CN100413280C - System and method for interconnecting heterogeneous layer 2 VPN applications - Google Patents

System and method for interconnecting heterogeneous layer 2 VPN applications Download PDF

Info

Publication number
CN100413280C
CN100413280C CNB2003801038237A CN200380103823A CN100413280C CN 100413280 C CN100413280 C CN 100413280C CN B2003801038237 A CNB2003801038237 A CN B2003801038237A CN 200380103823 A CN200380103823 A CN 200380103823A CN 100413280 C CN100413280 C CN 100413280C
Authority
CN
China
Prior art keywords
provider
transponder
identifier
virtual private
edge router
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2003801038237A
Other languages
Chinese (zh)
Other versions
CN1714544A (en
Inventor
罗巍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cisco Technology Inc
Original Assignee
Cisco Technology Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cisco Technology Inc filed Critical Cisco Technology Inc
Publication of CN1714544A publication Critical patent/CN1714544A/en
Application granted granted Critical
Publication of CN100413280C publication Critical patent/CN100413280C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Systems and methods for interconnecting heterogeneous layer 2 virtual private network applications. To facilitate such interconnections, a common addressing scheme for forwarders is provided. All current pseudowire signaling protocols can incorporate this addressing scheme, and therefore establish connectivity among forwarders of different applications. Auto-discovery of remote forwarders is also facilitated by use of a common address family identifier (and subsequent address family identifier) for BGP.

Description

Be used for the system and method that interconnecting heterogeneous layer 2 VPN is used
Statement of related applications
The present invention requires the U.S. Provisional Application No.60/428 that is entitled as " Method to InterconnectHeterogeneous Layer 2 VPN Application " of submission on November 21st, 2002,198 priority, this provisional application content is contained in this by reference and all, to be used for various purposes.
Technical field
The present invention relates to data network, more particularly, relate to Virtual Private Network.
Background technology
Virtual private network technology be via with other data, services (for example other Virtual Private Networks or public data services) services shared provider network, interconnecting belongs to a kind of commonly used of a node dedicated network network operator (for example enterprise), that disperse geographically and effective method.Enterprise can realize the connectedness of dedicated network, and needn't have and run its network infrastructure on a big geographic area.
A kind of network of particular type is layer 2 virtual private network (L2VPN).Layer 2 frame (for example ethernet frame, PPP frame etc.) transmits via the tunnel passes through service provider network.Service provider network for example can be to use the packet switching network of IP or MPLS or its combination, and described tunnel can be IP or MPLS tunnel.Layer 2 virtual private network can allow remote node to interconnect, seemingly they to be connected to shared physical medium the same, passed the service provider network cloud though their connection is actually.For example, private virtual lan is configurable on whole service provider network.
Consider the structure of layer 2 virtual private network.Layer 2 virtual private network comes the interconnects remote customer network via service provider network.Service provider network is a packet switching network.There is one or more providers edge router in one side of provider on the border between provider's network and customer network.There are one or more customer edge routers in client (customer) side on this border.
" attachment circuits " provides single two-way physics or the virtual link between merchant's edge router and the customer edge router.For example, attachment circuits can be RS-232 string line, the connection of point-to-point Ethernet, atm virtual circuit or the like.
" pseudo-circuit " is the emulation two-way circuit that passes provider's network.Pseudo-circuit can be implemented as a pair of VC LSP (virtual circuit label switched paths), on each direction of MPLS network one of them is arranged.A plurality of pseudo-circuits can be shared same tunnel LSP.
Available a kind of application of passing this network is via the simple interconnection of pseudo-circuit between attachment circuits.It is called as virtual private circuit service (VPWS) sometimes.The flow that attachment circuits from provider's edge router receives is forwarded to long-range provider edge router via pseudo-circuit.When long-range provider edge router received flow from pseudo-circuit, it selected correct reception attachment circuits based on the encapsulation demultiplexing identifier (for example MPLS label) of the flow that is assigned to this puppet circuit.
In the variant that above-mentioned VPWS realizes, a plurality of attachment circuits are accumulated so-called " coloured pond (colored pool) ".For example, coloured pond can comprise all attachment circuits between given provider's edge router and the given customer edge router.Belong to two any attachment circuits in two ponds by connection, pseudo-circuit can connect two coloured ponds on the long-range provider edge router.
Available Another Application is private virtual lan service (VPLS).In order to realize VPLS, provider's edge router of each participation all has been equipped with a virtual switch instance (VSI).VSI is as a kind of virtual lan switch between one or more attachment circuits and the one or more pseudo-circuit.When a frame arrived VSI via attachment circuits or pseudo-circuit, the layer 2 address of this frame was used to select an output attachment circuits or pseudo-circuit.Private virtual lan can be built as the grid of the pseudo-circuit between the VSI on provider's edge router of participation.
Usually, be used for realizing the single VSI of VPLS or be used for realizing that the coloured pond of VPWS or single attachment circuits can be called " forwarding instance " or " transponder ".At present, another and VPWS associated transponders can only be connected to, and another and VPLS associated transponders (VSI) can only be connected to VPLS associated transponders (VSI) with VPWS associated transponders (coloured pond or single attachment circuits).Hope for example provides connection between VPLS transponder and VPWS transponder between the second layer VPN of isomery uses.
Via pseudo-circuit is that connection between this different forwarding person is initiated signaling and had difficulties.For the interconnection between the forwarding person is initiated a kind of method of signaling people such as Martini, " Transport of Layer 2Frames Over MPLS ", IETF Internet Draft, be described in 2002 11 months, here by reference its full content is contained in this, to be used for various purposes.Use virtual circuit identifier to identify pseudo-circuit.When transponder wished to connect, they must be by pre-configured with identical virtual circuit identifier, thereby when initiating signaling for described connection, they can quote this identifier.The automatic discovery of remote forwarder can not be avoided the needs to the priori of virtual circuit identifier.And each remote forwarder is because the needs of system maintenance and must be moved to different providers edge router the time, remote forwarder and local transponder all must be reshuffled.
For the interconnection between the transponder is initiated the another kind of method of signaling people such as Rosen, " LDP-Based Signaling for L2VPNs ", IETF Internet Draft is described in 2002 9 months, here by reference its full content is contained in this, to be used for various purposes.Each transponder is assigned to one " attachment identifier ", and it is unique on specific provider edge router.The transponder that is combined as of the address of provider's edge router and attachment identifier provides GUID.But, signaling procedure does not use overall unique form of described identifier, which kind of supports use and be to use the various compositions of described GUID, the change of employed composition to depend on, and whether depend on connection for VPWS be between coloured pond.Therefore, be difficult to the transponder that interconnection is used corresponding to different layer 2 virtual private network, be used for the method that is independent of application unique appointment transponder, general because signaling mechanism lacks.Another obstacle of interconnection is that different VPN has used different multiprotocol bgp subsequent address family identifiers designated, makes the transponder that can not find dissimilar types automatically.
Need be used to interconnects belongs to the system and method for the transponder that the isomery layer 2 virtual private network uses.
Summary of the invention
Embodiments of the present invention provide and have been used for the system and method that interconnecting heterogeneous layer 2 virtual private network is used.Such interconnection for convenience provides the public address that is used for transponder scheme.The pseudo-line signalling agreement of current all can comprise this address scheme, thereby connects between the transponder of different application.By using the public address family identifier (and subsequent address family identifier) of BGP, also made things convenient for the automatic discovery of remote forwarder.
One aspect of the present invention provides a kind of method that is used for operating first provider's fringe node of Virtual Private Network.Described method comprises: provide the source transponder in described first provider's fringe node, wherein provide target forwarder at the second provider fringe node place of described Virtual Private Network, transmit a request to described second provider's fringe node from described first provider's fringe node, via pseudo-circuit described source transponder is connected to described target forwarder in order to request, and the identifier that in described request, comprises described target forwarder.Described identifier comprises following such part, and this part belongs to by the address space of sharing with a plurality of attachment circuits transponder that links to each other and the transponder that only links to each other with client node via an attachment circuits to client node.Described identifier is that the overall situation is unique in described Virtual Private Network.
By the remainder and the accompanying drawing of reference specification, can realize further understanding to characteristic of the present invention and advantage.
Description of drawings
Fig. 1 shows the network reference model of layer 2 virtual private network.
Fig. 2 shows the layer 2 virtual private network that uses virtual private circuit service (VPWS).
Fig. 3 shows the layer 2 virtual private network that uses private virtual lan service (VPLS).
Fig. 4 shows the layer 2 virtual private network of using VPWS and VPLS according to one embodiment of the present invention.
Fig. 5 shows the structure of the identifier of the transponder that moves according to one embodiment of the present invention on provider's edge router.
The flow chart of Fig. 6 shows the step of setting up pseudo-circuit between two provider's edge routers according to one embodiment of the present invention.
Fig. 7 shows the network equipment that is used to realize embodiments of the present invention.
Embodiment
Embodiments of the present invention can be applicable to layer 2 virtual private network.Layer 2 virtual private network transmits layer 2 frame in passing the tunnel of packet switching network.Background information about layer 2 virtual private network can find in above-mentioned and following document, by reference its full content is contained in this here, to be used for various purposes:
People such as Lau, " Layer Two Tunneling Protocol (Version 3) ", IETF InternetDraft, in January, 2003.(after this being called " people's such as Lau articles ")
Townsley, " Pseudowires and L2TPv3 ", IETF Internet Draft, in June, 2002.
People such as Townsley, " Layer Two Tunneling Protocol L2TP " IETF Requestfor Comments in August, 2661,1999.
Rosen, " LDP-based signaling for L2VPNs ", IETF Internet Draft, in September, 2002.
People such as Martini, " Transport of Layer 2 Frames Over MPLS ", IETF InternetDraft, in November, 2002.
Andersson " L2VPN Framwork ", IETF Internet Draft, in January, 2003.
Fig. 1 shows the layer 2 virtual private network reference model.Two provider's edge routers 102 and 104 interconnect by packet switching network.Provider's edge router 102 is connected to customer edge router 106 via attachment circuits.Provider's edge router 104 is connected to customer edge router 108 via another attachment circuits.Pseudo-circuit passes packet switching provider network, distributes between provider's edge router 102 and provider's edge router 104.
In simple interconnection was used, attachment circuits was directly bound to pseudo-circuit.This is to shine upon one to one.The 2nd layer connectivity is provided between customer edge router 106 and 108.
Fig. 2 shows the VPWS sight, wherein provides the interconnectivity that passes through packet switching network between the customer edge router 202 by provider's edge router 204.Each customer edge router 202 is connected to its local provider edge router 204 via attachment circuits.Each attachment circuits is tied to specific pseudo-circuit, and pseudo-circuit self is connected to long-range provider edge router.When receiving flow via attachment circuits at provider edge router place, flow is automatically forwarded to corresponding pseudo-circuit.Similarly, when receiving flow via pseudo-circuit, it is transferred to the attachment circuits of being bound automatically.
Also can accumulate a plurality of coloured ponds with organizing attachment circuits more.For example, single coloured pond can comprise all attachment circuits between given customer edge router and the given provider's edge router.What be connected to that in fact the pseudo-circuit of interconnection in coloured pond connect is any one that belongs in the attachment circuits in described coloured pond.
Fig. 3 shows simple VPLS sight.Set up private virtual lan with interconnection customer edge router 302.Each provider's edge router 304 all has been equipped with single VSI.Certainly in actual applications, provider's edge router can be equipped with a plurality of VSI.Each VSI has connected a plurality of attachment circuits and pseudo-circuit.VSI work is the virtual lan switch.VSI transmits them based on the 2nd layer identifier of frame.
In VPLS and VPWS sight, it is very easily that the element that pseudo-circuit is connected to is called " transponder ".In the VPLS sight, transponder is VSI.In VPWS, transponder is an attachment circuits, and it also may be coloured pond that attachment circuits belongs to.
Fig. 4 shows the isomery layer 2 virtual private network sight between the customer edge router 408 according to one embodiment of the present invention.In Fig. 4, provider's edge router 402 has VSI, so be its customer edge router realization VPLS application.By comparison, provider's edge router 404 and 406 provides one to one coupling between pseudo-circuit and attachment circuits, so provide VPWS for their customer edge router.
Embodiments of the present invention allow to set up Virtual Private Network shown in Figure 4, the transponder of wherein pseudo-interconnect dissimilar types.Will of course be appreciated that compare with attainable a lot of networks, the networking sight of Fig. 4 has greatly been simplified.For example, at single provider edge router place a lot of VSI and VPWS attachment circuits can be arranged, and two kinds of disparate applications can be present on the same provider edge router.General effect is to provide the layer 2 virtual private network of one group of isomery to use between one group of customer edge router 408.
In order to support to initiate the interconnection signaling, specified in given provider's unique forwarder identifier in edge router place to each transponder.Fig. 5 shows the structure of this forwarder identifier according to one embodiment of the present invention.This forwarder identifier is adjustable length value.
And each provider's edge router has a router id that is associated, and it is one 32 a value, and preferably is that the overall situation is unique in layer 2 virtual private network.If these 32 router ids are not that the overall situation is unique, then it can make up with 64 routers difference symbol, as " BGP/MPLS VPNs " people such as Rosen, IETF Request for Comments2547, as described in March, 1999, the content of the document all is contained in this by reference, to be used for various purposes.Public layer 2 virtual private network address is defined as the splicing of router id (or its overall unique expansion) and forwarder identifier.It is the overall unique address of sign transponder.
Before discussing to the pseudo-circuit initiation signaling between the disparate forwarders, we will introduce the automatic discovery of remote forwarder and the foundation of the control connection between provider's edge router.Public layer 2 virtual private network address party automatically find.For example, can use BGP to find remote forwarder automatically.For example can use people such as Bates, " Multiprotocol Extension for BGP-4 ", the technology that IETFRequest for Comments (RFC) uses in 2858,2002 years 6 months.The content of RFC 2858 is contained in this by reference and all, to be used for various purposes.The network layer getatability information (NLRI) of RFC 2858 is encoded as the one or more same tuple (tuple) of normal form [length, prefix]:
Length: one eight hyte shows the bit length of public layer 2 virtual private network address.
Prefix: the layer 2 virtual private network address of variable-length.
To all head-end types that in layer 2 virtual private network, uses, define public Address-Family Identifier symbol (AFI) and public subsequent address family identifier (SAFI).In this way, can use multiprotocol bgp to announce to know all types of transponders and their characteristic on the long-range provider edge nodes, for example next hop address, head-end type, or the like.
BGP is not the unique method that is used to find about the information of remote forwarder.Also can use based on the discovery mechanism of catalogue RADIUS for example.But the information of the relevant remote forwarder of manual configuration also.
Pseudo-circuit between provider's edge router is based upon in the tunnel.Individual tunnel between two provider's edge routers can transport a plurality of pseudo-circuits.And, between two provider's edge routers, will there be a control channel.This control channel is used to pseudo-circuit to initiate signaling.Embodiments of the present invention are operated in the environment of pseudo-line signalling agreement (for example layer 2 tunneling protocol or label distribution protocol).In people's such as Lau article, describe the pseudo-line signalling and the operation of control channel in the environment of layer 2 tunneling protocol in detail.People such as Andersson, " LDP Specification ", IETFRequest for Comments 3036, describe the pseudo-line signalling and the operation of control channel in the context of label distribution protocol in 1 month calendar year 2001 in detail, the content of described document is contained in this by reference, to be used for various purposes.
Be the general introduction of layer 2 virtual private network signaling procedure below.This process generally is applied to the connected situation of transponder of same type, and the connected situation of dissimilar transponders.For the various pseudo-line signalling scheme that is provided by for example layer 2 tunneling protocol, LDP etc., this process has generality.
Suppose that provider's edge router knows that its wishes at the local transponder with specified forwarder identifier and have between the remote forwarder on the long-range provider edge router of certain forwarder identifier to set up pseudo-circuit.Before setting up desirable pseudo-circuit, a pair of provider edge router exchange control connection message is to set up control connection.Each provider's edge router all can be announced the pseudo-circuit types that it is supported (for example Ethernet, ATM, frame relay, or the like) in the tabulation of pseudo-line capacity in these control connection message.Each provider's edge router can check all whether long-range provider edge router supports it to wish the type of the pseudo-circuit of foundation.
After setting up control connection, two provider's edge routers can transmit control message to the other side, to set up pseudo-circuit.Control messages comprises local and remote forwarder identifier, has specified two transponders of wishing interconnection.
After the local provider edge router received this control messages, it determined whether it has designated by the local transponder of the specified ID value of this remote forwarder identifier.The local provider edge router also checks whether allow remote forwarder to be connected with described appointed local transponder.If two conditions all meet, then the local provider edge router is accepted connection request.If one in two conditions does not meet, its refusal connection request then.
Definition now is used for setting up the process of layer 2 virtual private network between the transponder on a plurality of providers edge router.Again, transponder can be identical or different type.
Each provider's edge router forms the tabulation of a source transponder, and it is made up of employed all the local transponders of the Virtual Private Network that just is being established.Then, this provider's edge router is set up the tabulation of target forwarder, and it comprises the reason remote forwarder on other provider's edge router of all the local transponders that are used for given Virtual Private Network and same Virtual Private Network.The formation of network topology depends on the content of source transponder tabulation and target forwarder tabulation.These two tabulations can be by manual configuration and/or are found automatically to make up.
The flow chart of Fig. 6 A-6B shows when setting up layer 2 virtual private network according to one embodiment of the present invention, the step of carrying out at single provider edge router place.On each provider's edge router that layer 2 virtual private network comprises, repeat the step of Fig. 6 A-6B.The source transponder that the step of Fig. 6 A-6B starts from being defined and the tabulation of target forwarder.Each transponder is designated as the combination of router id and forwarder identifier.
In step 602, provider's edge router is selected next transponder from the tabulation of source transponder.Step 604 detects in fact whether have the source transponder for you to choose.If do not have available transponder, then finish dealing with.Step 606 is selected next target forwarder from the tabulation of target forwarder.Step 608 detects whether there is target forwarder for you to choose.If there is no target forwarder is then handled and is returned step 602 to select next source transponder.
The router id of step 610 more selected source transponder and target forwarder.If two router id differences are then handled and are proceeded to step 612, because pseudo-circuit should be based upon between two transponders.Whether set up pseudo-circuit between step 612 detection resources transponder and the target forwarder.If set up pseudo-circuit, then handle and return step 606 to select next target forwarder.
If do not set up pseudo-circuit between the source and target as yet, then handle and proceed to step 614.In step 614, the local provider edge router obtains the address of long-range provider edge router from for example previous manual configuration, BGP, directory search etc., and if there is no arrive the control connection of long-range provider edge router, then set up such control connection.Then, step 614 sends connection request to the long-range provider edge router of target forwarder that held the place.The forwarder identifier of source and target transponder is encoded as local forwarder identifier and remote forwarder identifier respectively in connection request message.
Refer again to step 610,, then handle and proceed to step 611 if the router id of source transponder and target forwarder is identical.Whether step 611 detection of transponders identifier is also identical.If forwarder identifier is identical, then source transponder and target forwarder are same transponders, handle and return step 606 to select next target forwarder.If the forwarder identifier difference, then source transponder and target forwarder are not same transponders, but are positioned on the same provider edge router.In step 613, between source transponder and target forwarder, set up local interconnection but not pseudo-circuit.
Step 616 after step 614, the local provider edge router awaits is from the response of long-range provider edge router.The local provider edge router can receive the response to its connection request, or from the independent connection request of long-range provider edge router.Step 618 representative receives the response from long-range provider edge router.Step 620 detects request and has been received still refusal.Be rejected if connect, then handle and return step 606 to select next target forwarder.Be accepted if connect, then in step 622, the local provider edge router is tied to pseudo-circuit with the source transponder.Step 622 is also finished the remaining signaling (if any) to long-range provider edge router, and handles and return step 606 to select next target forwarder.
Step 624 is corresponding to such situation, and promptly the local provider edge router receives another the pseudo-circuit connection request from long-range provider edge router when waiting for its request responding.In this case, step 626 is carried out pseudo-circuit knot (pseudowire tie) detection.Carrying out the detection of pseudo-circuit knot is for fear of set up the pseudo-circuit that repeats between two transponders.If connection request that is received and the connection request that is sent have all been specified with a pair of transponder, then detect a knot.Step 628 detects whether detect knot in step 626.
Finish if detect, then carry out and unhitch, should proceed with which requested connection in step 630.The process of unhitching is specified by the pseudo-line signalling agreement that comes into force, and does not constitute a part of the present invention.It still is that long-range provider edge router has won the process of unhitching that step 632 detects the local provider edge router.If the local provider edge router wins finish, then in step 634, it ignores long-range connection request and step 616 is returned in processing.If long-range provider edge router wins finish, then handle proceeding to step 636, the local provider edge router sends to long-range provider edge router and disconnects message, to recall its previous connection request.Handle then and proceed to step 638, whether should accept the long-range connection request that is received with detection.
Only when the local transponder that has the forwarder identifier value with appointment in remote request, and remote forwarder is when being allowed to connect the local transponder of appointment, and long-range connection request just should be accepted.If there is one not satisfy in two conditions,, refuse remote request by send disconnection message to provider's edge router then in step 640.If two conditions all satisfy, then in step 642, the local provider edge router with the source transponder with bind to the pseudo-circuit of target forwarder.After step 640 or step 642, handle and return step 606.
Network equipment details
The network equipment 700 shown in Fig. 7 for example can be used for realizing the provider's edge router of Fig. 4 and/or the arbitrary steps among the execution graph 6A-6B.In one embodiment, the network equipment 700 is the programmable machines that can use hardware, software or its combination in any to realize.Processor 702 is carried out the code that is stored in the program storage 704.Processor 702 can be carried out encapsulation above-mentioned, decapsulation and flow control operations.Program storage 704 is examples of computer-readable recording medium.Program storage 704 can be a volatile memory.The computer-readable recording medium of another kind of form of storage same code will be nonvolatile memory for example floppy disk, CD-ROM, DVD-ROM, hard disk, flash memory or the like of some type.Transporting the carrier wave that code passes network is another example of computer-readable recording medium.
The network equipment 700 via a plurality of Line cards 706 interfaces to physical medium.But some Line cards 706 interfaces are to customer edge router, and other Line cards can be used as the interface that enters packet switching network.Should be appreciated that Line cards 706 also can realize virtual interface.Attachment circuits and pseudo-circuit can be hosted on the Line cards 706 self.The grouping that is received, handles and transmitted by the network equipment 700 can be stored in the packeting memory 708.
The network equipment 700 can be realized above-mentioned all-network agreement and expansion and data network feature provided by the present invention.A lot of functions can be left Line cards 706 for.Should be appreciated that Line cards 706 self can comprise other resource of mentioning when processing resource, software and reference are described the integral body of the network equipment 700.
Be to be understood that, the embodiments described herein and execution mode only are illustrative, to one skilled in the art various modifications and change can be proposed, these modifications and change all are included in the application's the spirit and scope and the scope of claims, or within the gamut of their equivalent.

Claims (14)

1. method that is used for operating first provider's fringe node of layer 2 virtual private network, described method comprises:
In described first provider's fringe node, provide the source transponder, wherein provide target forwarder at the second provider fringe node place of described Virtual Private Network;
Transmit a request to described second provider's fringe node from described first provider's fringe node, via pseudo-circuit described source transponder is connected to described target forwarder in order to request; And
The identifier that in described request, comprises described target forwarder, described identifier comprises following such part, this part belongs to by the address space of sharing with a plurality of attachment circuits transponder that links to each other and the transponder that only links to each other with client node via an attachment circuits to client node, and described identifier is that the overall situation is unique in described Virtual Private Network.
2. the method for claim 1, wherein said source transponder comprises virtual switch instance, described target forwarder links to each other with single attachment circuits.
3. the method for claim 1, wherein said source transponder links to each other with single attachment circuits, and described target forwarder comprises virtual switch instance.
4. the method for claim 1, at least one in wherein said source transponder and the described target forwarder comprises coloured pond.
5. the method for claim 1, wherein said identifier also comprises the part of the virtual private net address that has identified described second fringe node.
6. method as claimed in claim 5 also comprises:
Before sending described request, receive the described identifier in the BGP bulletin.
7. method as claimed in claim 6, wherein said BGP bulletin comprises the Address-Family Identifier symbol, it is public that this Address-Family Identifier symbol is used a plurality of layer 2 virtual private networks.
8. device that is used for operating first provider's fringe node of layer 2 virtual private network, described device comprises:
Be used for providing the device of source transponder, wherein provide target forwarder at the second provider fringe node place of described Virtual Private Network at described first provider's fringe node;
Be used for transmiting a request to described second provider's fringe node, via pseudo-circuit described source transponder be connected to the device of described target forwarder in order to request from described first provider's fringe node; And
Be used for comprising the device of the identifier of described target forwarder in described request, described identifier comprises following such part, this part belongs to by the address space of sharing with a plurality of attachment circuits transponder that links to each other and the transponder that only links to each other with client node via an attachment circuits to client node, and described identifier is that the overall situation is unique in described Virtual Private Network.
9. device as claimed in claim 8, wherein said source transponder comprises virtual switch instance, described target forwarder links to each other with single attachment circuits.
10. device as claimed in claim 8, wherein said source transponder links to each other with single attachment circuits, and described target forwarder comprises virtual switch instance.
11. device as claimed in claim 8, at least one in wherein said source transponder and the described target forwarder comprises coloured pond.
12. device as claimed in claim 8, wherein said identifier also comprise the part of the virtual private net address that has identified described second fringe node.
13. device as claimed in claim 12 also comprises:
Be used for before sending described request, receive the device of the described identifier in the BGP bulletin.
14. device as claimed in claim 13, wherein said BGP bulletin comprises the Address-Family Identifier symbol, and it is public that this Address-Family Identifier symbol is used a plurality of layer 2 virtual private networks.
CNB2003801038237A 2002-11-21 2003-10-16 System and method for interconnecting heterogeneous layer 2 VPN applications Expired - Fee Related CN100413280C (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US42819802P 2002-11-21 2002-11-21
US60/428,198 2002-11-21
US10/430,637 2003-05-06

Publications (2)

Publication Number Publication Date
CN1714544A CN1714544A (en) 2005-12-28
CN100413280C true CN100413280C (en) 2008-08-20

Family

ID=35719305

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2003801038237A Expired - Fee Related CN100413280C (en) 2002-11-21 2003-10-16 System and method for interconnecting heterogeneous layer 2 VPN applications

Country Status (1)

Country Link
CN (1) CN100413280C (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100428740C (en) * 2006-01-17 2008-10-22 华为技术有限公司 Informing method for attached circuit connection state in packet exchanging network and service device
CN100403735C (en) * 2006-02-24 2008-07-16 华为技术有限公司 Method and system for realizing binding interface edge-to-edge pseudo wire simulation service
CN100450096C (en) * 2006-03-16 2009-01-07 华为技术有限公司 Method for determining converting state of end-to-end pseudo-line simulation node
CN101047636B (en) * 2006-06-07 2010-11-10 华为技术有限公司 Method and system for end-to-end pseudo-line simulation virtual leased line access virtual special network
CN101247334B (en) * 2008-03-06 2010-09-01 中兴通讯股份有限公司 Virtual special local area network service network and its implementing method and supplier edge router
CN101572651B (en) * 2008-04-30 2013-06-05 华为技术有限公司 Method and device for message transfer
CN101505227B (en) * 2009-03-11 2012-06-27 华为技术有限公司 Method, device and system for implementing point to multi-point pseudowire

Non-Patent Citations (8)

* Cited by examiner, † Cited by third party
Title
L2VPN Framework. Loa Andersson, Eric Rosen.Network Working Group Internt Draft. 2003
L2VPN Framework. Loa Andersson, Eric Rosen.Network Working Group Internt Draft. 2003 *
LDP-based Signaling for L2VPNs. Eric C. Rosen.Network Working Group Internet Draft. 2002
LDP-based Signaling for L2VPNs. Eric C. Rosen.Network Working Group Internet Draft. 2002 *
MPLS-VPN工作特性. 陈启美,张国强.电力自动化设备,第22卷第10期. 2002
MPLS-VPN工作特性. 陈启美,张国强.电力自动化设备,第22卷第10期. 2002 *
Using BGP as an Auto-Discovery MechanismforNetwork-based VPNs. Hamid Ould-Brahim, Bryan Gleeson, Peter Ashwood-Smith.Network Working Group Internet Draft. 2002
Using BGP as an Auto-Discovery MechanismforNetwork-based VPNs. Hamid Ould-Brahim, Bryan Gleeson, Peter Ashwood-Smith.Network Working Group Internet Draft. 2002 *

Also Published As

Publication number Publication date
CN1714544A (en) 2005-12-28

Similar Documents

Publication Publication Date Title
EP1563644B1 (en) System and method for interconnecting heterogeneous layer 2 vpn applications
EP3518463B1 (en) Multicast join message processing by multi-homing devices in an ethernet vpn
EP3211839B1 (en) Split-horizon packet forwarding in a mh-pbb-evpn network
CN104471899B (en) Supported by IETF EVPN 802.1AQ
CN101617305B (en) Border gateway protocol procedures for MPLS and layer-2 VPN using ethernet-based tunnels
US9843507B2 (en) Enhanced hierarchical virtual private local area network service (VPLS) system and method for ethernet-tree (E-tree) services
US8098656B2 (en) Method and apparatus for implementing L2 VPNs on an IP network
US7339929B2 (en) Virtual private LAN service using a multicast protocol
US5870386A (en) Method and apparatus for transparently bridging traffic across wide area networks
US9860169B1 (en) Neighbor resolution for remote EVPN hosts in IPV6 EVPN environment
CN100442770C (en) Method for realizing muti-casting in BGP/MPLS VPN
CN103840998A (en) Border gateway protocol extended community attribute for layer-2 and layer-3 virtual private networks using 802.1ah-based tunnels
WO2021093463A1 (en) Packet forwarding method, first network device, and first device group
US10469361B1 (en) Loop prevention for EVPN and PBB-EVPN
CN100413280C (en) System and method for interconnecting heterogeneous layer 2 VPN applications
CN103269300B (en) A kind of method and apparatus of realizing heterogeneous network internetworking
EP2670088B1 (en) Trill network interconnection method and system
CN103634210B (en) Find the method and apparatus of the opposite end PE equipment of VPLS example
CN102724126A (en) Method, device and equipment for forwarding Ethernet tree (E-tree) service message
WO2013000326A1 (en) Data transmission method and system in transparent interconnection over lots of links network
CN114520762A (en) Method for sending BIERv6 message and first network equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20080820

Termination date: 20201016