CN103684967B - Method and device for achieving tangent ring user data message intercommunication - Google Patents
Method and device for achieving tangent ring user data message intercommunication Download PDFInfo
- Publication number
- CN103684967B CN103684967B CN201310684560.9A CN201310684560A CN103684967B CN 103684967 B CN103684967 B CN 103684967B CN 201310684560 A CN201310684560 A CN 201310684560A CN 103684967 B CN103684967 B CN 103684967B
- Authority
- CN
- China
- Prior art keywords
- data message
- rrpp
- vlan
- transmission node
- mac
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Small-Scale Networks (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a method and device for achieving tangent ring user data message intercommunication. In an RRPP ring, a first transmission node receives a second Hello message sent by a first main node, the second Hello message carries a first encapsulated VLAN ID, and the first encapsulated VLAN ID is any VLAN ID in first RRPP embodiments except the VLAN IDs controlled by transmission node public devices. A first transmission node starts a PBB function in an RRPP domain, and the first encapsulated VLAN ID in the Hello message is saved. A non-RRPP port of the first transmission node receives a data message sent by a user, a user VLAN ID of the data message is a control VLAN of a first RRPP ring, the first transmission node inquires a mapping table corresponding to a target MAC of the data message, conducts PBB encapsulation on the data message, and forwards the data message, wherein the target MAC in an encapsulated BMAC is an inquired bridge MAC in the corresponding mapping table, a source MAC is the bridge MAC of the first transmission node, a BVLAN is a first encapsulated VLAN ID, and an I-SID is a preset value. According to the technical scheme, the method and device for achieving the tangent ring user data message intercommunication can achieve intercommunication of the data message with the control VLAN between users.
Description
Technical field
The present invention relates to network communication and transmission technology, particularly a kind of method realizing tangent rings user data message intercommunication
And equipment.
Background technology
At present, the technology solving double layer network loop problem has RSTP (RSTP, Rapid Spanning
Tree Protocol), each vlan spanning-tree (PVST, Per-VLAN Spanning Tree), Multiple Spanning Tree Protocol (MSTP,
Multiple Spanning Tree Protocol) and rapid ring protection protocol (RRPP, Rapid Ring Protection
Protocol).RSTP/PVST/MSTP application comparative maturity, but convergence time is in second level.RRPP is to be specifically applied to Ethernet
The link layer protocol of ring, has more faster convergence rate than RSTP/PVST/MSTP.And on the convergence time of RRPP and looped network
Nodes are unrelated, can be applicable to the larger network of network diameter.
If Fig. 1 is that RRPP is monocyclic, it comprises main control VLAN (VLAN 3), sub- control VLAN (VLAN 4) and part is protected
Example (protection VLAN 2-10 generally can protect in example controlling VLAN also to add), due to controlling VLAN only to transmit
RRPP protocol massages, so can not carry out data message in all RRPP transmission nodes on this RRPP ring on controlling VLAN
Intercommunication, all can be dropped when receiving the data message with control VLAN tag when the non-RRPP port on RRPP transmission node.
So in Fig. 1, being unable to the data message of intercommunication VLAN 3-4 between user 1 and user 2.Typically in single domain situation
Under, user can evade these and control VLAN, do not forward the data message with controlling VLAN tag as far as possible.
For the data message protecting VLAN in domain, RRPP transmission node can learn all data messages in transmitting procedure
MAC address entries, this means that RRPP transmission node can therefore take substantial amounts of MAC address entries.
When two looped networks are tangent it is necessary to the RRPP ring of two not same areas of configuration is tangent, such as the networking in Fig. 2, two
RRPP tangent rings, it is that (main control VLAN is 3 to 3-4, and sub- control VLAN is 4, gives tacit consent to main control that left side configuration domain 1 controls VLAN
VLAN ID adds 1 and is son control VLAN ID), it is 5-6 that right side configuration domain 2 controls VLAN, the protection example of left side RRPP ring
VLAN is 3-10, and the protection example VLAN of right side RRPP ring is 2-20, and middle transmission node common equipment belongs simultaneously to left side
RRPP ring and right side RRPP ring, therefore middle transmission node common equipment has control VLAN 3-6.
The RRPP ring in left side can forward the VLAN 5-6's (the control VLAN tag of non-left side RRPP ring) of user 1 access
Data message, but the data message of VLAN 5-6 can not forward in right side RRPP ring;The RRPP ring on right side can forward user 2
The data message of the VLAN 3-4 (the control VLAN tag of non-right side RRPP ring) accessing, but the data message of VLAN 3-4 is not
Can forward in left side RRPP ring, the data message of VLAN 3-6 therefore between user 1 and user 2, can not be forwarded all the time.So it is right
Data interchange between tangent rings, user 1 and user 2 also must be evaded falling these and control VLAN 3-6.
Although user can evade control VLAN, this is to waste so that intercommunication between user to a kind of of VLAN resource
VLAN passage reduce.When the tangent rings of more not same areas are configured on transmission node common equipment it is meant that having more
VLAN be unable to intercommunication, the loss of this VLAN resource is just more serious.
Content of the invention
In view of this, the present invention proposes a kind of method and apparatus realizing tangent rings user data message intercommunication, utilizes
RRPP transmission node accesses data message to user and carries out provider backbone bridging (PBB, Provider Backbone
Bridge) technology encapsulation and decapsulation, is unable to intercommunication to solve the data with controlling VLAN tag across between the user of RRPP network
Problem.
Technical scheme proposed by the present invention is:
A kind of method realizing tangent rings user data message intercommunication, is applied to rapid ring protection protocol RRPP tangent rings
Network, the first RRPP ring is tangent with the second RRPP ring, and the first host node is the host node of the first RRPP ring, and the first transmission node is
A transmission node on first RRPP ring, the second host node is the host node of the second RRPP ring, and the protection of the first RRPP ring is real
Comprise the control VLAN of the first RRPP ring in example, in the protection example of the second RRPP ring, comprise the control VLAN of the second RRPP ring,
And the equipment in all RRPP domain all supports provider backbone bridging PBB technology, transmission node common equipment is to belong simultaneously to the
One RRPP ring and the node device of the second RRPP ring, the method includes:
Described first transmission node receives the second hello packet that described first host node sends, described 2nd Hello
Message carries the first packaging V LAN ID, and described first packaging V LAN ID is the exclusion all control of described transmission node common equipment
Arbitrary VLAN ID in the first RRPP ring protection example of VLAN ID;
Described first transmission node starts PBB function in RRPP domain, and preserves the first envelope in described second hello packet
Dress VLAN ID;
The non-RRPP port of described first transmission node receives the data message that user sends, the use of described data message
When family VLAN ID is the control VLAN of described first RRPP ring, described first transmission node is inquired about and described data message purpose
The corresponding mapping item of MAC, carries out PBB to described data message and encapsulates and forward, and wherein, purpose MAC in encapsulation BMAC is
Bridge MAC in the correspondence mappings list item inquiring, source MAC are the bridge MAC of described first transmission node, and BVLAN is described first
Packaging V LAN ID, I-SID are preset value.
In such scheme, if the user vlan ID of described data message is not the control VLAN of described first RRPP ring,
But when belonging to described first RRPP ring protection example VLAN ID, the method further includes:
Described first transmission node inquires about mapping item corresponding with described data message purpose MAC, to described datagram
Literary composition carries out PBB and encapsulates and forward, and wherein, purpose MAC in encapsulation BMAC is the bridge MAC in the correspondence mappings list item inquiring,
Source MAC is the bridge MAC of described first transmission node, and BVLAN is described first packaging V LAN ID, and I-SID is preset value.
In such scheme, if described first transmission node inquiry is reflected less than corresponding with described data message purpose MAC
Firing table item, the method further includes:
Described first transmission node carries out PBB encapsulation to described data message, and wherein, purpose MAC in encapsulation BMAC is
Broadcast MAC, source MAC is the bridge MAC of described first transmission node, and BVLAN is described first packaging V LAN ID, and I-SID is default
Value;
Message after encapsulation is forwarded from the RRPP port of described first transmission node, is made the other sections in RRPP ring
Point all can receive this message, and set up in BMAC the mapping item between source MAC and described data message source MAC and protect
Deposit.
A kind of method realizing tangent rings user data message intercommunication, is applied to rapid ring protection protocol RRPP tangent rings
Network, the first RRPP ring is tangent with the second RRPP ring, and the first host node is the host node of the first RRPP ring, and the first transmission node is
A transmission node on first RRPP ring, the second host node is the host node of the second RRPP ring, and the protection of the first RRPP ring is real
Comprise the control VLAN of the first RRPP ring in example, in the protection example of the second RRPP ring, comprise the control VLAN of the second RRPP ring,
And the equipment in all RRPP domain all supports provider backbone bridging PBB technology, transmission node common equipment is to belong simultaneously to the
One RRPP ring and the node device of the second RRPP ring, the method includes:
Described transmission node common equipment receive described second host node send the second hello packet, described second
Hello packet carries the second packaging V LAN ID, and described second packaging V LAN ID is exclusion described transmission node common equipment institute
There is arbitrary VLAN ID in the second RRPP ring protection example control VLAN ID;
Described common equipment starts PBB function, and preserves the second packaging V LAN ID in described second hello packet;
Described transmission node common equipment receives the PBB encapsulation of data message that described first transmission node sends, institute
Stating purpose MAC in the BMAC of PBB encapsulation of data message is in the correspondence mappings list item that described first transmission node inquires
Bridge MAC, source MAC are the bridge MAC of described first transmission node, and BVLAN is the first packaging V LAN ID, and I-SID is preset value;
If the user vlan ID of described data message belongs to the protection example VLAN ID of described second RRPP ring, institute
Stating transmission node common equipment the BVLAN heavy label in this PBB encapsulation of data message is described second packaging V LAN, Ran Houcong
The RRPP port of described second RRPP ring forwards;Otherwise decapsulate described PBB encapsulation of data message, then from described second
The RRPP port of RRPP ring forwards.
In such scheme, also include:
Described transmission node common equipment receives the data message that described first transmission node sends, and described data
When the user vlan ID of message belongs to the control VLAN of described second RRPP ring, described transmission node common equipment is inquired about and institute
State the corresponding mapping item of data message purpose MAC, PBB is carried out to described data message and encapsulates and forward, wherein, encapsulate BMAC
In purpose MAC be bridge MAC in the correspondence mappings list item inquiring, source MAC is the bridge of described transmission node common equipment
MAC, BVLAN are described second packaging V LAN ID, and I-SID is preset value.
In such scheme, if purpose MAC in the BMAC of described PBB encapsulation of data message is broadcast MAC, the method is entered
One step includes:
Described transmission node common equipment sets up source MAC and described data in described PBB encapsulation of data message BMAC
Mapping item between message source MAC simultaneously preserves;
If the user vlan ID of described data message belongs to the protection example VLAN ID of described second RRPP ring, institute
Stating transmission node common equipment the BVLAN heavy label in this PBB encapsulation of data message is described second packaging V LAN, Ran Houcong
The RRPP port of described second RRPP ring forwards, and makes the other nodes in RRPP ring all can receive this message, and sets up
Mapping item between source MAC and described data message source MAC preserving in BMAC;Otherwise decapsulate described PBB encapsulation
Data message, then forwards from the RRPP port of described second RRPP ring.
In such scheme, described transmission node common equipment receives the second hello packet that described second host node sends
Before, the method further includes:
Described transmission node common equipment receives the first hello packet that the second host node sends, described first
The reserved bit of hello packet fills the second packaging V LAN ID, and described second packaging V LAN ID is that the described transmission node of exclusion is public
Arbitrary VLAN ID in the second RRPP ring protection example of equipment all control VLAN ID altogether;
Described transmission node common equipment forwards described first hello packet to described second host node.
A kind of rapid ring protection protocol RRPP transmission node, is applied to rapid ring protection protocol RRPP tangent ring networks
Network, supports provider backbone bridging PBB technology, and the first RRPP ring is tangent with the second RRPP ring, and the first host node is a RRPP
The host node of ring, the second host node is the host node of the second RRPP ring, comprises in the protection example VLAN ID of the first RRPP ring
The control VLAN of one RRPP ring, comprises the control VLAN of the second RRPP ring in the protection example VLAN ID of the second RRPP ring, transmission
Node common equipment is the node device belonging simultaneously to the first RRPP ring and the second RRPP ring, and this equipment includes:
Receiver module, for receiving the second hello packet that described first host node sends, described second hello packet
Carry the first packaging V LAN ID, described first packaging V LAN ID is the exclusion all control VLAN of described transmission node common equipment
Arbitrary VLAN ID in the first RRPP ring protection example of ID;It is additionally operable to the data message that receive user is sent;
Starting module, for starting PBB function in RRPP domain;
Memory module, for preserving the first packaging V LAN ID in described second hello packet;
Judge module, whether the user vlan ID for judging data message is the control VLAN of described first RRPP ring;
Enquiry module, for inquiry and the corresponding mapping item of data message purpose MAC that user sends;
Package module, for carrying out PBB encapsulation to described data message, wherein, purpose MAC in encapsulation BMAC is inquiry
To correspondence mappings list item in bridge MAC, source MAC is the bridge MAC of described transmission node, BVLAN be described first packaging V LAN
ID, I-SID are preset value;
Sending module, for forwarding the data message after PBB encapsulation.
In such scheme, if the user vlan ID of described data message is not the control VLAN of described first RRPP ring,
But when belonging to the protection example VLAN ID of described first RRPP ring,
Described enquiry module is used for, and inquires about and the corresponding mapping item of data message purpose MAC that user sends;
Described package module is used for, and carries out PBB encapsulation to described data message, and wherein, purpose MAC in encapsulation BMAC is
Bridge MAC in the correspondence mappings list item inquiring, source MAC are the bridge MAC of described transmission node, and BVLAN is described first encapsulation
VLAN ID, I-SID are preset value.
In such scheme, if described enquiry module is inquired about less than mapping table corresponding with described data message purpose MAC
,
Package module is further used for, and carries out PBB encapsulation to described data message, wherein, encapsulates purpose MAC in BMAC
For broadcasting MAC, source MAC is the bridge MAC of described transmission node, and BVLAN is described first packaging V LAN ID, and I-SID is default
Value;
Sending module, for the message after encapsulation is forwarded from the RRPP port of transmission node, make in RRPP its
Its node all can receive this message, and sets up the mapping item between source MAC and described data message source MAC in BMAC
And preserve.
A kind of rapid ring protection protocol RRPP transmission node common equipment, is applied to rapid ring protection protocol RRPP phase
Cut loop network, support provider backbone bridging PBB technology, the first RRPP ring is tangent with the second RRPP ring, the first host node is the
The host node of one RRPP ring, the first transmission node is a transmission node on the first RRPP ring, and the second host node is second
The host node of RRPP ring, comprises the control VLAN of the first RRPP ring, the guarantor of the second RRPP ring in the protection example of the first RRPP ring
The control VLAN of the second RRPP ring is comprised, transmission node common equipment is to belong simultaneously to the first RRPP ring and second in shield example
The node device of RRPP ring, this equipment includes:
Receiver module, for receiving the second hello packet that described second host node sends, described second hello packet
Carry the second packaging V LAN ID, described second packaging V LAN ID is the exclusion all control VLAN of described transmission node common equipment
Arbitrary VLAN ID in the second RRPP ring protection example of ID;It is additionally operable to receive the PBB encapsulation of data that the first transmission node sends
Message, purpose MAC in the BMAC of described PBB encapsulation of data message is the correspondence mappings table that described first transmission node inquires
Bridge MAC in, source MAC is the bridge MAC of described first transmission node, and BVLAN is the first packaging V LAN ID, and I-SID is default
Value;
Starting module, for starting PBB function;
Memory module, for preserving the second packaging V LAN ID in described second hello packet;
Judge module, whether the user vlan ID for judging described data message belongs to the guarantor of described second RRPP ring
Shield example VLAN ID;
Package module, if the user vlan ID of described data message belongs to the protection example of described second RRPP ring
VLAN ID, then being used for the BVLAN heavy label in this PBB encapsulation of data message is described second packaging V LAN;
Decapsulation module, if the protection that the user vlan ID of described data message is not belonging to described second RRPP ring is real
Example VLAN ID, then be used for decapsulating PBB encapsulation of data message;
Sending module, for forwarding the data message after PBB encapsulation and the data message after decapsulation.
In such scheme, this equipment also includes:
Described receiver module is additionally operable to, and receives the data message that described first transmission node sends, and described datagram
When the user vlan ID of literary composition belongs to the control VLAN of described second RRPP ring;
Enquiry module, for inquiring about mapping item corresponding with described data message purpose MAC;
Package module, for carrying out PBB encapsulation to described data message, wherein, purpose MAC in encapsulation BMAC is inquiry
To correspondence mappings list item in bridge MAC, source MAC is the bridge MAC of described first transmission node, BVLAN be described second encapsulation
VLAN ID, I-SID are preset value.
In such scheme, if purpose MAC in the BMAC of described PBB encapsulation of data message is broadcast MAC, this equipment enters
One step includes:
List item creation module, is used for setting up source MAC and described data message in described PBB encapsulation of data message BMAC
Mapping item between the MAC of source;
Memory module is additionally operable to, and preserves mapping item;
Sending module is additionally operable to, and forwards PBB encapsulation of data message from the RRPP port of described second RRPP ring, makes RRPP ring
In other nodes all can receive this message, and set up reflecting between source MAC and described data message source MAC in BMAC
Firing table item simultaneously preserves.
In such scheme, before described receiver module receives the second hello packet that described second host node sends,
Receiver module is additionally operable to, and receives the first hello packet that the second host node sends;
Filling module, for described first hello packet reserved bit fill the second packaging V LAN ID, described second
Packaging V LAN ID is to appoint in the second RRPP ring protection example exclude described transmission node common equipment all control VLAN ID
One VLAN ID;
Sending module is additionally operable to, and forwards described first hello packet to described second host node.
In sum, technical scheme proposed by the present invention can effectively solve the problem that tangent annulus controls the datagram of VLAN tag
Civilian intercommunication problem, increases the VLAN passage that can communicate across between the user of RRPP network;Technical solution of the present invention is realizing datagram
While civilian intercommunication, also data message can be reduced on RRPP equipment by the PBB encapsulation to the data message between tangent rings
The MAC address entries taking.
Brief description
Fig. 1 is RRPP monocyclic networking structure schematic diagram.
Fig. 2 is RRPP tangent rings networking structure schematic diagram.
Fig. 3 is the flow chart of embodiment of the method one.
Fig. 4 is the flow chart of embodiment of the method two.
Fig. 5 is the RRPP transmission node structural representation of one embodiment of the invention.
Fig. 6 is the transmission node common equipment structural representation of one embodiment of the invention.
Specific embodiment
For making becoming more apparent of the object, technical solutions and advantages of the present invention expression, below in conjunction with the accompanying drawings and specifically
The present invention is further described in more detail for embodiment.
The technical scheme of one embodiment of the invention is:In two tangent RRPP ring, in a RRPP ring first
Transmission node receives the second hello packet that the first host node sends, and described second hello packet carries the first packaging V LAN
ID, described first packaging V LAN ID are that the first RRPP ring protection of exclusion transmission node common equipment all control VLAN ID is real
Arbitrary VLAN ID in example;Described first transmission node starts PBB function in RRPP domain, and preserves in described second hello packet
The first packaging V LAN ID;The non-RRPP port of described first transmission node receives the data message that user sends, described number
According to message user vlan ID be described first RRPP ring control VLAN when, described first transmission node inquiry with described number
According to the corresponding mapping item of message purpose MAC, PBB is carried out to described data message and encapsulates and forward, wherein, in encapsulation BMAC
Purpose MAC is the bridge MAC in the correspondence mappings list item inquiring, and source MAC is the bridge MAC of described first transmission node, and BVLAN is
Described first packaging V LAN ID, I-SID are preset value.So, it is possible to be carried out by controlling VLAN in ring in RRPP ring
After the data message of transmission carries out PBB encapsulation, it is transmitted, it is possible to achieve the data with controlling VLAN between user in RRPP network
The intercommunication of message.
Wherein, PBB is a kind of two-layer virtual private network (VPN, Virtual Private Network) technology, is
Ieee standard technology, it is nested by MAC Address, user's MAC address is encapsulated among operator's MAC Address, to carry out PBB
Encapsulation, thus isolate to different customer services.When the data message that user is sent carries out PBB encapsulation, it can be its envelope
Load onto MAC Address and the VLAN of operator's distribution.By operator, the MAC Address distributing and VLAN are referred to as backbone network for this
MAC (B-MAC, Backbone MAC) and backbone network VLAN (B-VLAN, Backbone VLAN), wherein, B-MAC includes source B-
MAC and purpose B-MAC.In provider backbone bridging network (PBBN, Provider Backbone Bridge Network),
Transmission node forwards PBB message according to B-MAC and B-VLAN.In the present invention, can in RRPP network, by
Each node on RRPP ring supports PBB technology, realizes PBB encapsulation, to realize the data of the control VLAN between different RRPP domain
Transmission.
PBB encapsulation scheme in the present invention is:
Transmission node when being packaged to user data message, can using the bridge MAC of oneself as source B-MAC, will be with number
According to provider backbone bridging network (PBBN, the Provider Backbone in the corresponding mapping item of message purpose MAC
Bridged Network) the bridge MAC of tunnel destination transmission node is packaged as purpose B-MAC, if transmission node from
Body does not preserve mapping item corresponding with data message purpose MAC, then be packaged broadcast MAC as purpose B-MAC;
In carrying out PBB encapsulation, B-VLAN is chosen as transmission node place RRPP ring and protects the arbitrary VLAN in example
ID, but exclude the control VLAN ID of described RRPP ring, the data message after PBB encapsulation so can be avoided to be controlled again
The restriction of VLAN, as long as B-VLAN is the control VLAN of the described RRPP ring of exclusion in the RRPP ring protection example of transmission node place
Arbitrary VLAN ID of ID, can make the data message after PBB encapsulation normally forward in PBBN.
The transmission node of receipt of subsequent PBB message of the present invention, if itself do not preserve source MAC in this PBB message BMAC
The mapping relations and MAC of data message source between, then create described mapping relations and preserve, and otherwise directly forwards described message.
The mapping relations of wherein foundation, can inquire about when subsequently having message to need and carrying out PBB encapsulation and obtain corresponding BMAC.
To be illustrated with instantiation below.
Embodiment of the method one
, it is 3- that left side configuration domain 1 controls VLAN to the present embodiment taking the networking structure schematic diagram of RRPP tangent rings shown in Fig. 2 as a example
4 (main control VLAN is 3, and sub- control VLAN is 4, and acquiescence main control VLAN ID adds 1, and as son controls VLAN ID), right side configures
It is 5-6 that domain 2 controls VLAN, and the protection example VLAN of left side RRPP ring is 3-10, and the protection example VLAN of right side RRPP ring is 2-
20, middle transmission node common equipment belongs simultaneously to left side RRPP ring and right side RRPP ring, and therefore middle transmission node is public
Equipment has control VLAN 3-6 altogether.
On RRPP ring, the port between equipment is RRPP port, and on RRPP ring, the port between equipment and user is non-RRPP
Port.The present embodiment so that the data message of user 1 one VLAN 4 of transmission is to user 2 is as a example said to technical solution of the present invention
Bright, and premised on the mapping item that there is described data message purpose MAC on transmission node A, Fig. 3 is the flow process of the present embodiment
Figure, comprises the following steps:
Step 301:The master port of host node 1 sends the first hello packet to transmission node on the RRPP ring of left side.
Step 302:Transmission node common equipment receives the first hello packet, fills out in the reserved bit of described hello packet
Fill the first packaging V LAN ID.
In this step, described first hello packet is forwarded to transmission node common equipment, and transmission node common equipment is in institute
The reserved bit stating hello packet fills the first packaging V LAN ID, and described first packaging V LAN ID protects real for left side RRPP ring
Arbitrary VLAN ID of transmission node common equipment all control VLAN is excluded in example.
Wherein, left side RRPP ring protection example VLAN is 3-10, and all control VLAN of transmission node common equipment are 3-
6, thus be excluded that the VLAN ID in the left side RRPP ring protection example of all control VLAN ID of transmission node common equipment is
VLAN 7-10, wherein any one can be it is assumed that select VLAN 7 to make as the first packaging V LAN ID in the present embodiment for selection
For the first packaging V LAN ID.
Equally, if transmission node common equipment receives the first hello packet that host node 2 sends, first
The reserved bit of hello packet fills the second packaging V LAN ID, and described second packaging V LAN ID protects example for right side RRPP ring
Arbitrary VLAN ID of middle exclusion transmission node common equipment all control VLAN, that is, the second packaging V LAN ID can be VLAN2
Or any one of VLAN7-20 (such as VLAN 2).
Step 303:Described first hello packet is transmitted to the secondary port of host node 1 by transmission node common equipment.
Step 304:The secondary port of host node 1 receive that transmission node common equipment sends through the of filling reserved bit
One hello packet, sends the second hello packet to transmission node ring from master port, described second hello packet carries
State the first packaging V LAN 7.
Step 305:All transmission nodes on the RRPP ring of left side receive described second hello packet, start in domain 1
PBB function, and preserve the VLAN 7 in the second hello packet.
In this step, the transmission node B on the RRPP ring of left side, transmission node common equipment, transmission node A are successively received institute
State the second hello packet, be respectively started the PBB function in respective domain 1, and preserve the VLAN 7 in the second hello packet.
Preserving VLAN 7 is in order to when the non-RRPP port of the transmission node on the RRPP ring of left side receives with control VLAN
During 3 or VLAN 4 data message, carried out PBB encapsulation, the B-VLAN of encapsulation is VLAN 7, so it is ensured that carrying
The data message controlling VLAN 3 or VLAN 4 normally forwards between transmission node on RRPP ring.
Step 306:User 1 sends the data message of VLAN 4 to user 2, and the source MAC of described data message is user's 1
MAC, purpose MAC is the MAC of user 2.
Step 307:Transmission node A receives the data message that user 1 sends, and carries out PBB envelope to described data message
Dress.
In this step, transmission node A receives the data message that user 1 sends, and the VLAN ID due to data message is
The control VLAN of left side RRPP ring, therefore will carry out PBB encapsulation to this data message, to ensure that this data message is successfully forwarded to
User 2.Before PBB encapsulation, the transmission node A first mapping item according to the local preservation of described data message purpose MAC inquiry, from
And search the transmission node bridge MAC being connected with the user receiving described data message, it is in the present embodiment and search and user 2 phase
The bridge MAC of transmission node C even, as purpose MAC in BMAC, then carries out PBB encapsulation.PBB encapsulation operation is:Envelope
Purpose MAC in dress B-MAC is the bridge MAC in the correspondence mappings list item inquiring, and source MAC is the bridge MAC, B- of transmission node A
VLAN is VLAN 7, and I-SID is preset value, is set to full F in the present embodiment, for representing that this PBB message is in RRPP domain
PBB message.Wherein the value of this I-SID specifically can be worth with system default or human configuration one.
If transmission node A does not inquire and data message purpose MAC (MAC Address of user 2) corresponding mapping table
, then need to make this data message reach user 2 using broadcast mode, will purpose MAC in B-MAC be encapsulated as broadcasting MAC.
Typically, when transmitting message for the first time between user 1 and user 2, broadcast mode can be passed through, but after transmitting message, transmission
Node A, and transmission node C all can learn to corresponding mapping item (i.e. data message source MAC and PBB encapsulation BMAC
In source MAC), so, subsequently just can directly inquire about mapping item to carry out PBB encapsulation, wherein concrete of mapping item
Habit process will not be described here.
Step 308:Data message forwarding after PBB is encapsulated by transmission node A is gone out.
Because the data message after PBB encapsulation is unicast message, therefore transmission node A is transmitted to this ring by RRPP port
Next-hop transmission node, is transmission node common equipment in the present embodiment.
Step 309:Transmission node common equipment receives the data message after PBB encapsulation, if described data message
User vlan ID belongs to the protection example VLAN ID of described second RRPP ring, then the BVLAN in this PBB encapsulation of data message
Heavy label is described second packaging V LAN, then forwards from the RRPP port of described second RRPP ring;Otherwise decapsulate institute
State PBB encapsulation of data message, then forward from the RRPP port of described second RRPP ring.
In this step, transmission node common equipment receives the datagram through PBB encapsulation that transmission node A sends
Literary composition, first determines whether whether the user vlan ID of described data message belongs to the protection example VLAN ID of described second RRPP ring.
In the present embodiment, the user vlan ID of described data message is VLAN 4, and the protection example of the second RRPP ring is VLAN2-20,
The described user vlan ID stating data message belongs to the protection example VLAN ID of the second RRPP ring, and therefore transmission node is public sets
Standby is described second packaging V LAN the BVLAN heavy label in this PBB encapsulation of data message, then from described second RRPP ring
RRPP port forwards.Here the second packaging V LAN is the 2nd RRPP of exclusion transmission node common equipment all control VLAN
Arbitrary VLAN ID of ring protection example it is assumed that being VLAN 10, then by the BVLAN (VLAN 7) in this PBB encapsulation of data message
Heavy label is VLAN 10, then forwards from the RRPP port of described second RRPP ring.
If the protection example of the second RRPP ring is VLAN 5-20, the user vlan 4 of this PBB encapsulation of data message is not
Belong to the protection example VLAN ID of the second RRPP ring, now message is directly decapsulated, by second by transmission node common equipment
The RRPP port of RRPP ring forwards the data message after decapsulation.
Step 310:Transmission node C receives the data message after the PBB encapsulation that transmission node common equipment sends, deblocking
Fill this message and be transmitted to user 2.
In this step, transmission node C receives the data message after the PBB encapsulation that transmission node common equipment sends, will
It is decapsulated, and the data message after decapsulation is sent to user 2 by non-RRPP port.
In the present embodiment, if transmission node A carries out PBB encapsulation, do not inquire mapping item, but by destination address
When being packaged into broadcast MAC, after each node in this time domain 2 receives this broadcasting packet, all can learn the MAC and PBB envelope of user 1
Mapping relations between the source MAC of the B-MAC in dress, all can be decapsulated, and be forwarded, and now, only user 2 connects
After receiving message, just can send a response message to transmission node C, then now, will will learn to arrive by transmission node C
Response message is sent to transmission node A by mapping relations, and reaches user 1, and, user 2 is sent to the data message of user 1
Also user 1 can be sent to by inquiring about this mapping relations.
The present embodiment is received with the non-RRPP port of transmission node and belongs to the data that itself place RRPP ring controls VLAN ID
As a example message, technical solution of the present invention is illustrated, PBB is carried out to data message by the transmission node being connected with user
Encapsulation, makes the data message belonging to control VLAN also normally can forward on RRPP ring, increased can across between the user of RRPP ring
The VLAN passage of communication, and reduce data message MAC address entries are taken on RRPP equipment.
Embodiment of the method two
Embodiment of the method one has only carried out PBB encapsulation to the data message of the control VLAN belonging to RRPP ring, and this enforcement
In example, then can carry out PBB encapsulation to the data message of the VLAN in all protection examples in RRPP ring, so, can be further
Reduce the mac learning list item of each node in RRPP, also can carry out the transmission of data message simultaneously.Specifically, the present embodiment will
To receive user vlan for non-controlling VLAN from the non-RRPP port of transmission node, but belong to the RRPP ring protection of transmission node place
The data-message transmission process of example VLAN ID, and this transmission node does not locally have the mapping table of described data message purpose MAC
Item angle is described further to technical solution of the present invention, still adopts the networking structure schematic diagram of Fig. 2, and Fig. 4 is the present embodiment
Flow chart, comprises the following steps:
Step 401~step 405 is identical with the step 301~step 305 in embodiment of the method one, will not be described here.
Step 406:User 1 sends the data message of VLAN 8 to user 2, and the source MAC of described data message is user's 1
MAC Address, target MAC (Media Access Control) address is the MAC of user 2.
Step 407:Transmission node A receives the data message that user 1 sends, and carries out PBB envelope to described data message
Dress.
In this step, transmission node A receives the data message that user 1 sends, and the user vlan of this data message is
VLAN 8, belongs to the protection example VLAN ID of left side RRPP ring, therefore will carry out PBB encapsulation to this data message, to ensure this
Data message is successfully forwarded to user 2.Before PBB encapsulation, transmission node A first inquires about this according to described data message purpose MAC
The mapping item that ground preserves, is not found the mapping item being mated with described data message purpose MAC, is then broadcasted
Encapsulation.PBB encapsulation operation is:Purpose MAC in encapsulation B-MAC is broadcast MAC, and source MAC is the bridge MAC, B- of transmission node A
VLAN is VLAN 7, and I-SID is full F (representing the PBB message that this PBB message is in RRPP domain), and this I-SID can be certainly
Other preset values, the present embodiment is not particularly limited.
Step 408:Data message forwarding after PBB is encapsulated by transmission node A is gone out.
In this step, for the non-RRPP of other on transmission node A port, then by the data after PBB encapsulation in step 407
Message directly decapsulates, and forwards from non-RRPP port;For the RRPP port on transmission node A, then after PBB being encapsulated
Data message is transmitted to this ring next-hop transmission node by RRPP port, is transmission node common equipment in the present embodiment.
Step 409:Transmission node common equipment receives the data message after PBB encapsulation, sets up source MAC in BMAC
Mapping item and described data message source MAC between simultaneously preserves.
In this step, transmission node common equipment is set up in BMAC between source MAC and described data message source MAC
Mapping item simultaneously preserves, and after setting up this mapping item, the non-RRPP port of transmission node common equipment receives and is sent to afterwards
It is possible to unicast PBB encapsulation is carried out according to this mapping item after the data message of user 1.
Step 410:If the user vlan ID of described data message belongs to the protection example VLAN of described second RRPP ring
ID, then transmission node common equipment is described second packaging V LAN the BVLAN heavy label in this PBB encapsulation of data message, so
Forward from the RRPP port of described second RRPP ring afterwards;Otherwise decapsulate described PBB encapsulation of data message, then from described
The RRPP port of the second RRPP ring forwards.
In this step, transmission node common equipment is set up in BMAC between source MAC and described data message source MAC
Mapping item after preserving, determines whether whether the user vlan ID of described data message belongs to described second RRPP ring
Protection example VLAN ID.In the present embodiment, the described user vlan ID stating data message is VLAN 8, the guarantor of the second RRPP ring
Shield example is VLAN2-20, and the described user vlan ID stating data message belongs to the protection example VLAN ID of the second RRPP ring,
Therefore transmission node common equipment is described second packaging V LAN the BVLAN heavy label in this PBB encapsulation of data message, then
Forward from the RRPP port of described second RRPP ring.Here the second packaging V LAN is that exclusion transmission node common equipment owns
The second RRPP ring controlling VLAN protects arbitrary VLAN ID of example it is assumed that being VLAN 10, then by this PBB encapsulation of data message
In BVLAN (VLAN 7) heavy label be VLAN 10, then forward from the RRPP port of described second RRPP ring.
If the protection example of the second RRPP ring is VLAN 10-20, the user vlan 8 of this PBB encapsulation of data message
It is not belonging to the protection example VLAN ID of the second RRPP ring, now message is directly decapsulated by transmission node common equipment, by
The RRPP port of two RRPP ring forwards the data message after decapsulation.
Because this PBB encapsulated message is broadcasting packet, therefore transmission node common equipment also will not carry out BVLAN and mark again
The PBB message of note is forwarded by the RRPP port of the first RRPP ring, and the data message after decapsulation is passed through the non-of transmission node
RRPP port forwards.
Step 411:Transmission node C receives the data message after the PBB encapsulation that transmission node common equipment sends, study
The source address of B-MAC in described data message, sets up the mapping between source MAC and described data message source MAC in B-MAC
List item simultaneously preserves, and then decapsulates this message and is transmitted to user 2.
Those skilled in the art, it is recognised that each transmission node in domain 2 all can receive this PBB encapsulated message, can
Decapsulated and forwarded in the non-RRPP port of itself, learnt corresponding mapping item simultaneously.Simply only transmission node C
Message after decapsulation can be only achieved user 2.And the mapping item that other transmission node learns all can have ageing time, old
The change time can be automatically deleted when reaching.
In this step, transmission node C receives the data message after the PBB encapsulation that transmission node common equipment sends, and learns
Practise the source address (i.e. the bridge MAC Address of transmission node common equipment) of B-MAC in described data message, set up source MAC in B-MAC
Mapping item between address and described data message source MAC (MAC Address of user 1) simultaneously preserves, due to user 2 pass through non-
RRPP port is connected with transmission node C, and data message decapsulation is then forwarded to user 2 by therefore transmission node C.
When user 2 is sent to user's 1 data message afterwards, the MAC of the transmission node A that will be set up according to transmission node C
Mapping item between the MAC Address of address and user 1 carries out unicast encapsulation, realizes the data message between user 1 and user 2
Transmission.
If the data message after PBB encapsulation is broadcasting packet, transmission node D and host node 2 also can receive this PBB encapsulation
Data message, transmission node D and host node 2 all can preserve in B-MAC between source MAC and described data message source MAC
Mapping item, then according to RRPP port forwards PBB encapsulated message, non-RRPP port to decapsulate the mode that data message forwards again
E-Packet.
The present embodiment receives user vlan with the non-RRPP port of transmission node and for non-controlling VLAN but belongs to RRPP ring and protect
Shield example VLAN ID, and this transmission node locally do not have as a example the mapping item of described data message purpose MAC to skill of the present invention
Art scheme is illustrated, and by transmission node A, data message is carried out with PBB broadcast and encapsulates and forward, makes the biography on RRPP ring
Defeated node is set up in B-MAC the mapping item between source MAC and described data message source MAC and is preserved so that RRPP ring
On transmission node all set up described mapping item, receive in the non-RRPP port of each transmission node follow-up and be sent to user
PBB unicast encapsulation can be carried out during 1 data message.
For said method, invention additionally discloses a kind of rapid ring protection protocol RRPP transmission node equipment, the present invention
Disclosed equipment is as shown in figure 5, include:
Receiver module 501, for receiving the second hello packet that described first host node sends, described 2nd Hello report
Literary composition carries the first packaging V LAN ID, and described first packaging V LAN ID is the exclusion all control of described transmission node common equipment
Arbitrary VLAN ID in the first RRPP ring protection example of VLAN ID;It is additionally operable to the data message that receive user is sent.
Starting module 502, for starting PBB function in RRPP domain.
Memory module 503, for preserving the first packaging V LAN ID in described second hello packet.
Judge module 504, whether the VLAN ID for judging data message belongs to described first RRPP ring controls VLAN
ID.
Enquiry module 505, for inquiry and the corresponding mapping item of data message purpose MAC that user sends.
Package module 506, for carrying out PBB encapsulation to described data message, wherein, purpose MAC in encapsulation BMAC is
Bridge MAC in the correspondence mappings list item inquiring, source MAC are the bridge MAC of described transmission node, and BVLAN is described first encapsulation
VLAN ID, I-SID are preset value.
Sending module 507, for forwarding the data message after PBB encapsulation.
If the user vlan ID of described data message is not the control VLAN of described first RRPP ring, but belong to described
First RRPP ring protection example VLAN ID,
Described enquiry module 505 is additionally operable to, and inquires about and the corresponding mapping table of data message purpose MAC that user sends
?;
Described package module 506 is additionally operable to, and carries out PBB encapsulation to described data message, wherein, encapsulates the purpose in BMAC
MAC is the bridge MAC in the correspondence mappings list item inquiring, and source MAC is the bridge MAC of described transmission node, and BVLAN is described first
Packaging V LAN ID, I-SID are preset value.
If described enquiry module is inquired about less than mapping item corresponding with described data message purpose MAC,
Package module 506 is further used for, and carries out PBB encapsulation to described data message, wherein, encapsulates the purpose in BMAC
MAC is broadcast MAC, and source MAC is the bridge MAC of described transmission node, and BVLAN is described first packaging V LAN ID, and I-SID is pre-
If value;
Sending module 507 is additionally operable to, and the message after encapsulation is forwarded from the RRPP port of transmission node, makes in RRPP
Other nodes all can receive this message, and set up the mapping between source MAC and described data message source MAC in BMAC
List item simultaneously preserves.
For said method, invention additionally discloses a kind of rapid ring protection protocol RRPP transmission node common equipment, this
The transmission node common equipment of disclosure of the invention is as shown in fig. 6, include:
Receiver module 601, for receiving the second hello packet that described second host node sends, described 2nd Hello report
Literary composition carries the second packaging V LAN ID, and described second packaging V LAN ID is the exclusion all control of described transmission node common equipment
Arbitrary VLAN ID in the second RRPP ring protection example of VLAN ID;It is additionally operable to receive the PBB envelope that the first transmission node sends
Dress data message, purpose MAC in the BMAC of described PBB encapsulation of data message is the correspondence that described first transmission node inquires
Bridge MAC in mapping item, source MAC are the bridge MAC of described first transmission node, and BVLAN is the first packaging V LAN ID, I-SID
For preset value.
Starting module 602, for starting PBB function.
Memory module 603, for preserving the second packaging V LAN ID in described second hello packet.
Judge module 604, whether the user vlan ID for judging described data message belongs to the guarantor of described 2nd RRPP
Shield example VLAN ID.
Package module 605, if the user vlan ID of described data message belongs to the protection example of described second RRPP ring
VLAN ID, then being used for the BVLAN heavy label in this PBB encapsulation of data message is described second packaging V LAN.
Decapsulation module 606, if the user vlan ID of described data message is not belonging to the protection of described second RRPP ring
Example VLAN ID, then be used for decapsulating PBB encapsulation of data message.
Sending module 607, for forwarding the data message after PBB encapsulation and the data message after decapsulation.
Described receiver module receives the data message that described first transmission node sends, and the use of described data message
When family VLAN ID belongs to the control VLAN of described second RRPP ring, this equipment also includes:
Enquiry module 608, for inquiring about mapping item corresponding with described data message purpose MAC;
Package module 605 is additionally operable to, and carries out PBB encapsulation to described data message, wherein, encapsulates purpose MAC in BMAC
For the bridge MAC in the correspondence mappings list item that inquires, source MAC is the bridge MAC of described first transmission node, and BVLAN is described the
Two packaging V LAN ID, I-SID are preset value.
If purpose MAC in the BMAC of described PBB encapsulation of data message is broadcast MAC, this equipment further includes:
List item creation module 609, is used for setting up source MAC and described data in described PBB encapsulation of data message BMAC
Mapping item between message source MAC.
Memory module 603 is additionally operable to, and preserves mapping item.
Sending module 607 is additionally operable to, and forwards PBB encapsulation of data message from the RRPP port of described second RRPP ring, makes
Other nodes in RRPP ring all can receive this message, and set up in BMAC source MAC and described data message source MAC it
Between mapping item and preserve.
Before described receiver module receives the second hello packet that described second host node sends,
Receiver module 601 is additionally operable to, and receives the first hello packet that the second host node sends.
Sending module 607 is additionally operable to, and forwards described first hello packet to described second host node.
Before described receiver module receives the second hello packet that described second host node sends, this transmission node is public
Equipment also includes,
Filling module 610, fills the second packaging V LAN ID for the reserved bit in described first hello packet, and described the
Two packaging V LAN ID are in the second RRPP ring protection example of exclusion described transmission node common equipment all control VLAN ID
Arbitrary VLAN ID.
Receiver module 601 is additionally operable to, and receives the first hello packet that the second host node sends.
Sending module 607 is additionally operable to, and forwards described first hello packet to described second host node.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all essences in the present invention
Any modification, equivalent substitution and improvement done within god and principle etc., should be included within the scope of protection of the invention.
Claims (14)
1. a kind of method realizing tangent rings user data message intercommunication, is applied to rapid ring protection protocol RRPP tangent ring networks
Network, the first RRPP ring is tangent with the second RRPP ring, and the first host node is the host node of the first RRPP ring, and the first transmission node is the
A transmission node on one RRPP ring, the second host node is the host node of the second RRPP ring, the protection example of the first RRPP ring
Inside comprise the control VLAN of the first RRPP ring, in the protection example of the second RRPP ring, comprise the control VLAN of the second RRPP ring, and
Equipment in all RRPP domain all supports provider backbone bridging PBB technology, and transmission node common equipment is to belong simultaneously to first
The node device of RRPP ring and the second RRPP ring is it is characterised in that the method includes:
Described first transmission node receives the second hello packet that described first host node sends, described second hello packet
Carry the first packaging V LAN ID, described first packaging V LAN ID is the exclusion all control VLAN of described transmission node common equipment
Arbitrary VLAN ID in the first RRPP ring protection example of ID;
Described first transmission node starts PBB function in RRPP domain, and preserves the first encapsulation in described second hello packet
VLAN ID;
The non-RRPP port of described first transmission node receives the data message that user sends, the user of described data message
When VLAN ID is the control VLAN of described first RRPP ring, described first transmission node is inquired about and described data message purpose MAC
Corresponding mapping item, carries out PBB to described data message and encapsulates and forward, and wherein, purpose MAC in encapsulation BMAC is inquiry
To correspondence mappings list item in bridge MAC, source MAC is the bridge MAC of described first transmission node, BVLAN be described first encapsulation
VLAN ID, I-SID are preset value.
If 2. method according to claim 1 is not it is characterised in that the user vlan ID of described data message is institute
State the control VLAN of the first RRPP ring, but when belonging to the protection example VLAN ID of described first RRPP ring, the method is wrapped further
Include:
Described first transmission node inquires about mapping item corresponding with described data message purpose MAC, and described data message is entered
Row PBB encapsulates and forwards, and wherein, purpose MAC in encapsulation BMAC is bridge MAC, source MAC in the correspondence mappings list item inquiring
For the bridge MAC of described first transmission node, BVLAN is described first packaging V LAN ID, and I-SID is preset value.
If method according to claim 1 and 2 it is characterised in that described first transmission node inquiry less than with institute
State the corresponding mapping item of data message purpose MAC, the method further includes:
Described first transmission node carries out PBB encapsulation to described data message, and wherein, purpose MAC in encapsulation BMAC is broadcast
MAC, source MAC are the bridge MAC of described first transmission node, and BVLAN is described first packaging V LAN ID, and I-SID is preset value;
Message after encapsulation is forwarded from the RRPP port of described first transmission node, makes the other nodes in RRPP ring equal
This message can be received, and set up in BMAC the mapping item between source MAC and described data message source MAC and preserve.
4. a kind of method realizing tangent rings user data message intercommunication, is applied to rapid ring protection protocol RRPP tangent ring networks
Network, the first RRPP ring is tangent with the second RRPP ring, and the first host node is the host node of the first RRPP ring, and the first transmission node is the
A transmission node on one RRPP ring, the second host node is the host node of the second RRPP ring, the protection example of the first RRPP ring
Inside comprise the control VLAN of the first RRPP ring, in the protection example of the second RRPP ring, comprise the control VLAN of the second RRPP ring, and
Equipment in all RRPP domain all supports provider backbone bridging PBB technology, and transmission node common equipment is to belong simultaneously to first
The node device of RRPP ring and the second RRPP ring is it is characterised in that the method includes:
Described transmission node common equipment receives the second hello packet that described second host node sends, described 2nd Hello report
Literary composition carries the second packaging V LAN ID, and described second packaging V LAN ID is the exclusion all control of described transmission node common equipment
Arbitrary VLAN ID in the second RRPP ring protection example of VLAN ID;
Described common equipment starts PBB function, and preserves the second packaging V LAN ID in described second hello packet;
Described transmission node common equipment receives the PBB encapsulation of data message that described first transmission node sends, described PBB
Purpose MAC in the BMAC of encapsulation of data message is the bridge MAC in the correspondence mappings list item that described first transmission node inquires,
Source MAC is the bridge MAC of described first transmission node, and BVLAN is the first packaging V LAN ID, and I-SID is preset value;
If the user vlan ID of described data message belongs to the protection example VLAN ID of described second RRPP ring, described biography
Defeated node common equipment is described second packaging V LAN the BVLAN heavy label in this PBB encapsulation of data message, then from described
The RRPP port of the second RRPP ring forwards;Otherwise decapsulate described PBB encapsulation of data message, then from described 2nd RRPP
The RRPP port of ring forwards.
5. method according to claim 4 is it is characterised in that also include:
Described transmission node common equipment receives the data message that described first transmission node sends, and described data message
User vlan ID belong to described second RRPP ring control VLAN when, the inquiry of described transmission node common equipment and described number
According to the corresponding mapping item of message purpose MAC, PBB is carried out to described data message and encapsulates and forward, wherein, in encapsulation BMAC
Purpose MAC is the bridge MAC in the correspondence mappings list item inquiring, and source MAC is the bridge MAC of described transmission node common equipment,
BVLAN is described second packaging V LAN ID, and I-SID is preset value.
If 6. method according to claim 4 is it is characterised in that mesh in the BMAC of described PBB encapsulation of data message
MAC be broadcast MAC, the method further includes:
Described transmission node common equipment sets up source MAC and described data message in described PBB encapsulation of data message BMAC
Mapping item between the MAC of source simultaneously preserves;
If the user vlan ID of described data message belongs to the protection example VLAN ID of described second RRPP ring, described biography
Defeated node common equipment is described second packaging V LAN the BVLAN heavy label in this PBB encapsulation of data message, then from described
The RRPP port of the second RRPP ring forwards, and makes the other nodes in RRPP ring all can receive this message, and sets up BMAC
Mapping item between middle source MAC and described data message source MAC simultaneously preserves;Otherwise decapsulate described PBB encapsulation of data
Message, then forwards from the RRPP port of described second RRPP ring.
7. method according to claim 4 is it is characterised in that described transmission node common equipment receives the described second main section
Before the second hello packet that point sends, the method further includes:
Described transmission node common equipment receives the first hello packet that the second host node sends, in a described Hello
The reserved bit of message fills the second packaging V LAN ID, and described second packaging V LAN ID is to exclude described transmission node common equipment
Arbitrary VLAN ID in the second RRPP ring protection example of all control VLAN ID;
Described transmission node common equipment forwards described first hello packet to described second host node.
8. a kind of rapid ring protection protocol RRPP transmission node, is applied to rapid ring protection protocol RRPP tangent rings network,
Support provider backbone bridging PBB technology, the first RRPP ring is tangent with the second RRPP ring, and the first host node is the first RRPP ring
Host node, the second host node is the host node of the second RRPP ring, comprises the first RRPP ring in the protection example of the first RRPP ring
Control VLAN, in the protection example of the second RRPP ring, comprise the control VLAN of the second RRPP ring, transmission node common equipment is same
When belong to the node device of the first RRPP ring and the second RRPP ring it is characterised in that this equipment includes:
Receiver module, for receiving the second hello packet that described first host node sends, described second hello packet carries
First packaging V LAN ID, described first packaging V LAN ID are exclusion described transmission node common equipment all control VLAN ID
First RRPP ring protection example in arbitrary VLAN ID;It is additionally operable to the data message that receive user is sent;
Starting module, for starting PBB function in RRPP domain;
Memory module, for preserving the first packaging V LAN ID in described second hello packet;
Judge module, whether the user vlan ID for judging data message is the control VLAN of described first RRPP ring;
Enquiry module, for inquiry and the corresponding mapping item of data message purpose MAC that user sends;
Package module, for carrying out PBB encapsulation to described data message, wherein, purpose MAC in encapsulation BMAC inquires
Bridge MAC in correspondence mappings list item, source MAC are the bridge MAC of described transmission node, and BVLAN is described first packaging V LAN ID,
I-SID is preset value;
Sending module, for forwarding the data message after PBB encapsulation.
If transmission node according to claim 8 it is characterised in that the user vlan ID of described data message not
It is the control VLAN of described first RRPP ring, but when belonging to the protection example VLAN ID of described first RRPP ring,
Described enquiry module is used for, and inquires about and the corresponding mapping item of data message purpose MAC that user sends;
Described package module is used for, and carries out PBB encapsulation to described data message, and wherein, purpose MAC in encapsulation BMAC is inquiry
To correspondence mappings list item in bridge MAC, source MAC is the bridge MAC of described transmission node, BVLAN be described first packaging V LAN
ID, I-SID are preset value.
If 10. transmission node according to claim 8 or claim 9 it is characterised in that described enquiry module inquiry less than with institute
State the corresponding mapping item of data message purpose MAC,
Package module is further used for, and carries out PBB encapsulation to described data message, and wherein, purpose MAC in encapsulation BMAC is wide
Broadcast MAC, source MAC is the bridge MAC of described transmission node, BVLAN is described first packaging V LAN ID, I-SID is preset value;
Sending module, for being forwarded the message after encapsulation from the RRPP port of transmission node, makes the other sections in RRPP
Point all can receive this message, and set up in BMAC the mapping item between source MAC and described data message source MAC and protect
Deposit.
A kind of 11. rapid ring protection protocol RRPP transmission node common equipments, are applied to rapid ring protection protocol RRPP phase
Cut loop network, support provider backbone bridging PBB technology, the first RRPP ring is tangent with the second RRPP ring, the first host node is the
The host node of one RRPP ring, the first transmission node is a transmission node on the first RRPP ring, and the second host node is second
The host node of RRPP ring, comprises the control VLAN of the first RRPP ring, the guarantor of the second RRPP ring in the protection example of the first RRPP ring
The control VLAN of the second RRPP ring is comprised, transmission node common equipment is to belong simultaneously to the first RRPP ring and second in shield example
The node device of RRPP ring is it is characterised in that this equipment includes:
Receiver module, for receiving the second hello packet that described second host node sends, described second hello packet carries
Second packaging V LAN ID, described second packaging V LAN ID are exclusion described transmission node common equipment all control VLAN ID
Second RRPP ring protection example in arbitrary VLAN ID;It is additionally operable to receive the PBB encapsulation of data report that the first transmission node sends
Literary composition, purpose MAC in the BMAC of described PBB encapsulation of data message is the correspondence mappings list item that described first transmission node inquires
In bridge MAC, source MAC is the bridge MAC of described first transmission node, BVLAN be the first packaging V LAN ID, I-SID is default
Value;
Starting module, for starting PBB function;
Memory module, for preserving the second packaging V LAN ID in described second hello packet;
Judge module, the protection whether the user vlan ID for judging described data message belongs to described second RRPP ring is real
Example VLAN ID;
Package module, if the user vlan ID of described data message belongs to the protection example VLAN of described second RRPP ring
ID, then being used for the BVLAN heavy label in this PBB encapsulation of data message is described second packaging V LAN;
Decapsulation module, if the user vlan ID of described data message is not belonging to described second RRPP ring protection example VLAN
ID, then be used for decapsulating PBB encapsulation of data message;
Sending module, for forwarding the data message after PBB encapsulation and the data message after decapsulation.
12. equipment according to claim 11 are it is characterised in that this equipment also includes:
Described receiver module is additionally operable to, the data message that described first transmission node of reception sends, and described data message
When user vlan ID belongs to the control VLAN of described second RRPP ring;
Enquiry module, for inquiring about mapping item corresponding with described data message purpose MAC;
Package module, for carrying out PBB encapsulation to described data message, wherein, purpose MAC in encapsulation BMAC inquires
Bridge MAC in correspondence mappings list item, source MAC are the bridge MAC of described first transmission node, and BVLAN is described second packaging V LAN
ID, I-SID are preset value.
13. if equipment according to claim 11 are it is characterised in that in the BMAC of described PBB encapsulation of data message
Purpose MAC is broadcast MAC, and this equipment further includes:
List item creation module, is used for setting up source MAC and described data message source in described PBB encapsulation of data message BMAC
Mapping item between MAC;
Memory module is additionally operable to, and preserves mapping item;
Sending module is additionally operable to, and forwards PBB encapsulation of data message from the RRPP port of described second RRPP ring, makes in RRPP ring
Other nodes all can receive this message, and sets up the mapping table between source MAC and described data message source MAC in BMAC
Item simultaneously preserves.
14. equipment according to claim 11 are it is characterised in that described receiver module receives described second host node transmission
The second hello packet before,
Receiver module is additionally operable to, and receives the first hello packet that the second host node sends;
Filling module, fills the second packaging V LAN ID, described second encapsulation for the reserved bit in described first hello packet
VLAN ID is arbitrary in the second RRPP ring protection example exclude described transmission node common equipment all control VLAN ID
VLAN ID;
Sending module is additionally operable to, and forwards described first hello packet to described second host node.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310684560.9A CN103684967B (en) | 2013-12-13 | 2013-12-13 | Method and device for achieving tangent ring user data message intercommunication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310684560.9A CN103684967B (en) | 2013-12-13 | 2013-12-13 | Method and device for achieving tangent ring user data message intercommunication |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103684967A CN103684967A (en) | 2014-03-26 |
CN103684967B true CN103684967B (en) | 2017-02-15 |
Family
ID=50321340
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310684560.9A Active CN103684967B (en) | 2013-12-13 | 2013-12-13 | Method and device for achieving tangent ring user data message intercommunication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103684967B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101163083A (en) * | 2007-10-19 | 2008-04-16 | 杭州华三通信技术有限公司 | Multi-point to multi-point VPN interconnecting method, system and device in PBT network |
CN102104523A (en) * | 2009-12-16 | 2011-06-22 | 中兴通讯股份有限公司 | Data stream transmission method based on PBB-TE sectional tunnel, and node |
EP2375646A1 (en) * | 2007-11-02 | 2011-10-12 | Telefonaktiebolaget L M Ericsson AB (Publ) | A system and method for ethernet protection switching in a provider backbone bridging traffic engineering domain |
CN102215165A (en) * | 2011-05-27 | 2011-10-12 | 杭州迪普科技有限公司 | Message processing method for tangent ring networks and Ethernet switch |
-
2013
- 2013-12-13 CN CN201310684560.9A patent/CN103684967B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101163083A (en) * | 2007-10-19 | 2008-04-16 | 杭州华三通信技术有限公司 | Multi-point to multi-point VPN interconnecting method, system and device in PBT network |
EP2375646A1 (en) * | 2007-11-02 | 2011-10-12 | Telefonaktiebolaget L M Ericsson AB (Publ) | A system and method for ethernet protection switching in a provider backbone bridging traffic engineering domain |
CN102104523A (en) * | 2009-12-16 | 2011-06-22 | 中兴通讯股份有限公司 | Data stream transmission method based on PBB-TE sectional tunnel, and node |
CN102215165A (en) * | 2011-05-27 | 2011-10-12 | 杭州迪普科技有限公司 | Message processing method for tangent ring networks and Ethernet switch |
Also Published As
Publication number | Publication date |
---|---|
CN103684967A (en) | 2014-03-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104135420B (en) | A kind of method, equipment and the system of message forwarding | |
CN103841023B (en) | The method and apparatus of data forwarding | |
US9118687B2 (en) | Methods and apparatus for a scalable network with efficient link utilization | |
CN104869042B (en) | Message forwarding method and device | |
US20120063451A1 (en) | Shared virtual tunnels supporting mac learning in communication networks | |
US20140219135A1 (en) | Virtual Private Network Implementation Method and System Based on Traffic Engineering Tunnel | |
US20100118882A1 (en) | Method, Apparatus, and System For Packet Transmission | |
CN106992917A (en) | Message forwarding method and device | |
EP2989755B1 (en) | Efficient multicast delivery to dually connected (vpc) hosts in overlay networks | |
WO2015143879A1 (en) | Method for sending multicast packet and switch | |
CN101552727A (en) | Method of transmitting and receiving message and a provider edge router | |
CN101262429B (en) | A system and method for realizing virtual private network communication | |
WO2008046359A1 (en) | Method and apparatus for isolating the different virtual local area network services | |
CN107018076A (en) | A kind of monitoring messages method and apparatus | |
WO2020108531A1 (en) | Packet forwarding | |
CN105337884A (en) | Method and device for achieving multistage message editing service control on the basis of logic port | |
CN104079466B (en) | A kind of message processing method and equipment | |
WO2020220459A1 (en) | Vxlan and openflow-based method and system for sharing virtual home network | |
WO2012122844A1 (en) | Method and system for domain-based interconnection of transparent interconnection over lots of links network | |
CN202285423U (en) | Intelligent set top box | |
US9860160B2 (en) | Multipath switching using per-hop virtual local area network classification | |
CN105933235B (en) | Data communications method and device | |
CN103152265B (en) | Message forwarding method and equipment in SPB (Shortest Path Bridge) network | |
EP2670088B1 (en) | Trill network interconnection method and system | |
CN107426346B (en) | Method and system for two-layer message to safely pass through three-layer network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CP03 | Change of name, title or address |
Address after: 310052 Binjiang District Changhe Road, Zhejiang, China, No. 466, No. Patentee after: Xinhua three Technology Co., Ltd. Address before: 310053 Hangzhou hi tech Industrial Development Zone, Zhejiang province science and Technology Industrial Park, No. 310 and No. six road, HUAWEI, Hangzhou production base Patentee before: Huasan Communication Technology Co., Ltd. |
|
CP03 | Change of name, title or address |