aggregation layer device at a first site and second first aggregation layer device at a second site. In this case, theprocessor 410 of thenetwork device 400 is to: - Learn MAC address information received from the second aggregation layer device that includes: a VLAN ID an aggregated MAC address and an aggregated MAC address mask configured at the second site. And,
- Receive a message addressed to the VLAN ID and a destination MAC address, search for the MAC address information based on the VLAN ID and destination MAC address and forward the message to the second aggregation layer device according to the MAC address information.
- In this case, the destination MAC address belongs to the same MAC address segment as the aggregated MAC address and searching for the MAC address information comprises mask matching based on the aggregated MAC address mask.
- The
memory 420 may store anynecessary data 422 for facilitating message forwarding between geographically dispersed network sites. For example, thedata 422 includes information relating to MAC address information discussed with reference to Tables 1 to 7. The MAC address information includes VLAN ID, aggregated MAC address, and aggregated MAC address mask. - The
memory 420 may store machine-readable instructions 424 executable by theprocessor 410 to cause theprocessor 410 to perform processes described herein with reference toFIG. 1 toFIG. 3 . In the example inFIG. 4 , theinstructions 424 include receivinginstruction 432,processing instruction 434 and forwardinginstruction 436. - The receiving
instruction 432 is to receive MAC address information received from the second aggregation layer device that includes: a VLAN, an aggregated MAC address and an aggregated MAC address mask configured at the second site. Theprocessing instruction 434 is to learn the MAC address information. - The receiving
instruction 432 is to further receive a message addressed to the VLAN ID and a destination MAC address. Theprocessing instruction 434 is further to search for the MAC address information based on the VLAN ID and destination MAC address and theforwarding instruction 436 is to forward the message to the second aggregation layer device according to the MAC address information. - In this case, the destination MAC address belongs to the same MAC address segment as the aggregated MAC address and searching for the MAC address information comprises mask matching based on the aggregated MAC address mask.
- In another example (not shown in
FIG. 4 for simplicity), thenetwork device 400 is capable of acting as an aggregation layer device in a network deployed with EVI. In this case, the aggregation layer device includes an aggregated MAC entry learning module. - An aggregated MAC entry learning module, for (i) receiving from an interface a VLAN ID that is allowed to pass through a port of an access layer device, and an aggregated MAC address and a mask configured on the access layer device which are reported by the access layer device, (ii) learning MAC entries via software, distributing the entries to a hardware MAC table, and (iii) disabling the interface's function of hardware learning of MAC entries, (iv) sending all MAC entries learned via software to an aggregation layer device at the opposite terminal of an EVI tunnel.
- The aggregated MAC entry learning module is further for receiving from a non-local aggregation layer device the MAC entries learned via software, and distributing said MAC entries to a hardware MAC table. The MAC entries include VLAN ID that is allowed to pass through a port of an access layer device under said non-local aggregation layer device, an aggregated MAC address and a mask.
- A traffic forwarding module, for receiving an Ethernet message from said interface. If the traffic forwarding module finds that the interface's function of hardware learning of MAC entries is disabled, the traffic forwarding module does not learn the message's source MAC address. Instead, based on the message's VLAN ID and destination MAC address, the traffic forwarding module is to search for a matching MAC entry in the local hardware MAC table by way of mask matching, and forward the message according to the matching MAC entry.
- (b) Access Layer Device
- In another example, the
network device 400 is capable of acting as an access layer device (e.g. SWB1) in a network that includes a first aggregation layer device (e.g. SWA) at a first site, second first aggregation layer device (e.g. SWB) at a second site. - The access layer device may be connected to the first aggregation layer device and/or second aggregation layer device and includes a processor to: based on an aggregated MAC address and an aggregated MAC address mask configured at the access layer device, assign a MAC address to a host device connected to the access layer device, wherein the assigned MAC address belongs to the same MAC address segment as the aggregated MAC address.
- In this case, assigning the MAC address to the host device may include the access layer device sending the assigned MAC address to the host device via a Data Center Bridge Exchange (BCBX) protocol message with a Type-Length-Value (TLV) field carrying the assigned MAC address.
- In this case, the
instructions 424 may include appropriate instruction to perform the processes described throughout the present disclosure. Theinstructions 424 may be combined and divided to perform various processes as appropriate, such as receivinginstruction 432,processing instruction 434 and forwardinginstruction 436. Theprocessing instruction 434 may be to, based on an aggregated MAC address and an aggregated MAC address mask configured at the access layer device, assign a MAC address to a host device connected to the access layer device, wherein the assigned MAC address belongs to the same MAC address segment as the aggregated MAC address. - In a further example (not shown in
FIG. 4 for simplicity), when acting as an access layer device, thenetwork device 400 may include: - An aggregated MAC reporting module, for assigning MAC addresses for hosts coupled to the access layer device according to its configured aggregated MAC address. The hosts' MAC addresses and the aggregated MAC addresses of the access layer device may belong to the same MAC address segment.
- The aggregated MAC reporting module is further for reporting to an aggregation layer device the aggregated MAC address and mask and VLAN ID that is allowed to pass through the port of the access layer device.
- The methods, processes and units described herein may be implemented by hardware (including hardware logic circuitry), software or firmware or a combination thereof. The term ‘processor’ is to be interpreted broadly to include a processing unit, ASIC, logic unit, or programmable gate array etc. The processes, methods and functional units may all be performed by the one or
more processors 410; reference in this disclosure or the claims to a ‘processor’ should thus be interpreted to mean ‘one or more processors’. - Although one
network interface device 440 is shown inFIG. 4 , processes performed by thenetwork interface device 440 may be split among multiple network interface devices (not shown for simplicity). As such, reference in this disclosure to a ‘network interface device’ should be interpreted to mean ‘one or more network interface devices”. - Further, the processes, methods and functional units described in this disclosure may be implemented in the form of a computer software product. The computer software product is stored in a storage medium and comprises a plurality of instructions for making a processor to implement the methods recited in the examples of the present disclosure.
- The figures are only illustrations of an example, wherein the units or procedure shown in the figures are not necessarily essential for implementing the present disclosure. Those skilled in the art will understand that the units in the device in the example can be arranged in the device in the examples as described, or can be alternatively located in one or more devices different from that in the examples. The units in the examples described can be combined into one module or further divided into a plurality of sub-units.
- Although the flowcharts described show a specific order of execution, the order of execution may differ from that which is depicted. For example, the order of execution of two or more blocks may be changed relative to the order shown. Also, two or more blocks shown in succession may be executed concurrently or with partial concurrence. All such variations are within the scope of the present disclosure.
- Throughout the present disclosure, the word “comprise”, or variations such as “comprises” or “comprising”, will be understood to imply the inclusion of a stated element, integer or step, or group of elements, integers or steps, but not the exclusion of any other element, integer or step, or group of elements, integers or steps.
- It will be appreciated by persons skilled in the art that numerous variations and/or modifications may be made to the above-described embodiments, without departing from the broad general scope of the present disclosure. The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive.
Claims (17)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/018,992 US20160191462A1 (en) | 2012-10-30 | 2016-02-09 | Message forwarding in a virtual local area network |
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210422550.3A CN103795631B (en) | 2012-10-30 | 2012-10-30 | Deploy the flow forwarding method and equipment in the network of Ethernet virtual link |
CN201210422550.3 | 2012-10-30 | ||
PCT/CN2013/081522 WO2014067316A1 (en) | 2012-10-30 | 2013-08-15 | Message forwarding between geographically dispersed network sites |
US201414394149A | 2014-10-13 | 2014-10-13 | |
US15/018,992 US20160191462A1 (en) | 2012-10-30 | 2016-02-09 | Message forwarding in a virtual local area network |
Related Parent Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2013/081522 Continuation WO2014067316A1 (en) | 2012-10-30 | 2013-08-15 | Message forwarding between geographically dispersed network sites |
US14/394,149 Continuation US9300524B2 (en) | 2012-10-30 | 2013-08-15 | Message forwarding between geographically dispersed network sites |
Publications (1)
Publication Number | Publication Date |
---|---|
US20160191462A1 true US20160191462A1 (en) | 2016-06-30 |
Family
ID=50626418
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/394,149 Active US9300524B2 (en) | 2012-10-30 | 2013-08-15 | Message forwarding between geographically dispersed network sites |
US15/018,992 Abandoned US20160191462A1 (en) | 2012-10-30 | 2016-02-09 | Message forwarding in a virtual local area network |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/394,149 Active US9300524B2 (en) | 2012-10-30 | 2013-08-15 | Message forwarding between geographically dispersed network sites |
Country Status (4)
Country | Link |
---|---|
US (2) | US9300524B2 (en) |
EP (1) | EP2915298A4 (en) |
CN (1) | CN103795631B (en) |
WO (1) | WO2014067316A1 (en) |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9432260B2 (en) * | 2014-03-28 | 2016-08-30 | Brocade Communications Systems, Inc. | Automated configuration for network devices |
JP5729796B1 (en) | 2014-06-30 | 2015-06-03 | Necプラットフォームズ株式会社 | Gateway device, communication system, communication method, and communication program |
CN104639671B (en) * | 2015-02-11 | 2018-03-20 | 新华三技术有限公司 | MAC address learning control method and equipment in stacking |
CN105939268B (en) * | 2015-10-28 | 2019-11-08 | 杭州迪普科技股份有限公司 | A kind of two-layer retransmitting table item polymerization and device |
US11070395B2 (en) * | 2015-12-09 | 2021-07-20 | Nokia Of America Corporation | Customer premises LAN expansion |
CN105591925B (en) * | 2015-12-10 | 2019-03-12 | 新华三技术有限公司 | Applied to the message forwarding method and equipment in SDN |
US10931575B2 (en) | 2016-04-13 | 2021-02-23 | Nokia Technologies Oy | Multi-tenant virtual private network based on an overlay network |
CN106850385B (en) * | 2017-01-18 | 2020-02-07 | 盛科网络(苏州)有限公司 | Method and device for detecting synchronization of two-layer forwarding table in stacking system |
CN111726286A (en) | 2017-03-14 | 2020-09-29 | 华为技术有限公司 | EVPN packet processing method, device and system |
CN109842884B (en) * | 2017-11-28 | 2022-04-01 | 中国移动通信集团上海有限公司 | LWA deployment method and system |
CN112312519B (en) * | 2019-07-31 | 2022-12-27 | 华为技术有限公司 | Equipment identification method and related device |
CN115567441A (en) * | 2019-11-05 | 2023-01-03 | 华为技术有限公司 | Method, device and system for generating forwarding information |
CN110933106B (en) * | 2019-12-13 | 2022-03-22 | 迈普通信技术股份有限公司 | PVLAN isolation method and device, electronic equipment and storage medium |
CN113098749B (en) * | 2020-01-08 | 2024-10-15 | 华为技术有限公司 | Message sending method, device and storage medium |
CN111884922B (en) * | 2020-07-21 | 2022-12-02 | 芯河半导体科技(无锡)有限公司 | Local forwarding method for cross-device link aggregation |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030035398A1 (en) * | 2001-08-15 | 2003-02-20 | Takayuki Sato | Wireless VLAN construction method in wireless LAN system, VLAN packet processing program for wireless interconnecting device, recording medium on which VLAN packet processing program for wireless interconnecting device is recorded, wireless interconnecting device having VLAN function and wireless VLAN system |
US20110274114A1 (en) * | 2010-05-06 | 2011-11-10 | Sandeep Dhar | FCoE ISOLATED PORT CHANNELS AND FCoE SESSION RESYNCHRONIZATION IN vPC/MCEC ENVIRONMENTS USING DCBXP |
US20120163395A1 (en) * | 2010-12-22 | 2012-06-28 | Juniper Networks, Inc. | Apparatus and methods to aggregate fcoe (fibre channel over ethernet) filter rules of a single interface in a single or few rules on a first-hop fcoe networking element |
Family Cites Families (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6914905B1 (en) * | 2000-06-16 | 2005-07-05 | Extreme Networks, Inc. | Method and system for VLAN aggregation |
US6928478B1 (en) * | 2001-06-25 | 2005-08-09 | Network Appliance, Inc. | Method and apparatus for implementing a MAC address pool for assignment to a virtual interface aggregate |
US7046666B1 (en) * | 2001-12-06 | 2006-05-16 | The Directv Group, Inc. | Method and apparatus for communicating between divergent networks using media access control communications |
US20050220096A1 (en) * | 2004-04-06 | 2005-10-06 | Robert Friskney | Traffic engineering in frame-based carrier networks |
ES2314777T3 (en) | 2006-05-04 | 2009-03-16 | NOKIA SIEMENS NETWORKS GMBH & CO. KG | AUTOMATIC PROTECTION OF PACK TRANSMISSION IN A MPLS NETWORK BY THE ETHERNET DUAL-HOME BRIDGE. |
US7593400B2 (en) | 2006-05-19 | 2009-09-22 | Corrigent Systems Ltd. | MAC address learning in a distributed bridge |
CN101102264B (en) * | 2006-07-04 | 2011-07-20 | 华为技术有限公司 | Ethernet data forwarding method and Ethernet system |
CN101127696B (en) * | 2006-08-15 | 2012-06-27 | 华为技术有限公司 | Data forwarding method for layer 2 network and network and node devices |
CN101035050A (en) | 2007-03-15 | 2007-09-12 | 中兴通讯股份有限公司 | Processing method of the virtual LAN aggregation |
US8018880B2 (en) | 2007-03-26 | 2011-09-13 | Brixham Solutions Ltd. | Layer 2 virtual private network over PBB-TE/PBT and seamless interworking with VPLS |
US8166187B2 (en) * | 2009-01-28 | 2012-04-24 | Cisco Technology, Inc. | Distributed IP gateway based on sharing a MAC address and IP address concurrently between a first network switching device and a second network switching device |
US8175107B1 (en) | 2009-08-18 | 2012-05-08 | Hewlett-Packard Development Company, L.P. | Network routing based on MAC address subnetting |
CN102045242B (en) * | 2009-10-21 | 2012-08-08 | 华为技术有限公司 | Network communication method and network node equipment |
CN101808042B (en) | 2010-03-16 | 2014-11-05 | 中兴通讯股份有限公司 | Access method and device of multiprotocol label switching double-layer virtual private network |
JP5617137B2 (en) * | 2010-05-28 | 2014-11-05 | ホアウェイ・テクノロジーズ・カンパニー・リミテッド | Virtual layer 2 and mechanisms for making it scalable |
WO2012006190A1 (en) * | 2010-06-29 | 2012-01-12 | Huawei Technologies Co., Ltd. | Delegate gateways and proxy for target hosts in large layer 2 and address resolution with duplicated internet protocol addresses |
US8565230B2 (en) | 2010-09-10 | 2013-10-22 | Avaya Inc. | Shared virtual tunnels supporting Mac learning in communication networks |
US20120155485A1 (en) * | 2010-12-16 | 2012-06-21 | Fujitsu Network Communications, Inc. | Efficient space utilization of distributed mac address tables in ethernet switches |
CN102143067A (en) * | 2011-02-26 | 2011-08-03 | 华为数字技术有限公司 | Method and device for reducing scale of media access control (MAC) address table |
CN102123106B (en) * | 2011-04-21 | 2013-08-14 | 杭州华三通信技术有限公司 | MAC (Multi-Access Computer) addresses learning method and device in virtual private local area network service (VPLS) network |
CN102437966B (en) * | 2012-01-18 | 2016-08-10 | 神州数码网络(北京)有限公司 | Based on two layers of DHCP SNOOPING L3 Switching system and method |
CN102546307B (en) * | 2012-02-08 | 2015-08-19 | 神州数码网络(北京)有限公司 | The method and system realizing proxy arp function is intercepted based on DHCP |
CN102571610A (en) * | 2012-03-02 | 2012-07-11 | 杭州华三通信技术有限公司 | Packet forwarding method and edge equipment |
CN102594711B (en) | 2012-03-28 | 2014-11-26 | 杭州华三通信技术有限公司 | Message forwarding method and edge device therefor |
US9450859B2 (en) * | 2012-06-15 | 2016-09-20 | Citrix Systems, Inc. | Systems and methods for deriving unique MAC address for a cluster |
US8971323B2 (en) * | 2012-06-15 | 2015-03-03 | Citrix Systems, Inc. | Systems and methods for dynamic routing in a cluster |
-
2012
- 2012-10-30 CN CN201210422550.3A patent/CN103795631B/en active Active
-
2013
- 2013-08-15 EP EP13851563.0A patent/EP2915298A4/en not_active Withdrawn
- 2013-08-15 US US14/394,149 patent/US9300524B2/en active Active
- 2013-08-15 WO PCT/CN2013/081522 patent/WO2014067316A1/en active Application Filing
-
2016
- 2016-02-09 US US15/018,992 patent/US20160191462A1/en not_active Abandoned
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030035398A1 (en) * | 2001-08-15 | 2003-02-20 | Takayuki Sato | Wireless VLAN construction method in wireless LAN system, VLAN packet processing program for wireless interconnecting device, recording medium on which VLAN packet processing program for wireless interconnecting device is recorded, wireless interconnecting device having VLAN function and wireless VLAN system |
US20110274114A1 (en) * | 2010-05-06 | 2011-11-10 | Sandeep Dhar | FCoE ISOLATED PORT CHANNELS AND FCoE SESSION RESYNCHRONIZATION IN vPC/MCEC ENVIRONMENTS USING DCBXP |
US20120163395A1 (en) * | 2010-12-22 | 2012-06-28 | Juniper Networks, Inc. | Apparatus and methods to aggregate fcoe (fibre channel over ethernet) filter rules of a single interface in a single or few rules on a first-hop fcoe networking element |
Also Published As
Publication number | Publication date |
---|---|
US9300524B2 (en) | 2016-03-29 |
EP2915298A4 (en) | 2016-06-08 |
EP2915298A1 (en) | 2015-09-09 |
CN103795631B (en) | 2017-03-15 |
US20150081869A1 (en) | 2015-03-19 |
CN103795631A (en) | 2014-05-14 |
WO2014067316A1 (en) | 2014-05-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9300524B2 (en) | Message forwarding between geographically dispersed network sites | |
US9992154B2 (en) | Layer 3 convergence for EVPN link failure | |
US10142129B1 (en) | Bum packet filtering in multi-homed EVPN overlay networks | |
CN112929274B (en) | A method, device and system for processing routing | |
US9858163B2 (en) | Dual adjacency between edge devices at a network site | |
EP3065342B1 (en) | Update of mac routes in evpn single-active topology | |
US8694664B2 (en) | Active-active multi-homing support for overlay transport protocol | |
CN104168184B (en) | Message forwarding method and equipment | |
US9154419B2 (en) | Traffic forwarding in a layer 2 edge network | |
CN107612808B (en) | Tunnel establishment method and device | |
US9100213B1 (en) | Synchronizing VPLS gateway MAC addresses | |
US10193707B2 (en) | Packet transmission method and apparatus | |
US20130232492A1 (en) | Method and system for realizing virtual machine mobility | |
EP3641241A1 (en) | Node protection for bum traffic for multi-homed node failure | |
US11509494B2 (en) | Protocol independent multicast (PIM) designated router (DR) election | |
CN107040463A (en) | For avoiding due to the system that the flow that asymmetric MAC is learned floods | |
CN106572021B (en) | Method for realizing network virtualization superposition and network virtualization edge node | |
GB2497202A (en) | Transmitting frames between, possibly different, local VLANs by encapsulating frames for global VLAN tunnel | |
WO2018103099A1 (en) | Method, device and system for sending and receiving message | |
CN105634770A (en) | Method for disposing virtual extensible local area network (VXLAN) | |
CN107241269A (en) | Provider's edge network equipment and the method for network | |
WO2014059814A1 (en) | Message forwarding between geographically dispersed network sites | |
CN115225568B (en) | Fast reroute to an ethernet vpn-vpn | |
US10033636B1 (en) | Ethernet segment aware MAC address learning | |
US10158567B1 (en) | PBB-EVPN customer MAC synchronization among all-active multi-homing PEs |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: HANGZHOU H3C TECHNOLOGIES CO., LTD., CHINA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:WANG, YI;WANG, WEI;MA, ZHEN;REEL/FRAME:037774/0331 Effective date: 20130813 |
|
AS | Assignment |
Owner name: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:H3C TECHNOLOGIES CO., LTD.;HANGZHOU H3C TECHNOLOGIES CO., LTD.;REEL/FRAME:039767/0263 Effective date: 20160501 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |