CN102307132A - Virtual-private-network-based multi-instance Ethernet ring protection switching method - Google Patents
Virtual-private-network-based multi-instance Ethernet ring protection switching method Download PDFInfo
- Publication number
- CN102307132A CN102307132A CN201110245057A CN201110245057A CN102307132A CN 102307132 A CN102307132 A CN 102307132A CN 201110245057 A CN201110245057 A CN 201110245057A CN 201110245057 A CN201110245057 A CN 201110245057A CN 102307132 A CN102307132 A CN 102307132A
- Authority
- CN
- China
- Prior art keywords
- ethernet ring
- ring protection
- virtual private
- private network
- instance
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
The invention relates to a virtual-private-network-based multi-instance Ethernet ring protection switching method, which comprises the following steps of: (1) creating virtual-private-network-based Ethernet ring protection instances; (2) mapping virtual private network service groups to the Ethernet ring protection instances; and (3) mapping control virtual private network services to the Ethernet ring protection instances. The method has the advantages of: 1, the basis of a virtual private network, namely independent protection switching control is performed on logical rings formed by different virtual private network services; 2, a plurality of instances, namely a plurality of ring instances can be created according to different virtual private network service groups at an identical physical port; 3, the virtual private network service groups, namely the virtual private network services with the same logical topology form a group, and the virtual private network service groups can be mapped into one or more ring instances; and 4, the control virtual private network services, namely private Ethernet ring protection switching control channels are provided the protection switching control over the ring instances.
Description
Technical field
The present invention relates to a kind of Ethernet ring protection reverse method, more particularly, related to a kind of many instances Ethernet ring protection reverse method based on VPN.
Background technology
Existing Ethernet ring protection reverse method, characteristics are following:
1, based on physical topology---the physical rings topology protected switch;
2, based on physical port---physical port protection is switched;
3, single instance---a physical port can only be on a ring instance.
There is following shortcoming in the method for technology now:
1, to physical topology, the protection of the logical topology of virtual private network service can not be provided;
2, to physical port, the protection of logic port in the virtual private network service can not be provided;
3, single instance can not provide different virtual private network service groups is protected.
Summary of the invention
The objective of the invention is to solve problem set forth above; Provide a kind of based on virtual private network service, realize many instances, logic-based topology; Can customizing virtual private network service protection group, for providing protection, specific virtual private network service switches the many instances Ethernet ring protection reverse method based on VPN of service.
Technical scheme of the present invention is such:
A kind of many instances Ethernet ring protection reverse method based on VPN, step be as above:
(1) establishment is based on the Ethernet ring protection instance of VPN;
(2) the virtual private network service group is mapped to the Ethernet ring protection instance;
(3) will control virtual private network service and be mapped to the ethernet ring network instance.
As preferably; Described step (1) may further comprise the steps: on each node of ethernet ring network, create at least more than one Ethernet ring protection instance; Described instance comprises 2 central ports; It is RPL owner node that the instance of a node is specified in a central port, and it is the RPL link that a central port of a node is specified in another central port.
As preferably, described step (2) may further comprise the steps: at least more than one virtual private network service group is mapped to corresponding with it Ethernet ring protection instance respectively, and described virtual private network service group comprises at least more than one virtual private network service.
As preferably, described step (3) may further comprise the steps: create at least more than one control virtual private network service, shine upon this business then respectively to corresponding with it Ethernet ring protection instance.
As preferably; Described method is based on the Ethernet ring protection turning protocol of VPN, and the Ethernet ring protection turning protocol frame structure of VPN is: destination address, source address, S-TAG label, ethernet type, ring protection switching messages (R-APS Message), check and; Described S-TAG field is used for identifying different VPN protection instances.
As preferably, the S-TAG label in each VPN protection instance is unique.
As preferably, described Ethernet ring protection instance is at same physical port, according to different virtual private network service groups, creates at least more than one Ethernet ring protection instance.
As preferably, described virtual private network service group is that the virtual private network service with identity logic topology forms a group, can be mapped in one or more Ethernet ring protection instance.
Beneficial effect of the present invention is following:
1, based on VPN, the logic box to different virtual private network services forms carries out independent protective and switches control;
2, many instances at same physical port, according to different virtual private network service groups, can be created a plurality of ring instances;
3, virtual private network service group, the virtual private network service with identity logic topology forms a group, can be mapped in one or more ring instance;
4, control virtual private network service provides special-purpose Ethernet ring protection to switch control channel, the ring instance is protected switched control.
Description of drawings
Fig. 1 is the sketch map of the normal topology of Ethernet ring protection;
Fig. 2 is the sketch map of the fault topology of Ethernet ring protection;
Fig. 3 is the sketch map that the normal condition of Ethernet ring protection is transformed into physical topology after the fault;
Fig. 4 is the sketch map of logical topology after normal condition and the fault of Ethernet ring protection;
Fig. 5 is based on the frame structure sketch map of the Ethernet ring protection turning protocol of VPN;
Fig. 6 is the sketch map of the shared VPN of logic tangent rings.
Embodiment
Below in conjunction with accompanying drawing embodiments of the invention are further elaborated:
A kind of many instances Ethernet ring protection reverse method based on VPN, step be as above:
(1) establishment is based on the Ethernet ring protection instance of VPN;
(2) the virtual private network service group is mapped to the Ethernet ring protection instance;
(3) will control virtual private network service and be mapped to the ethernet ring network instance.
Described step (1) may further comprise the steps: on each node of ethernet ring network, create at least more than one Ethernet ring protection instance; Described instance comprises 2 central ports; It is RPL owner node that the instance of a node is specified in a central port, and it is the RPL link that a central port of a node is specified in another central port.
Described step (2) may further comprise the steps: at least more than one virtual private network service group is mapped to corresponding with it Ethernet ring protection instance respectively, and described virtual private network service group comprises at least more than one virtual private network service.
Described step (3) may further comprise the steps: create at least more than one control virtual private network service, shine upon this business then respectively to corresponding with it Ethernet ring protection instance.
Described method is based on the Ethernet ring protection turning protocol of VPN, and the Ethernet ring protection turning protocol frame structure of VPN is: destination address, source address, S-TAG label, ethernet type, ring protection switching messages (R-APS Message), check and; Described S-TAG field is used for identifying different VPN protection instances.
S-TAG label in each VPN protection instance is unique.
Described Ethernet ring protection instance is at same physical port, according to different virtual private network service groups, creates at least more than one Ethernet ring protection instance.
Described virtual private network service group is that the virtual private network service with identity logic topology forms a group, can be mapped in one or more Ethernet ring protection instance.
G.8032/Y.1344, the general protection turning protocol that Ethernet ring protection turning protocol ITU-T defines in the standard.Many instances Ethernet ring protection method based on VPN is on the basis of this agreement, to expand, and switches a kind of many instances Ethernet ring protection method that proposes for solving based on the protection of virtual private network service.Based on the Ethernet of virtual private network service, because the existence of VPN makes the natural isolation of different service.And based on the business of VPN in practical application; The network topology that generally can form annular; And virtual private network service can form with the different annular logical topology of actual physical topology; The logical topology of different virtual private network services maybe be different; In order to make virtual private network service have high reliability and high stability; Prevent that the logic box topology from forming loop; With the operation that influences network and the availability of virtual private network service; On the basis of standard agreement, the many instances Ethernet ring protection reverse method based on VPN has been proposed.
Method of the present invention, concrete steps are following:
(1) based on the concrete steps of the establishment of the Ethernet ring protection instance of VPN:
(1.1) on each node on the ring, create Ethernet ring protection instance 1, this instance comprises 2 central ports, wherein specifies the instance 1 of certain node to be RPL owner node, and certain central port is the RPL link;
(1.2) on each node on the ring, create Ethernet ring protection instance 2, this instance comprises 2 central ports, and the same with the central port of instance 1, wherein specifies the instance 2 of certain node to be RPL owner node, and certain central port is the RPL link;
(2) the virtual private network service group is to the concrete steps of the mapping of Ethernet ring protection instance:
(2.1) virtual private network service group 1 (this service groups comprises 1-100 totally 100 virtual private network services) is mapped to instance 1;
(2.2) virtual private network service group 2 (this service groups comprises 101-200 totally 100 virtual private network services) is mapped to instance 2;
(3) control the concrete steps of virtual private network service to the mapping of ethernet ring network instance:
(3.1) create control virtual private network service 1, mapping should business be arrived instance 1 then;
(3.2) create control virtual private network service 2, mapping should business be arrived instance 2 then.
Like Fig. 1, Fig. 2, Fig. 3, shown in Figure 4, the basic thought of standard Ethernet ring protection agreement is exactly to utilize a specific link to protect whole ring.We are called ring protection link (RPL) to this link.The situation of the Ethernet ring protection under the normal condition as shown in Figure 1, if other links on ring do not have under the situation of fault, this link is responsible for blocking Business Stream, in case the generation of loops.And the ad hoc network node of controlling this ring protection link is called ring protection link owner (RPL Owner), it is responsible for blocking/and Business Stream on the deoppilation ring protection link.
When breaking down on the ring, the Business Stream on the ring protection link will be protected and switch.And behavior is switched in the protection that the Ethernet ring protection turning protocol is used on the unison.Protection is switched the behavior meeting and is blocked the business on the faulty link, and the business on the deoppilation ring protection link.After fault was eliminated, the protection switchover mode of return type choke ring was again protected the Business Stream on the link, and the business of the link of deoppilation fault elimination.It can report the state of link according to data link layer, carries out the quick protective switch of looped network.As shown in Figure 2; After a certain link occurs fault on the looped network; After detecting fault on two network elements that faulty link links to each other; Block this faulty link; And send R-APS (SF) message respectively; After RPL Owner node is received message, can open the RPL link of original obstruction, carry out Ethernet ring protection and switch.After under normal circumstances taking place with link failure, the contrast of the physical topology of whole looped network as shown in Figure 3.After under normal circumstances taking place with link failure, the contrast of the logical topology of whole looped network as shown in Figure 4.
Based on many instances ethernet ring network scheme of VPN, be that the specific ring protection link of the logical links of a specific VPN as this instance come virtual private network service protection is switched.
The frame structure of described Ethernet ring protection turning protocol based on VPN as shown in Figure 5, comprises destination address (6 byte); Source address (6 byte); S-TAG label (4 byte); Ethernet type (0x89-02); Data (R-APS Message); Check and (4 byte).
Comprise a S-TAG field in this structure, identify different VPN protection instances.Each VPN protection instance all has a unique S-TAG sign.
When creating the ethernet ring network instance, need the mapping virtual private network service in this instance.Generally speaking, having the topological virtual private network service of identical logic box can be mapped in the same Ethernet ring protection instance.Certainly, also can be mapped in the different ethernet ring network instances.We are called ethernet ring network VPN protection service groups to the one group of virtual private network service that is mapped to same Ethernet ring protection instance.Each group protection business is protected by different instances all, possibly have the different logical topology.Natural each other isolation is independent of each other.
Through the separation of VPN, and, just can provide the VPN protection of customization to switch service for different virtual private network services based on many instances Ethernet ring protection of VPN.
For the shared virtual private network service of logic tangent rings, as shown in Figure 6, present embodiment provides solution; At tangent node; Virtual private network service is mapped in a plurality of ring instances, and the different logical port of virtual private network service is controlled by different ring instances on the different logical ring.
Present embodiment may further comprise the steps:
(1) at node 1,2, create instance 1 on 3, comprise central port ge-bs/1 and ge-bs/2;
(2) virtual private network service group 1 (comprising 1-100, totally 100 business) is mapped to instance 1;
(3), create control virtual private network service 1 on 3 and be mapped to instance 1 at node 1,2;
(4) at node 3,4, create instance 2 on 5, wherein comprise central port ge-bs/1 and ge-bs/2 on the node 4,5, comprise central port ge-bs/3 on the node 3, ge-bs/4;
(5) VPN group 1 (comprising 1-100, totally 100 business) is mapped to instance 2;
(6), create control virtual private network service 2 on 5 and be mapped to instance 2 at node 3,4;
Attention: wherein node 3 is shared service nodes, the virtual private network service group 1 (1-100) of this node 4 ports of should guaranteeing replacement.
Above-described only is preferred implementation of the present invention; Should be pointed out that the those of ordinary skill in the art, under the prerequisite that does not break away from core technology characteristic of the present invention; Can also make some improvement and retouching, these improvement and retouching also should be considered as protection scope of the present invention.
Claims (8)
1. the many instances Ethernet ring protection reverse method based on VPN is characterized in that, step as above:
(1) establishment is based on the Ethernet ring protection instance of VPN;
(2) the virtual private network service group is mapped to the Ethernet ring protection instance;
(3) will control virtual private network service and be mapped to the ethernet ring network instance.
2. the many instances Ethernet ring protection reverse method based on VPN according to claim 1; It is characterized in that; Described step (1) may further comprise the steps: on each node of ethernet ring network, create at least more than one Ethernet ring protection instance; Described instance comprises 2 central ports; It is RPL owner node that the instance of a node is specified in a central port, and it is the RPL link that a central port of a node is specified in another central port.
3. the many instances Ethernet ring protection reverse method based on VPN according to claim 2; It is characterized in that; Described step (2) may further comprise the steps: at least more than one virtual private network service group is mapped to corresponding with it Ethernet ring protection instance respectively, and described virtual private network service group comprises at least more than one virtual private network service.
4. the many instances Ethernet ring protection reverse method based on VPN according to claim 3; It is characterized in that; Described step (3) may further comprise the steps: create at least more than one control virtual private network service, shine upon this business then respectively to corresponding with it Ethernet ring protection instance.
5. the many instances Ethernet ring protection reverse method based on VPN according to claim 1; It is characterized in that; Described method is based on the Ethernet ring protection turning protocol of VPN, and the Ethernet ring protection turning protocol frame structure of VPN is: destination address, source address, S-TAG label, ethernet type, ring protection switching messages (R-APS Message), check and; Described S-TAG field is used for identifying different VPN protection instances.
6. the many instances Ethernet ring protection reverse method based on VPN according to claim 5 is characterized in that, the S-TAG label in each VPN protection instance is unique.
7. the many instances Ethernet ring protection reverse method based on VPN according to claim 1; It is characterized in that; Described Ethernet ring protection instance is at same physical port, according to different virtual private network service groups, creates at least more than one Ethernet ring protection instance.
8. the many instances Ethernet ring protection reverse method based on VPN according to claim 1; It is characterized in that; Described virtual private network service group is that the virtual private network service with identity logic topology forms a group, can be mapped in one or more Ethernet ring protection instance.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110245057A CN102307132A (en) | 2011-08-25 | 2011-08-25 | Virtual-private-network-based multi-instance Ethernet ring protection switching method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110245057A CN102307132A (en) | 2011-08-25 | 2011-08-25 | Virtual-private-network-based multi-instance Ethernet ring protection switching method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102307132A true CN102307132A (en) | 2012-01-04 |
Family
ID=45380945
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110245057A Pending CN102307132A (en) | 2011-08-25 | 2011-08-25 | Virtual-private-network-based multi-instance Ethernet ring protection switching method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102307132A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102754390A (en) * | 2012-04-28 | 2012-10-24 | 华为技术有限公司 | Method, network device and system for ethernet ring protection switching |
CN104350504A (en) * | 2012-02-10 | 2015-02-11 | 爱迪德加拿大公司 | Method and apparatus for program flow in software operation |
CN104486190A (en) * | 2014-12-23 | 2015-04-01 | 上海斐讯数据通信技术有限公司 | Method for Ethernet multi-network switching |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007128399A1 (en) * | 2006-05-04 | 2007-11-15 | Nokia Siemens Networks Gmbh & Co. Kg | Automatic packet protection forwarding to an mpls network by a dual-homed ethernet bridge |
CN102014006A (en) * | 2010-12-23 | 2011-04-13 | 杭州依赛通信有限公司 | Ethernet ring protection switching method for hybrid network |
CN102014034A (en) * | 2010-12-06 | 2011-04-13 | 杭州依赛通信有限公司 | Layering virtual network based on tree virtual local area network (VLAN) and configuration method thereof |
-
2011
- 2011-08-25 CN CN201110245057A patent/CN102307132A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007128399A1 (en) * | 2006-05-04 | 2007-11-15 | Nokia Siemens Networks Gmbh & Co. Kg | Automatic packet protection forwarding to an mpls network by a dual-homed ethernet bridge |
CN102014034A (en) * | 2010-12-06 | 2011-04-13 | 杭州依赛通信有限公司 | Layering virtual network based on tree virtual local area network (VLAN) and configuration method thereof |
CN102014006A (en) * | 2010-12-23 | 2011-04-13 | 杭州依赛通信有限公司 | Ethernet ring protection switching method for hybrid network |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104350504A (en) * | 2012-02-10 | 2015-02-11 | 爱迪德加拿大公司 | Method and apparatus for program flow in software operation |
US9934374B2 (en) | 2012-02-10 | 2018-04-03 | Irdeto B.V. | Method and apparatus for program flow in software operation |
CN102754390A (en) * | 2012-04-28 | 2012-10-24 | 华为技术有限公司 | Method, network device and system for ethernet ring protection switching |
CN102754390B (en) * | 2012-04-28 | 2015-06-17 | 华为技术有限公司 | Method, network device and system for ethernet ring protection switching |
US9246751B2 (en) | 2012-04-28 | 2016-01-26 | Huawei Technologies Co., Ltd. | Ethernet ring protection switching method, network device and system |
CN104486190A (en) * | 2014-12-23 | 2015-04-01 | 上海斐讯数据通信技术有限公司 | Method for Ethernet multi-network switching |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101072237B (en) | Eth-loop intelligent protection method | |
CN103053139B (en) | Message processing method and system | |
US7924705B2 (en) | Method and system for span-based connection aggregation | |
CN102377605B (en) | Method for implementing double-returning protection of packet transport network (PTN) equipment by using combination of multiple protection modes | |
CN104980372A (en) | Relay System And Switching Device | |
CN101438538A (en) | Communication system, node, terminal, communication method, and program | |
CN101272310B (en) | Ethernet looped network automatic protection rotation method and device | |
CN103607293B (en) | A kind of flow rate protecting method and equipment | |
CN108900415A (en) | Master-slave equipment switching method and system under fault of M L AG interface | |
CN101656630A (en) | Service protection method and system | |
CN102668452A (en) | Method of M:1 protection | |
CN105490937B (en) | Ether virtual network gateway switching method and service provider's edge node devices | |
CN101674217B (en) | Method for realizing permanent ring network protection in MESH network | |
CN101789879A (en) | Dynamic maintenance method and device for related link circuits | |
CN1933422B (en) | Network trouble switching method | |
CN101848035B (en) | The method of share protect, system and node device in a kind of OTN network | |
CN102957588A (en) | Method and system for protecting looped network from broadcast storm | |
CN104506614A (en) | Design method for distributed multi-activity data center based on cloud computing | |
CN101986615B (en) | Multiple-ring Ethernet and protection method thereof | |
CN102307132A (en) | Virtual-private-network-based multi-instance Ethernet ring protection switching method | |
JP5491623B2 (en) | Address refresh method and system | |
CN103078777A (en) | Method and device for eliminating loop in resilient packet ring network | |
CN102724096A (en) | Mixed ring network protection method and network equipment | |
CN102014006B (en) | Ethernet ring protection switching method for hybrid network | |
CN102215165B (en) | A kind of message processing method of tangent ring networks and Ethernet switch |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20120104 |