CN100343827C - Service medium access control address convergence method for special virtual network based on secondary layer - Google Patents

Service medium access control address convergence method for special virtual network based on secondary layer Download PDF

Info

Publication number
CN100343827C
CN100343827C CNB031439055A CN03143905A CN100343827C CN 100343827 C CN100343827 C CN 100343827C CN B031439055 A CNB031439055 A CN B031439055A CN 03143905 A CN03143905 A CN 03143905A CN 100343827 C CN100343827 C CN 100343827C
Authority
CN
China
Prior art keywords
tunnel
virtual circuit
interface
determining step
access control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB031439055A
Other languages
Chinese (zh)
Other versions
CN1577293A (en
Inventor
孙辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB031439055A priority Critical patent/CN100343827C/en
Publication of CN1577293A publication Critical patent/CN1577293A/en
Application granted granted Critical
Publication of CN100343827C publication Critical patent/CN100343827C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Small-Scale Networks (AREA)

Abstract

The present invention discloses a service medium access control address convergence method for a special virtual network based on a secondary layer, which comprises the following procedures: an index value of the output interface last time is added into a local collection chain table when an un-conveyable state of a tunnel is converted into a conveyable state (UP) and a tunnel output interface at this time, is inconsistent with a tunnel output interface last time; whether a corresponding tunnel output interface of a virtual circuit is consistent with the original tunnel output interface or not is judged when the un-conveyable state of the virtual circuit is converted into the conveyable state (UP) and the virtual circuit once varies between the un-conveyable state and the conveyable state (UP/DOWN), if false, then a 15 second timer is started; a message of a corresponding MAC address is issued and deleted by a secondary layer interface managing module according to a collected port information chain table to trigger the deletion of an MAC address after the 15 second timer is waited to exceed the time.

Description

Centrex service Media Access Control address convergence method based on two layers
Technical field
The present invention relates to the VPN (virtual private network) technology, particularly based on two layers centrex service Media Access Control address convergence method.
Background technology
There has been very long history in operator for the user provides private leased circuit service, and present technical conditions have realized striding bigger region, adopted more that the service of universal network provides means.Set up the demand of the virtual network between the multiple spot for the user, have based on virtual special local area network service (VPLS) between the multiple spot of multiprotocol label switching (mpls) network.
Two layers of particular virtual dedicated network (L2VPN) business that VPLS realizes in the time of tunnel side change, in order to guarantee professional fast quick-recovery, needs old two-layer retransmitting table item is deleted.In the draft standard of L2VPN, two layers of this problem of forwarding of upgrading have been discussed also.But the implementation of discussing in the draft will rely on Spanning-Tree Protocol to come transmitting medium access control (MAC) address unlearning message, and transmits one by one, and the more deep L2VPN that requires realizes isolated M AC address learning mechanism.
In the VPLS L2VPN based on tag distribution protocol (LDP) mode, datum plane at first utilizes purpose MAC to search clean culture MAC table after receiving the message of user side, and corresponding list item is found in expectation, indexes corresponding tunnel index from list item.Datum plane is learnt the user-dependent MAC address entries with L2VPN according to the message of transmitting, thereby does not just need to walk the broadcasting flow process in the process of forwarding next time, and directly searches clean culture MAC table index to the tunnel, thereby realizes correct, effectively forwarding.If find not find the MAC unicast table of target MAC (Media Access Control) address correspondence, just at first with the source mac learning, walk to broadcast flow process then, this message is broadcast in the whole VPLS territory.
But after the outgoing interface of tunnel side or tunnel itself enabled or go to enable, original MAC address entries just can not use probably, and the method that just needs is well deleted.Also transmit else if, just probably cause professional obstructed or index wrong tunnel according to original MAC address entries.Present MAC table has aging mechanism, does not have message to index it in a period of time, will be worn out after ageing timer is overtime.But the ageing timer of MAC table is all long generally speaking, and the specification of S8016 is default value 300 seconds, and other products might be longer.In the time of real on the net the application, the worst situation is that 300 seconds interior L2VPN business of digestion time are all obstructed.This is that user institute is intolerable.
In a word, there is following shortcoming in the convergence of the MAC of L2VPN table in the prior art:
(1) speed of convergence is slow
(2) need to rely on third party's agreement to realize
(3) processing power to equipment has than higher requirement, promptly needs to sense fast the variation of networking and transmits this message one by one.
Summary of the invention
The object of the present invention is to provide a kind of Media Access Control address method for rapidly converging, can simpler, directly realize the convergence of medium access control (MAC) address based on two-layer virtual private network.
Technical scheme of the present invention: a kind of Media Access Control address convergence method of the centrex service based on two layers, this method comprises:
First determining step, but when the tunnel when can not transmission state becoming transmission state, judge the current outgoing interface in tunnel and last time whether outgoing interface consistent by the centrex service module;
Collect step, in the judged result of first determining step when being inconsistent, add the index value of described last time outgoing interface to local the collection in the chained list;
When the judged result of first determining step is unanimity, carry out other normal process flow processs;
Second determining step, but when virtual circuit when can not transmission state becoming transmission state, judge whether the transmission state of this virtual circuit variation took place;
The 3rd determining step, in the judged result of second determining step when variation took place for, the current outgoing interface of further judging this virtual circuit correspondence tunnel was with last time whether outgoing interface consistent, in the judged result of second determining step when variation did not take place for, this virtual circuit application mark;
The deletion step, when being inconsistent, the information of being collected in the chained list according to this locality by correlation module issues the corresponding Media Access Control address message of deletion, triggers this Media Access Control address of deletion in the judged result of the 3rd determining step;
When being consistent, keep described Media Access Control address in the judged result of the 3rd determining step, his the normal process flow process of Xingqi of going forward side by side.
In second determining step, the centrex service module takies mark according to the tag changeable path in the sign tunnel in the local virtual circuit node structure, judges whether the transmission state of this virtual circuit variation took place.In collecting step, add the index value of outgoing interface last time to the local index value that whether has had described last time outgoing interface in this chained list of judging earlier when collecting chained list, if exist then no longer add operation, otherwise apply for a new node, described index value is added in the chained list.
The tag changeable path in described sign tunnel takies and is changed to invalid value when being marked at initialization.
When variation did not take place, the step of this virtual circuit application mark comprised in the judged result of second determining step:
This virtual circuit takies mark to the tag changeable path in a sign tunnel of label switched path proxy module application, and assignment is in the relevant variable of the structure node of this virtual circuit correspondence.
The deletion step comprises the steps:
Starting a timer begins regularly;
Behind the timer expiry, the local interface information chained list is sent to two layer interface administration modules;
Two layer interface administration modules take out and are issued to the microcode of interface with node in the chained list, by the microcode deletion medium access control address table of interface.
The present invention has following beneficial effect:
(1) realizes simply;
Only needing to increase in this machine key property relevant code can realize, irrelevant substantially with other characteristics.
(2) do not rely on other agreements to carry out the transmission of signaling;
The method does not need other auxiliary agreement to carry out the transmission of signaling, only requires that this machine oneself realization corresponding M AC address deletion gets final product, and does not need the cooperation of other equipment.
(3) speed of convergence is faster, and the business recovery time is very fast;
Traditional method needs signaling through repeatedly transmitting, and handles after arriving this machine again, so convergent rings, can not have influence on other professional forwarding performances.
Description of drawings
The synoptic diagram that Fig. 1 connects for service supplier boundary;
Fig. 2 is the structured flowchart based on two layers virtual special local area network module;
Fig. 3 collects process flow diagram for the tunnel port information;
Fig. 4 is virtual circuit deletion MAC address entries process flow diagram.
Embodiment
Consult shown in Figure 1ly, equipment PE (being service supplier boundary) connects by physical mediums such as optical fiber, and optical fiber etc. are the physical channel of equipment room, and virtual channel Tunnel constructs transmission channel by tag distribution protocol (LDP) in the physical channel.Based on two layers Virtual Private Networks ((Layer 2 VPN module, abbreviation L2VPN) virtual circuit of configuration (being called for short VC) just is included among the tunnel Tunnel, can regard the tunnel that a rule is tiny as equally, message transmits by the little tunnel of this rule.In fact transmit for the message of various device, simply, receive message from the A port exactly, it is analyzed, handles, forward by the B port then.In order to achieve this end, just need in some list item of this locality, search according to the internal information of message, this list item is exactly the information of message and the corresponding relation of interface.That is to say, receive after the message, need find it to be sent again from which port.
Come as can be seen, VC can realize that one of essential condition of transmitting is exactly that tunnel Tunnel is enabled, and promptly the tunnel is in the state that can carry out message transmissions.After but tunnel Tunnel enabled, VC also not necessarily can transmit data because this also the factor with other is relevant, such as the whether success or the like of Interface status, protocol negotiation.Therefore, if but VC (UP) by can not transmission state becoming transmission state, but tunnel Tunnel becomes transmission state (UP) so; Otherwise, but the tunnel is in transmission state, but VC not necessarily can be from becoming transmission state by transmission state.
Consult shown in Figure 2, Virtual Private Network module (L2VPN), two layer interface administration modules (Layer 2 interface manage module have been represented among the figure based on two layers, be called for short L2IF) and the relation of label switching tunnel proxy module (Label Switch Path Agent module, abbreviation lspagt).
Consult shown in Figure 2, Virtual Private Network module (L2VPN), two layer interface administration modules (Layer 2 interface manage module have been represented among the figure based on two layers, be called for short L2IF) and the relation of label switching tunnel proxy module (Label Switch Path Agent module, abbreviation lspagt).
Two layer interface administration modules are responsible for the management of interface, mainly comprise: the distribution of interface data structure maintenance, interface index, monitoring of Interface status or the like, notify other modules carry out MAC Address deletion also be its be responsible for function one of them.
The label switched path that label switching tunnel proxy module mainly is responsible for the sign tunnel takies the issuing of the management of (being called for short lsptoken) index and distribution, L2VPN list item (being issued to microcode) or the like.VC of every configuration connects, and just need apply for a lsptoken to it, and lsptoken is exactly for the VC Tunnel Identifier in the VC on upper strata sign and the microcode is associated, and is an important key word.So as long as this VC exists, it will take a lsptoken always, up to till with the VC deletion.
For the present invention, the quick convergence of the medium access control of L2VPN (MAC) address, be by sending the deletion message at certain particular port MAC Address to two layer interface administration modules, two layer interface administration modules adopt the interface to microcode to send deletion message and realize.L2VPN is responsible for being collected in relevant interface and the groove position information after the tunnel changes, and deposits in the chained list that this locality is specifically designed to this information of collection.The main relation of the present invention and two layer interface administration modules (L2IF) is exactly deletion and the related MAC Address of special interface, applies for exactly with the relation of lspagt module and discharges Lsptoken.
Main process of the present invention:
(1) the lsptoken mark with the sign tunnel in local virtual circuit (VC) node structure in the time of initialized is changed to invalid value, but the expression virtual circuit is not from being changed to transmission state by transmission state.
(2) but the tunnel become can not transmission state (DOWN) time by transmission state, local chained list is not upgraded operation, the interface index information that state variation promptly will not take place records in the chained list.Because it is a variety of that the reason of tunnel DOWN has, such as the user netting twine pull out, opposite equip. goes wrong, protocol interaction has problem or the like.
(3) but the tunnel when can not the biography state becoming transmission state (UP), whether tunnel outgoing interface and the tunnel outgoing interface of last time of judging this moment be consistent, if inconsistent, indicate that then variation has taken place interface, then the index value with the outgoing interface of last time adds local the collection in the chained list to.The index value of described interface is uniquely in the device interior processing procedure can identify one of information of interface.
(4) virtual circuit (VC) but when can not transmission state becoming transmission state (UP), judge whether the pairing lsptoken of this virtual circuit is invalid value; If not invalid value, but illustrate this virtual circuit once can not transmission state and transmission state (UP/DOWN) between changed, judge that further whether its corresponding tunnel outgoing interface is with original consistent; If inconsistent, then start 15 seconds timers, wait for behind 15 seconds timer expiries according to the port information chained list of collecting, issue the message of the corresponding MAC Address of deletion by two layer interface administration modules (also can be other modules), trigger the deletion MAC Address.
Consult shown in Figure 3, but when a certain tunnel when can not transmission state becoming transmission state, centrex service can judge whether outgoing interface last time in this tunnel information node is invalid value, if be invalid value, illustrate that so this tunnel is the UP first time, do not need to do the port collection work, so the normal treatment scheme of directly becoming a full member.If this tunnel before current UP UP was taking place once, its of outgoing interface invalid value certainly not then compares the current outgoing interface in this tunnel and the outgoing interface of last time last time more so, sees whether both are equal.If equate, then do not need the MAC Address deletion in the MAC table of its port correspondence; If unequal, whether outgoing interface last time of then at first judging the tunnel has added in the local chained list has been gone, if add then directly return.If in local chained list, do not find, then in this local chained list, add the outgoing interface index of the last time in this tunnel.So far, finished the interface collection work one time.When UP takes place in other tunnel, carry out such operation equally.
Consult shown in Figure 4ly, carry out the collection work of interface message in the time of tunnel UP, during virtual circuit UP, just carry out real MAC Address deletion action by the time.Each bar virtual circuit is all relevant with a certain tunnel, if during so a certain virtual circuit UP, judge at first whether its corresponding lsptoken is invalid value, if be invalid value, illustrated that so this virtual circuit (VC) is since configuration, never enabled, then to the lsptoken of lspagt module application that is responsible for the lsptoken distribution, and the lsptoken assignment that will apply for is in the structure node of this virtual circuit correspondence.If UP mistake once before this virtual circuit UP so just needs to judge whether identical with last time of its corresponding tunnel outgoing interface.If it is inequality, then start 15 seconds timers, behind 15 seconds timer expiries, the interface message chained list of collecting is sent to two layer interface administration modules (L2IF), by two layer interface administration modules will be one by one node take out, be issued to the deletion that microcode carries out the MAC table.

Claims (6)

1, a kind of Media Access Control address convergence method of the centrex service based on two layers is characterized in that comprising:
First determining step, but when the tunnel when can not transmission state becoming transmission state, judge the current outgoing interface in tunnel and last time whether outgoing interface consistent by the centrex service module;
Collect step, in the judged result of first determining step when being inconsistent, add the index value of described last time outgoing interface to local the collection in the chained list;
When the judged result of first determining step is unanimity, carry out other normal process flow processs;
Second determining step, but when virtual circuit when can not transmission state becoming transmission state, judge whether the transmission state of this virtual circuit variation took place;
The 3rd determining step, in the judged result of second determining step when variation took place for, the current outgoing interface of further judging this virtual circuit correspondence tunnel was with last time whether outgoing interface consistent, in the judged result of second determining step when variation did not take place for, this virtual circuit application mark;
The deletion step, when being inconsistent, the information of being collected in the chained list according to this locality by correlation module issues the corresponding Media Access Control address message of deletion, triggers this Media Access Control address of deletion in the judged result of the 3rd determining step;
When being consistent, keep described Media Access Control address in the judged result of the 3rd determining step, his the normal process flow process of Xingqi of going forward side by side.
2, the method for claim 1, it is characterized in that, in second determining step, the centrex service module takies mark according to the tag changeable path in the sign tunnel in the local virtual circuit node structure, judges whether the transmission state of this virtual circuit variation took place.
3, the method for claim 1, it is characterized in that, in collecting step, add the index value of outgoing interface last time to the local index value that whether has had described last time outgoing interface in this chained list of judging earlier when collecting chained list, if exist then no longer add operation, otherwise apply for a new node, described index value is added in the chained list.
4, method as claimed in claim 2 is characterized in that, the tag changeable path in described sign tunnel takies and is changed to invalid value when being marked at initialization.
5, method as claimed in claim 2 is characterized in that, when variation did not take place, the step of this virtual circuit application mark comprised in the judged result of second determining step:
This virtual circuit takies mark to the tag changeable path in a sign tunnel of label switched path proxy module application, and assignment to the structure node of this virtual circuit correspondence in the dependent variable.
As the arbitrary described method of claim 1 to 5, it is characterized in that 6, the deletion step comprises the steps:
Starting a timer begins regularly;
Behind the timer expiry, the local interface information chained list is sent to two layer interface administration modules;
Two layer interface administration modules take out and are issued to the microcode of interface with node in the chained list, by the microcode deletion medium access control address table of interface.
CNB031439055A 2003-07-28 2003-07-28 Service medium access control address convergence method for special virtual network based on secondary layer Expired - Fee Related CN100343827C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB031439055A CN100343827C (en) 2003-07-28 2003-07-28 Service medium access control address convergence method for special virtual network based on secondary layer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB031439055A CN100343827C (en) 2003-07-28 2003-07-28 Service medium access control address convergence method for special virtual network based on secondary layer

Publications (2)

Publication Number Publication Date
CN1577293A CN1577293A (en) 2005-02-09
CN100343827C true CN100343827C (en) 2007-10-17

Family

ID=34579532

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB031439055A Expired - Fee Related CN100343827C (en) 2003-07-28 2003-07-28 Service medium access control address convergence method for special virtual network based on secondary layer

Country Status (1)

Country Link
CN (1) CN100343827C (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7447167B2 (en) * 2005-03-28 2008-11-04 Cisco Technology, Inc. Method and apparatus for the creation and maintenance of a self-adjusting repository of service level diagnostics test points for network based VPNs
US7697556B2 (en) * 2006-10-26 2010-04-13 Telefonaktiebolaget L M Ericsson (Publ) MAC (media access control) tunneling and control and method
CN101572668B (en) * 2009-05-21 2012-10-10 中兴通讯股份有限公司 Method for deleting MAC addresses and device therefor
CN105162705B (en) * 2015-06-09 2018-09-21 华为技术有限公司 A kind of method, apparatus and system of notice UNI tunnel states
CN113890815A (en) * 2021-10-18 2022-01-04 中国电子科技集团公司第三十四研究所 Method and system for monitoring and alarming frequent UP/DOWN of network equipment port

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1184971A (en) * 1996-11-18 1998-06-17 日本电气株式会社 Virtual channel memory system
US6292839B1 (en) * 1998-12-09 2001-09-18 3Com Corporation Method and system for reflexive tunneling
CN1398090A (en) * 2001-07-18 2003-02-19 华为技术有限公司 Tunnel encapsulation method for wireless VPN

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1184971A (en) * 1996-11-18 1998-06-17 日本电气株式会社 Virtual channel memory system
US6292839B1 (en) * 1998-12-09 2001-09-18 3Com Corporation Method and system for reflexive tunneling
CN1398090A (en) * 2001-07-18 2003-02-19 华为技术有限公司 Tunnel encapsulation method for wireless VPN

Also Published As

Publication number Publication date
CN1577293A (en) 2005-02-09

Similar Documents

Publication Publication Date Title
US7400634B2 (en) MAC address learning apparatus
US9191315B1 (en) System and method for adapting a packet processing pipeline
CN1306752C (en) Using link state information to discover IP network topology
US9531566B2 (en) Control apparatus, a communication system, a communication method and a recording medium having recorded thereon a communication program including a control unit, a network configuration information management unit, and a path control unit
CN1507230A (en) Method of realizing special multiple-protocol label exchanging virtual network
WO2011030889A1 (en) Communication system, forwarding node, path management server, communication method, and program
CN101019380B (en) Systems and methods for accelerated learning in ring networks
WO2009033428A1 (en) Method, system and device for removing media access control address
WO2011150830A1 (en) Method and node for obtaining the content and content network
US7929545B2 (en) Optimized synchronization of MAC address tables in network interconnection apparatuses
CN1913523A (en) Method for implementing layer level virtual private exchange service
WO2010135957A1 (en) Virtual private network message forwarding method and routing label assignment and deletion method thereof
WO2009127128A1 (en) Method for avoiding downstream data flooding in ethernet passive optical network
WO2012090993A1 (en) Information system, control device, communication method and program
CN103581022B (en) MAC address finding and transmitting method and device
CN103220215B (en) The retransmission method of FCoE message and device in TRILL network
CN100343827C (en) Service medium access control address convergence method for special virtual network based on secondary layer
CN1691629A (en) Method for implementing layer-2 equipment interconnection in resilient packet ring (RPR) based network
CN1773949A (en) Switching in method for virtual special network and realizing apparatus
CN100496017C (en) Method for assuring two-layer Ethernet exchanger data safety in city area transmission equipment
WO2006034613A1 (en) A method for providing point-to-point service in resilient packet ring
CN112003685B (en) Flexible Ethernet message forwarding method and device
JP2003244185A (en) Vlan and vlan frame switching apparatus
CN1909448A (en) Method for realizing end to end encryption transmission in MPLS VPN network
CN101043433A (en) Method for aging MAC address learning list of bridge mode resilient packet ring

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20071017

Termination date: 20150728

EXPY Termination of patent right or utility model