Movatterモバイル変換


[0]ホーム

URL:


USRE45521E1 - VLAN frame format - Google Patents

VLAN frame format
Download PDF

Info

Publication number
USRE45521E1
USRE45521E1US13/728,747US201213728747AUSRE45521EUS RE45521 E1USRE45521 E1US RE45521E1US 201213728747 AUS201213728747 AUS 201213728747AUS RE45521 EUSRE45521 EUS RE45521E
Authority
US
United States
Prior art keywords
field
virtual network
network identifier
data frame
type
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
US13/728,747
Inventor
Paul James Frantz
Geoffrey O. Thompson
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International License Exchange Of America LLC
Original Assignee
Spherix Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filedlitigationCriticalhttps://patents.darts-ip.com/?family=41327977&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=USRE45521(E1)"Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Priority claimed from US08/613,726external-prioritypatent/US5959990A/en
Application filed by Spherix IncfiledCriticalSpherix Inc
Priority to US13/728,747priorityCriticalpatent/USRE45521E1/en
Assigned to NORTEL NETWORKS LIMITEDreassignmentNORTEL NETWORKS LIMITEDASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: THOMPSON, GEOFFREY O., FRANTZ, PAUL J.
Assigned to ROCKSTAR CONSORTIUM US LPreassignmentROCKSTAR CONSORTIUM US LPASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: Rockstar Bidco, LP
Assigned to Rockstar Bidco, LPreassignmentRockstar Bidco, LPASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: NORTEL NETWORKS, LIMITED
Assigned to SPHERIX PORTFOLIO ACQUISITION II, INC.reassignmentSPHERIX PORTFOLIO ACQUISITION II, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: ROCKSTAR CONSORTIUM US LP
Assigned to SPHERIX INCORPORATEDreassignmentSPHERIX INCORPORATEDASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: SPHERIX PORTFOLIO ACQUISITION II, INC.
Assigned to ROCKSTAR CONSORTIUM US LPreassignmentROCKSTAR CONSORTIUM US LPSECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: SPHERIX INCORPORATED, SPHERIX PORTFOLIO ACQUISITION II, INC.
Assigned to RPX CLEARINGHOUSE LLCreassignmentRPX CLEARINGHOUSE LLCSECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: ROCKSTAR CONSORTIUM US LP
Publication of USRE45521E1publicationCriticalpatent/USRE45521E1/en
Application grantedgrantedCritical
Assigned to SPHERIX INCOPORATEDreassignmentSPHERIX INCOPORATEDRELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS).Assignors: RPX CLEARINGHOUSE LLC
Anticipated expirationlegal-statusCritical
Assigned to INTERNATIONAL LICENSE EXCHANGE OF AMERICA, LLCreassignmentINTERNATIONAL LICENSE EXCHANGE OF AMERICA, LLCASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: SPHERIX INCORPORATED
Expired - Lifetimelegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

In a network device such as a network switch having a port coupled to a communications medium dedicated to a single virtual local area network and another port coupled to a communications medium shared among multiple virtual local area networks for transmitting data frames between the dedicated communications medium and the shared communications medium, a method of identifying the virtual network associated with each data frame received by the network switch when transmitting the data frames over the shared communications medium. The method comprises receiving data frames from the dedicated communications medium coupled to one port, and, with respect to each data frame so received, inserting a new type field and a virtual network identifier field. The contents of the new type field indicate the data frame comprises a virtual network identifier field. The method further includes placing a value in the virtual network identifier field identifying the virtual network associated with the data frame and transmitting the data frame over the shared communications medium. Upon receipt of the data frames from over the shared communications medium, another network device can discern from the virtual network identifier field in each data frame the virtual network from which the data frames were received and determine whether to forward the data frames accordingly.

Description

NOTICE: More than one reissue application has been filed for the reissue of U.S. Pat. No. 6,111,876. The reissue applications are U.S. application Ser. No. 10/225,708, now Reissue U.S. Pat. No. Re. 40,999, issued on Nov. 24, 2009, and U.S. application Ser. No. 12/459,465, now Reissue U.S. Pat. No. Re. 44,775, issued on Feb. 25, 2014, which is a divisional reissue of U.S. application Ser. No. 10/225,708, now Reissue U.S. Pat. No. Re. 40,999. The present U.S. application Ser. No. 13/728,747, filed on Dec. 27, 2012, which has been filed during the pendency of U.S. application Ser. No. 12/459,465, now Reissue U.S. Pat. No. Re. 44,775, is a divisional reissue of U.S. application Ser. No. 12/459,465, now Reissue U.S. Pat. No. Re. 44,775, which is a divisional reissue of U.S. Pat. No. 6,111,876.
Other reissue applications include: U.S. application Ser. No. 13/728,770, filed Dec. 27, 2012, which is a continuation reissue of U.S. application Ser. No. 12/459,465, now Reissue U.S. Pat. No. Re. 44,775; U.S. application Ser. No. 13/728,787, filed Dec. 27, 2012, now Reissue U.S. Pat. No. Re. 45,065, issued on Aug. 5, 2014, which is a continuation reissue of U.S. application Ser. No. 12/459,465, now Reissue U.S. Pat. No. Re. 44,775; U.S. application Ser. No. 13/728,823, filed Dec. 27, 2012, now Reissue U.S. Pat. No. Re. 45,081, issued on Aug. 19, 2014, which is a continuation reissue of U.S. application Ser. No. 12/459,465, now Reissue U.S. Pat. No. Re. 44,775; U.S. application Ser. No. 13/728,838, filed Dec. 27, 2012, which is a continuation reissue of U.S. application Ser. No. 12/459,465, now Reissue U.S. Pat. No. Re. 44,775; U.S. application Ser. No. 13/728,846, filed Dec. 27, 2012, now Reissue U.S. Pat. No. Re. 45,095, issued on Aug. 26, 2014, which is a continuation reissue of U.S. application Ser. No. 12/459,465, now Reissue U.S. Pat. No. Re. 44,775; U.S. application Ser. No. 13/728,867, filed Dec. 27, 2012, which is a continuation reissue of U.S. application Ser. No. 12/459,465, now Reissue U.S. Pat. No. Re. 44,775; U.S. application Ser. No. 13/728,698, filed Dec. 27, 2012, which is a divisional reissue of U.S. application Ser. No. 12/459,465, now Reissue U.S. Pat. No. Re. 44,775.
This application is a continuation-in-part of United States patent application entitled, “VLAN FRAME FORMAT”, Ser. No. 08/613,726, filed on Mar. 12, 1996, now U.S. Pat. No. 5,959,990.
COPYRIGHT NOTICE
Contained herein is material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction of the patent disclosure by any person as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all rights to the copyright whatsoever.
BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates to the field of data communications. More specifically, the present invention relates to a method and frame format for preserving in a data frame the virtual local area network (VLAN) associated with the data frame as determined by a network device from which the data frame was received when transmitting the data frame over a communications medium shared among multiple VLANs. The method and frame format are equally applicable when the network device uses criteria in addition to or instead of the ingress port to associate a VLAN with the data frame.
2. Description of the Related Art
A small baseband local area network (LAN) typically connects a number of nodes, e.g., a server and workstations, to a shared communications medium wherein all nodes compete for available bandwidth on the shared communications medium. In an Ethernet or Institute of Electrical and Electronics Engineers (IEEE) 802.3 standard local area network, when a node transmits a unicast data frame on the network, every node coupled to the shared medium receives and processes the data frame to determine if it is the node to which the data frame is destined. Moreover, when a station transmits a broadcast data frame on the network, all nodes see the data frame and must process it to determine whether they should respond to the broadcasting node. As the number of nodes coupled to the medium increase, data traffic can become congested, resulting in an undesirable level of collisions and network related delays in transmitting data frames, which in turn results in network and node performance degradation.
A common prior art method of reducing congestion is to separate a LAN into multiple LAN segments by way of a network device, such as a bridge or network switch, operating at the Media Access Control (MAC) sublayer of the Data Link layer (layer 2) of the International Standards Organization (ISO) Open Systems Interconnection (OSI) reference model. While all nodes in the data network may still belong to the same broadcast domain, that is, each node still transmits and receives broadcast data frames to/from all nodes on all LAN segments in the network, nodes sharing the same LAN segment see only unicast data frames generated by or destined to a node on the same LAN segment. Given that the bulk of data traffic on a LAN is unicast in nature, segmentation may somewhat reduce collisions and traffic related performance problems.
However, as the number of LAN segments and nodes per segment increases in the same broadcast domain, the nodes can become overburdened processing broadcast data frames. It may be desirable under such circumstances to separate the growing data network into multiple broadcast domains. One possible approach to creating multiple broadcast domains is to separate one or more LAN segments using a network device such as a router, operating at the Network layer (layer3) of the OSI reference model. With reference toFIG. 1, adata network10 is illustrated wherein a number of internet-working devices are installed to reduce traffic levels on each LAN segment. Arouter100separates LAN segments103,110 and120 into onebroadcast domain11, andLAN segments105,130 and140 into anotherbroadcast domain12.
For example,router100 only forwards a unicast data frame from a node onLAN segments103,110 or120 that is specifically addressed (at layer3 of the OSI model) to a node onLAN segments105,130 or140, and vise versa.Network devices101 and102 may be, for example, network switches.Network switch101separates LAN segments103,110 and120 to reduce unicast traffic on each segment while the segments still remain in thesame broadcast domain11.Network switch102 functions in a similar manner with respect toLAN segments105,130 and140.
LAN segments110,120,130 and140 may have multiple nodes attached. For example,LAN segment110 hasnodes111 and112 coupled to it, and functions, therefore, as a shared communications medium, wherein the nodes share the available bandwidth (e.g., 10 million bits per second in a traditional Ethernet carrier sense, multiple access data bus with collision detection [CSMA/CD]).LAN segments103 and105, on the other hand, are dedicated LAN segments, therefore,nodes104 and106 have all available bandwidth to themselves. For example,nodes104 and106 may be servers requiring greater bandwidth.Dedicated LAN segments103 and105 may be any technology supporting delivery of Ethernet or IEEE 802 LLC data frames including CSMA/CD or Fiber Distributed Data Interface (FDDI) segments operating at 100 million bits per second, or Asynchronous Transfer Mode LAN emulation service running over segments operating at 155 million bits per second.
Therouter100 has the further advantage of allowing for the implementation of policy restrictions among network administrator-defined groups in the network. For example, it may be desirable to prohibit nodes inbroadcast domain12 from communicating with nodes inbroadcast domain11 using any protocol except those specifically allowed by the network administrator.
However, as can be seen inFIG. 1,data network10 involves significant hardware and software expenses associated with two network switches, a router, and the multiple communication lines required to achieve multiple broadcast domains. Moreover, a significant amount of administrative overhead is required to maintain the configuration and operation of the internetworking devices as required, for example, when a node is moved from one segment to another segment in the same or different broadcast domain. Thus, it is desirable to implement thedata network10 ofFIG. 1 using a single network switch and virtual local area networks (VLANs).
FIG. 2A illustratesdata network10 using asingle network switch200 and virtual local area networks (VLANs) to createmultiple broadcast domains11 and12. A VLAN is a logical local area network comprised of a plurality of physical local area networks as determined by some network administrator-defined criteria, e.g., grouping local area networks based on geographical topology of the data network, or business units/functions of a company, such as finance or engineering departments. Such VLANs are generally configured based on the points where the physical LANs enter a switched network. For example,network switch200 is configured such thatports201 through203 and207 belong toVLAN210, and ports204-206 belong toVLAN220.LAN segments103,110 and120 coupled toports201--203, respectively, belong toVLAN210.LAN segments130,140 and105 coupled toports204,207, and205, respectively, belong toVLAN220. The configuration ofdata network10 inFIG. 2A is relatively less expensive than the configuration ofdata network10 inFIG. 1 in that only one switch is required. Moreover, since VLANs are configured atnetwork switch200, a network administrator can maintain configuration and operation of the network without concern for moving a node from one LAN segment to another LAN segment in the same VLAN.
When the system grows beyond the capacity of a single switch or when geographical constraints create a need for switching capacity at more than one site, additional switches are added to the network.FIG. 2B shows the addition ofswitch300 to the network shown inFIG. 2A.LAN segment190 is used to linkswitch300 to switch200.Switch300 supportssegments150 and160 inVLAN210 andsegments170 and180 inVLAN220.
In the prior art, whenswitch200 receives a broadcast packet fromVLAN210,station104, it forwards the packet out all of itsother VLAN210 ports (202,203 and207) and also forwards it fromport208 to switch300.Switch300 examines the MAC source address (i.e., theISO layer2 source address) and based on a prior exchange of information withswitch200 is able to determine the proper VLAN to use for frames from that source address, in this case,VLAN210. Based on this determination, switch300 forwards the frame to all of itsVLAN210 ports (e.g.,ports302 and303).
The success of this approach depends on prohibiting frames having the same MAC source address from appearing on multiple VLANs. However, the prohibition makes this approach unusable in some networks. To work around this problem, some prior art implementations use additional fields within the packet, such as the ISO layer3 source address, to resolve ambiguities. However, even this approach does not work in all cases, as there are many types of frames which do not contain sufficient information to make a reliable VLAN determination. Examples of such frames include Internet Protocol (IP) BOOTP requests, IPX Get Nearest Server requests and frames from non-routable protocols.
All messages (in the form of a data frame) transferred between nodes of the same VLAN are transmitted at the MAC sublayer of the Data Link layer of the OSI reference model, based on each node's MAC layer address. However, there is no connectivity between nodes of different VLANs withinnetwork switch200 or300.
For example, with reference toFIG. 2A, even though allphysical LAN segments103,105,120,130, and140 are connected to ports onnetwork switch200, the VLAN configuration ofswitch200 is such that nodes in one VLAN cannot communicate with nodes in the other VLAN vianetwork switch200. For example,node104 can communicate withnode122 but cannot communicate withnode142 by way ofswitch200. Rather,router100 connectsVLAN210 toVLAN220 viacommunications mediums101 and102 respectively, so thatnode104 can communicate withnode142. Messages transferred between nodes of different VLANs are most often transmitted at the Network layer of the OSI reference model, based on the Network layer address of each node, e.g., an Internet Protocol (IP) address.Router100 also allows a network administrator to configure appropriate policy restrictions and security rules to reduce unnecessary or unwanted traffic indata network10.
Using a routing function to transfer data frames betweenVLAN210 andVLAN220 as illustrated inFIG. 2B is inappropriate, however, for data frames of protocol suites that do not support a network layer protocol, e.g., DEC LAT or NetBIOS. To deal with this problem, routers commonly provide a capability for bridging frames of non-routable protocols. For example, assumenode106 inVLAN220 uses the DEC LAT protocol in an attempt to transmit a data frame to a node inVLAN210.Switch200 receives the data frame fromnode106 overdedicated communications medium105 and transfers it torouter100 viacommunications medium102.Router100, not being able to route DEC LAT traffic, may bridge the data frame back to switch200 viacommunications medium101.Switch200 receives the data frame and, because the data frame is bridged instead of routed, the source MAC address is unchanged.Switch200 has now received on both ports205 (in VLAN220) and207 (in VLAN210) a data frame having the MAC address fornode106, and cannot, therefore, unambiguously determine over whichport node106 is connected, or which VLAN should be associated withnode106. Therefore,switch200 is unable to informswitch300 of which VLAN should be associated with the MAC address ofnode106.
Another circumstance which creates difficulties in establishing a MAC address to VLAN mapping is when a routing protocol, e.g., the DecNet routing protocol, transmits data frames using the same source MAC address on bothcommunications mediums101 and102.
Yet another drawback of the configuration ofdata network10 as illustrated inFIG. 2A is that a communications link is needed betweennetwork switch200 androuter100 for each virtual local area network (VLAN). As the number of physical LAN segments and VLAN segments increase, and as the distance between LANs increase necessitating utilization of metropolitan- and wide-area communications mediums/facilities, the monetary and administrative expense required to maintaindata network10 also increases. As illustrated inFIG. 3, one means of reducing this expense is to combine multiple communications links into a single shared communications medium300 betweenswitch200 androuter100. The same problems which preventedswitch300 inFIG. 2B from reliably determining the proper VLAN for frames received oversegment190 also preventswitch200 inFIG. 3 from reliably associating VLANs with data frames received oversegment300. Thus, a means is needed to identify the virtual local area network (VLAN) from which a frame originated when transferring the frame over a communications medium shared among multiple VLANs.
One such prior art method identifying the VLAN associated with a MAC address of a node involves creating and maintaining a lookup table on each network device in the data network. The lookup table contains entries associating the MAC address of a node with the port on the network device over which the node is reachable. The node may be coupled to a shared or dedicated communications medium which is further coupled to the port. Each entry also contains a VLAN identifier identifying the virtual local area network (VLAN) assigned to the port. If multiple network devices exist in the data network, as illustrated inFIG. 3, they may utilize a protocol to exchange lookup tables so that each device knows which VLAN is assigned to each port on each device and what nodes (identified by their respective MAC addresses) are reachable via each port as well as which nodes belong to the same VLAN and are allowed, therefore, to communicate with each other.
A prior art method of reliably identifying the VLAN from which a data frame originated utilizes a management defined field (MDF) of an IEEE standard 802,10 Secure Data Exchange (SDE) Protocol Data Unit (PDU). The MDF allows the transfer of proprietary information that may facilitate the processing of a data frame. The prior art method uses the MDF to store a VLAN identifier as the data frame is transferred from a network device over a communications medium shared among multiple VLANs so that when another network device receives a data frame from the shared communications medium, it can determine the VLAN associated with the data frame and determine whether to forward the frame accordingly, depending on the VLANs configured for each port on the network device.
FIG. 4 illustrates the frame format for an IEEE 802.3 MAC/802.10 SDE data frame utilizing the MDF to identify the VLAN associated with the data frame.Portion401 ofdata frame400 is the IEEE 802.3 media access control (MAC) header, comprising a 6 byte destination MAC address field, and 6 byte source MAC address field, and a 2 byte length field.Portion402 indicates the IEEE 802.10 secure data exchange (SDE) clear header, comprising theSDE designator field404 containing a special destination service access point (DSAP), source service access point (SSAP), and control field for SDE frames, a security association identifier (SAID)field405, and the management defined field (MDF)406. The remainder of the original data frame, comprising its IEEE 802.2 LLC header followed by the user data, is included infield403.
A VLAN identifier representing the VLAN associated with the data frame received by the network device is placed in theMDF406 by the MAC layer and other relevant hardware and software in the network device. When the frame is subsequently transmitted across a shared communications medium, such as whenswitch300 ofFIG. 2B forwards over shared communications medium190 a data frame destined for a node coupled to a port associated with a different VLAN onswitch200,switch200 is able to determine the VLAN from which the data frame was received byswitch300 and forward it accordingly to router100 (if, indeed, inter-VLAN communication is required).Router100 then routes the data frame back to switch200, whereswitch200 then determines whether to forward the frame to the appropriate port based on the VLAN identifier in the MDF and destination MAC address in the destination MAC address field.
However, the frame format illustrated inFIG. 4 supports only the IEEE 802.3 media access control standards. An Ethernet-based data frame is considered nonstandard by the IEEE, and, therefore, cannot utilize theIEEE 802,10 header, or any other IEEE based header to preserve the VLAN, except through the use of an additional layer of encapsulation. IEEE Recommended Practice 802.1H is one way of performing this additional encapsulation. This extra layer of encapsulation reduces the efficiency of bandwidth utilization and adds complexity to the implementation. Thus, a method and frame format for identifying the VLAN associated with a data frame received at a network switch from either an Ethernet LAN or an IEEE 802.3 LAN is needed to support the existing infrastructure of Ethernet networks in a data network transmitting data frames from multiple VLANs across a shared communications medium. This will allow compatibility with Ethernet-based nodes on the same shared media with nodes supporting VLAN identification.
SUMMARY OF THE DISCLOSURE
The present invention relates to a method and frame format for preserving in a data frame as the data frame is transmitted across a communications medium shared among a plurality of virtual local area networks (VLANs), the VLAN which was associated with the data frame at the point where it entered the network. The method supports existing data network infrastructures, including Ethernet based data network infrastructures.
According to one aspect of the invention, a data frame format extends the traditional Ethernet frame format to accommodate a VLAN header. In one embodiment, a unique Ethernet type field value is used to identify the data frame as having a VLAN header inserted between the Ethernet type field and the user data field. In another embodiment, the unique Ethernet type field value is used to identify the data frame as having a VLAN header inserted prior to the Ethernet type field of the original Ethernet frame.
The original Ethernet type field or the length field of an IEEE 802.3 data frame is preserved when the data frame is transferred from a shared communications medium to a dedicated communications medium, as when happens when a network switch receives the data frame over shared communications medium coupling the network switch to another network switch, and transmits the data frame over a dedicated communications medium coupling the network switch to a node.
The VLAN header comprises a VLAN identifier field that identifies the VLAN associated with the frame at the point at which the data frame was received by a network switch. In one embodiment, the VLAN header is further comprised of a VLAN identifier type and/or a VLAN identifier length field, both of which precede the VLAN identifier field and respectively specify a format and length of the subsequent VLAN identifier field.
Thus it is an object of the present invention to provide a method and frame format for identifying the VLAN associated with a data frame received at a network switch from an Ethernet or IEEE 802.3 LAN. This is needed to support the existing infrastructure of Ethernet networks in a data network transmitting data frames from multiple VLANs across a shared communications medium. This will allow compatibility with both IEEE 802.3-based and traditional Ethernet-based nodes on the same shared media with nodes supporting VLAN identification as well.
It is another object of the present invention to provide a data frame format that allows for inclusion of a VLAN identifier field that does not extend the MAC frame so far as to require fragmentation to avoid ambiguity between Ethernet and IEEE 802.3 frame types.
BRIEF DESCRIPTION OF THE DRAWINGS
The present invention is illustrated by way of example and not limitation in the following figures. Like references indicate similar elements, in which:
FIG. 1 illustrates a prior art data network topology.
FIG. 2A illustrates a prior art data network topology utilizing virtual local area networks.
FIG. 2B illustrates a prior art data network topology utilizing virtual local area networks and shared communications media between network devices.
FIG. 3 further illustrates a prior art data network topology utilizing virtual local area networks and shared communications media between network devices.
FIG. 4 illustrates the IEEE 802.3 MAC/802.1 SDE frame format as may be utilized in the prior art.
FIG. 5(a) illustrates an Ethernet frame format.
FIG. 5(b) illustrates a modified Ethernet frame format as may be utilized by the present invention.
FIG. 5(c) illustrates a modified Ethernet frame format as may be utilized by the present invention.
DETAILED DESCRIPTION OF THE EMBODIMENTS OF THE INVENTION
Described herein is a method and frame format for preserving in a data frame the virtual local area network (VLAN) associated with the data frame when transmitting the data frame over a communications medium shared among multiple VLANs. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one of ordinary skill in the art that the present invention may be practiced without these specific details. In other instances, well-known standards, frame format details, and techniques have not been shown in order not to unnecessarily obscure the present invention.
As network switching becomes more prevalent in data networks, and in particular, local area networks, it is desirable to segment data traffic into groups of virtual local area networks (VLANs), as discussed above. Generally, the MAC address of each node, as determined by the contents of the source MAC address field of a data frame transmitted by the node, is mapped to, or associated with, a VLAN assigned to the port of a network device (e.g., a network switch) at which the data frame enters the switched network. The method by which the network device forwards the data frame varies depending on whether the target node (as determined by the MAC address in the destination MAC address field of the data frame) resides on the same or different VLAN as the source node. It may be desirable to use a standard shared communications medium such as IEEE standard 10BASE-F or 100BASE-T for a backbone transmission fabric between network devices in a switched network. However, unless separate cables are use for each VLAN, the VLAN association of each data frame cannot be determined when the data frame is transmitted over the shared communications medium. A means for identifying, or preserving, the VLAN associated with each data frame when transmitting the data frames over a shared communications medium is needed.
The method described herein provides for a shared communications medium for transferring data frames from multiple virtual local area networks (VLANs) while preserving the VLAN associated with each frame, regardless of whether the data network supports the interconnection of Ethernet or IEEE standard 802.3 nodes.
FIG. 5(a) illustrates the data frame format for an Ethernet network. Like the IEEE standard 802.3 frame format, the Ethernet frame format begins with a 6 byte destination MAC address field followed by a 6 byte source MAC address field. However, unlike the IEEE standard 802.3 frame format, a 2 byte Ethernet type (ETYPE)field503 follows the source MAC address field. The ETYPE field indicates the protocol type of the next upper layer protocol header which begins immediately following the ETYPE field (e.g., 0800(h) indicates the IP network layer protocol). Thedata field504 comprises any upper layer protocol information and user data, all of which is considered data from the perspective of the MAC sublayer. Finally, a frame check sequence (FCS)field505, comprising a 32-bit cyclical redundancy check (CRC) of the contents offields501,502,503 and504, completes the data frame.
An IEEE 802.3 frame format also begins with a 6 byte destination MAC address field followed by a 6 byte source MAC address field. As is well known to those of skill in the art, a 2 byte LENGTH field follows the source MAC address field. It should be noted that the present invention, although based on a modification of the Ethernet frame format described above, applies equally well when the original frame is an IEEE 802-standard format (e.g., IEEE 802.3). In such a case, the field following the MAC source address contains not the protocol type of an upper layer protocol, but a value indicating the length of the data field, as discussed above. The present invention preserves the value in that field in a new extended Ethernet frame format, but makes no other use of it, and is, therefore, not sensitive to whether the field contains protocol type or length information.
FIG. 5(b) illustrates a data frame format that may be utilized by one embodiment of the present invention. The frame format extends the Ethernet frame format illustrated inFIG. 5(a) to accommodate a virtual local area network (VLAN)header514, along with its associatedVTYPE field513.FIG. 5(b) illustrates a virtual type (VTYPE)field513.VTYPE field513 is inserted after the sourceMAC address field512 and before theETYPE field520 of an Ethernet data frame or the length field of an IEEE 802.3 data frame. The virtual type (VTYPE)field513 identifies the remainder of the frame as an extended Ethernet frame comprising aVLAN header514 inserted, for example, after theEthernet type field520 and before thedata field515 shown inFIG. 5(b).
The contents of theETYPE field503 inFIG. 5(a), or the length field of an IEEE 802.3-based data frame is retained.Location503 inFIG. 5(a) becomeslocation520 inFIG. 5(b). The ETYPE field atlocation520 returns back tolocation503 inFIG. 5(a) when the data frame is transferred from a shared communications medium used to transmit data frames for multiple VLANs to a dedicated communications medium used to transmit data frames for a single VLAN.
A VLAN identifier type (VLAN ID TYPE) field and VLAN identifier length (VLAN LEN) field are present atlocations521 and522, respectively. These two fields are used in combination to specify the format of the VLAN identifier (VLAN ID)field523. Although this embodiment of the present invention utilizes only one type and length of VLAN ID field, is it foreseeable that multiple types of VLAN identifiers may be utilized, and that such identifiers may be of varying lengths, depending on the information conveyed by such identifiers, in which case, a network device receiving the data frame should check the VLAN ID TYPE and VLAN LEN fields and determine whether to accept or reject the data frame. In the event multiple VLAN ID TYPEs are utilized, it is envisioned that the VLAN ID TYPE values will be dispensed by an administrative authority.
The VLAN identifier length (VLAN LEN) field specifies the length of the VLAN identifier field in bytes. In this embodiment, the VLAN identifier field is 4 bytes in length. It is envisioned that the length of the VLAN identifier field will be a multiple of 4 bytes to maintain word alignment of fields in the data frame.
The VLAN identifier (VLAN ID)field523 identifies the VLAN associated with the data frame. A network administrator or similar network wide authority is required to dispense values on a dynamic basis when configuring the virtual networks of the data network.
Anew FCS516 is calculated and replaces theprior FCS505.FCS516 performs a CRC on the destination and source MAC address fields, VTYPE field, ETYPE field, VLAN header, and data field.
While one embodiment has been described wherein theVLAN header514 comprises the VLAN ID TYPE field, the VLAN identifier length (VLAN LEN) field, and the VLAN identifier (VLAN ID) field, alternative embodiments do not necessarily utilize such a VLAN header. For example, in one embodiment, theETYPE field503 inFIG. 5(a), or the length field of an IEEE 802.3-based data frame is contained in the VLAN header. In other words, theVLAN header514 includes thelocation520 wherein the value in theETYPE field503 inFIG. 5(a), or the length field of an IEEE 802.3-based data frame is preserved. In other embodiments, the VLAN header does not contain one or both of the VLAN ID TYPE field and the VLAN identifier length (VLAN LEN) field. Thus, the VLAN header can contain any number of fields in addition to the VLAN identifier (VLAN ID) field. It is appreciated that the format of the VLAN header can be differentiated by assignment of differing values toVTYPE field513.
The extended Ethernet frame format illustrated inFIG. 5(b) may be utilized in the following manner. A network device (e.g., a network switch) has been configured so that a virtual local area network identifier representing a virtual local area network is assigned to each port on the network device. A data frame utilizing the Ethernet frame format (seeFIG. 5(a)) or IEEE 802.3-based frame format may be transmitted by a node over a dedicated communications medium to the network switch. The network switch receives the data frame at a port coupled to the dedicated communications medium. At that time, or prior to transmitting the data frame over a shared communications medium to another network device, the network switch inserts aVTYPE field513 between the sourceMAC address field512 and the ETYPE field or length field520 (depending on the frame format). The network switch then inserts a VLAN header between the ETYPE field or length field and data field of the data frame. The value originally in the ETYPE field503 (or length field in the case of an IEEE 802.3-based frame format) ofFIG. 5(a) is retained in ETYPE/Length field520 as shown inFIG. 5(b). A value is placed in theVTYPE field513 identifying the frame as containing VLAN identifier information (VTYPE513). If utilized, a VLAN identifier type and VLAN identifier length field is inserted inVLAN header514 at521 and522. Finally, the VLAN identifier associated with the data frame is placed in theVLAN identifier field523. The data frame now having an extended Ethernet frame format is then transmitted over a shared communications medium.
Upon receiving the data frame, a network device processes the data frame. It determines the MAC address of a target node based on the contents of the destinationMAC address field511. Following the sourceMAC address field512, the device then detects the presence of a VLAN header based on the contents of the VTYPE field, and determines the VLAN identifier associated with the data frame based on the contents of the VLAN identifier field. If a port on the network device which is eligible to receive the frame based on the destination MAC address is assigned the same VLAN identifier as the data frame, the network device then removes the VTYPE field and VLAN header from the data frame, calculates a new FCS for the data frame, and transmits the data frame out the port over a dedicated communications medium to the target node.
FIG. 5(c) illustrates a data frame format that may be utilized by an alternative embodiment of the present invention. The frame format also extends the Ethernet frame format illustrated inFIG. 5(a) or an IEEE 802.3-based frame format, as did the frame format inFIG. 5(b), to accommodate a virtual local area network (VLAN)header514. A virtual type (VTYPE)field513 andVLAN header514 is inserted between the sourceMAC address field512 andETYPE field520 of an Ethernet data frame (or the length field of IEEE 802.3-based data frame) to respectively identify the frame as an extended Ethernet frame, and provide the VLAN identifier. Unlike the embodiment described in reference toFIG. 5(b) wherein the ETYPE/Length field520 follows theVTYPE field513 and precedes theVLAN header514 in the data frame, theVLAN header514 is inserted between theVTYPE field513 and the ETYPE/Length field520 such that theETYPE field520 follows theVTYPE field513 andVLAN header514.
The extended Ethernet frame format illustrated inFIG. 5(c) may be utilized in a similar manner as the previously described embodiments of the invention. For example, when a network switch receives the data frame at a port coupled to the dedicated communications medium, at that time, or prior to transmitting the data frame over a shared communications medium to another network device, the network switch inserts, at a location following thesource address field512, theVTYPE field513. A value in theVTYPE513 indicates the presence of a VLAN header. The network switch also inserts theVLAN header514 following theVTYPE field513. The data frame, now having an extended Ethernet frame format, can be transmitted over a shared communications medium.
Upon receiving the data frame, a network device processes the data frame. It determines the MAC address of a target node based on the contents of the destinationMAC address field511, and the MAC address of a source node based on the contents of the sourceMAC address field512. The device then processes theVTYPE field513. In processing theVTYPE field513, the device detects the presence of theVLAN header514, and determines the format of the VLAN identifier (VLAN ID)field523 associated with the data frame from the VLAN identifier type (VLAN ID TYPE)field521 and the VLAN identifier length (VLAN LEN)field522. Subsequent to processing theVLAN header514, the network device continues processing the data frame as is would process a non-VLAN frame.
While one embodiment has been described wherein a VLAN identifier type field is followed by a VLAN length field in the VLAN header, alternative embodiments of the invention do not necessarily use one or both of these fields, or may specify a VLAN length field followed by a VLAN identifier type field in a VLAN header. Thus, it is appreciated that the embodiment illustrated inFIG. 5(c) can be modified in any number of ways, as long as a VTYPE field is followed, in order, by a VLAN identifier field and an Ethernet type field (or length field for IEEE 802.3-based data frames).
There are, of course, other alternatives to the described embodiments of the invention which are within the understanding of one of ordinary skill in the relevant art. For example, the type of network switch which has a single VLAN identifier associated with each port and assumes that a data frame received on a port is destined for the VLAN associated with that port is just one type of network switch. Network switches may present more sophisticated methods of handling VLANs. In the general case, when a data frame is received from an end station on a network switch port, the switch will apply a set of rules to determine the VLAN to which that data frame should be forwarded. The rules can include such things as the port number at which a data frame is received, the data frame's ISO Layer3 protocol type, the data frame's MAC or network layer source address, time of day, etc. More importantly, the first VLAN aware network switch to receive the data frame should apply its rules and assign the data frame to a VLAN. Thus, the present invention is intended to be limited only by the claims presented below.
Thus, what has been described is a method and frame format for preserving in a data frame the virtual local area network (VLAN) associated with a port on a network device from which the data frame was received when transmitting the data frame over a shared communications medium.

Claims (27)

We claim:
1. A method of identifying a virtual network associated with a data frame when transmitting said data frame between a communications medium and a shared communications medium, comprising the steps of:
a) receiving said data frame from said communications medium, said data frame comprising a first type field and a data field;
b) inserting a second type field at a location within said data frame preceding said first type field, said second type field indicating said data frame comprises a virtual network identifier field;
c) inserting said virtual network identifier field at a location between said second typo field and said first type field;
d) assigning a first value to said virtual network identifier field, said first value corresponding to said virtual network; and
e) transmitting said data frame over said shared communications medium.
2. The method ofclaim 1, further comprising the steps of:
1) inserting between said second type field and said virtual network identifier field a virtual network identifier type field; and
2) assigning a second value to said virtual network identifier type field indicating a type of said first value in said virtual network identifier field.
3. The method ofclaim 1, further comprising the steps of:
1) inserting between said second type field and said virtual network identifier field a virtual network identifier length field; and
2) assigning a second value to said virtual network identifier length field indicating a length of said first value in said virtual network identifier field.
4. The method ofclaim 1 wherein said virtual network identifier field is 4 bytes.
5. The method ofclaim 1 wherein said virtual network identifier field is a multiple of 4 bytes.
6. The method ofclaim 1 wherein said first type field indicates a protocol type.
7. A method of identifying a virtual network associated with a data frame when transmitting said data frame between a communications medium and a shared communications medium, comprising the steps of:
a) receiving said data frame from said communications medium, said data frame comprising a length field and a data field;
b) inserting a type field at a location within said data frame preceding said length field, said type field indicating said data frame comprises a virtual network identifier field;
c) inserting said virtual network identifier field at a location between said type field and said length field;
d) assigning a first value to said virtual network identifier field, said first value corresponding to said virtual network; and
e) transmitting said data frame over said shared communications medium.
8. The method ofclaim 7, further comprising the steps of:
1) inserting between said type field and said virtual network identifier field a virtual network identifier type field; and
2) assigning a second value to said virtual network identifier type field indicating a type of said first value in said virtual network identifier field.
9. The method ofclaim 7, further comprising the steps of:
1) inserting between said type field and said virtual network identifier field a virtual network identifier length field; and
2) assigning a second value to said virtual network identifier length field indicating a length of said first value in said virtual network identifier field.
10. The method ofclaim 8 wherein said virtual network identifier field is a multiple of 4 bytes.
11. In a network device, a method of transmitting a virtual network identifier in a data frame transmitted on a shared communications medium coupled to said network device, comprising:
a) transmitting a preamble field;
b) transmitting a destination and source media access control address field;
c) transmitting a first type field whose contents indicate said virtual network identifier is present in said data frame;
d) transmitting a virtual network identifier field containing said virtual network identifier;
e) transmitting a second type field whose contents indicate a protocol type associated with said data frame; and,
f) transmitting a data field.
12. The method ofclaim 11 wherein said virtual network identifier field is 4 bytes.
13. In a network device having a first port coupled to a local area network (LAN) segment and a second port coupled to a shared communications medium, a method of associating a virtual network with a data frame received from said LAN segment and transmitted to said shared communications medium, comprising:
a) receiving said data frame at said first port, said data frame comprising a type field and a data field;
b) replacing a first value in said type field representing a protocol type with a second value indicating said data frame comprises a virtual network identifier field;
c) inserting said virtual network identifier field in said data frame between said type field containing said second value and said data field;
d) assigning a value representing said virtual network to said virtual network identifier field; and
e) transmitting said data frame from said second port.
14. The method ofclaim 13 further comprising:
a) inserting a new type field between said virtual network identifier field and said data field; and
b) assigning said first value representing said protocol type to said new type field to preserve said protocol type.
15. The method ofclaim 13 wherein said virtual network identifier field is 4 bytes.
16. The method ofclaim 13 wherein said virtual network as identifier field is a multiple of 4 bytes.
17. A network device comprising:
a first port configured to be coupled to a local area network (LAN);
a second port configured to be coupled to a shared communications medium;
a processing unit configured to receive a data frame via the second port, the data frame including a destination address field, a source address field, a virtual network type field having a value indicative that the data frame includes a virtual network identifier field, at least one of a virtual network identifier type field and a virtual network identifier length field, the virtual network identifier field, either an e-type field or a data length field having a corresponding value indicating a protocol type or a length of a data field, respectively, and the data field, the virtual network identifier field having a value indicative of the LAN, the virtual network identifier type field having a value indicating a type of the virtual network identifier field and the virtual network identifier length field having a value indicating a length of the virtual network identifier field, the processing unit being further configured to read the virtual network identifier field in response to reading the virtual network type field and in accordance with the at least one of the virtual network identifier type field value and the virtual network identifier length field value, and to transmit the data frame toward the LAN via the first port.
18. The network device of claim 17 wherein the data frame includes both the virtual network identifier type field and the virtual network identifier length field.
19. The network device of claim 17, wherein the processing unit is configured to select the first port for transmission of the data frame based at least in part on the value of the virtual network identifier field.
20. The network device of claim 19, wherein the processing unit is configured to:
remove the virtual network type field and the virtual network identifier field and at least one of the virtual network identifier type field and virtual network identifier length field from the data frame; and
transmit the data frame toward the LAN via the first port without the virtual network type field and without the virtual network identifier field and without at least one of the virtual network identifier type field and virtual network identifier length field.
21. The network device of claim 20, wherein the processing unit is configured to:
calculate a frame check sequence for the data frame with the virtual network type field and the virtual network identifier field and at least one of the virtual network identifier type field and virtual network identifier length field removed; and
transmit the data frame toward the LAN via the first port with the calculated frame check sequence.
22. The network device of claim 17, wherein the value of the virtual network type field corresponds to Ethernet.
23. A network device comprising:
a first port configured to be coupled to a local area network (LAN);
a second port configured to be coupled to a shared communications medium;
a processing unit configured to receive a data frame via the second port, the data frame including a destination address field, a source address field, a virtual network type field having a value indicative that the data frame includes a virtual network identifier field, the virtual network identifier field, either an e-type field or a data length field having a corresponding value indicating a protocol type or a length of a data field, respectively, and the data field, the virtual network identifier field having a value indicative of the LAN, the processing unit being further configured to read the virtual network identifier field in response to reading the virtual network type field, and to transmit the data frame toward the LAN via the first port.
24. The network device of claim 23, wherein the processing unit is configured to select the first port for transmission of the data frame based at least in part on the value of the virtual network identifier field.
25. The network device of claim 24, wherein the processing unit is configured to:
remove the virtual network type field and the virtual network identifier field from the data frame; and
transmit the data frame toward the LAN via the first port without the virtual network type field and without the virtual network identifier field.
26. The network device of claim 25, wherein the processing unit is configured to:
calculate a frame check sequence for the data frame with the virtual network type field and the virtual network identifier field removed; and
transmit the data frame toward the LAN via the first port with the calculated frame check sequence.
27. The network device of claim 23, wherein the value of the virtual network type field corresponds to Ethernet.
US13/728,7471996-03-122012-12-27VLAN frame formatExpired - LifetimeUSRE45521E1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US13/728,747USRE45521E1 (en)1996-03-122012-12-27VLAN frame format

Applications Claiming Priority (5)

Application NumberPriority DateFiling DateTitle
US08/613,726US5959990A (en)1996-03-121996-03-12VLAN frame format
US08/705,631US6111876A (en)1996-03-121996-08-30VLAN frame format
US10/225,708USRE40999E1 (en)1996-03-122002-08-22Vlan frame format
US12/459,465USRE44775E1 (en)1996-03-122009-06-30VLAN frame format
US13/728,747USRE45521E1 (en)1996-03-122012-12-27VLAN frame format

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US08/705,631ReissueUS6111876A (en)1996-03-121996-08-30VLAN frame format

Publications (1)

Publication NumberPublication Date
USRE45521E1true USRE45521E1 (en)2015-05-19

Family

ID=41327977

Family Applications (9)

Application NumberTitlePriority DateFiling Date
US08/705,631CeasedUS6111876A (en)1996-03-121996-08-30VLAN frame format
US10/225,708Expired - LifetimeUSRE40999E1 (en)1996-03-122002-08-22Vlan frame format
US12/459,465Expired - LifetimeUSRE44775E1 (en)1996-03-122009-06-30VLAN frame format
US13/728,787Expired - LifetimeUSRE45065E1 (en)1996-03-122012-12-27VLAN frame format
US13/728,823Expired - LifetimeUSRE45081E1 (en)1996-03-122012-12-27VLAN frame format
US13/728,747Expired - LifetimeUSRE45521E1 (en)1996-03-122012-12-27VLAN frame format
US13/728,846Expired - LifetimeUSRE45095E1 (en)1996-03-122012-12-27VLAN frame format
US13/728,698Expired - LifetimeUSRE45598E1 (en)1996-03-122012-12-27VLAN frame format
US13/728,867Expired - LifetimeUSRE45121E1 (en)1996-03-122012-12-27VLAN frame format

Family Applications Before (5)

Application NumberTitlePriority DateFiling Date
US08/705,631CeasedUS6111876A (en)1996-03-121996-08-30VLAN frame format
US10/225,708Expired - LifetimeUSRE40999E1 (en)1996-03-122002-08-22Vlan frame format
US12/459,465Expired - LifetimeUSRE44775E1 (en)1996-03-122009-06-30VLAN frame format
US13/728,787Expired - LifetimeUSRE45065E1 (en)1996-03-122012-12-27VLAN frame format
US13/728,823Expired - LifetimeUSRE45081E1 (en)1996-03-122012-12-27VLAN frame format

Family Applications After (3)

Application NumberTitlePriority DateFiling Date
US13/728,846Expired - LifetimeUSRE45095E1 (en)1996-03-122012-12-27VLAN frame format
US13/728,698Expired - LifetimeUSRE45598E1 (en)1996-03-122012-12-27VLAN frame format
US13/728,867Expired - LifetimeUSRE45121E1 (en)1996-03-122012-12-27VLAN frame format

Country Status (1)

CountryLink
US (9)US6111876A (en)

Families Citing this family (121)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6370142B1 (en)*1995-07-122002-04-09Nortel Networks LimitedMethod and apparatus for performing per-port IP multicast pruning
US5959990A (en)*1996-03-121999-09-28Bay Networks, Inc.VLAN frame format
US6111876A (en)*1996-03-122000-08-29Nortel Networks LimitedVLAN frame format
US6347089B1 (en)*1997-07-022002-02-12Advanced Communication Devices Corp.Simplified ethernet frame switching system architecture without local buffer requirement
CA2217275C (en)*1997-10-032005-08-16Newbridge Networks CorporationMultiple internetworking realms within an internetworking device
US6301224B1 (en)1998-01-132001-10-09Enterasys Networks, Inc.Network switch with panic mode
US6469987B1 (en)*1998-01-132002-10-22Enterasys Networks, Inc.Virtual local area network with trunk stations
US6112251A (en)1998-01-132000-08-29Cabletron Systems, Inc.Virtual local network for sending multicast transmissions to trunk stations
US6266705B1 (en)*1998-09-292001-07-24Cisco Systems, Inc.Look up mechanism and associated hash table for a network switch
US6526052B1 (en)1998-12-232003-02-25Enterasys Networks, Inc.Virtual local area networks having rules of precedence
US7146354B1 (en)1999-06-182006-12-05F5 Networks, Inc.Method and system for network load balancing with a compound data structure
US6405219B2 (en)1999-06-222002-06-11F5 Networks, Inc.Method and system for automatically updating the version of a set of files stored on content servers
US6374300B2 (en)1999-07-152002-04-16F5 Networks, Inc.Method and system for storing load balancing information with an HTTP cookie
US7287084B1 (en)1999-07-152007-10-23F5 Networks, Inc.Enabling encryption of application level persistence between a server and a client
US7346695B1 (en)2002-10-282008-03-18F5 Networks, Inc.System and method for performing application level persistence
US6532225B1 (en)*1999-07-272003-03-11At&T CorpMedium access control layer for packetized wireless systems
US7441045B2 (en)*1999-12-132008-10-21F5 Networks, Inc.Method and system for balancing load distribution on a wide area network
JP2001211190A (en)*2000-01-252001-08-03Hitachi Ltd Communication management device and communication management method
US7047301B2 (en)2000-01-312006-05-16F5 Networks, Inc.Method and system for enabling persistent access to virtual servers by an LDNS server
US7343413B2 (en)*2000-03-212008-03-11F5 Networks, Inc.Method and system for optimizing a network by independently scaling control segments and data flow
US8380854B2 (en)*2000-03-212013-02-19F5 Networks, Inc.Simplified method for processing multiple connections from the same client
US6741592B1 (en)*2000-05-222004-05-25Cisco Technology, Inc.Private VLANs
US7200145B1 (en)2000-05-222007-04-03Cisco Technology, Inc.Private VLANs
US6765870B2 (en)*2000-12-212004-07-20At&T Wireless Services, Inc.Medium access dynamic congestion control mechanism for wireless data
US6765869B2 (en)*2000-12-212004-07-20At&T Wireless Services, Inc.Medium access dynamic congestion control mechanism for wireless data
US6618388B2 (en)*2001-01-052003-09-09Extreme NetworksMethod and system for VMAN protocol
US20020167950A1 (en)*2001-01-122002-11-14Zarlink Semiconductor V.N. Inc.Fast data path protocol for network switching
US7450595B1 (en)2001-05-012008-11-11At&T Corp.Method and system for managing multiple networks over a set of ports
US20030235191A1 (en)*2002-06-192003-12-25Heggarty Jonathan W.VLAN inheritance
JP2004080323A (en)*2002-08-162004-03-11Fujitsu Ltd LAN switching method and LAN switch
US7430755B1 (en)2002-09-032008-09-30Fs Networks, Inc.Method and system for providing persistence in a secure network access
US7133915B2 (en)*2002-10-102006-11-07International Business Machines CorporationApparatus and method for offloading and sharing CPU and RAM utilization in a network of machines
FR2851865B1 (en)*2003-02-282005-05-06Quadrillium Sarl PLESIOCHRONES DIGITAL DATA TRAIN TRANSMISSION SYSTEM
US7706363B1 (en)2003-06-112010-04-27Radlan Computer Communications, LtdMethod and apparatus for managing packets in a packet switched network
JP4587446B2 (en)*2003-08-072010-11-24キヤノン株式会社 NETWORK SYSTEM, SWITCH DEVICE, ROUTE MANAGEMENT SERVER, ITS CONTROL METHOD, COMPUTER PROGRAM, AND COMPUTER-READABLE STORAGE MEDIUM
FR2867642B1 (en)*2004-03-092006-08-18Cit Alcatel DEVICE AND METHOD FOR PROCESSING MULTIPROTOCOLAR FIELD FRAMES FOR A COMMUNICATIONS NETWORK
US20060088163A1 (en)*2004-10-252006-04-27Carmichael Richard DIntegrated circuit capable of pre-descrambling a portion of a frame
US7680053B1 (en)2004-10-292010-03-16Marvell International Ltd.Inter-device flow control
US8464299B1 (en)2004-11-172013-06-11Rockstar Consortium Us LpResource conservation for packet television services
US7710966B1 (en)2005-07-192010-05-04Google Inc.Distributing packets more evenly over trunked network links
US8189599B2 (en)*2005-08-232012-05-29Rpx CorporationOmni-protocol engine for reconfigurable bit-stream processing in high-speed networks
US7633956B1 (en)*2006-01-192009-12-15Cisco Technology, Inc.System and method for providing support for multipoint L2VPN services in devices without local bridging
US8924524B2 (en)2009-07-272014-12-30Vmware, Inc.Automated network configuration of virtual machines in a virtual lab data environment
US8892706B1 (en)2010-06-212014-11-18Vmware, Inc.Private ethernet overlay networks over a shared ethernet in a virtual environment
US8619771B2 (en)2009-09-302013-12-31Vmware, Inc.Private allocated networks over shared communications infrastructure
US7953089B1 (en)*2006-05-162011-05-31Cisco Technology, Inc.Systems and methods for multicast switching in a private VLAN
US8566452B1 (en)2006-08-032013-10-22F5 Networks, Inc.Intelligent HTTP based load-balancing, persistence, and application traffic management of SSL VPN tunnels
US8116309B2 (en)*2006-08-112012-02-14PSIMAST, IncEnhanced Ethernet protocol for shortened data frames within a constrained neighborhood based on unique ID
US8379638B2 (en)*2006-09-252013-02-19Certes Networks, Inc.Security encapsulation of ethernet frames
US8806053B1 (en)2008-04-292014-08-12F5 Networks, Inc.Methods and systems for optimizing network traffic using preemptive acknowledgment signals
US8195774B2 (en)2008-05-232012-06-05Vmware, Inc.Distributed virtual switch for virtualized computer systems
US7975025B1 (en)2008-07-082011-07-05F5 Networks, Inc.Smart prefetching of data over a network
US8566444B1 (en)2008-10-302013-10-22F5 Networks, Inc.Methods and system for simultaneous multiple rules checking
US10157280B2 (en)2009-09-232018-12-18F5 Networks, Inc.System and method for identifying security breach attempts of a website
US10721269B1 (en)2009-11-062020-07-21F5 Networks, Inc.Methods and system for returning requests with javascript for clients before passing a request to a server
US8868961B1 (en)2009-11-062014-10-21F5 Networks, Inc.Methods for acquiring hyper transport timing and devices thereof
US9313047B2 (en)2009-11-062016-04-12F5 Networks, Inc.Handling high throughput and low latency network data packets in a traffic management device
US8819161B1 (en)2010-01-182014-08-26Marvell International Ltd.Auto-syntonization and time-of-day synchronization for master-slave physical layer devices
US9141625B1 (en)2010-06-222015-09-22F5 Networks, Inc.Methods for preserving flow state during virtual machine migration and devices thereof
US10015286B1 (en)2010-06-232018-07-03F5 Networks, Inc.System and method for proxying HTTP single sign on across network domains
US8908545B1 (en)2010-07-082014-12-09F5 Networks, Inc.System and method for handling TCP performance in network access with driver initiated application tunnel
US8347100B1 (en)2010-07-142013-01-01F5 Networks, Inc.Methods for DNSSEC proxying and deployment amelioration and systems thereof
US9083760B1 (en)2010-08-092015-07-14F5 Networks, Inc.Dynamic cloning and reservation of detached idle connections
US8630174B1 (en)2010-09-142014-01-14F5 Networks, Inc.System and method for post shaping TCP packetization
US8886981B1 (en)2010-09-152014-11-11F5 Networks, Inc.Systems and methods for idle driven scheduling
US8463909B1 (en)2010-09-152013-06-11F5 Networks, Inc.Systems and methods for managing server resources
US8804504B1 (en)2010-09-162014-08-12F5 Networks, Inc.System and method for reducing CPU load in processing PPP packets on a SSL-VPN tunneling device
US8959571B2 (en)2010-10-292015-02-17F5 Networks, Inc.Automated policy builder
WO2012058643A2 (en)2010-10-292012-05-03F5 Networks, Inc.System and method for on the fly protocol conversion in obtaining policy enforcement information
US8627467B2 (en)2011-01-142014-01-07F5 Networks, Inc.System and method for selectively storing web objects in a cache memory based on policy decisions
US10135831B2 (en)2011-01-282018-11-20F5 Networks, Inc.System and method for combining an access control system with a traffic management system
US9246819B1 (en)2011-06-202016-01-26F5 Networks, Inc.System and method for performing message-based load balancing
US9270766B2 (en)2011-12-302016-02-23F5 Networks, Inc.Methods for identifying network traffic characteristics to correlate and manage one or more subsequent flows and devices thereof
US10230566B1 (en)2012-02-172019-03-12F5 Networks, Inc.Methods for dynamically constructing a service principal name and devices thereof
US9231879B1 (en)2012-02-202016-01-05F5 Networks, Inc.Methods for policy-based network traffic queue management and devices thereof
US9172753B1 (en)2012-02-202015-10-27F5 Networks, Inc.Methods for optimizing HTTP header based authentication and devices thereof
WO2013163648A2 (en)2012-04-272013-10-31F5 Networks, Inc.Methods for optimizing service of content requests and devices thereof
US9338095B2 (en)2012-05-012016-05-10F5 Networks, Inc.Data flow segment optimized for hot flows
US9525632B1 (en)2012-05-012016-12-20F5 Networks, Inc.Minimize recycle SYN issues for split TCP hot flows to improve system reliability and performance
US9154423B1 (en)2012-05-012015-10-06F5 Networks, Inc.Minimize SYN-flood issues with flow cache while maintaining performance
US8811409B2 (en)*2012-06-042014-08-19Telefonaktiebolaget L M Ericsson (Publ)Routing VLAN tagged packets to far end addresses of virtual forwarding instances using separate administrations
US9203771B1 (en)2012-07-232015-12-01F5 Networks, Inc.Hot service flow hardware offloads based on service priority and resource usage
US10375155B1 (en)2013-02-192019-08-06F5 Networks, Inc.System and method for achieving hardware acceleration for asymmetric flow connections
US9350657B2 (en)*2013-07-082016-05-24Nicira, Inc.Encapsulating data packets using an adaptive tunnelling protocol
CN103326889B (en)*2013-07-182016-06-08迈普通信技术股份有限公司Communicate between a kind of new and old edition compatible method and device
US9088568B1 (en)2013-09-112015-07-21Talati Family LPApparatus, system and method for secure data exchange
US9667556B2 (en)2013-09-242017-05-30Nicira, Inc.Adjusting connection validating control signals in response to changes in network traffic
US9929880B2 (en)*2013-10-072018-03-27Dell Products L.P.System and method for managing VLAN associations with network ports
US10187317B1 (en)2013-11-152019-01-22F5 Networks, Inc.Methods for traffic rate control and devices thereof
US10015143B1 (en)2014-06-052018-07-03F5 Networks, Inc.Methods for securing one or more license entitlement grants and devices thereof
US9742881B2 (en)2014-06-302017-08-22Nicira, Inc.Network virtualization using just-in-time distributed capability for classification encoding
US11838851B1 (en)2014-07-152023-12-05F5, Inc.Methods for managing L7 traffic classification and devices thereof
US10122630B1 (en)2014-08-152018-11-06F5 Networks, Inc.Methods for network traffic presteering and devices thereof
US10182013B1 (en)2014-12-012019-01-15F5 Networks, Inc.Methods for managing progressive image delivery and devices thereof
US11895138B1 (en)2015-02-022024-02-06F5, Inc.Methods for improving web scanner accuracy and devices thereof
US10834065B1 (en)2015-03-312020-11-10F5 Networks, Inc.Methods for SSL protected NTLM re-authentication and devices thereof
US10505818B1 (en)2015-05-052019-12-10F5 Networks. Inc.Methods for analyzing and load balancing based on server health and devices thereof
US11350254B1 (en)2015-05-052022-05-31F5, Inc.Methods for enforcing compliance policies and devices thereof
US11757946B1 (en)2015-12-222023-09-12F5, Inc.Methods for analyzing network traffic and enforcing network policies and devices thereof
US10404698B1 (en)2016-01-152019-09-03F5 Networks, Inc.Methods for adaptive organization of web application access points in webtops and devices thereof
US10797888B1 (en)2016-01-202020-10-06F5 Networks, Inc.Methods for secured SCEP enrollment for client devices and devices thereof
US11178150B1 (en)2016-01-202021-11-16F5 Networks, Inc.Methods for enforcing access control list based on managed application and devices thereof
US10791088B1 (en)2016-06-172020-09-29F5 Networks, Inc.Methods for disaggregating subscribers via DHCP address translation and devices thereof
ES2935335T3 (en)*2016-08-032023-03-06Hewlett Packard Development Co digitally signed data
US11063758B1 (en)2016-11-012021-07-13F5 Networks, Inc.Methods for facilitating cipher selection and devices thereof
US10505792B1 (en)2016-11-022019-12-10F5 Networks, Inc.Methods for facilitating network traffic analytics and devices thereof
US11496438B1 (en)2017-02-072022-11-08F5, Inc.Methods for improved network security using asymmetric traffic delivery and devices thereof
US10791119B1 (en)2017-03-142020-09-29F5 Networks, Inc.Methods for temporal password injection and devices thereof
US10812266B1 (en)2017-03-172020-10-20F5 Networks, Inc.Methods for managing security tokens based on security violations and devices thereof
US10931662B1 (en)2017-04-102021-02-23F5 Networks, Inc.Methods for ephemeral authentication screening and devices thereof
US10972453B1 (en)2017-05-032021-04-06F5 Networks, Inc.Methods for token refreshment based on single sign-on (SSO) for federated identity environments and devices thereof
US11122042B1 (en)2017-05-122021-09-14F5 Networks, Inc.Methods for dynamically managing user access control and devices thereof
US11343237B1 (en)2017-05-122022-05-24F5, Inc.Methods for managing a federated identity environment using security and access control data and devices thereof
US10637800B2 (en)2017-06-302020-04-28Nicira, IncReplacement of logical network addresses with physical network addresses
US10681000B2 (en)2017-06-302020-06-09Nicira, Inc.Assignment of unique physical network addresses for logical network addresses
US11122083B1 (en)2017-09-082021-09-14F5 Networks, Inc.Methods for managing network connections based on DNS data and network policies and devices thereof
US11658995B1 (en)2018-03-202023-05-23F5, Inc.Methods for dynamically mitigating network attacks and devices thereof
US11044200B1 (en)2018-07-062021-06-22F5 Networks, Inc.Methods for service stitching using a packet header and devices thereof
US11095545B2 (en)2019-10-222021-08-17Vmware, Inc.Control packet management
EP4181470A1 (en)*2021-11-152023-05-17ABB Schweiz AGDeterministic behavior in a shared physical network
KR20230097717A (en)*2021-12-242023-07-03삼성전자주식회사Electronic apparatus and controlling method thereof

Citations (13)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5220564A (en)1990-09-061993-06-15Ncr CorporationTransmission control for a wireless local area network station
US5394402A (en)1993-06-171995-02-28Ascom Timeplex Trading AgHub for segmented virtual local area network with shared media access
US5560038A (en)1994-07-221996-09-24Network Peripherals, Inc.Apparatus for translating frames of data transferred between heterogeneous local area networks
US5583862A (en)1995-03-281996-12-10Bay Networks, Inc.Method and apparatus for routing for virtual networks
US5617421A (en)1994-06-171997-04-01Cisco Systems, Inc.Extended domain computer network using standard links
US5684800A (en)1995-11-151997-11-04Cabletron Systems, Inc.Method for establishing restricted broadcast groups in a switched network
US5740171A (en)1996-03-281998-04-14Cisco Systems, Inc.Address translation mechanism for a high-performance network switch
US5742604A (en)1996-03-281998-04-21Cisco Systems, Inc.Interswitch link mechanism for connecting high-performance network switches
US5764636A (en)1996-03-281998-06-09Cisco Technology, Inc.Color blocking logic mechanism for a high-performance network switch
US5959990A (en)*1996-03-121999-09-28Bay Networks, Inc.VLAN frame format
US6111876A (en)*1996-03-122000-08-29Nortel Networks LimitedVLAN frame format
US20090245227A1 (en)*2008-03-262009-10-01Qualcomm IncorporatedMethods and apparatus for uplink frame synchronization in a subscriber station
US20110134858A1 (en)*2008-01-072011-06-09Dong Youn SeoMethod for scheduling distributed virtual resource blocks

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
IT1211803B (en)*1987-09-251989-11-03Castellammare Di Stabia Napoli EXHAUST PIPE FOR INTERNAL COMBUSTION ENGINES EQUIPPED WITH FILTER HOUSING DEVICE FOR THE ABATEMENT OF SUSPENDED SOLID PARTICLES AND HYDROCARBONS INCOMBUSED IN THE EXHAUST GAS
FI92361C (en)*1992-12-141994-10-25Nokia Telecommunications Oy Method for managing congestion situations in a frame transmission network and a node in a frame transmission network
US6035105A (en)*1996-01-022000-03-07Cisco Technology, Inc.Multiple VLAN architecture system

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5220564A (en)1990-09-061993-06-15Ncr CorporationTransmission control for a wireless local area network station
US5394402A (en)1993-06-171995-02-28Ascom Timeplex Trading AgHub for segmented virtual local area network with shared media access
US5617421A (en)1994-06-171997-04-01Cisco Systems, Inc.Extended domain computer network using standard links
US5560038A (en)1994-07-221996-09-24Network Peripherals, Inc.Apparatus for translating frames of data transferred between heterogeneous local area networks
US5583862A (en)1995-03-281996-12-10Bay Networks, Inc.Method and apparatus for routing for virtual networks
US5684800A (en)1995-11-151997-11-04Cabletron Systems, Inc.Method for establishing restricted broadcast groups in a switched network
US8023515B2 (en)*1995-11-152011-09-20Enterasys Networks, Inc.Distributed connection-oriented services for switched communication networks
US5946308A (en)1995-11-151999-08-31Cabletron Systems, Inc.Method for establishing restricted broadcast groups in a switched network
USRE40999E1 (en)*1996-03-122009-11-24Nortel Networks LimitedVlan frame format
USRE44775E1 (en)*1996-03-122014-02-25Rockstar Consortium US LLPVLAN frame format
US5959990A (en)*1996-03-121999-09-28Bay Networks, Inc.VLAN frame format
US6111876A (en)*1996-03-122000-08-29Nortel Networks LimitedVLAN frame format
US5764636A (en)1996-03-281998-06-09Cisco Technology, Inc.Color blocking logic mechanism for a high-performance network switch
US5742604A (en)1996-03-281998-04-21Cisco Systems, Inc.Interswitch link mechanism for connecting high-performance network switches
US5740171A (en)1996-03-281998-04-14Cisco Systems, Inc.Address translation mechanism for a high-performance network switch
US20110134858A1 (en)*2008-01-072011-06-09Dong Youn SeoMethod for scheduling distributed virtual resource blocks
US20090245227A1 (en)*2008-03-262009-10-01Qualcomm IncorporatedMethods and apparatus for uplink frame synchronization in a subscriber station

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Draft Recommended Practice 802.1H, "Media Access Control (MAC) Bridging of Ethernet V2.0 in 802 Local Area Networks," pp. 1-22, Jul. 7, 1994.
Local and Metropolitan Area Networks 802.10 Supplements, "IEEE Standards-Secure Data Exchange (SDE) Sublayer Management (Subclause 2.8) and Recommended Practice for SDE on Ethernet V2.0 in IEEE 802 LANs (Annex 2H)," May 19, 1994.
Local and Metropolitan Area Networks 802.10 Supplements, "Interoperable LAN/MAN Security (SILS)-Currently Contains Secure Data Exchange (SDE) (Clause 2)," Feb. 5, 1993.

Also Published As

Publication numberPublication date
USRE45121E1 (en)2014-09-09
USRE44775E1 (en)2014-02-25
USRE40999E1 (en)2009-11-24
US6111876A (en)2000-08-29
USRE45081E1 (en)2014-08-19
USRE45598E1 (en)2015-06-30
USRE45095E1 (en)2014-08-26
USRE45065E1 (en)2014-08-05

Similar Documents

PublicationPublication DateTitle
USRE45521E1 (en)VLAN frame format
USRE45708E1 (en)VLAN frame format
US6157647A (en)Direct addressing between VLAN subnets
US6430621B1 (en)System using different tag protocol identifiers to distinguish between multiple virtual local area networks
EP0861544B1 (en)Method for establishing restricted broadcast groups in a switched network
US6172981B1 (en)Method and system for distributing network routing functions to local area network stations
EP1408656B1 (en)Method and device for transparent LAN services
US5600644A (en)Method and apparatus for interconnecting LANs
CA2256698C (en)Connection aggregation in switched communications networks
US7154889B1 (en)Peer-model support for virtual private networks having potentially overlapping addresses
US7773508B2 (en)Protecting the filtering database in virtual bridges
CiscoTransparent Bridging Commands
CiscoTransparent Bridging Commands
CiscoTransparent Bridging Commands
CiscoTransparent Bridging Commands
CiscoTransparent Bridging Commands
CiscoTransparent Bridging Commands
CiscoTransparent Bridging Commands
CiscoTransparent Bridging Commands
CiscoTransparent Bridging Commands
CiscoTransparent Bridging Commands
CiscoTransparent Bridging Commands
CiscoTransparent Bridging Commands
CiscoTransparent Bridging Commands
CiscoTransparent Bridging Commands

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:NORTEL NETWORKS LIMITED, CANADA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:FRANTZ, PAUL J.;THOMPSON, GEOFFREY O.;SIGNING DATES FROM20000704 TO 20000731;REEL/FRAME:029908/0178

ASAssignment

Owner name:ROCKSTAR BIDCO, LP, NEW YORK

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NORTEL NETWORKS, LIMITED;REEL/FRAME:030928/0257

Effective date:20110729

Owner name:ROCKSTAR CONSORTIUM US LP, TEXAS

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ROCKSTAR BIDCO, LP;REEL/FRAME:030928/0792

Effective date:20120509

ASAssignment

Owner name:SPHERIX PORTFOLIO ACQUISITION II, INC., VIRGINIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ROCKSTAR CONSORTIUM US LP;REEL/FRAME:034942/0174

Effective date:20131231

Owner name:SPHERIX INCORPORATED, VIRGINIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SPHERIX PORTFOLIO ACQUISITION II, INC.;REEL/FRAME:034942/0327

Effective date:20140328

ASAssignment

Owner name:RPX CLEARINGHOUSE LLC, CALIFORNIA

Free format text:SECURITY INTEREST;ASSIGNOR:ROCKSTAR CONSORTIUM US LP;REEL/FRAME:035463/0588

Effective date:20150417

Owner name:ROCKSTAR CONSORTIUM US LP, TEXAS

Free format text:SECURITY INTEREST;ASSIGNORS:SPHERIX INCORPORATED;SPHERIX PORTFOLIO ACQUISITION II, INC.;REEL/FRAME:035463/0584

Effective date:20140108

ASAssignment

Owner name:SPHERIX INCOPORATED, MARYLAND

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:RPX CLEARINGHOUSE LLC;REEL/FRAME:037992/0488

Effective date:20160225

ASAssignment

Owner name:INTERNATIONAL LICENSE EXCHANGE OF AMERICA, LLC, PE

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SPHERIX INCORPORATED;REEL/FRAME:038787/0297

Effective date:20160524


[8]ページ先頭

©2009-2025 Movatter.jp