US20020052936A1 - Method and apparatus for rapidly reconfiguring computers networks executing the spanning tree algorithm - Google Patents
Method and apparatus for rapidly reconfiguring computers networks executing the spanning tree algorithm Download PDFInfo
- Publication number
- US20020052936A1 US20020052936A1 US09/450,066 US45006699A US2002052936A1 US 20020052936 A1 US20020052936 A1 US 20020052936A1 US 45006699 A US45006699 A US 45006699A US 2002052936 A1 US2002052936 A1 US 2002052936A1
- Authority
- US
- United States
- Prior art keywords
- port
- switch
- root
- ports
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 27
- 230000004044 response Effects 0.000 claims description 10
- 238000011144 upstream manufacturing Methods 0.000 claims description 7
- 230000003247 decreasing effect Effects 0.000 claims description 3
- 230000008878 coupling Effects 0.000 claims 1
- 238000010168 coupling process Methods 0.000 claims 1
- 238000005859 coupling reaction Methods 0.000 claims 1
- 230000007704 transition Effects 0.000 abstract description 31
- 238000001514 detection method Methods 0.000 abstract description 8
- 238000001914 filtration Methods 0.000 description 20
- 230000008859 change Effects 0.000 description 18
- 238000010586 diagram Methods 0.000 description 9
- 238000004891 communication Methods 0.000 description 8
- 230000008569 process Effects 0.000 description 8
- 230000006870 function Effects 0.000 description 6
- 230000005540 biological transmission Effects 0.000 description 5
- 230000000644 propagated effect Effects 0.000 description 5
- 238000012360 testing method Methods 0.000 description 5
- 230000032683 aging Effects 0.000 description 4
- 230000015572 biosynthetic process Effects 0.000 description 3
- 238000011084 recovery Methods 0.000 description 3
- 238000000638 solvent extraction Methods 0.000 description 3
- 235000008694 Humulus lupulus Nutrition 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000006424 Flood reaction Methods 0.000 description 1
- 239000000470 constituent Substances 0.000 description 1
- 230000001934 delay Effects 0.000 description 1
- 230000003111 delayed effect Effects 0.000 description 1
- 238000005538 encapsulation Methods 0.000 description 1
- 238000005111 flow chemistry technique Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000035755 proliferation Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/48—Routing tree calculation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4604—LAN interconnection over a backbone network, e.g. Internet, Frame Relay
- H04L12/462—LAN interconnection over a bridge based backbone
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0823—Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
- H04L41/083—Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability for increasing network speed
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/28—Routing or path finding of packets in data switching networks using route fault recovery
Definitions
- the present invention relates generally to computer networks, and more specifically, to a method and apparatus for rapidly reconfiguring a computer network following a network change.
- a computer network typically comprises a plurality of interconnected entities.
- An entity may consist of any device, such as a computer or end station, that “sources” (i.e., transmits) or “sinks” (i.e., receives) data frames.
- a common type of computer network is a local area network (“LAN”) which typically refers to a privately owned network within a single building or campus.
- LANs typically employ a data communication protocol (LAN standard), such as Ethernet, FDDI or token ring, that defines the functions performed by data link and physical layers of a communications architecture (i.e., a protocol stack).
- LAN standard such as Ethernet, FDDI or token ring
- a switch may be utilized to provide a “switching” function for transferring information, such as data frames, among entities of a computer network.
- the switch is a computer and includes a plurality of ports that couple the switch to the other entities. Ports used to couple switches to each other are generally referred to as a trunk ports, whereas ports used to couple a switch to LANs or end stations are generally referred to as local ports.
- the switching function includes receiving data at a source port from an entity and transferring that data to at least one destination port for receipt by another entity.
- Switches typically learn which destination port to use in order to reach a particular entity by noting on which source port the last message originating from that entity was received. This information is then stored by each switch in a block of memory referred to as a filtering database. Thereafter, when a message addressed to a given entity is received on a source port, the switch looks up the entity in its filtering database and identifies the appropriate destination port to utilize in order to reach that entity. If no destination port is identified in the filtering database, the switch floods the message out all ports, except the port on which the message was received. Messages addressed to broadcast or multicast addresses are also flooded.
- each entry is “aged out” by a corresponding timer. Specifically, when an entry is first added to the filtering database, the respective timer is activated. Thereafter, each time the switch receives a subsequent message from this entity on the same source port, it simply resets the timer. Pursuant to standards set forth by the Institute of Electrical and Electronics Engineers (IEEE), the default value of the timer is five minutes. See IEEE Standard 802.1D. Thus, provided the switch receives a message from a particular entity at least every five minutes, the timer will keep being reset and the corresponding entry will not be discarded. If the switch stops receiving messages, the timer will expire and the corresponding entry will be discarded. Once the entry ages out, any messages subsequently received for this entity must be flooded, until the switch receives another message from the entity and thereby learns the correct destination port.
- IEEE Institute of Electrical and Electronics Engineers
- switches execute a spanning tree algorithm.
- This algorithm effectively “severs” the redundant links within the network.
- switches exchange special messages called bridge protocol data unit (BPDU) frames that allow them to calculate a spanning tree or active topology, which is a subset of the network that is loop-free (i.e., a tree) and yet connects every pair of LANs within the network (i.e., the tree is spanning).
- BPDU bridge protocol data unit
- the switches calculate the tree in accordance with the algorithm and typically elect to sever or block all of the redundant links, leaving a single communications path.
- execution of the spanning tree algorithm causes the switches to elect a single switch, among all the switches within each network, to be the “root” switch.
- Each switch has a unique numerical identifier (switch ID) and the root is the switch having the lowest switch ID numeric value.
- switch ID the switch ID
- the root is the switch having the lowest switch ID numeric value.
- a single “designated switch” is elected that will forward frames from the LAN toward the root.
- the designated switch is typically the one closest to the root.
- Each switch within the network also selects one port, known as its “root port” which gives the lowest cost path (e.g., the fewest number of hops, assuming all links have the same cost) from the switch to the root.
- the root ports and designated switch ports are selected for inclusion in the spanning tree and are placed in a forwarding state so that data frames may be forwarded to and from these ports and thus onto the corresponding paths or links. Ports not included within the spanning are placed in a blocked state. When a port is in the blocked state, data frames will not be forwarded to or received from the port.
- all ports are designated ports and are therefore placed in the forwarding state, except for some self-looping ports, if any.
- a self-looping port is a port coupled to another port at the same switch.
- Each BPDU typically includes, in part, the following information: the identifier of the switch assumed to be the root (by the switch transmitting the BPDU), the root path cost to the assumed root and the identifier of the switch transmitting the BPDU.
- the switch Upon receipt of a BPDU, its contents are examined and compared with similar information (i.e., assumed root ID, lowest root path cost and switch ID) stored by the receiving switch. If the information from the received BPDU is “better” than the stored information, the switch adopts the better information and begins transmitting it (adding the cost associated with the receiving port to the root path cost) through its ports, except for the port on which the “better” information was received. Eventually, all switches will agree on the root and each will be able to identify which of its ports presents the lowest cost path to the root (i.e., its root port).
- the location of the root can significantly affect the distance that messages must travel.
- many networks include a plurality of switches designated as access switches that provide connectivity to LANs, end stations, etc., and a plurality of backbone switches that, in turn, interconnect the various access switches.
- the root is located at an access switch and the principal server utilized by the end stations (i.e., clients) is coupled to a backbone switch, the average distance between end stations and the primary server may be quite high, resulting in inefficient network operation.
- the backbone switches may become partitioned as ports between them are blocked.
- Switch IDs moreover, include a fixed portion and a settable portion. By substantially decreasing the value of the settable portion of the identifier for a selected switch, a network administrator may “force” the network to choose the selected switch as the root.
- switches again compare information in received BPDUs with their stored information. If the root path cost stored by a first switch is lower than the root path cost contained in BPDUs received from a second switch, then the first switch is the designated switch. If the root path cost for both the first and second switches is the same, the first switch compares the next informational element in the BPDU, i.e., the switch IDs. If the switch ID of the first switch is less than the ID of the second switch, then the first switch is the designated switch, otherwise the second switch is the designated switch.
- the root switch In accordance with the spanning tree algorithm, the root switch generates and transmits BPDUs from its ports every hello time which is a settable parameter. Pursuant to IEEE standards, the default hello time is two seconds. In response to receiving BPDUs, switches transmit their own BPDUs. Thus every two seconds BPDUs are propagated through the network. BPDU information, moreover, like entity address information, is subject to being aged out and discarded. Typically, a timer is associated with the BPDU information stored for each port of a switch. The timer is set to a value referred to as the maximum age which is loaded into BPDUs generated by the root switch and copied by the other switches. An example of a default maximum age value is twenty seconds.
- BPDUs As BPDUs are received, their contents are examined. If the contents match the information already stored for that port, the timer is reset. Accordingly, by receiving consistent BPDUs every hello time, which is significantly less than the maximum age, the current BPDU information is maintained and the accuracy of the spanning tree or active topology is confirmed.
- a switch stops receiving BPDUs on its root port, indicating a possible link or device failure, the corresponding timer will expire and the information will be discarded. In response, the switch will select a new root port based upon the next best information it has, and begin transmitting BPDUs through its other ports. Similarly, as links or devices are repaired or added, a switch may receive BPDUs containing better information than that stored for a particular port, thereby causing the switch to replace the previously stored information, as described above.
- ports may transition from the blocked state to the forwarding state and vice versa. That is, as a result of new BPDU information, a previously blocked port may learn that it is now the root port or the designated port for a given LAN. Rather than transition directly from the blocked state to the forwarding state, ports transition through two intermediate states: a listening state and a learning state. In the listening state, a port waits for information indicating that it should return to the blocked state. If, by the end of a preset time, no such information is received, the port transitions to the learning state.
- a port In the learning state, a port still blocks the receiving and forwarding of frames, but received frames are examined and the corresponding location information is stored, as described above. At the end of a second preset time, the port transitions from the learning state to the forwarding state, thereby allowing frames to be forwarded and received at the port.
- the time spent in each of the listening and the learning states is referred to as the forwarding delay.
- TCN-PDU Topology Change Notification Protocol Data Unit
- the format of the TCN-PDU frame is well known (see IEEE 802.1D standard) and, thus, will not be described herein.
- the TCN-PDU is propagated hop-by-hop until it reaches the root which confirms receipt of the TCN-PDU by setting a topology change flag in all BPDUs subsequently transmitted by the root for a period of time.
- switches receiving these BPDUs, note that the topology change flag has been set, thereby alerting them to the change in the active topology.
- switches significantly lower the aging time associated with their filtering databases which, as described above, contain destination information corresponding to the entities within the network. Specifically, switches replace the default aging time of five minutes with the forwarding delay time, which is generally fifteen seconds according to the IEEE standards. Information contained in the filtering databases is thus quickly discarded.
- the spanning tree algorithm is able to maintain a loop-free tree despite network changes, recalculation of the spanning tree is a time consuming process.
- the maximum age of BPDUs i.e., the length of time that BPDU information is kept
- the forwarding delay time i.e., the length of time that ports are to remain in each of the listening and learning states.
- recalculation of the spanning tree following a network change takes approximately fifty seconds (e.g., twenty seconds for BPDU information to time out, fifteen seconds in the listening state and another fifteen seconds in the learning state).
- Another object of the present invention is to provide a method and apparatus for balancing message traffic across several links of a computer network.
- Yet another object of the present invention is to provide a method and apparatus that is compatible with non-enabled devices.
- the invention relates to a method and apparatus for rapidly reconfiguring a computer network.
- the network preferably includes a plurality of devices executing the spanning tree algorithm so as to elect a root and place the ports of the devices in either a forwarding or blocked state.
- one or more devices are configured and arranged so that one trunk port is in the forwarding state and other trunk ports are in the blocked state.
- one or more of the blocked ports are designated as back-up ports.
- the state of one of the back-up ports immediately transitions from blocked to forwarding, thereby becoming the new active port for the device.
- the selected back-up port does not transition through any intermediary states (such as the listening or learning states) in moving from blocked to forwarding. Accordingly, the time required to transition to a new active port capable of forwarding data messages is substantially reduced.
- the device Upon transition to the new forwarding port, the device begins transmitting “dummy” multicast messages through the new port. These dummy multicast messages carry the source address of each entity that is directly coupled to the device with the new active port or downstream thereof (relative to the root) and are received by other devices in the computer network. Upon receipt, the other devices examine the contents of these messages and note the port on which they were received, which may differ from the port on which messages from these entities were previously received (i.e., before the failure and subsequent replacement of the device's active port). It is through this process that other devices within the network learn to utilize the new forwarding port, rather than the failed port, when directing messages to these entities. Notably, the transition to a new forwarding port is accomplished without other devices having to discard the contents of their filtering databases and, thus, the flooding of messages following a network change is substantially reduced.
- the method and apparatus manifests, in part, as a series of novel commands that may be entered at the devices.
- the devices may be classified as either access switches or backbone switches.
- Access switches are preferably coupled to entities (e.g., LANs, end stations, etc.) whereas backbone switches provide the interconnections between access switches.
- a first command, Become_Root_Primary is preferably entered at a first backbone switch and significantly lowers the value of the first backbone switch's numeric ID, thereby forcing it to become the root upon execution of the spanning tree algorithm. This command also modifies certain parameters associated with the spanning tree algorithm to further reduce reconfiguration time.
- a second command, Become_Root_Secondary preferably entered at a second backbone switch, adjusts the second backbone switch's ID to a value between a default value and the value specified in the Become_Root_Primary command.
- the Become_Root_Secondary command thus causes the second backbone switch to become the new root upon a failure of the first backbone switch.
- a third command, Enable_Uplinkfast, is preferably entered at each access switch.
- This command substantially increases the values of access switches' IDs, effectively precluding any access switch from becoming the root.
- This command also increases the path costs associated with each port of the access switches. By raising the path costs, access switches are less likely to become designated switches. As a result, only one trunk port (i.e., the root port) for each access switch is generally placed in the forwarding state. The remaining trunk ports which normally connect the access switch to the corresponding backbone switches are blocked.
- the Enable_Uplinkfast command also designates the blocked trunk ports of the corresponding access switch, except self-looping ports, as possible back-up root ports. Upon failure of the current root port, this command additionally configures the access switch to immediately transition one of its blocked trunk ports to the forwarding state and to also begin transmitting dummy multicast messages through the new port, as mentioned above. Upon detection of a new or repaired link or device representing a better path toward the root, this command additionally configures the access switch to transition to the new path without suffering a loss of connectivity. Reconfiguration of the network may thus be accomplished substantially sooner than the time required by the conventional spanning tree algorithm while still avoiding the formation of loops.
- FIG. 1 is a highly schematic diagram of a computer network in accordance with the present invention.
- FIG. 2 is a partial block diagram of a device in accordance with a preferred embodiment of the present invention.
- FIGS. 3 A-E are flow diagrams of methods used to rapidly reconfigure the computer network.
- FIG. 4 is a block diagram of a dummy multicast message in accordance with a preferred embodiment of the present invention.
- FIG. 1 illustrates a partially meshed computer network 100 in accordance with the present invention.
- the network 100 preferably comprises a plurality of local area networks (LANs) 102 - 109 each of which is coupled to one or more access switches 114 - 116 .
- Access switches 114 - 116 are interconnected with each other through a plurality of backbone switches 120 - 125 .
- access switches 114 - 116 are generally connected to the backbone switches 120 - 125 through a series of links 128 , such as point-to-point links, although they may be connected via a shared media (e.g., LAN 109 ).
- the backbone switches 120 - 125 are similarly interconnected by links 128 .
- Each access switch 114 - 116 and backbone switch 120 - 125 includes a plurality of ports which, if coupled to a LAN 102 - 109 , are referred to as local ports 118 and if coupled to links 128 are referred to as trunk ports 119 .
- Network 100 further includes a plurality of servers 112 a - 112 c , such as file servers, print servers, etc., each coupled to the local port 118 of one or more access or backbone switches.
- Each LAN 102 - 109 includes one or more hosts or end stations (not shown) that may source or sink data frames to one another or to the servers 112 a - 112 c over the network 100 .
- One or more routers 130 and 131 may also be provided to add functionality to network 100 .
- each router 130 , 131 is coupled to a backbone switch, such as backbone switches 120 and 121 , by a corresponding link 128 .
- Links 128 represent communications paths between various components of the network 100 , that carry messages, such as data frames, between switches 114 - 116 , 120 - 125 and routers 130 , 131 .
- each switch and router such as access switch 114 , identifies its local and trunk ports 118 and 119 by numbers (e.g., port number one, port number two, port number three, etc.)
- Switches 114 - 116 , 120 - 125 and routers 130 , 131 are thus able to associate specific ports with the LANs, switches, routers, servers, etc. that are coupled thereto or otherwise accessible through a given port.
- the network 100 of FIG. 1 is meant for illustrative purposes only and that the present invention will operate with other network designs having possibly far more complex topologies.
- one or more distribution switches may be interleaved between the backbone switches and the access switches, two access switches may be directly connected, etc.
- network 100 includes redundant communication paths interconnecting the access and backbone switches 114 - 116 and 120 - 125 .
- the existence of such redundant links prevents portions of the network 100 from becoming isolated should any constituent link or device fail.
- Such redundancy also results in the creation of loops, which, as described above, are highly undesirable.
- these switches execute the spanning tree algorithm, as described herein.
- FIG. 2 is a partial block diagram of a switch 214 in accordance with the present invention which corresponds to access switch 114 of FIG. 1.
- a switch suitable for use with the present invention is described in commonly owned U.S. patent application Ser. No. 08/623,142 filed Mar. 28, 1996 and entitled INTERSWITCH LINK MECHANISM FOR CONNECTING HIGH-PERFORMANCE NETWORK SWITCHES which is hereby incorporated by reference in its entirety.
- Switch 214 includes a plurality of ports 230 each of which is preferably identified by a number (e.g., port numbers one through eight).
- Frame transmission and reception objects may be associated with each port 230 such that frames received at a given port 230 may be captured, and frames to be transmitted by switch 214 may be delivered to a given port.
- Frame reception and transmission objects are preferably message storage structures, such as queues.
- Switch 214 further includes a protocol entity 232 .
- the protocol entity 232 preferably includes a rapid reconfiguration entity 234 , at least one spanning tree state machine engine 236 and a forwarding entity 238 .
- the rapid reconfiguration entity 234 is coupled to a reconfiguration memory 240 .
- Memory 240 includes a plurality of cells 240 a - 240 e for storing the unique numeric switch identifier (ID) corresponding to switch 214 , the assigned path cost corresponding to each port 230 and the values corresponding to the hello time, maximum age and forward delay parameters of the spanning tree algorithm.
- ID unique numeric switch identifier
- a switch ID includes a fixed portion and a settable portion.
- Each spanning tree engine 236 is similarly coupled to a spanning tree table 242 having a plurality of rows and columns.
- Each row or entry 243 of table 242 is preferably associated with a port 230 of the switch 214 .
- the columns or cells moreover, include a root ID cell 242 a , a root path cost cell 242 b and a corresponding timer cell 242 c . It should be understood that table 242 may include additional cells.
- the forwarding entity 238 is coupled to a filtering database 244 configured to store address information corresponding to the entities of network 100 .
- filtering database 244 has a plurality of columns or cells, including a destination address cell, a destination port cell and a corresponding timer cell. Each row or entry in the filtering database 244 preferably corresponds to a particular entity.
- memory 240 and tables 242 and 244 may be implemented as content addressable memory (CAM) devices and that entities 234 and 238 and state machine engine 236 may comprise registers and combinational logic configured and arranged to produce sequential logic circuits.
- entities 234 and 238 and state machine engine 236 preferably comprise programmable processing elements containing software programs pertaining to the methods described herein and executable by the processing elements.
- Other computer readable media may also be used to store and execute the program instructions.
- the method and apparatus of the present invention is preferably implemented, in part, through the operation of a plurality of novel commands entered at the various switches of the network 100 (FIG. 1), typically by a user or network administrator.
- FIG. 3A is a flow diagram of a Become_Root_Primary command 300 that is preferably entered at a first backbone switch (e.g., backbone switch 120 ). Selection of the particular backbone switch as the primary root may depend on where the most utilized server, such as server 112 b , is located. That is, to reduce the average distance that messages must travel, the Become_Root_Primary command 300 is preferably entered at the backbone switch coupled to the most heavily utilized server, as shown at block 310 .
- the rapid reconfiguration entity 234 of the selected backbone switch 120 modifies the settable portion of the corresponding switch ID stored at reconfiguration memory 240 .
- the value of the switch ID is significantly lowered to ensure that the selected backbone switch 120 will be elected the root switch upon execution of the spanning tree algorithm.
- the switch ID may be reduced from the default value of “32768” specified by the IEEE standards to “8192”.
- the Become_Root_Primary command at block 314 , also modifies the hello time, maximum age and forward delay parameters of the spanning tree algorithm as a function of network diameter as set forth in Table 1.
- Network diameter is defined by the IEEE 802.1D standard as the maximum number of devices between any two points of attachment of end stations and is an argument of the Become_Root_Primary command 300 .
- entity 234 may maintain the information of Table 1 in memory, such as memory 240 .
- a second command is preferably entered to establish a back-up root.
- a Become_Root_Secondary command 320 is preferably entered at a second backbone switch (e.g., backbone switch 121 ), as shown at block 322 .
- the Become_Root_Secondary command 320 similarly modifies the settable portion of the switch ID of the second backbone switch 121 that is stored at the respective reconfiguration memory 240 , as shown by block 324 .
- the value of the switch ID is modified so as to be between the default IEEE 802.1D value (i.e., “32768”) and the value specified by the Become_Root_Primary command 300 (i.e., “8192”).
- the switch ID may be set to “16384”.
- the Become_Root_Secondary command 320 also utilizes network diameter as an argument and modifies the hello time, maximum age and forward delay parameters stored at the respective memory 240 of switch 121 in accordance with Table 1, as reflected by block 326 .
- an Enable_Uplinkfast command 330 is preferably entered at each access switch 114 - 116 within the network 100 , as shown at block 332 .
- This command 330 at block 334 , preferably increases the respective switch ID of each of the access switches 114 - 116 to preclude any of the access switches 114 - 116 from becoming the root.
- the Enable_Uplinkfast command 330 preferably increases the settable portion of the switch ID stored at respective memory 240 from the IEEE default value of “32768” to “49152”.
- the Enable_Uplinkfast command 330 also significantly increases the path costs of all the ports of the respective access switch.
- the path costs stored at memory 240 for each port are preferably increased from the IEEE default value of “10” (for 100 Mbps ports) to “3000”.
- the Enable_Uplinkfast command 330 at block 338 , also configures rapid reconfiguration entity 234 to rapidly transition a blocked port to the forwarding state and to generate and transmit dummy multicast messages, as described below.
- each switch such as switch 214
- spanning tree engine 236 begins formulating and transmitting bridge protocol data unit (BPDU) frames from each port 230 .
- switch 214 has yet to receive any BPDUs; switch 214 thus assumes that it is the root and transmits BPDUs from every port 230 containing its switch ID as the root ID and a root path cost of zero.
- Spanning tree engine 236 obtains the switch ID and a maximum age value for loading in BPDUs from entity 234 and copies the information contained in transmitted BPDUs into its associated spanning tree table 242 .
- BPDUs are received at the ports 230 of switch 214 , they are passed to the spanning tree engine 236 and processed. Specifically, engine 236 compares information contained in the received BPDUs with the information stored in table 242 . If the information from the received BPDU is better (e.g., a presumed root with a lower ID) than the stored information, engine 236 enters the received information into table 242 . Engine 236 also sets the corresponding timer according to the maximum age value in the received BPDU and stops forwarding BPDUs through this port 230 . Execution of the spanning tree algorithm will converge with the election of a single root by all of the switches in the network 100 .
- engine 236 compares information contained in the received BPDUs with the information stored in table 242 . If the information from the received BPDU is better (e.g., a presumed root with a lower ID) than the stored information, engine 236 enters the received information into table 242 . Engine 236 also sets the corresponding
- location of the root may affect the average distance (i.e., the average number of hops) a message travels and/or cause undesirable partitioning of backbone switches.
- the conventional spanning tree algorithm simply selects the switch having the lowest ID to become the root, regardless of where in the network 100 this switch is located.
- an access switch is often elected to be the root, causing messages to travel a much higher average distance than if a backbone switch had been elected the root for many network configurations, such as partially meshed distributed networks.
- first backbone switch 120 Since the numeric switch ID of the first backbone switch 120 is lowered to a value below that of all other switches in the network 100 (through the Become_Root_Primary command 300 ), first backbone switch 120 is elected the root switch. Thus, all ports of the first backbone switch 120 are placed in the forwarding state. In addition, since the maximum age and forwarding delay parameters are copied by each switch from BPDUs originating from the root through operation of the spanning tree algorithm, the values selected from the become_Root_Primary command 300 (see Table 1) are effectively propagated to all switches 114 - 116 and 121 - 125 within network 100 (FIG. 1).
- the Enable_Uplinkfast command 330 essentially prevents access switches from becoming designated switches on shared media or trunk links when the second switch is a backbone switch.
- LAN 109 which is coupled to both access switch 116 and backbone switch 125 , for example, only one switch port connected to LAN 109 will be deemed the designated switch port by the spanning tree algorithm.
- Determination of the designated switch depends in part on the path costs at the relevant ports of the two switches coupled to LAN 109 . Since the path costs at access switch 116 have been increased to “3000”, whereas the path costs at backbone switch 125 remain at the default value of “100” for ports operating at a data rate of 10 Mb/s or “10” for ports operating at 100 Mb/s, the port at backbone switch 125 coupled to LAN 109 will be deemed the designated switch port and placed in the forwarding state. Furthermore, unless the port at access switch 116 coupled to LAN 109 represents the root port for switch 116 , it will be placed in the blocked state.
- the forwarding entity 238 As messages (i.e., data frames) are subsequently received at the ports 230 , they are passed to forwarding entity 238 , assuming the respective port 230 is in the forwarding state.
- the forwarding entity 238 first examines the destination address of the message and performs a look up function at the filtering database 244 . Assuming an entry is found and a corresponding destination port (e.g., port number four) is identified, the message is switched out onto this port, assuming this port is in the forwarding state. If no entry is found in the filtering database 244 , the message is flooded out all ports 230 in the forwarding state, except the port 230 on which the message was received.
- a corresponding destination port e.g., port number four
- the forwarding entity 238 next examines the source address of the message and performs another look-up at filtering database 244 . If no entry is found for the source address, a new entry is formed and the source port (e.g., port number eight) on which the message was received is entered as the destination port in the corresponding port column. In addition, a timer associated with this entry is set to the aging time with which forwarding entity 238 is configured (e.g., five minutes).
- the time taken to detect such a change is substantially reduced by operation of the novel commands of the present invention.
- the Become_Root_Primary command 300 at block 314 causes the maximum age value to be significantly lowered from the default value of twenty seconds. For example, if the network diameter is five, the maximum age is reduced to ten seconds. As described above, this value is loaded into BPDUs originating at the root (i.e., backbone switch 120 ), causing it to be propagated to and stored by each switch at its respective reconfiguration memory 240 . Accordingly, access switches 114 - 116 and backbone switches 120 - 125 detect failures much sooner since the corresponding BPDU information times out sooner. To prevent BPDU information from being inadvertently discarded due to the reduction in maximum age values, the hello time is also reduced to one second. This increases the frequency with which the root transmits BPDUs.
- a link failure may alternatively be detected by a link integrity test which operates at the physical layer of the protocol stack.
- the link integrity test typically exchanges test messages across the respective link 128 at a relatively high rate (e.g., every ten milliseconds).
- the link integrity test is able to detect a failure much sooner than the spanning tree algorithm, which simply waits for the respective BPDU information to time out and be discarded.
- FIG. 3D is a flow diagram of a rapid reconfiguration process 340 following a link failure according to the present invention.
- rapid reconfiguration entity 234 at switch 214 selects a backup port to become the new root port, as shown at box 344 .
- Rapid reconfiguration entity 234 may use the spanning tree algorithm to select the next root port. That is, the blocked trunk port 119 (e.g., port number four) representing the next lowest root path cost (after the now failed root port) may be selected as the new forwarding port by entity 234 .
- Self-looping ports, such as port numbers five and six at switch 114 are not considered possible back-up ports, even though at least one of these ports will be in the blocked state, since these ports will not provide connectivity to the root.
- the blocked trunk port having the lowest port number may be selected.
- Rapid reconfiguration entity 234 at block 346 , then directs the spanning tree state machine engine 236 to immediately transition the selected back-up port (e.g., port number four) to the forwarding state. That is, the spanning tree engine 236 does not transition the selected back-up port between the listening or learning states. Instead, the selected back-up port transitions directly to the forwarding state under the direction of rapid reconfiguration entity 234 , and switch 114 immediately begins transmitting and receiving messages through this newly activated trunk port 119 (e.g., port number four).
- the selected back-up port e.g., port number four
- FIG. 4 is a highly schematic illustration of a dummy multicast message 400 preferably utilized by rapid reconfiguration entity 234 .
- Dummy multicast message 400 includes a destination address (DA) field 410 and a source address (SA) field 412 that may be compatible with the Media Access Control (MAC) layer of the protocol stack.
- dummy multicast message 400 complies with the IEEE 802.3 standard and includes conventional logical link control (LLC) and SubNetwork Access Protocol (SNAP) encapsulation, which are well known to those skilled in the art.
- Rapid reconfiguration entity 234 preferably loads DA field 410 with a multicast address that causes message 400 to be received by all devices (e.g., access switches 114 - 116 and backbone switches 120 - 125 ) within the network 100 .
- rapid reconfiguration entity 234 loads SA field 412 with the address of an entity directly coupled to switch 114 .
- entity 234 loads the address of server 112 a into the source address field 412 .
- multicast message 400 may further include a data field 414 , its contents are preferably not asserted by entity 234 .
- Multicast message 400 having the address of server 112 a loaded in SA field 412 , is then forwarded through the new root port (i.e., port number four) of switch 114 .
- Multicast message 400 is first received at backbone switch 124 which examines its contents.
- backbone switch 124 notes that the message is from server 112 a , but that it was received on a different source port than switch 124 previously associated with server 112 a . That is, prior to the failure at port number three at access switch 114 , backbone switch 124 likely associated all entities directly coupled to switch 114 (including server 112 a ) with its port coupled to backbone switch 121 , which, in turn, accessed such entities via backbone switches 120 and 122 .
- Rapid reconfiguration entity 234 similarly generates one or more separate multicast messages 400 for each remaining entity directly coupled to access switch 114 (i.e., entities or end stations on LANs 102 - 104 ).
- entity 234 loads SA field 414 with the address of the corresponding entity.
- Each of these messages are similarly forwarded by access switch 114 through the new forwarding port (i.e., port number four).
- entity 234 generates and transmits one or more multicast messages 400 for entities reachable through switch 114 on ports other than its root port. For example, if port number seven at switch 114 were coupled to another access switch, entity 234 would transmit multicast messages 400 carrying the source address of entities directly coupled to this additional access switch as well.
- At least one multicast message 400 is generated and transmitted for each entity directly coupled to or downstream of access switch 114 (relative to the root).
- the other devices within network 100 update their corresponding filtering databases with the new destination ports, as necessary.
- entity 234 is configured to limit the rate at which dummy multicast messages 400 are transmitted to fifteen messages per one hundred milliseconds or less. This limit on message throughput prevents any access switch from consuming a significant portion of the communications resources of the network 100 with the transmission of dummy multicast messages 400 .
- FIG. 3E is a flow diagram of a rapid configuration process 350 corresponding to a link recovery or addition in accordance with the present invention.
- backbone switch 121 (FIG. 1) is the root and that port number three at access switch 114 is the root port, since the link 128 coupled to port number four (which represents a better path cost to root 121 ) is failed. If the link 128 coupled to port number four is subsequently recovered, switch 114 will detect the change, as indicated at box 352 , through the receipt of BPDUs on this port. The recovery of link 128 may also be detected by the link integrity test, as described above.
- rapid reconfiguration entity 234 monitors the receipt of messages (e.g., BPDUs) at port number four for a period of time (e.g., thirty seconds) to ensure that the corresponding port at the upstream switch (e.g., backbone switch 124 ) has transitioned to the forwarding state.
- a period of time e.g., thirty seconds
- entity 234 at switch 114 preferably waits a period equal to twice the forwarding delay before starting the transition process. If entity 234 were to immediately transition to a new port, a loss of connectivity might result as the corresponding upstream port may not be forwarding.
- rapid reconfiguration entity 234 transitions the current root port to the blocked state, as indicated at block 356 .
- rapid reconfiguration entity 234 directs the spanning tree state machine engine 236 to transition the recovered port (i.e., port number four) directly from the blocked state to the forwarding state without transition through the listening or learning intermediary states.
- switch 114 may immediately begin transmitting and receiving frames, including data messages, from this recovered port.
- rapid configuration entity 234 informs the network 100 (FIG. 1) of the new forwarding port, as reflected by block 360 .
- entity 234 generates and transmits dummy multicast messages 400 for all entities directly coupled to switch 114 or downstream thereof (relative to the root) through the new forwarding port (i.e., port number four).
- the transition to a recovered port, which represents a better path to the root, is thus accomplished without the loss of connectivity that otherwise occurs under operation of the conventional spanning tree algorithm. Additionally, the disadvantages caused by the flooding of messages is also avoided.
- the Enable_Uplinkfast command 330 is preferably not entered at the backbone switches 120 - 125 , these switches do not designate blocked ports as potential back-up ports that may be immediately transitioned to the forwarding state. Nonetheless, through the Become_Root_Primary and Become_Root_Secondary commands 300 , 320 , the time required to reconfigure the network following a change at a backbone switch is also reduced. First, as described above, these two commands 300 , 320 significantly reduce the maximum age value utilized by all switches in the network 100 , thereby reducing the time it takes to detect a change. Additionally, the forward delay time is lowered as reflected in Table 1. By reducing the time spent in the listening and learning states, the speed at which network 100 is reconfigured following a change is substantially improved.
- switch 114 in addition to generating and transmitting dummy multicast messages 400 following the detection of a change, may also transmit TCN-PDUs toward the root. As described above, by transmitting TCN-PDUs, switch 114 will cause devices, such as switches 114 - 116 and 120 - 125 , to shorten the age out time associated with their filtering databases 244 . By quickly discarding the contents of their filtering databases 244 , the possibility of data messages being misdirected or lost is significantly reduced. Furthermore, the transmission of dummy multicast messages 400 , as described above, quickly informs devices of newly activated ports, thereby reducing the flooding that otherwise occurs when the contents of filtering databases 244 are discarded.
- the above commands 300 , 320 , 330 also reduce the disruptions that may occur upon failure of the root.
- a failure at the root e.g., backbone switch 120
- the BPDU information stored at the remaining devices such as access switches 114 - 116 and backbone switches 121 - 123 , will then time out, based on the particular maximum age value obtained from Table 1. In response, these devices will begin recalculating the spanning tree for the network 100 . Since the Become_Root_Secondary 320 command was entered at backbone switch 121 , its corresponding numeric identifier was significantly lowered, causing backbone switch 121 to become the new root.
- the Become_Root_Secondary command 320 thus ensures that, upon a failure of the primary root (i.e., backbone switch 120 ), the next switch elected to be the root will also be a backbone switch.
- the second backbone switch 121 By carefully selecting the second backbone switch 121 , the average distance traveled by messages within the network 100 may be optimized and partitioning of backbone switches avoided.
- BPDUs originating from the new root (e.g., backbone switch 121 ), moreover, will contain the improved parameters set forth in Table 1, by virtue of the Become_Root_Secondary command 320 .
- switches 114 - 116 and 120 - 125 will be able to rapidly reconfigure the network 100 in the face of changes following the election of the new root (e.g., the backbone switch 121 ).
- a computer network such as network 100 (FIG. 1), may also be segregated into a series of network groups.
- U.S. Pat. No. 5,394,402 issued on Feb. 28, 1995 to Floyd E. Ross (the “'402 patent”), which is hereby incorporated by referenced in its entirety, discloses an arrangement that is capable of associating any port of a switch with any particular segregated network group.
- any number of physical ports of a particular switch may be associated with any number of groups within the switch by using a virtual local area network (VLAN) arrangement that virtually associates the port with a particular VLAN designation.
- VLAN virtual local area network
- Ross discloses a switch or hub for a segmented virtual local area network with shared media access that associates VLAN designations with at least one local port and further associates those VLAN designations with messages transmitted from any of the ports to which the VLAN designation has been assigned.
- VLAN designation for each local port is stored in a memory portion of the switch such that every time a message is received by the switch on a local port the VLAN designation of that port is associated with the message. Association is accomplished by a flow processing element which looks up the VLAN designation in a memory based on the local port where the message originated.
- IEEE standards committee is preparing a standard for Virtual Bridged Local Area Networks. See IEEE Standard 802.1Q (draft).
- a separate spanning tree or active topology may be defined for each VLAN designation defined within the network. See Cisco IOS VLAN Services document. That is, a first spanning tree may be associated with the red VLAN designation and a second spanning tree associated with the blue VLAN designation. Thus, a given port may be in the forwarding state for a first VLAN designation (e.g., red), but blocked for second VLAN designation (e.g., blue).
- first VLAN designation e.g., red
- second VLAN designation e.g., blue
- the Become_Root_Primary and Become_Root_Secondary commands 300 , 320 are associated with one or more VLAN designations. That is, for the red VLAN designation, the Become_Root_Primary command 300 may be entered at backbone switch 120 , whereas, for the blue VLAN designation, it may be entered at backbone switch 121 . Thus, the root for the spanning tree associated with the red VLAN designation will be at backbone switch 120 and the root for the blue VLAN designation will be at backbone switch 121 . By establishing a different root for the various VLAN designations, improved load balancing may be achieved on the network.
- red and blue VLAN designations each generate high message traffic
- the paths or links followed by messages with the red VLAN designation will be different than the paths or links followed by messages with the blue VLAN designation.
- Other low-traffic generating VLANs e.g., yellow and green
- the red and yellow VLAN designations may share backbone switch 120 as their root
- the blue and green VLAN designations may share backbone switch 121 as their root. This provides an even greater measure of load balancing within the network 100 .
- the Become_Root_Primary and Become_Root_Secondary commands 330 , 320 may include a VLAN list as a second argument in addition to the network diameter.
- the Become_Root_Primary command 300 may be entered with a network diameter of four and a VLAN list identifying the red, yellow, orange and violet VLAN designations as its arguments.
- the Become_Root_Primary command 300 may be entered with a network diameter of four and a VLAN list containing the blue, green and magenta VLAN designations as its arguments.
- switch 120 will become the root for the red, yellow, orange and violet VLAN designations
- switch 121 will become the root for the blue, green and magenta VLAN designations.
- Further load balancing may be achieved by having access switches select root ports on a per-VLAN basis. This may be accomplished by modifying the path costs for each trunk port of the access switches on a per-VLAN basis.
- the Enable_Uplinkfast command may be modified to adjust the path costs for each trunk port at the respective switch on a per-VLAN basis by adding a port number, VLAN designation and respective path cost string as an argument to the Enable_Uplinkfast command.
- the Enable_Uplinkfast command 330 may be entered at access switch 114 with the following argument string: port number two, red, 3100; port number two, blue, 3200; port number three, red, 3200; port number three, blue, 3100; port number four, red, 3300; port number four, blue, 3300. Since port number two has the lowest path cost for the red VLAN designation, this port will generally become the root port for the red VLAN. For the blue VLAN designation, port number three has the lowest path cost and thus will become the root port for the blue VLAN. Accordingly, all messages associated with the red VLAN designation will be forwarded and received at port number two and all messages associated with the blue VLAN designation will be forwarded and received at port number three. By dividing the message streams among different trunk ports 119 , improved load balancing may be achieved.
- access switches 114 - 116 may append a VLAN tag 416 to message 400 .
- the VLAN tag 416 is preferably loaded with the VLAN designation corresponding to the entity whose address is loaded into SA field 412 .
- VLAN tag 416 may be appended to the message 400 , as shown, it is preferably inserted after the source address field 412 . It will be understood to those skilled in the art that tag 416 may be inserted at other locations.
- path costs are permitted to take only one of two possible values, one of which is a default value.
- a “128” byte vector can be utilized per trunk port to represent the path costs for each VLAN designation. That is, each bit of the vector represents one VLAN designation.
- rapid reconfiguration entity 234 can determine the path cost for each VLAN designation. More specifically, if the bit is asserted, then the path cost for the corresponding VLAN designation will be set to the new value (e.g., “3100”). If a bit is not asserted, then the path cost for the corresponding VLAN designation will remain at the default value (e.g., “3000”).
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Small-Scale Networks (AREA)
Abstract
A method that rapidly reconfigures a computer network having a plurality of devices executing the spanning tree algorithm. First, one or more devices are configured and arranged so that one port, providing connectivity to the root, is in the forwarding state and the remaining ports, providing connectivity to the root, are in the blocked state. Next, one or more of the blocked ports are designated as back-up ports. Upon detection of a failure at the active forwarding port, one of the back-up ports immediately transitions from blocked to forwarding, thereby becoming the new active port for the device. Following the transition to a new active port, dummy multicast messages are transmitted, each containing the source address of an entity directly coupled to the affected device or downstream thereof. By examining the dummy multicast messages, other devices in the network learn to use to the new forwarding port of the affected device. Rapid reconfiguration of the network is also provided upon detection of a new or repaired link or device representing a better path toward the root. The method is also compatible with networks supporting virtual local area network (VLAN) designations and allows load balancing among different VLANs.
Description
- The present invention relates generally to computer networks, and more specifically, to a method and apparatus for rapidly reconfiguring a computer network following a network change.
- A computer network typically comprises a plurality of interconnected entities. An entity may consist of any device, such as a computer or end station, that “sources” (i.e., transmits) or “sinks” (i.e., receives) data frames. A common type of computer network is a local area network (“LAN”) which typically refers to a privately owned network within a single building or campus. LANs typically employ a data communication protocol (LAN standard), such as Ethernet, FDDI or token ring, that defines the functions performed by data link and physical layers of a communications architecture (i.e., a protocol stack). In many instances, several LANs may be interconnected by point-to-point links, microwave transceivers, satellite hook-ups, etc. to form a wide area network (“WAN”) or internet that may span an entire country or continent.
- One or more intermediate devices are often used to couple LANs together and allow the corresponding entities to exchange information. For example, a switch may be utilized to provide a “switching” function for transferring information, such as data frames, among entities of a computer network. Typically, the switch is a computer and includes a plurality of ports that couple the switch to the other entities. Ports used to couple switches to each other are generally referred to as a trunk ports, whereas ports used to couple a switch to LANs or end stations are generally referred to as local ports. The switching function includes receiving data at a source port from an entity and transferring that data to at least one destination port for receipt by another entity.
- Switches typically learn which destination port to use in order to reach a particular entity by noting on which source port the last message originating from that entity was received. This information is then stored by each switch in a block of memory referred to as a filtering database. Thereafter, when a message addressed to a given entity is received on a source port, the switch looks up the entity in its filtering database and identifies the appropriate destination port to utilize in order to reach that entity. If no destination port is identified in the filtering database, the switch floods the message out all ports, except the port on which the message was received. Messages addressed to broadcast or multicast addresses are also flooded.
- To prevent the information in the filtering database from becoming stale, each entry is “aged out” by a corresponding timer. Specifically, when an entry is first added to the filtering database, the respective timer is activated. Thereafter, each time the switch receives a subsequent message from this entity on the same source port, it simply resets the timer. Pursuant to standards set forth by the Institute of Electrical and Electronics Engineers (IEEE), the default value of the timer is five minutes. See IEEE Standard 802.1D. Thus, provided the switch receives a message from a particular entity at least every five minutes, the timer will keep being reset and the corresponding entry will not be discarded. If the switch stops receiving messages, the timer will expire and the corresponding entry will be discarded. Once the entry ages out, any messages subsequently received for this entity must be flooded, until the switch receives another message from the entity and thereby learns the correct destination port.
- Additionally, most computer networks include redundant communications paths so that a failure of any given link does not isolate any portion of the network. Such networks are typically referred to as meshed or partially meshed networks. The existence of redundant links, however, may cause the formation of circuitous paths or “loops” within the network. Loops are highly undesirable because data frames may traverse the loops indefinitely. Furthermore, as described above, many devices such as switches or bridges replicate (i.e., flood) frames whose destination port is not known or which are directed to broadcast or multicast addresses, resulting in a proliferation of data frames along loops. The resulting traffic effectively overwhelms the network.
- Spanning Tree Algorithm
- To avoid the formation of loops, devices, such as switches or bridges, execute a spanning tree algorithm. This algorithm effectively “severs” the redundant links within the network. Specifically, switches exchange special messages called bridge protocol data unit (BPDU) frames that allow them to calculate a spanning tree or active topology, which is a subset of the network that is loop-free (i.e., a tree) and yet connects every pair of LANs within the network (i.e., the tree is spanning). Using information contained in the BPDU frames, the switches calculate the tree in accordance with the algorithm and typically elect to sever or block all of the redundant links, leaving a single communications path.
- In particular, execution of the spanning tree algorithm causes the switches to elect a single switch, among all the switches within each network, to be the “root” switch. Each switch has a unique numerical identifier (switch ID) and the root is the switch having the lowest switch ID numeric value. In addition, for each LAN coupled to more than one switch, a single “designated switch” is elected that will forward frames from the LAN toward the root. The designated switch is typically the one closest to the root. By establishing designated switches, connectivity to all LANs, where physically possible, is assured.
- Each switch within the network also selects one port, known as its “root port” which gives the lowest cost path (e.g., the fewest number of hops, assuming all links have the same cost) from the switch to the root. The root ports and designated switch ports are selected for inclusion in the spanning tree and are placed in a forwarding state so that data frames may be forwarded to and from these ports and thus onto the corresponding paths or links. Ports not included within the spanning are placed in a blocked state. When a port is in the blocked state, data frames will not be forwarded to or received from the port. At the root, all ports are designated ports and are therefore placed in the forwarding state, except for some self-looping ports, if any. A self-looping port is a port coupled to another port at the same switch.
- Each BPDU typically includes, in part, the following information: the identifier of the switch assumed to be the root (by the switch transmitting the BPDU), the root path cost to the assumed root and the identifier of the switch transmitting the BPDU. Upon receipt of a BPDU, its contents are examined and compared with similar information (i.e., assumed root ID, lowest root path cost and switch ID) stored by the receiving switch. If the information from the received BPDU is “better” than the stored information, the switch adopts the better information and begins transmitting it (adding the cost associated with the receiving port to the root path cost) through its ports, except for the port on which the “better” information was received. Eventually, all switches will agree on the root and each will be able to identify which of its ports presents the lowest cost path to the root (i.e., its root port).
- Depending on the configuration of a given network, the location of the root can significantly affect the distance that messages must travel. For example, many networks include a plurality of switches designated as access switches that provide connectivity to LANs, end stations, etc., and a plurality of backbone switches that, in turn, interconnect the various access switches. If the root is located at an access switch and the principal server utilized by the end stations (i.e., clients) is coupled to a backbone switch, the average distance between end stations and the primary server may be quite high, resulting in inefficient network operation. In addition, the backbone switches may become partitioned as ports between them are blocked. To reduce the average distance and avoid partitioning of the backbone switches, it is desirable to locate the root at a backbone switch. Switch IDs, moreover, include a fixed portion and a settable portion. By substantially decreasing the value of the settable portion of the identifier for a selected switch, a network administrator may “force” the network to choose the selected switch as the root.
- To identify which switch should be the designated switch, switches again compare information in received BPDUs with their stored information. If the root path cost stored by a first switch is lower than the root path cost contained in BPDUs received from a second switch, then the first switch is the designated switch. If the root path cost for both the first and second switches is the same, the first switch compares the next informational element in the BPDU, i.e., the switch IDs. If the switch ID of the first switch is less than the ID of the second switch, then the first switch is the designated switch, otherwise the second switch is the designated switch.
- In accordance with the spanning tree algorithm, the root switch generates and transmits BPDUs from its ports every hello time which is a settable parameter. Pursuant to IEEE standards, the default hello time is two seconds. In response to receiving BPDUs, switches transmit their own BPDUs. Thus every two seconds BPDUs are propagated through the network. BPDU information, moreover, like entity address information, is subject to being aged out and discarded. Typically, a timer is associated with the BPDU information stored for each port of a switch. The timer is set to a value referred to as the maximum age which is loaded into BPDUs generated by the root switch and copied by the other switches. An example of a default maximum age value is twenty seconds. As BPDUs are received, their contents are examined. If the contents match the information already stored for that port, the timer is reset. Accordingly, by receiving consistent BPDUs every hello time, which is significantly less than the maximum age, the current BPDU information is maintained and the accuracy of the spanning tree or active topology is confirmed.
- If a switch stops receiving BPDUs on its root port, indicating a possible link or device failure, the corresponding timer will expire and the information will be discarded. In response, the switch will select a new root port based upon the next best information it has, and begin transmitting BPDUs through its other ports. Similarly, as links or devices are repaired or added, a switch may receive BPDUs containing better information than that stored for a particular port, thereby causing the switch to replace the previously stored information, as described above.
- As BPDU information is up-dated and/or timed-out, the spanning tree is recalculated and ports may transition from the blocked state to the forwarding state and vice versa. That is, as a result of new BPDU information, a previously blocked port may learn that it is now the root port or the designated port for a given LAN. Rather than transition directly from the blocked state to the forwarding state, ports transition through two intermediate states: a listening state and a learning state. In the listening state, a port waits for information indicating that it should return to the blocked state. If, by the end of a preset time, no such information is received, the port transitions to the learning state. In the learning state, a port still blocks the receiving and forwarding of frames, but received frames are examined and the corresponding location information is stored, as described above. At the end of a second preset time, the port transitions from the learning state to the forwarding state, thereby allowing frames to be forwarded and received at the port. The time spent in each of the listening and the learning states is referred to as the forwarding delay.
- As ports transition between the blocked and forwarding states, entities may appear to move from one port to another. To prevent switches from distributing messages based upon incorrect information, switches quickly age-out and discard the “old” information in their filtering databases. More specifically, upon detection of a change in the spanning tree, switches transmit Topology Change Notification Protocol Data Unit (TCN-PDU) frames toward the root. The format of the TCN-PDU frame is well known (see IEEE 802.1D standard) and, thus, will not be described herein. The TCN-PDU is propagated hop-by-hop until it reaches the root which confirms receipt of the TCN-PDU by setting a topology change flag in all BPDUs subsequently transmitted by the root for a period of time. Other switches, receiving these BPDUs, note that the topology change flag has been set, thereby alerting them to the change in the active topology. In response, switches significantly lower the aging time associated with their filtering databases which, as described above, contain destination information corresponding to the entities within the network. Specifically, switches replace the default aging time of five minutes with the forwarding delay time, which is generally fifteen seconds according to the IEEE standards. Information contained in the filtering databases is thus quickly discarded.
- Although the spanning tree algorithm is able to maintain a loop-free tree despite network changes, recalculation of the spanning tree is a time consuming process. For example, as described above, the maximum age of BPDUs (i.e., the length of time that BPDU information is kept) is typically twenty seconds and the forwarding delay time (i.e., the length of time that ports are to remain in each of the listening and learning states) is fifteen seconds. As a result, recalculation of the spanning tree following a network change takes approximately fifty seconds (e.g., twenty seconds for BPDU information to time out, fifteen seconds in the listening state and another fifteen seconds in the learning state).
- During this recalculation period, message delivery is often delayed as ports transition between states. That is, ports in the listening and learning states do not forward or receive messages. To the network users, these delays are perceived as service interruptions, which may present significant problems, especially on high-reliable networks. In addition, certain applications, protocols or processes may time-out and shut down during the reconfiguration process, resulting in even greater disruption to the system. Another disadvantage relates to subsequent message distribution. Following the reconfiguration process, messages are flooded across the network until the “new” destination ports are learned and the aging time returned to five minutes. Such flooding of messages often consumes substantial communications and processor resources.
- It is an object of the present invention to provide a method and apparatus for reducing the time necessary to reconfigure the network following a change, such as a link failure or recovery.
- It is a further object of the present invention to provide a method and apparatus for defining a series of back-up ports which may immediately begin forwarding data messages following a failure at an active port.
- It is another object of the present invention to provide a method and apparatus for defining primary and back-up root devices such that the back-up becomes the new root upon failure of the primary.
- Another object of the present invention is to provide a method and apparatus for balancing message traffic across several links of a computer network.
- Yet another object of the present invention is to provide a method and apparatus that is compatible with non-enabled devices.
- Briefly, the invention relates to a method and apparatus for rapidly reconfiguring a computer network. The network preferably includes a plurality of devices executing the spanning tree algorithm so as to elect a root and place the ports of the devices in either a forwarding or blocked state. In accordance with the method, one or more devices are configured and arranged so that one trunk port is in the forwarding state and other trunk ports are in the blocked state. Additionally, one or more of the blocked ports are designated as back-up ports. Upon detection of a failure at the active forwarding port, the state of one of the back-up ports immediately transitions from blocked to forwarding, thereby becoming the new active port for the device. Advantageously, the selected back-up port does not transition through any intermediary states (such as the listening or learning states) in moving from blocked to forwarding. Accordingly, the time required to transition to a new active port capable of forwarding data messages is substantially reduced.
- Upon transition to the new forwarding port, the device begins transmitting “dummy” multicast messages through the new port. These dummy multicast messages carry the source address of each entity that is directly coupled to the device with the new active port or downstream thereof (relative to the root) and are received by other devices in the computer network. Upon receipt, the other devices examine the contents of these messages and note the port on which they were received, which may differ from the port on which messages from these entities were previously received (i.e., before the failure and subsequent replacement of the device's active port). It is through this process that other devices within the network learn to utilize the new forwarding port, rather than the failed port, when directing messages to these entities. Notably, the transition to a new forwarding port is accomplished without other devices having to discard the contents of their filtering databases and, thus, the flooding of messages following a network change is substantially reduced.
- In the illustrated embodiment, the method and apparatus manifests, in part, as a series of novel commands that may be entered at the devices. The devices, moreover, may be classified as either access switches or backbone switches. Access switches are preferably coupled to entities (e.g., LANs, end stations, etc.) whereas backbone switches provide the interconnections between access switches. A first command, Become_Root_Primary, is preferably entered at a first backbone switch and significantly lowers the value of the first backbone switch's numeric ID, thereby forcing it to become the root upon execution of the spanning tree algorithm. This command also modifies certain parameters associated with the spanning tree algorithm to further reduce reconfiguration time. A second command, Become_Root_Secondary, preferably entered at a second backbone switch, adjusts the second backbone switch's ID to a value between a default value and the value specified in the Become_Root_Primary command. The Become_Root_Secondary command thus causes the second backbone switch to become the new root upon a failure of the first backbone switch.
- A third command, Enable_Uplinkfast, is preferably entered at each access switch. This command substantially increases the values of access switches' IDs, effectively precluding any access switch from becoming the root. This command also increases the path costs associated with each port of the access switches. By raising the path costs, access switches are less likely to become designated switches. As a result, only one trunk port (i.e., the root port) for each access switch is generally placed in the forwarding state. The remaining trunk ports which normally connect the access switch to the corresponding backbone switches are blocked.
- The Enable_Uplinkfast command also designates the blocked trunk ports of the corresponding access switch, except self-looping ports, as possible back-up root ports. Upon failure of the current root port, this command additionally configures the access switch to immediately transition one of its blocked trunk ports to the forwarding state and to also begin transmitting dummy multicast messages through the new port, as mentioned above. Upon detection of a new or repaired link or device representing a better path toward the root, this command additionally configures the access switch to transition to the new path without suffering a loss of connectivity. Reconfiguration of the network may thus be accomplished substantially sooner than the time required by the conventional spanning tree algorithm while still avoiding the formation of loops.
- The above and further advantages of the invention may be better understood by referring to the following description in conjunction with the accompanying drawings, in which:
- FIG. 1 is a highly schematic diagram of a computer network in accordance with the present invention;
- FIG. 2 is a partial block diagram of a device in accordance with a preferred embodiment of the present invention;
- FIGS.3A-E are flow diagrams of methods used to rapidly reconfigure the computer network; and
- FIG. 4 is a block diagram of a dummy multicast message in accordance with a preferred embodiment of the present invention.
- FIG. 1 illustrates a partially meshed
computer network 100 in accordance with the present invention. Thenetwork 100 preferably comprises a plurality of local area networks (LANs) 102-109 each of which is coupled to one or more access switches 114-116. Access switches 114-116 are interconnected with each other through a plurality of backbone switches 120-125. Specifically, access switches 114-116 are generally connected to the backbone switches 120-125 through a series oflinks 128, such as point-to-point links, although they may be connected via a shared media (e.g., LAN 109). The backbone switches 120-125 are similarly interconnected bylinks 128. Each access switch 114-116 and backbone switch 120-125, moreover, includes a plurality of ports which, if coupled to a LAN 102-109, are referred to aslocal ports 118 and if coupled tolinks 128 are referred to astrunk ports 119. -
Network 100 further includes a plurality of servers 112 a-112 c, such as file servers, print servers, etc., each coupled to thelocal port 118 of one or more access or backbone switches. Each LAN 102-109 includes one or more hosts or end stations (not shown) that may source or sink data frames to one another or to the servers 112 a-112 c over thenetwork 100. One ormore routers 130 and 131 may also be provided to add functionality to network 100. Preferably, eachrouter 130, 131 is coupled to a backbone switch, such as backbone switches 120 and 121, by acorresponding link 128. -
Links 128 represent communications paths between various components of thenetwork 100, that carry messages, such as data frames, between switches 114-116, 120-125 androuters 130, 131. In addition, each switch and router, such asaccess switch 114, identifies its local andtrunk ports routers 130, 131 are thus able to associate specific ports with the LANs, switches, routers, servers, etc. that are coupled thereto or otherwise accessible through a given port. - It should be understood that the
network 100 of FIG. 1 is meant for illustrative purposes only and that the present invention will operate with other network designs having possibly far more complex topologies. For example, one or more distribution switches may be interleaved between the backbone switches and the access switches, two access switches may be directly connected, etc. It will also be understood to those skilled in the art that there is no distinction from the spanning tree point of view between local and trunk ports or point-to-point links and shared links (e.g., LANs). The distinction between local and trunk ports is made for purposes of explanation only. - As shown,
network 100 includes redundant communication paths interconnecting the access and backbone switches 114-116 and 120-125. The existence of such redundant links prevents portions of thenetwork 100 from becoming isolated should any constituent link or device fail. Such redundancy, however, also results in the creation of loops, which, as described above, are highly undesirable. To avoid the creation of loops, these switches execute the spanning tree algorithm, as described herein. - FIG. 2 is a partial block diagram of a
switch 214 in accordance with the present invention which corresponds to accessswitch 114 of FIG. 1. A switch suitable for use with the present invention is described in commonly owned U.S. patent application Ser. No. 08/623,142 filed Mar. 28, 1996 and entitled INTERSWITCH LINK MECHANISM FOR CONNECTING HIGH-PERFORMANCE NETWORK SWITCHES which is hereby incorporated by reference in its entirety.Switch 214 includes a plurality ofports 230 each of which is preferably identified by a number (e.g., port numbers one through eight). Frame transmission and reception objects (not shown) may be associated with eachport 230 such that frames received at a givenport 230 may be captured, and frames to be transmitted byswitch 214 may be delivered to a given port. Frame reception and transmission objects are preferably message storage structures, such as queues. -
Switch 214 further includes aprotocol entity 232. Theprotocol entity 232 preferably includes arapid reconfiguration entity 234, at least one spanning treestate machine engine 236 and aforwarding entity 238. Therapid reconfiguration entity 234 is coupled to areconfiguration memory 240.Memory 240 includes a plurality ofcells 240 a-240 e for storing the unique numeric switch identifier (ID) corresponding to switch 214, the assigned path cost corresponding to eachport 230 and the values corresponding to the hello time, maximum age and forward delay parameters of the spanning tree algorithm. As set forth above, a switch ID includes a fixed portion and a settable portion. - Each spanning
tree engine 236 is similarly coupled to a spanning tree table 242 having a plurality of rows and columns. Each row orentry 243 of table 242 is preferably associated with aport 230 of theswitch 214. The columns or cells, moreover, include aroot ID cell 242 a, a root path cost cell 242 b and a corresponding timer cell 242 c. It should be understood that table 242 may include additional cells. - The
forwarding entity 238 is coupled to afiltering database 244 configured to store address information corresponding to the entities ofnetwork 100. Specifically,filtering database 244 has a plurality of columns or cells, including a destination address cell, a destination port cell and a corresponding timer cell. Each row or entry in thefiltering database 244 preferably corresponds to a particular entity. - It will be understood to those skilled in the art that
memory 240 and tables 242 and 244 may be implemented as content addressable memory (CAM) devices and thatentities state machine engine 236 may comprise registers and combinational logic configured and arranged to produce sequential logic circuits. In the illustrated embodiment,entities state machine engine 236 preferably comprise programmable processing elements containing software programs pertaining to the methods described herein and executable by the processing elements. Other computer readable media may also be used to store and execute the program instructions. - The method and apparatus of the present invention is preferably implemented, in part, through the operation of a plurality of novel commands entered at the various switches of the network100 (FIG. 1), typically by a user or network administrator.
- FIG. 3A is a flow diagram of a
Become_Root_Primary command 300 that is preferably entered at a first backbone switch (e.g., backbone switch 120). Selection of the particular backbone switch as the primary root may depend on where the most utilized server, such as server 112 b, is located. That is, to reduce the average distance that messages must travel, theBecome_Root_Primary command 300 is preferably entered at the backbone switch coupled to the most heavily utilized server, as shown atblock 310. In response to theBecome_Root_Primary command 300, therapid reconfiguration entity 234 of the selectedbackbone switch 120, atblock 312, modifies the settable portion of the corresponding switch ID stored atreconfiguration memory 240. In particular, the value of the switch ID is significantly lowered to ensure that the selectedbackbone switch 120 will be elected the root switch upon execution of the spanning tree algorithm. For example, the switch ID may be reduced from the default value of “32768” specified by the IEEE standards to “8192”. In addition, the Become_Root_Primary command, atblock 314, also modifies the hello time, maximum age and forward delay parameters of the spanning tree algorithm as a function of network diameter as set forth in Table 1. Network diameter is defined by the IEEE 802.1D standard as the maximum number of devices between any two points of attachment of end stations and is an argument of theBecome_Root_Primary command 300.TABLE 1 Network Diameter 2 3 4 5 6 7 hello time 1.0 1.0 1.0 1.0 1.0 1.0 maximum age 6.0 7.0 8.5 10.0 11.5 13.0 forward delay 4.0 4.8 5.8 6.8 7.8 8.8 - These values are then stored at
memory 240 byreconfiguration entity 234. To implement theBecome_Root_Primary command 300,entity 234 may maintain the information of Table 1 in memory, such asmemory 240. - In case the
first backbone switch 120 should ever fail, a second command is preferably entered to establish a back-up root. Referring to the flow diagram of FIG. 3B, aBecome_Root_Secondary command 320 is preferably entered at a second backbone switch (e.g., backbone switch 121), as shown atblock 322. TheBecome_Root_Secondary command 320 similarly modifies the settable portion of the switch ID of thesecond backbone switch 121 that is stored at therespective reconfiguration memory 240, as shown byblock 324. Specifically, the value of the switch ID is modified so as to be between the default IEEE 802.1D value (i.e., “32768”) and the value specified by the Become_Root_Primary command 300 (i.e., “8192”). For example, the switch ID may be set to “16384”. TheBecome_Root_Secondary command 320 also utilizes network diameter as an argument and modifies the hello time, maximum age and forward delay parameters stored at therespective memory 240 ofswitch 121 in accordance with Table 1, as reflected byblock 326. - It should be understood that other similar commands may be entered to designate third and fourth in line root switches.
- Turning next to FIG. 3C, an
Enable_Uplinkfast command 330 is preferably entered at each access switch 114-116 within thenetwork 100, as shown atblock 332. Thiscommand 330, atblock 334, preferably increases the respective switch ID of each of the access switches 114-116 to preclude any of the access switches 114-116 from becoming the root. Specifically, theEnable_Uplinkfast command 330 preferably increases the settable portion of the switch ID stored atrespective memory 240 from the IEEE default value of “32768” to “49152”. Atblock 336, theEnable_Uplinkfast command 330 also significantly increases the path costs of all the ports of the respective access switch. For example, the path costs stored atmemory 240 for each port are preferably increased from the IEEE default value of “10” (for 100 Mbps ports) to “3000”. TheEnable_Uplinkfast command 330, atblock 338, also configuresrapid reconfiguration entity 234 to rapidly transition a blocked port to the forwarding state and to generate and transmit dummy multicast messages, as described below. - Upon start-up, the
ports 230 of each switch, such asswitch 214, are initially placed in the blocked state and spanningtree engine 236 begins formulating and transmitting bridge protocol data unit (BPDU) frames from eachport 230. Presumably,switch 214 has yet to receive any BPDUs; switch 214 thus assumes that it is the root and transmits BPDUs from everyport 230 containing its switch ID as the root ID and a root path cost of zero. Spanningtree engine 236 obtains the switch ID and a maximum age value for loading in BPDUs fromentity 234 and copies the information contained in transmitted BPDUs into its associated spanning tree table 242. - As BPDUs are received at the
ports 230 ofswitch 214, they are passed to the spanningtree engine 236 and processed. Specifically,engine 236 compares information contained in the received BPDUs with the information stored in table 242. If the information from the received BPDU is better (e.g., a presumed root with a lower ID) than the stored information,engine 236 enters the received information into table 242.Engine 236 also sets the corresponding timer according to the maximum age value in the received BPDU and stops forwarding BPDUs through thisport 230. Execution of the spanning tree algorithm will converge with the election of a single root by all of the switches in thenetwork 100. - As discussed above, location of the root may affect the average distance (i.e., the average number of hops) a message travels and/or cause undesirable partitioning of backbone switches. The conventional spanning tree algorithm, however, simply selects the switch having the lowest ID to become the root, regardless of where in the
network 100 this switch is located. As a result, an access switch is often elected to be the root, causing messages to travel a much higher average distance than if a backbone switch had been elected the root for many network configurations, such as partially meshed distributed networks. - Since the numeric switch ID of the
first backbone switch 120 is lowered to a value below that of all other switches in the network 100 (through the Become_Root_Primary command 300),first backbone switch 120 is elected the root switch. Thus, all ports of thefirst backbone switch 120 are placed in the forwarding state. In addition, since the maximum age and forwarding delay parameters are copied by each switch from BPDUs originating from the root through operation of the spanning tree algorithm, the values selected from the Become_Root_Primary command 300 (see Table 1) are effectively propagated to all switches 114-116 and 121-125 within network 100 (FIG. 1). - For all LANs coupled to both an access switch and a backbone switch, operation of the above commands300, 320, 330 also results in the respective backbone switch becoming the designated switch, rather than the access switch. In particular, by significantly increasing the path costs (e.g., from “10”, to “3000”) for all ports of the access switches 114-116, the
Enable_Uplinkfast command 330 essentially prevents access switches from becoming designated switches on shared media or trunk links when the second switch is a backbone switch. With reference toLAN 109 which is coupled to bothaccess switch 116 andbackbone switch 125, for example, only one switch port connected toLAN 109 will be deemed the designated switch port by the spanning tree algorithm. Determination of the designated switch, moreover, depends in part on the path costs at the relevant ports of the two switches coupled toLAN 109. Since the path costs ataccess switch 116 have been increased to “3000”, whereas the path costs atbackbone switch 125 remain at the default value of “100” for ports operating at a data rate of 10 Mb/s or “10” for ports operating at 100 Mb/s, the port atbackbone switch 125 coupled toLAN 109 will be deemed the designated switch port and placed in the forwarding state. Furthermore, unless the port ataccess switch 116 coupled toLAN 109 represents the root port forswitch 116, it will be placed in the blocked state. - Significantly, for each access switch114-116, only one port (local or trunk) that represents a path from the access switch to the root (i.e., provides connectivity to the root through links, shared media, switches, etc.) will be forwarding. All other ports (local or trunk) that represent paths from the access switch to the root will be blocked. In other words, only one port at each access switch 114-116 that provides connectivity to the root will be forwarding.
- As messages (i.e., data frames) are subsequently received at the
ports 230, they are passed to forwardingentity 238, assuming therespective port 230 is in the forwarding state. Theforwarding entity 238 first examines the destination address of the message and performs a look up function at thefiltering database 244. Assuming an entry is found and a corresponding destination port (e.g., port number four) is identified, the message is switched out onto this port, assuming this port is in the forwarding state. If no entry is found in thefiltering database 244, the message is flooded out allports 230 in the forwarding state, except theport 230 on which the message was received. Theforwarding entity 238 next examines the source address of the message and performs another look-up atfiltering database 244. If no entry is found for the source address, a new entry is formed and the source port (e.g., port number eight) on which the message was received is entered as the destination port in the corresponding port column. In addition, a timer associated with this entry is set to the aging time with which forwardingentity 238 is configured (e.g., five minutes). - Should a change occur in the
network 100, such as a failure disabling the link coupled to a root port of an access switch, the affected access switch will be able to rapidly reconfigure thenetwork 100 without the significant interruption or message flooding experienced through conventional operation of the spanning tree algorithm. With reference to switch 114, for example, assume that port number three, which is coupled to backbone switch 122, is the root port forswitch 114 and thus in the forwarding state. Pursuant to theEnable_Uplinkfast command 330, port numbers two and four, which also connectswitch 114 to the backbone switches (i.e., backbone switches 122 and 124), are in the blocked state. If thelink 128 coupled to the port number three atswitch 114 fails, either one of these two other ports (i.e., port numbers two or four) will immediately transition to the forwarding state and begin receiving and sending messages. - First, the time taken to detect such a change is substantially reduced by operation of the novel commands of the present invention. In particular, as shown in FIG. 3A and as provided in Table 1, the
Become_Root_Primary command 300 atblock 314 causes the maximum age value to be significantly lowered from the default value of twenty seconds. For example, if the network diameter is five, the maximum age is reduced to ten seconds. As described above, this value is loaded into BPDUs originating at the root (i.e., backbone switch 120), causing it to be propagated to and stored by each switch at itsrespective reconfiguration memory 240. Accordingly, access switches 114-116 and backbone switches 120-125 detect failures much sooner since the corresponding BPDU information times out sooner. To prevent BPDU information from being inadvertently discarded due to the reduction in maximum age values, the hello time is also reduced to one second. This increases the frequency with which the root transmits BPDUs. - Rather than wait for the corresponding BPDU information to time out, a link failure may alternatively be detected by a link integrity test which operates at the physical layer of the protocol stack. The link integrity test typically exchanges test messages across the
respective link 128 at a relatively high rate (e.g., every ten milliseconds). Thus, the link integrity test is able to detect a failure much sooner than the spanning tree algorithm, which simply waits for the respective BPDU information to time out and be discarded. - FIG. 3D is a flow diagram of a
rapid reconfiguration process 340 following a link failure according to the present invention. In response to the detection of a failure at port number three (the root port), indicated at block 342,rapid reconfiguration entity 234 atswitch 214 selects a backup port to become the new root port, as shown atbox 344.Rapid reconfiguration entity 234 may use the spanning tree algorithm to select the next root port. That is, the blocked trunk port 119 (e.g., port number four) representing the next lowest root path cost (after the now failed root port) may be selected as the new forwarding port byentity 234. Self-looping ports, such as port numbers five and six atswitch 114 are not considered possible back-up ports, even though at least one of these ports will be in the blocked state, since these ports will not provide connectivity to the root. - It should be understood that other methods may be used to select the new root port. For example, the blocked trunk port having the lowest port number (e.g., port number two) may be selected.
-
Rapid reconfiguration entity 234, atblock 346, then directs the spanning treestate machine engine 236 to immediately transition the selected back-up port (e.g., port number four) to the forwarding state. That is, the spanningtree engine 236 does not transition the selected back-up port between the listening or learning states. Instead, the selected back-up port transitions directly to the forwarding state under the direction ofrapid reconfiguration entity 234, and switch 114 immediately begins transmitting and receiving messages through this newly activated trunk port 119 (e.g., port number four). - Since none of the
other trunk ports 119 which connectswitch 114 to, the backbone switches (i.e. to the root) are in the forwarding state no circuitous path or loop will result from the transition directly to the forwarding state. That is, by preventing access switches 114-116 from becoming the root and configuring the access switches 114-116 to block all but one of theirports Ports - Nonetheless, the transition at
access switch 114 from initial root port number three to back-up root port number four may cause entities to appear to “move” relative to other devices. Thus, the identity of the new root port (e.g., port number four) must be propagated to the other devices, such as access switches 115-116 and backbone switches 120-125 to prevent messages from being lost or misdirected.Switch 114, viarapid reconfiguration entity 234, preferably informs the other devices of its new forwarding port by transmitting dummy multicast packets through the new port, as indicated atblock 348. FIG. 4 is a highly schematic illustration of adummy multicast message 400 preferably utilized byrapid reconfiguration entity 234.Dummy multicast message 400 includes a destination address (DA) field 410 and a source address (SA)field 412 that may be compatible with the Media Access Control (MAC) layer of the protocol stack. In the preferred embodiment,dummy multicast message 400 complies with the IEEE 802.3 standard and includes conventional logical link control (LLC) and SubNetwork Access Protocol (SNAP) encapsulation, which are well known to those skilled in the art.Rapid reconfiguration entity 234 preferably loads DA field 410 with a multicast address that causesmessage 400 to be received by all devices (e.g., access switches 114-116 and backbone switches 120-125) within thenetwork 100. - Next, rapid reconfiguration entity234 (FIG. 2) loads
SA field 412 with the address of an entity directly coupled to switch 114. For example, in afirst multicast message 400,entity 234 loads the address ofserver 112 a into thesource address field 412. Althoughmulticast message 400 may further include adata field 414, its contents are preferably not asserted byentity 234.Multicast message 400, having the address ofserver 112 a loaded inSA field 412, is then forwarded through the new root port (i.e., port number four) ofswitch 114.Multicast message 400 is first received atbackbone switch 124 which examines its contents. In particular,backbone switch 124 notes that the message is fromserver 112 a, but that it was received on a different source port thanswitch 124 previously associated withserver 112 a. That is, prior to the failure at port number three ataccess switch 114,backbone switch 124 likely associated all entities directly coupled to switch 114 (includingserver 112 a) with its port coupled tobackbone switch 121, which, in turn, accessed such entities via backbone switches 120 and 122. - Since the
multicast message 400 having the source address ofserver 112 a was received bybackbone switch 124 at a new source port, this new location information is entered bybackbone switch 124 into its filtering database, replacing the previous information that was stored therein. Thereafter, ifbackbone switch 124 receives a message intended forserver 112 a, it will use this new destination port and the message will be received at port number four ofswitch 114, which is now capable of receiving and forwarding messages. Accordingly, thedummy multicast message 400 effectively apprisesbackbone switch 124 of the change in forwarding ports that occurred ataccess switch 114.Backbone switch 124 distributes themulticast message 400 through all of its forwarding ports so that other devices, as necessary, may learn of the new forwarding port (i.e., port number four) ataccess switch 114. -
Rapid reconfiguration entity 234 similarly generates one or moreseparate multicast messages 400 for each remaining entity directly coupled to access switch 114 (i.e., entities or end stations on LANs 102-104). In eachmessage 400,entity 234loads SA field 414 with the address of the corresponding entity. Each of these messages are similarly forwarded byaccess switch 114 through the new forwarding port (i.e., port number four). In addition,entity 234 generates and transmits one or moremulticast messages 400 for entities reachable throughswitch 114 on ports other than its root port. For example, if port number seven atswitch 114 were coupled to another access switch,entity 234 would transmitmulticast messages 400 carrying the source address of entities directly coupled to this additional access switch as well. Thus, at least onemulticast message 400 is generated and transmitted for each entity directly coupled to or downstream of access switch 114 (relative to the root). As set forth above, upon receipt of thesemulticast messages 400, the other devices withinnetwork 100 update their corresponding filtering databases with the new destination ports, as necessary. - In the preferred embodiment,
entity 234 is configured to limit the rate at which dummy multicastmessages 400 are transmitted to fifteen messages per one hundred milliseconds or less. This limit on message throughput prevents any access switch from consuming a significant portion of the communications resources of thenetwork 100 with the transmission ofdummy multicast messages 400. - The present invention also provides for rapid reconfiguration when a new link (or switch), representing a better path the root for a given switch, is added or recovered. In particular, FIG. 3E is a flow diagram of a
rapid configuration process 350 corresponding to a link recovery or addition in accordance with the present invention. For example, assume that backbone switch 121 (FIG. 1) is the root and that port number three ataccess switch 114 is the root port, since thelink 128 coupled to port number four (which represents a better path cost to root 121) is failed. If thelink 128 coupled to port number four is subsequently recovered,switch 114 will detect the change, as indicated at box 352, through the receipt of BPDUs on this port. The recovery oflink 128 may also be detected by the link integrity test, as described above. - As shown at block354,
rapid reconfiguration entity 234 monitors the receipt of messages (e.g., BPDUs) at port number four for a period of time (e.g., thirty seconds) to ensure that the corresponding port at the upstream switch (e.g., backbone switch 124) has transitioned to the forwarding state. In particular, sincebackbone switch 124 still transitions its ports between the listening and learning intermediary states,entity 234 atswitch 114 preferably waits a period equal to twice the forwarding delay before starting the transition process. Ifentity 234 were to immediately transition to a new port, a loss of connectivity might result as the corresponding upstream port may not be forwarding. While port number four is being monitored, moreover, port number three remains in the forwarding state and messages may continue to be forwarded and received during this time. Next, after allowing all messages queued on the current root port (i.e., port number three) to be sent,rapid reconfiguration entity 234 transitions the current root port to the blocked state, as indicated atblock 356. At or about the same instant,rapid reconfiguration entity 234, at box 358, directs the spanning treestate machine engine 236 to transition the recovered port (i.e., port number four) directly from the blocked state to the forwarding state without transition through the listening or learning intermediary states. Following this transition, switch 114 may immediately begin transmitting and receiving frames, including data messages, from this recovered port. - Next,
rapid configuration entity 234 informs the network 100 (FIG. 1) of the new forwarding port, as reflected byblock 360. In particular, as described above,entity 234 generates and transmitsdummy multicast messages 400 for all entities directly coupled to switch 114 or downstream thereof (relative to the root) through the new forwarding port (i.e., port number four). The transition to a recovered port, which represents a better path to the root, is thus accomplished without the loss of connectivity that otherwise occurs under operation of the conventional spanning tree algorithm. Additionally, the disadvantages caused by the flooding of messages is also avoided. - Since the
Enable_Uplinkfast command 330 is preferably not entered at the backbone switches 120-125, these switches do not designate blocked ports as potential back-up ports that may be immediately transitioned to the forwarding state. Nonetheless, through the Become_Root_Primary and Become_Root_Secondary commands 300, 320, the time required to reconfigure the network following a change at a backbone switch is also reduced. First, as described above, these twocommands network 100, thereby reducing the time it takes to detect a change. Additionally, the forward delay time is lowered as reflected in Table 1. By reducing the time spent in the listening and learning states, the speed at whichnetwork 100 is reconfigured following a change is substantially improved. - It should be understood that
switch 114, in addition to generating and transmittingdummy multicast messages 400 following the detection of a change, may also transmit TCN-PDUs toward the root. As described above, by transmitting TCN-PDUs,switch 114 will cause devices, such as switches 114-116 and 120-125, to shorten the age out time associated with theirfiltering databases 244. By quickly discarding the contents of theirfiltering databases 244, the possibility of data messages being misdirected or lost is significantly reduced. Furthermore, the transmission ofdummy multicast messages 400, as described above, quickly informs devices of newly activated ports, thereby reducing the flooding that otherwise occurs when the contents of filteringdatabases 244 are discarded. - The above commands300, 320, 330 also reduce the disruptions that may occur upon failure of the root. A failure at the root (e.g., backbone switch 120) will suspend the transmission of BPDUs within the
network 100. The BPDU information stored at the remaining devices, such as access switches 114-116 and backbone switches 121-123, will then time out, based on the particular maximum age value obtained from Table 1. In response, these devices will begin recalculating the spanning tree for thenetwork 100. Since theBecome_Root_Secondary 320 command was entered atbackbone switch 121, its corresponding numeric identifier was significantly lowered, causingbackbone switch 121 to become the new root. TheBecome_Root_Secondary command 320 thus ensures that, upon a failure of the primary root (i.e., backbone switch 120), the next switch elected to be the root will also be a backbone switch. By carefully selecting thesecond backbone switch 121, the average distance traveled by messages within thenetwork 100 may be optimized and partitioning of backbone switches avoided. BPDUs originating from the new root (e.g., backbone switch 121), moreover, will contain the improved parameters set forth in Table 1, by virtue of theBecome_Root_Secondary command 320. Thus, switches 114-116 and 120-125 will be able to rapidly reconfigure thenetwork 100 in the face of changes following the election of the new root (e.g., the backbone switch 121). - Virtual Local Area Networks
- A computer network, such as network100 (FIG. 1), may also be segregated into a series of network groups. For example, U.S. Pat. No. 5,394,402, issued on Feb. 28, 1995 to Floyd E. Ross (the “'402 patent”), which is hereby incorporated by referenced in its entirety, discloses an arrangement that is capable of associating any port of a switch with any particular segregated network group. Specifically, according to the '402 patent, any number of physical ports of a particular switch may be associated with any number of groups within the switch by using a virtual local area network (VLAN) arrangement that virtually associates the port with a particular VLAN designation. More specifically, Ross discloses a switch or hub for a segmented virtual local area network with shared media access that associates VLAN designations with at least one local port and further associates those VLAN designations with messages transmitted from any of the ports to which the VLAN designation has been assigned.
- The VLAN designation for each local port is stored in a memory portion of the switch such that every time a message is received by the switch on a local port the VLAN designation of that port is associated with the message. Association is accomplished by a flow processing element which looks up the VLAN designation in a memory based on the local port where the message originated. In addition to the '402 patent, an IEEE standards committee is preparing a standard for Virtual Bridged Local Area Networks. See IEEE Standard 802.1Q (draft).
- In many cases, it may be desirable to interconnect a plurality of these switches in order to extend the VLAN associations of ports in the network. Ross, in fact, states that an objective of his VLAN arrangement is to allow all ports and entities of the network having the same VLAN designation to interchange messages by associating a VLAN designation with each message. Thus, those entities having the same VLAN designation function as if they are all part of the same LAN. Message exchanges between parts of the network having different VLAN designations are specifically prevented in order to preserve the boundaries of each VLAN segment. For convenience, each VLAN designation is often associated with a different color, such as red, blue, green, etc.
- A separate spanning tree or active topology may be defined for each VLAN designation defined within the network. See Cisco IOS VLAN Services document. That is, a first spanning tree may be associated with the red VLAN designation and a second spanning tree associated with the blue VLAN designation. Thus, a given port may be in the forwarding state for a first VLAN designation (e.g., red), but blocked for second VLAN designation (e.g., blue).
- In a preferred embodiment, the Become_Root_Primary and Become_Root_Secondary commands300, 320 are associated with one or more VLAN designations. That is, for the red VLAN designation, the
Become_Root_Primary command 300 may be entered atbackbone switch 120, whereas, for the blue VLAN designation, it may be entered atbackbone switch 121. Thus, the root for the spanning tree associated with the red VLAN designation will be atbackbone switch 120 and the root for the blue VLAN designation will be atbackbone switch 121. By establishing a different root for the various VLAN designations, improved load balancing may be achieved on the network. For example, if the red and blue VLAN designations each generate high message traffic, then, by designating different roots for these VLAN designations, the paths or links followed by messages with the red VLAN designation will be different than the paths or links followed by messages with the blue VLAN designation. Other low-traffic generating VLANs (e.g., yellow and green) may be divided between the two high traffic VLANs. That is, the red and yellow VLAN designations may sharebackbone switch 120 as their root, while the blue and green VLAN designations may sharebackbone switch 121 as their root. This provides an even greater measure of load balancing within thenetwork 100. - In particular, the Become_Root_Primary and Become_Root_Secondary commands330, 320 may include a VLAN list as a second argument in addition to the network diameter. For example, at
first backbone switch 120, theBecome_Root_Primary command 300 may be entered with a network diameter of four and a VLAN list identifying the red, yellow, orange and violet VLAN designations as its arguments. Atsecond backbone switch 121, theBecome_Root_Primary command 300 may be entered with a network diameter of four and a VLAN list containing the blue, green and magenta VLAN designations as its arguments. In response,switch 120 will become the root for the red, yellow, orange and violet VLAN designations, whileswitch 121 will become the root for the blue, green and magenta VLAN designations. - Further load balancing may be achieved by having access switches select root ports on a per-VLAN basis. This may be accomplished by modifying the path costs for each trunk port of the access switches on a per-VLAN basis. In particular, the Enable_Uplinkfast command may be modified to adjust the path costs for each trunk port at the respective switch on a per-VLAN basis by adding a port number, VLAN designation and respective path cost string as an argument to the Enable_Uplinkfast command. For example, the
Enable_Uplinkfast command 330 may be entered ataccess switch 114 with the following argument string: port number two, red, 3100; port number two, blue, 3200; port number three, red, 3200; port number three, blue, 3100; port number four, red, 3300; port number four, blue, 3300. Since port number two has the lowest path cost for the red VLAN designation, this port will generally become the root port for the red VLAN. For the blue VLAN designation, port number three has the lowest path cost and thus will become the root port for the blue VLAN. Accordingly, all messages associated with the red VLAN designation will be forwarded and received at port number two and all messages associated with the blue VLAN designation will be forwarded and received at port number three. By dividing the message streams amongdifferent trunk ports 119, improved load balancing may be achieved. - Referring again to FIG. 4, in formulating dummy multicast messages following the detection of a change, access switches114-116 may append a
VLAN tag 416 tomessage 400. TheVLAN tag 416 is preferably loaded with the VLAN designation corresponding to the entity whose address is loaded intoSA field 412. AlthoughVLAN tag 416 may be appended to themessage 400, as shown, it is preferably inserted after thesource address field 412. It will be understood to those skilled in the art that tag 416 may be inserted at other locations. - As switches typically support the creation of up to “1024” different VLAN designations, substantial memory may be needed to store a different path cost for each VLAN per port. In the preferred embodiment, path costs are permitted to take only one of two possible values, one of which is a default value. Accordingly, a “128” byte vector can be utilized per trunk port to represent the path costs for each VLAN designation. That is, each bit of the vector represents one VLAN designation. By parsing each bit,
rapid reconfiguration entity 234 can determine the path cost for each VLAN designation. More specifically, if the bit is asserted, then the path cost for the corresponding VLAN designation will be set to the new value (e.g., “3100”). If a bit is not asserted, then the path cost for the corresponding VLAN designation will remain at the default value (e.g., “3000”). - The foregoing description has been directed to specific embodiments of this invention. It will be apparent, however, that other variations and modifications may be made to the described embodiments, with the attainment of some or all of their advantages. Therefore, it is the object of the appended claims to cover all such variations and modifications as come within the true spirit and scope of the invention.
Claims (2)
1. A method for rapidly re-configuring a computer network having a plurality of access devices and backbone devices each having a unique numeric identifier with a settable portion, each access device including a plurality of ports for coupling the respective access device to at least one of the access and backbone devices and each port having an associated path cost, the method comprising the steps of:
decreasing a settable portion of the numeric identifier at a first backbone device below a first default value;
for at least one access device, increasing a settable portion of the respective numeric identifier above the first default value and all path costs of the respective ports above a second default value;
executing a spanning tree algorithm (i) to elect the first backbone device as a root in response to the step of decreasing and (ii) to place a single port at the at least one access device, providing upstream connectivity to the root, in a forwarding state while further placing all remaining ports of the at least one access device, providing upstream connectivity to the root, in a blocked state in response to the step of increasing, and
in response to a failure at the single forwarding port, providing upstream connectivity to the root, of the at least one access device, transitioning a blocked port, providing upstream connectivity to the root, from the blocked state directly to the forwarding state.
2. The method of claim 1 further comprising the step of designating the blocked ports of the at least one access device, providing upstream connectivity to the root, as backup ports.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/450,066 US6388995B1 (en) | 1997-12-24 | 1999-11-29 | Method and apparatus for rapidly reconfiguring computers networks executing the spanning tree algorithm |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US08/998,412 US6032194A (en) | 1997-12-24 | 1997-12-24 | Method and apparatus for rapidly reconfiguring computer networks |
US09/450,066 US6388995B1 (en) | 1997-12-24 | 1999-11-29 | Method and apparatus for rapidly reconfiguring computers networks executing the spanning tree algorithm |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US08/998,412 Continuation US6032194A (en) | 1997-12-24 | 1997-12-24 | Method and apparatus for rapidly reconfiguring computer networks |
Publications (2)
Publication Number | Publication Date |
---|---|
US20020052936A1 true US20020052936A1 (en) | 2002-05-02 |
US6388995B1 US6388995B1 (en) | 2002-05-14 |
Family
ID=25545182
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US08/998,412 Expired - Lifetime US6032194A (en) | 1997-12-24 | 1997-12-24 | Method and apparatus for rapidly reconfiguring computer networks |
US09/450,066 Expired - Lifetime US6388995B1 (en) | 1997-12-24 | 1999-11-29 | Method and apparatus for rapidly reconfiguring computers networks executing the spanning tree algorithm |
US09/450,891 Expired - Lifetime US6535491B2 (en) | 1997-12-24 | 1999-11-29 | Method and apparatus for rapidly reconfiguring computer networks using a spanning tree algorithm |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US08/998,412 Expired - Lifetime US6032194A (en) | 1997-12-24 | 1997-12-24 | Method and apparatus for rapidly reconfiguring computer networks |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/450,891 Expired - Lifetime US6535491B2 (en) | 1997-12-24 | 1999-11-29 | Method and apparatus for rapidly reconfiguring computer networks using a spanning tree algorithm |
Country Status (1)
Country | Link |
---|---|
US (3) | US6032194A (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030200341A1 (en) * | 1999-12-30 | 2003-10-23 | Nortel Networks Corporation, A Canadian Corporation | Port switch |
EP1480397A2 (en) | 2003-04-28 | 2004-11-24 | Alcatel IP Networks, Inc. | Extensions to the spanning tree protocol |
US20060007869A1 (en) * | 2004-07-09 | 2006-01-12 | Fujitsu Limited | Method for preventing control packet loop and bridge apparatus using the method |
EP1648119A1 (en) * | 2004-10-18 | 2006-04-19 | Alcatel | Allocating bridge priorities in bridged network |
EP1677469A1 (en) * | 2004-12-30 | 2006-07-05 | Alcatel | Spanning tree protocol with data burst control |
US20060212554A1 (en) * | 2005-03-18 | 2006-09-21 | Canon Kabushiki Kaisha | Control apparatus, communication control method executed by the control apparatus, communication control program controlling the control apparatus, and data processing system |
US7126923B1 (en) * | 2002-05-28 | 2006-10-24 | Extreme Networks, Inc. | Method and system for inter-domain loop protection using a hierarchy of loop resolving protocols |
CN1323515C (en) * | 2003-01-28 | 2007-06-27 | 华为技术有限公司 | Multi-node network management method based on spanning tree protocol |
US7352707B2 (en) * | 2003-05-28 | 2008-04-01 | D-Link Corporation | Processing method enabling each unit in stacking network device to run rapid spanning tree protocol |
US20100097926A1 (en) * | 2008-10-21 | 2010-04-22 | Liquid Computing Corporation | Methods and systems for providing network access redundancy |
US20130051218A1 (en) * | 2005-07-15 | 2013-02-28 | Cisco Technology, Inc. | System and method for assuring the operation of network devices in bridged networks |
US9806990B2 (en) | 2012-12-19 | 2017-10-31 | Xi'an Zhongxing New Software Co.Ltd. | Fast recovery method and device for STP-based backup port |
US10148521B2 (en) * | 2016-07-20 | 2018-12-04 | Facebook, Inc. | Capacity planning in a backbone network |
Families Citing this family (323)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6400681B1 (en) | 1996-06-20 | 2002-06-04 | Cisco Technology, Inc. | Method and system for minimizing the connection set up time in high speed packet switching networks |
US6934249B1 (en) | 1997-04-01 | 2005-08-23 | Cisco Technology, Inc. | Method and system for minimizing the connection set up time in high speed packet switching networks |
US6108695A (en) * | 1997-06-24 | 2000-08-22 | Sun Microsystems, Inc. | Method and apparatus for providing analog output and managing channels on a multiple channel digital media server |
US6393483B1 (en) * | 1997-06-30 | 2002-05-21 | Adaptec, Inc. | Method and apparatus for network interface card load balancing and port aggregation |
US6055364A (en) * | 1997-07-31 | 2000-04-25 | Cisco Technology, Inc. | Content-based filtering of multicast information |
CA2217277A1 (en) * | 1997-10-03 | 1999-04-03 | Newbridge Networks Corporation | Automatic link establishment for distributed servers in atm networks |
US7570583B2 (en) * | 1997-12-05 | 2009-08-04 | Cisco Technology, Inc. | Extending SONET/SDH automatic protection switching |
US6188694B1 (en) * | 1997-12-23 | 2001-02-13 | Cisco Technology, Inc. | Shared spanning tree protocol |
US6976088B1 (en) * | 1997-12-24 | 2005-12-13 | Cisco Technology, Inc. | Method and apparatus for rapidly reconfiguring bridged networks using a spanning tree algorithm |
US6195349B1 (en) * | 1998-01-28 | 2001-02-27 | 3Com Corporation | Scalable logical LAN |
US6195351B1 (en) * | 1998-01-28 | 2001-02-27 | 3Com Corporation | Logical switch set |
US7027406B1 (en) * | 1998-04-16 | 2006-04-11 | Avaya Communication Israel Ltd. | Distributed port-blocking method |
US6359879B1 (en) * | 1998-04-24 | 2002-03-19 | Avici Systems | Composite trunking |
US7430164B2 (en) | 1998-05-04 | 2008-09-30 | Hewlett-Packard Development Company, L.P. | Path recovery on failure in load balancing switch protocols |
US6865160B1 (en) * | 1998-05-04 | 2005-03-08 | Hewlett-Packard Development Company, L.P. | Broadcast tree determination in load balancing switch protocols |
US6370121B1 (en) * | 1998-06-29 | 2002-04-09 | Cisco Technology, Inc. | Method and system for shortcut trunking of LAN bridges |
US6515967B1 (en) * | 1998-06-30 | 2003-02-04 | Cisco Technology, Inc. | Method and apparatus for detecting a fault in a multicast routing infrastructure |
US6628661B1 (en) * | 1998-08-27 | 2003-09-30 | Intel Corporation | Spanning tree recovery in computer networks |
US6262977B1 (en) * | 1998-08-28 | 2001-07-17 | 3Com Corporation | High availability spanning tree with rapid reconfiguration |
US6304575B1 (en) * | 1998-08-31 | 2001-10-16 | Cisco Technology, Inc. | Token ring spanning tree protocol |
US6272113B1 (en) * | 1998-09-11 | 2001-08-07 | Compaq Computer Corporation | Network controller system that uses multicast heartbeat packets |
US6330229B1 (en) * | 1998-11-09 | 2001-12-11 | 3Com Corporation | Spanning tree with rapid forwarding database updates |
US6801506B1 (en) * | 1999-03-31 | 2004-10-05 | Cisco Technology, Inc. | Method and apparatus for providing fast spanning tree re-starts |
US6898189B1 (en) | 2000-08-23 | 2005-05-24 | Cisco Technology, Inc. | Restartable spanning tree for high availability network systems |
US6628624B1 (en) * | 1998-12-09 | 2003-09-30 | Cisco Technology, Inc. | Value-added features for the spanning tree protocol |
US6519231B1 (en) * | 1999-01-12 | 2003-02-11 | Nortel Networks Limited | Method and apparatus providing a spanning tree protocol for a data communications network having a multi-link trunk |
ATE280451T1 (en) * | 1999-01-14 | 2004-11-15 | Honeywell Inc | DISTRIBUTION OF MESSAGES THROUGH FLOODING |
US6611502B1 (en) | 1999-01-15 | 2003-08-26 | 3Com Corportion | Spanning tree with rapid propagation of topology changes |
US6771610B1 (en) | 1999-01-19 | 2004-08-03 | 3Com Corporation | Spanning tree with protocol for bypassing port state transition timers |
US6631420B1 (en) * | 1999-02-25 | 2003-10-07 | Nortel Networks Limited | Reducing convergence time by a protocol independent multicast (PIM) router |
US6515969B1 (en) | 1999-03-01 | 2003-02-04 | Cisco Technology, Inc. | Virtual local area network membership registration protocol for multiple spanning tree network environments |
US6535490B1 (en) * | 1999-03-04 | 2003-03-18 | 3Com Corporation | High availability spanning tree with rapid reconfiguration with alternate port selection |
US7283463B2 (en) | 1999-03-30 | 2007-10-16 | International Business Machines Corporation | Non-disruptive reconfiguration of a publish/subscribe system |
US6879594B1 (en) | 1999-06-07 | 2005-04-12 | Nortel Networks Limited | System and method for loop avoidance in multi-protocol label switching |
US6798739B1 (en) | 1999-06-07 | 2004-09-28 | Nortel Networks Limited | Mechanism for splicing trees |
US6724734B1 (en) * | 1999-06-15 | 2004-04-20 | Avaya Communication Israel, Ltd. | Creating a spanning tree of a network including clusters |
US6751191B1 (en) * | 1999-06-29 | 2004-06-15 | Cisco Technology, Inc. | Load sharing and redundancy scheme |
US6392990B1 (en) | 1999-07-23 | 2002-05-21 | Glenayre Electronics, Inc. | Method for implementing interface redundancy in a computer network |
US6765877B1 (en) | 1999-08-30 | 2004-07-20 | Cisco Technology, Inc. | System and method for detecting unidirectional links |
US6785226B1 (en) * | 1999-09-01 | 2004-08-31 | Carriercomm, Inc. | System and method for data routing over a network |
KR100450942B1 (en) * | 1999-11-22 | 2004-10-02 | 삼성전자주식회사 | Address search apparatus and method in ethernet switch |
US6678241B1 (en) | 1999-11-30 | 2004-01-13 | Cisc Technology, Inc. | Fast convergence with topology switching |
US7162537B1 (en) * | 2000-01-06 | 2007-01-09 | Cisco Technology, Inc. | Method and system for externally managing router configuration data in conjunction with a centralized database |
US7545755B2 (en) * | 2000-03-03 | 2009-06-09 | Adtran Inc. | Routing switch detecting change in session identifier before reconfiguring routing table |
US7916723B2 (en) * | 2000-03-03 | 2011-03-29 | Adtran, Inc. | Automatic network topology identification by nodes in the network |
JP3715501B2 (en) * | 2000-03-10 | 2005-11-09 | アンリツ株式会社 | Spanning tree bridge and route change method using the same |
US6658012B1 (en) * | 2000-04-27 | 2003-12-02 | International Business Machines Corporation | Statistics for VLAN bridging devices |
US6914905B1 (en) | 2000-06-16 | 2005-07-05 | Extreme Networks, Inc. | Method and system for VLAN aggregation |
CA2344789A1 (en) * | 2000-06-27 | 2001-12-27 | Rockwell Electronic Commerce Corporation | Redundant channels over a packet network |
US6954437B1 (en) * | 2000-06-30 | 2005-10-11 | Intel Corporation | Method and apparatus for avoiding transient loops during network topology adoption |
US20060190587A1 (en) * | 2000-06-30 | 2006-08-24 | Mikael Sylvest | Network topology management |
US7020709B1 (en) * | 2000-06-30 | 2006-03-28 | Intel Corporation | System and method for fault tolerant stream splitting |
US6871226B1 (en) * | 2000-08-22 | 2005-03-22 | Bsafe Online | Method of searching servers in a distributed network |
US6934262B1 (en) | 2000-08-26 | 2005-08-23 | Cisco Technology, Inc. | Method and apparatus for restricting the assignment of VLANs |
US6987740B1 (en) | 2000-09-11 | 2006-01-17 | Cisco Technology, Inc. | STP root guard |
US7233567B1 (en) * | 2000-09-22 | 2007-06-19 | Nortel Networks Limited | Apparatus and method for supporting multiple traffic redundancy mechanisms |
US7272653B2 (en) * | 2000-09-28 | 2007-09-18 | International Business Machines Corporation | System and method for implementing a clustered load balancer |
US7027453B2 (en) * | 2000-10-13 | 2006-04-11 | General Instrument Corporation | Spanning tree alternate routing bridge protocol |
US6857027B1 (en) * | 2000-11-14 | 2005-02-15 | 3Com Corporation | Intelligent network topology and configuration verification using a method of loop detection |
US6868071B1 (en) * | 2000-11-15 | 2005-03-15 | Intel Corporation | System and method of transmitting data frames in a mesh of data switches |
US6704812B2 (en) * | 2000-11-30 | 2004-03-09 | International Business Machines Corporation | Transparent and dynamic management of redundant physical paths to peripheral devices |
US6888792B2 (en) * | 2000-12-07 | 2005-05-03 | Intel Corporation | Technique to provide automatic failover for channel-based communications |
US20020141351A1 (en) * | 2000-12-07 | 2002-10-03 | Maltz David A. | Method and system for validating network transformation instructions |
US7076594B2 (en) * | 2000-12-22 | 2006-07-11 | Cisco Technology, Inc. | Apparatus and method for preventing one way connectivity loops in a computer network |
US7127524B1 (en) * | 2000-12-29 | 2006-10-24 | Vernier Networks, Inc. | System and method for providing access to a network with selective network address translation |
US6912592B2 (en) * | 2001-01-05 | 2005-06-28 | Extreme Networks, Inc. | Method and system of aggregate multiple VLANs in a metropolitan area network |
US20020110087A1 (en) * | 2001-02-14 | 2002-08-15 | David Zelig | Efficient setup of label-switched connections |
JP2002330152A (en) * | 2001-04-27 | 2002-11-15 | Fujitsu Ltd | Spanning tree controller and method at the time of trouble/increase |
US7698389B2 (en) * | 2001-05-16 | 2010-04-13 | Hewlett-Packard Development Company, L.P. | Device configuration in a distributed environment |
US6987735B2 (en) * | 2001-05-24 | 2006-01-17 | International Business Machines Corporation | System and method for enhancing the availability of routing systems through equal cost multipath |
JP3443109B2 (en) * | 2001-05-31 | 2003-09-02 | ジャパン・エンジニアリング・ネットワーク株式会社 | Assembly mold for continuous casting |
US7085224B1 (en) * | 2001-06-14 | 2006-08-01 | Cisco Technology, Inc. | Method and apparatus for fast failure detection in switched LAN networks |
US6961319B2 (en) * | 2001-07-16 | 2005-11-01 | International Business Machines Corporation | Methods and arrangements for distribution tree development |
US7315903B1 (en) * | 2001-07-20 | 2008-01-01 | Palladia Systems, Inc. | Self-configuring server and server network |
US7054264B2 (en) * | 2001-07-24 | 2006-05-30 | Corrigent Systems Ltd. | Interconnect and gateway protection in bidirectional ring networks |
US7145878B2 (en) * | 2001-07-27 | 2006-12-05 | Corrigent Systems Ltd. | Avoiding overlapping segments in transparent LAN services on ring-based networks |
US7127523B2 (en) * | 2001-07-27 | 2006-10-24 | Corrigent Systems Ltd. | Spanning tree protocol traffic in a transparent LAN |
KR100418562B1 (en) * | 2001-09-06 | 2004-02-14 | 주식회사 기지소프트 | Method for generating casting path |
US7020145B1 (en) * | 2001-09-24 | 2006-03-28 | Hewlett-Packard Development Company, L.P. | Network topology manager |
US7013347B1 (en) * | 2001-10-16 | 2006-03-14 | Cisco Technology, Inc. | Distance vector extension to the address resolution protocol |
US7310306B1 (en) | 2001-10-16 | 2007-12-18 | Cisco Technology, Inc. | Method and apparatus for ingress port filtering for packet switching systems |
GB2381427A (en) * | 2001-10-27 | 2003-04-30 | Hewlett Packard Co | Spanning tree in peer to peer networks |
US7657619B1 (en) * | 2001-11-13 | 2010-02-02 | Extreme Networks, Inc. | Method and system for maintaining a loop-free topology across multiple spanning trees in a virtual local area network |
JP3714238B2 (en) * | 2001-11-21 | 2005-11-09 | 日本電気株式会社 | Network transfer system and transfer method |
US7061875B1 (en) | 2001-12-07 | 2006-06-13 | Cisco Technology, Inc. | Spanning tree loop guard |
US7010595B2 (en) * | 2001-12-14 | 2006-03-07 | D-Link Corp. | Apparatus for multi-level loopback test in a community network system and method therefor |
US7986937B2 (en) | 2001-12-20 | 2011-07-26 | Microsoft Corporation | Public access point |
US7188364B2 (en) * | 2001-12-20 | 2007-03-06 | Cranite Systems, Inc. | Personal virtual bridged local area networks |
US7599360B2 (en) * | 2001-12-26 | 2009-10-06 | Cisco Technology, Inc. | Methods and apparatus for encapsulating a frame for transmission in a storage area network |
US7499410B2 (en) * | 2001-12-26 | 2009-03-03 | Cisco Technology, Inc. | Fibre channel switch that enables end devices in different fabrics to communicate with one another while retaining their unique fibre channel domain—IDs |
US6917986B2 (en) * | 2002-01-07 | 2005-07-12 | Corrigent Systems Ltd. | Fast failure protection using redundant network edge ports |
US7512650B2 (en) * | 2002-01-11 | 2009-03-31 | Thomson Licensing | Physical layer recovery in a streaming data delivery system |
EP1330078A1 (en) * | 2002-01-16 | 2003-07-23 | Lucent Technologies Inc. | Spanning tree method |
US7154899B2 (en) * | 2002-02-01 | 2006-12-26 | Corrigent Systems Ltd. | Protecting the filtering database in virtual bridges |
US8005978B1 (en) | 2002-03-01 | 2011-08-23 | Cisco Technology, Inc. | Method to optimize the load balancing of parallel coprocessors |
US6717922B2 (en) * | 2002-03-04 | 2004-04-06 | Foundry Networks, Inc. | Network configuration protocol and method for rapid traffic recovery and loop avoidance in ring topologies |
WO2003083692A1 (en) * | 2002-03-27 | 2003-10-09 | First Virtual Communications | System and method for traversing firewalls with protocol communications |
US7406034B1 (en) | 2002-04-01 | 2008-07-29 | Cisco Technology, Inc. | Methods and apparatus for fibre channel frame delivery |
US7616637B1 (en) | 2002-04-01 | 2009-11-10 | Cisco Technology, Inc. | Label switching in fibre channel networks |
US7209435B1 (en) * | 2002-04-16 | 2007-04-24 | Foundry Networks, Inc. | System and method for providing network route redundancy across Layer 2 devices |
US7134040B2 (en) * | 2002-04-17 | 2006-11-07 | International Business Machines Corporation | Method, system, and program for selecting a path to a device to use when sending data requests to the device |
US7680031B1 (en) * | 2002-04-26 | 2010-03-16 | Redback Networks Inc. | Method and apparatus for load balancing and protecting data traffic in an optical ring |
DE60203480T2 (en) * | 2002-04-30 | 2006-01-26 | Lucent Technologies Inc. | Method for establishing a loop-free path for transmitting data packets in a ring network |
US7206288B2 (en) * | 2002-06-12 | 2007-04-17 | Cisco Technology, Inc. | Methods and apparatus for characterizing a route in fibre channel fabric |
EP1525678B1 (en) * | 2002-06-21 | 2008-07-30 | QUALCOMM Incorporated | Wireless local area network repeater |
US7234157B2 (en) * | 2002-06-27 | 2007-06-19 | Lenovo Singapore Pte Ltd | Remote authentication caching on a trusted client or gateway system |
US7391719B2 (en) * | 2002-07-15 | 2008-06-24 | Sixnet, Llc | Redundant network interface for ethernet devices |
JP3729265B2 (en) * | 2002-08-22 | 2005-12-21 | 日本電気株式会社 | Network system, spanning tree configuration method, spanning tree configuration node, and spanning tree configuration program |
US7339929B2 (en) * | 2002-08-23 | 2008-03-04 | Corrigent Systems Ltd. | Virtual private LAN service using a multicast protocol |
US20040105455A1 (en) * | 2002-08-29 | 2004-06-03 | Seaman Michael John | Automatic edge port and one way connectivity detection with rapid reconfiguration for shared media in spanning tree configured bridged Local Area Networks |
EP1546894A4 (en) * | 2002-09-17 | 2011-05-18 | Broadcom Corp | System and method for access point (ap) aggregation and resiliency in a hybrid wired/wireless local area network |
US8885688B2 (en) * | 2002-10-01 | 2014-11-11 | Qualcomm Incorporated | Control message management in physical layer repeater |
WO2004038958A1 (en) * | 2002-10-24 | 2004-05-06 | Widefi, Inc. | Wireless local area network repeater with in-band control channel |
US8462668B2 (en) | 2002-10-01 | 2013-06-11 | Foundry Networks, Llc | System and method for implementation of layer 2 redundancy protocols across multiple networks |
WO2004062305A1 (en) * | 2002-12-16 | 2004-07-22 | Widefi, Inc. | Improved wireless network repeater |
KR101012629B1 (en) | 2002-10-11 | 2011-02-09 | 퀄컴 인코포레이티드 | Reducing loop effects in a wireless local area network repeater |
DE60322440D1 (en) * | 2002-10-15 | 2008-09-04 | Qualcomm Inc | WLAN REPEATER WITH AUTOMATIC GAIN CONTROL FOR ADVANCED NET COVER |
US8078100B2 (en) | 2002-10-15 | 2011-12-13 | Qualcomm Incorporated | Physical layer repeater with discrete time filter for all-digital detection and delay generation |
US7230935B2 (en) | 2002-10-24 | 2007-06-12 | Widefi, Inc. | Physical layer repeater with selective use of higher layer functions based on network operating conditions |
US7877483B1 (en) * | 2002-10-28 | 2011-01-25 | Cisco Technology, Inc. | Virtual local area network pruning protocol |
US7835265B2 (en) * | 2002-10-31 | 2010-11-16 | Conexant Systems, Inc. | High availability Ethernet backplane architecture |
CN100588133C (en) * | 2002-11-15 | 2010-02-03 | 高通股份有限公司 | Wireless local area network repeater with detection |
US7433326B2 (en) | 2002-11-27 | 2008-10-07 | Cisco Technology, Inc. | Methods and devices for exchanging peer parameters between network devices |
US7933983B2 (en) * | 2002-12-17 | 2011-04-26 | Hewlett-Packard Development Company, L.P. | Method and system for performing load balancing across control planes in a data center |
US7792991B2 (en) * | 2002-12-17 | 2010-09-07 | Cisco Technology, Inc. | Method and apparatus for advertising a link cost in a data communications network |
US7313101B2 (en) * | 2002-12-20 | 2007-12-25 | Hewlett-Packard Development Company, L.P. | Need-based filtering for rapid selection of devices in a tree topology network |
US7283465B2 (en) * | 2003-01-07 | 2007-10-16 | Corrigent Systems Ltd. | Hierarchical virtual private LAN service protection scheme |
US7707307B2 (en) * | 2003-01-09 | 2010-04-27 | Cisco Technology, Inc. | Method and apparatus for constructing a backup route in a data communications network |
US7869350B1 (en) | 2003-01-15 | 2011-01-11 | Cisco Technology, Inc. | Method and apparatus for determining a data communication network repair strategy |
US8031630B2 (en) * | 2003-03-03 | 2011-10-04 | Alcatel Lucent | Method and apparatus for updating provider domain due to customer TCNs |
GB0307032D0 (en) * | 2003-03-26 | 2003-04-30 | Rolls Royce Plc | A control system |
US8040886B2 (en) * | 2003-04-08 | 2011-10-18 | Cisco Technology, Inc. | Programmable packet classification system using an array of uniform content-addressable memories |
JP2004336209A (en) * | 2003-05-01 | 2004-11-25 | Ntt Docomo Inc | Traffic distribution control apparatus, and traffic distribution control method |
US7336605B2 (en) * | 2003-05-13 | 2008-02-26 | Corrigent Systems, Inc. | Bandwidth allocation for link aggregation |
US7330440B1 (en) | 2003-05-20 | 2008-02-12 | Cisco Technology, Inc. | Method and apparatus for constructing a transition route in a data communications network |
US8543672B2 (en) | 2003-06-02 | 2013-09-24 | Alcatel Lucent | Method for reconfiguring a ring network, a network node, and a computer program product |
WO2004111918A1 (en) * | 2003-06-09 | 2004-12-23 | Brush Industries, Inc. | Card reader/writer devices and methods |
US7480258B1 (en) | 2003-07-03 | 2009-01-20 | Cisco Technology, Inc. | Cross stack rapid transition protocol |
US7864708B1 (en) | 2003-07-15 | 2011-01-04 | Cisco Technology, Inc. | Method and apparatus for forwarding a tunneled packet in a data communications network |
US7233991B2 (en) * | 2003-08-22 | 2007-06-19 | Clearmesh Networks, Inc. | Self-healing tree network |
CN1317864C (en) * | 2003-09-13 | 2007-05-23 | 华为技术有限公司 | A method for implementing table update in virtual local area network |
US20050058063A1 (en) * | 2003-09-15 | 2005-03-17 | Dell Products L.P. | Method and system supporting real-time fail-over of network switches |
US7751416B2 (en) * | 2003-09-18 | 2010-07-06 | Cisco Technology, Inc. | Virtual network device |
US7839843B2 (en) * | 2003-09-18 | 2010-11-23 | Cisco Technology, Inc. | Distributed forwarding in virtual network devices |
US7640359B1 (en) * | 2003-09-19 | 2009-12-29 | At&T Intellectual Property, I, L.P. | Method, system and computer program product for facilitating the design and assignment of ethernet VLANs |
US7339900B2 (en) * | 2003-09-26 | 2008-03-04 | Sun Microsystem, Inc. | Method and apparatus for preventing spanning tree loops during traffic overload conditions |
US7580360B2 (en) * | 2003-10-14 | 2009-08-25 | Cisco Technology, Inc. | Method and apparatus for generating routing information in a data communications network |
US7554921B2 (en) | 2003-10-14 | 2009-06-30 | Cisco Technology, Inc. | Method and apparatus for generating routing information in a data communication network |
US8526427B1 (en) | 2003-10-21 | 2013-09-03 | Cisco Technology, Inc. | Port-based loadsharing for a satellite switch |
US7082493B1 (en) | 2003-10-31 | 2006-07-25 | Integrated Device Technology, Inc. | CAM-based search engines and packet coprocessors having results status signaling for completed contexts |
US7194573B1 (en) | 2003-10-31 | 2007-03-20 | Integrated Device Technology, Inc. | CAM-based search engine devices having advanced search and learn instruction handling |
US7428213B2 (en) * | 2003-11-21 | 2008-09-23 | Cisco Technology, Inc. | Method and apparatus for determining network routing information based on shared risk link group information |
US7729267B2 (en) * | 2003-11-26 | 2010-06-01 | Cisco Technology, Inc. | Method and apparatus for analyzing a media path in a packet switched network |
EP1545070A1 (en) * | 2003-12-18 | 2005-06-22 | Alcatel | Network with spanning tree for guiding information |
US7565435B2 (en) * | 2003-12-20 | 2009-07-21 | Alcatel Lucent | Method for obtaining the best connectivity achievable within virtual local area networks |
US20050240797A1 (en) * | 2004-01-23 | 2005-10-27 | Fredrik Orava | Restoration mechanism for network topologies |
US7774461B2 (en) | 2004-02-18 | 2010-08-10 | Fortinet, Inc. | Mechanism for determining a congestion metric for a path in a network |
US8990430B2 (en) * | 2004-02-19 | 2015-03-24 | Cisco Technology, Inc. | Interface bundles in virtual network devices |
US7710882B1 (en) | 2004-03-03 | 2010-05-04 | Cisco Technology, Inc. | Method and apparatus for computing routing information for a data communications network |
US8208370B1 (en) | 2004-03-31 | 2012-06-26 | Cisco Technology, Inc. | Method and system for fast link failover |
JP4128974B2 (en) * | 2004-03-31 | 2008-07-30 | 富士通株式会社 | Layer 2 loop detection system |
US8027642B2 (en) | 2004-04-06 | 2011-09-27 | Qualcomm Incorporated | Transmission canceller for wireless local area network |
US7486691B2 (en) * | 2004-04-26 | 2009-02-03 | International Business Machines Corporation | Method, logic arrangement and program for assigning a primary trunk |
US7889733B2 (en) | 2004-04-28 | 2011-02-15 | Cisco Technology, Inc. | Intelligent adjunct network device |
US7983173B2 (en) * | 2004-05-10 | 2011-07-19 | Cisco Technology, Inc. | System and method for detecting link failures |
JP4960223B2 (en) | 2004-05-13 | 2012-06-27 | クゥアルコム・インコーポレイテッド | Non-frequency conversion repeater for detection and media access control |
US7710957B2 (en) * | 2004-05-19 | 2010-05-04 | Cisco Technology, Inc. | System and method for implementing multiple spanning trees per network |
US7706364B2 (en) * | 2004-05-19 | 2010-04-27 | Cisco Technology, Inc. | Virtual network device clusters |
US7848240B2 (en) | 2004-06-01 | 2010-12-07 | Cisco Technology, Inc. | Method and apparatus for forwarding data in a data communications network |
EP1769645A4 (en) * | 2004-06-03 | 2010-07-21 | Qualcomm Inc | Frequency translating repeater with low cost high performance local oscillator architecture |
US9215161B2 (en) * | 2004-06-07 | 2015-12-15 | Hewlett Packard Enterprise Development Lp | Automated selection of an optimal path between a core switch and teamed network resources of a computer system |
US9491084B2 (en) * | 2004-06-17 | 2016-11-08 | Hewlett Packard Enterprise Development Lp | Monitoring path connectivity between teamed network resources of a computer system and a core network |
US7436836B2 (en) * | 2004-06-30 | 2008-10-14 | Cisco Technology, Inc. | Method and apparatus for detecting support for a protocol defining supplemental headers |
US7808983B2 (en) | 2004-07-08 | 2010-10-05 | Cisco Technology, Inc. | Network device architecture for centralized packet processing |
CA2926414A1 (en) * | 2004-07-09 | 2006-01-26 | Network Foundation Technologies, Llc | Systems for distributing data over a computer network and methods for arranging nodes for distribution of data over a computer network |
US7577106B1 (en) | 2004-07-12 | 2009-08-18 | Cisco Technology, Inc. | Method and apparatus for managing a transition for a class of data between first and second topologies in a data communications network |
US7725450B1 (en) | 2004-07-23 | 2010-05-25 | Netlogic Microsystems, Inc. | Integrated search engine devices having pipelined search and tree maintenance sub-engines therein that maintain search coherence during multi-cycle update operations |
US7653619B1 (en) | 2004-07-23 | 2010-01-26 | Netlogic Microsystems, Inc. | Integrated search engine devices having pipelined search and tree maintenance sub-engines therein that support variable tree height |
US8886677B1 (en) | 2004-07-23 | 2014-11-11 | Netlogic Microsystems, Inc. | Integrated search engine devices that support LPM search operations using span prefix masks that encode key prefix length |
US7603346B1 (en) | 2004-07-23 | 2009-10-13 | Netlogic Microsystems, Inc. | Integrated search engine devices having pipelined search and b-tree maintenance sub-engines therein |
US7747599B1 (en) | 2004-07-23 | 2010-06-29 | Netlogic Microsystems, Inc. | Integrated search engine devices that utilize hierarchical memories containing b-trees and span prefix masks to support longest prefix match search operations |
US7680904B2 (en) * | 2004-08-06 | 2010-03-16 | Logic Controls, Inc. | Diagnostic method and apparatus for detecting and locating computer network discontinuities |
US8730976B2 (en) * | 2004-08-17 | 2014-05-20 | Cisco Technology, Inc. | System and method for preventing erroneous link aggregation due to component relocation |
US7570581B2 (en) * | 2004-09-23 | 2009-08-04 | Motorola, Inc. | Dynamic reduction of route reconvergence time |
US7593324B2 (en) * | 2004-10-25 | 2009-09-22 | Cisco Technology, Inc. | Graceful port shutdown protocol for fibre channel interfaces |
US7428658B2 (en) * | 2004-10-26 | 2008-09-23 | International Business Machines Corporation | Checking storage reconfiguration |
US7630298B2 (en) * | 2004-10-27 | 2009-12-08 | Cisco Technology, Inc. | Method and apparatus for forwarding data in a data communications network |
US7916628B2 (en) * | 2004-11-01 | 2011-03-29 | Cisco Technology, Inc. | Trunking for fabric ports in fibre channel switches and attached devices |
US7417953B2 (en) * | 2004-11-01 | 2008-08-26 | Alcatel Lucent | Port re-enabling by monitoring link status |
US7496644B2 (en) * | 2004-11-05 | 2009-02-24 | Cisco Technology, Inc. | Method and apparatus for managing a network component change |
US7974223B2 (en) | 2004-11-19 | 2011-07-05 | Corrigent Systems Ltd. | Virtual private LAN service over ring networks |
JP4605365B2 (en) * | 2004-12-06 | 2011-01-05 | 日本電気株式会社 | Access network system and method of moving internal network relay device |
US7649844B2 (en) * | 2004-12-29 | 2010-01-19 | Cisco Technology, Inc. | In-order fibre channel packet delivery |
CN100459569C (en) * | 2005-01-14 | 2009-02-04 | 华为技术有限公司 | Quick route switching method and apparatus for network node devices |
US8059727B2 (en) * | 2005-01-28 | 2011-11-15 | Qualcomm Incorporated | Physical layer repeater configuration for increasing MIMO performance |
US20060171302A1 (en) * | 2005-02-03 | 2006-08-03 | Cisco Technology, Inc. | Data transmission in a network comprising bridges |
US7933197B2 (en) * | 2005-02-22 | 2011-04-26 | Cisco Technology, Inc. | Method and apparatus for constructing a repair path around a non-available component in a data communications network |
US20060206602A1 (en) * | 2005-03-14 | 2006-09-14 | International Business Machines Corporation | Network switch link failover in a redundant switch configuration |
JP2006254341A (en) * | 2005-03-14 | 2006-09-21 | Fujitsu Ltd | Bridge device in spanning tree protocol network and control packet processing method |
US20060203715A1 (en) * | 2005-03-14 | 2006-09-14 | International Business Machines Corporation | Method for redirection of virtual LAN network traffic |
CN100456752C (en) | 2005-04-04 | 2009-01-28 | 华为技术有限公司 | Method for realizing group broadcasting under fast generating tree ring network |
US7768932B2 (en) * | 2005-04-13 | 2010-08-03 | Hewlett-Packard Development Company, L.P. | Method for analyzing a system in a network |
US7606178B2 (en) * | 2005-05-31 | 2009-10-20 | Cisco Technology, Inc. | Multiple wireless spanning tree protocol for use in a wireless mesh network |
US7653011B2 (en) * | 2005-05-31 | 2010-01-26 | Cisco Technology, Inc. | Spanning tree protocol for wireless networks |
US7876689B2 (en) * | 2005-06-29 | 2011-01-25 | Hewlett-Packard Development Company, L.P. | Method and apparatus for load balancing network interface adapters based on network information |
US7848224B2 (en) * | 2005-07-05 | 2010-12-07 | Cisco Technology, Inc. | Method and apparatus for constructing a repair path for multicast data |
US7835312B2 (en) * | 2005-07-20 | 2010-11-16 | Cisco Technology, Inc. | Method and apparatus for updating label-switched paths |
US7693043B2 (en) * | 2005-07-22 | 2010-04-06 | Cisco Technology, Inc. | Method and apparatus for advertising repair capability |
WO2007022238A2 (en) * | 2005-08-17 | 2007-02-22 | Nortel Networks Limited | High-availability networking with intelligent failover |
US7646733B2 (en) * | 2005-09-16 | 2010-01-12 | Cisco Technology, Inc. | System and method for generating symmetrical spanning trees |
JP2007088949A (en) * | 2005-09-22 | 2007-04-05 | Fujitsu Ltd | Information processing apparatus, communication load diffusing method and communication load diffusion program |
EP1768307B1 (en) * | 2005-09-23 | 2008-11-05 | Nokia Siemens Networks Gmbh & Co. Kg | Method for augmenting a network |
CN1960325B (en) * | 2005-11-04 | 2010-05-05 | 华为技术有限公司 | Data process method in a bridging network, and a bridging network |
JP4306674B2 (en) * | 2005-11-15 | 2009-08-05 | コニカミノルタビジネステクノロジーズ株式会社 | Image forming apparatus, program, and recording medium |
DE102005057122A1 (en) * | 2005-11-30 | 2007-05-31 | Siemens Ag | Ethernet network, has switches which are formed in network start-up phase by distribution of special telegrams to configure active and inactive coupling channels in distortion free operation |
US7983150B2 (en) * | 2006-01-18 | 2011-07-19 | Corrigent Systems Ltd. | VPLS failure protection in ring networks |
US7756035B2 (en) * | 2006-01-31 | 2010-07-13 | Nortel Networks Limited | Planning routes and allocating identifiers to routes in a managed frame-forwarding network |
US7804832B2 (en) * | 2006-02-13 | 2010-09-28 | Cisco Technology, Inc. | Method and system for simplified network wide traffic and/or flow monitoring in a data network |
US8644137B2 (en) * | 2006-02-13 | 2014-02-04 | Cisco Technology, Inc. | Method and system for providing safe dynamic link redundancy in a data network |
JP4603494B2 (en) * | 2006-02-14 | 2010-12-22 | 富士通株式会社 | Transmission apparatus and learning information maintenance method |
EP1821571A1 (en) * | 2006-02-15 | 2007-08-22 | Oticon A/S | Loop antenna for in the ear audio device |
US7808931B2 (en) * | 2006-03-02 | 2010-10-05 | Corrigent Systems Ltd. | High capacity ring communication network |
US7885179B1 (en) * | 2006-03-29 | 2011-02-08 | Cisco Technology, Inc. | Method and apparatus for constructing a repair path around a non-available component in a data communications network |
JP2007272354A (en) * | 2006-03-30 | 2007-10-18 | Canon Inc | Electronic apparatus, network setting method therefor, and control program |
US8886831B2 (en) * | 2006-04-05 | 2014-11-11 | Cisco Technology, Inc. | System and methodology for fast link failover based on remote upstream failures |
US7453818B2 (en) * | 2006-05-01 | 2008-11-18 | Cisco Technology, Inc. | Detection of potential forwarding loops in bridged networks |
ES2314777T3 (en) * | 2006-05-04 | 2009-03-16 | NOKIA SIEMENS NETWORKS GMBH & CO. KG | AUTOMATIC PROTECTION OF PACK TRANSMISSION IN A MPLS NETWORK BY THE ETHERNET DUAL-HOME BRIDGE. |
US8144577B2 (en) * | 2006-05-10 | 2012-03-27 | Cisco Technology, Inc. | Technique for efficiently managing bandwidth registration for multiple spanning tree options |
US8309528B2 (en) * | 2006-05-10 | 2012-11-13 | The Trustees Of Columbia University In The City Of New York | Two pore channels as regulators of proliferation in cancer |
US7515535B2 (en) * | 2006-05-10 | 2009-04-07 | Cisco Technology, Inc. | Technique for efficiently managing bandwidth for multipoint-to-multipoint services in a provider network |
US7593400B2 (en) * | 2006-05-19 | 2009-09-22 | Corrigent Systems Ltd. | MAC address learning in a distributed bridge |
ITTO20060364A1 (en) * | 2006-05-19 | 2007-11-20 | Xanto Technologies Srl | USB MASS MEMORY DEVICE AND ITS DATA TRANSFER PROCEDURE |
CN101094125A (en) * | 2006-06-23 | 2007-12-26 | 华为技术有限公司 | Exchange structure in ATCA / ATCA300 expanded exchange bandwidth |
US8248920B2 (en) * | 2006-07-25 | 2012-08-21 | Cisco Technology, Inc. | Alternate spanning tree for faster indirect link failure recovery |
US7639699B2 (en) * | 2006-08-04 | 2009-12-29 | Cisco Technology, Inc. | Technique for sharing a physical port among a plurality of virtual bridges on a switch in a computer network |
US7660303B2 (en) | 2006-08-22 | 2010-02-09 | Corrigent Systems Ltd. | Point-to-multipoint functionality in a bridged network |
US7649892B2 (en) * | 2006-08-30 | 2010-01-19 | Hewlett-Packard Development Company, L.P. | Method and system of network communication receive load balancing |
US7813286B2 (en) * | 2006-08-30 | 2010-10-12 | Hewlett-Packard Development Company, L.P. | Method and system of distributing multicast group join request in computer systems operating with teamed communication ports |
US7899894B2 (en) | 2006-08-30 | 2011-03-01 | International Business Machines Corporation | Coordinated timing network configuration parameter update procedure |
BRPI0715908A2 (en) * | 2006-09-01 | 2014-03-18 | Qualcomm Inc | REPEATER WITH A RECEIVER ANTENNA AND DUAL TRANSMITTER CONFIGURATION WITH ADJUSTMENT FOR MORE INSULATION |
US7957306B2 (en) * | 2006-09-08 | 2011-06-07 | Cisco Technology, Inc. | Providing reachability information in a routing domain of an external destination address in a data communications network |
US7697416B2 (en) * | 2006-09-08 | 2010-04-13 | Cisco Technolgy, Inc. | Constructing a repair path in the event of non-availability of a routing domain |
US8111616B2 (en) * | 2006-09-08 | 2012-02-07 | Cisco Technology, Inc. | Constructing a repair path in the event of failure of an inter-routing domain system link |
US7697518B1 (en) | 2006-09-15 | 2010-04-13 | Netlogic Microsystems, Inc. | Integrated search engine devices and methods of updating same using node splitting and merging operations |
US20080068982A1 (en) * | 2006-09-18 | 2008-03-20 | Antasys Technology Corporation | System of routing path for redundancy ring and method thereof |
WO2008036401A2 (en) * | 2006-09-21 | 2008-03-27 | Qualcomm Incorporated | Method and apparatus for mitigating oscillation between repeaters |
US7701845B2 (en) * | 2006-09-25 | 2010-04-20 | Cisco Technology, Inc. | Forwarding data in a data communications network |
BRPI0717378A2 (en) | 2006-10-26 | 2013-10-29 | Qualcomm Inc | REPEATER TECHNIQUES FOR MULTIPLE INPUTS AND MULTIPLE OUTPUTS USING FLEX COMFORTERS. |
US8705344B2 (en) * | 2006-11-14 | 2014-04-22 | Cisco Technology, Inc. | Graceful failover of a principal link in a fiber-channel fabric |
US7995499B2 (en) * | 2006-11-23 | 2011-08-09 | Cisco Technology, Inc. | Minimizing spanning-tree protocol event processing and flooding in distribution networks |
US7831626B1 (en) | 2006-11-27 | 2010-11-09 | Netlogic Microsystems, Inc. | Integrated search engine devices having a plurality of multi-way trees of search keys therein that share a common root node |
US7953721B1 (en) | 2006-11-27 | 2011-05-31 | Netlogic Microsystems, Inc. | Integrated search engine devices that support database key dumping and methods of operating same |
US7987205B1 (en) | 2006-11-27 | 2011-07-26 | Netlogic Microsystems, Inc. | Integrated search engine devices having pipelined node maintenance sub-engines therein that support database flush operations |
US8086641B1 (en) | 2006-11-27 | 2011-12-27 | Netlogic Microsystems, Inc. | Integrated search engine devices that utilize SPM-linked bit maps to reduce handle memory duplication and methods of operating same |
JP4751817B2 (en) * | 2006-12-04 | 2011-08-17 | 富士通株式会社 | Packet transfer apparatus and network system |
US8223668B2 (en) * | 2006-12-14 | 2012-07-17 | Rockstar Bidco Lp | Method and apparatus for exchanging routing information and the establishment of connectivity across multiple network areas |
US7738383B2 (en) * | 2006-12-21 | 2010-06-15 | Cisco Technology, Inc. | Traceroute using address request messages |
US7706278B2 (en) * | 2007-01-24 | 2010-04-27 | Cisco Technology, Inc. | Triggering flow analysis at intermediary devices |
US9112626B2 (en) * | 2007-01-31 | 2015-08-18 | International Business Machines Corporation | Employing configuration information to determine the role of a server in a coordinated timing network |
US7895303B2 (en) * | 2007-01-31 | 2011-02-22 | International Business Machines Corporation | Server time protocol control messages and methods |
US7689718B2 (en) | 2007-01-31 | 2010-03-30 | International Business Machines Corporation | Channel subsystem server time protocol commands and system therefor |
US7797414B2 (en) * | 2007-01-31 | 2010-09-14 | International Business Machines Corporation | Establishing a logical path between servers in a coordinated timing network |
US7783736B2 (en) * | 2007-01-31 | 2010-08-24 | International Business Machines Corporation | Definition of an active stratum-1 server in a coordinated timing network |
US7783913B2 (en) * | 2007-01-31 | 2010-08-24 | International Business Machines Corporation | Facilitating recovery in a coordinated timing network |
CA2623805A1 (en) * | 2007-03-02 | 2008-09-02 | Robert A. Hubbs | Quality of service based preemptive routing |
US7583589B2 (en) * | 2007-03-15 | 2009-09-01 | Cisco Technology, Inc. | Computing repair path information |
US7962595B1 (en) * | 2007-03-20 | 2011-06-14 | Emc Corporation | Method and apparatus for diagnosing host to storage data path loss due to FibreChannel switch fabric splits |
DE102007015449B4 (en) * | 2007-03-30 | 2009-09-17 | Siemens Ag | Method for reconfiguring a communication network |
JP4946599B2 (en) * | 2007-04-24 | 2012-06-06 | 富士通株式会社 | Ring node and redundancy method |
CN101299671B (en) * | 2007-04-30 | 2013-03-13 | 上海贝尔阿尔卡特股份有限公司 | Method and device for transmitting and receiving multicast data packet |
JP2008278337A (en) * | 2007-05-01 | 2008-11-13 | Brother Ind Ltd | Information distribution system, terminal apparatus used in same system, program, and loop connection avoidance method |
DE102007021922B4 (en) * | 2007-05-10 | 2012-11-22 | Siemens Ag | A packet switched communication network and method for reconfiguring the communication network |
US8024426B2 (en) * | 2007-05-11 | 2011-09-20 | Texas Memory Systems, Inc. | Non-disruptive data path upgrade using target mobility |
US9413686B2 (en) | 2007-06-04 | 2016-08-09 | Qualcomm Incorporated | Establishing a unique end-to-end management key |
US7940776B2 (en) * | 2007-06-13 | 2011-05-10 | Cisco Technology, Inc. | Fast re-routing in distance vector routing protocol networks |
US7928394B1 (en) | 2007-08-21 | 2011-04-19 | Fluke Corporation | Testing device containing a gas sensor |
US7830880B2 (en) * | 2007-08-21 | 2010-11-09 | Cisco Technology, Inc. | Selective build fabric (BF) and reconfigure fabric (RCF) flooding |
US7886176B1 (en) | 2007-09-24 | 2011-02-08 | Integrated Device Technology, Inc. | DDR memory system for measuring a clock signal by identifying a delay value corresponding to a changed logic state during clock signal transitions |
JP4964735B2 (en) * | 2007-10-24 | 2012-07-04 | 株式会社日立製作所 | Network system, management computer, and filter reconfiguration method |
US7716204B1 (en) | 2007-12-21 | 2010-05-11 | Netlogic Microsystems, Inc. | Handle allocation managers and methods for integated circuit search engine devices |
US8059668B2 (en) * | 2008-01-25 | 2011-11-15 | Cisco Technology, Inc. | Efficient end-to-end proposal/agreement messaging for spanning tree convergence in a computer network |
US8279867B2 (en) * | 2008-03-02 | 2012-10-02 | Jeffrey Alan Carley | Method and apparatus for reducing flood traffic in switches |
US7940668B2 (en) * | 2008-03-21 | 2011-05-10 | Cisco Technology, Inc. | Method and apparatus to enable an IPe domain through EIGRP |
US8416811B2 (en) * | 2008-04-10 | 2013-04-09 | International Business Machines Corporation | Coordinated timing network having servers of different capabilities |
US7925916B2 (en) | 2008-04-10 | 2011-04-12 | International Business Machines Corporation | Failsafe recovery facility in a coordinated timing network |
US7801877B1 (en) | 2008-04-14 | 2010-09-21 | Netlogic Microsystems, Inc. | Handle memory access managers and methods for integrated circuit search engine devices |
US8605573B2 (en) * | 2008-06-26 | 2013-12-10 | Shore Microsystems Inc. | Autolearning network link protection device |
US8300523B2 (en) * | 2008-07-28 | 2012-10-30 | Cisco Technology, Inc. | Multi-chasis ethernet link aggregation |
US7876710B2 (en) * | 2008-07-30 | 2011-01-25 | Juniper Networks, Inc. | Layer two MAC flushing/re-routing |
US7978612B2 (en) * | 2008-10-13 | 2011-07-12 | Cisco Technology, Inc. | Two-hop relay for reducing distance vector routing information |
US7873862B2 (en) * | 2008-10-21 | 2011-01-18 | International Business Machines Corporation | Maintaining a primary time server as the current time server in response to failure of time code receivers of the primary time server |
US7957374B2 (en) | 2008-10-22 | 2011-06-07 | Fortinet, Inc. | Mechanism for enabling layer two host addresses to be shielded from the switches in a network |
FR2945690B1 (en) * | 2009-05-13 | 2011-05-20 | Canon Kk | METHOD AND DEVICE FOR PARAMETERSING A BRIDGE IN A COMMUNICATION NETWORK. |
US8477791B2 (en) * | 2009-05-13 | 2013-07-02 | Avaya Inc. | Method and apparatus for locally implementing port selection via synchronized port state databases maintained by the forwarding plane of a network element |
CN101964719B (en) * | 2009-07-23 | 2015-11-25 | 中兴通讯股份有限公司 | Based on the data processing method of master control board switching, line card and master control borad |
JP5598475B2 (en) * | 2009-08-26 | 2014-10-01 | 日本電気株式会社 | Network operation system, network operation method, and network operation program |
US8654630B2 (en) | 2010-03-19 | 2014-02-18 | Brocade Communications Systems, Inc. | Techniques for link redundancy in layer 2 networks |
US8717878B2 (en) * | 2010-03-25 | 2014-05-06 | Canon Kabushiki Kaisha | Providing feedback information when network streaming over multiple physical interfaces |
US8811398B2 (en) * | 2010-04-30 | 2014-08-19 | Hewlett-Packard Development Company, L.P. | Method for routing data packets using VLANs |
CN102136917B (en) * | 2010-07-14 | 2013-04-17 | 华为技术有限公司 | Ethernet multicast method and device |
US8542578B1 (en) | 2010-08-04 | 2013-09-24 | Cisco Technology, Inc. | System and method for providing a link-state path to a node in a network environment |
CN101917648B (en) * | 2010-08-27 | 2014-06-11 | 中兴通讯股份有限公司 | Method for implementing service control in all-fiber protection system and device thereof |
US8774010B2 (en) | 2010-11-02 | 2014-07-08 | Cisco Technology, Inc. | System and method for providing proactive fault monitoring in a network environment |
US8559341B2 (en) | 2010-11-08 | 2013-10-15 | Cisco Technology, Inc. | System and method for providing a loop free topology in a network environment |
US8982733B2 (en) | 2011-03-04 | 2015-03-17 | Cisco Technology, Inc. | System and method for managing topology changes in a network environment |
US8670326B1 (en) | 2011-03-31 | 2014-03-11 | Cisco Technology, Inc. | System and method for probing multiple paths in a network environment |
US8724517B1 (en) | 2011-06-02 | 2014-05-13 | Cisco Technology, Inc. | System and method for managing network traffic disruption |
US8830875B1 (en) | 2011-06-15 | 2014-09-09 | Cisco Technology, Inc. | System and method for providing a loop free topology in a network environment |
US8472348B2 (en) | 2011-07-05 | 2013-06-25 | Cisco Technology, Inc. | Rapid network formation for low-power and lossy networks |
US9571387B1 (en) * | 2012-03-12 | 2017-02-14 | Juniper Networks, Inc. | Forwarding using maximally redundant trees |
US9450846B1 (en) | 2012-10-17 | 2016-09-20 | Cisco Technology, Inc. | System and method for tracking packets in a network environment |
US9407500B2 (en) * | 2013-01-25 | 2016-08-02 | Dell Products L.P. | System and method for determining the configuration of switches in virtual link trunking environments |
US10616049B2 (en) | 2013-01-25 | 2020-04-07 | Dell Products, L.P. | System and method for determining the configuration of switches in virtual link trunking environments |
US20140258771A1 (en) | 2013-03-06 | 2014-09-11 | Fortinet, Inc. | High-availability cluster architecture and protocol |
US9356875B2 (en) * | 2013-07-22 | 2016-05-31 | Cisco Technology, Inc. | Using statistical and historical information of topology metrics in constrained networks |
US9348710B2 (en) | 2014-07-29 | 2016-05-24 | Saudi Arabian Oil Company | Proactive failure recovery model for distributed computing using a checkpoint frequency determined by a MTBF threshold |
CN107005476B (en) * | 2014-11-26 | 2021-08-31 | 瑞典爱立信有限公司 | Method and first device for managing data frames in a switching network |
CN104506551B (en) * | 2014-12-31 | 2018-01-26 | 迈普通信技术股份有限公司 | Data transmission method and equipment, the line card of distributed dual master control Frame Relay Device |
EP3320721A4 (en) * | 2015-07-06 | 2018-08-01 | Telefonaktiebolaget LM Ericsson (publ) | Apparatus and method for forwarding messages |
WO2017080611A1 (en) * | 2015-11-13 | 2017-05-18 | Huawei Technologies Co., Ltd. | Software defined network system for port failure detection |
US10554425B2 (en) | 2017-07-28 | 2020-02-04 | Juniper Networks, Inc. | Maximally redundant trees to redundant multicast source nodes for multicast protection |
US11271933B1 (en) | 2020-01-15 | 2022-03-08 | Worldpay Limited | Systems and methods for hosted authentication service |
TWI733560B (en) * | 2020-08-13 | 2021-07-11 | 瑞昱半導體股份有限公司 | Switch and switch network system thereof |
Family Cites Families (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4811337A (en) * | 1988-01-15 | 1989-03-07 | Vitalink Communications Corporation | Distributed load sharing |
US4922486A (en) * | 1988-03-31 | 1990-05-01 | American Telephone And Telegraph Company | User to network interface protocol for packet communications networks |
US5018137A (en) * | 1988-06-27 | 1991-05-21 | Digital Equipment Corporation | Transparent load sharing for parallel networks |
US5138615A (en) * | 1989-06-22 | 1992-08-11 | Digital Equipment Corporation | Reconfiguration system and method for high-speed mesh connected local area network |
US5150360A (en) * | 1990-03-07 | 1992-09-22 | Digital Equipment Corporation | Utilization of redundant links in bridged networks |
GB9100389D0 (en) * | 1991-01-09 | 1991-02-20 | Digital Equipment Corp | Method and apparatus for transparently bridging traffic across wide area networks |
US5280480A (en) * | 1991-02-21 | 1994-01-18 | International Business Machines Corporation | Source routing transparent bridge |
US5844902A (en) * | 1992-04-07 | 1998-12-01 | Cabletron Systems, Inc. | Assigning multiple parallel bridge numbers to bridges |
US5400333A (en) * | 1992-04-07 | 1995-03-21 | Digital Equipment Corporation | Detecting LAN number misconfiguration |
US5323394A (en) * | 1992-04-07 | 1994-06-21 | Digital Equipment Corporation | Selecting optimal routes in source routing bridging without exponential flooding of explorer packets |
US5327424A (en) * | 1992-04-07 | 1994-07-05 | Digital Equipment Corporation | Automatically configuring parallel bridge numbers |
US5398242A (en) * | 1992-04-07 | 1995-03-14 | Digital Equipment Corporation | Automatically configuring LAN numbers |
JP3542159B2 (en) | 1994-03-17 | 2004-07-14 | 株式会社日立製作所 | Bridge with multiprocessor structure |
DE69429983T2 (en) | 1994-05-25 | 2002-10-17 | International Business Machines Corp., Armonk | Data transmission network and method for operating the network |
US5790808A (en) * | 1995-07-06 | 1998-08-04 | 3 Com | Active topology maintenance in reconfiguring bridged local area networks with state transition with forgetting interval |
US5742604A (en) * | 1996-03-28 | 1998-04-21 | Cisco Systems, Inc. | Interswitch link mechanism for connecting high-performance network switches |
US5740171A (en) * | 1996-03-28 | 1998-04-14 | Cisco Systems, Inc. | Address translation mechanism for a high-performance network switch |
US5764636A (en) * | 1996-03-28 | 1998-06-09 | Cisco Technology, Inc. | Color blocking logic mechanism for a high-performance network switch |
GB2320169B (en) * | 1996-11-29 | 2001-08-08 | 3Com Ireland | Network configuration |
US5878232A (en) | 1996-12-27 | 1999-03-02 | Compaq Computer Corporation | Dynamic reconfiguration of network device's virtual LANs using the root identifiers and root ports determined by a spanning tree procedure |
US6081512A (en) | 1997-06-30 | 2000-06-27 | Sun Microsystems, Inc. | Spanning tree support in a high performance network device |
US5959968A (en) * | 1997-07-30 | 1999-09-28 | Cisco Systems, Inc. | Port aggregation protocol |
US6202114B1 (en) | 1997-12-31 | 2001-03-13 | Cisco Technology, Inc. | Spanning tree with fast link-failure convergence |
-
1997
- 1997-12-24 US US08/998,412 patent/US6032194A/en not_active Expired - Lifetime
-
1999
- 1999-11-29 US US09/450,066 patent/US6388995B1/en not_active Expired - Lifetime
- 1999-11-29 US US09/450,891 patent/US6535491B2/en not_active Expired - Lifetime
Cited By (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8539111B2 (en) * | 1999-12-30 | 2013-09-17 | Avaya Inc. | Port switch |
US20030200341A1 (en) * | 1999-12-30 | 2003-10-23 | Nortel Networks Corporation, A Canadian Corporation | Port switch |
US7126923B1 (en) * | 2002-05-28 | 2006-10-24 | Extreme Networks, Inc. | Method and system for inter-domain loop protection using a hierarchy of loop resolving protocols |
CN1323515C (en) * | 2003-01-28 | 2007-06-27 | 华为技术有限公司 | Multi-node network management method based on spanning tree protocol |
EP1480397A2 (en) | 2003-04-28 | 2004-11-24 | Alcatel IP Networks, Inc. | Extensions to the spanning tree protocol |
US20040252634A1 (en) * | 2003-04-28 | 2004-12-16 | Alcatel Ip Networks, Inc. | Extensions to the spanning tree protocol |
EP1480397A3 (en) * | 2003-04-28 | 2006-01-25 | Alcatel IP Networks, Inc. | Extensions to the spanning tree protocol |
US7508774B2 (en) | 2003-04-28 | 2009-03-24 | Alcatel-Lucent Usa Inc. | Extensions to the spanning tree protocol |
US7352707B2 (en) * | 2003-05-28 | 2008-04-01 | D-Link Corporation | Processing method enabling each unit in stacking network device to run rapid spanning tree protocol |
US20060007869A1 (en) * | 2004-07-09 | 2006-01-12 | Fujitsu Limited | Method for preventing control packet loop and bridge apparatus using the method |
US8582467B2 (en) * | 2004-07-09 | 2013-11-12 | Fujitsu Limited | Method for preventing control packet looping and bridge apparatus using the method |
US7391744B2 (en) | 2004-10-18 | 2008-06-24 | Alcatel Lucent | Allocating bridge priorities in bridged network |
EP1648119A1 (en) * | 2004-10-18 | 2006-04-19 | Alcatel | Allocating bridge priorities in bridged network |
US7916668B2 (en) | 2004-12-30 | 2011-03-29 | Alcatel Lucent | Spanning tree protocol with burst avoidance |
EP1677469A1 (en) * | 2004-12-30 | 2006-07-05 | Alcatel | Spanning tree protocol with data burst control |
US20060146845A1 (en) * | 2004-12-30 | 2006-07-06 | Alcatel | Spanning tree protocol with burst avoidance |
US9621454B2 (en) | 2004-12-30 | 2017-04-11 | Alcatel Lucent | Spanning tree protocol with burst avoidance |
US20060212554A1 (en) * | 2005-03-18 | 2006-09-21 | Canon Kabushiki Kaisha | Control apparatus, communication control method executed by the control apparatus, communication control program controlling the control apparatus, and data processing system |
US8706848B2 (en) * | 2005-03-18 | 2014-04-22 | Canon Kabushik Kaisha | Control apparatus, communication control method executed by the control apparatus, communication control program controlling the control apparatus, and data processing system |
US20130051218A1 (en) * | 2005-07-15 | 2013-02-28 | Cisco Technology, Inc. | System and method for assuring the operation of network devices in bridged networks |
US8811235B2 (en) * | 2005-07-15 | 2014-08-19 | Cisco Technology, Inc. | System and method for assuring the operation of network devices in bridged networks |
US20100097926A1 (en) * | 2008-10-21 | 2010-04-22 | Liquid Computing Corporation | Methods and systems for providing network access redundancy |
US9237034B2 (en) * | 2008-10-21 | 2016-01-12 | Iii Holdings 1, Llc | Methods and systems for providing network access redundancy |
US9979678B2 (en) | 2008-10-21 | 2018-05-22 | Iii Holdings 1, Llc | Methods and systems for providing network access redundancy |
US9806990B2 (en) | 2012-12-19 | 2017-10-31 | Xi'an Zhongxing New Software Co.Ltd. | Fast recovery method and device for STP-based backup port |
US10148521B2 (en) * | 2016-07-20 | 2018-12-04 | Facebook, Inc. | Capacity planning in a backbone network |
Also Published As
Publication number | Publication date |
---|---|
US6535491B2 (en) | 2003-03-18 |
US20020147800A1 (en) | 2002-10-10 |
US6032194A (en) | 2000-02-29 |
US6388995B1 (en) | 2002-05-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6535491B2 (en) | Method and apparatus for rapidly reconfiguring computer networks using a spanning tree algorithm | |
US7848264B1 (en) | Method and apparatus for rapidly reconfiguring computer networks | |
US7558878B2 (en) | Optimal sync for rapid spanning tree protocol | |
US7428237B1 (en) | Fast convergence with topology switching | |
US6801506B1 (en) | Method and apparatus for providing fast spanning tree re-starts | |
US6813250B1 (en) | Shared spanning tree protocol | |
US7606177B1 (en) | Value-added features for the spanning tree protocol | |
US7061875B1 (en) | Spanning tree loop guard | |
US7626930B2 (en) | Hash-based multi-homing | |
US7822049B1 (en) | System and method for enabling a remote instance of a loop avoidance protocol | |
US7480258B1 (en) | Cross stack rapid transition protocol | |
US7599284B1 (en) | Restartable spanning tree for high availability network systems | |
US7856490B2 (en) | System and method for multiple spanning tree protocol domains in a virtual local area network | |
CN101610221B (en) | IP unicast smoothly switching method during STP switch and device thereof | |
US6724734B1 (en) | Creating a spanning tree of a network including clusters | |
Huynh et al. | RRR: Rapid ring recovery submillisecond decentralized recovery for ethernet ring | |
Cisco | Configuring STP | |
Cisco | Configuring STP | |
Cisco | Configuring STP | |
Cisco | Configuring STP | |
Cisco | Configuring STP | |
Cisco | Understanding Token Ring Switching |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
FPAY | Fee payment |
Year of fee payment: 12 |