CN102377627A - Topological convergence method and service provider edge device (PE) - Google Patents

Topological convergence method and service provider edge device (PE) Download PDF

Info

Publication number
CN102377627A
CN102377627A CN2010102518981A CN201010251898A CN102377627A CN 102377627 A CN102377627 A CN 102377627A CN 2010102518981 A CN2010102518981 A CN 2010102518981A CN 201010251898 A CN201010251898 A CN 201010251898A CN 102377627 A CN102377627 A CN 102377627A
Authority
CN
China
Prior art keywords
mac address
address space
message
mac
subclauses
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010102518981A
Other languages
Chinese (zh)
Inventor
杨美琴
金利忠
王玉保
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN2010102518981A priority Critical patent/CN102377627A/en
Priority to PCT/CN2011/074663 priority patent/WO2012016471A1/en
Publication of CN102377627A publication Critical patent/CN102377627A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Small-Scale Networks (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a topological convergence method and service provider edge device (PE) for virtual private local area network service (VPLS). The method comprises the steps as follows: the PE receives a message of canceling a medium access control (MAC) address; the PE analyses the message to obtain an MAC address space identifier; the PE deletes a corresponding MAC address item in the MAC address space corresponding to the MAC address space identifier; and when a received message belongs to the MAC address space identifier, the PE floods the message and relearns the MAC address item. The invention reduces the flooding and relearning of the MAC address.

Description

A kind of topological convergence method and service provider edge devices
Technical field
The present invention relates to the communications field, in particular to a kind of topological convergence method that is used for VPLS (Virtual Private LAN Service, virtual special local area network service) and service provider edge devices (Provider Edge, PE).
Background technology
VPLS provides a virtual local area network (LAN) for the user, and it possesses the function of inundation, MAC (Media Access Control, media interviews control) address learning, forwarding and filtration Ether frame.Be used to carry under the situation of two-way (both direction is designated as direction 1 and direction 2 respectively) data flow at the VPLS instance; When the data flow of direction 1 is forwarded; Chain of command can be that the data flow of direction 2 is set up forwarding entry and formed forward-path through the source MAC study mechanism; Thereby the data flow that makes direction 2 is broken away from the inundation state, follow-uply just can directly carry out ether and has exchanged.Therefore, can put it briefly, the data flow of direction 1 can be directed to the data flow of direction 2 (just in the opposite direction) on the identical path.
In the protection of accomplishing the PE node of direction 1 at forwarding face was switched, this switching just can be reached for the guiding that the actual effect of direction 2 need depend on the data flow of direction 1.But " two-way " character of data flow mostly just is a kind of statistical nature, can not guarantee that data flow is two-way really in certain less period, the current data flow that but possibly temporarily only have direction 2 in network during switching; At this moment, the data flow of direction 2 will mail to the PE node that had lost efficacy, thereby causes the interruption of the data flow of direction 2.
In order to address this problem; Proposed among the RFC4762 through the LDP Address Withdraw message (MAC Address is cancelled message) of sending band MAC List TLV (MAC show type lengths values) delete in the VPLS instance all be suspect to be the MAC Address clauses and subclauses that lost efficacy mechanism so that its can relearn, thereby the quick convergence effect when having guaranteed temporarily to have only unidirectional traffic after the switching.
In the above-mentioned correlation technique; When in the VPLS instance, having a plurality of MAC Addresss space (for example; During the model3 that in the VPLS instance is selected RFC4664, defines), every AC (Attach Circuit, connecting circuit) or spoke PW (Pseudo Wire; Pseudo-line) generally can not belong to all address spaces of this instance, but only belong to one of them or space, a part of address.But; RFC4762 does not distinguish the different MAC Addresss space in the same VPLS instance with MAC address withdrawal (MAC Address is cancelled) mechanism among the draft-ietf-l2vpn-vpls-ldp-mac-opt; Therefore can make that the MAC Address space that originally not influenced by this topologies change also comes into the picture; Cause unnecessary MAC Address inundation thus and relearn that this will bring the consumption of the network bandwidth and the decline of systematic function.
Summary of the invention
Main purpose of the present invention is to provide a kind of topological convergence method and service provider edge devices, is used for after network topology change, the inundation that reduces MAC Address with relearn.
According to an aspect of the present invention, the topological convergence method of a kind of VPLS of being used for is provided, has comprised: PE receives the message of cancelling MAC Address; PE resolves from message and obtains the MAC Address space identification; Corresponding M AC address entry in the corresponding MAC Address of the PE deletion MAC Address space identification space; When the message that receives belonged to the MAC Address space identification, message is carried out inundation to PE and the MAC Address clauses and subclauses relearn.
According to a further aspect in the invention, the PE of a kind of VPLS of being used for is provided, has comprised: receiver module is used to receive the message of cancelling MAC Address; Parsing module is used for obtaining the MAC Address space identification from the message parsing; Removing module is used to delete corresponding M AC address entry in the MAC Address space identification institute corresponding MAC Address space; Study module is used for when the message that receives belongs to the MAC Address space identification, and message is carried out inundation to PE and the MAC Address clauses and subclauses relearn.
Topological convergence method and the PE that is used for VPLS of the present invention; Only the MAC Address space of MAC Address Space sign appointment is carried out inundation and relearned; Having solved correlation technique need carry out inundation and the problem that relearns to all MAC Address spaces, thus the inundation that has reduced MAC Address with relearn.
Description of drawings
Accompanying drawing described herein is used to provide further understanding of the present invention, constitutes the application's a part, and illustrative examples of the present invention and explanation thereof are used to explain the present invention, do not constitute improper qualification of the present invention.In the accompanying drawings:
Fig. 1 shows the flow chart according to the topological convergence method that is used for VPLS of the embodiment of the invention;
Fig. 2 shows MTU-s in the VPLS network according to the preferred embodiment of the invention and calculates after the forwarding state sketch map of clauses and subclauses in each MAC Address space;
Fig. 3 shows the sketch map of the VPLS networking of another preferred embodiment of the present invention;
Fig. 4 shows VPLS networking data flow among Fig. 3 and transmits after a period of time the sketch map of each MAC Address space M AC clauses and subclauses under the VPLS instance;
Fig. 5 shows based on 2. planting MAC address withdraw message mechanism among the present invention, and MTU-s recomputates after the forwarding state sketch map of each MAC Address space M AC clauses and subclauses under the VPLS instance;
Fig. 6 shows based on 3. planting MAC address withdraw message mechanism among the present invention, and MTU-s recomputates after the forwarding state sketch map of each MAC Address space M AC clauses and subclauses under the VPLS instance;
Fig. 7 shows the sketch map according to the PE that is used for VPLS of the embodiment of the invention.
Embodiment
Hereinafter will and combine embodiment to specify the present invention with reference to accompanying drawing.Need to prove that under the situation of not conflicting, embodiment and the characteristic among the embodiment among the application can make up each other.
Fig. 1 shows the flow chart according to the topological convergence method that is used for VPLS of the embodiment of the invention, comprising:
Step S10, PE receive the message (for example, the MAC address withdraw message of pseudo-line PW) of cancelling MAC Address;
Step S20, PE resolve from message and obtain MAC Address space identification (for example MAC Address Space ID);
Step S30; Corresponding M AC address entry in the PE deletion MAC Address space identification institute corresponding MAC Address space; That is, PE only deletes under the VPLS instance in a plurality of MAC Addresss space, by corresponding M AC address entry in the specified MAC Address space of MAC Address space identification;
Step S40, when the message that receives belonged to the MAC Address space identification, message is carried out inundation to PE and the MAC Address clauses and subclauses relearn.
The foregoing description redetermination MAC Address Space sign, be used to carry the sign in the MAC Address space of appointment under the VPLS instance, remove corresponding M AC address entry in its MAC Address space according to this sign.In a MAC address withdraw message, can comprise one or more MAC Address Space signs.In the VPLS instance, exist under the scene in many MAC Addresss space, when network topology structure changes, in triggering the MAC address withdraw message of sending, carry MAC Address Space sign.When PE receives this MAC address withdraw message, only delete corresponding M AC address entry in the MAC Address space of appointment in the sign of MAC Address Space under the VPLS instance.
In the prior art; There is not MACAddress Space sign in the MAC address withdraw message; PE1, PE2 and PE3 can carry out MAC address withdrawal handling process (by RFC4762 and draft-ietf-l2vpn-vpls-ldp-mac-opt definition) to the MAC clauses and subclauses in all MAC Address spaces; Final do not receive MAC Address space that this topologies change influences originally after carrying out this MAC address withdrawal handling process, have part MAC (like the MAC of the PC in this example 1001) clauses and subclauses yet and deleted.Before these are able to carry out mac learning again by the mistake MAC Address clauses and subclauses of deleting, the inundation state that corresponding discharge can be for some time, thereby waste bandwidth resource.
And this convergence method adopts the MAC Address Space sign of redetermination; Make and not can not deleted by the MAC Address clauses and subclauses in the MAC Address space that this topologies change influences by mistake; Can not return back to the inundation state so go to the message of other address spaces; After searching MAC and transmitting, can directly issue the address entry of these address spaces, thereby reduce the network bandwidth that CPU consumes and inundation takies that MAC Address is heavily learnt, improve the performance of system.
Preferably, the value of MAC Address space identification is the mapping of VLAN ID VLAN ID or VLAN ID.For example the A of department in the enterprise switches, and when generating MACAddress Space ID, can settings be the VLAN ID of the A of department.This scheme is simple.
Preferably, MAC address withdraw message is carried non-NULL MAC table type lengths values MAC List TLV and MAC Address space identification, and step S30 comprises: the specified MAC Address clauses and subclauses of non-NULL MAC List TLV in the MAC Address space of PE deletion appointment.If the recipient is not familiar with this sign, then still presses existing protocol and handle.
Preferably, MAC address withdraw message is carried empty MAC table type lengths values MAC List TLV and MAC Address space identification, and step S30 comprises: PE only preserves corresponding M AC address entry in the MAC Address space of switching back link and appointment.That is, PE has many PW, and except the MAC Address of the PW that receives MAC address withdraw message kept, PE all deleted the MAC Address of other PW among these many PW so.
Preferably, MAC address withdraw message is carried PE ID TLV and MACAddress Space sign, and step S30 comprises: the MAC Address clauses and subclauses of learning from the specified PW of PE ID TLV in the MAC Address space of PE deletion appointment.
RFC4762 has defined two kinds of MAC address withdraw message, and wherein: 1. a kind of MAC address withdraw message is carried the MAC List TLV of non-NULL, explicit MAC Address clauses and subclauses of having specified considered repealed among this TLV; 2. a kind of MAC address withdraw message is carried empty MAC List TLV, and it will cause receiving terminal only to trust its transmitting terminal, and suspects all other PE (outlet will be deleted for the MAC Address clauses and subclauses of these PE).3. optimize option for one that in draft-ietf-l2vpn-vpls-ldp-mac-opt, has defined second kind of MAC address withdraw message again, it is through the explicit PE node that inefficacy takes place of having specified of PE ID TLV.The invention provides above-mentioned three preferred embodiments, all applicable in above three kinds of MAC address withdraw message, thus enlarged range of application.When MAC address withdraw message carries MAC Address Space sign; MAC Address Space sign can act on whole message; Also can act on MAC List TLV; Its sphere of action needs in message, to indicate, if recipient's understanding should identify, then must be confined to the MAC Address Space inner (handling process after scope limits is consistent with existing protocol) of appointment to the processing of this message or MAC List TLV; If the recipient is not familiar with this sign, then still presses existing protocol and handle.
Preferably, the step, PE received message, promptly receive go to corresponding M AC address article target flow after, PE starts the processing of unknown unicast, in the process of unknown unicast to the MAC Address space inundation of appointment with relearn.This method is simple.
Preferably, in above-mentioned method, also comprise: PE receives the unicast traffic of the MAC Address clauses and subclauses in the MAC Address space outside the MAC Address space of going to appointment in a plurality of MAC Addresss space; If before deletion corresponding M AC address entry; PE is the processing that clean culture is transmitted to these unicast traffics startups; Then after deletion corresponding M AC address entry, the processing that PE still transmits these unicast traffic unicast is directly carried out clean culture with unicast traffic and is transmitted.Present embodiment makes and can not cause these unicast traffics to deteriorate to unknown unicast because MAC Address cancels the processing of message in the clean culture repeating process and since to other MAC Address spaces no longer inundation with relearn, so improved the efficient of VPLS.
Fig. 2 shows MTU-s in the VPLS network according to the preferred embodiment of the invention and calculates after the forwarding state sketch map of clauses and subclauses in each MAC Address space.CE converges a plurality of VLAN of user and inserts MTU-s equipment and (also can directly insert PE; MTU-s is the Service Access Point that provides for the A of enterprise); At MTU-s and the PE its upper side VPLS of administration instance; Divide the inner MAC Address space of VPLS instance (in this example, through using the model3 model to divide) then and set up 1: 1 mapping relations (in this example, directly with user's VLAN ID as the MAC Address space identification) with user's VLAN.The MTU-s dual homed inserts the VPLS core network (in following example; Accomplish dual homed through PW5 and PW6); And (in this example, PW5 is designated as primary PW (main PW), and PW6 is designated as secondary PW (inferior PW) on MTU-s, to specify the preference attribute of two PW; Primary PW will preferentially be used for data forwarding than secondary PW, and the essence of preference attribute is exactly to have embodied operator's certain attribute to the preference degree of two PW).Form among Fig. 2 is to remove the MAC clauses and subclauses of specifying the MAC Address space after the change in topology, does not also have new flow to transmit the state of transmitting that relearns the MAC clauses and subclauses.
In this example; The forwarding state of two PW of MTU-s calculating (in this example; PW5 is because the preference attribute with higher level is chosen as active PW (activating PW), and PW6 then becomes standby PW (subsequent use PW); Active PW is exactly the PW that is actually used in forwarding), the essence that forwarding state is calculated is exactly to determine which bar PW to be actually used in forwarding.
After data flow through was after a while transmitted (can carry out source MAC study simultaneously automatically), the chain of command state tended towards stability, at this moment; The MAC Address of PC501, PC502 and the PC801 that connects through CEa1; Learnt by PE1 via current active PW (being PW5 in this example), acquired by PE3 via PW1 again, like this; When PE3 receives the flow of going to PC501; Will these flows be sent from PW1, final MTU-s can receive from current active PW (being PW5 this example) and be transmitted to CEa1 then by these flows.
When present active PW (being PW5 in this example) lost efficacy, MTU-s can perception this incident (if node fails does not take place PE1, PE1 also can this incident of perception) and recomputate active PW (PW6 becomes new active PW in this example); Simultaneously; In order to accelerate the convergence of network topology, the transmission that needs to trigger MAC address withdraw message (can be triggered by MTU-s, if node fails does not take place PE1; Also can trigger by PE1; Trigger by MTU-s in this example), send MAC addresswithdraw message by MTU-s to PE2, and then trigger PE2 other PE equipment in the H-VPLS core network and send MAC address withdraw message.Not only carry existing TLV such as FEC TLV (the VPLS instance under being used for confirming) and MAC List TLV in the MAC address withdraw message; Also carry the MAC Address Space sign of redetermination among the present invention, wherein the value of MAC Address Space-ID is the MAC Address space identification symbol (operator directly specifies the user vlan ID to be linked into MTU-s to accord with as the MAC Address space identification in this example) of operator's appointment.As for the A of enterprise; The corresponding VPLS instance (the FEC TLV from MAC address withdraw message can be known) of PE 2, PE 1, PE 3 A of unit deletion enterprise MAC Address space identification down is a corresponding M AC address entry in 50 and 80 the MAC Address space, and the MAC Address space identification is that 100 MAC Address space is not involved.
When PE 3 receives the flow of going to PC 501; Because the MAC Address clauses and subclauses of PC 501 have been deleted on PE 3; With the handling process of walking unknown unicast, carry out the inundation of message, and then PC 501 can receive this flow from current active PW (being PW 6 this example).After treating that flow that PC 501 sends passes CEa 1 and arrives PE 2 and then arrive PE 3 via current active PW (being PW 6 in this example) with MTU-s; Just can relearn the MAC Address of PC 501 grades on the PE 3; Think that it at PW 3 behind; After this, the flow to PC 501 has just been broken away from the inundation state on the PE 3.
When PE 3 receives the flow of going to PC 1001; Owing to still exist the MAC of MACAddress Space 100 to transmit on the PE 3, its flow is transmitted unaffected, still carries out clean culture and transmits; Directly be transmitted to CEa 2, and need do not carry out the broadcasting flood process of message.
Fig. 3 shows the sketch map of the VPLS networking of another preferred embodiment of the present invention.There are Logistics Department, two departments of research and development department in the enterprise A inside of Fig. 3, requires isolated between all departments and the MAC Address space is independently, has only same department inside just can communicate by letter.Reach this MAC Address space independence through the mode that all departments is divided into different VLAN in the A of the enterprise private network; When the VPLS of its access carrier service, require operator must guarantee that the independence in MAC Address space between all departments do not lose because of operator's self networks deployment factor.Operator provides VPLS service through the VPLS instance of model3 model for the A of enterprise, and MTU-s is its Service Access Point that provides for the A of enterprise, and it is dual-homed to be in order to improve reliability of service to two N-PE.Operator is before the flow of acceptance and transmission user; Need divide the inner MAC Address space of VPLS instance then according to networking among Fig. 3 at MTU-s and the PE its upper side VPLS of administration instance, directly generate the MAC Address space in the VPLS instance in this example according to C-VLAN; In Fig. 3; Have two MAC Address spaces under the VPLS A instance, MAC Address Space50 and MAC Address Space 100,50 and 100 whiles here also are the values of the inner VLAN ID of the A of enterprise.The research and development department of the A of enterprise inserts core net through MTU-s; MTU-s through PW 7 and PW 8 dual homeds in the VPLS core network; And be that primary PW is (when it is effective specifying PW 7 on the MTU-s; First-selection is active PW), PW 8 is secondary PW (when PW 7 was active PW, it was standby PW).Logistics Department directly inserts PE 1 through CEa 2 equipment.Near PE 2 and PE 4 equipment, all have research and development department and Logistics Department, they directly insert PE 2 and PE 4 through CE.
Fig. 4 shows VPLS networking data flow among Fig. 3 and transmits after a period of time the sketch map of each MAC Address space M AC clauses and subclauses under the VPLS instance.After MTU-s calculated forwarding state, PW 7 was active PW, and PW 8 is standby PW.Flow is transmitted a period of time in whole network after, can carry out source MAC study simultaneously automatically, the chain of command state tends towards stability, and the MAC Address clauses and subclauses have all been filled in each the independent MAC Address space under the VPLS instance A.As shown in Figure 4, through the equipment PC 501 that CEa 1 connects, the MAC Address of PC 502 is learnt by PE 1 via current active PW (PW 7), is learnt by PE 1 via CEa 2 through the equipment PC 1001 of CEa2 connection and the MAC Address of PC 1002.And they are learnt by PE 2 and PE 4 respectively via PW 1 and PW 6 again.
When present active PW (PW7) lost efficacy, MTU-s can this incident of perception (if node fails does not take place PE 1, PE 1 also can this incident of perception) and recomputate active PW; PW 8 becomes new active PW, simultaneously, and in order to accelerate the convergence of network topology; The transmission that triggers MAC address withdraw message (can be triggered by MTU-s; If node fails does not take place in PE 1, also can trigger by PE 1, trigger by MTU-s in this example); Send MAC address withdraw message by MTU-s to PE 2, and then trigger PE 2 other PE equipment in the H-VPLS core network and send MAC address withdraw message.
Two kinds of MAC address withdraw message describe to send 2. 3. respectively in this case study on implementation.
1, MTU-s sends the and 2. plants MAC address withdraw message
Carry empty MAC List TLV in the MAC address withdraw message and identify with MACAddress Space, wherein the value of MAC Address Space-ID is the VLAN ID of the CE that inserted of MTU-s equipment, promptly 50.After PE 2 receives this MAC address withdraw message, at first from FEC TLV, identify the VPLS instance A that needs the corresponding MAC Address clauses and subclauses of deletion.From MAC Address Space sign, identify the MAC Address space 50 that is involved under this VPLS instance.Because that carry in the MAC address withdraw message is sky MAC List TLV, so PE 2 is that the MAC Address clauses and subclauses of non-PW8 are all deleted with MAC Address space 50 inner outlets under the VPLS A instance.Simultaneously, other PE equipment of PE 2 all in fully-connected network sends MACaddress withdraw message.After PE 1, PE 3 and PE 4 receive this MAC address withdraw message; Equally with the corresponding MAC Address clauses and subclauses deletion in the MAC Address space under the VPLS A instance (from FEC TLV, knowing) 50; As shown in Figure 5; It receives all that for all devices the MAC after the MAC address withdraw message transmits the result, therefrom can be clear that very much, and the MAC clauses and subclauses in MAC Address space 100 are not affected.
At this moment; If need communication between PC 1003 and the PC 1001, after flow sends arrival PE 1 from PC 1001, search the mac address forwarding table of VPLS A instance; The MAC that hits PC1003 transmits clauses and subclauses; Directly flow is mail to PW 4 paths, and need not remake the unknown unicast inundation processing of message, thereby saved bandwidth consumption.If need communication between PC 504 and the PC 503; After flow arrived PE 2 from PC 504, the MAC that PE 2 searches under the VPLS A instance transmitted, the clauses and subclauses of miss PC 503 correspondences; Thereby need walk the handling process of unknown unicast message inundation, also need take certain bandwidth resources.3. plant MAC address withdraw message through sending, can address this problem.
2, MTU-s sends the and 3. plants MAC address withdraw message
MAC address withdraw message is carried PE ID TLV and MAC Address Space sign; Wherein the value of MAC Address Space-ID is the VLAN ID (50) of the CE that inserted of MTU-s equipment, and PE ID TLV is explicit have been specified PE 1 node that lost efficacy takes place.After PE 2 receives MAC address withdraw message, at first from FEC TLV, identify the VPLS instance A that needs the corresponding MAC Address clauses and subclauses of deletion.From PE IDTLV, identifying the node that takes place to lose efficacy is PE1 equipment.From MAC Address Space sign, identify the MAC Address space 50 that is involved under this VPLS instance.Therefore, PE 2 all deletes the MAC Address clauses and subclauses that MAC Address space 50 inner outlets under the VPLS A instance point to PE1 equipment.Simultaneously, other PE equipment of PE 2 all in fully-connected network sends MAC address withdraw message.After PE 1, PE 3 and PE 4 receive MAC address withdraw message; Equally with VPLS A instance (from FEC TLV, knowing) the MAC Address clauses and subclauses deletion of MAC Address space 50 inner outlets sensing PE 1 equipment down; As shown in Figure 6; It receives all that for all devices the MAC after the MAC address withdraw message transmits the result, therefrom can be clear that very much, and the MAC clauses and subclauses in MAC Address space 100 are not affected.
At this moment, if need communication between PC 504 and the PC 503, after flow arrives PE 2 from PC 504; The MAC that PE 2 searches under the VPLS A instance transmits; Hit the MAC Address clauses and subclauses of PC 503 correspondences, directly flow is mail to PW 6, thereby avoid away the handling process of unknown unicast message inundation; Reduce the network bandwidth that CPU consumes and inundation takies that MAC Address is heavily learnt, improved the efficient of system.
Fig. 7 shows the sketch map according to the PE that is used for VPLS of the embodiment of the invention, comprising:
Receiver module 10 is used to receive the message of cancelling MAC Address;
Parsing module 20 is used for obtaining the MAC Address space identification from the message parsing;
Removing module 30 is used for only deleting a plurality of MAC Addresss space under the VPLS instance, by corresponding M AC address entry in the specified MAC Address space of MAC Address space identification;
Study module 40, be used for to the MAC Address space inundation of appointment with relearn.
This PE can resolve the MAC Address Space sign of redetermination; Make and not can not deleted by the MAC Address clauses and subclauses in the MAC Address space that this topologies change influences by mistake; Can not return back to the inundation state so go to the message of other address spaces; After searching MAC and transmitting, can directly issue the address entry of these address spaces, thereby reduce the network bandwidth that CPU consumes and inundation takies that MAC Address is heavily learnt, improve the performance of system.
Preferably, removing module 30 comprises:
First module is used for when message is carried non-NULL MAC List TLV and MAC Address space identification, the specified MAC Address clauses and subclauses of non-NULL MAC List TLV in the MAC Address space of deletion appointment;
Second module when being used for message and carrying empty MAC List TLV with the MAC Address space identification, is only preserved corresponding M AC address entry in the MAC Address space of switching afterwards link and appointment;
Three module, when being used for message and carrying PE ID TLV and MAC Address space identification, the MAC Address clauses and subclauses of learning from the specified PW of PE ID TLV in the MAC Address space of deletion appointment.
This preferred embodiment can be applied to the MAC address withdraw message of three kinds of different-formats.
Preferably, after study module 40 is used to receive message, promptly receive go to corresponding M AC address article target flow after, start the processing of unknown unicast, in the process of unknown unicast, message is carried out inundation and the MAC Address clauses and subclauses relearn.This embodiment is simple.
In the prior art; There is not MAC Address Space sign in the MAC address withdraw message; PE 1, PE 2 and PE 3 can carry out MAC address withdrawal handling process (by RFC4762 and draft-ietf-l2vpn-vpls-ldp-mac-opt definition) to the MAC clauses and subclauses in all MAC Address spaces; Final do not receive MAC Address space (like the MAC Address Space100 in this example) that this topologies change influences originally after carrying out this MAC address withdrawal handling process, have part MAC (like the MAC of the PC in this example 1001) clauses and subclauses yet and deleted.Before these MAC Address clauses and subclauses of being deleted by mistake are able to carry out mac learning again, corresponding discharge (as arriving the flow of PC 1001 in this example) meeting inundation state for some time, thereby waste bandwidth resource.
And the present invention adopts the MAC Address Space sign of redetermination; Can not cause not receiving the MAC Address clauses and subclauses in the MAC Address space that this topologies change influences to be deleted (in this example by mistake; The MAC Address clauses and subclauses of MAC Address Space 100 are not affected on PE 3); Can not return back to the inundation state so go to the message of PC 1001; After searching MAC and transmitting, directly issue CEa 2, thereby reduced the network bandwidth that CPU consumes and inundation takies that MAC Address is heavily learnt, improved the performance of system.
Obviously, it is apparent to those skilled in the art that above-mentioned each module of the present invention or each step can realize with the general calculation device; They can concentrate on the single calculation element; Perhaps be distributed on the network that a plurality of calculation element forms, alternatively, they can be realized with the executable program code of calculation element; Thereby; Can they be stored in the storage device and carry out, and in some cases, can carry out step shown or that describe with the order that is different from here by calculation element; Perhaps they are made into each integrated circuit modules respectively, perhaps a plurality of modules in them or step are made into the single integrated circuit module and realize.Like this, the present invention is not restricted to any specific hardware and software combination.
The above is merely the preferred embodiments of the present invention, is not limited to the present invention, and for a person skilled in the art, the present invention can have various changes and variation.All within spirit of the present invention and principle, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. a topological convergence method is characterized in that, comprising:
Provider Edge equipment PE receives the message of cancelling media interviews control MAC Address;
Said PE resolves from said message and obtains the MAC Address space identification;
Said PE deletes corresponding M AC address entry in the said MAC Address space identification corresponding MAC Address space;
When the message that receives belonged to said MAC Address space identification, said message is carried out inundation to said PE and the MAC Address clauses and subclauses relearn.
2. method according to claim 1 is characterized in that, the value of said MAC Address space identification is the mapping of VLAN ID VLAN ID or VLAN ID.
3. method according to claim 1; It is characterized in that; Said message is carried non-NULL MAC table type lengths values MAC List TLV and said MAC Address space identification, and said PE deletes that corresponding M AC address entry comprises in the said MAC Address space identification institute corresponding MAC Address space:
Said PE deletes the specified MAC Address clauses and subclauses of said non-NULL MACList TLV in the MAC Address space of said appointment.
4. method according to claim 1; It is characterized in that; Said message is carried empty MAC table type lengths values MAC List TLV and said MAC Address space identification, and said PE deletes that corresponding M AC address entry comprises in the said MAC Address space identification institute corresponding MAC Address space:
Said PE only preserves corresponding M AC address entry in the MAC Address space of switching back link and said appointment.
5. method according to claim 1 is characterized in that, said message is carried PE IDTLV and said MAC Address space identification, and said PE deletes that corresponding M AC address entry comprises in the said MAC Address space identification institute corresponding MAC Address space:
Said PE deletes the MAC Address clauses and subclauses of learning from the specified PW of said PE IDTLV in the MAC Address space of said appointment.
6. method according to claim 1 is characterized in that, after said PE received said message, the processing of said PE startup unknown unicast was carried out inundation to said message in the process of said unknown unicast and the MAC Address clauses and subclauses relearn.
7. method according to claim 1 is characterized in that, also comprises:
Said PE receives the unicast traffic of the MAC Address clauses and subclauses in the MAC Address space outside the MAC Address space of going to appointment described in said a plurality of MAC Addresss space;
As if before the corresponding MAC Address clauses and subclauses of deletion, said PE is the processing that clean culture is transmitted to said unicast traffic execution, and then after the corresponding MAC Address clauses and subclauses of deletion, said PE is to the processing of said unicast traffic unicast forwarding.
8. a Provider Edge equipment PE is characterized in that, comprising:
Receiver module is used to receive the message of cancelling MAC Address;
Parsing module is used for obtaining the MAC Address space identification from said message parsing;
Removing module is used to delete said MAC Address space identification corresponding M AC address entry;
Study module is used for when the message that receives belongs to said MAC Address space identification, and said message is carried out inundation and the MAC Address clauses and subclauses relearn.
9. PE according to claim 8 is characterized in that, said removing module comprises:
First module is used for when said message is carried non-NULL MAC List TLV and said MAC Address space identification, deletes the specified MAC Address clauses and subclauses of said non-NULL MAC List TLV in the MAC Address space of said appointment;
Second module when being used for said message and carrying empty MAC List TLV and said MAC Address space identification, is only preserved corresponding M AC address entry in the MAC Address space of switching back link and said appointment;
Three module when being used for said message and carrying PE ID TLV and said MAC Address space identification, is deleted the MAC Address clauses and subclauses of learning from the specified PW of said PE IDTLV in the MAC Address space of said appointment.
10. PE according to claim 8 is characterized in that, after said study module was used to receive said message, the processing of startup unknown unicast was carried out inundation to said message in the process of said unknown unicast and the MAC Address clauses and subclauses relearn.
CN2010102518981A 2010-08-05 2010-08-05 Topological convergence method and service provider edge device (PE) Pending CN102377627A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN2010102518981A CN102377627A (en) 2010-08-05 2010-08-05 Topological convergence method and service provider edge device (PE)
PCT/CN2011/074663 WO2012016471A1 (en) 2010-08-05 2011-05-25 Topology convergence method and service provider edge

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010102518981A CN102377627A (en) 2010-08-05 2010-08-05 Topological convergence method and service provider edge device (PE)

Publications (1)

Publication Number Publication Date
CN102377627A true CN102377627A (en) 2012-03-14

Family

ID=45558932

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010102518981A Pending CN102377627A (en) 2010-08-05 2010-08-05 Topological convergence method and service provider edge device (PE)

Country Status (2)

Country Link
CN (1) CN102377627A (en)
WO (1) WO2012016471A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103634192A (en) * 2013-11-28 2014-03-12 瑞斯康达科技发展股份有限公司 PW (pseudo wire) MAC (media access control) deletion method and device, PW MAC revocation information transmission method and device, and two-layer network system
WO2016082457A1 (en) * 2014-11-25 2016-06-02 中兴通讯股份有限公司 Media access control address convergence method and apparatus, and storage medium
CN109803031A (en) * 2019-01-14 2019-05-24 烽火通信科技股份有限公司 A kind of method and system that MAC Address quickly cancels

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101110747A (en) * 2007-09-12 2008-01-23 华为技术有限公司 Method, device and system for eliminating medium accesses to control address
CN101123531A (en) * 2006-12-30 2008-02-13 华为技术有限公司 Convergence method and device based on VPLS dual home full connection network
CN101510837A (en) * 2009-04-01 2009-08-19 福建星网锐捷网络有限公司 Ethernet bridge equipment, method and equipment for migrating polymerization mouth address

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101123531A (en) * 2006-12-30 2008-02-13 华为技术有限公司 Convergence method and device based on VPLS dual home full connection network
CN101110747A (en) * 2007-09-12 2008-01-23 华为技术有限公司 Method, device and system for eliminating medium accesses to control address
CN101510837A (en) * 2009-04-01 2009-08-19 福建星网锐捷网络有限公司 Ethernet bridge equipment, method and equipment for migrating polymerization mouth address

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
M. LASSERRE, ED.ET AL.: "《Virtual Private LAN Service (VPLS) Using Label Distribution Protocol (LDP) Signaling》", 31 January 2007, article "Virtual Private LAN Service over LDP", pages: 11 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103634192A (en) * 2013-11-28 2014-03-12 瑞斯康达科技发展股份有限公司 PW (pseudo wire) MAC (media access control) deletion method and device, PW MAC revocation information transmission method and device, and two-layer network system
CN103634192B (en) * 2013-11-28 2017-07-14 瑞斯康达科技发展股份有限公司 PW MAC deletions, revocation information transmission method and device and double layer network system
WO2016082457A1 (en) * 2014-11-25 2016-06-02 中兴通讯股份有限公司 Media access control address convergence method and apparatus, and storage medium
CN105703996A (en) * 2014-11-25 2016-06-22 中兴通讯股份有限公司 Media access control address convergence method and media access control address convergence device
CN109803031A (en) * 2019-01-14 2019-05-24 烽火通信科技股份有限公司 A kind of method and system that MAC Address quickly cancels

Also Published As

Publication number Publication date
WO2012016471A1 (en) 2012-02-09

Similar Documents

Publication Publication Date Title
CN110784411B (en) Method, device and system for establishing BIER forwarding table item
US7593400B2 (en) MAC address learning in a distributed bridge
CN101385288B (en) Method for managing the distribution of control protocol information in a network node and network node
CN102035729B (en) Multicast data forwarding method
CN101047601B (en) Implementing method and system of double-attach network based on VPLS
CN102025541B (en) Method and system for realizing multicast protection
CN101616014B (en) Method for realizing cross-virtual private local area network multicast
EP2555476A1 (en) Method, system and device for protecting multicast in communication network
CN100531138C (en) Operator's boundary notes, virtual special LAN service communication method and system
CN102413060B (en) User private line communication method and equipment used in VPLS (Virtual Private LAN (Local Area Network) Service) network
CN103166864B (en) A kind of private network vlan information management method and equipment
CN102075419B (en) Method for generating and transmitting three-layer virtual special network equative routing and edge router
CN103023773B (en) Method, device and system for forwarding message in multi-topology network
CN102347889B (en) Message forwarding method, system and device in H-VPLS (Hierarchical Virtual Private local area network service)
CN100364289C (en) Method for implementing layer-2 equipment interconnection in resilient packet ring (RPR) based network
CN101123531A (en) Convergence method and device based on VPLS dual home full connection network
CN114465946B (en) Method, device and system for acquiring forwarding table item
CN100435528C (en) Method for reducing learning of media accessing control address in network
CN101662426A (en) T-MPLS tunnel protection processing method and system thereof
CN101778035B (en) Virtual private LAN service communication method and device
CN102821009A (en) Method for monitoring ring network on basis of link layer discovery protocol and device
CN1964360A (en) A method and device for MAC frame forwarding
CN105187311A (en) Message forwarding method and message forwarding device
CN102185712B (en) The reverse method of VPLS network and ethernet ring network and device
CN104919767A (en) Methods and devices for implementing Shortest Path Bridging MAC mode support over a virtual private LAN service network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C05 Deemed withdrawal (patent law before 1993)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120314