Background technology
Current IP network spreads all over the world, and how to utilize existing IP network to transfer service to for enterprise provides low cost, is paid close attention to by each operator just gradually.Therefore, MPLS (Multi-Protocol Label Switching, multiprotocol label switching) VPN (VirtualPrivate Network, VPN (virtual private network)) technology is arisen at the historic moment, this technology has can provide VPN service in IP network, and has and can conveniently set the characteristics such as bandwidth rates, configuration are simple.
Vpn service based on MPLS has two kinds, is respectively L3 (Layer 3) MPLS VPN and L2 (Layer 2) MPLSVPN.L2 MPLS VPN comprises VPLS and VPWS (Virtual Pfivate Wire Service, VLL is professional), wherein VPWS is only applicable to the networking mode of point-to-point, and VPLS can realize that multiple spot is to the VPN networking of multiple spot, therefore can be for operator provide a kind of more complete solution, and can avoid access user inside route as L3 VPN.So, operator can only manage, move a network, and provides simultaneously the many services such as traditional IP service, L3VPN, L2VPN on a network, thereby avoids a large amount of construction, maintenance and the running cost of operator.
VPLS a kind ofly provides similar LAN (Local Area Network at the MPLS network, local area network (LAN)) business of service, it can make the user's who is dispersed in a plurality of geographical position equipment, being linked into same virtual network accesses mutually, from the user, it is the same that these equipment directly are linked into a LAN.VPLS is that the user extends local area network (LAN) to MAN (Metro Area Network, metropolitan area network), even on the WAN (Wide Area Network, wide area network).
VPLS has simulated the forwarding mechanism of LAN, namely by MAC (Medium Access Control, the media access control) Ethernet (Ethernet) message is transmitted in the address, carry out flood (flood, namely frame is copied to belong to the every other port except the reception sources port among the same LAN) to searching the unsuccessful frame of MAC Address.VPLS also simulates the MAC address learning function of LAN, when receiving a frame, learns the mapping relations of source MAC and the inbound port of this frame.VPLS has also simulated the broadcast capability of LAN in addition, receives and when target MAC (Media Access Control) address is the frame of broadcast address or multicast address message is carried out flood.VPLS has also simulated the MAC address aging function of LAN in addition, after certain MAC Address is arrived in study, if within a certain period of time, receives any frame from this MAC Address, thinks that then this MAC Address is invalid, need to delete in the mapping relations table of this locality.VPLS is modeled to an ethernet port to PW (Pseudo Wire, pseudo-line), and namely during learning MAC address, the port numbers in the mapping table of MAC and port also can be the corresponding relation of MAC and PW.
In the VPLS technology, all lan emulations all are to be realized by PE (ProviderEdge, Provider Edge) equipment.
In the VPLS technology is used, as CE (Custom Edge, customer edge) the PE equipment failure of equipment connection, may cause whole customer service to be interrupted, in order to guarantee the high reliability of customer service, the access VPLS that CE equipment can be dual-homed, namely CE equipment can be linked into two PE equipment of same VPLS business simultaneously, wherein CE equipment can be controlled one and be connected to master state, and another is connected to stand-by state; Dual-homed two related PE equipment also can be controlled one and be connected to primaryly, and another is for subsequent use.When wherein active link lost efficacy, CE equipment can with service traffics very fast switch to reserve link, so, can avoid service disconnection.
In the VPLS technology, also has a kind of H-VPLS (Hierarchy of VPLS) technology, this technology belongs to Hierarchical Virtual Private LAN Service, wherein PE equipment is divided into NPE (network side PE) and UPE (user's side PE), CE equipment access user-end provider edge, user-end provider edge access NPE equipment adopts full link between the NPE.This technology can be alleviated the N square of problem of the PW that the full link of PE brings, has solved largely scaling concern.In addition, similar aforementioned dual-homed protection mechanism, user-end provider edge also can be dual-homed is linked into two NPE equipment, forms backup protection mechanism.
Comprehensive aforementioned two kinds of resist technologies all are similar to the protection to link between operator and the client, in case wherein between PE and the PE (non-H-VPLS) or the PW between NPE and the NPE (H-VPLS) break down, effective method is not temporarily also proposed.
Relatively more crucial technology of VPLS is the establishment of PW, and PWE3 (Pseudo Wire Emulation Edge-to-Edge) working group of IETF (Internet Engineering Task Force, Internet Engineering task groups) has defined some standards of PW.In addition, IETF has also formulated the RFC (Request for Comments) of VPLS, and explicitly point out PWID (pseudo-line IP) for indicating traffic ID, because VPLS is comprised of a plurality of separate PW, the PWID that therefore just defines described PW must be consistent.In addition, aspect standard definition, for tlv triple (local end PE IP address of equipment, opposite end PE IP address of equipment, PWID) unique definite PW.Therefore, for a VPLS business, both required PWID to be consistent, again because the restriction of tlv triple can only be set up a PW so just limited between two PE.So according to the common processing mode of present industry, between the PE of VPLS and the PE (non-H-VPLS) or the PW unprotect function between NPE and the NPE (H-VPLS).This problem of pin not yet proposes effective solution at present.
Embodiment
Hereinafter also describe in conjunction with the embodiments the present invention in detail with reference to accompanying drawing.Need to prove that in the situation of not conflicting, embodiment and the feature among the embodiment among the application can make up mutually.
Fig. 1 is the flow chart according to the VPLS service establishing method of the embodiment of the invention.As shown in Figure 1, the VPLS service establishing method according to the embodiment of the invention comprises:
Step S102, it is professional to create VPLS at PE equipment, and is created on the traffic ID of a definite srvice instance that can be unique in this PE equipment scope for the VPLS business;
Step S104 sets up one or more PW according to above-mentioned traffic ID, specifies above-mentioned one or more PW professional corresponding to above-mentioned VPLS;
Step S106 sets up the binding relationship of above-mentioned one or more PWPW and above-mentioned VPLS business.
The VPLS service establishing method that this embodiment provides; on the basis of original VPLS service establishing method; by the Service ID (traffic ID) of relation one to one not of newly-increased special-purpose and PWID in protocol massages; between the professional PE of perfect VPLS and the PE (non-H-VPLS) or the PW defencive function between NPE and the NPE (H-VPLS); thereby strengthened the robustness of VPLS business, and improved the availability of VPLS business.Said PE equipment comprises PE and NPE in this example.
Enumerate two kinds of modes of setting up PW according to traffic ID in this preferred embodiment.Preferably, step S104 may further include one of following the processing:
(1) set up many PW between local end PE and opposite end PE, the traffic ID that many PW are corresponding is identical;
(2) set up a PW between local end PE and opposite end PE, the traffic ID that traffic ID corresponding to this PW and local end PE and PW between the PE of other opposite ends are corresponding is not identical.
The mechanism if PW needs protection is then carried out and is processed (1), set up many PW between local end PE and opposite end PE, and the service ID of these PW is identical, but PWID is different; The mechanism if PW does not need protection; then carry out and process (2); between local terminal and opposite end PE, set up a PW, and the service ID of the PW between the service ID of this PW and other any local end PE and the opposite end PE is not identical, but PWID can be identical.
Preferably, step S106 may further include following processing:
(1) local end PE is set to the binding relationship of the PW between the PE of opposite end and VPLS business;
(2) opposite end PE is set to the binding relationship of the PW between the local end PE and VPLS business.
Local end PE, opposite end PE are a kind of relative addresses, when setting up the binding relationship of PW and VPLS business, local end PE to be set first to the binding relationship of the PW between the PE of opposite end and VPLS business, also will finish opposite end PE to the setting of the binding relationship of the PW between the local end PE and VPLS business.
And the mode that the binding relationship of PW and VPLS business is set has many kinds, and this preferred embodiment provides a kind of optimal way.Preferably, local end PE is set and can comprises following processing to the binding relationship of the PW between the PE of opposite end and VPLS business:
(1) at local end PE assigned work PW and protection PW in the PW between the PE of opposite end, PW and protect PW all to be set in the binding relationship will work;
(2) specify claimed PW for protection PW.
This preferred embodiment provides a kind of simple and practical binding relationship method to set up.If local end PE needs the PW protection to the PW between the PE of opposite end; then when the binding of PW and business is set; need assigned work PW and protection PW and protect PW related PW all to be set in the binding relationship; then specifying PW to protect related PW is work PW or protection PW; protection PW can protect work PW, and also can protect PW to protect to another be duplicate protection.Certainly, if the PW between local end PE and the opposite end PE does not need the PW protection, then when the binding of PW and business is set, only need to specify the PW of binding to get final product.
Preferably, step S106 can further include following processing:
(1) local end PE is set to the PW between the PE of other opposite ends and the binding relationship of VPLS business;
(2) other opposite ends PE is set to the binding relationship of the PW between the local end PE and VPLS business.
Can set up many PW to protect according to traffic ID between professional all the corresponding PE of VPLS, can certainly only protect between certain several PE, the scope that is specifically related to need to be decided according to actual conditions.
Below in conjunction with example above preferred embodiment is elaborated.
In this example the structure of PE as shown in Figure 2, it is as follows that whole VPLS business is set up process prescription:
At first, it is professional to create VPLS at this PE, and the ServiceID of the Service ID of VPLS business and other VPLS business is not identical.
As shown in Figure 2, the professional VPLS-1 of VPLS finishes foundation jointly by PE1, PE2, PE3, and wherein PE1, PE2 and PE3 set up the VPLS business in this locality, and the Service ID of the VPLS business of establishment is 1.
After Service ID generates, then begin to create PW, as shown in Figure 3, the visioning procedure of PW comprises:
Step S302 is according to PW of IP address creation of service id, PWID and opposite end PE.
The PW that defines in the RFC of IETF 4447 standards is two-way, PW is comprised of a pair of unidirectional LSP between two-end-point PE, and wherein the PWID of this a pair of unidirectional LSP is identical, that is: a PW's of unique identification is triplet information (local end PE IP address, PE IP address, opposite end, PWID).
In example, original agreement is expanded, when local end PE is distributed the PW label to opposite end PE, in the signaling message, not only carry PE IP address, opposite end and PWID information, and the extra Service id field of carrying, at this moment, PW or unidirectional, PW is comprised of a pair of unidirectional LSP between PW end points PE, and the two tuple (ServiceID of this a pair of unidirectional LSP, PWID) identical, that is: a PW's of unique identification is quaternary group information (local end PE IP address, PE IP address, opposite end, Service ID, PWID).
Step S304 judges whether PW has the protection attribute.
In this example, whether PW has the protection attribute, needs the input of User to determine.
Step S306 if PW has the protection attribute, creates many PW between local end PE and opposite end PE, these PW with establish and to belong to the Service ID of PW of same PW protection group identical, but PWID is different.
Step S308 if PW does not possess the protection attribute, between local end PE and the opposite end PE, does not need additionally to set up PW so.
By each step more than the complete execution, can the foundation of the PW between a pair of PE be finished according to the protection setup of attribute of user to PW, the Service ID of these PW is identical, and PWID is not identical.
Because the VPLS business is multipoint service, need the together forwarding of finishing service of a plurality of PE, so just need in the set of a plurality of PE, all preferably set up in twos PW between the PE.Abovementioned steps can be set up PW between a pair of PE, therefore, only need to be in all PE set in twos between the PE, progressively carry out abovementioned steps S302, S304, S306, S308, just can finish the foundation of all PW, implementation is as follows:
PE1 as shown in Figure 2; because the PW between PE1 and the PE2 has the protection attribute; PE1 sets up one-directional dummy line PW-1 and one-directional dummy line PW-2 between PE1 and the PE2 by twice circulation execution in step S302, S304, S306; because the PW between PE1 and the PE3 does not possess the protection attribute; PE1 sets up one-directional dummy line PW-4 between PE1 and the PE3 by execution in step S302, S304, S308, and the Service ID of these pseudo-lines is 1.
PE2 as shown in Figure 2; because the PW between PE2 and the PE1 has the protection attribute; execution in step S302, S304, the S306 of PE2 by twice circulation sets up one-directional dummy line PW-1 and the PW-2 between PE2 and the PE1; because the PW between PE2 and the PE3 does not possess the protection attribute; PE2 sets up one-directional dummy line PW-4 between PE2 and the PE3 by execution in step S302, S304, S308, and the Service ID of these pseudo-lines is 1.
PE3 as shown in Figure 2; because the PW between PE3 and the PE2 does not possess the protection attribute; PE3 sets up one-directional dummy line PW-4 between PE3 and the PE2 by execution in step S302, S304, S308; because the PW between PE3 and the PE1 does not possess the protection attribute; PE3 sets up one-directional dummy line PW-3 between PE3 and the PE1 by execution in step S302, S304, S308, and the Service ID of these pseudo-lines is 1.
When according to the protection attribute, all pseudo-lines are all set up finish, and the VPLS business set up and finished, then enter the binding step of the professional and pseudo-line of VPLS, as shown in Figure 4, comprising:
Step S402 arranges PW between local end PE and the opposite end PE and the binding of VPLS business.
The VPLS business is carried by pseudo-line, by the binding that arranges of this step, makes between business and the pseudo-line and forms corresponding relation.
Step S404 judges whether pseudo-line has the protection attribute.
According to step S304, can obtain pseudo-line and whether have the protection attribute, the protection attribute is specified according to the VPLS business demand by the user.Be exemplified below; as described in Figure 1; need protection between the PE-1 of VPLS-1 business and the PE-2, do not need protection between PE-2 and the PE-3, so; the pseudo-line that the user can arrange between PE-1 and the PE-2 has the protection attribute; the pseudo-line that can arrange between PE-2 and the PE-3 does not possess the protection attribute, if possess the protection attribute, then continues execution in step S406; if do not possess the protection attribute, then continue execution in step S408.
Step S406 binds with the pseudo-line that protected pseudo-line has identical Service ID and an identical opposite end PE IP VPLS is professional.
Refer step S404; has the protection attribute between the PE-1 of VPLS-1 business and the PE-2; 2 pseudo-lines have just been created at step S304 and step S306; be respectively PW1 and PW2; and PW1 and PW2 have protection relation, and step S404 binds wherein PW1 and VPLS-1 business, through having the protection attribute between the PE-1 that judges the VPLS-1 business and the PE-2; in this step, PW2 and VPLS-1 are carried out binding so.
Step S408 does not need to arrange extra binding.
Because pseudo-line does not possess the protection attribute, after step S404, just no longer need to arrange extra VPLS business and the binding relationship of pseudo-line so.
Abovementioned steps S402 can be good with the VPLS service creation of a PE to step S404, and the pseudo-line of an opposite end PE in this PE and the VPLS business and VPLS business-binding.Because the VPLS business is multipoint service, all set up pseudo-line between PE and other all PE, these pseudo-lines are all wanted and business-binding, this PE can be according to the requirement of step S402, S404, S406, S408, other that the VPLS business is related to are got rid of all PE outside this PE and the pseudo-line between this PE, all set up and the binding relationship of VPLS business.
As shown in Figure 2, PE1 at first finishes pseudo-line and the VPLS business-binding relation that arranges between VPLS-1 business and the PE2, by PW-1 and VPLS-1 business-binding relation being set respectively, PW-2 and VPLS-1 business-binding relation; Then according to the order of S402, S404, S408, pseudo-line and VPLS business-binding relation between PE1 and the PE3 are set, PW-3 and VPLS-1 business-binding relation namely is set.
Because the VPLS business is multipoint service, each PE in the VPLS business needs to create the VPLS business, and each PE needs pseudo-line and VPLS business are bound.Can finish according to aforesaid step S402, S404, S406, S408, implementation is as follows:
PE2 as shown in Figure 2; at first: it is professional that PE2 creates VPLS-1 by execution in step S402; then; because the pseudo-line between PE2 and the PE1 has the protection attribute; PE2 execution in step S402, S404, S406 finish PW1, PW2 between PE2 and the PE1 and the binding setting of VPLS-1; at last, because the pseudo-line between PE2 and the PE3 does not possess the protection attribute, PE2 execution in step S402, S404, S408 finish PW-4 between PE2 and the PE3 and the binding setting of VPLS-1.
PE3 as shown in Figure 2; at first: it is professional that PE3 creates VPLS-1 by execution in step S402; then; because the pseudo-line between PE3 and the PE1 does not possess the protection attribute; PE3 execution in step S402, S404, S408 finish PW-3 between PE3 and the PE1 and the binding setting of VPLS-1; at last, because the pseudo-line between PE3 and the PE2 does not possess the protection attribute, PE3 execution in step S402, S404, S408 finish PW-4 between PE3 and the PE2 and the binding setting of VPLS-1.
In this example; with pseudo-line tlv triple (local end PE IP address of equipment; opposite end PE IP address of equipment PWID) expands to pseudo-line four-tuple (local end PE IP address of equipment, opposite end PE IP address of equipment; Service ID; PWID), it is professional to determine whether to belong to same VPLS by ServiceID, so that between a pair of PE equipment for same VPLS business; can set up many pseudo-lines with protection relation, and the protection to the VPLS business finally can be provided.
Fig. 5 is the structured flowchart according to the professional apparatus for establishing of VPLS of the embodiment of the invention, as shown in Figure 5, comprises according to the professional apparatus for establishing of the VPLS of the embodiment of the invention:
Business module 52, it is professional to be used for creating VPLS at PE equipment, and is created on the traffic ID of a definite srvice instance that can be unique in this PE equipment scope for the VPLS business;
Pseudo-wire module 54 is connected to business module 52, is used for setting up one or more PW according to above-mentioned traffic ID, specifies above-mentioned one or more PW professional corresponding to above-mentioned VPLS;
Binding module 56 is connected to pseudo-wire module 54, is used for setting up the binding relationship of above-mentioned one or more PW and above-mentioned VPLS business.
The professional apparatus for establishing of VPLS that this embodiment provides is by the Service ID (traffic ID) of relation one to one not of newly-increased special-purpose and PWID in protocol massages; between the professional PE of perfect VPLS and the PE (non-H-VPLS) or the PW defencive function between NPE and the NPE (H-VPLS); thereby strengthened the robustness of VPLS business, and improved the availability of VPLS business.
Preferably, pseudo-wire module 54 can comprise with one of lower at least unit:
First sets up the unit, is used for setting up many PW between local end PE and opposite end PE, and the traffic ID that many PW are corresponding is identical;
Second sets up the unit, is used for setting up between local end PE and opposite end PE a PW, and the traffic ID that traffic ID corresponding to this PW and local end PE and PW between the PE of other opposite ends are corresponding is not identical.
The mechanism if PW needs protection then first set up the unit and can set up many PW between local end PE and opposite end PE, and the service ID of these PW is identical, but PWID is different; The mechanism if PW does not need protection then second set up the unit can set up a PW between local terminal and opposite end PE, and the service ID of the PW between the service ID of this PW and other any local end PE and the opposite end PE is not identical, but PWID can be identical.
Preferably, binding module 56 can comprise:
The first setting unit is used for local end PE being set to the binding relationship of the PW between the PE of opposite end and VPLS business;
The second setting unit is used for opposite end PE being set to the binding relationship of the PW between the local end PE and VPLS business.
Local end PE, opposite end PE are a kind of relative addresses, when setting up the binding relationship of PW and VPLS business, local end PE to be set first to the binding relationship of the PW between the PE of opposite end and VPLS business, also will finish opposite end PE to the setting of the binding relationship of the PW between the local end PE and VPLS business, the first setting unit and the second setting unit can be finished above-mentioned functions.
Preferably, above-mentioned the first setting unit can comprise:
First specifies subelement, is used in local end PE to the PW assigned work PW between the PE of opposite end and protection PW, and PW and protect PW all to be set in the binding relationship will work;
Second specifies subelement, is used to protection PW to specify claimed PW.
If local end PE needs the PW protection to the PW between the PE of opposite end; then when the binding of PW and business is set; the first appointment subelement is understood assigned work PW and is protected PW and protect PW related PW all to be set in the binding relationship; then second to specify subelement can specify PW to protect related PW be work PW or protection PW; protection PW can protect work PW, and also can protect PW to protect to another be duplicate protection.If the PW between local end PE and the opposite end PE does not need the PW protection, then when the binding of PW and business is set, only need to specify the PW of binding to get final product.
Preferably, binding module 56 can also comprise:
The 3rd setting unit is used for arranging local end PE to the PW between the PE of other opposite ends and the binding relationship of VPLS business;
The 4th setting unit is used for other opposite ends PE being set to the binding relationship of the PW between the local end PE and VPLS business.
Can set up many PW to protect according to traffic ID between professional all the corresponding PE of VPLS, can certainly only protect between certain several PE, the scope that is specifically related to need to be decided according to actual conditions.
From above description; can find out; technical scheme provided by the invention does not concern Service ID by newly-increased special use in protocol massages one to one with PWID; between the professional PE of perfect VPLS and the PE (non-H-VPLS) or the PW defencive function between NPE and the NPE (H-VPLS); thereby strengthened the robustness of VPLS business, and improved the availability of VPLS business.
Obviously, those skilled in the art should be understood that, above-mentioned each module of the present invention or each step can realize with general calculation element, they can concentrate on the single calculation element, perhaps be distributed on the network that a plurality of calculation elements form, alternatively, they can be realized with the executable program code of calculation element, thereby, they can be stored in the storage device and be carried out by calculation element, and in some cases, can carry out step shown or that describe with the order that is different from herein, perhaps they are made into respectively each integrated circuit modules, perhaps a plurality of modules in them or step are made into the single integrated circuit module and realize.Like this, the present invention is not restricted to any specific hardware and software combination.
The above is the preferred embodiments of the present invention only, is not limited to the present invention, and for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any modification of doing, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.