CN103840996B - The method and system of user port VLAN traffic management are realized in optical network unit - Google Patents

The method and system of user port VLAN traffic management are realized in optical network unit Download PDF

Info

Publication number
CN103840996B
CN103840996B CN201410074855.9A CN201410074855A CN103840996B CN 103840996 B CN103840996 B CN 103840996B CN 201410074855 A CN201410074855 A CN 201410074855A CN 103840996 B CN103840996 B CN 103840996B
Authority
CN
China
Prior art keywords
vlan
business
onu
vlan tag
tag
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410074855.9A
Other languages
Chinese (zh)
Other versions
CN103840996A (en
Inventor
刘益
曾颜
郑艳烈
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fiberhome Telecommunication Technologies Co Ltd
Original Assignee
Fiberhome Telecommunication Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fiberhome Telecommunication Technologies Co Ltd filed Critical Fiberhome Telecommunication Technologies Co Ltd
Priority to CN201410074855.9A priority Critical patent/CN103840996B/en
Publication of CN103840996A publication Critical patent/CN103840996A/en
Application granted granted Critical
Publication of CN103840996B publication Critical patent/CN103840996B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides the method and system that the management of user port VLAN traffic is realized in a kind of optical network unit, this method is according to VLAN traffic configuration data attribute list is in related service hardware and is operated in logic, and VLAN traffic configuration data attribute list is preserved in ONU the first memory space, the VLAN traffic configuration data issued according to gateway is formed in a new second memory space of the table storage in ONU, according to first, the comparative result of list data in second memory space, update the VLAN traffic configuration data attribute list in related service hardware and logic and the first memory space, come into force business configuration.The present invention, the configuration data issued according to webmastering software, first carry out the comparison of new, the old configuration similarities and differences, then step action once is determined according to the content of mark, the configuration of user port VLAN traffic can efficiently be realized and deleted, VLAN traffic configuration status can be more fully tracked, not have specific requirement to hardware state, method can be cut, and performance period is short.

Description

The method and system of user port VLAN traffic management are realized in optical network unit
Technical field
The present invention relates to PON (Passive Optical Network, passive optical-fiber network) ONU (Optical Network Unit, optical network unit) Layer 2 data stream VLAN tag in system (Virtual Local Area Network, VLAN) processing function realization, the Layer 2 data stream VLAN tag processing function refers in ONU systems, and it is counted Decide whether to carry out user's up-downgoing message VLAN tag processing according to stream engine, ONU VLAN tags process object includes IEEE CVLAN (the Customer that (Institute of Electrical and Electronics Engineers) 802.1Q is defined VLAN, user private network VLAN tag) and IEEE 802.1ad QinQ (also referred to as Stacked VLAN or Double VLAN, refer to User private network VLAN tag is encapsulated in runner public-network VLAN tag) introduce SVLAN (Service Provider VLAN, runner public-network VLAN tag).
Background technology
At present, PON ONU include EPON (Ethernet Passive Optical Network, ethernet passive optical network) With GPON (Gigabit-Capable Passive Optical Network, gigabit passive optical network).Based on gigabit ether The EPON system of fidonetFido is a kind of novel optical fiber access network technology defined by IEEE802.3, and it uses point-to-multipoint group Web frame, with the features such as transmission bandwidth is high, autgmentability is strong, can provide multiple business on Ethernet.GPON technologies are EPON broadband access standard based on ITU-TG.984.x standards, is considered as realization by domestic and international most of operators at present High bandwidth, diversification access the desirable technique of network service, compared with EPON, and GPON is in line speed, bandwidth availability ratio, maximum point Certain advantage is taken in terms of light when operation management.
PON system is by the optical line terminal OLT (Optical Line Terminal) of local side, the optical-fiber network list of user terminal First ONU (Optical Network Unit) and Optical Distribution Network ODN (Optical Distribution Network) compositions, As shown in Figure 1.
CSMA/CD (visit by Carrier Sense Multiple Access/Collision Detect, collision sense multiple Ask/collision detection) mechanism can ensure the normal communication of Ethernet data network, nonetheless, when the number of host in network reaches To not only forwarding performance can drastically decline during certain amount, and it can bring net can be directly resulted under broadcast storm, extreme case Network is paralysed.Conventional switch can only split collision domain, although realizing that LAN interconnections can solve conflict using such switching equipment (Collision) serious the problem of, but still broadcasting packet can not be isolated, this is that the main cause for needing VLAN splits broadcast Domain.IEEE 802.1Q vlan technologys can be divided into an actual LAN LAN --- the VLAN, each VLAN of multiple logics Constitute a broadcast domain, can be communicated between the main frame in VLAN, and the main frame between VLAN then can not directly intercommunication, therefore, extensively Text is reported to be limited in a VLAN.Optical network unit is operated in the data link layer of OSI network model, the equipment one of early stage As can only identification data link layer packaging form (some current chip solutions can recognize that more than data link layer content), because This, VLAN tag also can only be just added in the encapsulation format of data link layer.IEEE802.1Q defines addition VLAN tag Ethernet frame format afterwards, is shown in Fig. 2.
4094 VLAN at most can be used using 12 bit bit identification VLAN ID values, i.e. network in IEEE802.1Q specifications ID values (0 and 4095 are used as reservation protocol fields).With the development of Metropolitan Area Network (MAN), VLAN resources day are becoming tight, and network needs more VLAN resource isolation users, this is to need the basic reason of QinQ technologies.The QinQ technologies that IEEE 802.1ad are defined are in bag The packet outer layer of the VLAN tag containing 802.1Q encapsulates one layer of VLAN tag, its content and IEEE802.1Q VLAN tags one again Cause, so that workable VLAN resources reach 4094 × 4094 in whole network, and operator can advise according to respective demand Draw Local Area Network VLAN tag and message passes through the VLAN tag of Metropolitan Area Network (MAN) carrying.Optical network unit can be handled simultaneously mostly at present IEEE802.1Q VLAN tags and IEEE 802.1ad VLAN tags, some schemes can also individually change they VLAN ID, Ethernet frame format after Priority, TPID value, insertion IEEE 802.1ad VLAN tags is shown in Fig. 3.
In optical network unit (hereinafter referred to as ONU), in order to reach that user isolation, service area are graded purpose, generally in ONU User port configure a plurality of VLAN traffic, these business are potentially included (by taking uplink service as an example):Marked to up without VLAN The message increase private network VLAN tag of label, transparent transmission carry and specify the message of private network VLAN tag, specify private network to carrying The message of VLAN tag adds one layer of outside VLAN label etc. again.Realize that the method for VLAN traffic is main in ONU equipment at present Have:Exist based on ONU exchange chips (SWITCH), based on ONU PON chips, with reference to exchange chip and the respective advantage of PON chips The establishment of VLAN traffic stream is realized in ONU equipment by software program, specifically webmastering software issues configuration, and equipment first deletes core The old configuration of piece, then configure chip for every new business;This method receives the user port VLAN traffic that webmaster issues and matched somebody with somebody every time Put, the old service configuration data locally preserved according to software first removes chip association attributes, be not relevant for webmastering software under this Associating between sending service and last time issuing service, to each new business again assignment chip register.
At present, above-mentioned network management system carries out configuration and builds management method entirely using typical delete entirely, i.e., receive new industry every time Business configuration, software is first deleted old configuration revival and newly configured, and the number of times of operation bidirectional hardware table item can be so added, when serious Can also user traffic flow be caused to interrupt.In addition, many counting methods are bound too closely with particular hardware form, after scheme change, no It is easy to software transplanting, it has not been convenient to update, so that the business configuration state of user port can not be tracked effectively.
So problem above has to be solved.
The content of the invention
The technical problems to be solved by the invention are:Use and typically delete entirely for current most VLAN traffic management methods Situation hair complete to build management method to have aggravated the number of times that system operates hardware table item, that user traffic flow may be caused to interrupt It is raw, and can not effectively track the business configuration state of user port.
In order to solve the above-mentioned technical problem, the technical solution adopted in the present invention is to provide in a kind of optical network unit and realized The method and system of user port VLAN traffic management.
The method that the management of user port VLAN traffic is realized in such scheme, in optical network unit, it includes following step Suddenly:
The corresponding VLAN traffic configuration data attribute list of each user port is set up, for each VLAN of the book of final entry The number of operations of the corresponding VLAN traffic configuration data of business and each class VLAN traffic, according to the VLAN traffic configuration data Attribute list is in related service hardware and is operated in logic, and preserves the VLAN traffic in ONU the first memory space Configuration data attribute list, ONU carries out existing VLAN traffic in the VLAN traffic configuration data attribute list, and real-time update institute State corresponding VLAN traffic number of operations in VLAN traffic configuration data attribute list;
According to the VLAN traffic configuration data issued from gateway of reception, form portion and meet the VLAN traffic configuration In the new form of data attribute list statistical rules, and the second memory space being stored in ONU, relatively more described first memory space With the list data in the second memory space, the new form and VLAN traffic configuration number in first memory space are marked According to the inconsistent VLAN configuration datas of attribute list, comparative result is used as;
Update described in related service hardware and logic, and first memory space according to the comparative result VLAN traffic configuration data attribute list, come into force business configuration.
In such scheme, the corresponding VLAN traffic configuration data of each class type of service includes private network tags, private network mark Sign the private network tags after operator scheme, switching, public network label and enable mark, public network VLAN tag, TLS (Transparent LAN Services, transparent Ethernet) VLAN tag enable mark and TLS VLAN tags.
In such scheme, the VLAN traffic configuration data attribute list includes:For recording each class type of service pair The business grouped data table TST for the VLAN traffic configuration data answered, the business for every new VLAN traffic type of the book of final entry Type list STT and the service counting table SCT for recording each class VLAN traffic number of operations, type of service table STT numbering are simultaneously The type of service title of business in statistic record business grouped data table TST, service counting table SCT corresponding record type of service tables The number of operations of each class VLAN traffic in STT, is renamed after STT and SCT tables locally preserve.
In such scheme, ONU carries out existing VLAN traffic in the VLAN traffic configuration data attribute list, and in real time The step of updating corresponding VLAN traffic number of operations in the VLAN traffic configuration data attribute list is as follows,
Step 201, STT the and STC tables preserved after last time configuration successful are copied in the respective table locally preserved;
Step 202, to each VLAN traffic of the port, circulation terminates;
Step 203, whether the big type of service for judging VLAN is unicastIf it is, performing step 204;Otherwise, then hold Row step 205;
Step 204:Separating unicast type of service;
Step 205:Distinguish multicast service type;
Step 206:Preserve type and count up to STT and STC tables;
Step 205:To each VLAN traffic of the port, circulation terminates.
In such scheme, the differentiation flow of the unicast service type is as follows:
Step 214, separating unicast type of service entrance;
Step 224, judge whether attribute 5 in business grouped data table TST " TLS VLAN tags enable mark " is " to make Can ", if it is, showing that the business is unicast TLS business (" type 8 "), otherwise perform step 234;
Step 234, it is necessary to further check whether attribute 2 " private network VLAN tag operator scheme " is pattern 1, the attribute with The judgement of other types of service is all relevant.Judge attribute 2 " private network VLAN tag operator scheme " for " pattern 1 " then shows the industry Business private network VLAN patterns meet " Class1 " and " type 2 " is defined, and performs step 244;If " private network VLAN tag is operated attribute 2 Pattern " is not pattern 1, then performs step 254;
Step 244, judge that public network VLAN tag is enabled to mark whether as " enable ", if public network VLAN tag enables mark During for " enable ", then type of service is unicast TAG&QinQ business, is otherwise unicast TAG business.
Step 254, it is separating unicast TRANSPRENT business and unicast ALL TRANSPARENT business, while not extra Increase date transfer on network, judge whether attribute 3 " private network VLAN tag operator scheme " is " 0xffff " in this step, when CVLAN label VLAN ID value 0xffff, then be labeled as unicast ALL TRANSPARENT business (" types by type of service 7 "), if the VLAN tag VLAN non-zero xffff of ID values, step 264 is performed;
Step 264, judge whether " private network VLAN tag operator scheme " is pattern 3, if so, then performing step 274, otherwise Perform step 284;
Step 274, judge whether " public network VLAN tag enables mark " is enable, if so, being then labeled as unicast TRANSLATION&QinQ business, otherwise labeled as unicast TRANSLATION business;
Step 284, judge whether " public network VLAN tag enables mark " is enable, if so, being then labeled as unicast TRANSPARENT&QinQ business, otherwise labeled as unicast TRANSPARENT business;
Pattern 1:Up addition private network VLAN tag and descending stripping;
Class1:That is unicast TAG business, when referring to that the up message for not carrying VLAN tag flows through ONU, ONU is its addition One layer of private network VLAN tag;When the descending message for carrying the private network VLAN tag flows through ONU, ONU first peels off the VLAN tag, so Rear line port is forwarded;
Type 2:That is unicast TAG&QinQ business, when referring to that the up message for not carrying VLAN tag flows through ONU, ONU is While it adds private network VLAN tag, public network VLAN tag is added in its outer layer;More than descending carrying two layers VLAN tag When message flows through ONU, ONU first peels off two layers of VLAN tag, is then forwarded to user port;
Pattern 3:Up-downgoing symmetrically switches the message VLAN tag for carrying and specifying private network VLAN tag;
Unicast TRANSPARENT business:When referring to that the up message for carrying specified private network VLAN tag flows through ONU, ONU is saturating Bright transmission message;The descending message for carrying the private network VLAN tag is when flowing through ONU, ONU equally realize transparent transmission and to Family port is forwarded;
Unicast ALL TRANSPARENT business:ONU does not perceive private network VLAN tag and public network VLAN tag, realizes all The transparent transmission of message;
Unicast TRANSLATION&QinQ business:When referring to that the up message for carrying specified private network VLAN tag flows through ONU, While ONU switches private network VLAN tag, public network VLAN tag is added in its outer layer;More than descending carrying two layers VLAN tag When message flows through ONU, ONU first peels off public network VLAN tag, private network VLAN tag then is switched back into former VLAN tag, again finally Forwarded to user port;
Unicast TRANSLATION business:When the up message for carrying specified private network VLAN tag flows through ONU, ONU switchings are private Net VLAN tag;When the descending message for carrying private network VLAN tag after switching flows through ONU, ONU first switches back into the VLAN tag Former VLAN tag, is then forwarded to user port;
Unicast TRANSPARENT&QinQ business:When the up message for carrying specified private network VLAN tag flows through ONU, ONU Public network VLAN tag is added in its outer layer;When more than descending carrying the message of two layers of VLAN tag flows through ONU, ONU first peels off outer Layer public network VLAN tag, is then forwarded to user port.
In such scheme, the differentiation flow of the multicast service type is as follows:
Step 215, multicast service type entrance is distinguished;
Step 225, judge whether " private network VLAN tag operator scheme " is pattern 3, if it is, labeled as multicast TRANSLATION business;Step 235 is performed if not;
Step 235, judge whether " private network VLAN tag operator scheme " is pattern, if it is, labeled as multicast TRANSPARENT business, otherwise labeled as multicast TAG business;
Pattern 2:Up-downgoing carries the message transparent transmission for specifying private network VLAN tag;
Pattern 3:Up-downgoing symmetrically switches the message VLAN tag for carrying and specifying private network VLAN tag;
Multicast TRANSLATION business:When the downlink message for carrying specified private network VLAN tag flows through ONU, ONU first switches Private network VLAN tag, is then forwarded to user port;
Multicast TRANSPARENT business:When the downlink message for carrying specified private network VLAN tag flows through ONU, ONU realizes report Literary transparent transmission is simultaneously forwarded to user port.
In such scheme, during the acquisition of the comparative result, charting is every in second memory space The number of operations of one class VLAN traffic is the operation time of each class VLAN traffic of charting in N, first memory space Number is SERVICE_NUM;Compare the number of operations of every VLAN traffic of list data in two memory spaces one by one, work as N=0 And during SERVICE_NUM=0, directly return successfully, represent consistent with current business, it is not necessary to reconfigure, the business is related Be locally configured data keep it is constant;Work as N>During 0 and SERVICE_NUM=0, all new business need to reconfigure, and represent to work as The VLAN traffic of preceding comparison is new business, and the business is not included in current business, now needs to be locally configured for the traffic assignments Shelf space, record traffic related configuration data, and operate related hardware list item;As N=0 and SERVICE_NUM>When 0, delete All business in old service set, represent that this is not issued, but are current business, now need to empty the corresponding institute of the business Have to be locally configured and preserve list item and the related hardware table item of the business;Work as N>0 and SERVICE_NUM>When 0, using bit mark Note mode distinguishes record traffic consensus information, if new business is consistent with current business, will the two corresponding bit set.
In such scheme, the VLAN traffic configuration data for also including issuing gateway in the process carries out port industry The global validity checking for configuration data of being engaged in, is specifically included:
Operated before each business configuration once, software receives the VLAN traffic of port with postponing, every industry of circular test Whether the parameter of business is correct effectively, and flow will be examined in whether type of service is " unicast " or " multicast ", the private network of port VLAN operator schemes whether be " pattern 1 ", " pattern 2 ", " one of pattern 3 ", private network VLAN tag value, public network VLAN tag value, Whether TLS VLAN tags value meets IEEE802.1 regulations, and public network VLAN tag enables mark, TLS VLAN tags and enables mark Whether it is " enable " or " going to enable ", each VLAN traffic inspection to the port terminates, as long as one of attribute value Mistake will return to this configuration failure;
Pattern 1:Up addition private network VLAN tag and descending stripping;
Pattern 2:Up-downgoing carries the message transparent transmission for specifying private network VLAN tag;
Pattern 3:Up-downgoing symmetrically switches the message VLAN tag for carrying and specifying private network VLAN tag.
In such scheme, also include port industry before the configuration data for comparing new business and current business is carried out The step of business collision detection, it is specially:
The service counting table SCT that reference service is classified with counting process, judges multicast TAG business, unicast TAG industry respectively Business, unicast ALL TRANSPARENT business, unicast TLS business, unicast TAG business, the operation count of unicast TAG&QinQ business Whether 1 is more than, as long as when one of them draws the judged result more than 1, representing there is the phase for violating port traffic conflict Answer principle;
For each business configuration data, its private network VLAN tag and the private network VLAN tag of other all business are entered Row compares, if private network VLAN tag is unequal, continues and other business compare, if private network VLAN tag is equal, compare two The private network VLAN operator schemes of person, when the pattern of the two is unequal, represent there is the corresponding principle for violating port traffic conflict;
For unicast VLAN traffic, do not draw and " disobey after completeer private network VLAN tag and private network VLAN operator schemes During the corresponding principle of opposite ends port service conflict " conclusion, in addition it is also necessary to compare the public network VLAN of the two and enable mark and public network VLAN marks Whether label are consistent;As long as when have one it is inconsistent when, represent exist violate port traffic conflict corresponding principle;
Multicast TAG business:When the downlink message for carrying specified private network VLAN tag flows through ONU, ONU first peels off VLAN marks Label are forwarded to user port again;
Unicast TAG business:When the up message for not carrying VLAN tag flows through ONU, ONU adds one layer of private network VLAN for it Label;When the descending message for carrying the private network VLAN tag flows through ONU, ONU first peels off the VLAN tag, then to user port Forwarding;
Unicast ALL TRANSPARENT business:ONU does not perceive private network VLAN tag and public network VLAN tag, realizes all The transparent transmission of message;
Unicast TLS business:When the up message for not carrying VLAN tag flows through ONU, ONU specifies private network VLAN for its addition Label, when the message of the up other private network VLAN tags of carrying flows through ONU, ONU adds public network VLAN tag for it;Taken when descending When the message of two layers of VLAN tag flows through ONU with more than, ONU first peels off public network VLAN tag, is then forwarded to user port, when When the descending message for carrying specified private network VLAN tag flows through ONU, ONU first peels off private network VLAN tag, then to user port Forwarding;
Unicast TAG&QinQ business:When the up message for not carrying VLAN tag flows through ONU, ONU adds private network for it While VLAN tag, public network VLAN tag is added in its outer layer;It is more than descending carrying that the message of two layers of VLAN tag flows through ONU When, ONU first peels off two layers of VLAN tag, is then forwarded to user port.
The system that the management of user port VLAN traffic is realized in above-mentioned optical network unit, it includes:
First memory space, should for preserving the corresponding VLAN traffic configuration data attribute list of each user port VLAN traffic configuration data attribute list is used for the corresponding VLAN traffic configuration data of each VLAN traffic of the book of final entry and each The number of operations of class VLAN traffic;
Second memory space, for the VLAN traffic configuration data issued from gateway according to reception, forms a symbol The new form of the VLAN traffic configuration data attribute list statistical rules is closed, and is preserved;
Comparison module, for comparing the list data in first memory space and the second memory space, marks institute State the inconsistent VLAN configuration datas of VLAN traffic configuration data attribute list in new form and first memory space, as than Relatively result;
Configuration driven module, updates related service hardware and logic, come into force business configuration according to the comparative result.
The present invention, the configuration data issued according to webmastering software first carries out the comparison of new, the old configuration similarities and differences, then basis The content of mark determines step action, can efficiently realize the configuration of user port VLAN traffic and delete, can be more fully VLAN traffic configuration status is tracked, does not have specific requirement to hardware state, method can be cut, and performance period is short.
The inventive method divides type of service according to the technical specification of major operators, administrative model is built, so that effectively Realize the comparison of new, old configuration data;The business newly issued every time is compared and records ratio by the method for the present invention with current business Relatively result, comparative result includes three kinds of situations for wall scroll business:New business is consistent with current business, in current business set Not comprising current business is not included in new business, new business, the first situation ONU softwares are without processing, second of situation software Need to newly increase the business and configure chip, and the third business needs to delete the configuration of current business chip.The present invention be based on than Business configuration and deletion are efficiently realized compared with result, meaningless hardware read-write operation is at utmost reduced.
Compared with prior art, the service class that the major Carrier Requirements of management method of the invention and systematic generalization are realized Type, is not only restricted to some operator, but also can more need extension, and it is abstract real with service logic that system more focuses on business It is existing, with specific hardware state loose coupling, VLAN traffic is effectively configured and deleted based on VLAN traffic type, can real-time tracking use Family port vlan business configuration state.The inventive method dynamically determines to need what is reconfigured according to new, old service comparative result VLAN traffic, compared with prior art complete deletes pattern, it is ensured that the continuity of data flow during business configuration, reduces hardware behaviour Make number of times.
Brief description of the drawings
Fig. 1 is .PON access network networking diagrams;
Fig. 2 is .IEEE802.1Q VLAN frame formats;
Fig. 3 is .IEEE802.1ad QinQ frame formats;
Fig. 4 is the schematic flow sheet of the inventive method;
Fig. 5 is the global validity checking flow chart of .VLAN business;
Fig. 6 is that .VLAN business is classified with counting overview flow chart;
Fig. 7 is unicast service classification process figures;
Fig. 8 is multicast service classification process figures;
Fig. 9 is that port vlan business configurations compare and configuration take-effective flow chart;
Figure 10 is port vlan business configuration flow charts;
Figure 11 is that port vlans business deletes flow chart;
Figure 12 is port vlan service conflict tables.
Embodiment
The present invention is described in detail below in conjunction with the accompanying drawings.
As shown in figure 1, the present invention is mainly suitable in PON system, its by local side optical line terminal OLT (Optical Line Terminal), the optical network unit ONU (Optical Network Unit) of user terminal and Optical Distribution Network ODN (Optical Distribution Network) is constituted.And realize user port VLAN in the optical network unit that the present invention is provided The method of service management, mainly provides a kind of effective user port VLAN traffic management means, so as to reduce to hard for ONU The business configuration state of the operation of part and logic, it is ensured that the fluency of business data flow, effectively tracking user port.
As shown in figure 4, the user port VLAN traffic management method of the present invention comprises the following steps:
Step 200, type of service is defined, the type and the occurrence number per class business of every business is recorded, is easy to effectively The business configuration state of user port is tracked, particular content is as follows:
The corresponding VLAN traffic configuration data attribute list of each user port is set up, for each VLAN of the book of final entry The number of operations of the corresponding VLAN traffic configuration data of business and each class VLAN traffic, according to the VLAN traffic configuration data Attribute list is in related service hardware and is operated in logic, and preserves the VLAN traffic in ONU the first memory space Configuration data attribute list, ONU carries out existing VLAN traffic in the VLAN traffic configuration data attribute list, and real-time update institute State corresponding VLAN traffic number of operations in VLAN traffic configuration data attribute list;
Step 300, the new business that management is received, and compare the configuration data of new business and current business, particular content is such as Shown in lower:
According to the VLAN traffic configuration data issued from gateway of reception, form portion and meet the VLAN traffic configuration In the new form of data attribute list statistical rules, and the second memory space being stored in ONU, relatively more described first memory space With the list data in the second memory space, the new form and VLAN traffic configuration number in first memory space are marked According to the inconsistent VLAN configuration datas of attribute list, comparative result is used as;In this comparison step, the comparative result use than The mode of special position mark is recorded.
Step 400, updated according to the comparative result in related service hardware and logic, and first memory space The VLAN traffic configuration data attribute list, come into force business configuration.
The corresponding VLAN traffic configuration data attribute list of each user port built in above-mentioned steps 200, is to be based on The VLAN traffic type of defined in major carrier technologies specifications, and carry out statistic of classification according to corresponding configuration information. Generally speaking, VLAN traffic can be divided into unicast and the major class of multicast two, and be subdivided into 11 group VLAN traffics, be specially:
Class1:Unicast TAG business, refers to:When the up message for not carrying VLAN tag flows through ONU, ONU adds for it One layer of private network VLAN tag;When the descending message for carrying the private network VLAN tag flows through ONU, ONU first peels off the VLAN tag, so Rear line port is forwarded;
Type 2:Unicast TAG&QinQ business, refers to:When the up message for not carrying VLAN tag flows through ONU, ONU is it While adding private network VLAN tag, public network VLAN tag is added in its outer layer;The more than descending carrying report of two layers of VLAN tag When text flows through ONU, ONU first peels off two layers of VLAN tag, is then forwarded to user port;
Type 3:Unicast TRANSPARENT business, refers to:Up carry specifies the message of private network VLAN tag to flow through ONU When, the ONU transparent transmissions message;When the descending message for carrying the private network VLAN tag flows through ONU, ONU equally realizes transparent biography It is defeated and forwarded to user port;
Type 4:Unicast TRANSPARENT&QinQ business, refers to:It is up to carry the message flow for specifying private network VLAN tag During through ONU, ONU adds public network VLAN tag in its outer layer;When more than descending carrying the message of two layers of VLAN tag flows through ONU, ONU elder generations peeling outer layer public network VLAN tag, is then forwarded to user port;
Type 5:Unicast TRANSLATION business, refers to:Up carry specifies the message of private network VLAN tag to flow through ONU When, ONU switching (translation) private network VLAN tags;When the descending message for carrying private network VLAN tag after switching flows through ONU, ONU is first The VLAN tag is switched back into former VLAN tag, then forwarded to user port;
Type 6:Unicast TRANSLATION&QinQ business, refers to:It is up to carry the message flow for specifying private network VLAN tag During through ONU, while ONU switching private network VLAN tags, public network VLAN tag is added in its outer layer;More than descending carrying two layers When the message of VLAN tag flows through ONU, ONU first peels off public network VLAN tag, and private network VLAN tag then is switched back into former VLAN Label, is finally forwarded to user port again;
Type 7:Unicast ALL TRANSPARENT business, refers to:ONU does not perceive private network VLAN tag and public network VLAN marks Label, realize the transparent transmission of all messages.
Type 8:Unicast TLS business, refers to:When the up message for not carrying VLAN tag flows through ONU, ONU adds for it Private network VLAN tag is specified, when the message of the up other private network VLAN tags of carrying flows through ONU, ONU adds public network VLAN for it Label;When the message of two layers of VLAN tag flows through ONU more than descending carrying, ONU first peels off public network VLAN tag, then to Family port is forwarded, and when the descending message for carrying specified private network VLAN tag flows through ONU, ONU first peels off private network VLAN tag, so Rear line port is forwarded;
Type 9:Multicast TAG business, refers to:When the downlink message for carrying specified private network VLAN tag flows through ONU, ONU is first The VLAN tag is peeled off to forward to user port again;
Class1 0:Multicast TRANSPARENT business, refers to:Carry and specify the downlink message of private network VLAN tag to flow through ONU When, ONU realizes message transparent transmission and forwarded to user port;
Class1 1:Multicast TRANSLATION business, refers to:Carry and specify the downlink message of private network VLAN tag to flow through ONU When, ONU first switches private network VLAN tag, is then forwarded to user port.
Based on the definition of above-mentioned 11 VLAN traffic types, the present invention matches somebody with somebody in order to be able to the VLAN traffic realized in the above method Put the data book of final entry, construct above-mentioned data model, i.e., above-mentioned VLAN traffic configuration data attribute list, this administrative model is The core content of above-mentioned management method, entirely compares the realization that record is based on this model.In practical operation, above-mentioned VLAN Business configuration data attribute list includes three separation but is mutually related tables of data, is respectively:Business grouped data table TST, Type of service table STT and service counting table SCT.It is described in detail below in conjunction with chart, the constituted mode of three tables of data.Herein Every " type of service " mentioned, " each class VLAN traffic " refer both to the VLAN traffic type defined according to above-mentioned 11 group, or The new VLAN traffic type that similar above-mentioned 11 group is defined.
First table, for the configuration data of each VLAN traffic to be carried out into statistic of classification, is easy to follow-up comparison pipe Reason, is defined as business grouped data table TST, as shown in table 1 below:
Table 1
User port new VLAN traffic collection is combined into S defined in above-mentioned table 1, and set includes N bar business, and i is the of set S I bar business, S { i } is the configuration data of i-th VLAN traffic in port, the order row of the first behavior business sequence number of above-mentioned table 1 Respectively there be the attribute for the relevant VLAN traffic configuration data that first row is recorded in sequence, above-mentioned table 1:
Attribute 1:Major class type of service is marked, including unicast and multicast;
Attribute 2:Private network VLAN tag operator scheme, including:
Pattern 1 --- up addition private network VLAN tag and descending stripping;
Pattern 2 --- up-downgoing carries the message transparent transmission for specifying private network VLAN tag;
Pattern 3 --- up-downgoing symmetrically switches the message VLAN tag for carrying and specifying private network VLAN tag;
Attribute 3:Private network VLAN tag, private network VLAN tag form refers to Fig. 2 (such as { VLAN ID:1024,PRIORITY: 7,TPID:0x8100,CFI:0 }), the attribute is " pattern one " and " during pattern two " effective only in attribute 2;
Attribute 4:Switch the private network VLAN tag after (translation), private network VLAN tag form refers to Fig. 2, and the value is only in private network VLAN operator schemes are " effective during pattern three ";
Attribute 5:Public network VLAN tag enables mark, including enables, goes to enable;
Attribute 6:Public network VLAN tag, public network VLAN tag form refers to Fig. 3.The value only has when above-mentioned mark is enabled Effect, ONU can encapsulate outside VLAN label for message after the mark is enabled;
Attribute 7:TLS (Transparent LAN Services, transparent Ethernet) VLAN tag enables mark, including makes It can, go to enable;
Attribute 8:TLS VLAN tags, TLS VLAN tag forms refer to Fig. 2, Fig. 3.The value is only when above-mentioned mark is enabled Effectively.
Can be with each VLAN traffic of all user ports of the book of final entry according to above-mentioned business grouped data table TST Above-mentioned all 11 class VLAN traffic types defined herein are covered in all main configuration datas, above-mentioned table 1.
To realize the local management of VLAN traffic, above-mentioned business grouped data table TST increases attribute 9 in local management: Seizure condition marker bit, is divided into " occupancy " and " vacant ", and " occupancy " represents that the row wouldn't can use, and " vacant " represents that the row can For preserving VLAN traffic.
Above-mentioned business grouped data table TST is used to preserve the VLAN traffic after each configuration successful, the business of configuration successful Number is recorded with SERVICE_NUM.
Second table, is defined as type of service table STT, the type for recording every new VLAN traffic, corresponding local Configuration preservation table is named as TSTT.STT with TSTT forms are consistent (see the table below shown in 2, its effective line number is consistent with business number), TSTT { i }, STT { j } be respectively i-th new business type and configuration successful j-th strip business type.
Table 2
Business sequence number Type of service
1 Unicast TAG business
... ...
8 Unicast TRANSPARENT&QinQ business
... ...
N Multicast TRANSPARENT business
First row record traffic sequence number in upper table 2, it is consistent right with the business sequence number in business grouped data table TST Should, secondary series record traffic type, i.e., the type of above-mentioned 11 group VLAN traffic, or new defined according to above-mentioned 11 group VLAN traffic class.Upper table 2 is used for the corresponding type of service of business sequence number in statistic record business grouped data table TST.
3rd table, is defined as service counting table SCT, and occurrence is gone out for record each class VLAN traffic in new business Number, the corresponding preservation table that is locally configured is named as TSCT.SCT with TSCT forms are consistent (to be see the table below shown in 3, effective line number and industry Service type number is consistent), SCT { i } TSCT { j } be respectively i-th kind of business in new business occurrence number and configuration successful after jth kind The occurrence number of business.
Table 3
Type of service Type of service is counted
Unicast TAG business 1
... ...
Unicast TRANSPARENT&QinQ business 2
... ...
Multicast TRANSPARENT business 1
First row record traffic type in upper table 3, it is consistent with the type of service in type of service table STT to correspond to, i.e., The type of above-mentioned 11 group VLAN traffic, or the new VLAN traffic class defined according to above-mentioned 11 group;Secondary series record traffic Type counts, the i.e. number of operations relative to each class VLAN traffic in type of service table STT, ONU carry out the type of service In table STT during existing VLAN traffic, corresponding type of service in the service counting table SCT is counted to the operation for carrying out Jia 1, For recording VLAN traffic number of operations in real time.
Certainly the invention is not restricted to be separated into three contingency table progress using by above-mentioned VLAN traffic configuration data attribute list The business configuration state of the operations such as inquiry, renewal, record, effectively tracking user port, is carried out it is also contemplated that collecting a table The operations such as inquiry, renewal, record.In a word, VLAN traffic configuration data attribute list homogeneous classification is allowed to record above-mentioned for recording 9 property values of VLAN traffic configuration data, and type of service and each class VLAN traffic type counts, it is each for counting The number of operations of class VLAN traffic can complete the foundation of whole administrative model, based on the foundation of above-mentioned administrative model, complete surplus Remaining step.
Fig. 6 is that business of the present invention is classified and counting flow chart.For each VLAN traffic, be first divided into unicast, The major class of multicast two, subtype is subdivided per major class, the classification results of i-th business are STT { i }, are i-th of list item of STT table, The type of service of STT { i } records is matched in SCT tables simultaneously, and the type of service occurrence number is added 1.As shown in fig. 6, step In rapid 200, ONU carries out existing VLAN traffic in the VLAN traffic configuration data attribute list, and VLAN described in real-time update It is as follows the step of corresponding VLAN traffic number of operations in business configuration data attribute list,
Step 201, STT the and STC tables preserved after last time configuration successful are copied in TSTT and TSTC tables, will configured Successful table is preserved to local, for more new record;
Step 202, to each VLAN traffic of the port, circulation terminates;
Step 203, whether the big type of service for judging VLAN is unicastIf it is, performing step 204;Otherwise, then hold Row step 205;
Step 204:Separating unicast type of service, divides small type of service, for recording STT table;
Step 205:Multicast service type is distinguished, small type of service is divided, for recording STT table;
Step 206:Preserve type and count up to STT and STC tables;
Step 205:To each VLAN traffic of the port, circulation terminates.
For above-mentioned separating unicast type of service and differentiation multicast service type, according to above-mentioned business grouped data table TST Attribute mark and judge, as shown in Figure 7 and Figure 8.
Fig. 7 is the determination flow of unicast service type.Since determination flow directly determining the attribute of type of service.
Step 214, separating unicast type of service entrance;
Step 224, judge whether attribute 5 in business grouped data table TST " TLS VLAN tags enable mark " is " to make Can ", if it is, showing that the business is unicast TLS business (" type 8 "), otherwise perform step 234;
Step 234, it is necessary to further check whether attribute 2 " private network VLAN tag operator scheme " is pattern 1, the attribute with The judgement of other types of service is all relevant.Judge attribute 2 " private network VLAN tag operator scheme " for " pattern 1 " then shows the industry Business private network VLAN patterns meet " Class1 " and " type 2 " is defined, and performs step 244;If " private network VLAN tag is operated attribute 2 Pattern " is not pattern 1, then performs step 254;
Step 244, judge that public network VLAN tag is enabled to mark whether as " enable ", if public network VLAN tag enables mark During for " enable ", then type of service is unicast TAG&QinQ business, is otherwise unicast TAG business.
Step 254, it is separating unicast TRANSPRENT business and unicast ALL TRANSPARENT business, while not extra Increase date transfer on network, judge whether attribute 3 " private network VLAN tag operator scheme " is " 0xffff " in this step, when CVLAN label VLAN ID value 0xffff, then be labeled as unicast ALL TRANSPARENT business (" types by type of service 7 "), if the CVLAN VLAN non-zero xffff of ID values, step 264 is performed;
Step 264, judge whether " private network VLAN tag operator scheme " is pattern 3, if so, then performing step 274, otherwise Perform step 284;
Step 274, judge whether " public network VLAN tag enables mark " is enable, if so, then labeled as mark unicast TRANSLATION&QinQ business, otherwise labeled as unicast TRANSLATION business;
Step 284, judge whether " public network VLAN tag enables mark " is enable, if so, being then labeled as unicast TRANSPARENT&QinQ business, otherwise labeled as unicast TRANSPARENT business.
Above according to CVLAN operator schemes and public network VLAN enable mark can distinguish successively " type 3 ", " type 4 ", " type 5 ", " type 6 ".
Fig. 8 is the determination flow that step 205 distinguishes multicast service type.Multicast service determination flow is more directly perceived, can basis The different values of three kinds of CVLAN operator scheme attributes directly distinguish " type 9 ", " Class1 0 ", " Class1 1 ".Institute specific as follows Show:
Step 215, multicast service type entrance is distinguished;
Step 225, judge whether " private network VLAN tag operator scheme " is pattern 3, if it is, labeled as multicast TRANSLATION business;Step 235 is performed if not;
Step 235, judge whether " private network VLAN tag operator scheme " is pattern, if it is, labeled as multicast TRANSPARENT business, otherwise labeled as multicast TAG business.
Based on above-described embodiment, Fig. 9 gives business configuration in above-mentioned steps 300 and step 400 and compared and configuration take-effective Flow chart.Obtaining the detailed process of comparative result in above-mentioned comparison step 300 by marking is:
The number of operations of each class VLAN traffic of charting is N in second memory space, first storage The number of operations of each class VLAN traffic of charting is SERVICE_NUM in space;Compare one by one in two memory spaces The number of operations of every VLAN traffic of list data,
As N=0 and SERVICE_NUM=0, directly return successfully, represent consistent with current business, it is not necessary to match somebody with somebody again Put, the related data that are locally configured of the business keep constant;
Work as N>During 0 and SERVICE_NUM=0, all new business need to reconfigure, and represent the VLAN traffic currently compared For new business, the business is not included in current business, now needs that shelf space, record traffic is locally configured for the traffic assignments Related configuration data, and related hardware list item is operated, into step 12.3;
As N=0 and SERVICE_NUM>When 0, all business in old service set are deleted, represent that this is not issued, but For current business, now need to empty the corresponding all hardware lists that preservation list item and business correlation is locally configured of the business , into follow-up delete step;
Work as N>0 and SERVICE_NUM>When 0, record traffic consensus information is distinguished using bit mark mode, if newly Business is consistent with current business, by the two corresponding bit set, is specifically shown in step 12.2.
Step 12.2:Defined variable NEW_SERVICE_BITMAP and OLD_SERVICE_BITMAP, the two initial value is 0, the NEW_SERVICE_BITMAP comparative result marker bit information for recording new business, OLD_SERVICE_BITMAP is used for The comparative result marker bit information of old service is recorded, lowest bit position represents the state of the 1st article of business, the like, wherein often The number of bits that individual variable is included is not less than the single user port maximum traffic number that ONU systems allow.For each new business S { i }, if it is equal with a certain bar business TST { j } in old service set TST tables, by variable NEW_SERVICE_ BITMAP bit i is entered as 1, and variable OLD_SERVICE_BITMAP bit j is entered as into 1, represents in new business I-th business it is consistent with the configuration data of the j-th strip business in current business.After the completion of all business in S compare, divide three Step is sequentially completed:
A. the number of bits being set using in variable NEW_SERVICE_BITMAP and OLD_SERVICE_BITMAP is industry (such as NEW_SERVICE_BITMAP bit i is set business index, then it represents that 1) bit of i-th business is set, S If in business i be set, show that this configured business last time, it is not necessary to reconfigure, if the business j in TST is set, Show that the business is appeared in new business set S, therefore all configuration datas for being set business and seizure condition mark in TST Keep constant, all corresponding traffic type informations of business that are set are without change in TSTT;
B. all business being not set in TST set are deleted, it is follow-up into this paper to each business that need to be deleted Business delete step;
C. all business being not set, the new business reconfigured to each need, into step in S set are reconfigured Rapid 12.3;
Step 12.3:The new business i of configuration, reference service classification and the result of counting process are needed for each in S Table STT { i }, configures according to corresponding type of service and TST tables is traveled through after hardware resource, configuration successful, finds seizure condition for " not Take " list item after, S { i } is copied to the list item, and mode bit is changed to " to take ".In addition, also needing the corresponding tables of TSTT Item is entered as STT { i }, and to track the VLAN traffic type of user port, TSCT tables can be copied directly from SCT tables.Business is complete After the completion of portion's configuration, SERVICE_NUM is entered as N.
Business configuration is come into force in the following several ways according to bit mark in above-mentioned steps:New business and current business are same Markers clocks, it is not necessary to any operation;When new business is not labeled, new business is configured;When current business is not labeled, deletes and work as Preceding business.Step is performed according to the statement of comparative result exhaustive division, can effectively reduce the operation to control chip hardware logic.
Figure 10 is above-mentioned port vlan business configuration flow chart, after successful configuration service, all industry in new business set S Business is preserved to TST set, and TSTT have recorded the corresponding type of service of new business, and TSCT have recorded port traffic classification of type meter Number.Step 12.3 first deletes the corresponding service in TSTT set, it is therefore an objective to empty the TST list items and TSTT list items of these business, For follow-up new business preparation memory headroom.
Figure 11 is the flow chart for deleting port vlan business.The step of deleting i-th business in TST set is as follows:
Step 14.1:The type of service of this VLAN traffic is judged according to TSTT { i }, and ONU is deleted according to type of service Associated hardware resource;
Step 14.2:The configuration data of i-th business list item of TST tables is emptied, and the list item seizure condition position is changed to " account for With ";
Step 14.3:The traffic type information of i-th list item of TSTT tables is emptied, initialization type of service table TSTT is used as.
Step 14.4, business is returned to delete successfully.
As described in Figure 4, embodiments of the invention also include the VLAN traffic configuration number issued to gateway in the process According to the global validity checking step 100 for carrying out port traffic configuration data, it can accordingly be arranged on before step 200, specifically Flow is as figure 5 illustrates.After ONU equipment electrifying startup, software first initializes local service configuration relevant entries, receives under webmastering software The VLAN traffic configuration data of hair, these configuration datas are general in units of unique user port, generally comprise many of the port Bar VLAN traffic.Global validity checking subprogram checks whether every VLAN traffic configuration data is correct effectively one by one, including Private network VLAN tag value, public network VLAN tag value etc..Fig. 5 is the global legitimacy inspection of VLAN traffic configuration data of the present invention Look into functional flow diagram.IEEE802.1Q regulations VLAN ID values are made up of 12 bits, and span is as previously described.TPID is accounted for With 16 bits, 0x8100 is defaulted to.PRIORITY is 802.1P priority, takes 3 bits, value 0-7, for table Show Ethernet priority.The default values of CFI are 0.
Initial table S, STT, SCT first in Fig. 5, the action is operated once before each business configuration, and software receives end The VLAN traffic of mouth is with postponing, and whether the parameter of every business of circular test is correct effectively.Flow is examined in type of service No is " unicast " or " multicast ", and whether the private network VLAN operator schemes of port are " pattern 1 ", " pattern 2 ", " one of pattern 3 ", private Whether net VLAN tag value, public network VLAN tag value, TLS VLAN tags value meet IEEE802.1 regulations, public network VLAN tag Enable mark, TLS VLAN tags and enable and mark whether as " enables " or " go enable ", to each VLAN traffic of the port Inspection terminates, as long as one of attribute value mistake will return to this configuration failure.
As shown in Figure 10, before above-mentioned steps 300 compare the configuration data of new business and current business also include The step of " port traffic collision detection ", collision detection is carried out to all VLAN traffics of port, can prevent VLAN traffic it Between there is logic error, the catastrophe failure such as these mistakes may cause service failure, customer traffic obstructed.The mesh of collision detection Be all VLAN traffic mutual tolerances for ensureing user port, be not in expected inconsistent data flow, idiographic flow is as follows It is shown.
Figure 12 is that the conflict between the different VLAN traffics in port may situation.Conflict between VLAN traffic refers to some industry Coexisting for business can cause service logic chaotic.Business configuration process typically follows following principle (it is assumed that every business configuration data Without repetition), this principle is the universal method based on industry come fixed:
Principle 1:(unicast service is not differentiated between for one user port at most one unicast TAG business of configuration or multicast TAG business " Class1 " and " type 2 ");
Principle 2:A user port is allowed to there is a plurality of business simultaneously, the CVLAN operator schemes of these business can be flexible Configuration, but do not allow certain two business CVLAN label (namely " private network VLAN tag operator scheme ") occur unanimously, but The inconsistent situation of CVLAN operator schemes;
Principle 3:One user port at most one unicast ALL TRANSPARENT business of configuration, and the business with it is other Unicast service is incompatible;
Principle 4:Any two unicast services of one user port, if their CVLAN labels are consistent and CVLAN is operated Pattern is consistent, does not allow the public network VLAN tag enable mark of the two inconsistent, when public network VLAN tag, which is enabled, marks consistent, Do not allow public network VLAN tag inconsistent;
Principle 5:One user port at most one unicast TLS business of configuration, and the business can not with unicast TAG business and Unicast TAG&QinQ business coexists, if port also has CVLAN operator schemes for " pattern two " or " other unicasts of pattern three " Business, then the CVLAN labels of the business can not be consistent with TLS VLAN tags.
Run counter to any of the above-described principle to would potentially result in conflicting between business, Figure 12 lists all possible conflict feelings Condition.Illustrate herein:The CVLAN labels (namely " private network VLAN tag ") of business 1 are { VLAN ID:100,PRIORITY: 0,TPID:33024,CFI:0 }, CVLAN operator schemes are " pattern 2 ";The CVLAN labels of business 2 are consistent with business 1, CVLAN Pattern is " pattern 3 ".If two business come into force above simultaneously, when the Business Stream for carrying the VLAN ID passes through ONU, business 1 is required The transparent transmission Business Stream, business 2 requires switching CVLAN labels, it is clear that logic conflict occurs in the action of two business.
Business configuration process easily conflicts, it is therefore desirable to which rational detection method excludes all service conflicts, with reference to Above principle, collision detection includes following steps:
Step 11.1:The service counting table SCT that reference service is classified with counting process, judges type of service " multicast TAG industry Whether the operation count of business " is more than 1, the mistake of principle 1 is run counter to if so, then returning, otherwise into step 11.2.Concrete operations are illustrated Explanation, it is assumed that record above-mentioned 12 class type of service in type of service table STT successively, then corresponding service counting table SCT will successively Record the number of operations of 12 class types of service, with type of service " multicast TAG business " be 9 for index, judge STC { 9 } sign Whether type of service is counted is more than 1;
Step 11.2:The service counting table SCT that reference service is classified with counting process, judges type of service " unicast TAG industry Whether the operation count of business " is more than 1, the mistake of principle 1 is run counter to if so, then returning, otherwise into step 11.3.Concrete operations are illustrated Illustrate, it 1 is index to be with type of service " unicast TAG business ", judges that whether the type of service that STC { 1 } is characterized is counted more than 1, The mistake of principle 1 is run counter to if so, then returning, otherwise into step 11.3.
Step 11.3:For each business configuration data S { i }, by its CVLAN label and other all business CVLAN labels are compared, if S { i } and S { j } CVLAN labels are unequal, continue to compare S { i } and other business, if phase Deng, then compare S { i } and S { j } CVLAN operator schemes, when the pattern of the two is unequal, the mistake of principle 2 is run counter in return, Otherwise continue to compare S { i } and other business.If all business are completed without prejudice to principle 2 after above-mentioned inspection, into step two-by-two 11.4;
Step 11.4:The service counting table SCT that reference service is classified with counting process, judges type of service " unicast ALL Whether the operation count of TRANSPARENT business " is more than 1, is 7 to be with type of service " unicast ALL TRANSPARENT business " Index, judges whether STC { 7 } is more than 1, and the mistake of principle 3 is run counter to if so, then returning, and otherwise continues judgement business number N, when N is more than When 1, same return runs counter to the mistake of principle 3, only continues step 11.5 when N is equal to 1;
Step 11.5:For each business configuration data S { i }, if its type of service is " unicast ", by its CVLAN Label and the CVLAN labels of other all business are compared, if S { i } and S { j } CVLAN labels are unequal, continue to compare Compared with S { i } and other business, if equal, then compare S { i } and S { j } CVLAN operator schemes, when the pattern of the two is unequal When, the mistake of principle 2 is run counter in return, is otherwise continued to compare the public network VLAN enable marks of the two, is marked inconsistent or make if enabling It can mark unanimously and public network VLAN tag is inconsistent, the mistake of principle 4 is run counter in return, and other situation continueds compare S { i } and other Business.If all unicast services are completed without prejudice to principle 2, principle 4 after above-mentioned inspection, into step 11.6 two-by-two;
Step 11.6:The service counting table SCT that reference service is classified with counting process, with type of service " unicast TLS industry It 8 is index that business ", which is, judges whether STC { 8 } is more than 1, if more than 1, returning and running counter to the mistake of principle 5, otherwise respectively with type of service " unicast TAG " business " and " unicast TAG&QinQ business " is index, judges whether STC { 1 }, STC { 2 } are more than 1, as long as wherein One is more than or equal to 1, and the mistake of principle 5, other situation continued traversal business classification and the result table of counting process are run counter in return STT, sets the index i of variable TLS_SERVICE_INDEX record unicast TLS types of service in the table, sets variable TLS_ VLAN record S { i } TLS service VLAN labels, TLS_VLAN and the CVLAN labels of other business in S are compared, these The CVLAN patterns of business all for " pattern two " or " pattern three ", if there is a situation where it is equal, return run counter to the mistake of principle 5, it is other Situation terminates this collision detection flow.
In brief, this method is easily achieved, and summarizes the common type of service of optical network unit user port, and be based on These types of service realize the configuration and deletion of user port VLAN traffic.Method, without particular/special requirement, is not only restricted to PON types The specific chip type of ONU equipment, it is only necessary to which ONU has CPU to realize above management method, can be very good to be applied to current ONU The need for System Management User port vlan business.Also, the present invention is first compared to new, old service configuration data, and adopted The mode marked with bit records comparative result, does not do any business for those same types, with the business of configuration data and patrols Collect needs the business for increasing, changing or deleting with the operation on hardware, only processing;This mode first configured more afterwards, is reduced The number of times of hardware operation, it is to avoid because deletion business causes flow interruption.
Based on the above method, it is the invention provides realize the management of user port VLAN traffic in a kind of optical network unit System, it includes:
First memory space, should for preserving the corresponding VLAN traffic configuration data attribute list of each user port VLAN traffic configuration data attribute list is used for the corresponding VLAN traffic configuration data of each VLAN traffic of the book of final entry and each The number of operations of class VLAN traffic;
Second memory space, for the VLAN traffic configuration data issued from gateway according to reception, forms a symbol The new form of the VLAN traffic configuration data attribute list statistical rules is closed, and is preserved;
Comparison module, for comparing the list data in first memory space and the second memory space, marks institute State the inconsistent VLAN configuration datas of VLAN traffic configuration data attribute list in new form and first memory space, as than Relatively result;
Configuration driven module, updates related service hardware and logic, come into force business configuration according to the comparative result;
Said system also includes data analysis update module, for receiving the VLAN traffic configuration data issued from gateway And the legitimacy of its data is analyzed, updating described first according to the legal data by the configuration driven module configuration successful deposits Store up the list data in space.It for details, reference can be made to the above-mentioned description section on Fig. 5.
Said system also includes port traffic collision detection module, each class on the user port according to record The number of operations of VLAN traffic and the VLAN traffic configuration data are compared, determine whether exist be unsatisfactory for communications protocol Place.Specifically can be referring to the above-mentioned description section on Figure 10.
Above management system is embedded in managing chip to realize by software program, has implemented to chip hardware logic Operational control, for improving ONU function, and reach the technique effect that the above method of the present invention is realized.
The present invention is not limited to above-mentioned preferred forms, and anyone should learn that the knot made under the enlightenment of the present invention Structure changes, and the technical schemes that are same or similar to the present invention are each fallen within protection scope of the present invention.

Claims (9)

1. the method for user port VLAN traffic management is realized in optical network unit, it is characterised in that methods described includes following Step:
The corresponding VLAN traffic configuration data attribute list of each user port is set up, for each VLAN traffic of the book of final entry The number of operations of corresponding VLAN traffic configuration data and each class VLAN traffic, according to the VLAN traffic configuration data attribute Table is in related service hardware and is operated in logic, and preserves in ONU the first memory space the VLAN traffic configuration Data attribute list, ONU carries out existing VLAN traffic in the VLAN traffic configuration data attribute list, and described in real-time update Corresponding VLAN traffic number of operations in VLAN traffic configuration data attribute list;
According to the VLAN traffic configuration data issued from gateway of reception, form portion and meet the VLAN traffic configuration data In the new form of attribute list statistical rules, and the second memory space being stored in ONU, relatively first memory space and the List data in two memory spaces, marks the new form and belongs to VLAN traffic configuration data in first memory space The property inconsistent VLAN configuration datas of table, are used as comparative result;
The VLAN industry in related service hardware and logic, and first memory space is updated according to the comparative result Business configuration data attribute list, come into force business configuration;
The VLAN traffic configuration data attribute list includes:For recording the corresponding VLAN traffic configuration number of each class type of service According to business grouped data table TST, the type of service table STT for every new VLAN traffic type of the book of final entry and for recording The service counting table SCT of each class VLAN traffic number of operations, type of service table STT numbering and statistic record business grouped data Each class VLAN traffic in the type of service title of business in table TST, service counting table SCT corresponding record type of service tables STT Number of operations, STT and SCT tables carry out locally preserve after renamed.
2. according to the method described in claim 1, it is characterised in that the corresponding VLAN traffic configuration data of each class type of service Including private network tags, private network tags operator scheme, switching after private network tags, public network label enable mark, public network VLAN tag, TLS (Transparent LAN Services, transparent Ethernet) VLAN tag enables mark and TLS VLAN tags.
3. method according to claim 2, it is characterised in that ONU is carried out in the VLAN traffic configuration data attribute list Corresponding VLAN traffic number of operations in existing VLAN traffic, and VLAN traffic configuration data attribute list described in real-time update Step is as follows,
Step 201, STT the and STC tables preserved after last time configuration successful are copied in the respective table locally preserved;
Step 202, to each VLAN traffic of the port, circulation terminates;
Step 203, whether the big type of service for judging VLAN is unicast, if it is, performing step 204;Otherwise, then step is performed Rapid 205;
Step 204:Separating unicast type of service, goes to step 206;
Step 205:Distinguish multicast service type;
Step 206:Preserve type and count up to STT and STC tables;
Step 207:To each VLAN traffic of the port, circulation terminates.
4. method according to claim 3, it is characterised in that the differentiation flow of the unicast service type is as follows:
Step 214, separating unicast type of service entrance;
Step 224, judge whether attribute 5 in business grouped data table TST " TLS VLAN tags enable mark " is " enable ", such as Fruit is then to show that the business is unicast TLS business (" type 8 "), otherwise performs step 234;
Step 234, it is necessary to further check whether attribute 2 " private network VLAN tag operator scheme " is pattern 1, the attribute with it is other The judgement of type of service is all relevant, judges attribute 2 " private network VLAN tag operator scheme " for " pattern 1 " then shows that the business is private Net VLAN patterns meet " Class1 " and " type 2 " is defined, and performs step 244;If " private network VLAN tag operates mould to attribute 2 Formula " is not pattern 1, then performs step 254;
Step 244, judge that public network VLAN tag is enabled to mark whether as " enable ", be labeled as if public network VLAN tag is enabled When " enable ", then type of service is unicast TAG&QinQ business, is otherwise unicast TAG business;
Step 254, it is separating unicast TRANSPARENT business and unicast ALL TRANSPARENT business, while not increasing additionally Date transfer on network, whether be " 0xffff ", as VLAN tag VLAN if judging attribute 3 " private network VLAN tag " in this step ID value 0xffff, then by type of service labeled as unicast ALL TRANSPARENT business (" type 7 "), if VLAN tag The non-zero xffff of VLAN ID values, then perform step 264;
Step 264, judge whether " private network VLAN tag operator scheme " is pattern 3, if so, then performing step 274, otherwise perform Step 284;
Step 274, judge whether " public network VLAN tag enables mark " is enable, if so, being then labeled as unicast TRANSLATION&QinQ business, otherwise labeled as unicast TRANSLATION business;
Step 284, judge whether " public network VLAN tag enables mark " is enable, if so, being then labeled as unicast TRANSPARENT&QinQ business, otherwise labeled as unicast TRANSPARENT business;
Pattern 1:Up addition private network VLAN tag and descending stripping;
Class1:That is unicast TAG business, when referring to that the up message for not carrying VLAN tag flows through ONU, ONU is its layer of addition Private network VLAN tag;When the descending message for carrying the private network VLAN tag flows through ONU, ONU first peels off the VLAN tag, Ran Houxiang User port is forwarded;
Type 2:That is unicast TAG&QinQ business, when referring to that the up message for not carrying VLAN tag flows through ONU, ONU adds for it Plus while private network VLAN tag, public network VLAN tag is added in its outer layer;The more than descending carrying message of two layers of VLAN tag When flowing through ONU, ONU first peels off two layers of VLAN tag, is then forwarded to user port;
Pattern 3:Up-downgoing symmetrically switches the message VLAN tag for carrying and specifying private network VLAN tag;
Unicast TRANSPARENT business:When referring to that the up message for carrying specified private network VLAN tag flows through ONU, ONU is transparent to be passed The defeated message;The descending message for carrying the private network VLAN tag is when flowing through ONU, and ONU equally realizes transparent transmission and to user terminal Mouth forwarding;
Unicast ALL TRANSPARENT business:ONU does not perceive private network VLAN tag and public network VLAN tag, realizes all messages Transparent transmission;
Unicast TRANSLATION&QinQ business:When referring to that the up message for carrying specified private network VLAN tag flows through ONU, ONU While switching private network VLAN tag, public network VLAN tag is added in its outer layer;The more than descending carrying report of two layers of VLAN tag When text flows through ONU, ONU first peels off public network VLAN tag, and private network VLAN tag then is switched back into former VLAN tag, finally again to User port is forwarded;
Unicast TRANSLATION business:When the up message for carrying specified private network VLAN tag flows through ONU, ONU switching private networks VLAN tag;When the descending message for carrying private network VLAN tag after switching flows through ONU, the VLAN tag is first switched back into original by ONU VLAN tag, is then forwarded to user port;
Unicast TRANSPARENT&QinQ business:When the up message for carrying specified private network VLAN tag flows through ONU, ONU is at it Outer layer adds public network VLAN tag;When more than descending carrying the message of two layers of VLAN tag flows through ONU, ONU elder generations peeling outer layer is public Net VLAN tag, is then forwarded to user port;
Unicast TLS business:When the up message for not carrying VLAN tag flows through ONU, ONU specifies private network VLAN marks for its addition Label, when the up message for carrying other private network VLAN tags flows through ONU, ONU adds public network VLAN tag for it;Carried when descending When the message of two layers of VLAN tag of the above flows through ONU, ONU first peels off public network VLAN tag, is then forwarded to user port, instantly When the message that row carries specified private network VLAN tag flows through ONU, ONU first peels off private network VLAN tag, then turns to user port Hair.
5. method according to claim 3, it is characterised in that the differentiation flow of the multicast service type is as follows:
Step 215, multicast service type entrance is distinguished;
Step 225, judge whether " private network VLAN tag operator scheme " is pattern 3, if it is, labeled as multicast TRANSLATION business;Step 235 is performed if not;
Step 235, judge whether " private network VLAN tag operator scheme " is pattern 2, if it is, labeled as multicast TRANSPARENT business, otherwise labeled as multicast TAG business;
Pattern 2:Up-downgoing carries the message transparent transmission for specifying private network VLAN tag;
Pattern 3:Up-downgoing symmetrically switches the message VLAN tag for carrying and specifying private network VLAN tag;
Multicast TRANSLATION business:When the downlink message for carrying specified private network VLAN tag flows through ONU, ONU first switches private network VLAN tag, is then forwarded to user port;
Multicast TRANSPARENT business:When the downlink message for carrying specified private network VLAN tag flows through ONU, ONU realizes that message is saturating It is bright to transmit and forwarded to user port;
Multicast TAG business:When the downlink message for carrying specified private network VLAN tag flows through ONU, ONU first peels off the VLAN tag again Forwarded to user port.
6. according to the method described in claim 1, it is characterised in that during the acquisition of the comparative result, described second deposit The number of operations of each class VLAN traffic of charting in space is stored up for N, charting is every in first memory space The number of operations of one class VLAN traffic is SERVICE_NUM;Compare every VLAN of list data in two memory spaces one by one The number of operations of business, as N=0 and SERVICE_NUM=0, directly returns successfully, represents consistent with current business, be not required to Reconfigure, the related data that are locally configured of the business keep constant;Work as N>During 0 and SERVICE_NUM=0, all new industry Business needs are reconfigured, and it is not include the business in new business, current business to represent the VLAN traffic that currently compares, is now needed Shelf space, record traffic related configuration data is locally configured for the traffic assignments, and operates related hardware list item;As N=0 and SERVICE_NUM>When 0, all business in old service set are deleted, represent that this is not issued, but be current business, now needed Empty corresponding all be locally configured of the business and preserve list item and the related hardware table item of the business;Work as N>0 and SERVICE_ NUM>When 0, record traffic consensus information is distinguished using bit mark mode, if new business is consistent with current business, by two The corresponding bit set of person.
7. according to the method described in claim 1, it is characterised in that also include the VLAN industry issued to gateway in the process Configuration data of being engaged in carries out the global validity checking of port traffic configuration data, specifically includes:
Operated before each business configuration once, software receives the VLAN traffic of port with postponing, every business of circular test Whether parameter is correct effectively, and flow will be examined in whether type of service is " unicast " or " multicast ", the private network VLAN behaviour of port Whether operation mode is " pattern 1 ", " pattern 2 ", " one of pattern 3 ", private network VLAN tag value, public network VLAN tag value, TLS Whether VLAN tag value meets IEEE802.1 regulations, and public network VLAN tag, which enables mark, TLS VLAN tags and enabled, to be marked whether For " enable " or " going to enable ", each VLAN traffic inspection to the port terminates, as long as one of attribute value mistake This configuration failure will be returned;
Pattern 1:Up addition private network VLAN tag and descending stripping;
Pattern 2:Up-downgoing carries the message transparent transmission for specifying private network VLAN tag;
Pattern 3:Up-downgoing symmetrically switches the message VLAN tag for carrying and specifying private network VLAN tag;
TLS:Transparent Ethernet.
8. method according to claim 6, it is characterised in that be compared the configuration data of new business and current business The step of also including port traffic collision detection before, it is specially:
The service counting table SCT that reference service is classified with counting process, judges multicast TAG business, unicast ALL respectively Whether TRANSPARENT business, unicast TLS business, unicast TAG business, the operation count of unicast TAG&QinQ business are more than 1, As long as when one of them draws the judged result more than 1, representing there is the corresponding principle for violating port traffic conflict;
For each business configuration data, its private network VLAN tag and the private network VLAN tag of other all business are compared Compared with if private network VLAN tag is unequal, continuation and other business compare, if private network VLAN tag is equal, compare both Private network VLAN operator schemes, when the pattern of the two is unequal, represent there is the corresponding principle for violating port traffic conflict;
For unicast VLAN traffic, do not drawn after completeer private network VLAN tag and private network VLAN operator schemes and " violate end During the corresponding principle of port service conflict " conclusion, in addition it is also necessary to which comparing the two public network VLAN enables mark and public network VLAN tag is It is no consistent;As long as when have one it is inconsistent when, represent exist violate port traffic conflict corresponding principle;
Multicast TAG business:When the downlink message for carrying specified private network VLAN tag flows through ONU, ONU first peels off the VLAN tag again Forwarded to user port;
Unicast TAG business:When the up message for not carrying VLAN tag flows through ONU, ONU is one layer of private network VLAN mark of its addition Label;When the descending message for carrying the private network VLAN tag flows through ONU, ONU first peels off the VLAN tag, then turns to user port Hair;
Unicast ALL TRANSPARENT business:ONU does not perceive private network VLAN tag and public network VLAN tag, realizes all messages Transparent transmission;
Unicast TLS business:When the up message for not carrying VLAN tag flows through ONU, ONU specifies private network VLAN marks for its addition Label, when the up message for carrying other private network VLAN tags flows through ONU, ONU adds public network VLAN tag for it;Carried when descending When the message of two layers of VLAN tag of the above flows through ONU, ONU first peels off public network VLAN tag, is then forwarded to user port, instantly When the message that row carries specified private network VLAN tag flows through ONU, ONU first peels off private network VLAN tag, then turns to user port Hair;
Unicast TAG&QinQ business:When the up message for not carrying VLAN tag flows through ONU, ONU adds private network VLAN marks for it While label, public network VLAN tag is added in its outer layer;When more than descending carrying the message of two layers of VLAN tag flows through ONU, ONU Two layers of VLAN tag is first peeled off, is then forwarded to user port.
9. the system of user port VLAN traffic management is realized in a kind of optical network unit, it is characterised in that the system includes:
First memory space, for preserving the corresponding VLAN traffic configuration data attribute list of each user port, the VLAN industry Configuration data of being engaged in attribute list is used for the corresponding VLAN traffic configuration data of each VLAN traffic of the book of final entry and each class VLAN The number of operations of business, the VLAN traffic configuration data attribute list includes:For recording the corresponding VLAN of each class type of service Business grouped data table TST, the type of service table STT for every new VLAN traffic type of the book of final entry of business configuration data With the service counting table SCT for recording each class VLAN traffic number of operations, type of service table STT numberings and statistic record industry It is each in the type of service title of business, service counting table SCT corresponding record type of service tables STT in business grouped data table TST The number of operations of class VLAN traffic, is renamed after STT and SCT tables locally preserve;
Second memory space, for the VLAN traffic configuration data issued from gateway according to reception, forms portion and meets institute The new form of VLAN traffic configuration data attribute list statistical rules is stated, and is preserved;
Comparison module, for comparing the list data in first memory space and the second memory space, is marked described new The inconsistent VLAN configuration datas of VLAN traffic configuration data attribute list in form and first memory space, as comparing knot Really;
Configuration driven module, updates related service hardware and logic, come into force business configuration according to the comparative result.
CN201410074855.9A 2014-03-03 2014-03-03 The method and system of user port VLAN traffic management are realized in optical network unit Active CN103840996B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410074855.9A CN103840996B (en) 2014-03-03 2014-03-03 The method and system of user port VLAN traffic management are realized in optical network unit

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410074855.9A CN103840996B (en) 2014-03-03 2014-03-03 The method and system of user port VLAN traffic management are realized in optical network unit

Publications (2)

Publication Number Publication Date
CN103840996A CN103840996A (en) 2014-06-04
CN103840996B true CN103840996B (en) 2017-08-01

Family

ID=50804155

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410074855.9A Active CN103840996B (en) 2014-03-03 2014-03-03 The method and system of user port VLAN traffic management are realized in optical network unit

Country Status (1)

Country Link
CN (1) CN103840996B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105530156A (en) * 2014-10-22 2016-04-27 深圳市中兴微电子技术有限公司 Virtual local area network tag processing device and method of ONU (Optical Network Unit)
CN104540047B (en) * 2015-01-09 2017-12-29 烽火通信科技股份有限公司 The method and system of the layer service mixture of ONU end mouth two or three are realized in GPON
CN106302837B (en) * 2015-05-12 2019-08-06 青岛海信宽带多媒体技术有限公司 A kind of the mac address table management method and device of optical network unit
CN105323110B (en) * 2015-09-24 2018-09-28 成都广达新网科技股份有限公司 A kind of OAM protocol package delivery methods of configuration management ONU equipment
CN106453307B (en) * 2016-10-10 2019-03-15 烽火通信科技股份有限公司 PON carries the method and system of the network safety prevention of small base station passback
CN107124307B (en) * 2017-04-24 2020-02-11 新华三信息技术有限公司 Management VLAN (virtual local area network) switching method and device
CN111163378A (en) * 2019-11-26 2020-05-15 中盈优创资讯科技有限公司 Optical network multicast sinking management method and device
CN110971499B (en) * 2019-12-10 2021-11-12 上海市共进通信技术有限公司 Method for realizing uniform analysis and processing of VLAN service
CN113849132A (en) * 2021-09-28 2021-12-28 广州芯德通信科技股份有限公司 Method for prolonging flash service life of ONU (optical network Unit) terminal equipment and ONU terminal equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005333546A (en) * 2004-05-21 2005-12-02 Hitachi Ltd Vlan configuration management method, system and program
CN101616030A (en) * 2009-07-28 2009-12-30 中兴通讯股份有限公司 A kind of management method of information of virtual local area network and system
CN102447568A (en) * 2011-11-18 2012-05-09 烽火通信科技股份有限公司 Method for treating downlinking broadcast, flooding business and multicasting business in gigabit passive optical network (GPON) system
CN103117912A (en) * 2013-01-22 2013-05-22 江苏亿通高科技股份有限公司 Multimedia over coax alliance (MoCA) terminal business configuration automatic issuing method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005333546A (en) * 2004-05-21 2005-12-02 Hitachi Ltd Vlan configuration management method, system and program
CN101616030A (en) * 2009-07-28 2009-12-30 中兴通讯股份有限公司 A kind of management method of information of virtual local area network and system
CN102447568A (en) * 2011-11-18 2012-05-09 烽火通信科技股份有限公司 Method for treating downlinking broadcast, flooding business and multicasting business in gigabit passive optical network (GPON) system
CN103117912A (en) * 2013-01-22 2013-05-22 江苏亿通高科技股份有限公司 Multimedia over coax alliance (MoCA) terminal business configuration automatic issuing method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于NGPON系统的ONU配置管理技术;肖青等;《电视技术》;20121231;第36卷(第15期);全文 *

Also Published As

Publication number Publication date
CN103840996A (en) 2014-06-04

Similar Documents

Publication Publication Date Title
CN103840996B (en) The method and system of user port VLAN traffic management are realized in optical network unit
CN101313533B (en) Optical network terminal and packet process method
CN101453673B (en) Optical network terminal, and packet process method thereof
CN1708957B (en) Multi- tiered virtual local area network (VLAN) domain mapping mechanism
CN1943190B (en) Flooding suppression method
CN104253735B (en) Optical network unit, communication system and method
CN100586079C (en) A kind of method for discovering network topology of data-oriented link layer
CN102238083A (en) System and method for adapting a packet processing pipeline
CN101133407A (en) Metro Ethernet network with scaled broadcast and service instance domains
CN101110764A (en) Method for Ethernet switchboard data frame partitioning virtual local area network and transmitting
CN103081415A (en) A control apparatus, a communication system, a communication method and a recording medium having recorded thereon a communication program
CN101227404B (en) Method and apparatus for in-band managing for Ethernet switch without network manage
CN101005437B (en) Method and system for realizing heap virtual local area network
CN103701679B (en) A kind of method for realizing VLAN conversions
CN102065018B (en) Method and system for transmitting message
CN101247267B (en) Method and device for three-layer virtual special network topological automatic discovering in network management system
CN103200126B (en) XG-PON system flow management device and method
CN106341296A (en) Method of avoiding data message collision in communication network within transformer substation
CN102377645B (en) Exchange chip and realization method thereof
CN100454894C (en) Information insulating method and device for downlink broadcast, flood of Ethernet passive optical network
CN102326370A (en) Message processing method, apparatus and system
CN102045607A (en) Method for enhancing QoS (Quality of Service) and VLAN (Virtual Local Area Network) processing capability in EPON (Ethernet Passive Optical Network) system
CN104243298A (en) Message control method and device
CN100394741C (en) User MAC frame transfer method, edge transfer device, and program
CN104202229B (en) A kind of device for passive optical network OLT QINQ message processing methods and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant