This relates to network devices, and more particularly, to network devices that handle traffic for implementing EVPN E-Tree.
In providing EVPN E-Tree service, provider edge devices can each be attached to root-designated host(s) and/or leaf-designated host(s). Traffic from a root-designated host should be able to reach other root-designated hosts and leaf-designated hosts, whereas traffic from a leaf-designated host should be able to reach root-designated hosts but unable to reach other leaf-designated hosts.
A network can convey network traffic (e.g., in the form of one or more packets, one or more frames, etc.) between hosts. To properly forward the network traffic, the network can include a number of network devices. Some of these network devices may implement an Ethernet Virtual Private Network (EVPN) process and may exchange address reachability information represented by EVPN route information with one another and process the exchanged information. These network devices are sometimes referred to herein as EVPN devices or EVPN peer network devices.
Configurations in which the exchange of EVPN route information (e.g., hardware address reachability information) occurs using Border Gateway Protocol (BGP), or more specifically Multiprotocol BGP (MP-BGP), and/or with Virtual Extensible Local Area Network (VXLAN) (e.g., using EVPN network devices configured to process network traffic with VXLAN headers) are sometimes described herein as illustrative examples. If desired, the exchange of hardware address reachability information can occur with other types of control plane routing protocol and utilize other types of underlying network infrastructure.
For some applications, it may be desirable to implement a network segmentation technology such as EVPN Ethernet-Tree (E-Tree) using EVPN devices. Unlike with Multiprotocol Label Switching (MPLS) infrastructure in which one or more MPLS labels may be used to classify traffic (e.g., as leaf-sourced traffic or as root-sourced traffic) to facilitate network segmentation, a network implementing VXLAN infrastructure may be unable to use the same techniques to facilitate communication of local host role classification (e.g., as root or leaf) between EVPN devices. This is especially troublesome for network configurations in which hosts coupled to the same EVPN device can include both leaf-designated hosts and root-designated hosts.
To allow for the exchange of local host role classification and thereby facilitate the use of segmentation technologies such as EVPN E-Tree with VXLAN infrastructure, an EVPN device may be configured to associate multiple virtual network identifiers (VNIs, which are sometimes referred to as VXLAN network identifiers) to a single local VLAN such as a default (root) VNI and an additional (leaf) VNI. The EVPN device may advertise, to peer EVPN devices, a route containing the leaf VNI, a VLAN identifier (VID) identifying the local VLAN, and a E-Tree extended community indicative of the leaf classification of the VNI and its association with the local VLAN. Based on the reception and processing of this route, the peer EVPN devices may implement proper segmentation for network traffic such as VXLAN broadcast, unknown unicast, and/or multicast (BUM) traffic subsequently received from the EVPN device. If desired, instead of or in addition to the use of the root and leaf VNIs in the VXLAN BUM traffic, EVPN devices may implement proper segmentation based on a flag value (e.g., the flag being set or unset) in the VXLAN header of the VXLAN BUM traffic to indicate role classification of the host originating the traffic.
An illustrative networking system in which EVPN devices implement a network segmentation technology such as EVPN E-Tree is shown in
As shown in
Core network devices 10C may sometimes be referred to as provider (network) core devices whereas edge network devices 10E may sometimes be referred to as provider (network) edge devices. Core network portion 8C may include core network devices 10C that are interconnected with each other within core portion 8C. Network paths 14 (e.g., one or more paths 14-1, one or more paths 14-2, . . . , one or more paths 14-N) couple one or more core network devices 10C to edge network devices 10E (e.g., devices 10E-1, 10E-2, . . . , 10E-N) that serve as interfaces between the core network devices 10C and the edge network portions. These edge network portions (e.g., sites) may each include its own set of hosts 16 (e.g., hosts 16-1, 16-2, . . . , 16-N) and its own set of network devices (not explicitly shown in
Network devices in network 8 such as provider edge network devices 10E, provider core network devices 10C, and network devices in the edge network portions may each include or be a switch (e.g., a single-layer (Layer 2) switch or a multi-layer (Layer 2 and Layer 3) switch), a bridge, a router, a gateway, a hub, a repeater, a firewall, a wireless access point, a network device serving other networking functions, a network device that includes the functionality of two or more of these devices, a management device that controls the operation of one or more of these network devices, and/or other types of network devices. Configurations in which provider edge network devices 10E-1, 10E-2, . . . , 10E-N are (multi-layer) switches, routers, gateways, or network devices that generally include routing functionalities (e.g., implements routing protocols) are described herein as an example.
Hosts 16 may be implemented on host devices or host equipment. Some hosts may be implemented on a shared host device or shared host equipment, while other hosts may each be implemented on a separate host device or a separate piece of host equipment. Different host devices or host equipment in network 8 (e.g., hosts in the edge network portions or sites) serving as end hosts of network 8 may each include or be a computer, a server or server equipment, a portable electronic device such as a cellular telephone, a laptop, etc., a network traffic storage device, a networking service device, network management equipment that manages and controls the operation of one or more of hosts and/or network devices, and/or any other suitable types of specialized or general-purpose host computing equipment, e.g., running one or more client-side and/or server-side applications.
Networking equipment (e.g., network devices and devices or equipment on which hosts are implemented) in network 8 may be connected by one or more wired technologies or standards such as Ethernet (e.g., using copper cables and/or fiber optic cables), thereby forming a wired network portion of network 8 (e.g., including core network portion 8C and portions of edge network portions). If desired, network 8 may also include one or more wireless network portions (e.g., implemented using wireless access points) that extend from the wired network portion.
In some configurations described herein as an example, edge network devices 10E may implement an EVPN over core network 8C, and accordingly, may be referred to as EVPN peer devices with respect to each other. In these illustrative configurations, the EVPN peer devices may exchange EVPN route information (e.g., hardware address reachability information) with one another over core network 8C. The EVPN route information (e.g., BGP messages containing the EVPN route information) may be exchanged based on any suitable underlying (transport layer and internet layer) protocol(s) that facilitate communication across underlay network 8C. The underlay network 8C (and the devices herein) may provide and implement underlying infrastructure over which the overlay VXLAN-based and/or MPLS-based network is implemented.
As shown in
Processing circuitry 28 may include one or more processors or processing units based on central processing units (CPUs), based on graphics processing units (GPUs), based on microprocessors, based on general-purpose processors, based on host processors, based on microcontrollers, based on digital signal processors, based on programmable logic devices such as a field programmable gate array (FPGA) device, based on application specific system processors (ASSPs), based on application specific integrated circuit (ASIC) processors, and/or based on other processor architectures.
Processing circuitry 28 may run (e.g., execute) a network device operating system and/or other software/firmware that is stored on memory circuitry 30. Memory circuitry 30 may include non-transitory (tangible) computer-readable storage media that stores the operating system software and/or any other software code, sometimes referred to as program instructions, software, data, instructions, or code. As an example, the EVPN routing functions performed by network device 10E described herein may be stored as (software) instructions on the non-transitory computer-readable storage media (e.g., in portion(s) of memory circuitry 30 in network device 10E). The corresponding processing circuitry (e.g., one or more processors of processing circuitry 28 in network device 10E) may process or execute the respective instructions to perform the corresponding EVPN routing functions. Memory circuitry 30 may be implemented using non-volatile memory (e.g., flash memory or other electrically-programmable read-only memory configured to form a solid-state drive), volatile memory (e.g., static or dynamic random-access memory), hard disk drive storage, removable storage devices (e.g., storage device removably coupled to device 10E), and/or other storage circuitry. Processing circuitry 28 and memory circuitry 30 as described above may sometimes be referred to collectively as control circuitry 26 (e.g., implementing a control plane of network device 10E).
As just a few examples, processing circuitry 28 may execute network device control plane software such as operating system software, routing policy management software, routing protocol agents or processes (e.g., EVPN and E-Tree service process 36), routing information base agents, and other control software, may be used to support the operation of protocol clients and/or servers (e.g., to form some or all of a communications protocol stack), may be used to support the operation of packet processor(s) 32, may store packet forwarding information, may execute packet processing software, and/or may execute other software instructions that control the functions of network device 10E and the other components therein.
Packet processor(s) 32 may be used to implement a data plane or forwarding plane of network device 10E. Packet processor(s) 32 may include one or more processors or processing units based on central processing units (CPUs), based on graphics processing units (GPUs), based on microprocessors, based on general-purpose processors, based on host processors, based on microcontrollers, based on digital signal processors, based on programmable logic devices such as a field programmable gate array (FPGA) device, based on application specific system processors (ASSPs), based on application specific integrated circuit (ASIC) processors, and/or based on other processor architectures.
Packet processor 32 may receive incoming network traffic via input-output interfaces 34, parse and analyze the received network traffic, process the network traffic based on packet forwarding decision data (e.g., in a forwarding information base) and/or in accordance with network protocol(s) or other forwarding policy, and forward (or drop) the network traffic accordingly. The packet forwarding decision data may be stored on a portion of memory circuitry 30 and/or other memory circuitry integrated as part of or separate from packet processor 32.
Input-output interfaces 34 may include different types of communication interfaces such as Ethernet interfaces (e.g., implemented over one or more Ethernet ports), optical interfaces, wireless interfaces such as Bluetooth interfaces and Wi-Fi interfaces, and/or other communication interfaces for connecting network device 10E to the Internet, a local area network, a wide area network, a mobile network, and/or generally other network device(s), peripheral devices, and computing equipment (e.g., host equipment such as server equipment, client devices, etc.). As an example, input-output interfaces 34 may be implemented using and therefore include ports to which corresponding mating connectors of external components can be physically coupled and electrically connected. Ports may have different form-factors to accommodate different cables, different modules, different devices, or generally different external equipment. If desired, input-output interfaces 34 (e.g., wireless interfaces) may be implemented using and therefore include wireless communication circuitry (e.g., antennas, transceivers, radios, etc.).
Configuration in which some network devices in network 8 (e.g., network devices 10E in
Edge devices 10E-1, 10E-2, and 10E-3 may provide one or more EVPN instances that are attached to (e.g., communicatively coupled to or simply coupled to) root hosts and/or leaf hosts. Each EVPN instance can contain one or more Layer 2 (L2) broadcast domains (e.g., VLANs). Leaf or root designations (sometimes referred to as EVPN role classifications) may be provided on a per (provider) edge device basis, may be provided on a per attachment circuit (e.g., per VLAN) basis, and/or may be provided on a per host (e.g., per MAC address) basis. Configurations in which leaf or root designations are provided on a per host basis are sometimes described herein as illustrative examples. In these examples, hosts of different designations (e.g., both leaf hosts and root hosts) may belong to the same local VLAN and may be coupled to the same provider edge device.
In the example of
To implement the EVPN instance for the VLAN of VLAN-A, edge network device 10E-2 may be coupled to and attached to a second site containing one or more end hosts such as host 16-2 on (e.g., as a member of, belonging to, etc.) VLAN-A. End host 16-2 may be designated and configured at device 10E-2 as a leaf host.
To implement the EVPN instance for the VLAN of VLAN-A, edge network device 10E-3 may be coupled to and attached to a third site containing one or more end hosts such as host 16-3 on (e.g., as a member of, belonging to, etc.) VLAN-A. End host 16-3 may be designated and configured at device 10E-3 as a root host.
While the sites coupled to or generally attached to edge network devices 10E-1, 10E-2, and 10E-3 are shown in
While the example of
To provide EVPN E-Tree service, edge network devices 10E-1, 10E-2, and 10E-3 may be configured to enforce appropriate network segmentation between different leaf and root hosts. Each edge network device 10E may advertise EVPN routes using messages conveyed through underlay network 8C to the other peer edge devices 10E. Each edge network device 10E may receive and process these advertised EVPN routes from the other peer edge network devices 10E to determine the designation of remote hosts and thereby enforce appropriate segmentation (e.g., by appropriate forwarding and dropping traffic) based on root and leaf designations.
It may be desirable to provide E-Tree service for various types of network configurations such as core networks that employ VXLAN infrastructure. To properly implement E-Tree service, it may be desirable for edge network devices to appropriately handle BUM (broadcast, unknown unicast, and/or multicast) traffic, which may be more complex than the handling of unicast traffic. In some configurations described herein as an illustrative example, underlay network 8C may implement VXLAN infrastructure (e.g., a VXLAN overlay) and VXLAN tunnels may be constructed over underlay network 8C. In particular,
As shown in
While suitable mechanisms for implementing E-Tree service in which the underlay network provides MPLS infrastructure exist, mechanisms for implementing E-Tree service for VXLAN infrastructure, especially for the handling of BUM traffic, may be lacking. In particular, while MPLS labels may be used to facilitate exchange of host designation information as part of EVPN routes, analogous labels may not exist when using VXLAN infrastructure.
Accordingly, to provide suitable handling of VXLAN traffic, edge network devices 10E may be configured to handle VXLAN traffic with source host designation information in the VXLAN header that is indicative of root(-host)-sourced traffic or leaf(-host)-sourced traffic. In one illustrative arrangement, the source host designation information may be carried as part of the virtual network identifier in the VXLAN header.
In particular,
As shown in
To prepare remote edge devices for the handling of locally sourced traffic, edge network device 10E-1 may advertise VNI 44 and an indication of VNI 44 as the leaf VNI to the other peer network devices (e.g., devices 10E-2 and 10E-3). As such, based on the reception and processing of such an advertisement message, the peer network devices may configure themselves to appropriately handle VXLAN traffic carrying VNI 44 in its VNI field.
In the example of
Rather than carrying the typical values and/or information designated for these fields, an advertisement message for this EVPN type-1 per Ethernet segment route may be altered to contain E-tree role classification information. In particular, ESI field 58 may carry zero (rather than a non-zero value denoting the Ethernet segment for which the EVPN type-1 route is advertised) as ESI value 60. By generating EVPN route 56 with zero as value 60 for field 58, the sending or advertising device (e.g., device 10E-1 in
Furthermore, ETID field 62 may include, as its value, the identifier of the local VLAN of the advertising edge device for which the leaf VNI is being conveyed (rather than an Ethernet tag identifier value). Using the example of
Edge network device 10E-1 may generate an advertisement message (e.g., BGP message) containing route 56 and may send the message to peer network devices 10E-2 and 10E-3 across underlay network 8C. Upon peer network devices (e.g., network device 10E-2 and/or 10E-3) receiving the advertisement message, the peer network devices may similarly associate the leaf VNI with the corresponding VLAN (e.g., identified by VID VLAN-A) and generate traffic forwarding information to enforce E-Tree segmentation based on the leaf VNI. In other words, network traffic associated with VID VLAN-A and containing the leaf VNI may be determined by the remote peer network device to be leaf-sourced traffic (e.g., traffic that originated from a remote host designated as a leaf host).
In configurations described herein as an illustrative example, advertisement of the default root VNI by device 10E-1 may be omitted. As such, network traffic associated with VID VLAN-A and containing the root VNI (e.g., any VNI other than the advertised leaf VNI) may be determined by the remote peer network device to be root-sourced traffic (e.g., traffic that originated from a remote host designated as a root host).
If desired, the root VNI may be advertised and processed instead of or in addition to the leaf VNI. In other words, the remote peer network devices, after processing the advertised route (e.g., in a BGP advertisement message such as a message containing an altered EVPN type-1 route) indicating the root VNI and its root designation, may determine any network traffic associated with VID VLAN-A and containing the root VNI is root-sourced traffic.
After remote edge network devices 10E (e.g., devices 10E-2 and 10E-3) have received and processed the advertised E-Tree role classification route (e.g., route 56 in
Based on their locally attached hosts for the same VLAN (e.g., whether one or more local leaf and/or root hosts for the same VLAN are communicatively coupled to the edge device), egress-side edge network devices 10E-2 and 10E-3 may appropriately process (e.g., forward and/or drop) the received BUM traffic 70 to provide segmentation for E-Tree service.
To assist in appropriate processing of BUM traffic 70 at the egress side of network 8C (e.g., at devices 10E-2 and 10E-3), each packet of BUM traffic 70 may include a VXLAN header 70 including or generally identifying leaf VNI 74. In particular, in preparation for traversal across network 8C, network device 10E-1 may perform VXLAN encapsulation for BUM traffic 70 that originated from host 16-1A. Because network device 10E-1 is configured to identify host 16-1A as a leaf-designated host, as part of the encapsulation process, a leaf-indicating VNI (e.g., VNI 74) may be included in the VXLAN header (rather than a default or root-indicating VNI).
Prior to the processing of BUM traffic 70, edge network device 10E-1 may have already advertised leaf VNI 74 to peer edge network devices 10E-2 and 10E-3 (e.g., in the manner described in connection with
In an arrangement in which an egress edge network device is coupled or locally attached to local leaf-designated end host(s), the egress network device may decapsulate the VXLAN-encapsulated traffic and drop leaf-sourced BUM traffic 70 to prevent traffic 70 from reaching local leaf-designated host(s) on the identified VLAN. Accordingly, in the example of
In an arrangement in which an egress edge network device is coupled or locally attached to local root-designated end host(s), the egress network device may decapsulate the VXLAN-encapsulated traffic and forward leaf-sourced BUM traffic 70 to the root-designated end host(s) on the identified VLAN. Accordingly, in the example of
In an arrangement in which an egress network device is coupled or locally attached to both leaf-designated and root-designated local hosts, the egress network device may decapsulate the VXLAN-encapsulated traffic and forward the leaf-sourced BUM traffic 70 to root-designated end host(s) in the identified VLAN while dropping the BUM traffic 70 to prevent traffic 70 from reaching leaf-designated end host(s) in the identified VLAN.
Based on their locally attached hosts for the same VLAN (e.g., whether one or more local leaf and/or root hosts for the same VLAN are communicatively coupled to the edge device), edge network devices 10E-2 and 10E-3 may appropriately process (e.g., forward) the received BUM traffic 80 to provide segmentation for E-Tree service.
To assist in appropriate processing of BUM traffic 80 at the egress side of network 8C (e.g., at devices 10E-2 and 10E-3), each packet of BUM traffic 80 may include a VXLAN header 82 including or generally identifying root VNI 84. In particular, in preparation for traversal across network 8C, network device 10E-1 may perform VXLAN encapsulation for BUM traffic 80 that originated from host 16-1B. Because network device 10E-1 is configured to identify host 16-1B as a root-designated host, as part of the encapsulation process, a root-indicating VNI (e.g., VNI 84) may be included in the VXLAN header (rather than a leaf-indicating VNI 74 in
Prior to the processing of BUM traffic 80, edge network device 10E-1 may have already advertised leaf VNI 74 to peer edge network devices 10E-2 and 10E-3 (e.g., in the manner described in connection with
Since traffic originating from root-designated hosts can be received by both leaf-designated and root-designated hosts in the same VLAN, in a configuration in which egress edge network devices (e.g., devices 10E-2 and 10E-3) receive root-designated traffic, the egress network devices may perform a lookup operation based on the root VNI to determine locally attached hosts on the associated local VLAN and may forward the BUM traffic to both leaf and root end hosts on the local VLAN. Accordingly, device 10E-2 may forward BUM traffic 80 to host 16-2 on the VLAN of VLAN-A and device 10E-3 may forward BUM traffic 80 to host 16-3 on the VLAN of VLAN-A (e.g., identified by the lookup operation using the root VNI).
In some instances, a floodlist may be maintained at the ingress edge network device based on leaf VNIs to facilitate appropriate EVPN E-Tree segmentation. In particular,
In the example of
In other words, leaf-designated host 16-1A may forward BUM traffic 90 to ingress edge device 10E-1. Device 10E-1 may replicate and multicast traffic 90 received from host 16-1A to each egress edge device on leaf VNI floodlist 86. The replicated traffic may be encapsulated for conveyance (across core network 8C) as BUM traffic 90. Device 10E-1 may not forward BUM traffic 90 to device 10E-2 because device 10E-2 is not on floodlist 86. Device 10E-1 may forward BUM traffic 90 to Device 10E-3 because device 10E-3 is on floodlist 86. Device 10E-3 may forward the received traffic to its locally attached root-designated hosts.
In some instances, VXLAN BUM traffic may include an indication flag in the VXLAN header used to indicate the EVPN role classification of the traffic-originating host. In particular,
Based on their locally attached hosts for the same VLAN (e.g., whether one or more local leaf and/or root hosts for the same VLAN are communicatively coupled to the edge device), egress-side edge network devices 10E-2 and 10E-3 may appropriately process (e.g., forward and/or drop) the received BUM traffic 100 to provide segmentation for E-Tree service.
To assist in appropriate processing of BUM traffic 100 at the egress side of network 8C (e.g., at devices 10E-2 and 10E-3), each packet of BUM traffic 100 may include a VXLAN header 102 that has a leaf indication flag 104. In particular, in preparation for traversal across network 8C, network device 10E-1 may perform VXLAN encapsulation for BUM traffic 100 that originated from host 16-1A. Because network device 10E-1 is configured to identify host 16-1A as a leaf-designated host, as part of the encapsulation process, a set leaf indication flag 104 (e.g., a single-bit flag having a set value of ‘1’) may be included in VXLAN header 102.
Prior to the processing of BUM traffic 100, egress edge network devices such as devices 10E-2 and 10E-3 may be configured to determine EVPN role classification of the source host of the traffic based on the leaf indication flag in BUM traffic 100. In particular, based on the flag value being a first set value, the egress edge network device may be configured to determine that the packets of traffic 100 originated from a leaf-designated host belonging to the VLAN.
In an arrangement in which an egress edge network device is coupled or locally attached to local leaf-designated end host(s), the egress network device may decapsulate the VXLAN-encapsulated traffic and drop leaf-sourced BUM traffic 100 to prevent traffic 100 from reaching local leaf-designated host(s) on the same VLAN. Accordingly, in the example of
In an arrangement in which an egress edge network device is coupled or locally attached to local root-designated end host(s), the egress network device may decapsulate the VXLAN-encapsulated traffic and forward leaf-sourced BUM traffic 100 to the root-designated end host(s) on the VLAN. Accordingly, in the example of
In an arrangement in which an egress network device is coupled or locally attached to both leaf-designated and root-designated local hosts, the egress network device may forward the leaf-sourced BUM traffic 100 to root-designated end host(s) in the VLAN while dropping the BUM traffic 100 such that BUM traffic 100 does not reach leaf-designated end host(s) in the VLAN.
Based on their locally attached hosts for the same VLAN (e.g., whether one or more leaf and/or root hosts for the same VLAN are communicatively coupled to the edge device), edge network devices 10E-2 and 10E-3 may appropriately process (e.g., forward) the received BUM traffic 1100 to provide segmentation for E-Tree service.
To assist in appropriate processing of BUM traffic 110 at the egress side of network 8C (e.g., at devices 10E-2 and 10E-3), each packet of BUM traffic 110 may include a VXLAN header 112 that includes a leaf indication flag 114. In particular, in preparation for traversal across network 8C, network device 10E-1 may perform VXLAN encapsulation for BUM traffic 110 that originated from host 16-1B. Because network device 10E-1 is configured to identify host 16-1B as a root-designated host, as part of the encapsulation process, an unset leaf indication flag 114 (e.g., a single-bit flag having an unset value of ‘0’) may be included in VXLAN header 112.
Prior to the processing of BUM traffic 110, egress edge network devices such as devices 10E-2 and 10E-3 may be configured to determine EVPN role classification of the source host of the traffic based on the leaf indication flag in BUM traffic 110. In particular, based on the flag value being a second unset value, the egress edge network device may be configured to determine that the packets of traffic 110 originated from a root-designated host belonging to the VLAN.
Since traffic originating from root-designated hosts can be received by both leaf-designated and root-designated hosts, in a configuration in which egress edge network devices (e.g., devices 10E-2 and 10E-3) receive root-designated traffic, the egress network devices may forward BUM traffic 110 to its leaf and root end hosts without necessarily identifying that the leaf indication flag has an unset value.
The leaf indication flag as described in connection with
In some arrangements, site gateways may provide connectivity (e.g., may interface) between edge network devices and the corresponding sites (e.g., network devices and hosts within the sites may be behind the gateways).
As shown in
In the example of
To facilitate the use of the mechanism(s) described in connection with
At block 130, one or more processors (e.g., processing circuitry 28 in
At block 132, the one or more processors (e.g., processing circuitry 28 in
In illustrative configurations in which a leaf indication flag in the VXLAN header is used, the operations at block 130 may be omitted and processing circuitry 28 of the egress-side edge device 10E may be configured (e.g., based on user input, based on one or more configuration files, etc.) to appropriately forward and/or drop VXLAN traffic based on the leaf indication flag in the VXLAN header.
At block 134, the one or more processors (e.g., processing circuitry 28 and/or packet processors 32 in
As a second example, packet processor(s) 32 of an ingress-side edge device 10E may be configured to perform ingress filtering as described in connection with
The methods and operations described above in connection with
The foregoing is merely illustrative and various modifications can be made to the described embodiments. The foregoing embodiments may be implemented individually or in any combination.
This application claims the benefit of U.S. provisional application No. 63/499,069, filed Apr. 28, 2023, which is hereby incorporated by reference herein in its entirety.
Number | Date | Country | |
---|---|---|---|
63499069 | Apr 2023 | US |