CN102307132A - Virtual-private-network-based multi-instance Ethernet ring protection switching method - Google Patents

Virtual-private-network-based multi-instance Ethernet ring protection switching method Download PDF

Info

Publication number
CN102307132A
CN102307132A CN201110245057A CN201110245057A CN102307132A CN 102307132 A CN102307132 A CN 102307132A CN 201110245057 A CN201110245057 A CN 201110245057A CN 201110245057 A CN201110245057 A CN 201110245057A CN 102307132 A CN102307132 A CN 102307132A
Authority
CN
China
Prior art keywords
ethernet ring
ring protection
virtual private
private network
instance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201110245057A
Other languages
Chinese (zh)
Inventor
廉峰峰
丁洪
金恩江
朱娟萍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GUANGZHOU ECI TELECOMMUNICATION CO Ltd
Original Assignee
GUANGZHOU ECI TELECOMMUNICATION CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GUANGZHOU ECI TELECOMMUNICATION CO Ltd filed Critical GUANGZHOU ECI TELECOMMUNICATION CO Ltd
Priority to CN201110245057A priority Critical patent/CN102307132A/en
Publication of CN102307132A publication Critical patent/CN102307132A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention relates to a virtual-private-network-based multi-instance Ethernet ring protection switching method, which comprises the following steps of: (1) creating virtual-private-network-based Ethernet ring protection instances; (2) mapping virtual private network service groups to the Ethernet ring protection instances; and (3) mapping control virtual private network services to the Ethernet ring protection instances. The method has the advantages of: 1, the basis of a virtual private network, namely independent protection switching control is performed on logical rings formed by different virtual private network services; 2, a plurality of instances, namely a plurality of ring instances can be created according to different virtual private network service groups at an identical physical port; 3, the virtual private network service groups, namely the virtual private network services with the same logical topology form a group, and the virtual private network service groups can be mapped into one or more ring instances; and 4, the control virtual private network services, namely private Ethernet ring protection switching control channels are provided the protection switching control over the ring instances.

Description

A kind of many instances Ethernet ring protection reverse method based on VPN
Technical field
The present invention relates to a kind of Ethernet ring protection reverse method, more particularly, related to a kind of many instances Ethernet ring protection reverse method based on VPN.
Background technology
Existing Ethernet ring protection reverse method, characteristics are following:
1, based on physical topology---the physical rings topology protected switch;
2, based on physical port---physical port protection is switched;
3, single instance---a physical port can only be on a ring instance.
There is following shortcoming in the method for technology now:
1, to physical topology, the protection of the logical topology of virtual private network service can not be provided;
2, to physical port, the protection of logic port in the virtual private network service can not be provided;
3, single instance can not provide different virtual private network service groups is protected.
Summary of the invention
The objective of the invention is to solve problem set forth above; Provide a kind of based on virtual private network service, realize many instances, logic-based topology; Can customizing virtual private network service protection group, for providing protection, specific virtual private network service switches the many instances Ethernet ring protection reverse method based on VPN of service.
Technical scheme of the present invention is such:
A kind of many instances Ethernet ring protection reverse method based on VPN, step be as above:
(1) establishment is based on the Ethernet ring protection instance of VPN;
(2) the virtual private network service group is mapped to the Ethernet ring protection instance;
(3) will control virtual private network service and be mapped to the ethernet ring network instance.
As preferably; Described step (1) may further comprise the steps: on each node of ethernet ring network, create at least more than one Ethernet ring protection instance; Described instance comprises 2 central ports; It is RPL owner node that the instance of a node is specified in a central port, and it is the RPL link that a central port of a node is specified in another central port.
As preferably, described step (2) may further comprise the steps: at least more than one virtual private network service group is mapped to corresponding with it Ethernet ring protection instance respectively, and described virtual private network service group comprises at least more than one virtual private network service.
As preferably, described step (3) may further comprise the steps: create at least more than one control virtual private network service, shine upon this business then respectively to corresponding with it Ethernet ring protection instance.
As preferably; Described method is based on the Ethernet ring protection turning protocol of VPN, and the Ethernet ring protection turning protocol frame structure of VPN is: destination address, source address, S-TAG label, ethernet type, ring protection switching messages (R-APS Message), check and; Described S-TAG field is used for identifying different VPN protection instances.
As preferably, the S-TAG label in each VPN protection instance is unique.
As preferably, described Ethernet ring protection instance is at same physical port, according to different virtual private network service groups, creates at least more than one Ethernet ring protection instance.
As preferably, described virtual private network service group is that the virtual private network service with identity logic topology forms a group, can be mapped in one or more Ethernet ring protection instance.
Beneficial effect of the present invention is following:
1, based on VPN, the logic box to different virtual private network services forms carries out independent protective and switches control;
2, many instances at same physical port, according to different virtual private network service groups, can be created a plurality of ring instances;
3, virtual private network service group, the virtual private network service with identity logic topology forms a group, can be mapped in one or more ring instance;
4, control virtual private network service provides special-purpose Ethernet ring protection to switch control channel, the ring instance is protected switched control.
Description of drawings
Fig. 1 is the sketch map of the normal topology of Ethernet ring protection;
Fig. 2 is the sketch map of the fault topology of Ethernet ring protection;
Fig. 3 is the sketch map that the normal condition of Ethernet ring protection is transformed into physical topology after the fault;
Fig. 4 is the sketch map of logical topology after normal condition and the fault of Ethernet ring protection;
Fig. 5 is based on the frame structure sketch map of the Ethernet ring protection turning protocol of VPN;
Fig. 6 is the sketch map of the shared VPN of logic tangent rings.
Embodiment
Below in conjunction with accompanying drawing embodiments of the invention are further elaborated:
A kind of many instances Ethernet ring protection reverse method based on VPN, step be as above:
(1) establishment is based on the Ethernet ring protection instance of VPN;
(2) the virtual private network service group is mapped to the Ethernet ring protection instance;
(3) will control virtual private network service and be mapped to the ethernet ring network instance.
Described step (1) may further comprise the steps: on each node of ethernet ring network, create at least more than one Ethernet ring protection instance; Described instance comprises 2 central ports; It is RPL owner node that the instance of a node is specified in a central port, and it is the RPL link that a central port of a node is specified in another central port.
Described step (2) may further comprise the steps: at least more than one virtual private network service group is mapped to corresponding with it Ethernet ring protection instance respectively, and described virtual private network service group comprises at least more than one virtual private network service.
Described step (3) may further comprise the steps: create at least more than one control virtual private network service, shine upon this business then respectively to corresponding with it Ethernet ring protection instance.
Described method is based on the Ethernet ring protection turning protocol of VPN, and the Ethernet ring protection turning protocol frame structure of VPN is: destination address, source address, S-TAG label, ethernet type, ring protection switching messages (R-APS Message), check and; Described S-TAG field is used for identifying different VPN protection instances.
S-TAG label in each VPN protection instance is unique.
Described Ethernet ring protection instance is at same physical port, according to different virtual private network service groups, creates at least more than one Ethernet ring protection instance.
Described virtual private network service group is that the virtual private network service with identity logic topology forms a group, can be mapped in one or more Ethernet ring protection instance.
G.8032/Y.1344, the general protection turning protocol that Ethernet ring protection turning protocol ITU-T defines in the standard.Many instances Ethernet ring protection method based on VPN is on the basis of this agreement, to expand, and switches a kind of many instances Ethernet ring protection method that proposes for solving based on the protection of virtual private network service.Based on the Ethernet of virtual private network service, because the existence of VPN makes the natural isolation of different service.And based on the business of VPN in practical application; The network topology that generally can form annular; And virtual private network service can form with the different annular logical topology of actual physical topology; The logical topology of different virtual private network services maybe be different; In order to make virtual private network service have high reliability and high stability; Prevent that the logic box topology from forming loop; With the operation that influences network and the availability of virtual private network service; On the basis of standard agreement, the many instances Ethernet ring protection reverse method based on VPN has been proposed.
Embodiment 1
Method of the present invention, concrete steps are following:
(1) based on the concrete steps of the establishment of the Ethernet ring protection instance of VPN:
(1.1) on each node on the ring, create Ethernet ring protection instance 1, this instance comprises 2 central ports, wherein specifies the instance 1 of certain node to be RPL owner node, and certain central port is the RPL link;
(1.2) on each node on the ring, create Ethernet ring protection instance 2, this instance comprises 2 central ports, and the same with the central port of instance 1, wherein specifies the instance 2 of certain node to be RPL owner node, and certain central port is the RPL link;
(2) the virtual private network service group is to the concrete steps of the mapping of Ethernet ring protection instance:
(2.1) virtual private network service group 1 (this service groups comprises 1-100 totally 100 virtual private network services) is mapped to instance 1;
(2.2) virtual private network service group 2 (this service groups comprises 101-200 totally 100 virtual private network services) is mapped to instance 2;
(3) control the concrete steps of virtual private network service to the mapping of ethernet ring network instance:
(3.1) create control virtual private network service 1, mapping should business be arrived instance 1 then;
(3.2) create control virtual private network service 2, mapping should business be arrived instance 2 then.
Like Fig. 1, Fig. 2, Fig. 3, shown in Figure 4, the basic thought of standard Ethernet ring protection agreement is exactly to utilize a specific link to protect whole ring.We are called ring protection link (RPL) to this link.The situation of the Ethernet ring protection under the normal condition as shown in Figure 1, if other links on ring do not have under the situation of fault, this link is responsible for blocking Business Stream, in case the generation of loops.And the ad hoc network node of controlling this ring protection link is called ring protection link owner (RPL Owner), it is responsible for blocking/and Business Stream on the deoppilation ring protection link.
When breaking down on the ring, the Business Stream on the ring protection link will be protected and switch.And behavior is switched in the protection that the Ethernet ring protection turning protocol is used on the unison.Protection is switched the behavior meeting and is blocked the business on the faulty link, and the business on the deoppilation ring protection link.After fault was eliminated, the protection switchover mode of return type choke ring was again protected the Business Stream on the link, and the business of the link of deoppilation fault elimination.It can report the state of link according to data link layer, carries out the quick protective switch of looped network.As shown in Figure 2; After a certain link occurs fault on the looped network; After detecting fault on two network elements that faulty link links to each other; Block this faulty link; And send R-APS (SF) message respectively; After RPL Owner node is received message, can open the RPL link of original obstruction, carry out Ethernet ring protection and switch.After under normal circumstances taking place with link failure, the contrast of the physical topology of whole looped network as shown in Figure 3.After under normal circumstances taking place with link failure, the contrast of the logical topology of whole looped network as shown in Figure 4.
Based on many instances ethernet ring network scheme of VPN, be that the specific ring protection link of the logical links of a specific VPN as this instance come virtual private network service protection is switched.
The frame structure of described Ethernet ring protection turning protocol based on VPN as shown in Figure 5, comprises destination address (6 byte); Source address (6 byte); S-TAG label (4 byte); Ethernet type (0x89-02); Data (R-APS Message); Check and (4 byte).
Comprise a S-TAG field in this structure, identify different VPN protection instances.Each VPN protection instance all has a unique S-TAG sign.
When creating the ethernet ring network instance, need the mapping virtual private network service in this instance.Generally speaking, having the topological virtual private network service of identical logic box can be mapped in the same Ethernet ring protection instance.Certainly, also can be mapped in the different ethernet ring network instances.We are called ethernet ring network VPN protection service groups to the one group of virtual private network service that is mapped to same Ethernet ring protection instance.Each group protection business is protected by different instances all, possibly have the different logical topology.Natural each other isolation is independent of each other.
Through the separation of VPN, and, just can provide the VPN protection of customization to switch service for different virtual private network services based on many instances Ethernet ring protection of VPN.
Embodiment 2
For the shared virtual private network service of logic tangent rings, as shown in Figure 6, present embodiment provides solution; At tangent node; Virtual private network service is mapped in a plurality of ring instances, and the different logical port of virtual private network service is controlled by different ring instances on the different logical ring.
Present embodiment may further comprise the steps:
(1) at node 1,2, create instance 1 on 3, comprise central port ge-bs/1 and ge-bs/2;
(2) virtual private network service group 1 (comprising 1-100, totally 100 business) is mapped to instance 1;
(3), create control virtual private network service 1 on 3 and be mapped to instance 1 at node 1,2;
(4) at node 3,4, create instance 2 on 5, wherein comprise central port ge-bs/1 and ge-bs/2 on the node 4,5, comprise central port ge-bs/3 on the node 3, ge-bs/4;
(5) VPN group 1 (comprising 1-100, totally 100 business) is mapped to instance 2;
(6), create control virtual private network service 2 on 5 and be mapped to instance 2 at node 3,4;
Attention: wherein node 3 is shared service nodes, the virtual private network service group 1 (1-100) of this node 4 ports of should guaranteeing replacement.
Above-described only is preferred implementation of the present invention; Should be pointed out that the those of ordinary skill in the art, under the prerequisite that does not break away from core technology characteristic of the present invention; Can also make some improvement and retouching, these improvement and retouching also should be considered as protection scope of the present invention.

Claims (8)

1. the many instances Ethernet ring protection reverse method based on VPN is characterized in that, step as above:
(1) establishment is based on the Ethernet ring protection instance of VPN;
(2) the virtual private network service group is mapped to the Ethernet ring protection instance;
(3) will control virtual private network service and be mapped to the ethernet ring network instance.
2. the many instances Ethernet ring protection reverse method based on VPN according to claim 1; It is characterized in that; Described step (1) may further comprise the steps: on each node of ethernet ring network, create at least more than one Ethernet ring protection instance; Described instance comprises 2 central ports; It is RPL owner node that the instance of a node is specified in a central port, and it is the RPL link that a central port of a node is specified in another central port.
3. the many instances Ethernet ring protection reverse method based on VPN according to claim 2; It is characterized in that; Described step (2) may further comprise the steps: at least more than one virtual private network service group is mapped to corresponding with it Ethernet ring protection instance respectively, and described virtual private network service group comprises at least more than one virtual private network service.
4. the many instances Ethernet ring protection reverse method based on VPN according to claim 3; It is characterized in that; Described step (3) may further comprise the steps: create at least more than one control virtual private network service, shine upon this business then respectively to corresponding with it Ethernet ring protection instance.
5. the many instances Ethernet ring protection reverse method based on VPN according to claim 1; It is characterized in that; Described method is based on the Ethernet ring protection turning protocol of VPN, and the Ethernet ring protection turning protocol frame structure of VPN is: destination address, source address, S-TAG label, ethernet type, ring protection switching messages (R-APS Message), check and; Described S-TAG field is used for identifying different VPN protection instances.
6. the many instances Ethernet ring protection reverse method based on VPN according to claim 5 is characterized in that, the S-TAG label in each VPN protection instance is unique.
7. the many instances Ethernet ring protection reverse method based on VPN according to claim 1; It is characterized in that; Described Ethernet ring protection instance is at same physical port, according to different virtual private network service groups, creates at least more than one Ethernet ring protection instance.
8. the many instances Ethernet ring protection reverse method based on VPN according to claim 1; It is characterized in that; Described virtual private network service group is that the virtual private network service with identity logic topology forms a group, can be mapped in one or more Ethernet ring protection instance.
CN201110245057A 2011-08-25 2011-08-25 Virtual-private-network-based multi-instance Ethernet ring protection switching method Pending CN102307132A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110245057A CN102307132A (en) 2011-08-25 2011-08-25 Virtual-private-network-based multi-instance Ethernet ring protection switching method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110245057A CN102307132A (en) 2011-08-25 2011-08-25 Virtual-private-network-based multi-instance Ethernet ring protection switching method

Publications (1)

Publication Number Publication Date
CN102307132A true CN102307132A (en) 2012-01-04

Family

ID=45380945

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110245057A Pending CN102307132A (en) 2011-08-25 2011-08-25 Virtual-private-network-based multi-instance Ethernet ring protection switching method

Country Status (1)

Country Link
CN (1) CN102307132A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102754390A (en) * 2012-04-28 2012-10-24 华为技术有限公司 Method, network device and system for ethernet ring protection switching
CN104350504A (en) * 2012-02-10 2015-02-11 爱迪德加拿大公司 Method and apparatus for program flow in software operation
CN104486190A (en) * 2014-12-23 2015-04-01 上海斐讯数据通信技术有限公司 Method for Ethernet multi-network switching

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007128399A1 (en) * 2006-05-04 2007-11-15 Nokia Siemens Networks Gmbh & Co. Kg Automatic packet protection forwarding to an mpls network by a dual-homed ethernet bridge
CN102014006A (en) * 2010-12-23 2011-04-13 杭州依赛通信有限公司 Ethernet ring protection switching method for hybrid network
CN102014034A (en) * 2010-12-06 2011-04-13 杭州依赛通信有限公司 Layering virtual network based on tree virtual local area network (VLAN) and configuration method thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007128399A1 (en) * 2006-05-04 2007-11-15 Nokia Siemens Networks Gmbh & Co. Kg Automatic packet protection forwarding to an mpls network by a dual-homed ethernet bridge
CN102014034A (en) * 2010-12-06 2011-04-13 杭州依赛通信有限公司 Layering virtual network based on tree virtual local area network (VLAN) and configuration method thereof
CN102014006A (en) * 2010-12-23 2011-04-13 杭州依赛通信有限公司 Ethernet ring protection switching method for hybrid network

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104350504A (en) * 2012-02-10 2015-02-11 爱迪德加拿大公司 Method and apparatus for program flow in software operation
US9934374B2 (en) 2012-02-10 2018-04-03 Irdeto B.V. Method and apparatus for program flow in software operation
CN102754390A (en) * 2012-04-28 2012-10-24 华为技术有限公司 Method, network device and system for ethernet ring protection switching
CN102754390B (en) * 2012-04-28 2015-06-17 华为技术有限公司 Method, network device and system for ethernet ring protection switching
US9246751B2 (en) 2012-04-28 2016-01-26 Huawei Technologies Co., Ltd. Ethernet ring protection switching method, network device and system
CN104486190A (en) * 2014-12-23 2015-04-01 上海斐讯数据通信技术有限公司 Method for Ethernet multi-network switching

Similar Documents

Publication Publication Date Title
CN101072237B (en) Eth-loop intelligent protection method
CN103053139B (en) Message processing method and system
US7924705B2 (en) Method and system for span-based connection aggregation
CN102377605B (en) Method for implementing double-returning protection of packet transport network (PTN) equipment by using combination of multiple protection modes
CN104980372A (en) Relay System And Switching Device
CN101438538A (en) Communication system, node, terminal, communication method, and program
CN101272310B (en) Ethernet looped network automatic protection rotation method and device
CN103607293B (en) A kind of flow rate protecting method and equipment
CN108900415A (en) Master-slave equipment switching method and system under fault of M L AG interface
CN101656630A (en) Service protection method and system
CN102668452A (en) Method of M:1 protection
CN105490937B (en) Ether virtual network gateway switching method and service provider's edge node devices
CN101674217B (en) Method for realizing permanent ring network protection in MESH network
CN101789879A (en) Dynamic maintenance method and device for related link circuits
CN1933422B (en) Network trouble switching method
CN101848035B (en) The method of share protect, system and node device in a kind of OTN network
CN102957588A (en) Method and system for protecting looped network from broadcast storm
CN104506614A (en) Design method for distributed multi-activity data center based on cloud computing
CN101986615B (en) Multiple-ring Ethernet and protection method thereof
CN102307132A (en) Virtual-private-network-based multi-instance Ethernet ring protection switching method
JP5491623B2 (en) Address refresh method and system
CN103078777A (en) Method and device for eliminating loop in resilient packet ring network
CN102724096A (en) Mixed ring network protection method and network equipment
CN102014006B (en) Ethernet ring protection switching method for hybrid network
CN102215165B (en) A kind of message processing method of tangent ring networks and Ethernet switch

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20120104