System and method for managing network traffic disruption
First Claim
Patent Images
1. A method, comprising:
- configuring a first network element as a peer to a second network element, wherein the first network element and the second network element are configured to execute a spanning-tree protocol (STP) in a network environment; and
configuring a root bridge ID (BID) to be a same value for the first network element and the second network element such that both operate as root network elements for other network elements in the network environment;
wherein the root BID comprises a bridge priority and a negotiated Virtual Port-Channel (vPC) media access control (VMAC) address.
1 Assignment
0 Petitions
Accused Products
Abstract
A method is provided that includes configuring a first network element as a peer to a second network element. The first network element and the second network element are configured to execute a spanning-tree protocol (STP) in a network environment. The method may also include configuring a priority characteristic to be a same value for the first network element and the second network element such that both operate as root network elements for other network elements in the network environment.
309 Citations
20 Claims
-
1. A method, comprising:
-
configuring a first network element as a peer to a second network element, wherein the first network element and the second network element are configured to execute a spanning-tree protocol (STP) in a network environment; and configuring a root bridge ID (BID) to be a same value for the first network element and the second network element such that both operate as root network elements for other network elements in the network environment; wherein the root BID comprises a bridge priority and a negotiated Virtual Port-Channel (vPC) media access control (VMAC) address. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. Logic encoded in non-transitory media that includes code for execution and when executed by a processor operable to perform operations comprising:
-
configuring a first network element as a peer to a second network element, wherein the first network element and the second network element are configured to execute a spanning-tree protocol (STP) in a network environment; and configuring a root bridge ID (BID) to be a same value for the first network element and the second network element such that both operate as root network elements for other network elements in the network environment; wherein the root BID comprises a bridge priority and a negotiated Virtual Port-Channel (vPC) media access control (VMAC) address. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A first network element, comprising:
-
a memory element configured to store electronic code; a processor operable to execute instructions associated with the electronic code; and a peer-switch module configured to interface with the processor such that the first network element is capable of; configuring itself as a peer to a second network element, wherein the first network element and the second network element are configured to execute a spanning-tree protocol (STP) in a network environment; and configuring a root bridge ID (BID) to be a same value for the first network element and the second network element such that both operate as root network elements for other network elements in the network environment; wherein the root BID comprises a bridge priority and a negotiated Virtual Port-Channel (vPC) media access control (VMAC) address. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification