CN103873374B - Message processing method and device in virtualization system - Google Patents
Message processing method and device in virtualization system Download PDFInfo
- Publication number
- CN103873374B CN103873374B CN201410118957.6A CN201410118957A CN103873374B CN 103873374 B CN103873374 B CN 103873374B CN 201410118957 A CN201410118957 A CN 201410118957A CN 103873374 B CN103873374 B CN 103873374B
- Authority
- CN
- China
- Prior art keywords
- vlan
- messages
- vport
- data messages
- mark
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
This application discloses the message processing method in a kind of virtualization system and device, wherein, this method includes:VSwitch receives the UNTAG data messages that VM is sent by the corresponding VF of the VM, wherein, there is no the VLAN ID for carrying the VM in the UNTAG data messages;VSwitch finds corresponding mark VLAN according to the VF, and the mark VLAN found VLAN ID are added in the UNTAG data messages, 802.1Q messages are obtained;Wherein, VF and mark VLAN is corresponded;The 802.1Q messages that vSwitch will carry mark VLAN VLAN ID are sent to the direct-connected access switch of this physical server.Common network interface card can be used in the application, i.e., general SR IOV NIC save cost as PE, moreover, intercommunity is good, can extensive use.
Description
Technical field
The application is related to message processing method and dress in technical field of virtualization, more particularly to a kind of virtualization system
Put.
Background technology
PE(Port Extender, port expander)Technology be by PE be CB(Control Bridge, control bridge)Carry
For the effect of ports-Extending so that the multistage extension of real-time performance.
In existing PE technologies, mainly there is the Multichannel that 802.1Qbg is defined(Multichannel)/S-Channel
(Service provider's passage)PE and Cisco that PE, 802.1BR of pattern are defined(Cisco)VN-TAG(Virtual Network-
TAG, virtual network label)The PE that proprietary technology is defined.These three schemes are introduced respectively below.
1st, the PE for the Multichannel/S-Channel patterns that 802.1Qbg is defined
In this scheme, mainly include in CB-PE frameworks:Physical server and its direct-connected physical switches, the thing
Reason server includes:Virtual machine(Virtual Machine, VM), the VEB that is connected with VM(Virtual Ethernet
Bridge, virtual ethernet bridge)And/or VEPA(Virtual Ethernet Port Aggregator, virtual ethernet end
Mouth polymerizer), the S-component that is connected with VEB and/or VEPA(S components);The physical switches include:S-
component.Pass through S- between the S-component in S-component and physical switches in physical server
Channel connections.Wherein, physical switches are as CB, and S-component+VEB or VEPA in physical server are used as PE.
In this kind of scheme, the data message of S-Channel forwardings is not common data message, but a kind of QinQ
(Stack VLAN(Stacked VLAN)Or double layer VLAN(Double VLAN))The data message of encapsulation, i.e. in this datagram
Wen Zhong, 1 layer of VLAN tag is added defined in 802.1Q again on the basis of standard ethernet message.Asked accordingly, there exist following
Topic:(1)It is required that PE supports the encapsulation and forwarding of QinQ data messages, common network interface card cannot function as PE and use;(2)Being capable of conduct
PE network interface card must support QinQ to encapsulate and carry out Tunnel on hardware(Tunnel)Termination function, cost is costly.
2nd, the PE that 802.1BR is defined
This scheme is a kind of hardware expanding.Mainly include in CB-PE frameworks:Extend bridge(Extended Bridge)With
Terminal(End Station, also referred to as main frame or server), extending bridge includes:CB and outside PE(External Bridge
PE), CB passes through the inside PE inside CB(Internal Bridge PE)It is connected with outside PE, outside PE can connect multiple ends
End or outside PE.In the architecture, CB is unique equipment for possessing function of network exchange in CB-PE frameworks, and PE does not have
Separate network function.
In this kind of scheme, the data message of transmission increases again defined in 802.1Q on the basis of standard ethernet message
One 6 byte E-TAG field, accordingly, there exist problems with:(1)It is required that PE supports to include the data message of E-TAG fields
Encapsulation and forwarding, common network interface card cannot function as PE and uses;(2)E- can must be supported on hardware as PE network interface card
TAG encapsulates and carried out Tunnel termination function, and cost is costly.
3rd, the PE that Cisco VN-TAG proprietary technologies are defined
This scheme is a kind of hardware expanding.Mainly include in CB-PE frameworks:Physical switches and physical server, often
There is a NIC on one server(NIC), the multiple NIC of interchanger connection.Wherein, physical switches conduct
CB, NIC are used as PE.
In this kind of scheme, the data message of transmission increases again defined in 802.1Q on the basis of standard ethernet message
One 4 byte VN-TAG field, accordingly, there exist problems with:(1)It is required that PE supports to include the datagram of VN-TAG fields
The encapsulation and forwarding of text, common network interface card cannot function as PE and uses;(2)It must can be supported as PE network interface card on hardware
VN-TAG encapsulates and carried out Tunnel termination function, and cost is costly.
To sum up, in the PE implementations of prior art, because the data message of transmission is all the data message of special modification,
That is, special field is added again on the basis of the message defined in 802.1Q, for example, adding the QinQ reports of one layer of VLAN tag
Text, the data message for adding the data message of E-TAG fields, adding VN-TAG fields, therefore, can not all use common net
Card needs to use special hardware network interface card as PE as PE, and not only cost is high, moreover, intercommunity is poor, it is impossible to extensively should
With.
The content of the invention
This application provides the message processing method in a kind of virtualization system and device, it is intended to which solution is deposited in the prior art
Use special hardware network interface card as PE the need for, so that cost is high, intercommunity is poor, it is impossible to the problem of extensive use.
The technical scheme of the application is as follows:
On the one hand there is provided the message processing method in a kind of virtualization system, the virtualization system includes:Physics takes
The access switch of business device and its direct-connected physics;Physical server includes:SR-IOV NIC and at least one VM, SR-IOV
NIC includes vSwitch and at least one NIC VF, and VM is connected to vSwitch by VF;This method includes:
VSwitch receives the UNTAG data messages that VM is sent by the corresponding VF of the VM, wherein, the UNTAG data
There is no the VLAN ID for carrying the VM in message;
VSwitch finds corresponding mark VLAN according to the VF, and the mark VLAN found VLAN ID are added to
In the UNTAG data messages, 802.1Q messages are obtained;Wherein, VF and mark VLAN is corresponded;
VSwitch will carry mark VLAN VLAN ID 802.1Q messages, and to be sent to this physical server direct-connected
Access switch.
On the other hand, the message processing method in a kind of virtualization system is additionally provided, the virtualization system includes:Thing
Manage the access switch of server and its direct-connected physics;Access switch, which is used to connect on the physical port of physical server, to be wrapped
Include at least one vPort;Access switch is also direct-connected with other physical switches, and access switch is used to connect other physics friendships
Include at least one vPort on the physical port changed planes;This method includes:
Access switch receives special packet;Wherein, the special packet received be direct-connected physical server or its
The 802.1Q messages that its physical switches is sent, or the channel message that direct-connected other physical switches are sent;
When the special packet is 802.1Q messages, access switch removes the VLAN ID carried in the 802.1Q messages
UNTAG data messages are obtained, corresponding vPort is found according to the VLAN ID, corresponding VNI is found according to the vPort;
When the special packet is channel message, access switch remove the overlay tunnels in the channel message source IP address and
Purpose IP address, VNI and VLAN ID, obtain UNTAG data messages;
If obtained UNTAG data messages are unicast messages, access switch is according to the VNI and the UNTAG datagrams
The target MAC (Media Access Control) address of text, finds an outgoing interface information from local MAC forward tables;According to the outgoing interface acquisition of information
Correspondence VLAN, correspondence VLAN VLAN ID are added in the UNTAG data messages and sent;
Wherein, correspondence VLAN is mark VLAN or service VLAN.
Another aspect, additionally provides the message process device in a kind of virtualization system, and the virtualization system includes:Thing
Manage the access switch of server and its direct-connected physics;Physical server includes:SR-IOV NIC and at least one VM,
SR-IOV NIC include vSwitch and at least one NIC VF, and VM is connected to vSwitch by VF;The device is applied to
In vSwitch, the device includes:
Receiving module, for receiving the UNTAG data messages that VM is sent by the corresponding VF of the VM, wherein, the UNTAG
There is no the VLAN ID for carrying the VM in data message;
Searching modul, for receiving the UNTAG data messages that VM is sent by the corresponding VF of the VM in receiving module
Afterwards, corresponding mark VLAN is found according to the VF;
Processing module, the VLAN ID of the mark VLAN for searching modul to be found are added to receiving module and received
UNTAG data messages in, obtain 802.1Q messages;Wherein, VF and mark VLAN is corresponded;
Sending module, for the 802.1Q messages for the VLAN ID for carrying mark VLAN for obtaining processing module, sends
The access switch direct-connected to this physical server.
Another aspect, additionally provides the message process device in a kind of virtualization system, and the virtualization system includes:Thing
Manage the access switch of server and its direct-connected physics;Access switch, which is used to connect on the physical port of physical server, to be wrapped
Include at least one vPort;Access switch is also direct-connected with other physical switches, and access switch is used to connect other physics friendships
Include at least one vPort on the physical port changed planes;The device is applied in access switch, and the device includes:
Receiving module, for receiving special packet;Wherein, the special packet received be direct-connected physical server or its
The 802.1Q messages that its physical switches is sent, or the channel message that direct-connected other physical switches are sent;
Module is removed, for when the special packet that receiving module is received is 802.1Q messages, removing 802.1Q reports
The VLAN ID carried in text obtain UNTAG data messages;It is additionally operable to when the special packet that receiving module is received is channel message
When, the source IP address and purpose IP address, VNI and VLAN ID in the overlay tunnels in the channel message are removed, UNTAG is obtained
Data message;
Searching modul, for when the special packet that receiving module is received is 802.1Q messages, being reported according to the 802.1Q
The VLAN ID carried in text find corresponding vPort, and corresponding VNI is found according to the vPort;If being additionally operable to remove mould
The UNTAG data messages that block is obtained are unicast messages, then according to the VNI and the target MAC (Media Access Control) address of the UNTAG data messages, from
An outgoing interface information is found in local MAC forward tables;
Sending module is added, if being unicast message for removing the UNTAG data messages that module is obtained, according to lookup mould
The outgoing interface acquisition of information correspondence VLAN that block is found from MAC forward tables, removal is added to by correspondence VLAN VLAN ID
Sent in the UNTAG data messages that module is obtained;
Wherein, correspondence VLAN is mark VLAN or service VLAN.
There is provided a kind of new virtualization system in the above technical scheme of the application, the system includes:Physical services
Device and access switch.Physical server includes:At least one VM and the network interface card using SR-IOV technologies, referred to as SR-IOV
NIC, the SR-IOV NIC include L2vSwitch and multiple VF;Wherein, VF and mark VLAN is corresponded;It is provided with VM
VF drives, and VM corresponds at least one VF.Access switch is used to connect physical server(Specially connection SR-IOV NIC)
Physical port on include multiple virtual port vPort, these vPort with mark VLAN correspond;Moreover, access switch
Also direct-connected with other physical switches, access switch is used to connect on the physical port of other physical switches including multiple
VPort, these vPort are corresponded with the service VLAN in other physical switches;In addition, being also configured with interchanger many
Individual VNI, vPort and VNI have binding relationship.
In said system, SR-IOV technologies are virtualized using network interface card, using SR-IOV NIC as PE, by access switch
As CB, the CB-PE frameworks of access switch+SR-IOV NIC compositions are constituted.
What VM was sent does not carry VLAN ID UNTAG data messages, can reach L2vSwitch by a VF,
L2vSwitch is received after the UNTAG data messages, and corresponding mark VLAN is found according to the VF, by the mark found
VLAN VLAN ID are added in the UNTAG data messages, obtain 802.1Q messages, are finally sent to the 802.1Q messages
Access switch.So as to be the 802.1Q messages of standard as the PE SR-IOV NIC messages sent, not increase any spy
Different field.Equally, issue and reported as the 802.1Q that PE SR-IOV NIC message is also standard as CB access switch
Text.So as to which the message of PE transmitting-receivings is the 802.1Q messages of standard, can use common network interface card, i.e., general SR-IOV NIC make
For PE, cost is saved, moreover, intercommunity is good, can extensive use.
Brief description of the drawings
Fig. 1 is the structural representation of the virtualization system of the embodiment of the application one;
Fig. 2 is the flow chart of the default configuration process of the embodiment of the application one;
Fig. 3 is the flow chart of the configuration process for practical business of the embodiment of the application one;
Fig. 4 is the process charts of message that send of VM of the embodiment of the application one;
Fig. 5 is the handling process when access switch of the embodiment of the application one receives the message that general switch sends
Figure;
Fig. 6 is the handling process when physical server of the embodiment of the application one receives the message that access switch sends
Figure;
Fig. 7 is the rough schematic view of the physical server in the virtualization system of another embodiment of the application;
Fig. 8 be another embodiment of the application virtualization system in access switch connect physical services as shown in Figure 7
The schematic diagram of device and general switch;
Fig. 9 is the message process device in the vSwitch being applied in SR-IOV NIC of the another embodiment of the application
Structural representation;
Figure 10 is the structural representation of the message process device being applied in access switch of the another embodiment of the application.
Embodiment
In order to solve to use special hardware network interface card the need in the prior art existing as PE, so that cost is high, mutually
The general character is poor, it is impossible to the problem of extensive use, and the message processing method in a kind of virtualization system is provided in the embodiment of the present application
And device.
The embodiment of the present application is applied in virtualization system as shown in Figure 1, and the virtualization system forms CB-PE framves
Structure.Mainly include within the system:The access switch of physical server and its direct-connected physics.Below to physical server and
The structure of access switch is introduced.
1st, physical server
Common SR-IOV is installed on physical server(Single Root IO Virtualization, single IO is empty
Planization)NIC(Network Interface Card, NIC), and run on physical server virtualization software
Layer Hypervisor, Hypervisor are alternatively referred to as Virtual Machine Manager software(VMM), Hypervisor for example can be VMWare
ESXi(The ESXI software virtual machines that VMware companies produce)Or KVM(Kernel-based Virtual
Machine, the virtual machine based on kernel)Deng.In addition, also including on physical server:Multiple virtual machines(Virtual
Machine, VM).
VM, Hypervisor and SR-IOV NIC are described as follows:
(1)It is used as PE SR-IOV NIC
SR-IOV NIC are exactly outside the NIC for employing SR-IOV technologies, SR-IOV NIC connection physical servers
The access switch in portion.
Wherein, SR-IOV technologies are that one kind does not need virtualization software simulation just to share I/O(Input/Output,
Input/output)The method of the physical function of the I/O ports of equipment.This process creates a series of I/O equipment physical ports
Virtual functions.Each virtual functions are assigned directly to a virtual machine, it is achieved that close to the performance of the machine.Total comes
Say, SR-IOV is realized PCI(Peripheral Component Interconnection, peripheral component interconnection)Work(
Multiple virtual interfaces can be assigned to share the resource of a device PCI in virtualized environment.SR-IOV can allow network to pass
It is defeated to bypass virtualization software simulation layer, it is assigned directly to virtual machine.Opened this reduces the I/O in virtualization software simulation layer
Pin.The target of SR-IOV technologies is to bypass execution standardization during virtual machine participates in data migration process, is that each virtual machine is carried
For independent memory space, interruption and Direct Memory Access(DMA)Stream.The design of SR-IOV frameworks allows an I/O
Equipment supports multiple virtual functions, while the hardware cost of each function is minimized.SR-IOV introduces two new work(
Can type:
Physical function(Physical Functions, PFs):This is the PCIe work(that some support SR-IOV expanded functions
Can, it be used to configure and manage SR-IOV functional characteristics;
Virtual functions(Virtual Functions, VFs):This is the PCIe functions of " simplifying ", including data are moved
Move required resource, and the configuration resource set by simplifying with caution.
Thus, SR-IOV NIC include:PF and multiple VF, wherein, PF is used to SR-IOV NIC are managed and matched somebody with somebody
Put.In actual implementation process, the maximum quantity of the VF in a SR-IOV NIC is 4094, and each VF has one uniquely
ID(Mark), for example, numbering.
In addition, being integrated with a L2 in SR-IOV NIC(Two layers)The vSwitch of function(Virtual switch), should
L2vSwitch possesses basic Layer2 switching function.VF and the L2vSwitch are direct-connected, and VF is equivalent to the end on the L2vSwitch
Mouthful.
(2)Hypervisor
Hypervisor includes:VSwitch and PCI manager, in addition, being provided with SR-IOV NIC on Hypervisor
Driver:PF drives.
Wherein, the vSwitch is not involved in the forward process flow of message in the embodiment of the present application;PCI manager is used for
Pci bus in SR-IOV NIC is configured and managed.
(3)VM
VM refers to simulate by software+hardware auxiliary virtualization have complete hardware system function, operate in one
Complete computer in completely isolated environment.By VM softwares, another can be simulated on a physical computer
Or many virtual computers(That is VM), these VM are operated just as real computer completely, for example:It can install
Operating system, installation application program, access Internet resources etc..From the perspective of user, VM is the physics for operating in user
An application program on computer, but for the application program run in VM, the application program is like true
It is operated in positive computer.
VM is operated on Hypervisor.VF in SR-IOV NIC is identified as common PCIe by each VM
(Peripheral Component Interface Express, quick peripheral component interconnection)Equipment, therefore, by
VF drivings are installed, each VM can be directly articulated on corresponding VF, so as to bypass in Hypervisor on each VM
VSwitch, i.e. message can be transmitted directly to corresponding VF by VM, without the vSwitch being sent in Hypervisor.
In actual implementation process, each VM has a unique ID(Mark), for example, numbering.
2nd, as CB access switch
Access switch supports virtualization network technology, with VNI(Virtual Network Identity, virtualize net
Network is identified)Mark virtualization network.Wherein, VNI is a kind of mark in a switch for network, can be VLAN
(Virtual Local Area Network, VLAN)Information or VPN(Virtual Private
Network, Virtual Private Network)Information, and VLAN may map to VNI, and VPN can also be mapped to VNI.The length that VNI takes
Degree can be 12 bits or 24 bits, depending on the tenability of interchanger.
In a part of physical port connection physical server on access switch, a part of physical port connection network
Other physical switches(Referred to as general switch), wherein, a physical port on access switch connects a physics clothes
The SR-IOV NIC of business device, or one general switch of connection.
It is used for a physical port for connecting SR-IOV NIC in access switch, multiple virtual ports can be configured
VPort sums on vPort, the physical port are identical with the VF sums on the SR-IOV NIC of opposite end.That is, on the physical port
VPort sum equal to the physical port connect SR-IOV NIC on VF sum.
Based on system architecture as shown in Figure 1, the method in the embodiment of the present application includes following part:
(1)System configuration process
System configuration process can include:Default configuration process and the configuration process for practical business.Wherein, it is default to match somebody with somebody
Put and refer to that all physical servers and access switch are required for what is carried out when disposing the virtualization system of the embodiment of the present application
Identical is configured, i.e. all physical servers are required for carrying out step S102 and step S104 configuration, all access switch
It is required for carrying out step S106- steps S110 configuration;Default configuration is mainly configuration VF, mark VLAN and access switch
The configuration of the mapping relations between the vPort on physical port for connecting physical server, default configuration and practical business
The service attribute of data flow is unrelated.And the configuration for being directed to practical business is related to the business data flow of user in practical application scene
Service attribute, such as VNI is different for different user.
As shown in Fig. 2 during default configuration, comprising the following steps:
The corresponding relation between VM and VF is set up on step S102, the L2vSwitch in SR-IOV NIC;
Wherein, it is allowed to which a VM corresponds to one or more VF, but does not allow a VF to correspond to multiple VM.
The one-to-one corresponding configured on step S104, the L2vSwitch in SR-IOV NIC between VF and mark VLAN is closed
System;
Specifically, each VF corresponds to a mark VLAN, herein, mark VLAN is different from common service VLAN,
But in order to mark message to be sent by which VF, mark VLAN actually illustrates VF numbering.
For example, VF sums N=64 in SR-IOV NIC, now, VF1 correspond to mark VLAN1, VF2 and correspond to mark
VLAN2 ..., VF64 correspond to mark VLAN64.
In actual implementation process, the one-to-one relationship between VF and mark VLAN is in L2vSwitch connections VM
Logic inlet point is configured.Require that mark VLAN only has two interfaces on L2vSwitch in the embodiment of the present application, one is connection
VM VF, another is the ascending physical signal port of SR-IOV NIC connection access switch, i.e. fashionable from VF, from ascending physical signal
Port goes out, fashionable from ascending physical signal port, goes out from VF.So, from a VM and to be sent to another in same physical server
One VM and non-belong to same VLAN(VLAN)Or Virtual Private Network(VPN)Data message enter
After L2vSwitch, L2vSwitch will not be directly forwarded to another VM.
Step S106, is used to connect configuration and the total identicals of VF on SR-IOV NIC physical port in access switch
Virtual port vPort;
It is assumed that the VF sums in SR-IOV NIC on physical server are N, then it is used to connect SR- in access switch
N number of vPort is configured on IOV NIC physical port.
Step S108, access switch be used for connect SR-IOV NIC physical port on set up vPort with mark
One-to-one relationship between VLAN;
For example, N=64, now, mark VLAN1 correspond to virtual port vP1, mark VLAN2 corresponds to vP2 ..., mark
VLAN64 corresponds to vPort64.
So, once SR-IOV NIC and access switch are started working, VF and vPort is just corresponded.
Step S110, is used to connect enable VLAN TRUNK on SR-IOV NIC physical port in access switch(It is empty
Intend LAN relaying)Function.
That is, the message into access switch all carries 802.1Q VLAN TAG, and the 802.1QVLAN TAG are marks
VLAN, rather than service VLAN.
Configuration for practical business is mainly used in configuration service network, is related to the business of user in practical application scene
The service attribute of data flow.If access switch is conventional switch, the configuration for practical business can apply to example
Such as VLAN double layer network.As shown in figure 3, in the configuration process for practical business, comprising the following steps:
Step S202, configures multiple different VNI on access switch, to represent different virtualization networks;
Wherein, VNI is the global concept of interchanger.Accordingly, it would be desirable to VNI is configured on access switch, rather than in access
Configured on the physical port of interchanger.
Step S204, the physical port for connecting physical server is used in access switch, by the physical port
Each virtual port(vPort)It is tied to corresponding VNI;
Step S206, is used to connect to configure multiple virtual ports on the physical port of general switch in access switch
The service VLAN that vPort, each vPort correspond on the general switch;
Service VLAN herein is exactly the VLAN of general service.
Each vPort and VNI binding is configured on step S208, the physical port in step S206;So as to most
The VNI on service VLAN and access switch on the general switch is caused to correspond eventually.
By step S108 and step S204, it is used to connect preservation on SR-IOV NIC physical port in access switch
There is the corresponding relation between mark VLAN, vPort and VNI;By step S206 and step S208, it is used in access switch
The corresponding relation between service VLAN, vPort and VNI is preserved on the physical port for connecting general switch.
(2)Message processing process
During Message processing, including following part:
1)The message sent from VM
As shown in figure 4, comprising the following steps from the VM Message processing flows sent:
Step S302, VM are by the corresponding VF of this VM by UNTAG(Not tape label)Data message is sent to SR-IOV
NIC L2vSwitch;Step S304 is performed afterwards;
802.1Q VLAN TAG are not carried in the UNTAG data messages that VM is sent, i.e. do not carry this VM VLAN ID.
Step S304, SR-IOV NIC L2vSwitch are received after UNTAG data messages by a VF, find with
The corresponding mark VLAN of the VF, the mark VLAN found VLANID is added in the UNTAG data messages, and will obtain
802.1Q messages sent by connecting the physical port of access switch;Step S306 is performed afterwards;
Specifically, the mark VLAN found VLAN ID are carried in the VLAN TAG fields defined in 802.1Q,
The VLAN TAG fields are added in the UNTAG data messages.Now, it is standard from the SR-IOV NIC messages come out
802.1Q messages, but the VLAN TAG in the 802.1Q messages do not represent normal VLAN(That is general service VLAN)Contain
Justice, but VF ID is marked, VF ID on message band is in order to which access switch can distinguish processing.
Step S306, physical port of the access switch from the SR-IOV NIC of connection physical server(It is designated as Port1)
On receive after 802.1Q messages, remove the mark VLAN carried in the 802.1Q messages VLAN ID, i.e. remove VLAN
TAG fields, obtain UNTAG data messages, and pair on physical port Port1 is found according to mark VLAN VLAN ID
VPort is answered, and corresponding VNI is found according to the vPort found;Step S308 is performed afterwards;
Wherein, the vPort found is exactly that the 802.1Q messages enter vPort.
After step S306, VLAN TAG fields are not present in obtained UNTAG data messages.
Step S308, access switch judges whether the UNTAG data messages are unicast message or multicast message, if single
Text or multicast message are reported, then step S310 is performed, if broadcasting packet or the unknown unicast message of target MAC (Media Access Control) address, then hold
Row step S312;
If specifically, the purpose MAC in the UNTAG data messages(Media Access Control, media interviews control
System)Address is unicast mac address or multicast mac address, and can be from local as shown in table 1 according to the target MAC (Media Access Control) address
Identical MAC Address is found in MAC forward tables, then performs step S310;If purpose MAC in the UNTAG data messages
Location is broadcast MAC address, then performs step S312;If the target MAC (Media Access Control) address in the UNTAG data messages is unicast mac address,
And searched according to the target MAC (Media Access Control) address from MAC forward tables as shown in table 1 less than identical MAC Address, then perform step
S312;
Step S310, according to the VNI that finds and the target MAC (Media Access Control) address of the UNTAG data messages, from as shown in table 1
At least one outgoing interface information is found in MAC forward tables;Step S314 is performed afterwards;
Table 1
MAC Address | VNI | Outgoing interface information |
Each outgoing interface information in MAC forward tables as shown in table 1 can be vport port id, can also
It is overlay(It is overlapping)The tunnel ID or other in tunnel.For example, overlay tunnels can be VXLAN(Virtual
Extensible VLAN, virtual expansible VLAN)Tunnel or NVGRE(Network Virtualization using
Generic Routing Encapsulation, use GRE network virtualization)Tunnel.
Each outgoing interface information is made up of type parameter and ID, the type parameter represent interface type be vPort,
Overlay tunnels are other, for example, when type parameter is Type1, it is vPort to represent the outgoing interface, when type parameter is
During Type2, it is overlay tunnels to represent the outgoing interface.For example, when an outgoing interface information is Type1+5, representing that this goes out to connect
Mouth is vPort5.
Wherein, when the UNTAG data messages are unicast messages, the outgoing interface information only one of which found, this goes out to connect
Message breath can be vPort port id or the tunnel ID or other in overlay tunnels;When the UNTAG data messages
When being multicast message, the outgoing interface information found has multiple, and each outgoing interface information can be vPort port id,
Can be the tunnel ID or other in overlay tunnels.
Step S312, access switch is looked into according to the VNI found from local broadcast forward table as shown in table 2
Find at least one outgoing interface information;Step S314 is performed afterwards;
Table 2
VNI | Outgoing interface information |
Each outgoing interface information in broadcast forward table as shown in table 2 can be vport port id, can also
It is the tunnel ID or other in overlay tunnels.For example, overlay tunnels can be VXLAN tunnels or NVGRE tunnels.
Each outgoing interface information is made up of type parameter and ID, the type parameter represent interface type be vPort,
Overlay tunnels are other, for example, when type parameter is Type1, it is vPort to represent the outgoing interface, when type parameter is
During Type2, it is overlay tunnels to represent the outgoing interface.For example, when an outgoing interface information is Type1+5, representing that this goes out to connect
Mouth is vPort5.
At least one the outgoing interface information found in step S312 be except the 802.1Q messages enter vPort in addition to
The tunnel ID or all vPort in other vPort port id and all overlay tunnels port id and all
The tunnel ID in overlay tunnels.
Step S314, for each the outgoing interface information found, judge the outgoing interface information whether be vport end
Mouth ID, if vport port id, then performs step S316, if the tunnel ID in overlay tunnels, then performs step S318,
If neither vport port id is nor the tunnel ID in overlay tunnels, performs step S322;
When the UNTAG data messages are multicast message, broadcasting packet or the unknown unicast message of target MAC (Media Access Control) address, meeting
The UNTAG data messages are replicated for each outgoing interface information, therefore, quilt in subsequent step S316 and step S320
The UNTAG data messages of addition are the UNTAG data messages replicated, and the UNTAG data messages being dropped in step S322 are multiple
The UNTAG data messages of system.
Step S316, correspondence VLAN is found according to the port id of the vport, and correspondence VLAN VLAN ID are added
Into the UNTAG data messages, by the obtained VLAN ID for carrying correspondence VLAN 802.1Q messages, pass through the vport
The physical port at place is sent;Wherein, correspondence VLAN is mark VLAN or service VLAN;Terminate this flow;
Wherein, when correspondence VLAN is mark VLAN, mark VLAN VLAN ID 802.1Q messages will be carried,
Direct-connected physical server is sent to by the physical port where the vport;
When correspondence VLAN is service VLAN, the VLAN ID of service VLAN 802.1Q messages will be carried, by this
Physical port where vport is sent to direct-connected general switch.
Specifically, correspondence VLAN VLAN ID are carried in the VLANTAG fields defined in 802.1Q, by this
VLAN TAG fields are added in the UNTAG data messages.Now, access switch is sent to general switch or physical services
The message of device is the 802.1Q messages of standard, and the VLAN TAG being sent in the 802.1Q messages of general switch are exactly just
The VLAN of normal general service VLAN ID.
Step S318, if the outgoing interface information is the tunnel ID in overlay tunnels, correspondence is found according to tunnel ID
Tunnel information,
Wherein, the tunnel information includes:The source IP address and purpose IP address in the overlay tunnels, the overlay tunnels
Road it is corresponding go out vport;Step S320 is performed afterwards;
Step S320, goes out vport according to this and finds corresponding service VLAN, by the source IP address in the overlay tunnels
It is added to the UNTAG data messages with the VNI and the VLAN ID of the service VLAN found in purpose IP address, step S306
In, obtained channel message is sent to direct-connected general switch by the physical port where going out vport;Terminate this stream
Journey;
Step S322, abandons the UNTAG data messages;Terminate this flow.
2)It is sent to VM message
As shown in figure 5, the specific handling process of the message for being sent to VM comprises the following steps:
Step S402, physical port of the access switch from connection general switch(It is designated as Port2)On receive it is specific
Message;Step S404 is performed afterwards;
Wherein, the special packet received in step S402 is probably 802.1Q messages, it is also possible to channel message.
Step S404, whether be channel message, if 802.1Q messages if judging the special packet, then perform step S406,
If channel message, then step S408 is performed;
Step S406, access switch removes the VLANID of the service VLAN carried in the 802.1Q messages,
That is, VLAN TAG fields are removed, UNTAG data messages are obtained;Thing is found according to the VLAN ID of the service VLAN
The corresponding vPort on the Port2 of port is managed, corresponding VNI is found according to the vPort;Step S410 is performed afterwards;
Wherein, the vPort found is exactly that the 802.1Q messages enter vPort.
After step S406, VLAN TAG fields are not present in obtained UNTAG data messages.
Step S408, access switch is with removing the source IP address and purpose IP in the overlay tunnels in the channel message
The VLAN ID of location, VNI and service VLAN, obtain UNTAG data messages;
Wherein, it is exactly the vPort that enters of the channel message according to the VLAN ID of the service VLAN vPort found, afterwards
Perform step S410.
After step S408, VLAN TAG fields are not present in obtained UNTAG data messages.
Step S410, access switch judges whether the UNTAG data messages are unicast message or multicast message, if
Unicast message or multicast message, then perform step S412, if broadcasting packet or the unknown unicast message of target MAC (Media Access Control) address, then
Perform step S414;
If specifically, the target MAC (Media Access Control) address in the UNTAG data messages is unicast mac address or multicast mac address, and
Identical MAC Address can be found from MAC forward tables as shown in table 1 according to the target MAC (Media Access Control) address, then perform step
S412;If the target MAC (Media Access Control) address in the UNTAG data messages is broadcast MAC address, step S414 is performed;If the UNTAG numbers
It is unicast mac address according to the target MAC (Media Access Control) address in message, and according to the target MAC (Media Access Control) address from MAC forward tables as shown in table 1
It is middle to search less than identical MAC Address, then perform step S414.
Step S412, according to the VNI and the target MAC (Media Access Control) address of the UNTAG data messages, is forwarded from MAC as shown in table 1
At least one outgoing interface information is found in table;Step S416 is performed afterwards;
Wherein, the VNI is the VNI obtained in the VNI or step S408 found in step S406.
When the UNTAG data messages are unicast messages, the outgoing interface information only one of which found, the outgoing interface information
Can be vPort port id or the tunnel ID or other in overlay tunnels;When the UNTAG data messages are multicasts
During message, the outgoing interface information found has multiple, each outgoing interface information can be vPort port id or
The tunnel ID or other in overlay tunnels.
Step S414, according to the VNI, finds at least one outgoing interface information from broadcast forward table as shown in table 2;
Step S416 is performed afterwards;
Step S416, for each the outgoing interface information found, judge the outgoing interface information whether be vport end
Mouth ID, if vport port id, then performs step S418, if the tunnel ID in overlay tunnels, then performs step S420,
If neither vport port id is nor the tunnel ID in overlay tunnels, performs step S424;
When the UNTAG data messages are multicast message, broadcasting packet or the unknown unicast message of target MAC (Media Access Control) address, meeting
The UNTAG data messages are replicated for each outgoing interface information, therefore, quilt in subsequent step S418 and step S422
The UNTAG data messages of addition are the UNTAG data messages replicated.
Step S418, correspondence VLAN is found according to the port id of the vport, and correspondence VLAN VLAN ID are added
Into the UNTAG data messages, by the obtained VLAN ID for carrying correspondence VLAN 802.1Q messages, pass through the vport
The physical port at place is sent;Wherein, correspondence VLAN is mark VLAN or service VLAN;Terminate this flow;
Wherein, when correspondence VLAN is mark VLAN, mark VLAN VLAN ID 802.1Q messages will be carried,
Direct-connected physical server is sent to by the physical port where the vport;
When correspondence VLAN is service VLAN, the VLAN ID of service VLAN 802.1Q messages will be carried, by this
Physical port where vport is sent to direct-connected general switch.
Specifically, correspondence VLAN VLAN ID are carried in the VLANTAG fields defined in 802.1Q, by this
VLAN TAG fields are added in the UNTAG data messages.Now, access switch is sent to general switch or physical services
The message of device is the 802.1Q messages of standard, and the VLAN TAG being sent in the 802.1Q messages of general switch are exactly just
The VLAN of normal general service VLAN ID.
Step S420, if the outgoing interface information is the tunnel ID in overlay tunnels, correspondence is found according to tunnel ID
Tunnel information, wherein, the tunnel information includes:The source IP address and purpose IP address in the overlay tunnels, should
Overlay tunnels it is corresponding go out vport;Step S422 is performed afterwards;
Step S422, goes out vport according to this and finds corresponding service VLAN, by the source IP address in the overlay tunnels
It is added to the VLAN ID of purpose IP address, the VNI and the service VLAN in the UNTAG data messages, by obtained tunnel report
Text is sent to direct-connected general switch by the physical port where going out vport;Terminate this flow;
Step S424, abandons the UNTAG data messages;Terminate this flow.
In step S418, when correspondence VLAN is mark VLAN, access switch can will carry mark VLAN
VLAN ID 802.1Q messages, direct-connected physical server, therefore, physics are sent to by the physical port where the vport
Server can receive the 802.1Q messages that access switch is sent.Now, physical server can perform following steps:
The L2vSwitch in SR-IOV NIC on step S502, physical server receives what access switch was sent
After 802.1Q messages, the VLAN ID of the mark VLAN in the 802.1Q messages are removed, i.e. remove in the 802.1Q messages
VLAN TAG fields, obtain UNTAG data messages, and corresponding VF ID is found according to mark VLAN VLAN ID;
After step S502, obtain that VLAN TAG fields are not present in UNTAG data messages.
The UNTAG data messages are sent to corresponding with the VF by step S504, L2vSwitch by the VF found
VM;Terminate this flow.
In addition, the MAC address learning process in the embodiment of the present application, using the source MAC learning method of prior art
, wherein, for multicast address study is according to existing multicast protocol or uses static configuration method.Finally, it will can learn
Corresponding relation between MAC Address, VNI and the outgoing interface information practised, is configured in MAC forward tables as shown in table 1, is used for
Message is instructed to forward.Broadcast MAC address table as shown in table 2 can be configured by the way of static configuration.
There is provided a kind of new virtualization system in the embodiment of the present application, the system includes:Physical server and access
Interchanger.Physical server includes:At least one VM and the network interface card using SR-IOV technologies, referred to as SR-IOV NIC, the SR-
IOV NIC include L2vSwitch and multiple VF;Wherein, VF and mark VLAN is corresponded;VF drivings, VM are installed in VM
Corresponding at least one VF.Access switch is used to connect physical server(Specially connection SR-IOV NIC)Physical port
Upper to include multiple virtual port vPort, these vPort are corresponded with mark VLAN;Moreover, access switch also with other things
Manage interchanger(That is general switch)Direct-connected, access switch is used to connect on the physical port of other physical switches including many
Individual vPort, these vPort are corresponded with the service VLAN in other physical switches;In addition, being also configured with interchanger
Multiple VNI, vPort and VNI have binding relationship.
In said system, SR-IOV technologies are virtualized using network interface card, using SR-IOV NIC as PE, by access switch
As CB, the CB-PE frameworks of access switch+SR-IOV NIC compositions are constituted.
What VM was sent does not carry VLAN ID UNTAG data messages, can reach L2vSwitch by a VF,
L2vSwitch is received after the UNTAG data messages, and corresponding mark VLAN is found according to the VF, by the mark found
VLAN VLAN ID are added in the UNTAG data messages, obtain 802.1Q messages, are finally sent to the 802.1Q messages
Access switch.So as to be the 802.1Q messages of standard as the PE SR-IOV NIC messages sent, not increase any spy
Different field.Equally, issue and reported as the 802.1Q that PE SR-IOV NIC message is also standard as CB access switch
Text.So as to which the message of PE transmitting-receivings is the 802.1Q messages of standard, can use common network interface card, i.e., general SR-IOV NIC make
For PE, cost is saved, moreover, intercommunity is good, can extensive use.
In addition, the vPort that access switch is used to connect on SR-IOV NIC physical port is with marking VLAN 1 a pair
Should, and mark VLAN and VF to correspond, so that, the VF in SR-IOV NIC is as access switch inside physical server
Extension virtual port, and each VF corresponds to a virtual port of access switch, so, all VM data flow
It will be directed on access switch and carry out forward process.Due to being provided with VF drivings on VM, and it is corresponding with least one VF,
Therefore each VM has bypassed the vSwitch in Hypervisor, is connected directly to the VF in SR-IOV NIC, it is achieved thereby that
Physical network and VM's is indirectly connected with.
Using the embodiment of the present application, the IO performances under virtualized environment can be caused to make full use of network interface card hardware capabilities, pole
Greatly virtualization is improved to handle up.
Below by taking virtualization system as shown in Figure 7 and Figure 8 as an example, illustrate system configuration process.
As shown in Figure 7 and Figure 8,3 physical port P1~P3 on access switch SW1 connect a physical services respectively
A general switch SW2 in the SR-IOV NIC of device, also one physical port P4 connection network.Each physical services
Device includes:64 VM, Hypervisor and SR-IOV NIC, the SR-IOV NIC that numbering is VM1~VM64 respectively include
64 VF, think there are 64 Microsoft Loopback Adapters in Hypervisor, and VM can see that 64 PCIe devices, this 64 VF points
Bian Hao not be VF1~VF64.3 VLAN traffics are provided with SW2:VLAN10、VLAN2000、VLAN100.
It is assumed that business need is as follows:
VF1-VP1, VF2-VP2 data of P1 accesses flow into general service VLAN10;
The VF64-VP64 data of P1 accesses flow into general service VLAN2000;
VF1-VP1, VF3-VP3 data of P2 accesses flow into general service VLAN10;
The VF64-VP64 data of P2 accesses flow into general service VLAN2000;
The VF2-VP2 data of P2 accesses flow into general service VLAN100;
The VF1-VP1 data of P3 accesses flow into general service VLAN10;
The VF2-VP2 data of P3 accesses flow into general service VLAN2000;
VF3-VP3, VF64-VP64 data of P3 accesses flow into general service VLAN100.
Wherein, VF1-VP1, which represents to send from VF1, enters VP1, other similar.
During default configuration, comprise the following steps:On each physical server, pair set up between VM and VF
It should be related to, specifically, VM1 is corresponding with VF1, VM2 is corresponding with VF2, by that analogy;On L2vSwitch in SR-IOV NIC
The one-to-one relationship between VF and mark VLAN is configured, specifically, VF1, which corresponds to mark VLAN1, VF2, corresponds to mark
VLAN2, by that analogy.On access switch SW1,64 virtual port vPort are configured on P1~P3 respectively, are numbered respectively
For vP1~vP64;On each physical port in P1~P3, the one-to-one corresponding set up between vPort and mark VLAN is closed
System, specifically, vP1, which corresponds to mark VLAN1, vP2, corresponds to mark VLAN2, by that analogy;VLAN is enabled on P1~P3
TRUNK functions.
Afterwards, the configuration process for practical business is as follows:
3 VNI are configured on SW1:VNI1, VNI2 and VNI3;
Respectively on P1, P2 and P3, each vPort is tied to corresponding VNI, it is specific as follows:On P1, by VP1
VNI1 is tied to VP2, VP64 is tied to VNI2;On P2, VP1 and VP3 are tied to VNI1, VP2 is tied to VNI3, VP64
It is tied to VNI2;On P3, VP1 is tied to VNI1, VP2 is tied to VNI2, VP3 and VP64 and is tied to VNI3.
Each vPort on configuration P4 corresponds respectively to VLAN10, VLAN100 and VLAN2000;
Each vPort is bound with corresponding VNI on configuration P4 so that general service VLAN and VNI is corresponded;Specifically
, VNI1 and VLAN10 is bound, and VNI2 and VLAN2000 is bound, and VNI3 and VLAN100 is bound.
In another embodiment of the application provide it is a kind of can using the above method virtualization system in Message processing
Device.
As shown in figure 9, the message process device in virtualization system can apply to the SR-IOV NIC of physical server
In vSwitch in, the device is included with lower module:Receiving module 501, searching modul 502, processing module 503 and transmission
Module 504, wherein:
Receiving module 501, for receiving the UNTAG data messages that VM is sent by the corresponding VF of the VM, wherein, should
There is no the VLAN ID for carrying the VM in UNTAG data messages;
Searching modul 502, for receiving the UNTAG numbers that VM is sent by the corresponding VF of the VM in receiving module 501
After message, corresponding mark VLAN is found according to the VF;
Processing module 503, the VLAN ID of the mark VLAN for searching modul 502 to be found are added to receiving module
In the 501 UNTAG data messages received, 802.1Q messages are obtained;Wherein, VF and mark VLAN is corresponded;
Sending module 504, the 802.1Q of the VLAN ID for carrying mark VLAN for processing module 503 to be obtained is reported
Text, is sent to the direct-connected access switch of this physical server.
In addition, receiving module 501, is additionally operable to receive the 802.1Q reports that the direct-connected access switch of this physical server is sent
Text, wherein, mark VLAN VLAN ID are carried in the 802.1Q messages;
Processing module 503, is additionally operable to receive the direct-connected access switch of this physical server in receiving module 501 and sends
802.1Q messages after, remove the mark VLAN carried in the 802.1Q messages VLANID, obtain UNTAG data messages;
Searching modul 502, the VLAN for the mark VLAN being additionally operable in the 802.1Q messages that are received according to receiving module 501
ID finds corresponding VF ID;
Sending module 504, is additionally operable to the UNTAG data messages for obtaining processing module 503, is looked into by searching modul 502
The VF indicated by ID found is sent to VM corresponding with the VF.
Wherein, a VM corresponds at least one VF, and a VF corresponds to a VM.
In the another embodiment of the application provide it is a kind of can using the above method virtualization system in Message processing
Device.
As shown in Figure 10, the message process device in the virtualization system is applied in access switch, is wrapped in the device
Include with lower module:Receiving module 601, removal module 602, searching modul 603 and addition sending module 604, wherein:
Receiving module 601, for receiving special packet;Wherein, the special packet received is direct-connected physical server
Or the 802.1Q messages that other physical switches are sent, or the channel message that direct-connected other physical switches are sent;
Module 602 is removed, should for when the special packet that receiving module 601 is received is 802.1Q messages, removing
The VLAN ID carried in 802.1Q messages obtain UNTAG data messages;It is additionally operable to the specific report received when receiving module 601
When text is channel message, the source IP address and purpose IP address, VNI and VLAN in the overlay tunnels in the channel message are removed
ID, obtains UNTAG data messages;
Searching modul 603, for when the special packet that receiving module 601 is received is 802.1Q messages, according to this
The VLAN ID carried in 802.1Q messages find corresponding vPort, and corresponding VNI is found according to the vPort;It is additionally operable to
If the UNTAG data messages that removal module 602 is obtained are unicast messages, according to the VNI He the UNTAG data messages purpose
MAC Address, finds an outgoing interface information from local MAC forward tables;
Sending module 604 is added, if being unicast message, basis for removing the UNTAG data messages that module 602 is obtained
The outgoing interface acquisition of information correspondence VLAN that searching modul 603 is found from MAC forward tables, by correspondence VLAN VLAN ID
It is added to remove and is sent in the UNTAG data messages that module 604 is obtained;Wherein, correspondence VLAN is mark VLAN or business
VLAN。
In addition, also including in the device:Replication module, wherein:
Searching modul, if it is multicast message to be additionally operable to remove the obtained UNTAG data messages of module, according to the VNI and
The target MAC (Media Access Control) address of the UNTAG data messages, finds at least one outgoing interface information from MAC forward tables;
Replication module, if being multicast message for removing the obtained UNTAG data messages of module, for searching modul from
Each the outgoing interface information found in MAC forward tables, is replicated to the UNTAG data messages;
Sending module is added, if it is multicast message to be additionally operable to remove the obtained UNTAG data messages of module, according to lookup
Each outgoing interface acquisition of information correspondence VLAN that module is found from MAC forward tables, correspondence VLAN VLAN ID are added
Sent in the UNTAG data messages for being added to the duplication that replication module is obtained.
In addition, also including in the device:Replication module, wherein:
Searching modul, if be additionally operable to remove the obtained UNTAG data messages of module be broadcasting packet or target MAC (Media Access Control) address not
The unicast message known, then according to the VNI, find at least one outgoing interface information from local broadcast forward table;
Replication module, if being that broadcasting packet or target MAC (Media Access Control) address are unknown for removing the UNTAG data messages that module is obtained
Unicast message, then for searching modul from broadcast forward table each outgoing interface information for finding, to the UNTAG data
Message is replicated;
Sending module is added, if it is broadcasting packet or purpose MAC to be additionally operable to remove the obtained UNTAG data messages of module
The unknown unicast message in location, then each the outgoing interface acquisition of information correspondence found according to searching modul from broadcast forward table
VLAN, correspondence VLAN VLAN ID are added in the UNTAG data messages of duplication and sent.
Wherein, a pair of the vPort and mark VLAN 1 that access switch is used to connect on the physical port of physical server
Should;VPort and other physical switches that access switch is used to connect on the physical port of other physical switches
Service VLAN correspond;Then, when the special packet that receiving module is received is the 802.1Q messages that physical server is sent
When, the VLAN ID carried in the 802.1Q messages are the VLAN ID for marking VLAN;The special packet received when receiving module
When being the 802.1Q messages that other physical switches are sent, the VLAN ID carried in the 802.1Q messages are service VLAN
VLAN ID;When the special packet that receiving module is received is the channel message that other physical switches are sent, the channel message
The VLAN ID of middle carrying are the VLAN ID of service VLAN.
Wherein, addition sending module includes:VLAN searching units, adding device and transmitting element, wherein:
VLAN searching units, if being vPort port id, basis for the outgoing interface information that searching modul is found
The port id of the vport finds correspondence VLAN;
Adding device, for the VLAN ID for the corresponding VLAN for finding VLAN searching units, is added to UNTAG data
In message, obtain carrying correspondence VLAN VLAN ID 802.1Q messages;
Transmitting element, for the 802.1Q messages for obtaining adding device, is sent by the physical port where the vport
Go out;Wherein, correspondence VLAN is mark VLAN or service VLAN;
Wherein, when the corresponding VLAN that VLAN searching units are found is mark VLAN, transmitting element will carry mark
VLAN VLAN ID 802.1Q messages, direct-connected physical server is sent to by the physical port where the vport;
When the corresponding VLAN that VLAN searching units are found is service VLAN, transmitting element will carry service VLAN
VLAN ID 802.1Q messages, direct-connected other physical switches are sent to by the physical port where the vport.
In addition, VLAN searching units, if it is overlapping overlay tunnels to be additionally operable to the outgoing interface information that searching modul finds
The tunnel ID in road, then find corresponding tunnel information according to tunnel ID, wherein, the tunnel information includes:The overlay
The source IP address and purpose IP address in tunnel, and the overlay tunnels it is corresponding go out vport;It is additionally operable to go out vport according to this
Find corresponding service VLAN;
Adding device, is additionally operable to the source in overlay tunnels for including the tunnel information that VLAN searching units are found
The VLAN ID of IP address and purpose IP address, the VNI and the service VLAN are added in UNTAG data messages, obtain tunnel report
Text;
Transmitting element, is additionally operable to the channel message for obtaining adding device, is sent out by the physical port where going out vport
Give direct-connected other physical switches.
In addition, also including in the device:Module, configuration module and binding module are set up, wherein:
Module is set up, vPort and mark are set up on the physical port of physical server for being used to connect in access switch
Remember the one-to-one relationship between VLAN;It is additionally operable to the physical port for connecting other physical switches in access switch
The one-to-one relationship set up between the service VLAN on vPort and other physical switches;
Configuration module, for configuring at least one VNI on access switch;
Binding module, for being used to connect each vPort on the physical port of physical server in access switch
It is tied to corresponding VNI;It is additionally operable to be used to connect each on the physical port of other physical switches in access switch
VPort and VNI binding.
To sum up, the application above example can reach following technique effect:
There is provided a kind of new virtualization system in the embodiment of the present application, the system includes:Physical server and access
Interchanger.Physical server includes:At least one VM and the network interface card using SR-IOV technologies, referred to as SR-IOV NIC, the SR-
IOV NIC include L2vSwitch and multiple VF;Wherein, VF and mark VLAN is corresponded;VF drivings, VM are installed in VM
Corresponding at least one VF.Access switch is used to connect physical server(Specially connection SR-IOV NIC)Physical port
Upper to include multiple virtual port vPort, these vPort are corresponded with mark VLAN;Moreover, access switch also with other things
Switchboard direct connection is managed, access switch, which is used to connect, includes multiple vPort on the physical port of other physical switches, these
VPort is corresponded with the service VLAN in other physical switches;In addition, multiple VNI are also configured with interchanger,
VPort and VNI has binding relationship.
In said system, SR-IOV technologies are virtualized using network interface card, using SR-IOV NIC as PE, by access switch
As CB, the CB-PE frameworks of access switch+SR-IOV NIC compositions are constituted.
What VM was sent does not carry VLAN ID UNTAG data messages, can reach L2vSwitch by a VF,
L2vSwitch is received after the UNTAG data messages, and corresponding mark VLAN is found according to the VF, by the mark found
VLAN VLAN ID are added in the UNTAG data messages, obtain 802.1Q messages, are finally sent to the 802.1Q messages
Access switch.So as to be the 802.1Q messages of standard as the PE SR-IOV NIC messages sent, not increase any spy
Different field.Equally, issue and reported as the 802.1Q that PE SR-IOV NIC message is also standard as CB access switch
Text.So as to which the message of PE transmitting-receivings is the 802.1Q messages of standard, can use common network interface card, i.e., general SR-IOV NIC make
For PE, cost is saved, moreover, intercommunity is good, can extensive use.
In addition, the vPort that access switch is used to connect on SR-IOV NIC physical port is with marking VLAN 1 a pair
Should, and mark VLAN and VF to correspond, so that, the VF in SR-IOV NIC is as access switch inside physical server
Extension virtual port, and each VF corresponds to a virtual port of access switch, so, all VM data flow
It will be directed on access switch and carry out forward process.Due to being provided with VF drivings on VM, and it is corresponding with least one VF,
Therefore each VM has bypassed the vSwitch in Hypervisor, is connected directly to the VF in SR-IOV NIC, it is achieved thereby that
Physical network and VM's is indirectly connected with.
Using the embodiment of the present application, the IO performances under virtualized environment can be caused to make full use of network interface card hardware capabilities, pole
Greatly virtualization is improved to handle up.
The preferred embodiment of the application is the foregoing is only, not to limit the application, all essences in the application
God is with principle, and any modification, equivalent substitution and improvements done etc. should be included within the scope of the application protection.
Claims (20)
1. the message processing method in a kind of virtualization system, it is characterised in that the virtualization system includes:Physical services
The access switch of device and its direct-connected physics;The physical server includes:Single input and output virtualize SR-IOV nets
Network interface card NIC and at least one virtual machine VM, the SR-IOV NIC include virtual switch vSwitch and at least one
NIC virtual functions VF, VM is connected to vSwitch by VF;The access switch is used to connect the physical server
Include at least one virtual port vPort on physical port;Methods described includes:
VSwitch receives the not tape label UNTAG data messages that VM is sent by the corresponding VF of the VM, wherein, the UNTAG
There is no the virtual LAN VLAN mark ID for carrying the VM in data message;
VSwitch finds corresponding mark VLAN according to the VF, and the mark VLAN found VLAN ID are added into this
In UNTAG data messages, 802.1Q messages are obtained;Wherein, VF and mark VLAN is corresponded;
The 802.1Q messages that vSwitch will carry mark VLAN VLAN ID are sent to the direct-connected access of this physical server
Interchanger;So that access switch removes the virtual LAN VLAN mark ID carried in the 802.1Q messages and obtains not tape label
UNTAG data messages, corresponding vPort is found according to the VLAN ID, and corresponding virtualization net is found according to the vPort
Network identifies VNI;If obtained UNTAG data messages are unicast messages, the access switch is according to the VNI and the UNTAG
The purpose MAC address of data message, finds an outgoing interface information from local MAC forward tables;Root
According to outgoing interface acquisition of information correspondence VLAN, correspondence VLAN VLAN ID are added in the UNTAG data messages and sent out
Go;
Wherein, the correspondence VLAN is mark VLAN or service VLAN.
2. according to the method described in claim 1, it is characterised in that also include:
VSwitch receives the 802.1Q messages that the direct-connected access switch of this physical server is sent, wherein, 802.1Q reports
Mark VLAN VLAN ID are carried in text;
VSwitch removes the mark VLAN carried in the 802.1Q messages VLAN ID, obtains UNTAG data messages;
VSwitch finds corresponding VF ID according to mark VLAN VLAN ID, and the UNTAG data messages are passed through into this
VF indicated by ID is sent to VM corresponding with the VF.
3. method according to claim 1 or 2 a, it is characterised in that VM corresponds at least one VF, a VF correspondence
In a VM.
4. the message processing method in a kind of virtualization system, it is characterised in that the virtualization system includes:Physical services
The access switch of device and its direct-connected physics;The physical server includes:Single input and output virtualize SR-IOV nets
Network interface card NIC and at least one virtual machine VM, the SR-IOV NIC include virtual switch vSwitch and at least one
NIC virtual functions VF, VM is connected to vSwitch by VF;The access switch is used to connect the physical server
Include at least one virtual port vPort on physical port;Methods described includes:
When the access switch receives 802.1Q messages, the access switch removes the void carried in the 802.1Q messages
Intend LAN VLAN marks ID and obtain not tape label UNTAG data messages, corresponding vPort, root are found according to the VLAN ID
Corresponding virtualization network identity VNI is found according to the vPort;
If obtained UNTAG data messages are unicast messages, the access switch is according to the VNI and the UNTAG datagrams
The purpose MAC address of text, finds an outgoing interface information from local MAC forward tables;Gone out according to this
Interface message obtains correspondence VLAN, and correspondence VLAN VLAN ID are added in the UNTAG data messages and sent;
Wherein, the correspondence VLAN is mark VLAN or service VLAN;
It is direct-connected that the 802.1Q messages that the access switch is received are that vSwitch is sent to this physical server after treatment
Access switch obtain;The processing procedure of the vSwitch is:VSwitch receives VM and passes through the corresponding VF of the VM
The not tape label UNTAG data messages sent, wherein, there is no the VLAN for carrying the VM in the UNTAG data messages
VLAN identifies ID;VSwitch finds corresponding mark VLAN according to the VF, and the mark VLAN found VLAN ID are added
It is added in the UNTAG data messages, obtains 802.1Q messages;Wherein, VF and mark VLAN is corresponded;VSwitch will be carried
The 802.1Q messages for having mark VLAN VLAN ID are sent to the direct-connected access switch of this physical server.
5. method according to claim 4, it is characterised in that also include:
If obtained UNTAG data messages are multicast messages, the access switch is according to the VNI and the UNTAG datagrams
The target MAC (Media Access Control) address of text, finds at least one outgoing interface information from the MAC forward tables;For each outgoing interface letter
Breath, is replicated to the UNTAG data messages, according to outgoing interface acquisition of information correspondence VLAN, by correspondence VLAN VLAN
ID, which is added in the UNTAG data messages of duplication, to be sent.
6. method according to claim 4, it is characterised in that also include:
If obtained UNTAG data messages are broadcasting packet or the unknown unicast message of target MAC (Media Access Control) address, the access is exchanged
Machine finds at least one outgoing interface information according to the VNI from local broadcast forward table;For each outgoing interface letter
Breath, is replicated to the UNTAG data messages, according to outgoing interface acquisition of information correspondence VLAN, by correspondence VLAN VLAN
ID, which is added in the UNTAG data messages of duplication, to be sent.
7. the method according to any one of claim 4-6, it is characterised in that the access switch is used to connect physics
VPort and mark VLAN on the physical port of server is corresponded;The access switch is used to connect other physics friendships
The vPort on physical port changed planes is corresponded with the service VLAN in other physical switches;
When special packet is the 802.1Q messages that physical server is sent, the VLAN ID carried in the 802.1Q messages are marks
Remember VLAN VLAN ID;
When the special packet is the 802.1Q messages that other physical switches are sent, the VLAN carried in the 802.1Q messages
ID is the VLAN ID of service VLAN;
When the special packet is the channel message that other physical switches are sent, the VLAN ID carried in the channel message are
The VLAN ID of service VLAN.
8. method according to claim 7, it is characterised in that according to outgoing interface acquisition of information correspondence VLAN, by this pair
Answering VLAN VLAN ID to be added to the method sent in UNTAG data messages includes:
If the outgoing interface information is vPort port id, correspondence VLAN is found according to the port id of the vPort, by this pair
VLAN VLAN ID are answered to be added in the UNTAG data messages, by the obtained VLAN ID's for carrying correspondence VLAN
802.1Q messages, are sent by the physical port where the vPort;Wherein, correspondence VLAN is mark VLAN or business
VLAN;
When correspondence VLAN is mark VLAN, mark VLAN VLAN ID 802.1Q messages will be carried, by this
Physical port where vPort is sent to direct-connected physical server;
When correspondence VLAN is service VLAN, the VLAN ID of service VLAN 802.1Q messages will be carried, by this
Physical port where vPort is sent to direct-connected other physical switches.
9. method according to claim 8, it is characterised in that according to outgoing interface acquisition of information correspondence VLAN, by this pair
Answering VLAN VLAN ID to be added to the method sent in UNTAG data messages also includes:
If the outgoing interface information is the tunnel ID in overlapping overlay tunnels, corresponding tunnel is found according to tunnel ID and believed
Breath, wherein, the tunnel information includes:The source IP address and purpose IP address in the overlay tunnels, and the overlay tunnels
Road it is corresponding go out vPort;
VPort is gone out according to this and finds corresponding service VLAN, by the source IP address and purpose IP address in the overlay tunnels,
The VLAN ID of the VNI and the service VLAN are added in the UNTAG data messages, and obtained channel message is gone out by this
Physical port where vPort is sent to direct-connected other physical switches.
10. method according to claim 7, it is characterised in that also include:
In the access switch for connecting set up on the physical port of physical server between vPort and mark VLAN one
One corresponding relation;
At least one VNI is configured on the access switch;
The access switch be used to connect on the physical port of physical server each vPort is tied to it is corresponding
VNI;
VPort is set up on the physical port that the access switch is used to connecting other physical switches to hand over the other physics
The one-to-one relationship between service VLAN on changing planes;Each vPort and VNI is bound on the physical port.
11. the message process device in a kind of virtualization system, it is characterised in that the virtualization system includes:Physics takes
The access switch of business device and its direct-connected physics;The physical server includes:Single input and output virtualize SR-IOV
NIC NIC and at least one virtual machine VM, the SR-IOV NIC include virtual switch vSwitch and at least one
Individual NIC virtual functions VF, VM is connected to vSwitch by VF;The access switch is used to connect the physical server
Physical port on include at least one virtual port vPort;The vSwitch includes:
Receiving module, for receiving the not tape label UNTAG data messages that VM is sent by the corresponding VF of the VM, wherein, should
There is no the virtual LAN VLAN mark ID for carrying the VM in UNTAG data messages;
Searching modul, for receiving the UNTAG data messages that VM is sent by the corresponding VF of the VM in the receiving module
Afterwards, corresponding mark VLAN is found according to the VF;
Processing module, the VLAN ID of the mark VLAN for the searching modul to be found are added to the receiving module and connect
In the UNTAG data messages received, 802.1Q messages are obtained;Wherein, VF and mark VLAN is corresponded;
Sending module, for the 802.1Q messages for the VLAN ID for carrying mark VLAN for obtaining the processing module, sends
The access switch direct-connected to this physical server;So that access switch removes the virtual local area carried in the 802.1Q messages
Net VLAN marks ID obtains not tape label UNTAG data messages, corresponding vPort is found according to the VLAN ID, according to this
VPort finds corresponding virtualization network identity VNI;If obtained UNTAG data messages are unicast messages, the access
Interchanger is according to the VNI and the purpose MAC address of the UNTAG data messages, from local MAC forward tables
Find an outgoing interface information;According to outgoing interface acquisition of information correspondence VLAN, correspondence VLAN VLAN ID are added to
Sent in the UNTAG data messages;
Wherein, the correspondence VLAN is mark VLAN or service VLAN.
12. device according to claim 11, it is characterised in that
The receiving module, is additionally operable to receive the 802.1Q messages that the direct-connected access switch of this physical server is sent, wherein,
Mark VLAN VLAN ID are carried in the 802.1Q messages;
The processing module, is additionally operable to receive what the direct-connected access switch of this physical server was sent in the receiving module
After 802.1Q messages, the mark VLAN carried in the 802.1Q messages VLANID is removed, UNTAG data messages are obtained;
The searching modul, the VLAN for the mark VLAN being additionally operable in the 802.1Q messages that are received according to the receiving module
ID finds corresponding VF ID;
The sending module, is additionally operable to the UNTAG data messages for obtaining the processing module, is searched by the searching modul
To ID indicated by VF be sent to VM corresponding with the VF.
13. the device according to claim 11 or 12 a, it is characterised in that VM corresponds at least one VF, a VF
Corresponding to a VM.
14. the message process device in a kind of virtualization system, it is characterised in that the virtualization system includes:Physics takes
The access switch of business device and its direct-connected physics;The physical server includes:Single input and output virtualize SR-IOV
NIC NIC and at least one virtual machine VM, the SR-IOVNIC include virtual switch vSwitch and at least one
Individual NIC virtual functions VF, VM is connected to vSwitch by VF;The access switch is used to connect the physical server
Physical port on include at least one virtual port vPort;The access switch includes:
Receiving module, for receiving special packet;Wherein, the special packet received is direct-connected physical server or other things
The 802.1Q messages that reason interchanger is sent, or the channel message that direct-connected other physical switches are sent;
Module is removed, for when the special packet that the receiving module is received is 802.1Q messages, removing 802.1Q reports
The virtual LAN VLAN mark ID carried in text obtains UNTAG data messages;It is additionally operable to what is received when the receiving module
When special packet is channel message, remove overlapping overlay tunnels in the channel message source Internet protocol IP address and
Purpose IP address, VNI and VLAN ID, obtain UNTAG data messages;
Searching modul, for when the special packet that the receiving module is received is 802.1Q messages, being reported according to the 802.1Q
The VLAN ID carried in text find corresponding vPort, and corresponding virtualization network identity VNI is found according to the vPort;
If it is unicast message to be additionally operable to the obtained UNTAG data messages of removal module, according to the VNI and the UNTAG datagrams
The purpose MAC address of text, finds an outgoing interface information from local MAC forward tables;
Sending module is added, if being unicast message for the UNTAG data messages that the removal module is obtained, is looked into according to
The outgoing interface acquisition of information correspondence VLAN that module is found from the MAC forward tables is looked for, correspondence VLAN VLAN ID are added
It is added in the UNTAG data messages that the removal module is obtained and sends;
Wherein, the correspondence VLAN is mark VLAN or service VLAN;
It is direct-connected that the 802.1Q messages that the access switch is received are that vSwitch is sent to this physical server after treatment
Access switch obtain;The processing procedure of the vSwitch is:VSwitch receives VM and passes through the corresponding VF of the VM
The not tape label UNTAG data messages sent, wherein, there is no the VLAN for carrying the VM in the UNTAG data messages
VLAN identifies ID;VSwitch finds corresponding mark VLAN according to the VF, and the mark VLAN found VLAN ID are added
It is added in the UNTAG data messages, obtains 802.1Q messages;Wherein, VF and mark VLAN is corresponded;VSwitch will be carried
The 802.1Q messages for having mark VLAN VLAN ID are sent to what the direct-connected access switch of this physical server was obtained.
15. device according to claim 14, it is characterised in that also include:Replication module, wherein:
The searching modul, if it is multicast message to be additionally operable to the obtained UNTAG data messages of removal module, according to should
VNI and the UNTAG data messages target MAC (Media Access Control) address, find at least one outgoing interface information from the MAC forward tables;
The replication module, if being multicast message for the UNTAG data messages that the removal module is obtained, is looked into for described
Each outgoing interface information that module is found from the MAC forward tables is looked for, the UNTAG data messages are replicated;
The addition sending module, if it is multicast message, basis to be additionally operable to the obtained UNTAG data messages of removal module
Each outgoing interface acquisition of information correspondence VLAN that the searching modul is found from the MAC forward tables, by the correspondence
VLAN VLAN ID, which are added in the UNTAG data messages for the duplication that the replication module is obtained, to be sent.
16. device according to claim 14, it is characterised in that also include:Replication module, wherein:
The searching modul, if it is broadcasting packet or purpose MAC to be additionally operable to the obtained UNTAG data messages of removal module
The unknown unicast message in location, then according to the VNI, find at least one outgoing interface information from local broadcast forward table;
The replication module, if being broadcasting packet or target MAC (Media Access Control) address for the UNTAG data messages that the removal module is obtained
Unknown unicast message, then each the outgoing interface information found for the searching modul from the broadcast forward table,
The UNTAG data messages are replicated;
The addition sending module, if it is broadcasting packet or purpose to be additionally operable to the obtained UNTAG data messages of removal module
The unknown unicast message of MAC Address, then each found according to the searching modul from the broadcast forward table goes out to connect
Mouth acquisition of information correspondence VLAN, correspondence VLAN VLAN ID are added in the UNTAG data messages of duplication and sent.
17. the device according to any one of claim 14-16, it is characterised in that the access switch is used to connect
VPort and mark VLAN on the physical port of physical server is corresponded;The access switch is other for connecting this
VPort on the physical port of physical switches is corresponded with the service VLAN in other physical switches;
When the special packet that the receiving module is received is the 802.1Q messages that physical server is sent, the 802.1Q messages
The VLAN ID of middle carrying are the VLAN ID for marking VLAN;When the special packet that the receiving module is received is that other physics are handed over
Change planes the 802.1Q messages sent when, the VLAN ID carried in the 802.1Q messages are the VLAN ID of service VLAN;When described
When the special packet that receiving module is received is the channel message that other physical switches are sent, carried in the channel message
VLAN ID are the VLAN ID of service VLAN.
18. device according to claim 17, it is characterised in that the addition sending module includes:
VLAN searching units, if being vPort port id, basis for the outgoing interface information that the searching modul is found
The port id of the vPort finds correspondence VLAN;
Adding device, for the VLAN ID for the corresponding VLAN for finding the VLAN searching units, is added to UNTAG data
In message, obtain carrying correspondence VLAN VLAN ID 802.1Q messages;
Transmitting element, for the 802.1Q messages for obtaining the adding device, is sent by the physical port where the vPort
Go out;Wherein, correspondence VLAN is mark VLAN or service VLAN;
When the corresponding VLAN that the VLAN searching units are found is mark VLAN, the transmitting element will carry mark
VLAN VLAN ID 802.1Q messages, direct-connected physical server is sent to by the physical port where the vPort;
When the corresponding VLAN that the VLAN searching units are found is service VLAN, the transmitting element will carry business
VLAN VLAN ID 802.1Q messages, direct-connected other physical exchanges are sent to by the physical port where the vPort
Machine.
19. device according to claim 18, it is characterised in that
The VLAN searching units, if it is overlapping overlay tunnels to be additionally operable to the outgoing interface information that the searching modul finds
The tunnel ID in road, then find corresponding tunnel information according to tunnel ID, wherein, the tunnel information includes:The overlay
The source IP address and purpose IP address in tunnel, and the overlay tunnels it is corresponding go out vPort;It is additionally operable to go out vPort according to this
Find corresponding service VLAN;
The adding device, is additionally operable to the overlay tunnels for including the tunnel information that the VLAN searching units are found
Source IP address and the VLAN ID of purpose IP address, the VNI and the service VLAN be added in UNTAG data messages, obtain tunnel
Road message;
The transmitting element, is additionally operable to the channel message for obtaining the adding device, the physics end gone out by this where vPort
Mouth is sent to direct-connected other physical switches.
20. device according to claim 17, it is characterised in that also include:
Module is set up, vPort and mark are set up on the physical port of physical server for being used to connect in the access switch
Remember the one-to-one relationship between VLAN;It is additionally operable to the physics end for connecting other physical switches in the access switch
The one-to-one relationship set up on mouth between the service VLAN on vPort and other physical switches;
Configuration module, for configuring at least one VNI on the access switch;
Binding module, for being used to connect each vPort on the physical port of physical server in the access switch
It is tied to corresponding VNI;Being additionally operable to will be every on the physical port of other physical switches for connecting in the access switch
One vPort and VNI binding.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410118957.6A CN103873374B (en) | 2014-03-27 | 2014-03-27 | Message processing method and device in virtualization system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410118957.6A CN103873374B (en) | 2014-03-27 | 2014-03-27 | Message processing method and device in virtualization system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103873374A CN103873374A (en) | 2014-06-18 |
CN103873374B true CN103873374B (en) | 2017-08-11 |
Family
ID=50911513
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410118957.6A Active CN103873374B (en) | 2014-03-27 | 2014-03-27 | Message processing method and device in virtualization system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103873374B (en) |
Families Citing this family (41)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104092595B (en) * | 2014-07-21 | 2017-10-27 | 新华三技术有限公司 | Message processing method and device in virtualization system based on 802.1BR |
CN104243608B (en) * | 2014-09-29 | 2018-02-06 | 华为技术有限公司 | A kind of communication means, cloud management server and virtual switch |
US9984028B2 (en) * | 2014-10-31 | 2018-05-29 | Arris Enterprises Llc | Redundancy for port extender chains |
CN106330779B (en) * | 2015-06-23 | 2019-07-26 | 联想企业解决方案(新加坡)有限公司 | Server, physical switch, and communication system |
CN106797344B (en) * | 2015-06-30 | 2020-10-16 | 华为技术有限公司 | Method and apparatus for communicating through remote network element port |
WO2017004746A1 (en) * | 2015-07-03 | 2017-01-12 | 华为技术有限公司 | Network configuration method, network system and device |
CN105245456B (en) * | 2015-10-20 | 2018-12-25 | 浪潮(北京)电子信息产业有限公司 | A kind of method and system of the interior unloading SDN virtual network function of Cloud Server |
EP3273643B1 (en) | 2015-12-31 | 2019-08-21 | Huawei Technologies Co., Ltd. | Method for sending virtual extensible local area network packet, computer device, and readable medium |
US10397108B2 (en) * | 2016-01-25 | 2019-08-27 | Futurewei Technologies, Inc. | Service function chaining across multiple subnetworks |
CN106998347A (en) * | 2016-01-26 | 2017-08-01 | 中兴通讯股份有限公司 | The apparatus and method of server virtualization network share |
WO2017219272A1 (en) * | 2016-06-22 | 2017-12-28 | 华为技术有限公司 | Packet forwarding method and device |
CN107544930B (en) * | 2016-06-27 | 2020-07-14 | 华为技术有限公司 | Transparent transmission method and device for communication port |
CN107580077A (en) * | 2016-07-04 | 2018-01-12 | 南京中兴新软件有限责任公司 | Public network IP distribution method, device and Visualized data centre system |
CN112217747A (en) | 2016-08-03 | 2021-01-12 | 华为技术有限公司 | Network interface card, computing device, and data packet processing method |
EP3340064B1 (en) | 2016-08-03 | 2020-12-02 | Huawei Technologies Co., Ltd. | Network interface card, computer device and data packet processing method |
CN106230740A (en) * | 2016-08-23 | 2016-12-14 | 杭州华三通信技术有限公司 | Message forwarding method in a kind of VXLAN and device |
CN106383736B (en) * | 2016-09-21 | 2019-10-11 | 新华三技术有限公司 | Ports-Extending method and apparatus |
CN107992352A (en) * | 2016-10-26 | 2018-05-04 | 阿里巴巴集团控股有限公司 | For virtualizing the data interactive method and equipment of scene |
SG11201800020UA (en) | 2016-11-09 | 2018-06-28 | Huawei Tech Co Ltd | Packet processing method in cloud computing system, host, and system |
JP6513835B2 (en) | 2016-11-09 | 2019-05-15 | ホアウェイ・テクノロジーズ・カンパニー・リミテッド | Packet processing method, host, and system in cloud computing system |
CN108259291B (en) * | 2016-12-29 | 2021-01-29 | 华为技术有限公司 | VXLAN message processing method, device and system |
CN108390809B (en) * | 2017-02-03 | 2020-12-11 | 北京华耀科技有限公司 | Bridging method and system based on VF promiscuous mode |
CN108512678B (en) * | 2017-02-27 | 2020-12-25 | 中国科学院信息工程研究所 | Method and system for accessing physical equipment to virtual network based on overlay technology |
CN108881348B (en) * | 2017-05-15 | 2021-04-06 | 新华三技术有限公司 | Service quality control method and device and storage server |
CN107547344B (en) * | 2017-06-30 | 2020-11-27 | 新华三技术有限公司 | VXLAN message processing method and device |
CN108958884B (en) * | 2018-06-22 | 2022-02-18 | 郑州云海信息技术有限公司 | Virtual machine management method and related device |
CN110650076B (en) | 2018-06-26 | 2021-12-24 | 华为技术有限公司 | VXLAN implementation method, network equipment and communication system |
CN111656336B (en) * | 2018-06-30 | 2022-01-14 | 华为技术有限公司 | PCIE sending and receiving method, device, equipment and system |
CN108965169B (en) * | 2018-07-12 | 2020-09-25 | 联想(北京)有限公司 | Message transmission method, network card controller, network card and electronic equipment |
CN108965093B (en) * | 2018-08-24 | 2021-03-23 | 新华三技术有限公司 | VLAN (virtual local area network) distribution method and device |
CN109525515B (en) * | 2018-10-23 | 2021-04-30 | 郑州云海信息技术有限公司 | Management method and device for network card in cloud platform |
CN109861959B (en) * | 2018-11-22 | 2022-04-08 | 新华三技术有限公司 | Data transmission method and device |
CN111224897A (en) * | 2018-11-23 | 2020-06-02 | 北京金山云网络技术有限公司 | Flow forwarding method and device, switch equipment and intelligent network card |
CN111224898A (en) * | 2018-11-23 | 2020-06-02 | 北京金山云网络技术有限公司 | Message forwarding method and device, switch equipment and intelligent network card |
CN111698141B (en) * | 2019-03-13 | 2022-12-02 | 中兴通讯股份有限公司 | Message forwarding method and device |
CN111030913A (en) * | 2019-11-21 | 2020-04-17 | 天津天睿科技有限公司 | Network equipment cluster data synchronization method |
CN113132200B (en) * | 2019-12-30 | 2024-01-19 | 中兴通讯股份有限公司 | Data forwarding method, repeater, system, server and storage medium |
CN111224871A (en) * | 2019-12-31 | 2020-06-02 | 江苏省未来网络创新研究院 | Method for realizing virtualized routing based on kvm and SRIOV and method thereof |
CN114205236A (en) * | 2020-09-18 | 2022-03-18 | 中兴通讯股份有限公司 | Network configuration method, terminal, system and storage medium |
CN113852535A (en) * | 2021-07-29 | 2021-12-28 | 浪潮软件科技有限公司 | OpenStack vlan transparent transmission implementation method and system |
CN116800486A (en) * | 2023-06-13 | 2023-09-22 | 中科驭数(北京)科技有限公司 | Cloud network communication method and system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101809943A (en) * | 2007-09-24 | 2010-08-18 | 英特尔公司 | Method and system for virtual port communications |
WO2011078861A1 (en) * | 2009-12-23 | 2011-06-30 | Intel Corporation | A computer platform providing hardware support for virtual inline appliances and virtual machines |
CN102549977A (en) * | 2009-09-24 | 2012-07-04 | 日本电气株式会社 | Identification system for inter-virtual-server communication and identification method for inter-virtual-server communication |
CN102790792A (en) * | 2011-05-19 | 2012-11-21 | 株式会社日立制作所 | Method and apparatus of connectivity discovery between network switch and server based on vlan identifiers |
CN103201721A (en) * | 2012-08-29 | 2013-07-10 | 华为技术有限公司 | Virtual machine thermal migration system and method |
CN103444135A (en) * | 2011-06-02 | 2013-12-11 | 惠普发展公司,有限责任合伙企业 | Network virtualization |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4622835B2 (en) * | 2005-12-07 | 2011-02-02 | 株式会社日立製作所 | Virtual computer system and network communication method thereof |
WO2013086204A1 (en) * | 2011-12-07 | 2013-06-13 | Citrix Systems, Inc. | Controlling a network interface using virtual switch proxying |
-
2014
- 2014-03-27 CN CN201410118957.6A patent/CN103873374B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101809943A (en) * | 2007-09-24 | 2010-08-18 | 英特尔公司 | Method and system for virtual port communications |
CN102549977A (en) * | 2009-09-24 | 2012-07-04 | 日本电气株式会社 | Identification system for inter-virtual-server communication and identification method for inter-virtual-server communication |
WO2011078861A1 (en) * | 2009-12-23 | 2011-06-30 | Intel Corporation | A computer platform providing hardware support for virtual inline appliances and virtual machines |
CN102790792A (en) * | 2011-05-19 | 2012-11-21 | 株式会社日立制作所 | Method and apparatus of connectivity discovery between network switch and server based on vlan identifiers |
CN103444135A (en) * | 2011-06-02 | 2013-12-11 | 惠普发展公司,有限责任合伙企业 | Network virtualization |
CN103201721A (en) * | 2012-08-29 | 2013-07-10 | 华为技术有限公司 | Virtual machine thermal migration system and method |
Also Published As
Publication number | Publication date |
---|---|
CN103873374A (en) | 2014-06-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103873374B (en) | Message processing method and device in virtualization system | |
Wang et al. | Network virtualization: Technologies, perspectives, and frontiers | |
US10205657B2 (en) | Packet forwarding in data center network | |
CN102801729B (en) | Virtual machine message forwarding method, network switching equipment and communication system | |
JP6034979B2 (en) | Packet transfer method and apparatus, and data center network | |
CN104937885B (en) | Global VLAN for fabric switch | |
CN107819663A (en) | A kind of method and apparatus for realizing virtual network function service chaining | |
US20190238365A1 (en) | Vlan to vxlan translation using vlan-aware virtual machines | |
CN106685787B (en) | PowerVM (virtual machine) virtualized network management method and device based on OpenStack | |
US9118606B2 (en) | Method and apparatus for simulating IP multinetting | |
CN106598560A (en) | iSCSI based bare metal os image deployment and diskless boot | |
CN107592216B (en) | Virtual-real network fusion simulation method supporting multi-scene experimental isolation | |
CN105049360A (en) | Method and system for facilitating switch virtualization in network of interconnected switches | |
CN107645431B (en) | Message forwarding method and device | |
CN106209553A (en) | Message processing method, equipment and system | |
CN105284080A (en) | Data center system and virtual network management method of data center | |
CN106209689B (en) | Multicast data packet forwarding method and apparatus from VXLAN to VLAN | |
CN104410541A (en) | Method and device for counting VXLAN inner layer virtual machine flux on intermediate switch | |
CN105634901B (en) | Mac address information synchronous method and device based on CAS VXLAN | |
CN105515992A (en) | Method and device for processing flow table items of VXLAN network | |
CN106209638A (en) | From VLAN to the message forwarding method of virtual expansible LAN and equipment | |
CN106506315B (en) | A kind of transparent configuration method of message forwarding | |
CN106209648A (en) | Multicast data packet forwarding method and apparatus across virtual expansible LAN | |
CN106209636A (en) | From the multicast data packet forwarding method and apparatus of VLAN to VXLAN | |
US9356803B2 (en) | Field aware virtual connection discovery |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 310052 Binjiang District Changhe Road, Zhejiang, China, No. 466, No. Applicant after: Xinhua three Technology Co., Ltd. Address before: 310052 Binjiang District Changhe Road, Zhejiang, China, No. 466, No. Applicant before: Huasan Communication Technology Co., Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |