CN100499589C - Method of phantom lines in multiple hops for building simulation of phantom line from end to end - Google Patents

Method of phantom lines in multiple hops for building simulation of phantom line from end to end Download PDF

Info

Publication number
CN100499589C
CN100499589C CNB2006100340282A CN200610034028A CN100499589C CN 100499589 C CN100499589 C CN 100499589C CN B2006100340282 A CNB2006100340282 A CN B2006100340282A CN 200610034028 A CN200610034028 A CN 200610034028A CN 100499589 C CN100499589 C CN 100499589C
Authority
CN
China
Prior art keywords
pseudo
line
label
hop
parameter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2006100340282A
Other languages
Chinese (zh)
Other versions
CN1874302A (en
Inventor
吴园园
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB2006100340282A priority Critical patent/CN100499589C/en
Publication of CN1874302A publication Critical patent/CN1874302A/en
Application granted granted Critical
Publication of CN100499589C publication Critical patent/CN100499589C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The method comprises: a) setting multi-jump PW (pseudo wire) parameters on the PW switch node; b) in term of the switching list item of multi-jump PW generated by said parameters, the PW switch node establishes the multi-jump PW; meanwhile the PW switch node can also establish multi-jump PW in term of switching list item generated by the information obtained from dynamical protocol. In the PWE3 services, the invention can ensure interconnection of the multi-jump PWE3 services in case of not running dynamical signaling LDP; beside, when the oscillation occurs in network, a great amount of signaling messages will not be produced.

Description

A kind of method of setting up the multi-hop counterfeit wire of Pseudo Wire Emulation Edge-to-Edge
Technical field
The present invention relates to the Pseudo Wire Emulation Edge-to-Edge technology, in particular, a kind of method of on pseudo-line switching node, setting up the multi-hop counterfeit wire of Pseudo Wire Emulation Edge-to-Edge.
Background technology
Telecom operators are that enterprise provides two layers of link in the mode of lease special line (leased line) at first, to satisfy enterprise customer's demand.Because it is long that this mode has building time, circuit can't be shared, cost an arm and a leg, be difficult to shortcomings such as management, it is many to be not suitable for enterprise customer branch, increase fast characteristics, therefore along with asynchronous transfer mode (ATM, Asychorize Transport Mode) and frame relay (FR, Frame Relay) development of technology, telecom operators begin to adopt virtual circuit (VirtualCircuit) mode that two layers of connection of point-to-point are provided for the client, enterprise sets up the three-layer network of oneself thereon again with carrying Internet protocol (IP, Internet Protocol), ppp internetwork packet exchange control protocol data flow such as (IPX, Internet Packet Exchange).The virtual circuit mode is compared with the lease special line, have advantages such as operator provides the time of service short, price is low, but also there are many shortcomings: on different type network, as ATM, FR, Virtual Private Network (VPN is provided, Virtual PrivateNetwork) professional and Internet business, operator need build, safeguard multiple independently network, so cost is still higher; Another shortcoming is that speed is slower, and configuration is complicated.When increasing a website, the keeper need carry out a large amount of configuration efforts.
IP network spreads all over the world at present, utilizes existing IP network to become the focus of each big operator gradually for enterprise provides low-cost private network.Therefore, for remedying the deficiency of above technology, a kind ofly on IP network, provide VPN service, can conveniently set arbitrary velocity, the simple technology of configuration arises at the historic moment, this technology is multiprotocol label switching (MPLS, a Multiple Protocol Label Switch) vpn service.This technology can provide IP service and two layers of three-layer VPN service simultaneously, can conveniently set arbitrary velocity, configuration simply on same network.Like this, operator just can only manage, move a kind of network, the service such as IP service, three-layer VPN, two-layer VPN, traffic engineering, Differentiated Services of do one's best (Best-effort) can be provided on a kind of network simultaneously, thereby greatly reduce networking, maintenance, operating cost.
Vpn service based on MPLS has two kinds, is respectively three layers of (L3, Layer 3) MPLS VPN and two layers of (L2, Layer 2) MPLS VPN.The very big advantage of L2 MPLS VPN is exactly to avoid getting involved like that to L3VPN user's inside route level, and operator does not need maintenance customer's routing iinformation.Along with the continuous development of this technology and application, pseudo wire emulation (PWE3, Pseudo wireEmulation Edge-to-Edge) is professional has end to end been carried.PWE3 is a kind of two-layer VPN technology, it is based on the expansion that Martini (referring to the draft-martini-12circuit-trans-mpls-14.txt) technology of original L2VPN is carried out, optimized employing tag distribution protocol (LDP, Label Distribute Protocol) signaling is carried out mutual flow process, the Internet engineering duty group (IETF, The Internet Engineering Task Force, the tool authority's of Global Internet circle large-scale technical research tissue) describing new signaling process in detail in agreement draft-ietf-pwe3-contro1-protocol-14.txt, mainly is the notification packet that has increased Notification.Not only like this, PWE3 has also proposed the notion of multi-hop counterfeit wire (MH-PW, Multi-hop Pseudo wire) on the basis of the pseudo-line of original single-hop (SH-PW, Single-hop Pseudo wire).For the realization of MH-PW, what adopt at present is pseudo-line (PW, Pseudo wire) switching technology.IETF has defined pseudo-line exchange in agreement draft-martini-pwe3-pw-switching-00.txt, describe the flow process of signaling and forwarding in detail.
Pseudo-line switching technology has solved following three problems: (1) two service provider's edge device (PE, Provider Edge Device) can be in different self-control system (AS) territories; The network type difference of (2) two service provider PE, such as one be the MPLS network, one is 2 layer channel protocols the 3rd edition (Version 3 for L2TPv3, Layer 2 Tunne11ing Protocol) networks; (3) service provider PE performance can't satisfy the demands, and reduces the session number of carrier signaling under the situation of keeping pseudo-line invariable number, allows converging of pseudo-line move.Therefore pseudo-line service is further expanded, and can stride different autonomous systems, can connect MPLS network and L2TPv3 network, to the performance requirement reduction of service provider PE.
As shown in Figure 1, the packet switching network among the figure (PSN, Packet Switching Network) is set up by label switched path (LSP, Label Switched Path).PE1 and PE3 are starting point and the terminal point PE (U-PE, Ultimate PE) of multi-hop PW, and PE2 is the middle switching node PE (S-PE, Switching PE) among the multi-hop PW.The PW switching method can be the moving switching node (Switching point) of manual configuration on PE2, and a plurality of PW switching nodes can be passed in the PW path, and U-PE need not to know the PW path is through which switching node.
PW relies on the LDP agreement to set up, the process of setting up of MH-PW is from the configuration of U-PE, U-PE configures the back and sends SH-PW and set up message (Mapping), and after control messages was received by PE2, PE2 utilized it to form immediately and new sets up message in order to set up next SH-PW of MH-PW.If one of them S-PE does not receive LDP and sets up message, just send a label and discharge (label release) message to source end (originator) U-PE, perhaps the state of a S-PE changes, and can come the change of advertised states by sending announcement (Notification) message; MH-PW all SH-PW all become can normally transmit PW message status (UP) after UP (become and can normally transmit the PW message status).
This mode requires all to need to move the negotiation that dynamic protocol is carried out parameter on all PE equipment, performance to each equipment all has certain requirement, and on the MH-PW path a certain section goes wrong, such as the deletion configuration, Interface status changes, tunnel or signaling session (Session) change etc. and all can cause the state of whole MH-PW to change, and produce a large amount of signaling messages.Although PWE3 expansion Notification be specifically designed to the notification packet of state variation, in oscillation occurs in network, this a large amount of signaling consumption has still had a strong impact on the performance of network.
To sum up, higher to the performance requirement of equipment though prior art adopts complete dynamic protocol scheme can finish the PW business, and the kind of the access interface that PWE3 supports is very many, it is unrealistic requiring the performance of each access device all to reach requirement; And when concussion takes place network, adopt the performance of the scheme of prior art to be had a strong impact on.
Therefore, there is defective in prior art, needs to improve.
Summary of the invention
The object of the present invention is to provide a kind of method of on pseudo-line switching node, setting up the multi-hop counterfeit wire of Pseudo Wire Emulation Edge-to-Edge, by static (not moving dynamic LDP agreement) or exist under the static environment of part, set up multi-hop counterfeit wire all.
Technical scheme of the present invention is as follows:
A kind of method of setting up the multi-hop counterfeit wire of Pseudo Wire Emulation Edge-to-Edge, it may further comprise the steps: A, on pseudo-line switching node the configuration multi-hop counterfeit wire parameter, the parameter of described multi-hop counterfeit wire comprises first parameter group and second parameter group; B, pseudo-line switching node generate the forwarding-table item of the multi-hop counterfeit wire of described pseudo-line switching node according to described first parameter group and the second parameter group parameter, set up multi-hop counterfeit wire.
Described method, wherein, described first parameter group comprises that the first pseudo-line sign, the first pseudo-line destination address, the first pseudo-line go into label, the first pseudo-line outgoing label, the second pseudo-line sign and the second pseudo-line destination address.
Described method, wherein, described second parameter group comprises: the second pseudo-line is gone into the label and the second pseudo-line outgoing label.
Described method, wherein, described first parameter group and second parameter group are manual configuration.
Described method, wherein, described first parameter group is a manual configuration, second parameter group is for to dispose automatically by dynamic protocol.
Described method, wherein, described dynamic protocol is a tag distribution protocol.
Described method, wherein, also comprise step: the origin parameters of configuration multi-hop counterfeit wire on the starting point edge device of multi-hop counterfeit wire, the endpoint parameter of configuration multi-hop counterfeit wire on the terminal point edge device of multi-hop counterfeit wire generates the forwarding-table item that the pseudo-line of the starting point edge device of described multi-hop counterfeit wire and terminal point edge device is transmitted according to described origin parameters and endpoint parameter.
Described method, wherein, the origin parameters of described multi-hop counterfeit wire comprises that the 3rd pseudo-line destination address, the 3rd pseudo-line identify, the 3rd pseudo-line is gone into label and the 3rd pseudo-line outgoing label.
Described method, wherein, the endpoint parameter of described multi-hop counterfeit wire comprises that the 4th pseudo-line destination address, the 4th pseudo-line identify, the 4th pseudo-line is gone into label and the 4th pseudo-line outgoing label.
Adopt such scheme, in the PWE3 business, can be implemented under the situation of not moving dynamic signaling LDP fully, by switching technology silently, guaranteed the connection of multi-hop PWE3 business, reduced the complexity and the requirement of equipment, thereby reduced cost, improved network performance; And when oscillation occurs in network, can not produce a large amount of signaling messages.Exist under the situation of dynamic signaling at subnetwork simultaneously, can finish the transition between the sound PW easily, thereby realize the high flexibility of multi-hop counterfeit wire business.
Description of drawings
Fig. 1 is the realization figure of the dynamic multi-hop MH-PW of prior art PWE3;
Fig. 2 is a basic flow sheet of the present invention;
Fig. 3 is the realization technology figure of the MH-PW under the complete static environment of the present invention;
Fig. 4 is the realization technology figure of the MH-PW under the sound switched environment of the present invention;
Fig. 5 is the combination technique figure of the MH-PW of many switching nodes of the present invention.
Embodiment
Below preferred embodiment of the present invention is described in detail.
The invention provides a kind of method of setting up the multi-hop counterfeit wire of Pseudo Wire Emulation Edge-to-Edge.On the basis of draft-martini-pwe3-pw-switching-00.txt, solved and to have moved or not move dynamic interaction signaling LDP, but all by static or exist under the static environment of part, realize the multi-hop counterfeit wire switching technology effectively, guarantee the connection of PW business, reduce the expense of signaling, improve the performance of network.A typical application can be because the cost of low side access device operation dynamic protocol is too high, performance is limited, by implementing the present invention, can not move dynamic protocol at these low side access devices, set up multi-hop counterfeit wire by manual configuration, thereby allow converging of pseudo-line move, with the equipment carrier signaling of core layer, reach and optimize operator's resource distribution, cost-effective purpose.With dynamic-configuration different be, all by static or exist under the static environment of part, all SH-PW of a MH-PW are difference UP's, can finish the UP operation as long as satisfy the condition of UP, for example middle multi-hop node is as long as two sections PW that exchanged all exist available tunnel can finish the UP operation.Have only a MH-PW to go up all UP of all SH-PW, can carry out forwarding of data, just business can be run logical; Otherwise data just can not be passed pseudo-line normally and be arrived other end S-PE.Because PW finishes by static configuration, rather than rely on dynamic protocol to set up, therefore be configured, just can carry out the PW exchange then setting up on process need each path of MH-PW at multi-hop.A plurality of PW switching nodes can be passed in the PW path, and which switching node U-PE need not to know through.
The flow chart that the present invention realizes as shown in Figure 2.It may further comprise the steps: A, on pseudo-line switching node the configuration multi-hop counterfeit wire parameter; B, pseudo-line switching node generate the forwarding-table item of the multi-hop counterfeit wire of pseudo-line switching node according to described parameter, set up multi-hop counterfeit wire.Also comprising step before the steps A: the origin parameters of configuration multi-hop counterfeit wire on the starting point edge device at multi-hop counterfeit wire, the endpoint parameter of configuration multi-hop counterfeit wire on the terminal point edge device of multi-hop counterfeit wire generates the forwarding-table item that the pseudo-line of the starting point edge device of multi-hop counterfeit wire and terminal point edge device is transmitted according to origin parameters and endpoint parameter.
The parameter of described multi-hop counterfeit wire comprises first parameter group and second parameter group, wherein, described first parameter group comprises that the first pseudo-line sign, the first pseudo-line destination address, the first pseudo-line go into label, the first pseudo-line outgoing label, the second pseudo-line sign and the second pseudo-line destination address; Described second parameter group comprises: the second pseudo-line is gone into the label and the second pseudo-line outgoing label.The origin parameters of described multi-hop counterfeit wire comprises that the 3rd pseudo-line destination address, the 3rd pseudo-line identify, the 3rd pseudo-line is gone into label and the 3rd pseudo-line outgoing label.The endpoint parameter of described multi-hop counterfeit wire comprises that the 4th pseudo-line destination address, the 4th pseudo-line identify, the 4th pseudo-line is gone into label and the 4th pseudo-line outgoing label.
Wherein, all parameters of multi-hop counterfeit wire can comprise first parameter group and second parameter group by manual configuration.In this case, can make pseudo-line switching node not move dynamic protocol fully, promptly can finish the foundation of multi-hop counterfeit wire at complete static environment.A part of parameter that also can the manual configuration multi-hop counterfeit wire, i.e. first parameter group.Automatically dispose another part parameter by dynamic protocol, i.e. second parameter group, described dynamic protocol is a tag distribution protocol, can set up multi-hop counterfeit wire equally, as under the environment of part static state, promptly multi-hop counterfeit wire is static at an end of pseudo-line switching node, the other end is under the dynamic situation, can manual configuration part parameter, another part parameter disposes automatically, promptly obtains by dynamic protocol LDP.
Adopt the inventive method, an embodiment of the realization technology of the MH-PW under static environment fully as shown in Figure 3, PE1 and PE3 are U-PE, and PE2 is S-PE.On U-PE PE1, can adopt the parameter of user's manual configuration PW, i.e. all the other interface parameterss (this example is Contro1-Word) that static configuration, the parameter of described PW comprise PW destination address, PW ID, go into label, outgoing label and signaling are consulted etc.The ip address of supposing PE1 is 1.1.1.1, and the ip address of PE2 is 2.2.2.2, and the ip address of PE3 is 3.3.3.3, and the order of employing is as follows:
[PE1]mpls?static-pwd?estination?2.2.2.2?PW-ID?10received-vpn-label?100?transmit-vpn-label?200?control-word
The meaning of this order is: with destination address be the equipment (PE2) of 2.2.2.2 to set up PW ID be 10 static PW, the label of going into of employing is 100, outgoing label is 200, and sends after adopting the control word encapsulated message.
According to these parameters, PE1 can generate the forwarding-table item that this multi-hop counterfeit wire is transmitted.
As shown in Figure 3, S-PE PE2 adopts manual configuration to exchange to PW2 silently and exchange to the parameter of PW1 silently from PW2 from PW1, all the other interface parameterss (this example is Control-Word) that it comprises PW ID, PW destination address, commutative relation and signaling of the label of coming in and going out, needs exchange are consulted etc.The order of adopting is as follows:
[PE2]mpls?switch-pw?destination?1.1.1.1?PW-ID?10received-vpn-label?200?transmit-vpn-label?100?control-word?betweendestination?3.3.3.3?PW-ID?20?received-vpn-label?400transmit-vpn-label?300?control-word
The meaning of this order is: PE2 need with destination address be that PW ID that the equipment (PE1) of 1.1.1.1 is set up is 10 static PW1, and and destination address be that PW ID that the equipment (PE3) of 3.3.3.3 is set up carries out the PW exchange between 20 the static PW2.We adopt the between keyword to represent that PW exchange had both comprised from PW1 and exchange to PW2, also comprise from PW2 exchanging to PW1, and send after will adopting the control word encapsulated message.Wherein the label of going into of PW1 is 200, and outgoing label is 100, and is just opposite with the discrepancy label of PW1 on the PE1, and the label of going into of PW2 is 400, and outgoing label is 300, need be just opposite with the discrepancy label on the PE3.According to these parameters, PE2 can generate the forwarding-table item that this multi-hop counterfeit wire is transmitted, and sets up this multi-hop counterfeit wire.
Principle on the U-PE PE3 is upward identical with PE1, and the order of employing is as follows:
[PE3]mpls?static-pw?destination?2.2.2.2?PW-ID?20received-vpn-label?300?transmit-vpn-label?400?control-word
The meaning of this order is: with destination address be the equipment (PE2) of 2.2.2.2 to set up PW ID be 20 static PW, the label of going into of employing is 300, outgoing label is 400, and sends after adopting the control word encapsulated message.According to these parameters, PE2 can generate the forwarding-table item of this multi-hop counterfeit wire.
In this example, promptly between PE1 and PE2, PE2 and PE3, carry out pseudo-line exchanges data.The method of forwarding-table item that U-PE/S-PE generates and generation forwarding-table item is same as the prior art.The basic procedure that message is transmitted is as follows:
The CE of A1.PE1 (Customer Edge Device, customer edge) sends message;
After A2.PE1 received message from oneself this CE, the PW ID that at first finds this CE correspondence was 10 PW;
A3. stamp the outgoing label 200 of this PW, and encapsulate upward control word, send to PE2 then;
After A4.PE2 receives this PW message, find that the label of going into of PW is 200, carry out the label exchange of PW then, stamp label 300, also encapsulation sends to PE3 after going up control word simultaneously;
After A5.PE3 received this PW message, the label of going into of discovery PW was 300, and has arrived the terminal point of PW (ID is 20), finds the CE of this PW correspondence, removed just message to be sent out after control word encapsulates;
The CE of A6.PE3 receives this message.
So far, just finished message and delivered to the process of another CE (CE of PE3), middlely carried out the exchange of multi-hop PW by PE2 from a CE (CE of PE1).It is basic identical that same principle, the message of coming from the CE of PE3 will be issued the process of CE of PE1, and flow process is as follows:
The CE of B1.PE3 sends message;
After B2.PE3 received message from oneself CE, the PWID that at first finds this CE correspondence was 20 PW;
B3. stamp the outgoing label 400 of this PW, and encapsulate upward control word, send to PE2 then;
After B4.PE2 receives this PW message, find that the label of going into of PW is 400, carry out the label exchange of PW then, stamp label 100, also encapsulation sends to PE3 after going up control word simultaneously;
After B5.PE1 receives this PW message, find that the label of going into of PW is 100, and arrived the terminal point of PW (ID is 10), find the CE of this PW correspondence, remove the control word encapsulation after, just message is sent out;
The CE of B6.PE1 receives this message.
So far, just finished message and delivered to the process of a CE (CE of PE1), middlely carried out the exchange of multi-hop PW by PE2 from another CE (CE of PE3).The transmitting-receiving flow process of whole message has also just been finished.
Another embodiment of the present invention and last example are similar, when on the S-PE PE2 being sound exchange or quiet moving exchange, can consider to adopt following order line:
[PE2]mpls?switch-pw?destination?1.1.1.1?PW-ID?10received-vpn-label?200?transmit-vpn-label?100?control-word?betweendestination?3.3.3.3?PW-ID?20?control-word
The meaning of this order is: PE2 need with destination address be that PW ID that the equipment PE1 of 1.1.1.1 sets up is 10 static PW1, and and destination address be that PW ID that the equipment PE3 of 3.3.3.3 sets up carries out the PW exchange between 20 the dynamic PW2.We adopt the between keyword to represent that PW exchange had both comprised from PW1 and exchange to PW2, also comprise from PW2 exchanging to PW1, and send after will adopting the control word encapsulated message.Dynamically PW2 does not need specify labels, can consult to obtain it by the LDP signaling of prior art and go into label and outgoing label, and remaining process and above-described examples of implementation are identical.
As shown in Figure 4, PE1 among the figure and PE3 are U-PE, and PE2 is S-PE.The PW switching method can be the switching node of manual configuration sound exchange on PE2, sees to be exactly the switching node of quiet moving exchange from the PE3 side certainly, and a plurality of PW switching nodes can be passed in the PW path, and which switching node U-PE need not to know through.PW relies on dynamic protocol to set up fully, but partly finishes by static configuration by dynamic protocol, part, and the process need of setting up of MH-PW is configured on each path of multi-hop.The process of setting up of MH-PW can be from the configuration of U-PE, U-PE configures the back and sends SH-PW control setup message, after control messages is received by PE2, PE2 will check whether this multi-hop node needs to form new setup message and continue to transmit to next SH-PW, if that exchange to is static PW, as the PW2 in the accompanying drawing 4, will be with the label in the message of receiving, important informations such as interface parameters store.
Need on the S-PE to dispose from the PW1 sound and exchange to PW2 and from the quiet moving parameter that exchanges to PW1 of PW2.This moment on the S-PE node static PW2 one side with respect to dynamic PW1, thinking of just can being similar to is equal to the status of AC (Access Circuit), in like manner dynamic PW1 one side is with respect to static PW2, thinking of also can being similar to is equal to the status of AC, if the PW on both sides is UP, the SH-PW of this moment just calculates UP, will generate the forwarding-table item of both direction.Described " approximate think the status that is equal to AC " belongs to prior art, do not do at this and gives unnecessary details.
Because there is static PW, so all SH-PW of a MH-PW also are segmentation UP, but the one section SH-PW that connects together by dynamic signaling is while UP, because if the dynamic side of one of them switchingPE does not receive LDP setup message, just send a label release message to originator U-PE, also can be by sending the unanimity of Notifaciton message hold mode mutually.And the SH-PW of static configuration is difference UP's.Have only a MH-PW to go up all UP of all SH-PW, can carry out forwarding of data, just business can be run logical.
As shown in Figure 5, PE1 among the figure and PE5 are U-PE, and PE2, PE3, PE4 are S-PE.The PW switching method can be the switching node of the moving exchange of manual configuration on PE2, the switching node of configuration sound exchange on PE3, the switching node of the quiet moving exchange of configuration on PE4.Certainly, if from the PE5 side, the PW switching method is exactly the switching node of configuration sound exchange on PE4, the switching node of the quiet moving exchange of configuration on PE3, the switching node of the moving exchange of manual configuration on PE2.
The process of setting up of PW is exactly above-mentioned moving exchange, exchange silently, sound exchange, quiet moving exchange comprehensive.Certain PW1 as shown in Figure 4, PW2, PW3, the quiet moving compound mode of PW4 is a variety of in addition, is static such as PW1 and PW4, and PW2 and PW3 are dynamic, such networking can realize that the access device of PW need not move dynamic protocol, can do as one likes can be more weak device assumes; And converging by signaling of PW guarantees, can do as one likes can be stronger device assumes, saved cost and don't influenced performance.If desired, can organize flexibly according to the actual needs, also can pass more PW switching node.
If in order to realize for simplicity, can be appointed as identically to the ID of the PW of whole MH-PW multi-hop, just its PW ID does not change in the process of the exchange of PW, simplifies configuration and maintains easily.And in the technical solutions according to the invention, in the moving exchange of the enterprising action of PW switching node, the sound exchange, quiet moving exchange, exchanging silently is to exchange to the PW of an ID on the PW of another different I D, and the PW on both sides has certain independence, can certainly be appointed as the PW of identical ID.
Adopt the inventive method, in the PWE3 business, can be implemented under the situation of not moving dynamic signaling LDP fully, realize the switching technology between the static pseudo-line of multi-hop, guarantee the connection of multi-hop PWE3 business.Exist under the situation of dynamic signaling at subnetwork simultaneously, also can finish the transition between the sound PW easily, thereby realize the high flexibility of multi-hop counterfeit wire business, guarantee the connection of the static PW business in two ends.A typical application can be that performance is limited, allows converging of pseudo-line move because the cost of low side access device operation dynamic protocol is too high, with the equipment carrier signaling of core layer, reaches and optimizes operator's resource distribution, cost-effective purpose.Also can at one end move under the situation that dynamic LDP agreement one end do not move,, realize the switching technology between the pseudo-line of multi-hop sound attitude, guarantee the connection of two ends PW business by the sound and the quiet moving exchange of switching node.Can also be long at the pseudo-line switching path of multi-hop, when just having many switching nodes, by the moving exchange of switching node, the sound exchange, quiet moving exchange, Jiao Huan combination silently adapts to various situation and demand.
Should be understood that, for those of ordinary skills, can be improved according to the above description or conversion, and all these improvement and conversion all should belong to the protection range of claims of the present invention.

Claims (7)

1, a kind of method of setting up the multi-hop counterfeit wire of Pseudo Wire Emulation Edge-to-Edge is characterized in that, may further comprise the steps:
A, on pseudo-line switching node the configuration multi-hop counterfeit wire parameter, the parameter of described multi-hop counterfeit wire comprises first parameter group and second parameter group;
B, pseudo-line switching node generate the forwarding-table item of the multi-hop counterfeit wire of described pseudo-line switching node according to described first parameter group and the second parameter group parameter, set up multi-hop counterfeit wire;
Described first parameter group and second parameter group are manual configuration, perhaps
Described first parameter group is a manual configuration, and described second parameter group is for to dispose automatically by dynamic protocol.
2, method according to claim 1 is characterized in that, described first parameter group comprises that the first pseudo-line sign, the first pseudo-line destination address, the first pseudo-line go into label, the first pseudo-line outgoing label, the second pseudo-line sign and the second pseudo-line destination address.
3, method according to claim 1 is characterized in that, described second parameter group comprises: the second pseudo-line is gone into the label and the second pseudo-line outgoing label.
4, method according to claim 1 is characterized in that, described dynamic protocol is a tag distribution protocol.
5, method according to claim 1, it is characterized in that, also comprise step: the origin parameters of configuration multi-hop counterfeit wire on the starting point edge device of multi-hop counterfeit wire, the endpoint parameter of configuration multi-hop counterfeit wire on the terminal point edge device of multi-hop counterfeit wire generates the forwarding-table item that the pseudo-line of the starting point edge device of described multi-hop counterfeit wire and terminal point edge device is transmitted according to described origin parameters and endpoint parameter.
6, method according to claim 5 is characterized in that, the origin parameters of described multi-hop counterfeit wire comprises that the 3rd pseudo-line destination address, the 3rd pseudo-line identify, the 3rd pseudo-line is gone into label and the 3rd pseudo-line outgoing label.
7, method according to claim 5 is characterized in that, the endpoint parameter of described multi-hop counterfeit wire comprises that the 4th pseudo-line destination address, the 4th pseudo-line identify, the 4th pseudo-line is gone into label and the 4th pseudo-line outgoing label.
CNB2006100340282A 2006-02-27 2006-02-27 Method of phantom lines in multiple hops for building simulation of phantom line from end to end Expired - Fee Related CN100499589C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2006100340282A CN100499589C (en) 2006-02-27 2006-02-27 Method of phantom lines in multiple hops for building simulation of phantom line from end to end

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2006100340282A CN100499589C (en) 2006-02-27 2006-02-27 Method of phantom lines in multiple hops for building simulation of phantom line from end to end

Publications (2)

Publication Number Publication Date
CN1874302A CN1874302A (en) 2006-12-06
CN100499589C true CN100499589C (en) 2009-06-10

Family

ID=37484574

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2006100340282A Expired - Fee Related CN100499589C (en) 2006-02-27 2006-02-27 Method of phantom lines in multiple hops for building simulation of phantom line from end to end

Country Status (1)

Country Link
CN (1) CN100499589C (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101611595B (en) * 2006-12-21 2012-03-21 韦里佐内服务公司 Multifunctional control channel for pseudowire emulation
CN101227337B (en) * 2008-02-05 2011-02-23 中兴通讯股份有限公司 Method for collocating circuit simulation end to end business
CN101616051B (en) * 2008-06-27 2011-09-14 华为技术有限公司 Method and device for establishing pseudo wires
CN101505227B (en) * 2009-03-11 2012-06-27 华为技术有限公司 Method, device and system for implementing point to multi-point pseudowire
CN102130813B (en) 2010-01-15 2016-08-03 华为技术有限公司 Pseudo line establishing method, system and equipment
CN102655468B (en) * 2011-03-02 2016-12-28 中兴通讯股份有限公司 A kind of method and system realizing privately owned VPLS
CN106411543B (en) * 2015-07-27 2020-06-05 中兴通讯股份有限公司 Method and device for removing multi-segment pseudo wires

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
"基于LDP的VPLS实现、问题及解决方案". 张博,罗林.计算机工程与设计,第26卷第8期. 2005
"基于MPLS网络的PWE3业务研究与分析". 霍霆.西安电子科技大学硕士学位论文. 2006
"基于LDP的VPLS实现、问题及解决方案". 张博,罗林.计算机工程与设计,第26卷第8期. 2005 *
"基于MPLS网络的PWE3业务研究与分析". 霍霆.西安电子科技大学硕士学位论文. 2006 *

Also Published As

Publication number Publication date
CN1874302A (en) 2006-12-06

Similar Documents

Publication Publication Date Title
CN101047636B (en) Method and system for end-to-end pseudo-line simulation virtual leased line access virtual special network
US9184935B2 (en) Network communication method and network node device
CN101394361B (en) Packet transmission method, device and system
CN100563190C (en) Realize the method and system of hierarchical virtual private switch service
CN100550841C (en) Autonomous System Boundary Router, AS Boundary Router route issuing method and Autonomous System Boundary Router, AS Boundary Router
CN100499589C (en) Method of phantom lines in multiple hops for building simulation of phantom line from end to end
CN102413060B (en) User private line communication method and equipment used in VPLS (Virtual Private LAN (Local Area Network) Service) network
EP1986385A1 (en) Method and system for performing edge to edge pseudo wire emulation of the bundling interface
CN102724117A (en) Multi-protocol label switching (MPLS) traffic engineering (TE) tunnel building method and device
KR20010070190A (en) System, device, and method for supporting virtual private networks in a label switched communication network
CN101106507B (en) A method for realizing hierarchical VLAN
CN103326940A (en) Method for forwarding message in network and edge device of operator
CN100393062C (en) Method for core network access to multi-protocol sign exchange virtual special network
CN102055647A (en) Three-layer virtual private network (VPN) access method and system
CN101160862B (en) Method and system for realizing the consistency of the virtual circuit status
CN104365066A (en) Method and device used in ethernet virtual private network
CN107995083A (en) Realize the method, system and equipment of L2VPN and VxLAN intercommunications
CN105553810A (en) Method and device for forwarding special line service packet
CN102469010B (en) A kind of method and network equipment distributing MPLS label
CN102724126A (en) Method, device and equipment for forwarding Ethernet tree (E-tree) service message
CN101917324B (en) Communication method, device and equipment for two-layer virtual private network
CN102098189B (en) Method for monitoring CE and routing equipment
CN103634210A (en) Method and apparatus for discovering opposite-end provider edge (PE) device of virtual private LAN service (VPLS) instance
WO2013000326A1 (en) Data transmission method and system in transparent interconnection over lots of links network
CN102710519A (en) Method, system and device for establishing and removing cross-domain LSP (Label Switching Path)

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090610

Termination date: 20170227