Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Using Ethernet ring protection switching with computer networks

A technology of Ethernet and network, applied in the field of computer network, can solve the problems of loop condition, correct work can not be controlled, invisible, etc.

Active Publication Date: 2015-09-30
CISCO TECH INC
View PDF13 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, Spanning Tree Protocol has issues with scalability and can also lead to loop conditions if Spanning Tree Protocol is misconfigured
Furthermore, Spanning Tree Protocol typically runs "over the top" of the service provider's network, so the service provider has no control or visibility of the solution being enabled and working correctly

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Using Ethernet ring protection switching with computer networks
  • Using Ethernet ring protection switching with computer networks
  • Using Ethernet ring protection switching with computer networks

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0015] ITU-T SG15 / Q9 Recommendation G.8032 (February 2008) describes protection switching in Ethernet rings. refer to figure 1 , Ethernet ring 2 is an Ethernet network comprising nodes 4 and links 6 connected together in a closed loop topology. One of the links 6 of the ring is usually designated as a Ring Protection Link (RPL) and is disabled during normal operation of the ring by placing a channel block on that link. Typically, a communication block 8 is imposed at a node at one end of the RPL, which node may then be referred to as the RPL owner. Channel blocking 8 may, for example, include a policy that prevents packets of the ring from being forwarded through ports hosting the RPL. With such channel blocking, ring 2 is ensured loop-free, and conventional Ethernet MAC snooping and path computation can be used to compute and set appropriate forwarding information in each node of the ring.

[0016] As described in ITU-T recommendation G.8032, failure of either link 6 or n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In one embodiment, a first routing device establishes a virtual channel with a remote routing device in a G.8032 protocol Ethernet network ring. The first routing device and the remote routing device each being linked to a multi-homed routing device having Layer 2 connectivity to a core network. The multi-homed routing device is not configured with the G.8032 protocol. The first routing device identifies a link state from the first routing device to the multi-homed routing device. Layer 2 connectivity of the first routing device to the core network is controlled based upon the identified link state of the first routing device.

Description

[0001] related application [0002] This application claims the benefit of priority under 35 U.S.C. §120 of US Application No. 13 / 752,925 filed January 29, 2013, which is hereby incorporated by reference in its entirety. technical field [0003] The present disclosure relates generally to computer networks and, more particularly, to using Ethernet ring protection switching for computer networks. Background technique [0004] In access link and node redundancy for service provider-based layer 2 virtual private network (L2VPN) services, customers generally expect elastic site multi-homing access capabilities similar to layer 3 VPN services. However, redundancy in L2VPN technology is more complex compared to Layer 3 VPN technology due to potential Ethernet frame loop conditions. [0005] One solution to avoid loop conditions is to apply the Spanning Tree Protocol. However, Spanning Tree Protocol has issues with scalability and can also lead to loop conditions if Spanning Tre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/46H04L45/28
CPCH04L12/4641H04L12/437H04L41/0654H04L45/28H04L45/66
Inventor 普拉文·高海特萨姆尔·萨拉姆
Owner CISCO TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products