US20030223379A1 - Method and system for inter-domain loop protection using a hierarchy of loop resolving protocols - Google Patents

Method and system for inter-domain loop protection using a hierarchy of loop resolving protocols Download PDF

Info

Publication number
US20030223379A1
US20030223379A1 US10/157,568 US15756802A US2003223379A1 US 20030223379 A1 US20030223379 A1 US 20030223379A1 US 15756802 A US15756802 A US 15756802A US 2003223379 A1 US2003223379 A1 US 2003223379A1
Authority
US
United States
Prior art keywords
domain
logical
loop
inter
physical
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/157,568
Inventor
Xuguang Yang
Prakash Kashyap
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Extreme Networks Inc
Power Standards Lab Inc
Original Assignee
Extreme Networks Inc
Power Standards Lab Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Extreme Networks Inc, Power Standards Lab Inc filed Critical Extreme Networks Inc
Priority to US10/157,568 priority Critical patent/US20030223379A1/en
Assigned to EXTREME NETWORKS reassignment EXTREME NETWORKS ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: KASHYAP, PRAKASH, YANG, XUGUANG
Priority to US10/172,487 priority patent/US7126923B1/en
Assigned to POWER STANDARDS LAB reassignment POWER STANDARDS LAB ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MCEACHER, ALEXANDER
Publication of US20030223379A1 publication Critical patent/US20030223379A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]

Definitions

  • the invention relates to the field of loop free network topology domains.
  • the invention relates to inter-domain loop protection using a hierarchy of loop resolving protocols.
  • a virtual local area network restricts communication between computers in a network on some network administrator defined basis rather than, for example, the physical location of the computers.
  • the computers in the VLAN communicate with each other as if they are connected to the same local area network (LAN) segment even though they may actually be physically located on different segments of an internetwork.
  • LAN local area network
  • computers connected to the same network segment may not necessarily be able to communicate with each other if, for example, they belong to different VLANs.
  • Networks such as LANs
  • Bridges or switches connect the segments.
  • a LAN may include redundant bridges and paths to provide backup in the event of a bridge or path failure in the LAN.
  • STP Spanning Tree Protocol
  • IEEE 802.1D Institute of Electrical and Electronics Engineers 802.1D standard, authored and published by the IEEE Standards Association in June 1998, comprises an algorithm that provides for this redundancy while preventing undesirable loops in the LAN.
  • bridges select a root bridge, and calculate and select a single path to the root bridge when faced with multiple redundant paths. After path costs are calculated and a single path is selected, the bridges block the redundant links.
  • Ethernet Automatic Protection Switching Protocol prevents loops in a Layer-2 (L2) network having a ring topology.
  • EAPS Ethernet Automatic Protection Switching Protocol
  • L2 Layer-2
  • EAPS blocks ports to prevent loops and provide a loop free domain.
  • a method and system for inter-domain loop protection using a hierarchy of loop resolving protocols.
  • the method includes receiving messages from inter-domain switches.
  • the inter-domain switches belong to a plurality of physical loop-free network topology domains.
  • a logical domain is abstracted that includes the inter-domain switches and logical links that connect the switches.
  • Each logical link represents one of the physical loop free network topology domains to which the inter-domain switches belong.
  • One or more logical links and ports associated with those logical links may be blocked to break any loops. Thus, the loops in the logical domain are eliminated.
  • apparatus are provided to carry out the above and other methods.
  • FIG. 1 illustrates an example of a network implementing one embodiment of the invention.
  • FIG. 2 illustrates an example of a logic domain according to an embodiment of the invention.
  • FIG. 3 illustrates an example of a hierarchy of loop resolving protocols according to one embodiment of the invention.
  • FIG. 4 illustrates the mapping of logical ports in the logical domain to physical ports in the network according to one embodiment of the invention.
  • FIG. 5 is a flow diagram illustrating a method according to an embodiment of the invention.
  • FIG. 6 is a block diagram illustrating a suitable computing environment in which certain aspects of the illustrated invention may be practiced.
  • FIG. 1 a block diagram illustrates a network 100 according to one embodiment of the invention.
  • the network 100 may include more components than those shown in FIG. 1. However, it is not necessary that all of these generally conventional components be shown in order to disclose an illustrative embodiment for practicing the invention.
  • Network 100 contains at least two loop-free network topology domains 102 and 104 .
  • Network 100 may contain one or more virtual local area networks (VLANs) that span one or more of the loop-free network topology domains.
  • the loop-free network topology domains contain one or more switches.
  • loop-free domain 102 contains switches 106 , 108 , and 110
  • loop-free domain 104 contains switches 106 , 108 , and 112 .
  • Each loop-free network topology domain may be assigned an identification number (ID). For example, domain 102 has been assigned ID1 ( 130 ) and domain 104 has been assigned ID2 ( 132 ).
  • one or more of the loop-free domains are maintained loop-free in accordance with a Spanning Tree Protocol (STP).
  • STP Spanning Tree Protocol
  • loop-free domain 104 is a STP domain.
  • the STP algorithm running in domain 104 will break any loops within domain 104 by blocking one or more paths. Since there are only two paths in domain 104 , path 116 and path 118 , there are no loops within domain 104 . Therefore, no path needs to be blocked.
  • one or more of the loop-free domains are maintained loop-free in accordance with an Ethernet Automatic Protection Switching Protocol (EAPS).
  • EAPS Ethernet Automatic Protection Switching Protocol
  • domain 102 is running EAPS.
  • EAPS will break any loops within domain 102 by blocking one or more paths.
  • Domain 102 contains three paths 114 , 120 , and 122 that create a loop. Therefore, EAPS will block one of the paths to eliminate the loop. For example, EAPS may block path 114 . After path 114 is blocked, data may still be forwarded to all three switches 106 , 108 , and 110 through paths 120 and 122 .
  • the protocols running in each domain ensure a loop-free topology inside the domain. However, there may still be inter-domain loops through the switches that are part of more than one domain.
  • switches 106 and 108 are inter-domain switches belonging to domains 102 and 104 .
  • STP ensures a loop-free topology within domain 104 .
  • EAPS ensures a loop-free topology within domain 102 .
  • a logical domain 200 is abstracted from the physical topology.
  • the logical domain 200 contains only inter-domain switches connected by logical links.
  • Each logical link represents one physical loop-free network topology domain.
  • switches 106 and 108 belong to two physical loop-free topology domains 102 and 104 . Therefore, two logical links will be abstracted from the two physical loop-free domains.
  • Logical link 202 represents loop-free domain 102
  • logical link 204 represents loop-free domain 104 .
  • logical links 202 and 204 form a loop within logical domain 200 . Therefore, one of the logical links will be blocked to break the loop.
  • a predetermined criteria is used to determine which logical link to block.
  • each loop-free domain is assigned an identification number (ID).
  • ID an identification number
  • the logical link representing the domain with the highest or lowest ID will be blocked. For example, domain 102 has been assigned ID1 and domain 104 has been assigned ID2. Therefore, when a predetermined criteria has been set to block the domain with the highest ID, domain 104 would be blocked. Since logical link 204 represents domain 104 , logical link 204 is blocked.
  • any loops are eliminated by running STP on the logical domain.
  • This STP instance is conceptually running on top of the loop resolving protocol instances, such as STP instances, inside each physical loop free network topology domain creating a two-level protocol structure.
  • Other protocols that eliminate undesirable loops such as EAPS and Extreme Standby Router Protocol (ESRP), may be run on the logical domain.
  • EAPS and Extreme Standby Router Protocol ESRP
  • FIG. 3 illustrates an example of the hierarchy of loop resolving protocols according to one embodiment of the invention.
  • a STP instance 300 is running on the logical domain on top of the STP instances 302 , 304 and 306 and EAPS instances 308 and 310 running inside each of the physical loop-free network topology domains, creating a two-level protocol structure.
  • Messages for the logical domain are generated, received, and processed only by the inter-domain switches and are flooded in the physical loop-free network topology domains during transmission to determine the logical ports to be blocked.
  • FIG. 4 illustrates the mapping of logical ports in the logical domain to physical ports in the network according to one embodiment of the invention.
  • Each switch in a loop-free domain contains one or more physical ports (PP).
  • PP physical ports
  • switch 106 contains physical ports 150 , 152 , and 154
  • switch 108 contains physical ports 156 , 158 , and 160
  • switch 110 contains physical ports 162 and 164
  • switch 112 contains physical ports 166 and 168 .
  • Each switch in the logical domain contains one or more logical ports (LP).
  • switch 106 contains logical ports 220 and 222
  • switch 108 contains logical ports 224 and 226 .
  • each logical port is mapped to a physical port of the same domain (shown by dotted lines in FIG. 3).
  • the mapping is determined by the unique forwarding path from the inter-domain switch that the logical port belongs to a connecting inter-domain switch.
  • switch 106 has two logical ports 220 and 222 and three physical ports 150 , 152 , and 154 .
  • Ports 150 , 152 , and 220 belong to loop-free domain 102
  • ports 154 and 222 belong to loop-free domain 104 .
  • logical port 222 can only map to physical port 154 .
  • Logical port 220 could potentially map to physical port 150 or physical port 152 .
  • path 114 has been blocked by EAPS running in loop-free domain 102 . Therefore, the forwarding path from inter-domain switch 106 to inter-domain switch 108 is through port 152 .
  • Logical port 220 is therefore mapped to physical port 152 .
  • logical port 224 is mapped to physical port 156
  • logical port 226 is mapped to physical port 160 .
  • each abstracted logical link represents one of the multiple domains that the inter-domain switches belong to.
  • each logical port in the logical domain is mapped to a physical port associated with the same inter-domain switch and loop-free network topology domain. If there is more than one physical port that can map to the logical port, the mapping may be determined by the unique forwarding paths from the inter-domain switch that the logical port belongs to a connecting inter-domain switch.
  • loops formed by logical links in the logical domain are eliminated.
  • One or more logical links are blocked to break the loops.
  • loops are eliminated by running STP in the logical domain. STP selects a single path for continued transmission of data and blocks all other redundant paths to prevent undesirable loops within the logical domain.
  • Other protocols that eliminate loops in a domain such as EAPS and ESRP may be run in the logical domain.
  • the logical links are blocked by blocking the logical ports associated with the logical links. When more than one logical link may be blocked in order to break a loop, a predetermined criteria is used to determine which logical link to block. In one embodiment, each loop-free domain is assigned an ID, and the logical link representing the domain with the highest or lowest ID is blocked.
  • FIG. 6 is a block diagram illustrating a suitable computing environment in which certain aspects of the illustrated invention may be practiced.
  • the method of the invention may be implemented on a computer system 600 having components 602 - 612 , including a processor 602 , a memory 604 , an Input/Output device 606 , a data storage 612 , and a network interface 610 , coupled to each other via a bus 608 .
  • the components perform their conventional functions known in the art and provide the means for implementing an embodiment of the invention.
  • the network interface 610 may include the physical ports of the switches, the processor 602 may process the abstraction of the logical domain, the memory 604 and data storage 612 may store data and instructions such information about the logical domain, including logical ports, the domain identification numbers, and the predetermined criteria for determining which logical link to block.
  • these components represent a broad category of hardware systems, including but not limited to general purpose computer systems and specialized packet forwarding devices. It is to be appreciated that various components of computer system 600 may be rearranged, and that certain implementations of the present invention may not require nor include all of the above components.
  • additional components may be included in system 600 , such as additional processors (e.g., a digital signal processor), storage devices, memories, and network or communication interfaces.
  • the content for implementing an embodiment of the invention may be provided by any machine-readable media which can store data that is accessible by network 100 , as part of or in addition to memory, including but not limited to cartridges, magnetic cassettes, flash memory cards, digital video disks, random access memories (RAMs), read-only memories (ROMs), and the like.
  • the network 100 is equipped to communicate with such machine-readable media in a manner well-known in the art.
  • the content for implementing an embodiment of the invention may be provided to the network 100 from any external device capable of storing the content and communicating the content to the network 100 .
  • the network 100 may be connected to another network, and the content may be stored on any device in the other network.

Abstract

A method and system is provided for inter-domain loop protection using a hierarchy of loop resolving protocols. The method includes receiving messages from inter-domain switches. The inter-domain switches belong to a plurality of loop-free network topology domains. A logical domain is abstracted that includes the inter-domain switches and logical links that connect the switches. Each logical link represents one of the physical loop free network topology domains that the inter-domain switches belong to. Then, the loops in the logical domain are eliminated. One or more logical links and ports associated with those logical links may be blocked to break the loops. This provides for a network free of inter-domain loops.

Description

    BACKGROUND
  • 1. Technical Field [0001]
  • The invention relates to the field of loop free network topology domains. In particular, the invention relates to inter-domain loop protection using a hierarchy of loop resolving protocols. [0002]
  • 2. Background Information and Description of Related Art [0003]
  • A virtual local area network (VLAN) restricts communication between computers in a network on some network administrator defined basis rather than, for example, the physical location of the computers. The computers in the VLAN communicate with each other as if they are connected to the same local area network (LAN) segment even though they may actually be physically located on different segments of an internetwork. Conversely, computers connected to the same network segment may not necessarily be able to communicate with each other if, for example, they belong to different VLANs. [0004]
  • Networks, such as LANs, are often partitioned into separate segments to increase network performance. Bridges or switches connect the segments. A LAN may include redundant bridges and paths to provide backup in the event of a bridge or path failure in the LAN. The Spanning Tree Protocol (STP), part of the Institute of Electrical and Electronics Engineers (IEEE) 802.1D standard, authored and published by the IEEE Standards Association in June 1998, comprises an algorithm that provides for this redundancy while preventing undesirable loops in the LAN. Using the algorithm, bridges select a root bridge, and calculate and select a single path to the root bridge when faced with multiple redundant paths. After path costs are calculated and a single path is selected, the bridges block the redundant links. [0005]
  • There are other algorithms that prevents undesirable loops in a network. For example, the Ethernet Automatic Protection Switching Protocol (EAPS) prevents loops in a Layer-2 (L2) network having a ring topology. In the EAPS system, there is a master node linked to at least one transit node in a ring network. Each node has a primary port and a secondary port. During normal operation, the master node blocks data traffic from traversing its secondary port. During a network failure, the master node reroutes data traffic through its secondary port. Thus, similar to STP, EAPS blocks ports to prevent loops and provide a loop free domain. [0006]
  • These algorithms have been modified in different ways to further accommodate VLANs. For example, the IEEE 802.1Q standard, authored and published by the IEEE Standards Association in March 1999, specifies a single STP instance for all VLANs while another approach provides for a separate STP instance for each VLAN. Yet another approach contemplates one or more STP instances for one or more VLANs. Thus, an STP instance or STP domain (STPD) may span multiple VLANs, or a single VLAN may encompass multiple STPDs. [0007]
  • Similarly, other algorithms, such as EAPS provide for a domain to span multiple VLANs, or a single VLAN to encompass multiple loop free domains. However, one problem with multiple loop free domains is the possibility of inter-domain loops through the switches that are members of more than one loop free domain, since algorithms, such as STP and EAPS, only guarantees a loop-free topology inside each domain. Furthermore, a network, such as a VLAN, may contain different types of loop free domains with the possibility of inter-domain loops through switches that are members of more than one type of loop free domain. [0008]
  • SUMMARY
  • According to one aspect of the invention, a method and system is provided for inter-domain loop protection using a hierarchy of loop resolving protocols. The method includes receiving messages from inter-domain switches. The inter-domain switches belong to a plurality of physical loop-free network topology domains. A logical domain is abstracted that includes the inter-domain switches and logical links that connect the switches. Each logical link represents one of the physical loop free network topology domains to which the inter-domain switches belong. One or more logical links and ports associated with those logical links may be blocked to break any loops. Thus, the loops in the logical domain are eliminated. [0009]
  • According to one aspect of the invention, apparatus are provided to carry out the above and other methods. [0010]
  • BRIEF DESCRIPTION OF DRAWINGS
  • The invention may best be understood by referring to the following description and accompanying drawings that are used to illustrate embodiments of the invention. In the drawings: [0011]
  • FIG. 1 illustrates an example of a network implementing one embodiment of the invention. [0012]
  • FIG. 2 illustrates an example of a logic domain according to an embodiment of the invention. [0013]
  • FIG. 3 illustrates an example of a hierarchy of loop resolving protocols according to one embodiment of the invention. [0014]
  • FIG. 4 illustrates the mapping of logical ports in the logical domain to physical ports in the network according to one embodiment of the invention. [0015]
  • FIG. 5 is a flow diagram illustrating a method according to an embodiment of the invention. [0016]
  • FIG. 6 is a block diagram illustrating a suitable computing environment in which certain aspects of the illustrated invention may be practiced. [0017]
  • DETAILED DESCRIPTION
  • Embodiments of a system and method for inter-domain loop protection using a hierarchy of loop resolving protocols are described. In the following description, numerous specific details are set forth. However, it is understood that embodiments of the invention may be practiced without these specific details. In other instances, well-known circuits, structures and techniques have not been shown in detail in order not to obscure the understanding of this description. [0018]
  • Reference throughout this specification to “one embodiment” or “an embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the invention. Thus, the appearances of the phrases “in one embodiment” or “in an embodiment” in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. [0019]
  • Referring to FIG. 1, a block diagram illustrates a [0020] network 100 according to one embodiment of the invention. Those of ordinary skill in the art will appreciate that the network 100 may include more components than those shown in FIG. 1. However, it is not necessary that all of these generally conventional components be shown in order to disclose an illustrative embodiment for practicing the invention.
  • [0021] Network 100 contains at least two loop-free network topology domains 102 and 104. Network 100 may contain one or more virtual local area networks (VLANs) that span one or more of the loop-free network topology domains. The loop-free network topology domains contain one or more switches. For example, loop-free domain 102 contains switches 106, 108, and 110, and loop-free domain 104 contains switches 106, 108, and 112. Each loop-free network topology domain may be assigned an identification number (ID). For example, domain 102 has been assigned ID1 (130) and domain 104 has been assigned ID2 (132).
  • In one embodiment, one or more of the loop-free domains are maintained loop-free in accordance with a Spanning Tree Protocol (STP). For example, suppose loop-[0022] free domain 104 is a STP domain. In this case, the STP algorithm running in domain 104 will break any loops within domain 104 by blocking one or more paths. Since there are only two paths in domain 104, path 116 and path 118, there are no loops within domain 104. Therefore, no path needs to be blocked.
  • In one embodiment, one or more of the loop-free domains are maintained loop-free in accordance with an Ethernet Automatic Protection Switching Protocol (EAPS). For example, suppose [0023] domain 102 is running EAPS. EAPS will break any loops within domain 102 by blocking one or more paths. Domain 102 contains three paths 114, 120, and 122 that create a loop. Therefore, EAPS will block one of the paths to eliminate the loop. For example, EAPS may block path 114. After path 114 is blocked, data may still be forwarded to all three switches 106, 108, and 110 through paths 120 and 122.
  • The protocols running in each domain ensure a loop-free topology inside the domain. However, there may still be inter-domain loops through the switches that are part of more than one domain. For example, switches [0024] 106 and 108 are inter-domain switches belonging to domains 102 and 104. STP ensures a loop-free topology within domain 104. EAPS ensures a loop-free topology within domain 102. However, there is still an inter-domain loop through switches 106, 108 and 112 formed by paths 116, 118 and 122. Since path 114 has already been blocked by EAPS running in domain 102, there is no loop formed by paths 120, 122, and 114.
  • Referring to FIG. 2, an example of a logical domain according to one embodiment of the invention is shown. In order to break any inter-domain loops, a [0025] logical domain 200 is abstracted from the physical topology. The logical domain 200 contains only inter-domain switches connected by logical links. Each logical link represents one physical loop-free network topology domain. For example, switches 106 and 108 belong to two physical loop- free topology domains 102 and 104. Therefore, two logical links will be abstracted from the two physical loop-free domains. Logical link 202 represents loop-free domain 102, and logical link 204 represents loop-free domain 104.
  • After [0026] logical domain 200 is abstracted, one or more logical links in the logical domain will be blocked to break any loops within the logical domain. As an example, logical links 202 and 204 form a loop within logical domain 200. Therefore, one of the logical links will be blocked to break the loop. When there is more than one logical link that may be blocked to break a loop, a predetermined criteria is used to determine which logical link to block. In one embodiment, each loop-free domain is assigned an identification number (ID). When more than one logical link may be blocked to break a loop, the logical link representing the domain with the highest or lowest ID will be blocked. For example, domain 102 has been assigned ID1 and domain 104 has been assigned ID2. Therefore, when a predetermined criteria has been set to block the domain with the highest ID, domain 104 would be blocked. Since logical link 204 represents domain 104, logical link 204 is blocked.
  • In one embodiment, any loops are eliminated by running STP on the logical domain. This STP instance is conceptually running on top of the loop resolving protocol instances, such as STP instances, inside each physical loop free network topology domain creating a two-level protocol structure. Other protocols that eliminate undesirable loops, such as EAPS and Extreme Standby Router Protocol (ESRP), may be run on the logical domain. [0027]
  • FIG. 3 illustrates an example of the hierarchy of loop resolving protocols according to one embodiment of the invention. As shown, a [0028] STP instance 300 is running on the logical domain on top of the STP instances 302, 304 and 306 and EAPS instances 308 and 310 running inside each of the physical loop-free network topology domains, creating a two-level protocol structure. Messages for the logical domain are generated, received, and processed only by the inter-domain switches and are flooded in the physical loop-free network topology domains during transmission to determine the logical ports to be blocked.
  • FIG. 4 illustrates the mapping of logical ports in the logical domain to physical ports in the network according to one embodiment of the invention. Each switch in a loop-free domain contains one or more physical ports (PP). For example, switch [0029] 106 contains physical ports 150, 152, and 154, switch 108 contains physical ports 156, 158, and 160, switch 110 contains physical ports 162 and 164, and switch 112 contains physical ports 166 and 168. Each switch in the logical domain contains one or more logical ports (LP). For example, switch 106 contains logical ports 220 and 222, and switch 108 contains logical ports 224 and 226.
  • During abstraction of the logical domain, each logical port is mapped to a physical port of the same domain (shown by dotted lines in FIG. 3). When there is more than one physical port of the same domain that a logical port could potentially be mapped to, the mapping is determined by the unique forwarding path from the inter-domain switch that the logical port belongs to a connecting inter-domain switch. For example, switch [0030] 106 has two logical ports 220 and 222 and three physical ports 150, 152, and 154. Ports 150, 152, and 220 belong to loop-free domain 102, and ports 154 and 222 belong to loop-free domain 104. Since each logical port can only map to a physical port belonging to the same loop-free domain, logical port 222 can only map to physical port 154. Logical port 220 could potentially map to physical port 150 or physical port 152. However, path 114 has been blocked by EAPS running in loop-free domain 102. Therefore, the forwarding path from inter-domain switch 106 to inter-domain switch 108 is through port 152. Logical port 220 is therefore mapped to physical port 152. By the same reasoning, logical port 224 is mapped to physical port 156, and logical port 226 is mapped to physical port 160.
  • In order to block one or more logical links in the logical domain to break any loops, the corresponding logical port is blocked. Then, the logical port is mapped back to a physical port in the network, and the corresponding physical port is blocked. For example, suppose that STP determines that [0031] logical link 204 should be blocked to break the loop in logical domain 200. Logical port 226 corresponds to logical link 204, so logical port 226 is blocked in order to block logical link 204. Logical port 226 maps to physical port 160, so physical port 160 is blocked. By blocking physical port 160, path 116 is blocked, so there is no longer a loop through paths 122, 118, and 116. Therefore, there are no longer any inter-domain loops in network 100.
  • Referring to FIG. 5, a method according to one embodiment of the invention is shown. At [0032] 500, messages are received from inter-domain switches. In one embodiment, the messages are flooded through the physical loop-free network topology domains to determine the logical ports to be blocked. At 502, a logical domain is abstracted from the inter-domain switches and logical links connecting the inter-domain switches. In one embodiment, each abstracted logical link represents one of the multiple domains that the inter-domain switches belong to. In one embodiment, at 504, each logical port in the logical domain is mapped to a physical port associated with the same inter-domain switch and loop-free network topology domain. If there is more than one physical port that can map to the logical port, the mapping may be determined by the unique forwarding paths from the inter-domain switch that the logical port belongs to a connecting inter-domain switch.
  • Then, at [0033] 506, loops formed by logical links in the logical domain are eliminated. One or more logical links are blocked to break the loops. In one embodiment, loops are eliminated by running STP in the logical domain. STP selects a single path for continued transmission of data and blocks all other redundant paths to prevent undesirable loops within the logical domain. Other protocols that eliminate loops in a domain, such as EAPS and ESRP may be run in the logical domain. At 508, the logical links are blocked by blocking the logical ports associated with the logical links. When more than one logical link may be blocked in order to break a loop, a predetermined criteria is used to determine which logical link to block. In one embodiment, each loop-free domain is assigned an ID, and the logical link representing the domain with the highest or lowest ID is blocked.
  • FIG. 6 is a block diagram illustrating a suitable computing environment in which certain aspects of the illustrated invention may be practiced. In one embodiment, the method of the invention may be implemented on a [0034] computer system 600 having components 602-612, including a processor 602, a memory 604, an Input/Output device 606, a data storage 612, and a network interface 610, coupled to each other via a bus 608. The components perform their conventional functions known in the art and provide the means for implementing an embodiment of the invention. For example, the network interface 610 may include the physical ports of the switches, the processor 602 may process the abstraction of the logical domain, the memory 604 and data storage 612 may store data and instructions such information about the logical domain, including logical ports, the domain identification numbers, and the predetermined criteria for determining which logical link to block. Collectively, these components represent a broad category of hardware systems, including but not limited to general purpose computer systems and specialized packet forwarding devices. It is to be appreciated that various components of computer system 600 may be rearranged, and that certain implementations of the present invention may not require nor include all of the above components. Furthermore, additional components may be included in system 600, such as additional processors (e.g., a digital signal processor), storage devices, memories, and network or communication interfaces.
  • As will be appreciated by those skilled in the art, the content for implementing an embodiment of the invention, for example, computer program instructions, may be provided by any machine-readable media which can store data that is accessible by [0035] network 100, as part of or in addition to memory, including but not limited to cartridges, magnetic cassettes, flash memory cards, digital video disks, random access memories (RAMs), read-only memories (ROMs), and the like. In this regard, the network 100 is equipped to communicate with such machine-readable media in a manner well-known in the art.
  • It will be further appreciated by those skilled in the art that the content for implementing an embodiment of the invention may be provided to the [0036] network 100 from any external device capable of storing the content and communicating the content to the network 100. For example, in one embodiment, the network 100 may be connected to another network, and the content may be stored on any device in the other network.
  • The above description of illustrated embodiments of the invention, including what is described in the abstract, is not intended to be exhaustive or to limit the invention to the precise forms disclosed. While specific embodiments of, and examples for, the invention are described herein for illustrative purposes, various equivalent modifications are possible within the scope of the invention, as those skilled in the relevant art will recognize. [0037]
  • These modifications can be made to the invention in light of the above detailed description. The terms used in the following claims should not be construed to limit the invention to the specific embodiments disclosed in the specification and the claims. Rather, the scope of the invention is to be determined entirely by the following claims, which are to be construed in accordance with established doctrines of claim interpretation. [0038]

Claims (23)

What is claimed is:
1. A method comprising:
receiving messages from at least two inter-domain switches, wherein each switch is a member of at least one virtual local area network and a plurality of physical loop free network topology domains;
abstracting a logical domain, wherein the logical domain comprises the inter-domain switches and at least one logical link that connects the inter-domain switches, each logical link representing one of the plurality of physical loop free network topology domains; and
eliminating loops formed by the logical links in the logical domain.
2. The method of claim 1, wherein eliminating loops formed by the logical links in the logical domain comprises running a Spanning Tree Protocol on the logical domain.
3. The method of claim 1, wherein abstracting the logical domain further comprises mapping a logical port of the logical domain to a physical port associated with the same inter-domain switch and the same loop-free network topology domain.
4. The method of claim 3, wherein mapping a logical port of the logical domain to a physical port comprises mapping a logical port of the logical domain to a physical port based on the forwarding path from the inter-domain switch that the logical port belongs to another connecting inter-domain switch.
5. The method of claim 3, wherein eliminating loops formed by the logical links in the logical domain comprises blocking one or more logical ports.
6. The method of claim 5, wherein abstracting the logical domain further comprises flooding messages through the physical loop-free network topology domains to determine the logical ports to be blocked.
7. The method of claim 5, further comprising blocking the physical ports that are mapped to the blocked logical ports.
8. The method of claim 1, wherein eliminating loops formed by the logical links in the logical domain further comprises determining which logical link to block based on a predetermined criteria when more than one logical link may be blocked to break a loop.
9. The method of claim 8, wherein each loop-free network topology domain is assigned an identification number and determining which logical link to block based on a predetermined criteria comprises determining which logical link to block based on which loop-free network topology domain has the higher identification number.
10. The method of claim 1, wherein the physical loop free network topology domains are maintained loop free in accordance with a Spanning Tree Protocol.
11. The method of claim 1, wherein the physical loop free network topology domains are maintained loop free in accordance with an Ethernet Automatic Protection Switching Protocol.
12. A network comprising:
a plurality of physical loop free network topology domains;
inter-domain switches, wherein each inter-domain switch is a member of at least two of the plurality of physical loop free network topology domains; and
a logical domain abstracted from the inter-domain switches and logical links connecting the inter-domain switches, wherein each logical link represents one of the plurality of physical loop free network topology domains.
13. The network of claim 12, wherein the logical domain is a loop free domain achieved in accordance with a Spanning Tree Protocol.
14. The network of claim 12, wherein the inter-domain switches include at least one physical port and the logical domain includes at least one logical port, wherein each logical port is mapped to a physical port associated with the same loop-free network topology domain.
15. The network of claim 12, wherein the physical loop free network topology domains are maintained loop free in accordance with a Spanning Tree Protocol.
16. The network of claim 12, wherein the physical loop free network topology domains are maintained loop free in accordance with an Ethernet Automatic Protection Switching Protocol.
17. An article of manufacture comprising:
a machine accessible medium including content that when accessed by a machine causes the machine to:
receive messages from at least two inter-domain switches, wherein each switch is a member of at least one virtual local area network and a plurality of physical loop free network topology domains;
abstract a logical domain, wherein the logical domain comprises the inter-domain switches and at least one logical link that connects the inter-domain switches, each logical link representing one of the plurality of physical loop free network topology domains; and
eliminate loops formed by the logical links in the logical domain.
18. The article of manufacture of claim 17, wherein a machine accessible medium comprising content that when accessed by a machine causes the machine to eliminate loops formed by the logical links in the logical domain comprises a machine accessible medium comprising content that when accessed by a machine causes the machine to run a Spanning Tree Protocol on the logical domain.
19. The article of manufacture of claim 17, wherein a machine accessible medium comprising content that when accessed by a machine causes the machine to abstract a logical domain further comprises a machine accessible medium comprising content that when accessed by a machine causes the machine to map a logical port of the logical domain to a physical port associated with the same inter-domain switch and the same loop free network topology domain.
20. The article of manufacture of claim 19, wherein a machine accessible medium comprising content that when accessed by a machine causes the machine to eliminate loops formed by the logical links in the logical domain comprises a machine accessible medium comprising content that when accessed by a machine causes the machine to block one or more logical ports.
21. The article of manufacture of claim 20, further comprising a machine accessible medium comprising content that when accessed by a machine causes the machine to block the physical ports that are mapped to the blocked logical ports.
22. The article of manufacture of claim 17, wherein the physical loop free network topology domains are maintained loop free in accordance with a Spanning Tree Protocol.
23. The article of manufacture of claim 17, wherein the physical loop free network topology domains are maintained loop free in accordance with an Ethernet Automatic Protection Switching Protocol.
US10/157,568 2002-05-28 2002-05-28 Method and system for inter-domain loop protection using a hierarchy of loop resolving protocols Abandoned US20030223379A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US10/157,568 US20030223379A1 (en) 2002-05-28 2002-05-28 Method and system for inter-domain loop protection using a hierarchy of loop resolving protocols
US10/172,487 US7126923B1 (en) 2002-05-28 2002-06-13 Method and system for inter-domain loop protection using a hierarchy of loop resolving protocols

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US10/157,568 US20030223379A1 (en) 2002-05-28 2002-05-28 Method and system for inter-domain loop protection using a hierarchy of loop resolving protocols

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US10/172,487 Continuation US7126923B1 (en) 2002-05-28 2002-06-13 Method and system for inter-domain loop protection using a hierarchy of loop resolving protocols

Publications (1)

Publication Number Publication Date
US20030223379A1 true US20030223379A1 (en) 2003-12-04

Family

ID=29582497

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/157,568 Abandoned US20030223379A1 (en) 2002-05-28 2002-05-28 Method and system for inter-domain loop protection using a hierarchy of loop resolving protocols
US10/172,487 Active 2025-04-11 US7126923B1 (en) 2002-05-28 2002-06-13 Method and system for inter-domain loop protection using a hierarchy of loop resolving protocols

Family Applications After (1)

Application Number Title Priority Date Filing Date
US10/172,487 Active 2025-04-11 US7126923B1 (en) 2002-05-28 2002-06-13 Method and system for inter-domain loop protection using a hierarchy of loop resolving protocols

Country Status (1)

Country Link
US (2) US20030223379A1 (en)

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040223503A1 (en) * 2003-05-06 2004-11-11 Overture Networks, Inc. Protected switching ring
US20050013260A1 (en) * 2003-06-09 2005-01-20 Foundry Networks, Inc. System and method for multiple spanning tree protocol domains in a virtual local area network
US20050201409A1 (en) * 2003-05-06 2005-09-15 Overture Networks, Inc. Apparatus and method for rapid detection of unidirectional breaks in a network ring
US20050243823A1 (en) * 2003-05-06 2005-11-03 Overture Networks, Inc. Multipoint protected switching ring
WO2006077001A1 (en) * 2005-01-20 2006-07-27 Nokia Siemens Networks Gmbh & Co. Kg A method of operating a node in a communications network
US20060215546A1 (en) * 2005-03-28 2006-09-28 Fujitsu Limited Data relay apparatus and failure recovery method
US20070047472A1 (en) * 2005-08-30 2007-03-01 Lionel Florit System and method for implementing multiple ring networks using a common link
US20070165532A1 (en) * 2006-01-17 2007-07-19 Cisco Technology, Inc. Techniques for detecting loop-free paths that cross routing information boundaries
US20070253346A1 (en) * 2006-05-01 2007-11-01 Cisco Technology, Inc. Detection of potential forwarding loops in bridged networks
US20080062947A1 (en) * 2006-09-12 2008-03-13 Alvaro Retana Method and Apparatus for Passing Routing Information Among Mobile Routers
US20080062874A1 (en) * 2006-09-11 2008-03-13 Fujitsu Limited Network monitoring device and network monitoring method
US20080130500A1 (en) * 2006-11-30 2008-06-05 Alvaro Retana Automatic Overlapping Areas that Flood Routing Information
US20080130503A1 (en) * 2006-12-01 2008-06-05 Gideon Kaempfer Method and system for forwarding ethernet frames over redundant networks with all links enabled
DE102007021922A1 (en) * 2007-05-10 2008-11-13 Siemens Ag A packet switched communication network and method for reconfiguring the communication network
CN100444558C (en) * 2006-06-07 2008-12-17 杭州华三通信技术有限公司 Method for backup of main station point and backup station point
US20090059800A1 (en) * 2007-08-30 2009-03-05 Nortel Networks Limited Method and apparatus for managing the interconnection between network domains
WO2009032648A1 (en) * 2007-08-30 2009-03-12 Motorola, Inc. Method and device for providing a bridge in a network
US20090086663A1 (en) * 2007-09-27 2009-04-02 Kah Kin Ho Selecting Aggregation Nodes in a Network
US20090116405A1 (en) * 2005-06-29 2009-05-07 Abb Oy Redundant Automation Data Communications Network
US7558205B1 (en) * 2003-08-01 2009-07-07 Foundry Networks, Inc. System and method for detecting and isolating a remote loop
US7564858B1 (en) 2003-08-01 2009-07-21 Foundry Networks, Inc. System and method for enabling a remote instance of a loop avoidance protocol
US20100008231A1 (en) * 2006-08-29 2010-01-14 Cisco Technology, Inc. Method and Apparatus for Automatic Sub-Division of Areas that Flood Routing Information
EP2204947A1 (en) * 2007-12-12 2010-07-07 Huawei Technologies Co., Ltd. Method and node device of ethernet failure detecting and converging
CN101296150B (en) * 2007-04-29 2011-05-11 中兴通讯股份有限公司 Method and device for implementing service intercommunication by ZESR and STP mixed networking
US20110267979A1 (en) * 2009-10-07 2011-11-03 Nec Corporation Communication system control apparatus, control method, and program
CN102724096A (en) * 2012-06-26 2012-10-10 华为技术有限公司 Mixed ring network protection method and network equipment
US20140064157A1 (en) * 2011-05-16 2014-03-06 Alcatel-Lucent Method and apparatus for providing bidirectional communication between segments of a home network

Families Citing this family (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030048501A1 (en) * 2001-09-12 2003-03-13 Michael Guess Metropolitan area local access service system
US7209435B1 (en) 2002-04-16 2007-04-24 Foundry Networks, Inc. System and method for providing network route redundancy across Layer 2 devices
US8462668B2 (en) 2002-10-01 2013-06-11 Foundry Networks, Llc System and method for implementation of layer 2 redundancy protocols across multiple networks
US7443845B2 (en) * 2002-12-06 2008-10-28 Cisco Technology, Inc. Apparatus and method for a lightweight, reliable, packet-based transport protocol
US7475142B2 (en) * 2002-12-06 2009-01-06 Cisco Technology, Inc. CIFS for scalable NAS architecture
US7672228B1 (en) * 2003-03-19 2010-03-02 Extreme Networks, Inc. System and method for network loop detection and recovery
IL155449A (en) * 2003-04-15 2008-06-05 Eci Telecom Ltd Technology for improving stp protocols in ethernet networks supporting vlans
US8526427B1 (en) 2003-10-21 2013-09-03 Cisco Technology, Inc. Port-based loadsharing for a satellite switch
US8990430B2 (en) * 2004-02-19 2015-03-24 Cisco Technology, Inc. Interface bundles in virtual network devices
US8208370B1 (en) 2004-03-31 2012-06-26 Cisco Technology, Inc. Method and system for fast link failover
US7889733B2 (en) 2004-04-28 2011-02-15 Cisco Technology, Inc. Intelligent adjunct network device
US7706364B2 (en) * 2004-05-19 2010-04-27 Cisco Technology, Inc. Virtual network device clusters
US7710957B2 (en) * 2004-05-19 2010-05-04 Cisco Technology, Inc. System and method for implementing multiple spanning trees per network
US7436836B2 (en) 2004-06-30 2008-10-14 Cisco Technology, Inc. Method and apparatus for detecting support for a protocol defining supplemental headers
US7808983B2 (en) 2004-07-08 2010-10-05 Cisco Technology, Inc. Network device architecture for centralized packet processing
US8730976B2 (en) 2004-08-17 2014-05-20 Cisco Technology, Inc. System and method for preventing erroneous link aggregation due to component relocation
CN102217228B (en) 2007-09-26 2014-07-16 Nicira股份有限公司 Network operating system for managing and securing networks
US8004966B2 (en) 2008-04-25 2011-08-23 Calix, Inc. Efficient management of ring networks
US7881228B2 (en) * 2008-07-23 2011-02-01 Hewlett-Packard Development Company, L.P. System and method for broadcast pruning in Ethernet based provider bridging network
CA3081255C (en) 2009-04-01 2023-08-22 Nicira, Inc. Method and apparatus for implementing and managing virtual switches
US8654630B2 (en) 2010-03-19 2014-02-18 Brocade Communications Systems, Inc. Techniques for link redundancy in layer 2 networks
US10103939B2 (en) 2010-07-06 2018-10-16 Nicira, Inc. Network control apparatus and method for populating logical datapath sets
US8717895B2 (en) 2010-07-06 2014-05-06 Nicira, Inc. Network virtualization apparatus and method with a table mapping engine
US9680750B2 (en) 2010-07-06 2017-06-13 Nicira, Inc. Use of tunnels to hide network addresses
US9525647B2 (en) 2010-07-06 2016-12-20 Nicira, Inc. Network control apparatus and method for creating and modifying logical switching elements
US8964528B2 (en) 2010-07-06 2015-02-24 Nicira, Inc. Method and apparatus for robust packet distribution among hierarchical managed switching elements
US9043452B2 (en) * 2011-05-04 2015-05-26 Nicira, Inc. Network control apparatus and method for port isolation
EP2745208B1 (en) 2011-08-17 2018-11-28 Nicira, Inc. Distributed logical l3 routing
EP2745473B1 (en) 2011-08-17 2018-09-19 Nicira, Inc. Hierarchical controller clusters for interconnecting different logical domains
US9178833B2 (en) 2011-10-25 2015-11-03 Nicira, Inc. Chassis controller
EP2748978B1 (en) 2011-11-15 2018-04-25 Nicira Inc. Migrating middlebox state for distributed middleboxes
US8750122B1 (en) * 2012-03-22 2014-06-10 Avaya, Inc. Method and apparatus for layer 2 loop prevention in a multi-node switch cluster
CN104170334B (en) 2012-04-18 2017-11-07 Nicira股份有限公司 A kind of method and apparatus for the configuration trustship element for being used to manage network-based control device
US9923760B2 (en) 2015-04-06 2018-03-20 Nicira, Inc. Reduction of churn in a network control system
US10204122B2 (en) 2015-09-30 2019-02-12 Nicira, Inc. Implementing an interface between tuple and message-driven control entities
US11019167B2 (en) 2016-04-29 2021-05-25 Nicira, Inc. Management of update queues for network controller

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4706080A (en) * 1985-08-26 1987-11-10 Bell Communications Research, Inc. Interconnection of broadcast networks
US6188694B1 (en) * 1997-12-23 2001-02-13 Cisco Technology, Inc. Shared spanning tree protocol
US6032194A (en) * 1997-12-24 2000-02-29 Cisco Technology, Inc. Method and apparatus for rapidly reconfiguring computer networks
US6898189B1 (en) * 2000-08-23 2005-05-24 Cisco Technology, Inc. Restartable spanning tree for high availability network systems
US6515969B1 (en) * 1999-03-01 2003-02-04 Cisco Technology, Inc. Virtual local area network membership registration protocol for multiple spanning tree network environments
US6963575B1 (en) * 2000-06-07 2005-11-08 Yipes Enterprise Services, Inc. Enhanced data switching/routing for multi-regional IP over fiber network
US6987740B1 (en) * 2000-09-11 2006-01-17 Cisco Technology, Inc. STP root guard
US6937576B1 (en) * 2000-10-17 2005-08-30 Cisco Technology, Inc. Multiple instance spanning tree protocol

Cited By (57)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7339887B2 (en) 2003-05-06 2008-03-04 Overture Networks, Inc. Multipoint protected switching ring
US6928050B2 (en) 2003-05-06 2005-08-09 Overture Networks, Inc. Protected switching ring
US20050201409A1 (en) * 2003-05-06 2005-09-15 Overture Networks, Inc. Apparatus and method for rapid detection of unidirectional breaks in a network ring
US20050243823A1 (en) * 2003-05-06 2005-11-03 Overture Networks, Inc. Multipoint protected switching ring
US7355965B2 (en) 2003-05-06 2008-04-08 Overture Networks, Inc. Apparatus and method for rapid detection of unidirectional breaks in a network ring
US20040223503A1 (en) * 2003-05-06 2004-11-11 Overture Networks, Inc. Protected switching ring
US20050013260A1 (en) * 2003-06-09 2005-01-20 Foundry Networks, Inc. System and method for multiple spanning tree protocol domains in a virtual local area network
US7856490B2 (en) 2003-06-09 2010-12-21 Foundry Networks, Llc System and method for multiple spanning tree protocol domains in a virtual local area network
US8817666B2 (en) 2003-06-09 2014-08-26 Foundry Networks, Llc System and method for multiple spanning tree protocol domains in a virtual local area network
US7627654B2 (en) 2003-06-09 2009-12-01 Foundry Networks, Inc. System and method for multiple spanning tree protocol domains in a virtual local area network
US7564858B1 (en) 2003-08-01 2009-07-21 Foundry Networks, Inc. System and method for enabling a remote instance of a loop avoidance protocol
US20090225668A1 (en) * 2003-08-01 2009-09-10 Jordi Moncada-Elias System and Method For Detecting And Isolating A Remote Loop
US20110064001A1 (en) * 2003-08-01 2011-03-17 Brocade Communications Systems, Inc. System and method for enabling a remote instance of a loop avoidance protocol
US7822049B1 (en) 2003-08-01 2010-10-26 Foundry Networks, Llc System and method for enabling a remote instance of a loop avoidance protocol
US8446819B2 (en) 2003-08-01 2013-05-21 Foundry Networks, Llc System and method for detecting and isolating a remote loop
US8345699B2 (en) 2003-08-01 2013-01-01 Foundry Networks, Llc System and method for enabling a remote instance of a loop avoidance protocol
US7558205B1 (en) * 2003-08-01 2009-07-07 Foundry Networks, Inc. System and method for detecting and isolating a remote loop
US7944816B2 (en) 2003-08-01 2011-05-17 Foundry Networks, Llc System and method for detecting and isolating a remote loop
US20080279203A1 (en) * 2005-01-20 2008-11-13 Nokia Siemens Networks Gmbh & Co. Kg Method of Operating a Node in a Communications Network
WO2006077001A1 (en) * 2005-01-20 2006-07-27 Nokia Siemens Networks Gmbh & Co. Kg A method of operating a node in a communications network
US20060215546A1 (en) * 2005-03-28 2006-09-28 Fujitsu Limited Data relay apparatus and failure recovery method
US8174963B2 (en) * 2005-03-28 2012-05-08 Fujitsu Limited Data relay apparatus and failure recovery method
US20090116405A1 (en) * 2005-06-29 2009-05-07 Abb Oy Redundant Automation Data Communications Network
US8274919B2 (en) 2005-08-30 2012-09-25 Cisco Technology, Inc. System and method for implementing multiple ring networks using a common link
US20070047471A1 (en) * 2005-08-30 2007-03-01 Lionel Florit System and method for implementing virtual ports within ring networks
US7778205B2 (en) * 2005-08-30 2010-08-17 Cisco Technology, Inc. System and method for implementing virtual ports within ring networks
US20070047472A1 (en) * 2005-08-30 2007-03-01 Lionel Florit System and method for implementing multiple ring networks using a common link
US20070165532A1 (en) * 2006-01-17 2007-07-19 Cisco Technology, Inc. Techniques for detecting loop-free paths that cross routing information boundaries
US7889655B2 (en) * 2006-01-17 2011-02-15 Cisco Technology, Inc. Techniques for detecting loop-free paths that cross routing information boundaries
US7453818B2 (en) * 2006-05-01 2008-11-18 Cisco Technology, Inc. Detection of potential forwarding loops in bridged networks
US20070253346A1 (en) * 2006-05-01 2007-11-01 Cisco Technology, Inc. Detection of potential forwarding loops in bridged networks
CN100444558C (en) * 2006-06-07 2008-12-17 杭州华三通信技术有限公司 Method for backup of main station point and backup station point
US8699410B2 (en) 2006-08-29 2014-04-15 Cisco Technology, Inc. Method and apparatus for automatic sub-division of areas that flood routing information
US20100008231A1 (en) * 2006-08-29 2010-01-14 Cisco Technology, Inc. Method and Apparatus for Automatic Sub-Division of Areas that Flood Routing Information
US20080062874A1 (en) * 2006-09-11 2008-03-13 Fujitsu Limited Network monitoring device and network monitoring method
US7899005B2 (en) 2006-09-12 2011-03-01 Cisco Technology, Inc. Method and apparatus for passing routing information among mobile routers
US20080062947A1 (en) * 2006-09-12 2008-03-13 Alvaro Retana Method and Apparatus for Passing Routing Information Among Mobile Routers
US20080130500A1 (en) * 2006-11-30 2008-06-05 Alvaro Retana Automatic Overlapping Areas that Flood Routing Information
US8009591B2 (en) 2006-11-30 2011-08-30 Cisco Technology, Inc. Automatic overlapping areas that flood routing information
US20080130503A1 (en) * 2006-12-01 2008-06-05 Gideon Kaempfer Method and system for forwarding ethernet frames over redundant networks with all links enabled
CN101296150B (en) * 2007-04-29 2011-05-11 中兴通讯股份有限公司 Method and device for implementing service intercommunication by ZESR and STP mixed networking
DE102007021922B4 (en) * 2007-05-10 2012-11-22 Siemens Ag A packet switched communication network and method for reconfiguring the communication network
DE102007021922A1 (en) * 2007-05-10 2008-11-13 Siemens Ag A packet switched communication network and method for reconfiguring the communication network
US20090059800A1 (en) * 2007-08-30 2009-03-05 Nortel Networks Limited Method and apparatus for managing the interconnection between network domains
US9338052B2 (en) 2007-08-30 2016-05-10 Rpx Clearnghouse Llc Method and apparatus for managing the interconnection between network domains
WO2009032648A1 (en) * 2007-08-30 2009-03-12 Motorola, Inc. Method and device for providing a bridge in a network
US8854982B2 (en) * 2007-08-30 2014-10-07 Rockstar Consortium Us Lp Method and apparatus for managing the interconnection between network domains
US20090086663A1 (en) * 2007-09-27 2009-04-02 Kah Kin Ho Selecting Aggregation Nodes in a Network
US7936732B2 (en) 2007-09-27 2011-05-03 Cisco Technology, Inc. Selecting aggregation nodes in a network
EP2204947A4 (en) * 2007-12-12 2011-03-09 Huawei Tech Co Ltd Method and node device of ethernet failure detecting and converging
US20100238800A1 (en) * 2007-12-12 2010-09-23 Huawei Technologies Co., Ltd. Method and Node Device for Fault Detection and Convergence in Ethernet
EP2204947A1 (en) * 2007-12-12 2010-07-07 Huawei Technologies Co., Ltd. Method and node device of ethernet failure detecting and converging
US20110267979A1 (en) * 2009-10-07 2011-11-03 Nec Corporation Communication system control apparatus, control method, and program
US8804487B2 (en) * 2009-10-07 2014-08-12 Nec Corporation Communication system control apparatus, control method, and program
US20140064157A1 (en) * 2011-05-16 2014-03-06 Alcatel-Lucent Method and apparatus for providing bidirectional communication between segments of a home network
US9749118B2 (en) * 2011-05-16 2017-08-29 Alcatel Lucent Method and apparatus for providing bidirectional communication between segments of a home network
CN102724096A (en) * 2012-06-26 2012-10-10 华为技术有限公司 Mixed ring network protection method and network equipment

Also Published As

Publication number Publication date
US7126923B1 (en) 2006-10-24

Similar Documents

Publication Publication Date Title
US7126923B1 (en) Method and system for inter-domain loop protection using a hierarchy of loop resolving protocols
US9391888B2 (en) System and method for implementation of layer 2 redundancy protocols across multiple networks
US6628661B1 (en) Spanning tree recovery in computer networks
US9882838B2 (en) Forwarding inter-switch connection (ISC) frames in a network-to-network interconnect topology
US7532588B2 (en) Network system, spanning tree configuration method and configuration program, and spanning tree configuration node
US6910149B2 (en) Multi-device link aggregation
US7969915B2 (en) Technical enhancements to STP (IEEE 802.1D) implementation
US7499456B2 (en) Multi-tiered virtual local area network (VLAN) domain mapping mechanism
US7440397B2 (en) Protection that automatic and speedily restore of Ethernet ring network
US7627654B2 (en) System and method for multiple spanning tree protocol domains in a virtual local area network
US6639917B1 (en) Converged service for interconnected local area networks
US7752338B2 (en) Ring topology discovery
US7822049B1 (en) System and method for enabling a remote instance of a loop avoidance protocol
EP2274878B1 (en) Reducing traffic loss in an eaps system
US20100232322A1 (en) Node, network system, frame transfer method, and frame transfer program
CN103780419B (en) A kind of distributed aggregated link group business switch method and device
US8861403B2 (en) Interconnecting segmented layer two network for cloud switching
US7657619B1 (en) Method and system for maintaining a loop-free topology across multiple spanning trees in a virtual local area network

Legal Events

Date Code Title Description
AS Assignment

Owner name: EXTREME NETWORKS, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:YANG, XUGUANG;KASHYAP, PRAKASH;REEL/FRAME:012947/0956

Effective date: 20020522

AS Assignment

Owner name: POWER STANDARDS LAB, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MCEACHER, ALEXANDER;REEL/FRAME:013268/0415

Effective date: 20020612

STCB Information on status: application discontinuation

Free format text: EXPRESSLY ABANDONED -- DURING EXAMINATION