Patent application number | Description | Published |
20110222538 | Method and System for L3 Bridging Using L3-To-L2 Mapping Database - A method may include creating an L3-L2 database on a first switch, the database having one or more entries, each entry: (a) associating a Level 3 (L3) unique identifier associated with a virtual local area network (VLAN) communicatively coupled to the first switch to a Level 2 (L2) unique identifier associated with the VLAN, and (b) associating the L3 unique identifier with a port of the first switch. The method may also include receiving a network packet at the first switch. The method may additionally include determining if a destination VLAN for the network packet has a corresponding entry in the L3-L2 database. The method may further include switching the network packet to the port in response to a determination that the destination VLAN for the network packet has a corresponding entry in the L3-L2 database, such that the packet is communicated to one of: (a) the destination VLAN, and (b) a second switch intermediate to the first switch and the destination VLAN. | 09-15-2011 |
20110235640 | METHOD AND SYSTEM FOR FORWARDING AND SWITCHING OVER PROTECTED PATHS - In one embodiment, a method for telecommunications includes steps of receiving a first packet through a first port, and determining whether the first packet arrived over a protected path. If the first packet arrived over a protected path, the method also includes the steps of hashing a source address of the first packet, adding a first entry into a forwarding table, and adding a second entry into the forwarding table. The protected path is coupled to at least the first port and a second port. The first entry includes the result of hashing the packet, and an identification of the first port. The second entry includes the result of hashing the packet, and an identification of the second port. | 09-29-2011 |
20110243135 | Systems and Methods for Minimizing the Number of Forwarding Identifiers in a Network Element with Distributed Architecture - A method may include, by a first network interface: receiving a packet having a flow via a first port of the first network interface; examining the packet to determine an ingress local forwarding identifier (LFID) associated with the flow of the packet; converting the ingress LFID to a global forwarding identifier (GFID) of the network element; and forwarding the packet to a switching element. The method may also include, by the switching element: determining a second network interface for egress of the packet based on the GFID; and forwarding the packet to the second network interface. The method may further include, by the second network interface: converting the GFID to an egress LFID associated with the flow of the packet; and forwarding the packet to a second port of the second network interface and a flow of the second network interface based on the egress LFID. | 10-06-2011 |
20110249673 | SOFTWARE-ASSISTED VLAN AGING TIMER SCHEME FOR DISTRIBUTED SWITCHING SYSTEMS - A network processing unit includes a first table, a forwarding table, and a processor. The first table includes a first entry for a network, including a network aging, which includes the network processing unit. The forwarding table includes a second entry associated with a network entity which includes an indication of whether network traffic associated with the entity has been encountered in the current or previous network aging period. The processor is configured to receive an indication from a hardware timer that a hardware aging cycle has ended, and then determine whether the network aging period has ended. If so, the processor is configured to determine for a first network entity in the forwarding table whether traffic associated with the entity has been encountered in the current or previous network aging period. If not, then the processor is configured to remove the given first network entity from the forwarding table. | 10-13-2011 |
20110249676 | Method and System for Forwarding and Switching Traffic in a Network Element - A method for forwarding a packet may include generating, by a first hash function module, a first hash value based on data included within the packet. The method may also include generating, by a second hash function module, a second hash value based on data included within the packet. The method may additionally include determining, by a first hash region integral to a memory and associated with the first hash function module, whether an index location of the first hash region corresponding to the first hash value includes an entry. Moreover, the method may include determining, by a second hash region integral to a memory and associated with the second hash function module, whether an index location of the second hash region corresponding to the second hash includes an entry. The method may further include, in response to a determination that at least one of the index location of the first hash region corresponding to the first hash value and the index location of the second hash region corresponding to the second hash value includes an entry, forwarding the packet based on forwarding information included within the entry. | 10-13-2011 |
20110280248 | Hierarchical Isolated Learning and Flooding for Metro Ethernet Bridging Domains - In one embodiment, a switch includes a processor coupled to a memory, one or more forwarding tables residing within the memory, and one or more ports. The one or more ports are associated with a plurality of virtual local area networks. The one or more ports are associated with a plurality of bridge domains. Each of the bridge domains is associated with one of the forwarding tables, and each of the forwarding tables is associated with one of the bridge domains. The processor is configured to assign a first tag to a received packet, the first tag comprising an identification of an active bridge domain, assign a second tag to the received packet, look up the destination address of the received packet in one of the forwarding tables, and if the destination address is not found in the forwarding table, and selectively flood the one or more ports of the active bridge domain with a copy of the received packet. The active bridge domain includes one of the plurality of bridge domains. The active bridge domain is associated with the ingress port of the received packet. The second tag includes an identification of one of the plurality of virtual local area networks. | 11-17-2011 |
20120093152 | Method and System for Communicating Multicast Traffic Over Protected Paths - In accordance with embodiments of the present disclosure, a method is provided for communicating multicast traffic. The method may include in response to receipt of multicast control traffic at a network element to be communicated to a protection switching group, communicating the multicast control traffic to each of a working path and a protection path of the protection switching group. The method may also include in response to receipt of multicast control traffic via either of the working path and the protection path, processing the multicast control traffic as if the multicast control traffic was received via both the working path and the protection path. | 04-19-2012 |
20120131299 | METHOD AND SYSTEM FOR REDUCING ENTRIES IN A CONTENT-ADDRESSABLE MEMORY - A method for reducing memory entries in a ternary content-addressable memory may include determining if a first entry and a second entry are associated with the same data value. The method may also include determining if the first entry can be masked such that searching the memory with the content value of either of the first entry or the second entry returns the same data value. The method may further include, in response to determining that the first entry and a second entry are associated with the same data value and determining that the first entry can be masked such that addressing the memory with the content value of either of the first entry or the second entry returns the same data value: (i) masking the first entry such that addressing the memory with the content value of either of the first entry or the second entry returns the same data value; and (ii) deleting the second entry. | 05-24-2012 |
20120147743 | DYNAMIC CONNECTION ADMISSION CONTROL TO ENFORCE SERVICE LEVEL AGREEMENTS IN MULTICAST NETWORKS - A method for networked communications includes determining a group identifier associated with a received request for multicast data, determining an available upstream bandwidth and an available downstream bandwidth, adding an entry for the identified group into a multicast forwarding table, allocating bandwidth from the available upstream bandwidth and available downstream bandwidth, the allocated bandwidth corresponding to bandwidth required by the requested multicast data, and forwarding the received request to an upstream network destination. The method includes, if no response is received in response to the received request within a designated timeout period, removing the entry for the identified group in the multicast forwarding table, and restoring the allocated bandwidth to the available upstream bandwidth and available downstream bandwidth. | 06-14-2012 |
20120155485 | EFFICIENT SPACE UTILIZATION OF DISTRIBUTED MAC ADDRESS TABLES IN ETHERNET SWITCHES - A method for networked communications includes receiving, on an inbound port, a frame to be forwarded, mapping the received frame to a flooding domain, determining an inbound port through which a frame is received, wherein the plurality of ports includes the inbound port, determining a destination address of the received frame, and determining one or more of the plurality of ports through which the received frame is to be forwarded. If the line card contains a port that is part of the flooding domain, the method includes populating a forwarding table associated with the line card with information regarding the received frame and information regarding the flooding domain. If the line card contains no ports that are part of the flooding domain, the method includes populating no forwarding tables associated with the line card with information regarding the received frame and information regarding the flooding domain. | 06-21-2012 |
20120320930 | MAC ADDRESS TABLE COLLECTION IN DISTRIBUTED SWITCHING SYSTEMS - In accordance with embodiments of the present disclosure, a switch may include a processor and a plurality of line cards, each line card including a table of addresses. The processor may be configured to: (i) read, from a first line card of the plurality of line cards, addresses relating to all flooding domains present on the first line card; (ii) store the addresses read from the first line card on a memory accessible to the processor; (iii) determine a second line card of the plurality of line cards, the second line card having the presence of at least one flooding domain not present on the first line card; (iv) read, from the second line card, addresses relating to all flooding domains present on the second line card; and (v) store the addresses read from the second line card on the memory. | 12-20-2012 |
20130070645 | ADDRESS TABLE FLUSHING IN DISTRIBUTED SWITCHING SYSTEMS - Methods and systems for improved address table flushing in distributed switching systems may be provided. In accordance with embodiments of the disclosure, a switch may include a plurality of line cards and a processor. Each line card may including a table of addresses. The processor may be configured to, in response to receipt of a plurality of simultaneous requests, each request a request to flush addresses associated with a particular flooding domain present on the switch, perform flushing of addresses based on an aggregate number of address entries for each particular flooding domain associated with the requests. | 03-21-2013 |
20130128774 | SYSTEM AND METHOD FOR DISTRIBUTED INTERNET GROUP MANAGEMENT PROTOCOL PROCESSING - A method may include receiving, at a network interface of a first network element, an Internet Group Management Protocol (IGMP) message from a second network element. The method may also include updating first multicast group data associated with the network interface based on the received IGMP message, the first multicast group data including one or more entries setting forth a multicast group and one or more other network elements which are members of the multicast group. The method may additionally include determining whether the second network element is the sole member of its multicast group based on the IGMP message and the first multicast group data. The method may further include forwarding the IGMP message to a switching element of the first network element in response to determining that the second network element is the sole member of its multicast group, the switching element communicatively coupled to the network interface. | 05-23-2013 |
20130250815 | DISTRIBUTED SPANNING TREE PROTOCOL - A network element coupled to a communication network is described. The network element includes multiple switching units. The switching units may be configured to independently implement a Spanning Tree Protocol (xSTP) processing in a completely distributed manner including each of the switching units independently calculating an external spanning tree for the network element in the communication network. The network element may act as a single bridge to other network elements in a bridging domain of the communication network. | 09-26-2013 |