Interfabric routing header for use with a backbone fabric
First Claim
1. A switching device comprising:
- a first ingress module configured to be connected to a first network and further configured to;
receive a first packet from a first device in the first network,change a destination address of the received first packet from a first phantom address corresponding to a second device in the first network, the phantom address being valid only in the first network, to an identifier of the second device valid only in a second network, wherein the second device is located in the second network and wherein the second network is coupled to the first network by a backbone network, andencapsulate the received first packet within an encapsulation packet such that the payload of the encapsulation packet comprises the received first packet, wherein the encapsulation packet is of the same protocol as the received first packet;
a first egress module configured to be connected to the backbone network and further configured to;
receive the encapsulation packet from the ingress module, andpass the encapsulation packet to the backbone network;
a second ingress module configured to be connected to the backbone network and further configured to;
receive from the backbone network a second encapsulation packet having as a payload a second packet, wherein the second encapsulation packet is of the same protocol as the second packet,recover the second packet from the encapsulation packet, andchange a source identifier of the recovered second packet from an identifier of the second device in the second network, wherein the identifier of the second device in the second network is valid only in the second network to a phantom address in the first network of the second device, wherein the phantom address is valid only in the first network; and
a second egress module configured to be connected to the first network and configured to receive the recovered second packet from the ingress module and pass the recovered second packet to the first device.
7 Assignments
0 Petitions
Accused Products
Abstract
A Fiber Channel router used to join fabrics. EX_ports are used to connect to the fabrics. The EX_port joins the fabric but the router will not merge into the fabric. Ports in the Fiber Channel router can be in a fabric, but other ports can be connected to other fabrics. Fiber Channel routers can be interconnected using a backbone fabric. Global, interfabric and encapsulation headers are developed to allow routing by conventional Fiber Channel switch devices in the backbone fabric and simplify Fiber Channel router routing. Phantom domains and devices must be developed for each of the fabrics being interconnected. Front phantom domains are present at each port directly connected to a fabric. Each of these is then connected to at least one translate phantom domain. Zoning is accomplished by use of a special LSAN zoning naming convention. This allows each administrator to independently define devices are accessible.
49 Citations
10 Claims
-
1. A switching device comprising:
-
a first ingress module configured to be connected to a first network and further configured to; receive a first packet from a first device in the first network, change a destination address of the received first packet from a first phantom address corresponding to a second device in the first network, the phantom address being valid only in the first network, to an identifier of the second device valid only in a second network, wherein the second device is located in the second network and wherein the second network is coupled to the first network by a backbone network, and encapsulate the received first packet within an encapsulation packet such that the payload of the encapsulation packet comprises the received first packet, wherein the encapsulation packet is of the same protocol as the received first packet; a first egress module configured to be connected to the backbone network and further configured to; receive the encapsulation packet from the ingress module, and pass the encapsulation packet to the backbone network; a second ingress module configured to be connected to the backbone network and further configured to; receive from the backbone network a second encapsulation packet having as a payload a second packet, wherein the second encapsulation packet is of the same protocol as the second packet, recover the second packet from the encapsulation packet, and change a source identifier of the recovered second packet from an identifier of the second device in the second network, wherein the identifier of the second device in the second network is valid only in the second network to a phantom address in the first network of the second device, wherein the phantom address is valid only in the first network; and a second egress module configured to be connected to the first network and configured to receive the recovered second packet from the ingress module and pass the recovered second packet to the first device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
receiving a first packet from a first device in the first network, changing a destination address of the received first packet from a first phantom address corresponding to a second device in the first network, the phantom address being valid only in the first network, to an identifier of the second device valid only in a second network, wherein the second device is located in the second network and wherein the second network is coupled to the first network by a backbone network, encapsulating the received first packet within an encapsulation packet such that the payload of the encapsulation packet comprises the received first packet, wherein the encapsulation packet is of the same protocol as the received first packet, and passing the encapsulation packet to the backbone network; and receiving from the backbone network a second encapsulation packet having as a payload a second packet, wherein the second encapsulation packet is of the same protocol as the second packet, recovering the second packet from the encapsulation packet, and changing a source identifier of the recovered second packet from an identifier of the second device in the second network, wherein the identifier of the second device in the second network is valid only in the second network to a phantom address in the first network of the second device, wherein the phantom address is valid only in the first network; and passing the recovered second packet to the second device. - View Dependent Claims (9, 10)
-
Specification