Background technology
Current IP network has spread all over the world, and how to provide low cost for enterprise using existing IP network and transfers service to, just
Gradually paid close attention to by each operator.Therefore, MPLS (Multi-Protocol Label Switching, multiprotocol label switching)
VPN (VirtualPrivate Network, VPN) technology is arisen at the historic moment, and the technology has can be on ip networks
VPN services are provided, and there is the features such as can conveniently setting bandwidth rates, configure simple.
Vpn service based on MPLS has two kinds, is L3 (Layer 3) MPLS VPN and L2 (Layer 2) respectively
MPLSVPN.L2 MPLS VPN include VPLS and VPWS (Virtual Pfivate Wire Service, Virtual Private Line service),
Wherein VPWS is only applicable to the networking mode of point-to-point, and VPLS can realize how point-to-multipoint VPN networkings, therefore, it is possible to for
Operator provides a kind of more complete solution, and can also avoid routeing inside accessing user as L3 VPN.Such as
This, operator can only manage, run a network, and provide traditional IP service, L3VPN, L2VPN simultaneously on a network
Etc. a variety of services, so as to avoid a large amount of construction, maintenance and the running cost of operator.
VPLS is a kind of industry that similar LAN (Local Area Network, LAN) service is provided in MPLS network
Business, it can make the equipment for being dispersed in the user in multiple geographical position, be linked into same virtual network and access mutually, from
Family sees that it is the same that these equipment are directly connected to a LAN.VPLS is that user extends LAN to MAN (Metro Area
Network, Metropolitan Area Network (MAN)), or even on WAN (Wide Area Network, wide area network).
VPLS simulates LAN forwarding mechanism, that is, passes through MAC (Medium Access Control, medium education)
Address forwards Ethernet (Ethernet) message, (floods to searching the unsuccessful frame progress flood of MAC Address, i.e., frame is replicated
To the every other port belonged in same LAN in addition to source port is received).VPLS also simulates LAN MAC address learning work(
Can, when receiving a frame, learn the source MAC of the frame and the mapping relations of inbound port.Other VPLS also simulates LAN's
Broadcast capability, receive target MAC (Media Access Control) address for broadcast address or multicast address frame when, flood is carried out to message.Other VPLS is also
LAN MAC address aging function is simulated, after some MAC Address is arrived in study, if within a certain period of time, not from the MAC
Address receives any frame, then it is assumed that the MAC Address is invalid, it is necessary to be deleted in local mapping table.VPLS is PW
(Pseudo Wire, pseudo-wire) is modeled to an ethernet port, that is, when learning MAC Address, in the mapping table of MAC and port
The corresponding relation of port numbers or MAC and PW.
In VPLS technology, all lan emulations are realized by PE (ProviderEdge, Provider Edge) equipment.
, may when the PE equipment failures that CE (Custom Edge, customer edge) equipment is connected in VPLS technology application
Whole customer service is caused to be interrupted, in order to ensure the high reliability of customer service, CE equipment can be with dual-homed access VPLS, i.e.,
CE equipment can be linked into two PE equipment of same VPLS business simultaneously, and wherein controllable one of CE equipment is connected as primary
State, another is connected as stand-by state;Dual-homed two involved PE equipment can also control one be connected as it is primary, separately
One is standby.When active link therein fails, CE equipment can by service traffics quickly be switched to reserve link, such as
This, can be avoided service disconnection.
In VPLS technology, also a kind of H-VPLS (Hierarchy of VPLS) technology, the technology belongs to layering
VPLS, wherein PE equipment are divided into NPE (network side PE) and UPE (user side PE), CE equipment access user-end provider edge, user-end provider edge access
Using full link between NPE equipment, NPE.The N squares problems for the PW that the full link that the technology can alleviate PE is brought, larger journey
That spends solves scaling concern.In addition, similar foregoing dual-homed protection mechanism, what user-end provider edge can also be dual-homed is linked into
Two NPE equipment, form backup protection mechanism.
Comprehensive foregoing two kinds of protection techniques, are similar to the protection to link between operator and client, once wherein PE
PW between PE (non-H-VPLS) or between NPE and NPE (H-VPLS) breaks down, and does not propose effective method also temporarily.
Mono- crucial technology of comparison of VPLS is PW establishment, IETF (Internet Engineering Task
Force, Internet Engineering Task group) PWE3 (Pseudo Wire Emulation Edge-to-Edge) working group define PW some standards.In addition,
IETF has also formulated VPLS RFC (Request for Comments), and explicitly points out PWID (pseudo-wire IP) for indicating industry
Be engaged in ID, because VPLS is made up of multiple separate PW, therefore just defines that the PWID of the PW must be consistent.In addition,
In terms of standard definition, one is uniquely determined for triple (local end PE IP address of equipment, opposite end PE IP address of equipment, PWID)
PW.Therefore, for a VPLS business, both required that PWID must be consistent, and due to the restriction of triple, then just limited
A PW can only be set up between two PE.So according to the current common processing mode of industry, VPLS PE and PE (non-H-
VPLS the PW unprotect functions between) or between NPE and NPE (H-VPLS).This problem of pin, not yet proposes effective solution at present
Certainly scheme.
Embodiment
Describe the present invention in detail below with reference to accompanying drawing and in conjunction with the embodiments.It should be noted that not conflicting
In the case of, the feature in embodiment and embodiment in the application can be mutually combined.
Fig. 1 is the flow chart of VPLS service establishing methods according to embodiments of the present invention.As shown in figure 1, according to the present invention
The VPLS service establishing methods of embodiment include:
Step S102, creates VPLS business in PE equipment, and can be with the range of the PE equipment for VPLS service generations
Uniquely determine the traffic ID of a srvice instance;
Step S104, one or more PW is set up according to above-mentioned traffic ID, specifies above-mentioned one or more PW to correspond to upper
State VPLS business;
Step S106, sets up above-mentioned one or more PWPW and above-mentioned VPLS business binding relationship.
The VPLS service establishing methods that this embodiment is provided, on the basis of original VPLS service establishing methods, pass through
Increased newly in protocol massages it is special there is no the Service ID (traffic ID) of one-to-one relation with PWID, perfect VPLS
Between business PE and PE (non-H-VPLS) or the PW defencive functions between NPE and NPE (H-VPLS), so as to strengthen VPLS business
Robustness, and improve the availability of VPLS business.Described PE equipment includes PE and NPE in this example.
Two kinds of modes that PW is set up according to traffic ID are enumerated in this preferred embodiment.Preferably, step S104 can enter one
Step includes one below processing:
(1) a plurality of PW is set up between local end PE and opposite end PE, the corresponding traffic ID of a plurality of PW is identical;
(2) PW, the corresponding traffic IDs of the PW and local end PE and other opposite ends are set up between local end PE and opposite end PE
The corresponding traffic IDs of PW between PE are different from.
If PW needs protection mechanism, processing (1) is performed, a plurality of PW is set up between local end PE and opposite end PE, and
These PW service ID are identical, but PWID is different;If PW does not need protection mechanism, processing (2) is performed, in local terminal
The PW's set up between the PE of opposite end between a PW, and the service ID of the PW and other any local end PEs and opposite end PE
Service ID are different from, but PWID can be with identical.
Preferably, step S106 may further include following processing:
(1) local end PE is set to the PW between the PE of opposite end and the binding relationship of VPLS business;
(2) opposite end PE to the PW between local end PE and the binding relationship of VPLS business are set.
Local end PE, opposite end PE are a kind of relative addresses, when setting up PW and the binding relationship of VPLS business, first to be set
Local end PE to the binding relationship of the PW between the PE of opposite end and VPLS business, also to complete opposite end PE to the PW between local end PE with
The setting of the binding relationship of VPLS business.
And setting PW and the binding relationship of VPLS business mode to have many kinds, this preferred embodiment provides a kind of preferred side
Formula.Preferably, the binding relationship of local end PE to the PW between the PE of opposite end and VPLS business is set to include following processing:
(1) local end PE into the PW between the PE of opposite end assigned work PW and protection PW, by work PW and protection PW all set
Put in binding relationship;
(2) claimed PW is specified for protection PW.
This preferred embodiment provides a kind of simple and practical binding relationship method to set up.If local end PE is between the PE of opposite end
PW needs PW to protect, then when setting the binding of PW and business, it is necessary to assigned work PW and protection PW and PW be protected involved
PW is set in binding relationship, and it is work PW or protection PW then to specify the involved PW of PW protections, and protection PW can be to work
Make PW to be protected, i.e. duplicate protection can also be protected to another protection PW.Certainly, if between local end PE and opposite end PE
PW do not need PW protections, then when setting the binding of PW and business, it is only necessary to specify the PW of binding.
Preferably, step S106 can further include following processing:
(1) local end PE is set to the PW between the PE of other opposite ends and the binding relationship of VPLS business;
(2) other opposite ends PE to the PW between local end PE and VPLS business binding relationship are set.
A plurality of PW can be set up between the corresponding all PE of one VPLS business according to traffic ID to be protected, certainly
Can also only be protected between certain several PE, and in particular to scope needs according to actual conditions depending on.
Above preferred embodiment is described in detail with reference to example.
In this example PE structure as shown in Fig. 2 whole VPLS business to set up process description as follows:
First, VPLS business, and the Service ID and other VPLS business of VPLS business are created in this PE
ServiceID is differed.
As shown in Fig. 2 VPLS business VPLS-1 is completed to set up jointly by PE1, PE2, PE3, wherein PE1, PE2 and PE3 exist
VPLS business is locally created, the Service ID of the VPLS business of establishment are 1.
After Service ID generations, then start to create PW, as shown in figure 3, PW visioning procedure includes:
Step S302, a PW is created according to service id, PWID and opposite end PE IP address.
PW defined in the IETF standards of RFC 4447 is two-way, and PW a pair between two-end-point PE is unidirectional
LSP is constituted, wherein this pair unidirectional LSP PWID identicals, i.e.,:One PW's of unique mark is triplet information (local end PE
IP address, opposite end PE IP address, PWID).
In instances, original agreement is extended, when local end PE distributes PW labels to opposite end PE, signaling message
In, opposite end PE IP address and PWID information, and also extra carrying Service id fields are not only carried, now, PW is also
Unidirectional, a pair unidirectional LSPs of the PW between PW end points PE are constituted, and this pair unidirectional LSP two tuples (ServiceID,
PWID it is) identical, i.e.,:One PW's of unique mark is quaternary group information (local end PE IP address, opposite end PE IP address, Service
ID, PWID).
Step S304, judges whether PW has protection attribute.
In this example, whether PW has protection attribute, it is necessary to which the input according to user is determined.
Step S306, if PW has protection attribute, creates a plurality of PW between local end PE and opposite end PE, these PW and
The Service ID for being set up and belonging to the PW of same PW protections group are identical, but PWID is different.
Step S308, if PW does not possess protection attribute, then between local end PE and opposite end PE, it is not necessary to extra to set up
PW。
Pass through each more than complete execution step, you can PW protection attribute is set according to user, by a pair of PE it
Between PW set up and complete, these PW Service ID are identical, and PWID is differed.
Because VPLS business is multipoint service, it is necessary to the forwarding of multiple PE finishing services together, then be accomplished by multiple
In PE set, PW is all preferably set up between PE two-by-two.Abovementioned steps can set up PW between a pair of PE, therefore, only need
Abovementioned steps S302, S304, S306, S308 are progressively performed between the PE two-by-two in all PE set, it is possible to complete institute
There is PW foundation, be embodied as follows:
PE1 as shown in Figure 2, because the PW between PE1 and PE2 has protection attribute, PE1 performs step by circulating twice
Unidirectional pseudo-wire PW-1 and unidirectional pseudo-wire PW-2 that rapid S302, S304, S306 are set up between PE1 and PE2, due between PE1 and PE3
PW do not possess protection attribute, PE1 is by performing the unidirectional pseudo-wire PW- that step S302, S304, S308 are set up between PE1 and PE3
4, the Service ID of these pseudo-wires are 1.
PE2 as shown in Figure 2, because the PW between PE2 and PE1 has protection attribute, PE2 passes through the execution that circulates twice
The unidirectional pseudo-wire PW-1 and PW-2 that step S302, S304, S306 are set up between PE2 and PE1, due to the PW between PE2 and PE3 not
Possess protection attribute, PE2 by performing the unidirectional pseudo-wire PW-4 that step S302, S304, S308 are set up between PE2 and PE3, these
The Service ID of pseudo-wire are 1.
PE3 as shown in Figure 2, because the PW between PE3 and PE2 does not possess protection attribute, PE3 is by performing step
The unidirectional pseudo-wire PW-4 that S302, S304, S308 are set up between PE3 and PE2, because the PW between PE3 and PE1 does not possess protection category
Property, PE3 by performing the unidirectional pseudo-wire PW-3 that step S302, S304, S308 are set up between PE3 and PE1, these pseudo-wires
Service ID are 1.
When according to protection attribute, all pseudo-wires are all set up into completion, and VPLS business has built up completion, then enters
The binding step of VPLS business and pseudo-wire, as shown in figure 4, including:
Step S402, sets the binding of the PW and VPLS business between local end PE and opposite end PE.
VPLS business is carried by pseudo-wire, is bound by the setting of this step, is made to form corresponding relation between business and pseudo-wire.
Step S404, judges whether pseudo-wire has protection attribute.
According to step S304, it can obtain whether pseudo-wire has protection attribute, protection attribute is by user according to VPLS business
Demand is specified.It is exemplified below, as described in Figure 1, protection is needed between the PE-1 and PE-2 of VPLS-1 business, between PE-2 and PE-3
Need not protect, then, user can set pseudo-wire between PE-1 and PE-2 to have protection attribute, can set PE-2 and
Pseudo-wire between PE-3 does not possess protection attribute, if possessing protection attribute, continues executing with step S406, if not possessing guarantor
Attribute is protected, then continues executing with step S408.
Step S406, VPLS business and the puppet by protection pseudo-wire with identical Service ID and identical opposite end PE IP
Line is bound.
There is protection attribute with reference to step S404, between the PE-1 and PE-2 of VPLS-1 business, in step S304 and step
S306 has been created that 2 pseudo-wires, respectively PW1 and PW2, and PW1 and PW2 have protection relation, and step S404 is it
In a PW1 and VPLS-1 business bound, between the PE-1 and PE-2 by judging VPLS-1 business have protection category
Property, then in this step, PW2 and VPLS-1 are performed binding.
Step S408, it is not necessary to which extra binding is set.
Because pseudo-wire does not possess protection attribute, then after step S404, in this way it is no longer necessary to set extra VPLS industry
Business and the binding relationship of pseudo-wire.
Abovementioned steps S402 to step S404 can be good by PE VPLS service creations, and this PE and VPLS
The pseudo-wire and VPLS business-bindings of an opposite end PE in business.Because VPLS business is multipoint service, PE and other all PE
Between all establish pseudo-wire, these pseudo-wires will and business-binding, this PE can be according to step S402, S404, S406, S408
It is required that, other that VPLS business is related to exclude pseudo-wire between all PE and this PE outside this PE, all set up and VPLS industry
The binding relationship of business.
As shown in Fig. 2 PE1 completes to set the pseudo-wire and VPLS business-binding relations between VPLS-1 business and PE2 first,
By setting PW-1 and VPLS-1 business-binding relations, PW-2 and VPLS-1 business-binding relations respectively;Then according to S402,
S404, S408 order, set the pseudo-wire and VPLS business-binding relations between PE1 and PE3, that is, set PW-3 and VPLS-1 industry
Business binding relationship.
Because VPLS business is that each PE in multipoint service, VPLS business is required for creating VPLS business, and each
PE is required for a pseudo-wire and VPLS business to be bound.S402, S404, S406, S408 can be completed in accordance with the previously described process, tool
Body is implemented as follows:
PE2 as shown in Figure 2, first:PE2 creates VPLS-1 business by performing step S402, then, due to PE2 and
Pseudo-wire between PE1 has protection attribute, and PE2 performs PW1, PW2 between step S402, S404, S406 completion PE2 and PE1
Set with VPLS-1 binding, finally, due to the pseudo-wire between PE2 and PE3 does not possess protection attribute, PE2 perform step S402,
The binding that S404, S408 complete PW-4 and VPLS-1 between PE2 and PE3 is set.
PE3 as shown in Figure 2, first:PE3 creates VPLS-1 business by performing step S402, then, due to PE3 and
Pseudo-wire between PE1 does not possess protection attribute, PE3 perform step S402, S404, S408 complete PW-3 between PE3 and PE1 and
VPLS-1 binding is set, finally, due to the pseudo-wire between PE3 and PE2 does not possess protection attribute, PE3 perform step S402,
The binding that S404, S408 complete PW-4 and VPLS-1 between PE3 and PE2 is set.
In this example, pseudo-wire triple (local end PE IP address of equipment, opposite end PE IP address of equipment, PWID) is expanded into puppet
Line four-tuple (local end PE IP address of equipment, opposite end PE IP address of equipment, Service ID, PWID), is determined by ServiceID
Whether same VPLS business is belonged to so that for that between a pair of PE equipment of same VPLS business, can set up a plurality of tool
There is the pseudo-wire of protection relation, and the protection to VPLS business may finally be provided.
Fig. 5 is the structured flowchart that VPLS business according to embodiments of the present invention sets up device, as shown in figure 5, according to this hair
The VPLS business of bright embodiment, which sets up device, to be included:
Business module 52, in PE equipment create VPLS business, and for VPLS service generations in the PE equipment scopes
It is interior uniquely to determine the traffic ID of a srvice instance;
Pseudo- wire module 54, is connected to business module 52, for setting up one or more PW according to above-mentioned traffic ID, specifies
One or more PW is stated corresponding to above-mentioned VPLS business;
Binding module 56, is connected to pseudo- wire module 54, for setting up above-mentioned one or more PW and above-mentioned VPLS business
Binding relationship.
The VPLS business that this embodiment is provided sets up device special not to be had by being increased newly in protocol massages with PWID
The Service ID (traffic ID) of one-to-one relation, it is perfect between VPLS business PE and PE (non-H-VPLS) or NPE and
PW defencive functions between NPE (H-VPLS), so as to strengthen the robustness of VPLS business, and improve the available of VPLS business
Property.
Preferably, pseudo- wire module 54 can be included with least one of lower unit:
First sets up unit, for setting up a plurality of PW between local end PE and opposite end PE, the corresponding traffic ID phase of a plurality of PW
Together;
Second sets up unit, for setting up a PW, the corresponding traffic IDs of the PW and sheet between local end PE and opposite end PE
The corresponding traffic IDs of PW between the PE and other opposite ends PE of end are different from.
If PW needs protection mechanism, first sets up unit can set up a plurality of PW between local end PE and opposite end PE, and
And these PW service ID are identical, but PWID is different;If PW does not need protection mechanism, second sets up unit can be
Set up between local terminal and opposite end PE between a PW, and the service ID of the PW and other any local end PEs and opposite end PE
PW service ID are different from, but PWID can be with identical.
Preferably, binding module 56 can include:
First setting unit, for setting local end PE to the PW between the PE of opposite end and the binding relationship of VPLS business;
Second setting unit, the binding relationship for setting opposite end PE to the PW between local end PE and VPLS business.
Local end PE, opposite end PE are a kind of relative addresses, when setting up PW and the binding relationship of VPLS business, first to be set
Local end PE to the binding relationship of the PW between the PE of opposite end and VPLS business, also to complete opposite end PE to the PW between local end PE with
The setting of the binding relationship of VPLS business, the first setting unit and the second setting unit can complete above-mentioned functions.
Preferably, above-mentioned first setting unit can include:
First specify subelement, for local end PE into the PW between the PE of opposite end assigned work PW and protection PW, by work
Make PW and protection PW is set in binding relationship;
Second specifies subelement, for specifying claimed PW for protection PW.
If local end PE needs PW to protect to the PW between the PE of opposite end, when setting PW and business binding, first refers to
Stator unit meeting assigned work PW and protection PW simultaneously protects involved PW to set in binding relationship PW, then second specifies
Subelement can specify the involved PW of PW protections to be work PW or protection PW, and protection PW can be protected to work PW, also may be used
To be protected i.e. duplicate protection to another protection PW.If the PW between local end PE and opposite end PE does not need PW protections,
When the binding of PW and business is set, it is only necessary to specify the PW of binding.
Preferably, binding module 56 can also include:
3rd setting unit, for setting local end PE to the PW between the PE of other opposite ends and the binding relationship of VPLS business;
4th setting unit, the binding relationship for setting other opposite ends PE to the PW between local end PE and VPLS business.
A plurality of PW can be set up between the corresponding all PE of one VPLS business according to traffic ID to be protected, certainly
Can also only be protected between certain several PE, and in particular to scope needs according to actual conditions depending on.
As can be seen from the above description, the technical scheme that the present invention is provided is special by being increased newly in protocol massages
There is no an one-to-one relation Service ID with PWID, it is perfect between VPLS business PE and PE (non-H-VPLS) or NPE
With the PW defencive functions between NPE (H-VPLS), so as to strengthen the robustness of VPLS business, and improve VPLS business can
The property used.
Obviously, those skilled in the art should be understood that above-mentioned each module of the invention or each step can be with general
Computing device realize that they can be concentrated on single computing device, or be distributed in multiple computing devices and constituted
Network on, alternatively, the program code that they can be can perform with computing device be realized, it is thus possible to they are stored
Performed in the storage device by computing device, and in some cases, can be shown to be performed different from order herein
The step of going out or describe, they are either fabricated to each integrated circuit modules respectively or by multiple modules in them or
Step is fabricated to single integrated circuit module to realize.So, the present invention is not restricted to any specific hardware and software combination.
The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention, for the skill of this area
For art personnel, the present invention can have various modifications and variations.Within the spirit and principles of the invention, that is made any repaiies
Change, equivalent substitution, improvement etc., should be included in the scope of the protection.