CN103973825A - Method, node equipment and transmitting method for notifying of MAC (media access control) address accessibility in overlay network - Google Patents

Method, node equipment and transmitting method for notifying of MAC (media access control) address accessibility in overlay network Download PDF

Info

Publication number
CN103973825A
CN103973825A CN201310041145.1A CN201310041145A CN103973825A CN 103973825 A CN103973825 A CN 103973825A CN 201310041145 A CN201310041145 A CN 201310041145A CN 103973825 A CN103973825 A CN 103973825A
Authority
CN
China
Prior art keywords
network
tlv
mac address
mac
address accessibility
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310041145.1A
Other languages
Chinese (zh)
Other versions
CN103973825B (en
Inventor
翟洪军
肖敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201310041145.1A priority Critical patent/CN103973825B/en
Publication of CN103973825A publication Critical patent/CN103973825A/en
Application granted granted Critical
Publication of CN103973825B publication Critical patent/CN103973825B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Small-Scale Networks (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a method, node equipment and a transmitting method for notifying of MAC (media access control) address accessibility in an overlay network. The method for notifying of MAC (media access control) address accessibility in the overlay network includes the steps: edge nodes of the overlay network notify the outside of MAC address accessibility TLV (type/length/value) which carries a virtual network identifier; after receiving the MAC address accessibility TLV, intermediate nodes construct an LSDB (link state database) of IS-IS (intermediate system to intermediate system) instances used for notifying of the MAC address accessibility TLV and transmit the MAC address accessibility TLV to other edge nodes; after receiving the MAC address accessibility TLV, the other edge nodes construct another LSDB of IS-IS instances and construct mapping tables, mutually independent for the virtual network identifier, between a target C-MAC and an overlay network outer forwarded identifier according to the LSDB. The method has the advantages that information carried in the existing standard MAC address accessibility TLV is expanded, and a processing method of the IS-IS instances and network nodes, used for notifying of the MAC address accessibility, after receiving IS-IS protocol messages belonging to the IS-IS instances, is specified without introducing new ESADI protocols.

Description

In stacking network, notice method, node device and the sending method of MAC Address accessibility
Technical field
The present invention relates to the communications field, more specifically, relate to method, node device and the sending method of in a kind of stacking network, noticing MAC Address accessibility.
Background technology
Ethernet is in the mininets such as enterprise network, Campus Networks and data center network, to use the most general network technology at present, has extensively been penetrated in the middle of people's daily productive life.But along with adopting ethernet technology network of network scale constantly to expand, the drawback of traditional ethernet also displays more and more.First, the extensibility of traditional ethernet is bad.The data message encapsulation format of traditional ethernet as shown in Figure 1, adopt media interviews control (Media Access Control, referred to as MAC) address and virtual local area network tags (Virtual Local Area Network tag, referred to as VLAN-TAG) in the VLAN-ID that carries as forwarding mark, what MAC Address wherein represented is to produce the data source of this data message (generally also referred to as main frame or website, represent with main frame hereinafter) packaged MAC Address, what VLAN-ID represented is the mark of dividing logical network on physical network, the interface that has configured identical VLAN-ID on network node belongs to identical logical network, different logical network is mated different transmitting in the time of forwarding data packets, isolation mutually.Due to the single layer network characteristic of above-mentioned traditional ethernet, on the one hand, transmitting of all-network node all needs to preserve the MAC Address of main frame in network entry, and in the time that network size is very large, the network node that performance is lower will can't bear the heavy load; On the other hand, in Ether frame, the length of VLAN-ID only has 12 bits, can only divide at most more than 4,000 logical network, and in the time that network size is very large, the quantity of logical network just cannot meet the demand of network.Secondly, the link utilization of traditional ethernet is low and network convergence is slow.Traditional ethernet adopts Spanning-Tree Protocol (Spanning TreeProtocol, referred to as STP) prevent loop, Spanning-Tree Protocol is in having agreement and realizing simple advantage, also brought the low and slow drawback of network convergence of link utilization, this shows especially obviously when network size is very large.Again, the fail safe of traditional ethernet is lower.The single layer network characteristic of traditional ethernet easily causes the broadcast storm of the whole network, so any one network node all may be initiated attack and the destruction for whole network in traditional ethernet.
All drawbacks while being applied to large-scale network-estabilishing in order to overcome above-mentioned traditional ethernet, International Standards Organization's Institute of Electrical and Electric Engineers (Institute of Electrical and Electronics Engineers, referred to as IEEE) and Internet Engineering task groups (Internet Engineering Task Force, referred to as IETF) all proposed respectively to utilize stacking network (Overlay Network) to transmit the solution of Ethernet service.What is called utilizes stacking network to transmit Ethernet service, exactly network is carried out to layering, mark a core layer that is called stacking network in the intermedium stem portion of network, the fringe node of stacking network once encapsulates the original Ether frame that enters this network, after encapsulation, the destination address of data message points to the remote edge node of stacking network, then in stacking network, forward according to the destination address of message after encapsulation, after the remote edge node of arrival stacking network, carry out again a decapsulation, recover original Ether frame.Utilize stacking network to transmit Ethernet service, stacking network and peripheral access layer network can be kept apart, encapsulate to solve the scalability problem of traditional ethernet by introducing the new data surface of one deck, being different from by employing the new chain of command agreement that traditional ethernet adopts STP agreement prevents loop and sets up route, low and the slow problem of network convergence with solution link utilization, and solve safety issue together with coming with chain of command agreement by above-mentioned new data surface encapsulation.
The stacking network solution that IEEE proposes is called shortest path bridging (the ShortestPath Bridging-MAC Mode of MAC pattern, referred to as SPBM), its technical standard comprises 802.1ah provider backbone bridge (the Provider BackboneBridges issuing respectively in August, 2008 and in June, 2012, referred to as PBB) standard and 802.1aq shortest path bridging (Shortest Path Bridging, referred to as SPB) standard, these two standard separate provision datum plane technology and the control plane technology of SPBM.What the SPBM datum plane technology of PBB standard 802.1ah defined adopted is MAC-in-MAC encapsulation, concrete encapsulation format as shown in Figure 2, wherein be packaged with the original Ether frame (being client's frame) that main frame sends, in client's frame of encapsulation, carry client's media access control address (CustomerMAC Address, referred to as C-MAC) and client's frame VLAN-TAG, client's frame is in entering this stacking network, network edge node can be in the new forwarding mark of client's frame outside encapsulation one deck, be key media access control address (Backbone MAC Address, referred to as B-MAC) and key virtual local area network tags (Backbone VLAN tag, referred to as B-TAG), the source B-MAC of the object B-MAC that B-MAC comprises 6 bytes and 6 bytes, key VLAN ID (the Backbone VLAN Identifier that B-TAG comprises 12 bits, referred to as B-VID), key service instance tag (Backbone Service Instance tag can encapsulated in addition between B-TAG and C-MAC, referred to as I-TAG), key srvice instance mark (the Backbone Service Instance Identifier that I-TAG comprises 24 bits, referred to as I-SID).The fringe node that PBB is encapsulated in SPBM stacking network completes, after message has encapsulated, all nodes in stacking network including fringe node carry out message repeating according to object B-MAC and B-VID, and the only isolation as different business example at fringe node of I-SID does not affect the forwarding of message.For the fringe node of SPBM stacking network, one or more client's frame VID on an inbound port are mapped to an I-SID, one or more I-SID are mapped to a B-VID, one or more object C-MAC are mapped to an object B-MAC, wherein the mapping table between client's frame VID and I-SID and between I-SID and B-VID obtains by manual configuration, and the mapping table between object C-MAC and object B-MAC is learnt to obtain by data surface.In addition, the mapping table between object C-MAC and object B-MAC is separate based on each I-SID, that is to say, on the fringe node of SPBM stacking network, has the mapping table between different object C-MAC and object B-MAC for different I-SID.That the SPBM control plane technology of SPB standard 802.1aq defined adopts is the IS-IS that ISIS-SPB(is applied to SPB network) link-state routing protocol, this agreement is Intermediate System-to-Intermediate System (the IntermediateSystem to Intermediate System specifying with international standard ISO10589, referred to as IS-IS) link-state routing protocol be basis, carried out corresponding customization and expansion for SPBM network.
The stacking network solution that IETF proposes has a variety of, wherein there are two kinds of main schemes to adopt the similar control plane technology of SPBM stacking network proposing with IEEE, this two schemes is respectively multilink transparent interconnection (the Transparent Interconnection of Lots ofLinks of the Trill working group definition of IETF, referred to as Trill) virtual local area network (LAN) (Virtual eXtensible Local Area Network, referred to as the VXLAN) stacking network of expanding of the Nvo3 working group definition of stacking network and IETF.The ISIS-Trill(of what the chain of command technology of Trill stacking network adopted is ietf standard RFC6326 defined is applied to the IS-IS of Trill network) link-state routing protocol, this agreement be the IS-IS link-state routing protocol that specifies taking international standard ISO10589 as basis, carried out corresponding customization and expansion for Trill network; The chain of command technology of VXLAN stacking network has been continued to use existing Routing Protocol in IP network, one of them option is exactly the IS-IS that ISIS-IP(of RFC1195 defined is applied to IP network) link-state routing protocol, this agreement be the IS-IS link-state routing protocol that specifies taking international standard ISO10589 as basis, carried out corresponding customization and expansion for IP network.Be different from the PBB datum plane encapsulation of the SPBM stacking network employing of IEEE proposition, the Trill datum plane encapsulation of what Trill stacking network adopted is RFC6325 and a series of RFC definition that RFC6325 is upgraded, concrete encapsulation format as shown in Figure 3, wherein be packaged with the original Ether frame (being client's frame) that main frame sends, client's frame is in entering this stacking network, network edge node can be in the new forwarding mark of client's frame outside encapsulation one deck, the i.e. egress Nickname(pet name of 16 bits) and the ingress Nickname of 16 bits, fine particle label (Fine-Grained Label can encapsulated in addition between C-MAC and client's frame payload, referred to as FGL), fine particle label value (the Fine-Grained Label Value that FGL comprises 24 bits, referred to as FGL Value).The fringe node that Trill is encapsulated in Trill stacking network completes, after message has encapsulated, all nodes in stacking network including fringe node carry out message repeating according to egress Nickname, and the only isolation as different business example at fringe node of FGL Value does not affect the forwarding of message.For the fringe node of Trill stacking network, one or more client's frame VID on an inbound port are mapped to a FGL Value, one or more object C-MAC are mapped to an egress Nickname, wherein the mapping table between client's frame VID and FGL Value obtains by manual configuration, mapping table between object C-MAC and egress Nickname both can be learnt to obtain by data surface, also can notice acquisition by chain of command.Than learning by data surface, the advantage of noticing by chain of command is before transmitting actual data traffic, just mapping table have been built, and lacks with client's frame object C-MAC mapping table entry of avoiding receiving due to fringe node the consequence to all egress multicasts causing.In order to notice the mapping table between object C-MAC and egress Nickname by chain of command, RFC6165 has defined one and has been called the new IS-IS TLV(Type/Length/Value of " MAC Address accessibility TLV ", type/length/assignment), concrete encapsulation format as shown in Figure 4, this TLV is by IS-IS Link State Protocol Data Unit (Link State PDU, referred to as LSP) message carries, and can in same LSP message, occur repeatedly.The draft draft-ietf-trill-esadi-01 of Trill working group of IETF has specified point of termination station address distribution information (the End Station Address Distribution Information using in Trill stacking network, referred to as ESADI) agreement, although ESADI agreement has utilized " the MAC Address accessibility TLV " of RFC6165 definition to notice the mapping table between object C-MAC and egress Nickname, but because the variation of considering this mapping table in stacking network may be very frequent, if directly carry this TLV in the ISIS-Trill protocol massages that does not rely on the encapsulation of Trill data surface, can cause the frequently heavily convergence of Trill stacking network, bring the unstable of network, so just specify that this TLV does not directly carry in ISIS-Trill protocol massages, but carry in the ESADI protocol massages encapsulating at the employing Trill data surface of new definition.In addition, mapping table between object C-MAC and egress Nickname is separate based on each FGL Value, that is to say, on the fringe node of Trill stacking network, have the mapping table between different object C-MAC and egress Nickname for different FGL Value.Both be different from the PBB datum plane encapsulation of the SPBM stacking network employing of IEEE proposition, also be different from the Trill datum plane encapsulation of the Trill stacking network employing of IETF proposition, what VXLAN stacking network adopted is the VXLAN datum plane encapsulation of ietf draft draft-mahalingam-dutt-dcops-vxlan-02 definition, concrete encapsulation format as shown in Figure 5, wherein be packaged with the original Ether frame (being client's frame) that main frame sends, client's frame is in entering this stacking network, network edge node can be in the new forwarding mark of client's frame outside encapsulation one deck, the i.e. outer object IP address of the outer source IP address of 4 bytes and 4 bytes, VXLAN head (header) can encapsulated in addition between outer UDP head and C-MAC, VXLAN network identity (the VXLAN Network Identifier that VXLAN head comprises 24 bits, referred to as VNI).The fringe node that VXLAN is encapsulated in VXLAN stacking network completes, after message has encapsulated, all nodes in stacking network including fringe node carry out message repeating according to outer object IP, and the only isolation as different VXLAN virtual networks at fringe node of VNI does not affect the forwarding of message.For the fringe node of VXLAN stacking network, one or more client's frame VID on an inbound port are mapped to a VNI, one or more object C-MAC are mapped to an outer object IP, wherein the mapping table between client's frame VID and VNI obtains by manual configuration, and the mapping table between object C-MAC and outer object IP is learnt to obtain by data surface.In addition, the mapping table between object C-MAC and outer object IP is separate based on each VNI, that is to say, on the fringe node of VXLAN stacking network, has the mapping table between different object C-MAC and outer object IP for different VNI.
The RFC6822 that the IS-IS working group of IETF issued in December, 2012 has specified that one is called the technology of the many examples of IS-IS (IS-IS Multiple Instances), this technology allows to enable multiple IS-IS examples in the network internal of an operation IS-IS control plane agreement simultaneously, each IS-IS example is separate, do not interfere with each other, complete respectively the information announcement task in this example, and build the independent LSD that belongs to this example (Link StateDatabase, referred to as LSDB) according to this example advertised information of receiving on network node.In RFC6822, mention, why formulate the many case technologies of IS-IS, exactly in order to allow IS-IS control plane agreement in transmitting routing iinformation, also can transmit some non-routing iinformations (such as some apply relevant information), and wish that the transmission of these non-routing iinformations can not exert an influence for the routing convergence of network.In order to distinguish different IS-IS examples in the time applying many case technologies of IS-IS, RFC6822 has defined instance identification (Instance Identifier, referred to as IID) TLV, concrete encapsulation format as shown in Figure 6, this TLV comprises the IID(span 0 ~ 65535 that a length is 2 bytes), IID#0 does not support as compatibility the reservation instance identification that the old network equipment standard instance of the many examples of IS-IS is used, in the time that IID is non-zero value, if the IS-IS example of this IID representative is supported the many topologies of the defined IS-IS of RFC5120 (IS-IS Multiple Topology), this TLV also can comprise the one or more topological ID that this example is supported.
By finding out the explanation of above-mentioned three kinds of existing stacking network technology SPBM, Trill and VXLAN, it is the virtual network mark (the FGL Value in I-SID, Trill technology in SPBM technology and the VNI in VXLAN technology) of 24 bits that these three kinds of technology have all encapsulated the identical length of functional mechanism at datum plane, has all adopted the IS-IS control plane agreement that functional mechanism is identical (ISIS-Trill in ISIS-SPB, Trill technology in SPBM technology and the ISIS-IP in VXLAN technology) at control plane.Wherein SPBM technology and VXLAN technology lack the method for noticing the mapping table (also can be described as and notice MAC Address accessibility) between object C-MAC and the outer forwarding mark of stacking network by control plane, although Trill technology has specified ESADI agreement, utilize " the MAC Address accessibility TLV " of RFC6165 definition to notice this mapping table, but still there are two defects, and the one, the information that this TLV carries is not enough to build the mapping table for different FGL Value and between separate object C-MAC and egress Nickname, the 2nd, ESADI agreement adopts Intermediate System to Intermediate System message to carry the frequent oscillation problem of network that " MAC Address accessibility TLV " may cause in order to evade, the ESADI protocol massages that has defined new employing Trill data surface encapsulation carries this TLV, but this makes again Trill network edge node will support Intermediate System to Intermediate System and ESADI agreement simultaneously, implement comparatively complicated, and the ESADI agreement that depends on the encapsulation of Trill data surface cannot directly apply in other stacking network technology (such as SPBM technology and VXLAN technology) of same employing IS-IS control plane agreement.
Summary of the invention
In order to solve above-described technological deficiency, the invention provides a kind of notice MAC Address accessibility in stacking network method, node device and sending method, the information that " the MAC Address accessibility TLV " of expansion existing standard carries, and on the basis without the new ESADI agreement of introducing, regulation is used for noticing the special IS-IS example of MAC Address accessibility and network node in the processing mode of receiving after the Intermediate System to Intermediate System message that belongs to this special IS-IS example, the method can be applied to the multiple stacking network technology of same employing IS-IS control plane agreement simultaneously.
For achieving the above object, the present invention takes following technical scheme:
The method of a kind of announcement media access control (MAC) address accessibility, is applicable to apply the stacking network of Intermediate System-to-Intermediate System (IS-IS) control plane agreement, and the method comprises:
The fringe node of stacking network is outwards noticed MAC Address accessibility type/length/assignment (TLV) by an IS-IS example, and TLV carries virtual network mark;
The intermediate node of stacking network is being received after MAC Address accessibility TLV, build the LSD (LSDB) of IS-IS example for noticing MAC Address accessibility TLV, then MAC Address accessibility TLV is passed to other fringe node of stacking network;
The fringe node of other of stacking network is being received after MAC Address accessibility TLV, build the LSDB of IS-IS example, and build for virtual network and identify separate object client's media access control address (C-MAC) and the outer mapping table forwarding between mark of stacking network according to LSDB.
Preferably, IS-IS example is to be different from an IS-IS example of IS-IS standard instance of noticing routing iinformation, and wherein instance identification (IID) value is non-zero, and all nodes in stacking network all adopt identical IID to identify IS-IS example.
Preferably, virtual network is designated key srvice instance mark (I-SID) and/or fine particle label value (FGL Value) and/or virtual local area network (LAN) (VXLAN) network identity (VNI) of expanding.
The sending method of a kind of media interviews controls (MAC) address accessibility type/length/assignment (TLV), be applicable to stacking network and MAC Address accessibility TLV and carried by Intermediate System-to-Intermediate System (IS-IS) Link State Protocol Data Unit (LSP) message, this sending method comprises:
The fringe node of stacking network is outwards noticed MAC Address accessibility TLV by an IS-IS example;
The intermediate node of stacking network receiving after MAC Address accessibility TLV, MAC Address accessibility TLV is sent to other fringe node of stacking network.
Preferably, MAC Address accessibility TLV comprises:
One or more sub-TLV(sub-TLV), sub-TLV comprises the MAC Address reachability information that is applied to a certain stacking network encapsulation technology;
Sub-TLV carries the virtual network mark of a certain stacking network corresponding with it.
Preferably, sub-TLV comprises the subtype (sub-Type) of the type of the mark stacking network corresponding with it.
Preferably, there is one or many in MAC Address accessibility TLV in same LSP message.
A kind of fringe node, is applicable to use the stacking network of Intermediate System-to-Intermediate System (IS-IS) control plane agreement,
Fringe node, for passing through the outside announcement media access control of IS-IS example (MAC) address accessibility type/length/assignment (TLV), TLV carries virtual network mark;
Or, for receiving after MAC Address accessibility TLV, build the LSD (LSDB) of IS-IS example, and build for virtual network and identify separate object client's media access control address (C-MAC) and the outer mapping table forwarding between mark of stacking network according to LSDB.
Preferably, IS-IS example is to be different from an IS-IS example of IS-IS standard instance of noticing routing iinformation, and wherein instance identification (IID) value is non-zero, and all nodes in stacking network all adopt identical IID to identify IS-IS example.
Preferably, virtual network is designated key srvice instance mark (I-SID) and/or fine particle label value (FGL Value) and/or virtual local area network (LAN) (VXLAN) network identity (VNI) of expanding.
A kind of intermediate node, is applicable to use the stacking network of Intermediate System-to-Intermediate System (IS-IS) control plane agreement,
Intermediate node, for receiving from the fringe node of stacking network media interviews control (MAC) address accessibility type/length/assignment (TLV), build the LSD (LSDB) of IS-IS example for noticing MAC Address accessibility TLV, then MAC Address accessibility TLV is passed to other fringe node of stacking network.
A kind of stacking network, comprises above-mentioned fringe node and intermediate node.
The present invention is owing to taking above-described technical scheme, and it comprises following advantage: be easy to realize and with existing industry standard compatibility.
Brief description of the drawings
Accompanying drawing described herein is used to provide a further understanding of the present invention, forms the application's a part, and exemplary embodiment of the present invention and explanation thereof are used for explaining the present invention, are not construed as limiting the invention; In the accompanying drawings:
Fig. 1 is the traditional ethernet data message encapsulation format figure of prior art;
Fig. 2 is the SPBM datum plane encapsulation format figure of prior art;
Fig. 3 is the Trill datum plane encapsulation format figure of prior art;
Fig. 4 is the MAC Address accessibility TLV encapsulation format figure of prior art;
Fig. 5 is the VXLAN datum plane encapsulation format figure of prior art;
Fig. 6 is the instance identification TLV encapsulation format figure of prior art;
Fig. 7 is the flow chart of noticing the method for MAC Address accessibility in the stacking network of one embodiment of the present of invention;
Fig. 8 is according to MAC Address accessibility TLV encapsulation format figure of the present invention;
Fig. 9 is the stacking network schematic diagram of only supporting SPBM in application example one of the present invention;
Figure 10 is the MAC Address accessibility TLV encapsulation format figure using in application example one of the present invention;
Figure 11 is the stacking network schematic diagram of simultaneously supporting SPBM, Trill and VXLAN in application example two of the present invention; And
Figure 12 is the MAC Address accessibility TLV encapsulation format figure using in application example two of the present invention.
Embodiment
In order to make technical scheme of the present invention clearer, below in conjunction with the drawings and specific embodiments, the present invention is elaborated further.It should be noted that, in the situation that not conflicting, the variety of way in embodiment and embodiment in the application can combine mutually.
Having applied in the stacking network of IS-IS control plane agreement, the information of carrying by " the MAC Address accessibility TLV " of expansion ietf standard RFC6165 definition, and regulation is used for noticing the special IS-IS example of MAC Address accessibility and network node in the processing mode of receiving after the Intermediate System to Intermediate System message that belongs to this special IS-IS example, a kind of protocol type that does not increase the required support of network is provided, can be applicable to support the network of multiple stacking network technology simultaneously, be easy to realize and with the stacking network of existing industry standard compatibility in notice the method for MAC Address accessibility.
Fig. 7 is the flow chart of noticing the method for MAC Address accessibility in the stacking network of one embodiment of the present of invention, and as shown in Figure 7, the method can comprise the following steps:
Step 702, the fringe node of stacking network is outwards noticed " MAC Address accessibility TLV " by an IS-IS example, and this TLV carries virtual network mark.
The present invention has specified new " the MAC Address accessibility TLV " that a kind of IS-IS LSP message carries, concrete encapsulation format as shown in Figure 8, in this TLV, comprise one or more sub-TLV(sub-TLV), the corresponding a kind of stacking network technology that uses subtype (sub-Type) to identify of each sub-TLV, and forward mark (such as the object B-MAC in SPBM technology because object C-MAC and stacking network are outer, outer object IP in egress Nickname and VXLAN technology in Trill technology) between mapping table be to identify (such as the I-SID in SPBM technology for different virtual networks, VNI in FGL Value and VXLAN technology in Trill technology) separate, be the virtual network mark of 24 bits so carry in each sub-TLV length that should stacking network technology.Can in same LSP message, there is one or many in new " the MAC Address accessibility TLV " of the present invention's regulation.
Adopt Intermediate System to Intermediate System message to carry the frequent oscillation problem of network that " MAC Address accessibility TLV " may cause in order to evade, and adopt the protocol complexity that the ESADI agreement defining in Trill stacking network brings and cannot be applied to the problem in other stacking network (such as SPBM network and VXLAN network), the many case technologies of IS-IS that the present invention utilizes ietf standard RFC6822 to propose, outwards notice " MAC Address accessibility TLV " by special IS-IS example, here the special IS-IS example of indication is one and is different from and notices another IS-IS example of IS-IS standard instance (IID#0) of routing iinformation (IID value is non-zero, such as value 65535), and all nodes in stacking network all adopt identical IID to identify this special IS-IS example.Regulation according to RFC6822 to the many case technologies of IS-IS, always the instance identification TLV of the IID of special IS-IS example is present in same LSP message " the MAC Address accessibility TLV " that stacking network fringe node is outwards noticed simultaneously with carrying this.
Step 704, the intermediate node of stacking network is being received after " the MAC Address accessibility TLV " that fringe node is outwards noticed by special IS-IS example, structure belongs to the LSDB of this special IS-IS example, then " MAC Address accessibility TLV " is passed to other fringe node of stacking network.
Because the intermediate node of stacking network does not need to build object C-MAC and the outer mapping table forwarding between mark of stacking network, so they have just played the effect that information is transmitted in the IS-IS example that is specifically designed to notice " MAC Address accessibility TLV ", the mechanism of the transmission of information that they adopt is exactly standardized IS-IS inundation (Flooding) mechanism, and belong to the LSDB of this special IS-IS example by structure, and standardized IS-IS LSDB is synchronous and update mechanism is carried out the reliability that guarantee information is transmitted.
Step 706, the fringe node of other of stacking network is being received after " the MAC Address accessibility TLV " that carry virtual network mark that fringe node is outwards noticed by special IS-IS example, structure belongs to the LSDB of this special IS-IS example, and builds for different virtual networks and identify separate object C-MAC and the outer mapping table forwarding between mark of stacking network according to this LSDB.
Can build except the same with the intermediate node of stacking network the LSDB that belongs to the IS-IS example that is specifically designed to notice " MAC Address accessibility TLV ", the fringe node of stacking network also needs to build object C-MAC and the outer mapping table forwarding between mark of stacking network according to this LSDB, and can build separate mapping table according to the different virtual network mark of extracting and being kept at from " MAC Address accessibility TLV " in LSDB.
Further describe the present invention by two application examples below.
Application example one
In this application example, stacking network is a stacking network of only supporting SPBM.
Fig. 9 is the stacking network schematic diagram of only supporting SPBM in application example one of the present invention, and shown in Fig. 7 and Fig. 9, each network node of this application example notices and processing procedure mainly comprises the steps:
Step 902, only supports the fringe node of the stacking network of SPBM outwards to notice " MAC Address accessibility TLV " by special IS-IS example (IID value 65535), and this TLV carries the I-SID that length is 24 bits.
In the IS-IS LSP message of fringe node 1,2,3 and 4 outside inundations, carry " MAC Address accessibility TLV " and " instance identification TLV " simultaneously.The concrete encapsulation format of " MAC Address accessibility TLV " as shown in figure 10, because this stacking network is a stacking network of only supporting SPBM, so " MAC Address accessibility TLV " only comprises the sub-TLV that a subtype is SPBM, this sub-TLV comprises the virtual network mark I-SID in the SPBM stacking network that length is 24 bits.As shown in Figure 6, the IID value in this TLV is fixed as 65535 to the concrete encapsulation format of " instance identification TLV ", is used for identifying the IS-IS example that is specifically applied to notice MAC Address reachability information.
Step 904, the intermediate node of stacking network is being received after " the MAC Address accessibility TLV " that fringe node is outwards noticed by special IS-IS example, structure belongs to the LSDB of this special IS-IS example, then " MAC Address accessibility TLV " is passed to other fringe node of stacking network.
Intermediate node 5,6 and 7 is received after fringe node 1,2,3 and 4 inundations " MAC Address accessibility TLV " and " instance identification TLV ", structure belongs to the LSDB of IS-IS example 65535, the effect of this LSDB is not in order to generate routing table as belonging to the LSDB of IS-IS example 0, but for MAC Address reachability information is flooded to fringe node.
Step 906, the fringe node of other of stacking network is being received after " the MAC Address accessibility TLV " that carry I-SID that other fringe node is outwards noticed by special IS-IS example, structure belongs to the LSDB of this special IS-IS example, and builds for the mapping table between the separate object C-MAC of different I-SID and object B-MAC according to this LSDB.
Fringe node 1,2,3 and 4 is received after the IS-IS LSP message of other fringe node inundation, can build except the same with intermediate node the LSDB that belongs to IS-IS example 65535, also need to build the mapping table between object C-MAC and object B-MAC according to this LSDB, and for extract and be kept at the different I-SID in LSDB from " MAC Address accessibility TLV ", fringe node can build separate mapping table.
Application example two
In this application example, stacking network is a stacking network of simultaneously supporting SPBM, Trill and VXLAN.
Figure 11 is the stacking network schematic diagram that application example two of the present invention is supported SPBM, Trill and VXLAN simultaneously, and shown in Fig. 7 and Figure 11, each network node of this application example notices and processing procedure mainly comprises the steps:
Step 1102, support the fringe node of the stacking network of SPBM, Trill and VXLAN outwards to notice " MAC Address accessibility TLV " by special IS-IS example (IID value 65535), this TLV carries the I-SID that length is 24 bits simultaneously, FGL Value and the length that length is 24 bits is the VNI of 24 bits simultaneously.
In the IS-IS LSP message of fringe node 1,2,3 and 4 outside inundations, carry " MAC Address accessibility TLV " and " instance identification TLV " simultaneously.The concrete encapsulation format of " MAC Address accessibility TLV " as shown in figure 12, because being one, this stacking network supports SPBM simultaneously, the stacking network of Trill and VXLAN, so comprising three subtypes, " MAC Address accessibility TLV " be respectively SPBM, the sub-TLV of Trill and VXLAN, the sub-TLV that wherein subtype is SPBM comprises the virtual network mark I-SID in the SPBM stacking network that length is 24 bits, subtype is that the sub-TLV of Trill comprises the virtual network mark FGL Value in the Trill stacking network that length is 24 bits, subtype is that the sub-TLV of VXLAN comprises the virtual network mark VNI in the VXLAN stacking network that length is 24 bits.As shown in Figure 6, the IID value in this TLV is fixed as 65535 to the concrete encapsulation format of " instance identification TLV ", is used for identifying the IS-IS example that is specifically applied to notice MAC Address reachability information.
Step 1104, after the intermediate node of stacking network receives that fringe node is by outside " the MAC Address accessibility TLV " noticing of special IS-IS example, structure belongs to the LSDB of this special IS-IS example, then " MAC Address accessibility TLV " is passed to other fringe node of stacking network.
Intermediate node 5,6 and 7 is received after fringe node 1,2,3 and 4 inundations " MAC Address accessibility TLV " and " instance identification TLV ", structure belongs to the LSDB of IS-IS example 65535, the effect of this LSDB is not in order to generate routing table as belonging to the LSDB of IS-IS example 0, but for MAC Address reachability information is flooded to fringe node.
Step 1106, the fringe node of other of stacking network is being received after " the MAC Address accessibility TLV " that carry virtual network mark that fringe node is outwards noticed by special IS-IS example, structure belongs to the LSDB of this special IS-IS example, and builds for different virtual networks and identify separate object C-MAC and the outer mapping table forwarding between mark of stacking network according to this LSDB.
Fringe node 1, 2, 3 and 4 receive after the IS-IS LSP message of other fringe node inundation, can build except the same with intermediate node the LSDB that belongs to IS-IS example 65535, also need to build the mapping table between object C-MAC and object B-MAC according to this LSDB, mapping table between object C-MAC and egress Nickname, and mapping table between object C-MAC and outer object IP, and for extract and be kept at the different I-SID in LSDB from " MAC Address accessibility TLV ", different FGL Value and different VNI, fringe node can build separate mapping table.
The above embodiment is only preferred embodiment of the present invention, is not intended to limit protection scope of the present invention, and those skilled in the art can deliberately carry out various modifications and variations to the present invention and without departing from the spirit and scope of the present invention.Like this, if these amendments of the present invention and within modification belongs to the scope of the claims in the present invention and equivalent technologies thereof, the present invention be also intended to comprise these revise and modification interior.

Claims (12)

1. a method for announcement media access control (MAC) address accessibility, is applicable to apply the stacking network of Intermediate System-to-Intermediate System (IS-IS) control plane agreement, and described method comprises:
The fringe node of described stacking network is outwards noticed MAC Address accessibility type/length/assignment (TLV) by an IS-IS example, and described TLV carries virtual network mark;
The intermediate node of described stacking network is being received after described MAC Address accessibility TLV, build the LSD (LSDB) of IS-IS example for noticing described MAC Address accessibility TLV, then described MAC Address accessibility TLV is passed to other fringe node of described stacking network;
The fringe node of other of described stacking network is being received after described MAC Address accessibility TLV, build the LSDB of described IS-IS example, and build for described virtual network and identify separate object client's media access control address (C-MAC) and the outer mapping table forwarding between mark of stacking network according to described LSDB.
2. method according to claim 1, is characterized in that,
Described IS-IS example is an IS-IS example that is different from the IS-IS standard instance of noticing routing iinformation, wherein instance identification (IID) value is non-zero, and all nodes in described stacking network all adopt identical IID to identify described IS-IS example.
3. method according to claim 1, is characterized in that,
Described virtual network is designated key srvice instance mark (I-SID) and/or fine particle label value (FGL Value) and/or virtual local area network (LAN) (VXLAN) network identity (VNI) of expanding.
4. the sending method of a media interviews control (MAC) address accessibility type/length/assignment (TLV), be applicable to stacking network and described MAC Address accessibility TLV is carried by Intermediate System-to-Intermediate System (IS-IS) Link State Protocol Data Unit (LSP) message, described sending method comprises:
The fringe node of stacking network is outwards noticed MAC Address accessibility TLV by an IS-IS example;
The intermediate node of described stacking network receiving after described MAC Address accessibility TLV, described MAC Address accessibility TLV is sent to other fringe node of described stacking network.
5. method according to claim 4, is characterized in that, described MAC Address accessibility TLV comprises:
One or more sub-TLV (sub-TLV), described sub-TLV comprises the MAC Address reachability information that is applied to a certain stacking network encapsulation technology;
Described sub-TLV carries the virtual network mark of a certain stacking network corresponding with it.
6. method according to claim 5, is characterized in that,
Described sub-TLV comprises the subtype (sub-Type) of the type of the mark stacking network corresponding with it.
7. method according to claim 4, is characterized in that,
In same LSP message, there is one or many in described MAC Address accessibility TLV.
8. a fringe node, is applicable to use the stacking network of Intermediate System-to-Intermediate System (IS-IS) control plane agreement, it is characterized in that,
Described fringe node, for passing through the outside announcement media access control of IS-IS example (MAC) address accessibility type/length/assignment (TLV), described TLV carries virtual network mark;
Or, for receiving after described MAC Address accessibility TLV, build the LSD (LSDB) of described IS-IS example, and build for described virtual network and identify separate object client's media access control address (C-MAC) and the outer mapping table forwarding between mark of stacking network according to described LSDB.
9. fringe node according to claim 8, is characterized in that,
Described IS-IS example is an IS-IS example that is different from the IS-IS standard instance of noticing routing iinformation, wherein instance identification (IID) value is non-zero, and all nodes in described stacking network all adopt identical IID to identify described IS-IS example.
10. fringe node according to claim 8, is characterized in that,
Described virtual network is designated key srvice instance mark (I-SID) and/or fine particle label value (FGL Value) and/or virtual local area network (LAN) (VXLAN) network identity (VNI) of expanding.
11. 1 kinds of intermediate nodes, are applicable to use the stacking network of Intermediate System-to-Intermediate System (IS-IS) control plane agreement, it is characterized in that,
Described intermediate node, for receiving from the fringe node of stacking network media interviews control (MAC) address accessibility type/length/assignment (TLV), build the LSD (LSDB) of IS-IS example for noticing described MAC Address accessibility TLV, then described MAC Address accessibility TLV is passed to other fringe node of described stacking network.
12. 1 kinds of stacking networks, is characterized in that, comprise fringe node and intermediate node as claimed in claim 11 as described in claim 8 to 10.
CN201310041145.1A 2013-02-01 2013-02-01 Method, node device and the sending method of MAC Address accessibility are noticed in stacking network Active CN103973825B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310041145.1A CN103973825B (en) 2013-02-01 2013-02-01 Method, node device and the sending method of MAC Address accessibility are noticed in stacking network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310041145.1A CN103973825B (en) 2013-02-01 2013-02-01 Method, node device and the sending method of MAC Address accessibility are noticed in stacking network

Publications (2)

Publication Number Publication Date
CN103973825A true CN103973825A (en) 2014-08-06
CN103973825B CN103973825B (en) 2017-12-22

Family

ID=51242857

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310041145.1A Active CN103973825B (en) 2013-02-01 2013-02-01 Method, node device and the sending method of MAC Address accessibility are noticed in stacking network

Country Status (1)

Country Link
CN (1) CN103973825B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105337868A (en) * 2015-12-09 2016-02-17 上海斐讯数据通信技术有限公司 Method for learning transparent interconnection of lots of links (RTILL) network media access control (MAC) address and device
WO2016026406A1 (en) * 2014-08-18 2016-02-25 华为技术有限公司 Packet sending method and network node
WO2016116939A1 (en) * 2015-01-19 2016-07-28 Hewlett-Packard Development Company, L.P. Engines to prune overlay network traffic
WO2017117956A1 (en) * 2016-01-04 2017-07-13 中兴通讯股份有限公司 Information transmission method and device
WO2018040941A1 (en) * 2016-08-30 2018-03-08 中兴通讯股份有限公司 Metadata transmission method and device
CN108683580A (en) * 2018-05-24 2018-10-19 西安电子科技大学 The virtual LAN data processing method divided based on the addresses Mac
CN112543136A (en) * 2019-09-23 2021-03-23 上海诺基亚贝尔股份有限公司 Method and device for restraining flooding flow in PBB-EVPN core network
CN113037631A (en) * 2016-10-14 2021-06-25 华为技术有限公司 Address transmission method and network equipment
CN115277309A (en) * 2022-07-26 2022-11-01 中国电信股份有限公司 Message forwarding method and device, storage medium and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100226376A1 (en) * 2005-11-02 2010-09-09 Dinesh Mohan Method and Apparatus for Transporting Ethernet Services
CN102404181A (en) * 2010-09-08 2012-04-04 华为技术有限公司 Address corresponding relationship sending method of layer 2 protocol utilizing link state routing
CN102577331A (en) * 2010-05-28 2012-07-11 华为技术有限公司 Virtual layer 2 and mechanism to make it scalable
CN102740329A (en) * 2011-04-15 2012-10-17 中兴通讯股份有限公司 Method and apparatus of parameter distribution, and method and apparatus of parameter configuration

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100226376A1 (en) * 2005-11-02 2010-09-09 Dinesh Mohan Method and Apparatus for Transporting Ethernet Services
CN102577331A (en) * 2010-05-28 2012-07-11 华为技术有限公司 Virtual layer 2 and mechanism to make it scalable
CN102404181A (en) * 2010-09-08 2012-04-04 华为技术有限公司 Address corresponding relationship sending method of layer 2 protocol utilizing link state routing
CN102740329A (en) * 2011-04-15 2012-10-17 中兴通讯股份有限公司 Method and apparatus of parameter distribution, and method and apparatus of parameter configuration

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
A. BANERJEE,D. WARD: "Extensions to IS-IS for Layer-2 Systems", 《INTERNET ENGINEERING TASK FORCE》 *
S. PREVIDI, ED.,L. GINSBERG,A. ROY,D. WARD: "IS-IS Multi-Instance", 《INTERNET ENGINEERING TASK FORCE》 *

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105471693B (en) * 2014-08-18 2019-02-05 华为技术有限公司 A kind of file transmitting method and network node
WO2016026406A1 (en) * 2014-08-18 2016-02-25 华为技术有限公司 Packet sending method and network node
CN105471693A (en) * 2014-08-18 2016-04-06 华为技术有限公司 Packet sending method and network node
WO2016116939A1 (en) * 2015-01-19 2016-07-28 Hewlett-Packard Development Company, L.P. Engines to prune overlay network traffic
US10693766B2 (en) 2015-01-19 2020-06-23 Hewlett Packard Enterprise Development Lp Engines to prune overlay network traffic
US10218604B2 (en) 2015-01-19 2019-02-26 Hewlett Packard Enterprise Development Lp Engines to prune overlay network traffic
CN105337868A (en) * 2015-12-09 2016-02-17 上海斐讯数据通信技术有限公司 Method for learning transparent interconnection of lots of links (RTILL) network media access control (MAC) address and device
CN105337868B (en) * 2015-12-09 2018-03-30 上海斐讯数据通信技术有限公司 A kind of method and device of TRILL network MAC address learning
WO2017117956A1 (en) * 2016-01-04 2017-07-13 中兴通讯股份有限公司 Information transmission method and device
US10855576B2 (en) 2016-01-04 2020-12-01 Zte Corporation Information transmission method and device
WO2018040941A1 (en) * 2016-08-30 2018-03-08 中兴通讯股份有限公司 Metadata transmission method and device
CN113037631A (en) * 2016-10-14 2021-06-25 华为技术有限公司 Address transmission method and network equipment
CN113037631B (en) * 2016-10-14 2022-07-22 华为技术有限公司 Address transmission method and network equipment
CN108683580A (en) * 2018-05-24 2018-10-19 西安电子科技大学 The virtual LAN data processing method divided based on the addresses Mac
CN108683580B (en) * 2018-05-24 2020-11-03 西安电子科技大学 Virtual local area network data processing method based on Mac address division
CN112543136A (en) * 2019-09-23 2021-03-23 上海诺基亚贝尔股份有限公司 Method and device for restraining flooding flow in PBB-EVPN core network
CN115277309A (en) * 2022-07-26 2022-11-01 中国电信股份有限公司 Message forwarding method and device, storage medium and electronic equipment

Also Published As

Publication number Publication date
CN103973825B (en) 2017-12-22

Similar Documents

Publication Publication Date Title
CN103973825A (en) Method, node equipment and transmitting method for notifying of MAC (media access control) address accessibility in overlay network
CN103269299B (en) Message forwarding method in SPBM network and device
US8509248B2 (en) Routing frames in a computer network using bridge identifiers
US7787480B1 (en) Routing frames in a trill network using service VLAN identifiers
EP2541841B1 (en) Method for sending ethernet frames in ethernet tree service and provider edge device
US8144715B2 (en) Method and apparatus for interworking VPLS and ethernet networks
EP2690820B1 (en) Method, apparatus and system for mapping service instance
CN101160850B (en) Method and device for forwarding packet
US8861547B2 (en) Method, apparatus, and system for packet transmission
US7693164B1 (en) Configuring a packet tunnel network
US20170201389A1 (en) System for avoiding traffic flooding due to asymmetric mac learning and achieving predictable convergence for pbb-evpn active-active redundancy
US20080080535A1 (en) Method and system for transmitting packet
US8416789B1 (en) Multipoint packet forwarding using packet tunnels
JPWO2009051179A1 (en) Carrier network connection device and carrier network
EP2135393B1 (en) Ethernet spanning tree provision
US9019973B1 (en) Static MAC address propagation in multipoint network services
CA2674109A1 (en) Border gateway protocol procedures for mpls and layer-2 vpn using ethernet-based tunnels
US8416790B1 (en) Processing Ethernet packets associated with packet tunnels
EP2928133B1 (en) Method and apparatus for accessing shortest-route bridge network in multi-homed manner
CN102882784A (en) LSP (Layered Service Provider) information flooding method and equipment in SPBM (Shortest Path Bridging MAC)
CN102055647A (en) Three-layer virtual private network (VPN) access method and system
WO2022166773A1 (en) Multicast packet transmission method, bit forwarding router, and storage medium
CN103067278B (en) A kind of method for transmission processing of Frame, equipment and system
US10033636B1 (en) Ethernet segment aware MAC address learning
US10158567B1 (en) PBB-EVPN customer MAC synchronization among all-active multi-homing PEs

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant