US20190116220A1 - Neighbor Discovery for IPV6 Switching Systems - Google Patents
Neighbor Discovery for IPV6 Switching Systems Download PDFInfo
- Publication number
- US20190116220A1 US20190116220A1 US16/218,858 US201816218858A US2019116220A1 US 20190116220 A1 US20190116220 A1 US 20190116220A1 US 201816218858 A US201816218858 A US 201816218858A US 2019116220 A1 US2019116220 A1 US 2019116220A1
- Authority
- US
- United States
- Prior art keywords
- neighbor discovery
- multicast
- router
- packet
- address
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
- H04L45/026—Details of "hello" or keep-alive messages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
- H04L49/50—Overload detection or protection within a single switching element
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2101/00—Indexing scheme associated with group H04L61/00
- H04L2101/60—Types of network addresses
- H04L2101/618—Details of network addresses
- H04L2101/659—Internet protocol version 6 [IPv6] addresses
-
- H04L61/6059—
Definitions
- Neighbor discovery protocol is used by IPv6 protocol for router discovery, address resolution, duplicated address detection, unreachability detection, and other features.
- IPv6 protocol For IPv6 protocol, IPv6 protocol is used by IPv6 protocol for router discovery, address resolution, duplicated address detection, unreachability detection, and other features.
- FIG. 1 illustrates an example network environment for embodiments of this disclosure
- FIG. 2 illustrates the IPv6 address format
- FIG. 3 illustrates an IPv6 address format according to embodiments of this disclosure
- FIG. 5 illustrates an IPv6 address format according to embodiments of this disclosure
- FIG. 6 is a flow chart illustrating embodiments of this disclosure.
- FIG. 7 is a flow chart illustrating embodiments of this disclosure.
- FIG. 10 is a flow chart illustrating embodiments of this disclosure.
- FIG. 12 is a flow chart illustrating embodiments of this disclosure.
- FIG. 13 is a flow chart illustrating embodiments of this disclosure.
- systems and methods are disclosed for resolving a critical scalability issue for multiple switch device systems with VLANs spanning across multiple devices.
- VM virtual machine
- Traditional three-tier network architectures can no longer meet the requirements of these types of networks as more and more switches and routers must be added as the number of VMs grow. Latency, complexity, and cost may increase as well.
- FIG. 1 illustrates an example network environment for embodiments of this disclosure.
- Example networks may be designed with a flattened architecture that consists of a multi device switching system 110 .
- Multi device switching system 110 may comprise a plurality of L2/L3 switching devices 120 a - c .
- Switching devices 120 a - c may each be connected to a number of servers 130 a - f.
- switching devices 120 a - c may be directly linked together or (full-mess or cascade architecture) or through a switching fabric device (hub-spoke architecture) to form a virtual switch. All these switching devices may be controlled by a central controller. Routing protocols may run on the central controller as a single routing entity. All traffic may travel through the system as if switching through a single switching device. In such a switching system, a packet forwarded across switching devices 120 a - c may go through two stages of hardware lookup and forwarding, once at an ingress switching device and once at an egress switching device.
- IPv6 Protocol is designed to support a much greater number of addressable nodes and more capability of addressing hierarchy with a larger address size (128 bits). With the larger IPv6 address space, there is more flexibility for assigning network prefixes and addresses. This creates the possibility for aggregation.
- FIG. 2 illustrates the IPv6 address format.
- the higher N bits may be used to store the subnet prefix 210 .
- Subnet prefix 210 may be the subnet prefix assigned to the L3 interface.
- the remaining 128-N bits may be used to store the interface ID 220 .
- Interface ID 220 may be used to identify the host connected to the L3 interface.
- FIG. 3 illustrates an IPv6 address format according to embodiments of this disclosure.
- the highest N bits may be used to store the subnet prefix 310 .
- the next M bits may be allocated for a port ID 320 .
- the port ID 320 may uniquely identify a particular port associated with a switching device on the network.
- the remaining 128-N-M bits may be used to store the host ID 330 .
- a port prefix may be formed by combining the subnet prefix and the port ID.
- Embodiments described herein may be based on the configuration that a L3 virtual interface consists of multiple L2 switch ports. Furthermore, each of the multiple L2 switch ports may share the same VLAN ID.
- An L2 switch port associated with a switching device may be connected to multiple hosts or VMs.
- the port prefix may be provisioned on a port of a switching device.
- the port prefix length (N+M) may be the same or different on different ports depending upon the number of hosts connected to the port.
- All port prefixes associated with a VLAN interface should be summarized by the subnet prefix on the VLAN interface. All assigned host addresses associated with the port should be summarized by the port prefix configured on the switching device. In some embodiments, subnet prefixes, port prefixes, and host addresses may be assigned through a DHCP server and other network management tools.
- a plurality of L2 ports associated with switching devices may reside on the same VLAN.
- An L3 virtual interface may be configured as described above.
- the L2 ports may be spread across multiple switching devices.
- prior systems could not employ subnet prefix aggregation as the multiple destination switching devices may be associated with the same subnet prefix.
- Embodiments described herein may install a port prefix in FIB CAM tables on all switching devices except for the local switching device.
- a destination port index may be installed as the destination index for the port prefix.
- These port prefix FIB entries may be used for ingress lookup.
- On the egress switching device only local neighbor entries may be installed in the FIB CAM table on the local switching device.
- Neighbor FIB entries may be employed for egress lookup. If both the source and destination are on the same switching device, neighbor FIB entries may be used for FIB lookup as only one FIB lookup is required.
- Subnet prefixes may be installed on a local switching device, where the local switching device is configured to punt the entry neighbor discovery packet to the central controller CPU for processing.
- FIG. 4 illustrates example embodiments of the present disclosure.
- Port prefix PP 1 may be configured on a port associated with a switching device 450 connecting to VM 430 and VM 470 .
- Port prefix PP 1 may be installed in FIB CAM on switching device 410 and switching device 440 . If an IPv6 packet comes from VM 420 with a destination of VM 430 , it may arrive at switching device 410 . The L3 ingress lookup may hit port prefix PP 1 with a destination index pointing to switch device 450 .
- the frame is forwarded to egress at switch device 450 .
- the MAC of the destination has been discovered by the system.
- a L3 egress lookup may then hit the destination CAM entry for VM 430 .
- the packet will subsequently be forwarded to VM 430 .
- Reverse traffic may be forwarded the same way with a port prefix provisioned on switch device 410 and installed in FIB CAM on switching device 450 .
- the subnet prefix configured on the interface with destination port index may be installed on all other associated switch devices.
- a packet arriving at an ingress switch device may hit the subnet prefix.
- the packet may then be forwarded to the egress switch device and reach its final destination.
- the subnet prefix configured on the interface with Ether-channel destination index may be installed on all other associated switch devices.
- a packet arriving at an ingress switch device may hit the subnet prefix.
- the packet may then be forwarded to a switch device depending upon an Ether-channel load balancing algorithm.
- the packet may then be forwarded by the egress switch device based on egress lookup.
- H represents the maximum number of hosts supported.
- F represents the size of the FIB.
- V represents the number of VLANs per port.
- P represents the number of ports per switching device.
- S represents the number of switch devices being employed. For example, with a FIB CAM size of 16,000 IPv6 entries, 100 switch devices, 48 ports per switching device, 1 VLAN per port, 1.1 million hosts may be supported.
- the port prefix may be installed on ingress switch devices based on active traffic flows. For example, the port prefix would only be installed on those switch devices that have active traffic flow. The traffic flow may be monitored and the port prefix should be removed from the ingress switch device if traffic flow stops for a predetermined period of time. With this approach the FIB CAM size may be even smaller if hosts connected to a port device do not communicate with hosts connected to all other ports on other switch devices.
- C % represents the percentage of active traffic flows between ports associated with active switching devices. For example, with a FIB CAM size of 16,000 IPv6 entries, 100 switch devices, 48 ports per switching device, 2 VLANs per port, with 50% active flow, 1.1 million hosts may be supported.
- Embodiments of this disclosure consider the scenarios where port level aggregation may not meet the requirements of a campus or data center environment where many VLANs may be provisioned. As the port prefix should be provisioned on a per-port/per-VLAN basis, the number of port prefixes may grow as the number of VLANs per port grows. In these environments, embodiments may allocate M bits for the device ID from the interface ID space as illustrated in FIG. 5 .
- FIG. 5 illustrates an IPv6 address format according to embodiments of this disclosure.
- the highest N bits may be used to store the subnet prefix 510 .
- the next M bits may be allocated for a device ID 520 .
- the device ID 520 may identify an individual device on the system.
- the remaining 128-N-M bits may be used to store the host ID 530 .
- a device prefix may be formed by combining the subnet prefix and the device ID.
- the approaches for use of the port prefix may be employed with the device prefix.
- the ingress lookup is based on the device prefix as opposed to the port prefix.
- the use of the device prefix also allows for a much higher degree of scalability for systems provisioned with many VLANs.
- the maximum number of hosts that may be supported by embodiments of this disclosure employing the device prefix may be calculated via formula [3]
- FIG. 6 is a flow chart illustrating embodiments of this disclosure.
- Method 600 may begin at step 610 where a first quantity of bits in an IPv6 address may be allocated for storing a subnet prefix. Method 600 may then proceed to step 620 , where a second quantity of bits in the IPv6 address may be allocated for storing a port identifier.
- Method 600 may then proceed to step 630 .
- the remaining bits in the IPv6 address may be allocated for storing a host identifier.
- the IPv6 address is appended to a packet transmitted across a Level-3 virtual interface comprised of a plurality of Layer-2 switch ports.
- Method 600 may then proceed to step 640 where a port prefix may be computed by combining the subnet prefix and the port identifier.
- two or more of the plurality of switching devices may share the same VLAN identification. Furthermore, at least one of the switching devices may be connected to one or more virtual machines. Method 600 may then proceed to step 650 where the port prefix may be installed in FIB CAM tables on a plurality of the switching devices. In some embodiments, all assigned host addresses associated with the port may be summarized by the port prefix.
- FIG. 7 is a flow chart illustrating embodiments of this disclosure.
- Method 700 may begin at step 710 , where one of: a port prefix and/or a device prefix is configured.
- the prefix is determined based on IPv6 address information as described above in regards to FIG. 3 and FIG. 5 .
- the configuration may take place on a switching device.
- the switching device may reside on a path between the first virtual machine and the second virtual machine.
- Method 700 may then proceed to step 720 .
- the prefix may be installed in a FIB CAM at the ingress switching device.
- the prefix may comprise a destination index pointing to an egress switch device.
- Method 700 may then proceed to step 730 , where an IPv6 packet may be received from a first virtual machine addressed to a second virtual machine.
- An embodiment consistent with this disclosure may comprise an apparatus for scaling IPv6 on multiple devices.
- the system may comprise a processor coupled to a memory, wherein the processor is operative to determine a port prefix value based on IPv6 address information.
- the processor may be further configured to install the port prefix value in FIB CAM tables associated with a plurality of connected switching devices.
- the processor may further be configured to use the port prefix value for ingress lookup.
- the apparatus may be a switching device.
- the switching device may reside on the same VLAN as the plurality of connected switching devices.
- the processor may be further configured to punt an entry data packet to a central controller for processing.
- Embodiments described herein disclose a distributed neighbor discovery module where all neighbor discovery operations and functionalities may be distributed to a switch device processor.
- Each neighbor discovery process on a switch device may run as an individual neighbor discovery router node. There may be no coordination between neighbor discovery processes occurring on different switch devices. All other traffic, including both IPv6 control traffic and data traffic destined to the router may be processed by the central controller processor.
- IPv6 neighbor discovery messages may be classified as IPv6 ICMP messages with five reserved ICMP message types.
- the five reserved ICMP message types include router solicitation, router advertisement, neighbor solicitation, neighbor advertisement, and redirect messages.
- IPv6 neighbor discovery packets should be punted to the switch device processor.
- Other IPv6 ICMP packets destined for the router should be punted to the central controller processor.
- the access list contains a list of permitted reserved ICMP message types.
- the access list includes message types which may be identified as “router-solicitation”, “router-advertisement”, “nd-ns” (neighbor solicitation), “nd-na” (neighbor advertisement), and “redirect”.
- the access list should be programmed in hardware with a local CPU as its destination so that packets matching with the access list would be punted to the local CPU. All other control traffic and data traffic should be punted to the central control processor along with the regular FIB entries in hardware.
- Running embodiments of neighbor discovery on a switching device may be relatively simple if the VLAN is local to the switching device. Problems may arise when the VLAN is provisioned across a plurality of switching devices as there may be multiple neighbor discovery router instances exposed to a single VLAN.
- hosts connected to different switching devices must be able to communicate as if they are on the same network segment.
- the hosts may share the same network prefix and use neighbor discovery protocol for router and neighbor discovery.
- the neighbor discovery processes may run on a number of switching devices operating as neighbor discovery router nodes.
- FIG. 8 is a flow chart illustrating embodiments of this disclosure.
- method 800 may begin at step 810 where IPv6 traffic may be received by a network device.
- the IPv6 traffic may contain various type of data and messages including ICMP messages.
- Method 800 may then proceed to step 820 .
- the IPv6 traffic may be directed to a switch device processor running a neighbor discovery process if the IPv6 traffic comprises one or more neighbor discovery messages identified in an access list.
- neighbor discovery messages may be identified by comparing message type values associated with the packets in the IPv6 traffic to the access list.
- the message type values include a plurality of: router solicitation, router advertisement, neighbor solicitation, neighbor advertisement, and redirect messages.
- the access list may be programmed in hardware with a local CPU associated with a switching device as its destination for identified messages.
- the other IPv6 traffic may be sent to a central processor for processing.
- Embodiments of the present disclosure contemplate distributed models to achieve distributed neighbor discovery through a single address model.
- Some embodiments have a number of neighbor discovery processes running on switching devices. Each of the neighbor discovery processes may use the same router IP address and the same router MAC address.
- the router MAC address may be installed in a MAC table.
- the router IP addresses may be installed in FIB CAM.
- Multicast neighbor discovery packets may be sent from a number of hosts. For neighbor discovery packets destined to all nodes (or all routers), the packets should be accepted and handled by the local neighbor discovery process on the local switching device processor. The packets may also be flooded to other hosts through switching devices that have ports belonging to the same VLAN. The packets should not be processed by neighbor discovery processing on other switching devices.
- neighbor discovery packets destined to a solicited-node address they should be accepted and handled by the local neighbor discovery process on the local switching device processor if the destination matches with the local solicited-node address. Otherwise, the packet should be flooded to other hosts on the same VLAN on other switching devices. These packets should not be processed by the processors associated with the other switching devices.
- multicast neighbor discovery packets may be sent from a router. In some embodiments, such packets should only be sent to hosts on the same VLAN connected to the local switching device.
- unicast neighbor discovery packets may be sent from host targets to the router. It may be assumed that the router MAC address has been previously resolved by the hosts. After a unicast neighbor discovery packet is received by a switching device, an L2 lookup may be performed at the switching device which should hit the router MAC address. Hitting the router MAC address may trigger an L3 lookup. The L3 lookup may hit the ACL so that the packet is punted to the switching device's CPU. Unicast packets sent from a router to a number of hosts are handled in a typical way.
- unicast neighbor discovery packets may be sent from host targets to a host connected to another switching device on the same VLAN. After this type of unicast neighbor discovery packet is received by a switching device. The switching device may then perform in hardware an L2 lookup that produces a miss. The packet may then be replicated and flooded to other hosts on the same VLAN using other switching devices.
- FIG. 9 is a flow chart illustrating embodiments of the present disclosure.
- Method 900 may begin at step 910 where a number of neighbor discovery processes using the same router IP address and the same router MAC address may be implemented on a plurality of switching devices.
- a multicast neighbor discovery packet may be received from a host. Then, at step 930 it may be determined if the multicast neighbor discovery packet is destined to a plurality of nodes. If so, method 900 proceeds to step 940 where the multicast neighbor discovery packet may be handled with a local neighbor discovery process.
- method 900 proceeds to step 950 , where it may be determined if the multicast neighbor discovery packet is destined to a solicited node address and the multicast discovery packet destination matches the local solicited node address. If so, method 900 proceeds to step 960 .
- the multicast neighbor discovery packet may be handled with a local neighbor discovery process.
- method 900 may proceed to step 970 .
- the multicast neighbor discovery packet may be flooded to other hosts on the same VLAN associated with the other switching devices.
- FIG. 10 is a flow chart illustrating embodiments of the disclosure.
- Method 1000 may begin at step 1010 when a unicast neighbor discovery packet may be received. Method 1000 may then proceed to step 1020 . At step 1020 , an L2 lookup may be performed for the router MAC address.
- method 1000 may proceed to step 1030 and perform an L3 lookup for a neighbor discovery access list. Upon a hit on the access list, method 1000 may proceed to step 1040 and punt the unicast neighbor discovery packet to a local CPU.
- step 1010 may comprises receiving a unicast neighbor discovery packet from a host target to a host connected to a second switching device on the same VLAN.
- the L2 lookup at step 1020 may produce a miss.
- the unicast neighbor discovery packet may be replicated and flooded to other hosts on the same VLAN.
- Embodiments of the present disclosure contemplate distributed models to achieve distributed neighbor discovery through a multiple address model.
- each neighbor discovery process running on a switching device may have a unique router IP address and a unique router MAC address.
- more than one neighbor discovery process can advertise a router address to the same VLAN as if multiple routers existed on that VLAN.
- Hosts and virtual machines connected to the VLAN may select a router from its router list.
- Embodiments of the disclosure propose to suppress Router Advertisement messages from the neighbor discovery router on the switching devices.
- the default router may be configured on hosts (or VMs) with a management tool, such as DHCP. This may guarantee that a host (or VM) always communicates with the same switching device. This switching device would normally be the switching device the host (or VM) is directly connected to. Such a solution requires minimal implementation effort to configure existing systems.
- router advertisement packets sent from host When multicast neighbor discovery packets are sent from hosts, router advertisement packets sent from host will be dropped. Neighbor Solicitation packets sent from the host should be punted to the switching device CPU if the destination address matches with the local solicited-node multicast address. There may exist some embodiments where the packet may not come from a directly connected host. This scenario may exist for example, in instances of VMotion or system misconfiguration. As such, the switching device should allow for neighbor solicitation packets from hosts which are not directly connected.
- multicast neighbor discovery packets may be sent from a router. Again, router advertisement messages should be suppressed. Neighbor solicitation messages may be flooded to VLAN as usual. If the VLAN crosses multiple switching devices, the neighbor solicitation messages should be flooded to all switching devices that contain members of the VLAN.
- unicast neighbor discovery packets may be sent from host targets to the router. These packets may have the router MAC as the destination MAC. These unicast neighbor discovery packets should be punted to the neighbor discovery processes running on the local switch device as usual. Similar to above, the switching device should allow for neighbor solicitation packets from hosts which are not directly connected. Unicast packets sent from a router to a number of hosts are handled in a typical way.
- unicast neighbor discovery packets may be sent from host targets to a host connected to another switching device on the same VLAN. After this type of unicast neighbor discovery packet is received by a switching device. The switching device may then perform in hardware an L2 lookup that produces a miss. The packet may then be replicated and flooded to other hosts on the same VLAN using other switching devices.
- FIG. 11 is a flow chart illustrating embodiments of this disclosure.
- Method 1100 may start at step 1110 where multicast neighbor discovery packets may be received. After receipt, method 1100 may proceed to step 1120 . At step 1120 , the message type of the multicast neighbor discovery packets may be determined by reference to an access list.
- method 1100 may proceed to step 1130 where multicast neighbor discovery packets identified as router advertisement packets may be dropped. Method 1100 may then proceed to step 1140 where multicast neighbor discovery packets identified as neighbor solicitation packets to a local CPU are punted if the destination address matches the local solicited-node multicast address.
- FIG. 12 is a flow chart illustrating embodiments of this disclosure.
- Method 1200 may start at step 1210 where a unicast neighbor discovery packet with a router MAC as the destination MAC may be received. Upon receipt of the unicast neighbor discovery packet, method 1200 may proceed to step 1220 where the unicast neighbor discovery packet may be punted to the local CPU running a neighbor discovery process.
- Method 1200 may then proceed to step 1230 .
- a unicast neighbor discovery packet may be received from a host target directed to a second host associated with a switching device on the same VLAN.
- Method 1200 will then proceed to step 1240 where a lookup may be performed that produces a miss.
- method 1200 may proceed to step 1250 .
- the unicast neighbor discovery packet may be replicated and flooded to other hosts on the same VLAN.
- the switching device processor should not process any packets other than neighbor discovery packets. All other packets should be handled by the central controlling processor as described in regards to FIG. 13 .
- FIG. 13 illustrates other packet handling according to embodiments described herein.
- Method 1300 may begin at step 1310 where all incoming unicast and multicast packets destined to the router are punted to the central controller processor.
- Method 1300 may proceed to step 1320 .
- step 1320 all outgoing multicast packets may be flooded to the VLAN broadcast domain.
- Method 1300 may then proceed to step 1330 .
- step 1330 the outgoing unicast packets from the central controller processor need to resolve the destination MAC address. By searching in the device/port prefix table, the switch device processor may be found through which the destination may be reached.
- the method may proceed to step 1340 , where a send request for the MAC address to the switch device processor through an internal IPC channel.
- the MAC address When the MAC address is learned from the reply message, it may be stored in a Neighbor Cache on the central controller processor. The MAC address may be used for sending the current and future unicast packets to that destination.
- FIG. 14 illustrates a network device, such as computing device 1400 .
- Computing device 1400 may include processing unit 1425 and memory 1455 .
- Memory 1455 may include software configured to execute application modules such as an operating system 1410 .
- Computing device 1400 may execute, for example, one or more stages included in the methods as described above. Moreover, any one or more of the stages included in the above describe methods may be performed on any element shown in FIG. 14 .
- Computing device 1400 may be implemented using a personal computer, a network computer, a mainframe, a computing appliance, or other similar microcomputer-based workstation.
- the processor may comprise any computer operating environment, such as hand-held devices, multiprocessor systems, microprocessor-based or programmable sender electronic devices, minicomputers, mainframe computers, and the like.
- the processor may also be practiced in distributed computing environments where tasks are performed by remote processing devices.
- the processor may comprise a mobile terminal, such as a smart phone, a cellular telephone, a cellular telephone utilizing wireless application protocol (WAP), personal digital assistant (PDA), intelligent pager, portable computer, a hand held computer, a conventional telephone, a wireless fidelity (Wi-Fi) access point, or a facsimile machine.
- WAP wireless application protocol
- PDA personal digital assistant
- intelligent pager portable computer
- portable computer a hand held computer, a conventional telephone, a wireless fidelity (Wi-Fi) access point, or a facsimile machine.
- Embodiments of the present disclosure are described above with reference to block diagrams and/or operational illustrations of methods, systems, and computer program products according to embodiments of this disclosure.
- the functions/acts noted in the blocks may occur out of the order as shown in any flowchart.
- two blocks shown in succession may in fact be executed substantially concurrently or the blocks may sometimes be executed in the reverse order, depending upon the functionality/acts involved.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
- This application is a divisional of co-pending U.S. patent application Ser. No. 14/264,101, filed Apr. 29, 2014, which is projected to issue on Jan. 1, 2019 as U.S. Pat. No. 10,171,547, which is a divisional of U.S. patent application Ser. No. 13/270,904, filed Oct. 11, 2011, now U.S. Pat. No. 8,713,169, issued Apr. 29, 2014, both of which are entirely incorporated herein by reference.
- Neighbor discovery protocol is used by IPv6 protocol for router discovery, address resolution, duplicated address detection, unreachability detection, and other features. On a switching module capable of supporting a large number of virtual machines and/or hosts, as the number of hosts/virtual machines grows, the amount of neighbor discovery messages exchanged between hosts and a central controller processor may be overwhelming. This can potentially overload the central controller processor and increase the possibility of failures.
- As such, there exists a need for an IPv6 neighbor discovery distribution module that can distribute the neighbor discovery traffic to the various switching devices. This may allow for an increase in scalability and stability for switching modules capable of supporting a large number of virtual machines and/or hosts.
- The accompanying drawings, which are incorporated in and constitute a part of this disclosure, illustrate various embodiments. In the drawings:
-
FIG. 1 illustrates an example network environment for embodiments of this disclosure; -
FIG. 2 illustrates the IPv6 address format; -
FIG. 3 illustrates an IPv6 address format according to embodiments of this disclosure; -
FIG. 4 illustrates example embodiments of the present disclosure; -
FIG. 5 illustrates an IPv6 address format according to embodiments of this disclosure; -
FIG. 6 is a flow chart illustrating embodiments of this disclosure; -
FIG. 7 is a flow chart illustrating embodiments of this disclosure; -
FIG. 8 is a flow chart illustrating embodiments of this disclosure; -
FIG. 9 is a flow chart illustrating embodiments of this disclosure; -
FIG. 10 is a flow chart illustrating embodiments of this disclosure; -
FIG. 11 is a flow chart illustrating embodiments of this disclosure; -
FIG. 12 is a flow chart illustrating embodiments of this disclosure; -
FIG. 13 is a flow chart illustrating embodiments of this disclosure; and -
FIG. 14 is a block diagram of a computing network device. - Consistent with embodiments of the present disclosure, systems and methods are disclosed for resolving a critical scalability issue for multiple switch device systems with VLANs spanning across multiple devices.
- It is to be understood that both the foregoing general description and the following detailed description are examples and explanatory only, and should not be considered to restrict the application's scope, as described and claimed. Further, features and/or variations may be provided in addition to those set forth herein. For example, embodiments of the present disclosure may be directed to various feature combinations and sub-combinations described in the detailed description.
- The following detailed description refers to the accompanying drawings. Wherever possible, the same reference numbers are used in the drawings and the following description to refer to the same or similar elements. While embodiments of this disclosure may be described, modifications, adaptations, and other implementations are possible. For example, substitutions, additions, or modifications may be made to the elements illustrated in the drawings, and the methods described herein may be modified by substituting, reordering, or adding stages to the disclosed methods. Accordingly, the following detailed description does not limit the disclosure. Instead, the proper scope of the disclosure is defined by the appended claims.
- As the virtual machine (“VM”) concept is introduced into campus and data center networks, the number of hosts connected by switching systems at the data center grows dramatically, even in the order of millions. Traditional three-tier network architectures can no longer meet the requirements of these types of networks as more and more switches and routers must be added as the number of VMs grow. Latency, complexity, and cost may increase as well.
-
FIG. 1 illustrates an example network environment for embodiments of this disclosure. Example networks may be designed with a flattened architecture that consists of a multidevice switching system 110. Multidevice switching system 110 may comprise a plurality of L2/L3 switching devices 120 a-c. Switching devices 120 a-c may each be connected to a number of servers 130 a-f. - In some embodiments, switching devices 120 a-c may be directly linked together or (full-mess or cascade architecture) or through a switching fabric device (hub-spoke architecture) to form a virtual switch. All these switching devices may be controlled by a central controller. Routing protocols may run on the central controller as a single routing entity. All traffic may travel through the system as if switching through a single switching device. In such a switching system, a packet forwarded across switching devices 120 a-c may go through two stages of hardware lookup and forwarding, once at an ingress switching device and once at an egress switching device.
- IPv6 Protocol is designed to support a much greater number of addressable nodes and more capability of addressing hierarchy with a larger address size (128 bits). With the larger IPv6 address space, there is more flexibility for assigning network prefixes and addresses. This creates the possibility for aggregation.
-
FIG. 2 illustrates the IPv6 address format. The higher N bits may be used to store the subnet prefix 210. Subnet prefix 210 may be the subnet prefix assigned to the L3 interface. The remaining 128-N bits may be used to store theinterface ID 220.Interface ID 220 may be used to identify the host connected to the L3 interface. -
FIG. 3 illustrates an IPv6 address format according to embodiments of this disclosure. The highest N bits may be used to store thesubnet prefix 310. The next M bits may be allocated for aport ID 320. Theport ID 320 may uniquely identify a particular port associated with a switching device on the network. The remaining 128-N-M bits may be used to store thehost ID 330. A port prefix may be formed by combining the subnet prefix and the port ID. - Embodiments described herein may be based on the configuration that a L3 virtual interface consists of multiple L2 switch ports. Furthermore, each of the multiple L2 switch ports may share the same VLAN ID. An L2 switch port associated with a switching device may be connected to multiple hosts or VMs. The port prefix may be provisioned on a port of a switching device. The port prefix length (N+M) may be the same or different on different ports depending upon the number of hosts connected to the port.
- All port prefixes associated with a VLAN interface should be summarized by the subnet prefix on the VLAN interface. All assigned host addresses associated with the port should be summarized by the port prefix configured on the switching device. In some embodiments, subnet prefixes, port prefixes, and host addresses may be assigned through a DHCP server and other network management tools.
- In operating environment according to embodiments described herein, a plurality of L2 ports associated with switching devices may reside on the same VLAN. An L3 virtual interface may be configured as described above. The L2 ports may be spread across multiple switching devices. In this setting, prior systems could not employ subnet prefix aggregation as the multiple destination switching devices may be associated with the same subnet prefix.
- Embodiments described herein may install a port prefix in FIB CAM tables on all switching devices except for the local switching device. A destination port index may be installed as the destination index for the port prefix. These port prefix FIB entries may be used for ingress lookup. On the egress switching device, only local neighbor entries may be installed in the FIB CAM table on the local switching device. Neighbor FIB entries may be employed for egress lookup. If both the source and destination are on the same switching device, neighbor FIB entries may be used for FIB lookup as only one FIB lookup is required. Subnet prefixes may be installed on a local switching device, where the local switching device is configured to punt the entry neighbor discovery packet to the central controller CPU for processing.
-
FIG. 4 illustrates example embodiments of the present disclosure. Port prefix PP1 may be configured on a port associated with aswitching device 450 connecting toVM 430 andVM 470. Port prefix PP1 may be installed in FIB CAM on switchingdevice 410 and switchingdevice 440. If an IPv6 packet comes fromVM 420 with a destination ofVM 430, it may arrive at switchingdevice 410. The L3 ingress lookup may hit port prefix PP1 with a destination index pointing to switchdevice 450. - Without L2 rewrite, the frame is forwarded to egress at
switch device 450. At this stage the MAC of the destination has been discovered by the system. A L3 egress lookup may then hit the destination CAM entry forVM 430. The packet will subsequently be forwarded toVM 430. Reverse traffic may be forwarded the same way with a port prefix provisioned onswitch device 410 and installed in FIB CAM on switchingdevice 450. - On a pure L3 interface without VLAN association, the subnet prefix configured on the interface with destination port index may be installed on all other associated switch devices. A packet arriving at an ingress switch device may hit the subnet prefix. The packet may then be forwarded to the egress switch device and reach its final destination.
- On an Ether-channel (LAG) interface, the subnet prefix configured on the interface with Ether-channel destination index may be installed on all other associated switch devices. A packet arriving at an ingress switch device may hit the subnet prefix. The packet may then be forwarded to a switch device depending upon an Ether-channel load balancing algorithm. The packet may then be forwarded by the egress switch device based on egress lookup.
- The maximum number of hosts that may be supported by embodiments of this disclosure may be calculated via formula [1]
-
H=(F−P×V×S)×S [1] - H represents the maximum number of hosts supported. F represents the size of the FIB. V represents the number of VLANs per port. P represents the number of ports per switching device. S represents the number of switch devices being employed. For example, with a FIB CAM size of 16,000 IPv6 entries, 100 switch devices, 48 ports per switching device, 1 VLAN per port, 1.1 million hosts may be supported.
- In some embodiments, for increased scalability, the port prefix may be installed on ingress switch devices based on active traffic flows. For example, the port prefix would only be installed on those switch devices that have active traffic flow. The traffic flow may be monitored and the port prefix should be removed from the ingress switch device if traffic flow stops for a predetermined period of time. With this approach the FIB CAM size may be even smaller if hosts connected to a port device do not communicate with hosts connected to all other ports on other switch devices.
- The maximum number of hosts that may be supported by embodiments of the previous paragraph may be calculated via formula [2]
-
H=(F−P×V×S×C %)×S [2] - C % represents the percentage of active traffic flows between ports associated with active switching devices. For example, with a FIB CAM size of 16,000 IPv6 entries, 100 switch devices, 48 ports per switching device, 2 VLANs per port, with 50% active flow, 1.1 million hosts may be supported.
- Embodiments of this disclosure consider the scenarios where port level aggregation may not meet the requirements of a campus or data center environment where many VLANs may be provisioned. As the port prefix should be provisioned on a per-port/per-VLAN basis, the number of port prefixes may grow as the number of VLANs per port grows. In these environments, embodiments may allocate M bits for the device ID from the interface ID space as illustrated in
FIG. 5 . -
FIG. 5 illustrates an IPv6 address format according to embodiments of this disclosure. The highest N bits may be used to store thesubnet prefix 510. The next M bits may be allocated for adevice ID 520. Thedevice ID 520 may identify an individual device on the system. The remaining 128-N-M bits may be used to store thehost ID 530. A device prefix may be formed by combining the subnet prefix and the device ID. - The device prefix may be provisioned on a switch device, one for each VLAN on the switch device. The device prefix is used to summarize all hosts connected to the switch device on the same VLAN. The device prefix may be installed on the FIB CAMs associated with the other switch devices for ingress lookup.
- The approaches for use of the port prefix may be employed with the device prefix. However, the ingress lookup is based on the device prefix as opposed to the port prefix. The use of the device prefix also allows for a much higher degree of scalability for systems provisioned with many VLANs.
- The maximum number of hosts that may be supported by embodiments of this disclosure employing the device prefix may be calculated via formula [3]
-
H=(F−V×S)×S [3] - H represents the maximum number of hosts supported. F represents the size of the FIB. V represents the number of VLANs per device. S represents the number of switch devices being employed. For example, with a FIB CAM size of 16,000 IPv6 entries, 100 switch devices, 1 VLAN per device, 1.6 million hosts may be supported. Similarly, with a FIB CAM size of 16,000 IPv6 entries, 100 switch devices, 50 VLANs per device, 1.1 million hosts may be supported.
-
FIG. 6 is a flow chart illustrating embodiments of this disclosure. Method 600 may begin atstep 610 where a first quantity of bits in an IPv6 address may be allocated for storing a subnet prefix. Method 600 may then proceed to step 620, where a second quantity of bits in the IPv6 address may be allocated for storing a port identifier. - Method 600 may then proceed to step 630. At
step 630, the remaining bits in the IPv6 address may be allocated for storing a host identifier. In some embodiments, the IPv6 address is appended to a packet transmitted across a Level-3 virtual interface comprised of a plurality of Layer-2 switch ports. Method 600 may then proceed to step 640 where a port prefix may be computed by combining the subnet prefix and the port identifier. - In some embodiments, two or more of the plurality of switching devices may share the same VLAN identification. Furthermore, at least one of the switching devices may be connected to one or more virtual machines. Method 600 may then proceed to step 650 where the port prefix may be installed in FIB CAM tables on a plurality of the switching devices. In some embodiments, all assigned host addresses associated with the port may be summarized by the port prefix.
-
FIG. 7 is a flow chart illustrating embodiments of this disclosure. Method 700 may begin atstep 710, where one of: a port prefix and/or a device prefix is configured. The prefix is determined based on IPv6 address information as described above in regards toFIG. 3 andFIG. 5 . In some embodiments, the configuration may take place on a switching device. The switching device may reside on a path between the first virtual machine and the second virtual machine. - Method 700 may then proceed to step 720. At
step 720, the prefix may be installed in a FIB CAM at the ingress switching device. In some embodiments, the prefix may comprise a destination index pointing to an egress switch device. Method 700 may then proceed to step 730, where an IPv6 packet may be received from a first virtual machine addressed to a second virtual machine. - Subsequent to the receipt of the IPv6 packet, method 700 may proceed to step 740. At
step 740, an ingress lookup may be performed. The ingress lookup may locate the designated prefix. In some embodiments, method 700 may proceed to step 750, where an egress lookup may be performed as the packet traverses to its destination. The egress lookup may locate a destination entry on the FIB CAM corresponding to the second virtual machine. In some embodiments, the packet may be forwarded to the egress switch device based on the results of a load balancing algorithm. In some embodiments, method 700 may be performed on an L3 interface without VLAN association. - An embodiment consistent with this disclosure may comprise an apparatus for scaling IPv6 on multiple devices. The system may comprise a processor coupled to a memory, wherein the processor is operative to determine a port prefix value based on IPv6 address information. The processor may be further configured to install the port prefix value in FIB CAM tables associated with a plurality of connected switching devices.
- The processor may further be configured to use the port prefix value for ingress lookup. In some embodiments, the apparatus may be a switching device. The switching device may reside on the same VLAN as the plurality of connected switching devices. The processor may be further configured to punt an entry data packet to a central controller for processing.
- Embodiments described herein disclose a distributed neighbor discovery module where all neighbor discovery operations and functionalities may be distributed to a switch device processor. Each neighbor discovery process on a switch device may run as an individual neighbor discovery router node. There may be no coordination between neighbor discovery processes occurring on different switch devices. All other traffic, including both IPv6 control traffic and data traffic destined to the router may be processed by the central controller processor.
- IPv6 neighbor discovery messages may be classified as IPv6 ICMP messages with five reserved ICMP message types. The five reserved ICMP message types include router solicitation, router advertisement, neighbor solicitation, neighbor advertisement, and redirect messages. For embodiments of the present disclosure only IPv6 neighbor discovery packets should be punted to the switch device processor. Other IPv6 ICMP packets destined for the router should be punted to the central controller processor.
- To distinguish these messages from other ICMP messages, a Layer-3 access-list may be employed in hardware. The access list contains a list of permitted reserved ICMP message types. In some embodiments, the access list includes message types which may be identified as “router-solicitation”, “router-advertisement”, “nd-ns” (neighbor solicitation), “nd-na” (neighbor advertisement), and “redirect”.
- The access list should be programmed in hardware with a local CPU as its destination so that packets matching with the access list would be punted to the local CPU. All other control traffic and data traffic should be punted to the central control processor along with the regular FIB entries in hardware.
- Running embodiments of neighbor discovery on a switching device may be relatively simple if the VLAN is local to the switching device. Problems may arise when the VLAN is provisioned across a plurality of switching devices as there may be multiple neighbor discovery router instances exposed to a single VLAN.
- However, with a global VLAN, hosts connected to different switching devices must be able to communicate as if they are on the same network segment. The hosts may share the same network prefix and use neighbor discovery protocol for router and neighbor discovery. The neighbor discovery processes may run on a number of switching devices operating as neighbor discovery router nodes.
-
FIG. 8 is a flow chart illustrating embodiments of this disclosure. method 800 may begin at step 810 where IPv6 traffic may be received by a network device. The IPv6 traffic may contain various type of data and messages including ICMP messages. - Method 800 may then proceed to step 820. At
step 820, the IPv6 traffic may be directed to a switch device processor running a neighbor discovery process if the IPv6 traffic comprises one or more neighbor discovery messages identified in an access list. - In some embodiments, neighbor discovery messages may be identified by comparing message type values associated with the packets in the IPv6 traffic to the access list. The message type values include a plurality of: router solicitation, router advertisement, neighbor solicitation, neighbor advertisement, and redirect messages. The access list may be programmed in hardware with a local CPU associated with a switching device as its destination for identified messages.
- Then, at
step 830 the other IPv6 traffic may be sent to a central processor for processing. - Embodiments of the present disclosure contemplate distributed models to achieve distributed neighbor discovery through a single address model. Some embodiments have a number of neighbor discovery processes running on switching devices. Each of the neighbor discovery processes may use the same router IP address and the same router MAC address. The router MAC address may be installed in a MAC table. The router IP addresses may be installed in FIB CAM.
- Multicast neighbor discovery packets may be sent from a number of hosts. For neighbor discovery packets destined to all nodes (or all routers), the packets should be accepted and handled by the local neighbor discovery process on the local switching device processor. The packets may also be flooded to other hosts through switching devices that have ports belonging to the same VLAN. The packets should not be processed by neighbor discovery processing on other switching devices.
- For neighbor discovery packets destined to a solicited-node address, they should be accepted and handled by the local neighbor discovery process on the local switching device processor if the destination matches with the local solicited-node address. Otherwise, the packet should be flooded to other hosts on the same VLAN on other switching devices. These packets should not be processed by the processors associated with the other switching devices.
- Similarly, multicast neighbor discovery packets may be sent from a router. In some embodiments, such packets should only be sent to hosts on the same VLAN connected to the local switching device.
- In some embodiments, unicast neighbor discovery packets may be sent from host targets to the router. It may be assumed that the router MAC address has been previously resolved by the hosts. After a unicast neighbor discovery packet is received by a switching device, an L2 lookup may be performed at the switching device which should hit the router MAC address. Hitting the router MAC address may trigger an L3 lookup. The L3 lookup may hit the ACL so that the packet is punted to the switching device's CPU. Unicast packets sent from a router to a number of hosts are handled in a typical way.
- In some embodiments, unicast neighbor discovery packets may be sent from host targets to a host connected to another switching device on the same VLAN. After this type of unicast neighbor discovery packet is received by a switching device. The switching device may then perform in hardware an L2 lookup that produces a miss. The packet may then be replicated and flooded to other hosts on the same VLAN using other switching devices.
-
FIG. 9 is a flow chart illustrating embodiments of the present disclosure. Method 900 may begin at step 910 where a number of neighbor discovery processes using the same router IP address and the same router MAC address may be implemented on a plurality of switching devices. - Next, at step 920 a multicast neighbor discovery packet may be received from a host. Then, at
step 930 it may be determined if the multicast neighbor discovery packet is destined to a plurality of nodes. If so, method 900 proceeds to step 940 where the multicast neighbor discovery packet may be handled with a local neighbor discovery process. - If not, method 900 proceeds to step 950, where it may be determined if the multicast neighbor discovery packet is destined to a solicited node address and the multicast discovery packet destination matches the local solicited node address. If so, method 900 proceeds to step 960. At
step 960, the multicast neighbor discovery packet may be handled with a local neighbor discovery process. - In some embodiments, method 900 may proceed to step 970. At
step 970, the multicast neighbor discovery packet may be flooded to other hosts on the same VLAN associated with the other switching devices. -
FIG. 10 is a flow chart illustrating embodiments of the disclosure. Method 1000 may begin atstep 1010 when a unicast neighbor discovery packet may be received. Method 1000 may then proceed to step 1020. Atstep 1020, an L2 lookup may be performed for the router MAC address. - If the router MAC address is hit, method 1000 may proceed to step 1030 and perform an L3 lookup for a neighbor discovery access list. Upon a hit on the access list, method 1000 may proceed to step 1040 and punt the unicast neighbor discovery packet to a local CPU.
- In some embodiments step 1010 may comprises receiving a unicast neighbor discovery packet from a host target to a host connected to a second switching device on the same VLAN. In that case, the L2 lookup at
step 1020 may produce a miss. Upon the miss, the unicast neighbor discovery packet may be replicated and flooded to other hosts on the same VLAN. - Embodiments of the present disclosure contemplate distributed models to achieve distributed neighbor discovery through a multiple address model. In the multiple address model, each neighbor discovery process running on a switching device may have a unique router IP address and a unique router MAC address.
- Typically, more than one neighbor discovery process can advertise a router address to the same VLAN as if multiple routers existed on that VLAN. Hosts and virtual machines connected to the VLAN may select a router from its router list. Embodiments of the disclosure propose to suppress Router Advertisement messages from the neighbor discovery router on the switching devices. The default router may be configured on hosts (or VMs) with a management tool, such as DHCP. This may guarantee that a host (or VM) always communicates with the same switching device. This switching device would normally be the switching device the host (or VM) is directly connected to. Such a solution requires minimal implementation effort to configure existing systems.
- When multicast neighbor discovery packets are sent from hosts, router advertisement packets sent from host will be dropped. Neighbor Solicitation packets sent from the host should be punted to the switching device CPU if the destination address matches with the local solicited-node multicast address. There may exist some embodiments where the packet may not come from a directly connected host. This scenario may exist for example, in instances of VMotion or system misconfiguration. As such, the switching device should allow for neighbor solicitation packets from hosts which are not directly connected.
- In some embodiments, multicast neighbor discovery packets may be sent from a router. Again, router advertisement messages should be suppressed. Neighbor solicitation messages may be flooded to VLAN as usual. If the VLAN crosses multiple switching devices, the neighbor solicitation messages should be flooded to all switching devices that contain members of the VLAN.
- In some embodiments, unicast neighbor discovery packets may be sent from host targets to the router. These packets may have the router MAC as the destination MAC. These unicast neighbor discovery packets should be punted to the neighbor discovery processes running on the local switch device as usual. Similar to above, the switching device should allow for neighbor solicitation packets from hosts which are not directly connected. Unicast packets sent from a router to a number of hosts are handled in a typical way.
- In some embodiments, unicast neighbor discovery packets may be sent from host targets to a host connected to another switching device on the same VLAN. After this type of unicast neighbor discovery packet is received by a switching device. The switching device may then perform in hardware an L2 lookup that produces a miss. The packet may then be replicated and flooded to other hosts on the same VLAN using other switching devices.
-
FIG. 11 is a flow chart illustrating embodiments of this disclosure. Method 1100 may start atstep 1110 where multicast neighbor discovery packets may be received. After receipt, method 1100 may proceed to step 1120. Atstep 1120, the message type of the multicast neighbor discovery packets may be determined by reference to an access list. - After determining the message type, method 1100 may proceed to step 1130 where multicast neighbor discovery packets identified as router advertisement packets may be dropped. Method 1100 may then proceed to step 1140 where multicast neighbor discovery packets identified as neighbor solicitation packets to a local CPU are punted if the destination address matches the local solicited-node multicast address.
-
FIG. 12 is a flow chart illustrating embodiments of this disclosure. Method 1200 may start atstep 1210 where a unicast neighbor discovery packet with a router MAC as the destination MAC may be received. Upon receipt of the unicast neighbor discovery packet, method 1200 may proceed to step 1220 where the unicast neighbor discovery packet may be punted to the local CPU running a neighbor discovery process. - Method 1200 may then proceed to step 1230. At
step 1230, a unicast neighbor discovery packet may be received from a host target directed to a second host associated with a switching device on the same VLAN. Method 1200 will then proceed to step 1240 where a lookup may be performed that produces a miss. - When the lookup results in a miss, method 1200 may proceed to step 1250. At
step 1250, the unicast neighbor discovery packet may be replicated and flooded to other hosts on the same VLAN. - In embodiments described herein, the switching device processor should not process any packets other than neighbor discovery packets. All other packets should be handled by the central controlling processor as described in regards to
FIG. 13 .FIG. 13 illustrates other packet handling according to embodiments described herein. Method 1300 may begin atstep 1310 where all incoming unicast and multicast packets destined to the router are punted to the central controller processor. - Method 1300 may proceed to step 1320. At
step 1320, all outgoing multicast packets may be flooded to the VLAN broadcast domain. Method 1300 may then proceed to step 1330. Atstep 1330, the outgoing unicast packets from the central controller processor need to resolve the destination MAC address. By searching in the device/port prefix table, the switch device processor may be found through which the destination may be reached. - The method may proceed to step 1340, where a send request for the MAC address to the switch device processor through an internal IPC channel. When the MAC address is learned from the reply message, it may be stored in a Neighbor Cache on the central controller processor. The MAC address may be used for sending the current and future unicast packets to that destination.
-
FIG. 14 illustrates a network device, such ascomputing device 1400.Computing device 1400 may includeprocessing unit 1425 andmemory 1455.Memory 1455 may include software configured to execute application modules such as anoperating system 1410.Computing device 1400 may execute, for example, one or more stages included in the methods as described above. Moreover, any one or more of the stages included in the above describe methods may be performed on any element shown inFIG. 14 . -
Computing device 1400 may be implemented using a personal computer, a network computer, a mainframe, a computing appliance, or other similar microcomputer-based workstation. The processor may comprise any computer operating environment, such as hand-held devices, multiprocessor systems, microprocessor-based or programmable sender electronic devices, minicomputers, mainframe computers, and the like. The processor may also be practiced in distributed computing environments where tasks are performed by remote processing devices. Furthermore, the processor may comprise a mobile terminal, such as a smart phone, a cellular telephone, a cellular telephone utilizing wireless application protocol (WAP), personal digital assistant (PDA), intelligent pager, portable computer, a hand held computer, a conventional telephone, a wireless fidelity (Wi-Fi) access point, or a facsimile machine. The aforementioned systems and devices are examples and the processor may comprise other systems or devices. - Embodiments of the present disclosure, for example, are described above with reference to block diagrams and/or operational illustrations of methods, systems, and computer program products according to embodiments of this disclosure. The functions/acts noted in the blocks may occur out of the order as shown in any flowchart. For example, two blocks shown in succession may in fact be executed substantially concurrently or the blocks may sometimes be executed in the reverse order, depending upon the functionality/acts involved.
- While certain embodiments of the disclosure have been described, other embodiments may exist. Furthermore, although embodiments of the present disclosure have been described as being associated with data stored in memory and other storage mediums, data can also be stored on or read from other types of computer-readable media, such as secondary storage devices, like hard disks, floppy disks, or a CD-ROM, a carrier wave from the Internet, or other forms of RAM or ROM. Further, the disclosed methods' stages may be modified in any manner, including by reordering stages and/or inserting or deleting stages, without departing from the disclosure.
- All rights including copyrights in the code included herein are vested in and are the property of the Applicant. The Applicant retains and reserves all rights in the code included herein, and grants permission to reproduce the material only in connection with reproduction of the granted patent and for no other purpose.
- While the specification includes examples, the disclosure's scope is indicated by the following claims. Furthermore, while the specification has been described in language specific to structural features and/or methodological acts, the claims are not limited to the features or acts described above. Rather, the specific features and acts described above are disclosed as examples for embodiments of the disclosure.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/218,858 US20190116220A1 (en) | 2011-10-11 | 2018-12-13 | Neighbor Discovery for IPV6 Switching Systems |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/270,904 US8713169B2 (en) | 2011-10-11 | 2011-10-11 | Distributed IPv6 neighbor discovery for large datacenter switching systems |
US14/264,101 US10171547B2 (en) | 2011-10-11 | 2014-04-29 | Neighbor discovery for IPV6 switching systems |
US16/218,858 US20190116220A1 (en) | 2011-10-11 | 2018-12-13 | Neighbor Discovery for IPV6 Switching Systems |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/264,101 Division US10171547B2 (en) | 2011-10-11 | 2014-04-29 | Neighbor discovery for IPV6 switching systems |
Publications (1)
Publication Number | Publication Date |
---|---|
US20190116220A1 true US20190116220A1 (en) | 2019-04-18 |
Family
ID=47080840
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/270,904 Active 2032-06-05 US8713169B2 (en) | 2011-10-11 | 2011-10-11 | Distributed IPv6 neighbor discovery for large datacenter switching systems |
US14/264,101 Active 2033-06-25 US10171547B2 (en) | 2011-10-11 | 2014-04-29 | Neighbor discovery for IPV6 switching systems |
US16/218,858 Abandoned US20190116220A1 (en) | 2011-10-11 | 2018-12-13 | Neighbor Discovery for IPV6 Switching Systems |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/270,904 Active 2032-06-05 US8713169B2 (en) | 2011-10-11 | 2011-10-11 | Distributed IPv6 neighbor discovery for large datacenter switching systems |
US14/264,101 Active 2033-06-25 US10171547B2 (en) | 2011-10-11 | 2014-04-29 | Neighbor discovery for IPV6 switching systems |
Country Status (4)
Country | Link |
---|---|
US (3) | US8713169B2 (en) |
EP (1) | EP2767047B1 (en) |
CN (1) | CN103858390B (en) |
WO (1) | WO2013055653A1 (en) |
Families Citing this family (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8713169B2 (en) | 2011-10-11 | 2014-04-29 | Cisco Technology, Inc. | Distributed IPv6 neighbor discovery for large datacenter switching systems |
US9025604B2 (en) * | 2012-01-10 | 2015-05-05 | Cisco Technology, Inc. | Scaling IPV4 at large datacenters with device level aggregation |
CN104335538B (en) * | 2012-04-26 | 2017-12-12 | 慧与发展有限责任合伙企业 | Multicast router topology discovery |
US20150256450A1 (en) * | 2012-09-28 | 2015-09-10 | Siyu Yang | Generating a Shape Graph for a Routing Table |
US9577914B2 (en) | 2012-10-16 | 2017-02-21 | Cisco Technology, Inc. | Eliminating IPV6 neighbor solicitations in constrained computer networks |
EP2741462A1 (en) * | 2012-12-06 | 2014-06-11 | ST-Ericsson SA | Methods for opportunistic sensing |
US9088608B2 (en) | 2013-03-12 | 2015-07-21 | Cisco Technology, Inc. | Throttling and limiting the scope of neighbor solicitation (NS) traffic |
US9148845B2 (en) | 2013-09-23 | 2015-09-29 | Mitsubishi Electric Research Laboratories, Inc. | Method for discovering neighboring nodes in wireless networks |
US9591510B2 (en) * | 2014-09-22 | 2017-03-07 | Raytheon Company | Systems and methods to create message traffic |
US9497200B2 (en) | 2015-02-16 | 2016-11-15 | International Business Machines Corporation | Managing limited network access configuration |
US10374926B2 (en) | 2016-01-28 | 2019-08-06 | Oracle International Corporation | System and method for monitoring logical network traffic flows using a ternary content addressable memory in a high performance computing environment |
US10536334B2 (en) | 2016-01-28 | 2020-01-14 | Oracle International Corporation | System and method for supporting subnet number aliasing in a high performance computing environment |
WO2018039061A1 (en) * | 2016-08-23 | 2018-03-01 | Oracle International Corporation | System and method for supporting fast hybrid reconfiguration in a high performance computing environment |
CN107547382B (en) * | 2017-05-23 | 2020-06-09 | 新华三信息技术有限公司 | Neighbor relation discovery method and device |
CN107547407B (en) * | 2017-09-15 | 2021-03-09 | 新华三技术有限公司 | Message transmission method, device and implementation device |
US10924454B2 (en) * | 2018-03-06 | 2021-02-16 | Kaloom Inc. | Computing device and method for generating a fabric-wide IPV6 address |
US10673695B2 (en) | 2018-03-06 | 2020-06-02 | Kaloom Inc. | Computing device and method for performing a fabric deployment in a data center |
US10873500B2 (en) | 2018-03-06 | 2020-12-22 | Kaloom Inc. | Computing device and method for generating a link IPV6 address |
US11005667B2 (en) | 2018-03-19 | 2021-05-11 | Kaloom Inc. | Computing device and method for performing a secure neighbor discovery |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070201461A1 (en) * | 2006-02-27 | 2007-08-30 | Masayuki Shinohara | Network switching device |
US20080320165A1 (en) * | 2005-10-15 | 2008-12-25 | Electronics & Telecommunications Research Institut | Method for Supporting Ipv6 Neighbor Discovery in Point-To-Point Oriented Broadband Wireless Network |
Family Cites Families (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7103035B1 (en) | 2000-01-14 | 2006-09-05 | Advanced Micro Devices, Inc. | Arrangement for searching network addresses in a network switch using multiple tables based on subnet identifier |
US6977930B1 (en) | 2000-02-14 | 2005-12-20 | Cisco Technology, Inc. | Pipelined packet switching and queuing architecture |
AU2001286954A1 (en) | 2000-08-31 | 2002-03-13 | The Regents Of The University Of California | Cluster-based aggregated switching technique (cast) for routing data packets and information objects in computer networks |
US20020035639A1 (en) | 2000-09-08 | 2002-03-21 | Wei Xu | Systems and methods for a packet director |
US20030046330A1 (en) | 2001-09-04 | 2003-03-06 | Hayes John W. | Selective offloading of protocol processing |
US7095738B1 (en) | 2002-05-07 | 2006-08-22 | Cisco Technology, Inc. | System and method for deriving IPv6 scope identifiers and for mapping the identifiers into IPv6 addresses |
US7367052B1 (en) * | 2002-12-04 | 2008-04-29 | Cisco Technology, Inc. | Access list key compression |
US7487255B2 (en) | 2003-08-14 | 2009-02-03 | Hewlett-Packard Development Company, L.P. | Routing cache management with route fragmentation |
US7680943B2 (en) | 2003-10-20 | 2010-03-16 | Transwitch Corporation | Methods and apparatus for implementing multiple types of network tunneling in a uniform manner |
US7567522B2 (en) * | 2004-04-23 | 2009-07-28 | Hewlett-Packard Development Company, L.P. | Suppression of router advertisement |
US8102854B2 (en) * | 2004-05-25 | 2012-01-24 | Cisco Technology, Inc. | Neighbor discovery proxy with distributed packet inspection scheme |
US7480255B2 (en) | 2004-05-27 | 2009-01-20 | Cisco Technology, Inc. | Data structure identifying for multiple addresses the reverse path forwarding information for a common intermediate node and its use |
US8040850B2 (en) * | 2006-08-21 | 2011-10-18 | Qualcomm Incorporated | Advanced internet protocol with flash-OFDM methods and systems |
EP2087656B1 (en) * | 2006-11-23 | 2015-01-07 | Telefonaktiebolaget LM Ericsson (publ) | Methods and arrangements for lan emulation in mobile networks |
US8112803B1 (en) | 2006-12-22 | 2012-02-07 | Symantec Corporation | IPv6 malicious code blocking system and method |
US8829108B2 (en) | 2009-02-05 | 2014-09-09 | Arkema Inc. | Fibers sized with polyetherketoneketones |
US8565247B2 (en) | 2009-08-19 | 2013-10-22 | Brocade Communications Systems, Inc. | Techniques for efficiently updating routing information upon shortest path tree computation |
US8824472B2 (en) | 2010-09-16 | 2014-09-02 | Verizon Patent And Licensing Inc. | Sanitizing packet headers |
US8438390B2 (en) * | 2010-12-22 | 2013-05-07 | Konica Minolta Laboratory U.S.A., Inc. | Method and system for using neighbor discovery unspecified solicitation to obtain link local address |
US8588224B2 (en) | 2011-05-14 | 2013-11-19 | International Business Machines Corporation | Priority based flow control in a distributed fabric protocol (DFP) switching network architecture |
US8503464B2 (en) | 2011-05-20 | 2013-08-06 | Brocade Communications Systems, Inc. | Techniques for efficiently updating routing information |
US8576841B2 (en) | 2011-06-30 | 2013-11-05 | Juniper Networks, Inc. | Hybrid port range encoding |
US8832238B2 (en) | 2011-09-12 | 2014-09-09 | Microsoft Corporation | Recording stateless IP addresses |
US20130077530A1 (en) | 2011-09-28 | 2013-03-28 | Cisco Technology, Inc. | Scaling IPv6 on Multiple Devices Virtual Switching System with Port or Device Level Aggregation |
US8713169B2 (en) | 2011-10-11 | 2014-04-29 | Cisco Technology, Inc. | Distributed IPv6 neighbor discovery for large datacenter switching systems |
-
2011
- 2011-10-11 US US13/270,904 patent/US8713169B2/en active Active
-
2012
- 2012-10-09 CN CN201280049912.7A patent/CN103858390B/en not_active Expired - Fee Related
- 2012-10-09 WO PCT/US2012/059293 patent/WO2013055653A1/en active Application Filing
- 2012-10-09 EP EP12778890.9A patent/EP2767047B1/en not_active Not-in-force
-
2014
- 2014-04-29 US US14/264,101 patent/US10171547B2/en active Active
-
2018
- 2018-12-13 US US16/218,858 patent/US20190116220A1/en not_active Abandoned
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080320165A1 (en) * | 2005-10-15 | 2008-12-25 | Electronics & Telecommunications Research Institut | Method for Supporting Ipv6 Neighbor Discovery in Point-To-Point Oriented Broadband Wireless Network |
US20070201461A1 (en) * | 2006-02-27 | 2007-08-30 | Masayuki Shinohara | Network switching device |
Also Published As
Publication number | Publication date |
---|---|
EP2767047B1 (en) | 2018-03-14 |
US8713169B2 (en) | 2014-04-29 |
EP2767047A1 (en) | 2014-08-20 |
CN103858390A (en) | 2014-06-11 |
US20130091269A1 (en) | 2013-04-11 |
WO2013055653A1 (en) | 2013-04-18 |
US20140229573A1 (en) | 2014-08-14 |
CN103858390B (en) | 2017-09-22 |
US10171547B2 (en) | 2019-01-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20190116220A1 (en) | Neighbor Discovery for IPV6 Switching Systems | |
US9008084B2 (en) | Method of IPv6 at data center network with VM mobility using graceful address migration | |
US9621581B2 (en) | IPV6/IPV4 resolution-less forwarding up to a destination | |
US9008095B2 (en) | System and method for hardware-based learning of internet protocol addresses in a network environment | |
EP3292659B1 (en) | Multicast data packet forwarding | |
US20140140244A1 (en) | System and method for optimizing within subnet communication in a network environment | |
US10554544B2 (en) | “Slow-start” problem in data center networks and a potential solution | |
US10805216B2 (en) | Shared service access for multi-tenancy in a data center fabric | |
US8989189B2 (en) | Scaling IPv4 in data center networks employing ECMP to reach hosts in a directly connected subnet | |
EP3292666B1 (en) | Multicast data packet forwarding | |
EP2907265A1 (en) | Ip multicast service join process for mpls-based virtual private cloud networking | |
EP3292664B1 (en) | Multicast data packet forwarding | |
US20130094514A1 (en) | Method and switch for sending packet | |
US20210029036A1 (en) | Hash collision mitigation system | |
US12088552B2 (en) | Synchronizing dynamic host configuration protocol snoop information | |
US20130077530A1 (en) | Scaling IPv6 on Multiple Devices Virtual Switching System with Port or Device Level Aggregation | |
US20130246652A1 (en) | Discover IPv4 Directly Connected Host Conversations Using ARP in Distributed Routing Platforms | |
Kataoka et al. | Scaling a broadcast domain of Ethernet: Extensible transparent filter using SDN | |
CN114221834B (en) | Message forwarding method and device | |
EP4423993A1 (en) | Mac-based routing | |
US11025536B1 (en) | Support for flooding in encapsulation and inter-VLAN communication via proxy-ARP | |
CN107547687B (en) | Message transmission method and device | |
US20140064270A1 (en) | Using Fabric Port-Channels to Scale IP Connectivity to Hosts in Directly Connected Subnets in Massive Scale Data Centers | |
US20240333547A1 (en) | Flood optimization to distribute multihome source information in network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: CISCO TECHNOLOGY, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ZHANG, MING;RAMESH, CHENGELPET;REEL/FRAME:047765/0764 Effective date: 20111006 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |