CN103973825B - Method, node device and the sending method of MAC Address accessibility are noticed in stacking network - Google Patents
Method, node device and the sending method of MAC Address accessibility are noticed in stacking network Download PDFInfo
- Publication number
- CN103973825B CN103973825B CN201310041145.1A CN201310041145A CN103973825B CN 103973825 B CN103973825 B CN 103973825B CN 201310041145 A CN201310041145 A CN 201310041145A CN 103973825 B CN103973825 B CN 103973825B
- Authority
- CN
- China
- Prior art keywords
- tlv
- mac address
- network
- stacking network
- mac
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Small-Scale Networks (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The present invention provides method, node device and the sending method that MAC Address accessibility is noticed in a kind of stacking network, and the method for notice MAC Address accessibility includes:The fringe node of stacking network outwards notices MAC Address accessibility TLV, TLV by an IS IS examples and carries virtual process identifications;Intermediate node builds the LSDB of the IS IS examples for noticing MAC Address accessibility TLV, MAC Address accessibility TLV is transferred into other fringe nodes after MAC Address accessibility TLV is received;Other fringe nodes build the LSDB of IS IS examples, and build for the mapping table between the separate purpose C MAC of virtual process identifications and stacking network outer layer forwarding mark according to LSDB after MAC Address accessibility TLV is received." the information that MAC Address accessibility TLV " is carried of the method extension existing standard of the present invention, and on the basis of it need not introduce new ESADI agreements, it is specified that for noticing the processing mode of the IS IS examples of MAC Address accessibility and network node after the IS IS protocol massages for belonging to the IS IS examples are received.
Description
Technical field
The present invention relates to the communications field, more particularly, to the side that MAC Address accessibility is noticed in a kind of stacking network
Method, node device and sending method.
Background technology
Ethernet is currently network most commonly used in the mininets such as enterprise network, Campus Networks and data center network
Technology, penetrate into extensively among the daily production and living of people.But advised with using the network of ethernet technology network
Mould constantly expands, and also displays more and more the drawbacks of traditional ethernet.First, the scalability of traditional ethernet is not
It is good.The data message encapsulation format of traditional ethernet is as shown in figure 1, using media access control(Media Access
Control, referred to as MAC)Address and virtual local area network tags(Virtual Local Area Network tag, referred to as
VLAN-TAG)The VLAN-ID of middle carrying identifies as forwarding, and what MAC Address therein represented is the number for producing the data message
According to source(Also commonly referred to as main frame or website, are hereinafter represented with main frame)Packaged MAC Address, VLAN-ID represent be
The mark of logical network is divided on physical network, the interface that identical VLAN-ID is configured with network node belongs to identical and patrolled
Network is collected, different logical network matches different forward tables in forwarding data packets, mutually isolated.Due to it is above-mentioned tradition with
The single layer network characteristic netted very much, on the one hand, the forward table of all-network node is required for preserving the MAC Address bar of main frame in network
Mesh, when network size is very big, the relatively low network node of performance will can't bear the heavy load;On the other hand, VLAN-ID in Ether frame
Length only has 12 bits, can only at most divide individual logical network more than 4,000, and when network size is very big, the quantity of logical network is just
Can not meet the needs of network.Secondly, the link utilization of traditional ethernet is low and network convergence is slow.Traditional ethernet is using life
Into tree protocol(Spanning Tree Protocol, referred to as STP)Carry out anti-loops, Spanning-Tree Protocol is possessing protocol realization
While simple advantage, the drawbacks of link utilization is low and network convergence is slow is also brought, this is when network size is very big
Time, which shows, to be especially apparent.Again, the security of traditional ethernet is relatively low.The single layer network characteristic of traditional ethernet easily triggers
The broadcast storm of the whole network, thus in traditional ethernet any one network node all may initiate for whole network attack and
Destroy.
In order to overcome a variety of drawbacks when above-mentioned traditional ethernet is applied to large-scale network-estabilishing, International Standards Organization electrically and
Electronic Engineering Association(Institute of Electrical and Electronics Engineers, referred to as IEEE)
With Internet Engineering Task group(Internet Engineering Task Force, referred to as IETF)Profit is all proposed respectively
Use stacking network(Overlay Network)Transmit the solution of Ethernet service.It is so-called to utilize stacking network transmission ether
Network service, exactly network is layered, marks a core layer for being referred to as stacking network in the middle diaphyseal portion of network, fold
The fringe node of screening network is once encapsulated to the original Ether frame for entering the network, the destination address of data message after encapsulation
The remote edge node synchronization of stacking network is pointed to, is then forwarded in stacking network according to the destination address of message after encapsulation,
Once decapsulated again after reaching the remote edge node synchronization of stacking network, recover original Ether frame.Transmitted using stacking network
Ethernet service, stacking network and the access layer network of periphery can be kept apart, be sealed by introducing one layer of new data surface
Be filled with solve traditional ethernet scalability problem, by using different from traditional ethernet use STP protocol newly
Chain of command agreement carrys out anti-loops and established to route, to solve the problems, such as that link utilization is low and network convergence is slow, and by upper
State new data surface encapsulation come with chain of command agreement together with solve safety issue.
The stacking network solution that IEEE is proposed is referred to as the shortest path bridging of MAC patterns(Shortest Path
Bridging-MAC Mode, referred to as SPBM), its technical standard includes what is issued respectively in Augusts, 2008 and in June, 2012
802.1ah provider backbone bridge(Provider Backbone Bridges, referred to as PBB)Standard and 802.1aq shortest paths
Footpath bridges(Shortest Path Bridging, referred to as SPB)Standard, the data that the two standards define SPBM respectively are put down
Surface technology and control plane technology.The SPBM data-plane technologies of PBB standard 802.1ah defineds are using MAC-in-MAC
Encapsulation, specific encapsulation format is as shown in Fig. 2 be wherein packaged with the original Ether frame that main frame is sent(That is customer frame), the visitor of encapsulation
Client media accessing to control address is carried in the frame of family(Customer MAC Address, referred to as C-MAC)And customer frame
VLAN-TAG, for customer frame when the stacking network is entered, network edge node can encapsulate one layer newly outside customer frame
Forwarding mark, i.e. Backbone Media accessing to control address(Backbone MAC Address, referred to as B-MAC)With key virtual office
Domain network mark label(Backbone VLAN tag, referred to as B-TAG), B-MAC include 6 bytes purpose B-MAC and 6 bytes source
B-MAC, B-TAG include the key VLAN ID of 12 bits(Backbone VLAN Identifier, referred to as B-
VID), back-bone traffic example label can be additionally encapsulated between B-TAG and C-MAC(Backbone Service
Instance tag, referred to as I-TAG), I-TAG includes the back-bone traffic instance identification of 24 bits(Backbone Service
Instance Identifier, referred to as I-SID).The fringe node that PBB is encapsulated in SPBM stacking networks is completed, message encapsulation
After the completion of, all nodes in the stacking network including fringe node carry out message according to purpose B-MAC and B-VID and turned
Hair, and I-SID has no effect on the forwarding of message only in isolation of the fringe node as different business example.It is superimposed for SPBM
The fringe node of network, one or more customer frame VID on an inbound port are mapped to an I-SID, one or more
I-SID is mapped to a B-VID, and one or more purpose C-MAC are mapped to a purpose B-MAC, wherein customer frame VID
Mapping table between I-SID and between I-SID and B-VID is obtained by manual configuration, and purpose C-MAC and purpose
Mapping table between B-MAC is then to learn to obtain by data surface.In addition, the mapping between purpose C-MAC and purpose B-MAC
Table is separate based on each I-SID, that is to say, that different I- is directed on the fringe node of SPBM stacking networks
The mapping table between different purpose C-MAC and purpose B-MAC be present in SID.The SPBM controls of SPB standard 802.1aq defineds
Planar technique is using ISIS-SPB(It is applied to the IS-IS of SPB network)Link-state routing protocol, the agreement are with state
Intermediate System-to-Intermediate System as defined in the standard ISO10589 of border(Intermediate System to Intermediate
System, referred to as IS-IS)Based on link-state routing protocol, corresponding customization and extension have been carried out for SPBM network.
The stacking network solution that IETF is proposed has many kinds, is carried wherein there is two kinds of main schemes to employ with IEEE
The similar control plane technology of the SPBM stacking networks that go out, it is more that both schemes are respectively that IETF Trill working groups define
Link transparency interconnects(Transparent Interconnection of Lots of Links, referred to as Trill)Overlay network
The virtual expansible LAN that network and IETF Nvo3 working groups define(Virtual eXtensible Local Area
Network, referred to as VXLAN)Stacking network.The control surface technology of Trill stacking networks is using ietf standard RFC6326
The ISIS-Trill of defined(It is applied to the IS-IS of Trill networks)Link-state routing protocol, the agreement are marked with the world
Based on IS-IS link-state routing protocols as defined in quasi- ISO10589, corresponding customization and expansion have been carried out for Trill networks
Exhibition;The control surface technology of VXLAN stacking networks has continued to use existing Routing Protocol in IP network, and one of option is exactly
The ISIS-IP of RFC1195 defineds(It is applied to the IS-IS of IP network)Link-state routing protocol, the agreement are with the world
Based on IS-IS link-state routing protocols as defined in standard ISO10589, corresponding customization and expansion have been carried out for IP network
Exhibition.Different from IEEE propose SPBM stacking networks use PBB datum planes encapsulate, Trill stacking networks using
The Trill datum planes encapsulation that RFC6325 and a series of RFC being updated to RFC6325 are defined, specific encapsulation format is such as
Shown in Fig. 3, wherein being packaged with the original Ether frame that main frame is sent(That is customer frame), customer frame enter the stacking network when
Wait, network edge node can encapsulate one layer of new forwarding mark, i.e. the egress Nickname of 16 bits outside customer frame(It is close
Claim)With the ingress Nickname of 16 bits, fine grained label can be additionally encapsulated between C-MAC and customer frame payload
(Fine-Grained Label, referred to as FGL), FGL includes the fine grained label value of 24 bits(Fine-Grained Label
Value, referred to as FGL Value).The fringe node that Trill is encapsulated in Trill stacking networks is completed, after the completion of message encapsulation,
All nodes in stacking network including fringe node carry out message forwarding according to egress Nickname, and FGL
Value only in isolation of the fringe node as different business example, has no effect on the forwarding of message.For Trill stacking networks
Fringe node, one or more customer frame VID on an inbound port are mapped to a FGL Value, one or more
Purpose C-MAC is mapped to an egress Nickname, and the mapping table between wherein customer frame VID and FGL Value is logical
Manual configuration acquisition is crossed, and the mapping table between purpose C-MAC and egress Nickname then both can be by data surface
Practise and obtaining, can also be noticed and obtained by chain of command.Learn compared to by data surface, the advantage noticed by chain of command is
Just mapping table can be built before the actual data traffic of transmission and completed, to avoid the customer frame received due to fringe node
Purpose C-MAC mapping table entries lack and caused by all egress multicasts consequence.In order to notice purpose by chain of command
Mapping table between C-MAC and egress Nickname, RFC6165 defines one, and referred to as " MAC Address accessibility TLV's " is new
IS-IS TLV(Type/Length/Value, type/length/assignment), specific encapsulation format as shown in figure 4, the TLV by
IS-IS Link State Protocol Data Unit(Link State PDU, referred to as LSP)Message carries, and can be in same LSP
Occur in message multiple.IETF Trill Working Group Drafts draft-ietf-trill-esadi-01 defines Trill superpositions
The point of termination station address distribution information used in network(End Station Address Distribution
Information, referred to as ESADI)Although agreement, ESADI agreements make use of " the MAC Address accessibility that RFC6165 is defined
TLV " notices the mapping table between purpose C-MAC and egress Nickname, but due to consideration that this reflects in stacking network
The change of firing table may very frequently, if directly in the ISIS-Trill protocol massages encapsulated independent of Trill data surfaces
If carrying this TLV, frequently restraining again for Trill stacking networks can be triggered, the unstable of network is brought, so just providing this
TLV is not carried directly in ISIS-Trill protocol massages, but in the ESADI encapsulated using Trill data surfaces newly defined
Carried in protocol massages.In addition, the mapping table between purpose C-MAC and egress Nickname is to be based on each FGL Value
It is separate, that is to say, that to exist on the fringe node of Trill stacking networks for different FGL Value different
Mapping table between purpose C-MAC and egress Nickname.Both it had been different from the PBB that the SPBM stacking networks that IEEE is proposed use
Datum plane encapsulates, the Trill datum planes encapsulation used also different from the IETF Trill stacking networks proposed, VXLAN superpositions
The VXLAN datum planes that network defines using ietf draft draft-mahalingam-dutt-dcops-vxlan-02 seal
Dress, specific encapsulation format is as shown in figure 5, be wherein packaged with the original Ether frame that main frame is sent(That is customer frame), customer frame entering
When entering the stacking network, network edge node can encapsulate one layer of new forwarding outside customer frame and identify, i.e. outside 4 bytes
The outer layer purpose IP address of layer source IP address and 4 bytes, can additionally encapsulate VXLAN between outer layer UDP heads and C-MAC
Head(header), VXLAN heads include the VXLAN network identities of 24 bits(VXLAN Network Identifier, referred to as
For VNI).The fringe node that VXLAN is encapsulated in VXLAN stacking networks is completed, after the completion of message encapsulation, including fringe node
Stacking network in all nodes message forwarding is carried out according to outer layer purpose IP, and VNI is only in fringe node as different
The isolation of VXLAN virtual networks, have no effect on the forwarding of message.For the fringe node of VXLAN stacking networks, an inbound port
On one or more customer frame VID be mapped to a VNI, one or more purpose C-MAC are mapped to an outer layer mesh
IP, the wherein mapping table between customer frame VID and VNI is obtained by manual configuration, and purpose C-MAC and outer layer purpose
Mapping table between IP then learns to obtain by data surface.In addition, the mapping table between purpose C-MAC and outer layer purpose IP is base
Separate in each VNI, that is to say, that difference be present for different VNI on the fringe node of VXLAN stacking networks
Purpose C-MAC and outer layer purpose IP between mapping table.
The RFC6822 that IETF IS-IS working groups issue in December, 2012 defines a kind of referred to as more examples of IS-IS
(IS-IS Multiple Instances)Technology, the technology allow one run IS-IS control plane agreements network
Internal to enable multiple IS-IS examples simultaneously, each IS-IS examples are separate, do not interfere with each other, the letter being respectively completed in this example
Notice task is ceased, and individually belongs to the link shape of this example according to this example advertised information structure received on the network node
State database(Link State Database, referred to as LSDB).Mentioned in RFC6822, how real why formulate IS-IS
Example technology, exactly in order to allow IS-IS control planes agreement to transmit some non-routes while routing iinformation is transmitted
Information(Such as the information that some applications are related), and it is desirable that transmitting for these non-routing iinformations will not receive for the route of network
Hold back and have an impact.In order to distinguish different IS-IS examples in the more case technologies of application IS-IS, RFC6822 defines example mark
Know(Instance Identifier, referred to as IID)TLV, specific encapsulation format as shown in fig. 6, the TLV include it is one long
Spend for the IID of 2 bytes(Span 0 ~ 65535), IID#0 is not support the old network of the more examples of IS-IS to set as compatibility
The reservation instance identification that standby standard instance uses, when IID is non-zero value, if the IS-IS examples that this IID is represented are supported
The more topologies of IS-IS defined in RFC5120(IS-IS Multiple Topology), then the TLV can also include this example
The one or more topological ID supported.
By above-mentioned three kinds existing stacking network technology SPBM, Trill and VXLAN explanation can be seen that this three
Kind technology all encapsulates the virtual process identifications that functional mechanism identical length is 24 bits in datum plane(In SPBM technologies
The VNI in FGL Value and VXLAN technologies in I-SID, Trill technology), functional mechanism phase is all employed in control plane
Same IS-IS control plane agreements(ISIS-Trill the and VXLAN technologies in ISIS-SPB, Trill technology in SPBM technologies
In ISIS-IP).Wherein SPBM technologies and VXLAN technologies lack is noticed outside purpose C-MAC and stacking network by control plane
Mapping table between layer forwarding mark(Alternatively referred to as notice MAC Address accessibility)Method, although Trill technologies define
ESADI agreements, using RFC6165 define " MAC Address accessibility TLV " notices this mapping table, but still has two and lack
Fall into, first, the information that the TLV is carried is not enough to structure for different FGL Value and separate purpose C-MAC with going out
Mapping table between node Nickname;Second, ESADI agreements are in order to evade using Intermediate System to Intermediate System message to carry " MAC Address
The frequent oscillation problem of network that accessibility TLV " may trigger, define the new ESADI using the encapsulation of Trill data surfaces and assist
Message is discussed to carry the TLV, but this causes Trill network edge nodes to support Intermediate System to Intermediate System and ESADI agreements simultaneously again,
Implement complex, and can not directly apply to dependent on the ESADI agreements of Trill data surfaces encapsulation and equally use IS-
Other stacking network technologies of IS control plane agreements(Such as SPBM technologies and VXLAN technologies)In.
The content of the invention
In order to solve techniques discussed above defect, the present invention, which provides, notices MAC Address accessibility in a kind of stacking network
Method, node device and sending method, extension existing standard " MAC Address accessibility TLV " carry information, and
It need not introduce on the basis of new ESADI agreements, it is specified that for noticing special the IS-IS examples and net of MAC Address accessibility
Processing mode of the network node after the Intermediate System to Intermediate System message for belonging to the special IS-IS examples is received, this method can be applied simultaneously
In a variety of stacking network technologies for equally using IS-IS control plane agreements.
To achieve the above object, the present invention takes following technical scheme:
A kind of announcement media access control(MAC)The method of address reachability, it is to centre suitable for application intermediate system
System(IS-IS)The stacking network of control plane agreement, this method include:
The fringe node of stacking network outwards notices MAC Address accessibility type/length/assignment by an IS-IS examples
(TLV), TLV carries virtual process identifications;
The intermediate node of stacking network is built for noticing MAC Address accessibility after MAC Address accessibility TLV is received
The LSD of TLV IS-IS examples(LSDB), MAC Address accessibility TLV is then transferred to its of stacking network
Its fringe node;
Other fringe nodes of stacking network build the LSDB of IS-IS examples after MAC Address accessibility TLV is received,
And built according to LSDB for the separate purpose client media accessing to control address of virtual process identifications(C-MAC)With folding
Mapping table between screening network outer layer forwarding mark.
Preferably, IS-IS examples are an IS-IS examples of the IS-IS standard instances for being different from notice routing iinformation, its
Middle instance identification(IID)Value is non-zero, and all nodes in stacking network all identify IS-IS using identical IID
Example.
Preferably, virtual process identifications are back-bone traffic instance identification(I-SID), and/or fine grained label value(FGL
Value), and/or virtual expansible LAN(VXLAN)Network identity(VNI).
A kind of media access control(MAC)Address reachability type/length/assignment(TLV)Sending method, suitable for folded
Screening network and MAC Address accessibility TLV is by Intermediate System-to-Intermediate System(IS-IS)Link State Protocol Data Unit
(LSP)Message carries, and the sending method includes:
The fringe node of stacking network outwards notices MAC Address accessibility TLV by an IS-IS examples;
The intermediate node of stacking network sends MAC Address accessibility TLV to folded after MAC Address accessibility TLV is received
Other fringe nodes of screening network.
Preferably, MAC Address accessibility TLV includes:
One or more sub- TLV(sub-TLV), sub-TLV is with including the MAC for being applied to a certain stacking network encapsulation technology
Location reachability information;
Sub-TLV carries the virtual process identifications of corresponding a certain stacking network.
Preferably, sub-TLV includes identifying the subtype of the type of corresponding stacking network(sub-Type).
Preferably, MAC Address accessibility TLV occurs one or many in same LSP messages.
A kind of fringe node, is suitable for use with Intermediate System-to-Intermediate System(IS-IS)The overlay network of control plane agreement
Network,
Fringe node, for passing through the outside announcement media access control of an IS-IS examples(MAC)Address reachability type/
Length/assignment(TLV), TLV carries virtual process identifications;
Or for after MAC Address accessibility TLV is received, building the LSD of IS-IS examples
(LSDB), and built according to LSDB for the separate purpose client media accessing to control address of virtual process identifications(C-
MAC)With the mapping table between stacking network outer layer forwarding mark.
Preferably, IS-IS examples are an IS-IS examples of the IS-IS standard instances for being different from notice routing iinformation, its
Middle instance identification(IID)Value is non-zero, and all nodes in stacking network all identify IS-IS using identical IID
Example.
Preferably, virtual process identifications are back-bone traffic instance identification(I-SID), and/or fine grained label value(FGL
Value), and/or virtual expansible LAN(VXLAN)Network identity(VNI).
A kind of intermediate node, is suitable for use with Intermediate System-to-Intermediate System(IS-IS)The overlay network of control plane agreement
Network,
Intermediate node, for receiving media access control from the fringe node of stacking network(MAC)Address reachability class
Type/length/assignment(TLV)Afterwards, the LSD of the IS-IS examples for noticing MAC Address accessibility TLV is built
(LSDB), then MAC Address accessibility TLV is transferred to other fringe nodes of stacking network.
A kind of stacking network, including above-mentioned fringe node and intermediate node.
For the present invention due to taking techniques discussed above scheme, it includes advantages below:Be easily achieved and with existing row
Industry standard is compatible.
Brief description of the drawings
Accompanying drawing described herein is used for providing a further understanding of the present invention, forms the part of the application, the present invention
Exemplary embodiment and its illustrate be used for explain the present invention, be not construed as limiting the invention;In the accompanying drawings:
Fig. 1 is the traditional ethernet data message encapsulation format figure of prior art;
Fig. 2 is the SPBM datum plane encapsulation format figures of prior art;
Fig. 3 is the Trill datum plane encapsulation format figures of prior art;
Fig. 4 is the MAC Address accessibility TLV encapsulation format figures of prior art;
Fig. 5 is the VXLAN datum plane encapsulation format figures of prior art;
Fig. 6 is the instance identification TLV encapsulation format figures of prior art;
Fig. 7 is the flow chart for the method that MAC Address accessibility is noticed in the stacking network of one embodiment of the present of invention;
Fig. 8 is the MAC Address accessibility TLV encapsulation format figures according to the present invention;
Fig. 9 is the stacking network schematic diagram that SPBM is only supported in application example one of the present invention;
Figure 10 is the MAC Address accessibility TLV encapsulation format figures used in application example one of the present invention;
Figure 11 is the stacking network schematic diagram for supporting SPBM, Trill and VXLAN in application example two of the present invention simultaneously;With
And
Figure 12 is the MAC Address accessibility TLV encapsulation format figures used in application example two of the present invention.
Embodiment
In order that technical scheme is more clearly understood, the present invention is done with specific embodiment below in conjunction with the accompanying drawings
It is further elaborated on.It should be noted that in the case where not conflicting, it is various in the embodiment and embodiment in the application
Mode can be mutually combined.
In the stacking network for applying IS-IS control plane agreements, defined by extending ietf standard RFC6165
" MAC Address accessibility TLV " carry information, and regulation be used for notice MAC Address accessibility special IS-IS examples and
Processing mode of the network node after the Intermediate System to Intermediate System message for belonging to the special IS-IS examples is received, there is provided one kind does not increase
The required protocol type supported of network, it can be applied to support the network of a variety of stacking network technologies simultaneously, be easily achieved and with showing
There is the method that MAC Address accessibility is noticed in the compatible stacking network of professional standard.
Fig. 7 is the flow chart for the method that MAC Address accessibility is noticed in the stacking network of one embodiment of the present of invention, such as
Shown in Fig. 7, this method may comprise steps of:
Step 702, the fringe node of stacking network outwards noticed by an IS-IS examples " MAC Address accessibility TLV ",
The TLV carries virtual process identifications.
Invention provides for new " MAC Address accessibility TLV ", the specific encapsulation that a kind of IS-IS LSP messages carry
Form is as shown in figure 8, include one or more sub- TLV in the TLV(sub-TLV), correspondingly one kind uses subclass to each sub-TLV
Type(sub-Type)The stacking network technology being identified, and because purpose C-MAC and the forwarding of stacking network outer layer are identified(Such as
The outer layer purpose IP in egress Nickname and VXLAN technology in purpose B-MAC, Trill technology in SPBM technologies)It
Between mapping table be to be directed to different virtual process identifications(Such as the FGL in I-SID, Trill technology in SPBM technologies
VNI in Value and VXLAN technologies)It is separate, so being carried in each sub-TLV to should stacking network technology
Length be 24 bits virtual process identifications.Present invention provide that new " MAC Address accessibility TLV " can be same
Occur in LSP messages one or many.
In order to evade, using Intermediate System to Intermediate System message, to carry, " network that MAC Address accessibility TLV " may trigger is frequent
Oscillation problem, and using protocol complexity caused by the ESADI agreements defined in Trill stacking networks and can not be applied to
Other stacking networks(Such as SPBM network and VXLAN networks)The problem of middle, the present invention are proposed using ietf standard RFC6822
The more case technologies of IS-IS, outwards notice that " MAC Address accessibility TLV ", referred herein is special by special IS-IS examples
The IS-IS examples of door are an IS-IS standard instances for being different from notice routing iinformation(IID#0)Another IS-IS example
(IID values are non-zero, such as value 65535), and all to identify this using identical IID special for all nodes in stacking network
IS-IS examples.Regulation according to RFC6822 to the more case technologies of the IS-IS, " MAC that stacking network fringe node is outwards noticed
Address reachability TLV " always with carry the special IS-IS examples IID instance identification TLV simultaneously be present in it is same
In LSP messages.
Step 704, the intermediate node of stacking network is receiving what fringe node was outwards noticed by special IS-IS examples
" after MAC Address accessibility TLV ", structure belongs to the LSDB of the special IS-IS examples, then will " MAC Address accessibility TLV " biographies
It is handed to other fringe nodes of stacking network.
Because the intermediate node of stacking network need not be built between purpose C-MAC and stacking network outer layer forwarding mark
Mapping table, so they " simply serve information to pass dedicated for notice in MAC Address accessibility TLV " IS-IS examples
The effect passed, the mechanism for the transmission information that they are used are exactly the IS-IS floodings standardized(Flooding)Mechanism, and pass through
Structure belongs to the LSDB of the special IS-IS examples, and the IS-IS LSDB synchronizations of standardization and update mechanism ensure information
The reliability of transmission.
Step 706, other fringe nodes of stacking network are to receive fringe node outside by special IS-IS examples
The carrying virtual process identifications of notice " after MAC Address accessibility TLV ", structure belongs to the LSDB of the special IS-IS examples, and
Identified according to LSDB structures for the separate purpose C-MAC of different virtual process identifications and the forwarding of stacking network outer layer
Between mapping table.
Belong to except that can be built as the intermediate node of stacking network dedicated for noticing " MAC Address accessibility TLV "
IS-IS examples LSDB, the fringe node of stacking network also need to according to the LSDB build purpose C-MAC with outside stacking network
Mapping table between layer forwarding mark, and can be according to from " extracting in MAC Address accessibility TLV " and be simultaneously stored in LSDB not
Same virtual process identifications build separate mapping table.
The present invention is further described below by way of two application examples.
Application example one
In this application example, stacking network is a stacking network for only supporting SPBM.
Fig. 9 is the stacking network schematic diagram that SPBM is only supported in application example one of the present invention, with reference to shown in Fig. 7 and Fig. 9, this
Each network node notice of application example and processing procedure mainly comprise the following steps:
Step 902, the fringe node of SPBM stacking network is only supported to pass through special IS-IS examples(IID values
65535)Outwards " MAC Address accessibility TLV ", the TLV carry the I-SID that length is 24 bits for notice.
In the IS-IS LSP messages that fringe node 1,2,3 and 4 outwards floods at the same carry " MAC Address accessibility TLV " and
" instance identification TLV "." MAC Address accessibility TLV " specific encapsulation format is as shown in Figure 10, because the stacking network is one
SPBM stacking network is only supported, so " MAC Address accessibility TLV ", should only comprising the sub-TLV that a subtype is SPBM
Sub-TLV includes length as the virtual process identifications I-SID in the SPBM stacking networks of 24 bits." instance identification TLV " tool
Body encapsulation format is specifically applied to notice MAC Address as shown in fig. 6, the IID values in the TLV are fixed as 65535 for identifying
The IS-IS examples of reachability information.
Step 904, the intermediate node of stacking network is receiving what fringe node was outwards noticed by special IS-IS examples
" after MAC Address accessibility TLV ", structure belongs to the LSDB of the special IS-IS examples, then will " MAC Address accessibility TLV " biographies
It is handed to other fringe nodes of stacking network.
Intermediate node 5,6 and 7 receives " MAC Address accessibility TLV " and " instance identification of the flooding of fringe node 1,2,3 and 4
After TLV ", structure belongs to the LSDB of IS-IS examples 65535, and the effect of the LSDB is not the LSDB mono- as belonging to IS-IS examples 0
Sample is in order to generate routing table, but in order to which MAC Address reachability information is flooded to fringe node.
Step 906, other fringe nodes of stacking network pass through special IS-IS examples receiving other fringe nodes
The carrying I-SID's outwards noticed " after MAC Address accessibility TLV ", builds the LSDB for belonging to the special IS-IS examples, and root
According to LSDB structures for the mapping table between separate different I-SID purpose C-MAC and purpose B-MAC.
After fringe node 1,2,3 and 4 receives the IS-IS LSP messages of other fringe nodes flooding, except with intermediate node
The LSDB for belonging to IS-IS examples 65535 can equally be built, it is also necessary to according to the LSDB build purpose C-MAC and purpose B-MAC it
Between mapping table, and for from " extracting in MAC Address accessibility TLV " and be simultaneously stored in the different I-SID in LSDB, edge
Node can build separate mapping table.
Application example two
In this application example, stacking network is one while supports SPBM, Trill and VXLAN stacking network.
Figure 11 is the stacking network schematic diagram that application example two of the present invention supports SPBM, Trill and VXLAN simultaneously, with reference to
Shown in Fig. 7 and Figure 11, each network node notice of this application example and processing procedure mainly comprise the following steps:
Step 1102, while the fringe node of SPBM, Trill and VXLAN stacking network is supported to pass through special IS-IS
Example(IID values 65535)Outwards " MAC Address accessibility TLV ", the TLV carry the I- that length is 24 bits simultaneously for notice
The VNI that SID, length are the FGL Value of 24 bits and length is 24 bits.
In the IS-IS LSP messages that fringe node 1,2,3 and 4 outwards floods at the same carry " MAC Address accessibility TLV " and
" instance identification TLV "." MAC Address accessibility TLV " specific encapsulation format is as shown in figure 12, because the stacking network is one
SPBM, Trill and VXLAN stacking network are supported simultaneously, so " MAC Address accessibility TLV " includes three subtypes and distinguished
For SPBM, Trill and VXLAN sub-TLV, the sub-TLV that its sub-types is SPBM includes the SPBM that length is 24 bits
Virtual process identifications I-SID in stacking network, the sub-TLV that subtype is Trill include the Trill that length is 24 bits and folded
Virtual process identifications FGL Value, the sub-TLV that subtype is VXLAN in screening network include the VXLAN that length is 24 bits
Virtual process identifications VNI in stacking network." instance identification TLV " specific encapsulation format is as shown in fig. 6, IID in the TLV
Value is fixed as 65535, for identifying the IS-IS examples for being specifically applied to notice MAC Address reachability information.
Step 1104, the intermediate node of stacking network receives what fringe node was outwards noticed by special IS-IS examples
" after MAC Address accessibility TLV ", structure belongs to the LSDB of the special IS-IS examples, then will " MAC Address accessibility TLV " biographies
It is handed to other fringe nodes of stacking network.
Intermediate node 5,6 and 7 receives " MAC Address accessibility TLV " and " instance identification of the flooding of fringe node 1,2,3 and 4
After TLV ", structure belongs to the LSDB of IS-IS examples 65535, and the effect of the LSDB is not the LSDB mono- as belonging to IS-IS examples 0
Sample is in order to generate routing table, but in order to which MAC Address reachability information is flooded to fringe node.
Step 1106, other fringe nodes of stacking network receive fringe node by special IS-IS examples to
The carrying virtual process identifications of outer notice " after MAC Address accessibility TLV ", structure belongs to the LSDB of the special IS-IS examples,
And marked according to LSDB structures for the separate purpose C-MAC of different virtual process identifications and the forwarding of stacking network outer layer
Mapping table between knowledge.
After fringe node 1,2,3 and 4 receives the IS-IS LSP messages of other fringe nodes flooding, except with intermediate node
The LSDB for belonging to IS-IS examples 65535 can equally be built, it is also necessary to according to the LSDB build purpose C-MAC and purpose B-MAC it
Between mapping table, the mapping table between purpose C-MAC and egress Nickname, and purpose C-MAC and outer layer purpose IP it
Between mapping table, and for from " extracting in MAC Address accessibility TLV " and be simultaneously stored in the different I-SID in LSDB, difference
FGL Value and different VNI, fringe node can build separate mapping table.
Embodiment described above is only presently preferred embodiments of the present invention, is not intended to limit the scope of the present invention, this
The technical staff in field can deliberately carry out various modifications and variations without departing from the spirit and scope of the present invention to the present invention.This
Sample, if these modifications and variations of the present invention belong within the scope of the claims in the present invention and its equivalent technologies, then this hair
It is bright to be also intended to comprising including these modifications and variations.
Claims (12)
- A kind of 1. method of announcement media access control MAC addresses accessibility, suitable for applying Intermediate System-to-Intermediate System IS- The stacking network of IS control plane agreements, methods described include:The fringe node of the stacking network outwards notices MAC Address accessibility type/length/assignment by an IS-IS examples TLV, the TLV carry virtual process identifications;The intermediate node of the stacking network is built for noticing the MAC after the MAC Address accessibility TLV is received The LSD LSDB of location accessibility TLV IS-IS examples, the MAC Address accessibility TLV is then transferred to institute State other fringe nodes of stacking network;It is real to build the IS-IS after the MAC Address accessibility TLV is received for other fringe nodes of the stacking network The LSDB of example, and control is accessed for the separate purpose client media of the virtual process identifications to build according to the LSDB Mapping table between address C-MAC and stacking network outer layer forwarding mark processed.
- 2. according to the method for claim 1, it is characterised in thatThe IS-IS examples are an IS-IS example of the IS-IS standard instances for being different from notice routing iinformation, wherein example It is non-zero to identify IID values, and all nodes in the stacking network all identify the IS-IS using identical IID Example.
- 3. according to the method for claim 1, it is characterised in thatThe virtual process identifications are back-bone traffic instance identification I-SID, and/or fine grained label value FGLValue, and/or void Intend expansible LAN VXLAN network identities VNI.
- A kind of 4. MAC address accessibility type/length/assignment TLV sending method, suitable for stacking network And the MAC Address accessibility TLV is by Intermediate System-to-Intermediate System IS-IS Link State Protocol Data Unit LSP messages Carry, described sender method includes:The fringe node of stacking network outwards notices MAC Address accessibility TLV by an IS-IS examples;The intermediate node of the stacking network is after the MAC Address accessibility TLV is received, by the MAC Address accessibility TLV Send to other fringe nodes of the stacking network.
- 5. according to the method for claim 4, it is characterised in that the MAC Address accessibility TLV includes:One or more sub- TLV sub-TLV, the sub-TLV are with including the MAC for being applied to a certain stacking network encapsulation technology Location reachability information;The sub-TLV carries the virtual process identifications of corresponding a certain stacking network.
- 6. according to the method for claim 5, it is characterised in thatThe sub-TLV includes the subtype sub-Type for identifying the type of corresponding stacking network.
- 7. according to the method for claim 4, it is characterised in thatThe MAC Address accessibility TLV occurs one or many in same LSP messages.
- 8. a kind of fringe node, the stacking network of Intermediate System-to-Intermediate System IS-IS control plane agreements is suitable for use with, its It is characterised by,The fringe node, for passing through the outside announcement media access control MAC addresses accessibility type/length of an IS-IS examples Degree/assignment TLV, the TLV carries virtual process identifications;Or for after the MAC Address accessibility TLV is received, building the LSD of the IS-IS examples LSDB, and built for the separate purpose client media access control of the virtual process identifications according to the LSDB Mapping table between location C-MAC and stacking network outer layer forwarding mark.
- 9. fringe node according to claim 8, it is characterised in thatThe IS-IS examples are an IS-IS example of the IS-IS standard instances for being different from notice routing iinformation, wherein example It is non-zero to identify IID values, and all nodes in the stacking network all identify the IS-IS using identical IID Example.
- 10. fringe node according to claim 8, it is characterised in thatThe virtual process identifications are back-bone traffic instance identification I-SID, and/or fine grained label value FGLValue, and/or void Intend expansible LAN VXLAN network identities VNI.
- 11. a kind of intermediate node, the stacking network of Intermediate System-to-Intermediate System IS-IS control plane agreements is suitable for use with, Characterized in that,The intermediate node, for from the fringe node of stacking network receive MAC address accessibility type/ After length/assignment TLV, the LSD of the IS-IS examples for noticing the MAC Address accessibility TLV is built LSDB, then the MAC Address accessibility TLV is transferred to other fringe nodes of the stacking network.
- 12. a kind of stacking network, it is characterised in that including the fringe node as described in claim 8 to 10 is any and such as right It is required that the intermediate node described in 11.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310041145.1A CN103973825B (en) | 2013-02-01 | 2013-02-01 | Method, node device and the sending method of MAC Address accessibility are noticed in stacking network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310041145.1A CN103973825B (en) | 2013-02-01 | 2013-02-01 | Method, node device and the sending method of MAC Address accessibility are noticed in stacking network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103973825A CN103973825A (en) | 2014-08-06 |
CN103973825B true CN103973825B (en) | 2017-12-22 |
Family
ID=51242857
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310041145.1A Active CN103973825B (en) | 2013-02-01 | 2013-02-01 | Method, node device and the sending method of MAC Address accessibility are noticed in stacking network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103973825B (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105471693B (en) * | 2014-08-18 | 2019-02-05 | 华为技术有限公司 | A kind of file transmitting method and network node |
US10218604B2 (en) | 2015-01-19 | 2019-02-26 | Hewlett Packard Enterprise Development Lp | Engines to prune overlay network traffic |
CN105337868B (en) * | 2015-12-09 | 2018-03-30 | 上海斐讯数据通信技术有限公司 | A kind of method and device of TRILL network MAC address learning |
CN106941437B (en) | 2016-01-04 | 2020-11-17 | 中兴通讯股份有限公司 | Information transmission method and device |
CN107786451A (en) * | 2016-08-30 | 2018-03-09 | 中兴通讯股份有限公司 | The transmission method and device of a kind of metadata |
CN113037631B (en) * | 2016-10-14 | 2022-07-22 | 华为技术有限公司 | Address transmission method and network equipment |
CN108683580B (en) * | 2018-05-24 | 2020-11-03 | 西安电子科技大学 | Virtual local area network data processing method based on Mac address division |
CN112543136B (en) * | 2019-09-23 | 2023-04-21 | 上海诺基亚贝尔股份有限公司 | Method and device for inhibiting flooding flow in PBB-EVPN core network |
CN115277309B (en) * | 2022-07-26 | 2024-08-27 | 中国电信股份有限公司 | Message forwarding method and device, storage medium and electronic equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102404181A (en) * | 2010-09-08 | 2012-04-04 | 华为技术有限公司 | Address corresponding relationship sending method of layer 2 protocol utilizing link state routing |
CN102577331A (en) * | 2010-05-28 | 2012-07-11 | 华为技术有限公司 | Virtual layer 2 and mechanism to make it scalable |
CN102740329A (en) * | 2011-04-15 | 2012-10-17 | 中兴通讯股份有限公司 | Method and apparatus of parameter distribution, and method and apparatus of parameter configuration |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7746892B2 (en) * | 2005-11-02 | 2010-06-29 | Nortel Networks Limited | Method and apparatus for transporting ethernet services |
-
2013
- 2013-02-01 CN CN201310041145.1A patent/CN103973825B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102577331A (en) * | 2010-05-28 | 2012-07-11 | 华为技术有限公司 | Virtual layer 2 and mechanism to make it scalable |
CN102404181A (en) * | 2010-09-08 | 2012-04-04 | 华为技术有限公司 | Address corresponding relationship sending method of layer 2 protocol utilizing link state routing |
CN102740329A (en) * | 2011-04-15 | 2012-10-17 | 中兴通讯股份有限公司 | Method and apparatus of parameter distribution, and method and apparatus of parameter configuration |
Non-Patent Citations (2)
Title |
---|
Extensions to IS-IS for Layer-2 Systems;A. Banerjee,D. Ward;《Internet Engineering Task Force》;20110430;全文 * |
IS-IS Multi-Instance;S. Previdi, Ed.,L. Ginsberg,A. Roy,D. Ward;《Internet Engineering Task Force》;20121130;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN103973825A (en) | 2014-08-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103973825B (en) | Method, node device and the sending method of MAC Address accessibility are noticed in stacking network | |
CN109218178B (en) | Message processing method and network equipment | |
US8144715B2 (en) | Method and apparatus for interworking VPLS and ethernet networks | |
US10148566B2 (en) | Split-horizon packet forwarding in a multi-home PBB-EVPN network | |
Andersson et al. | Provider provisioned virtual private network (VPN) terminology | |
CN102804693B (en) | For realizing the method and apparatus of L2 VPN on ip networks | |
US8634297B2 (en) | Probing specific customer flow in layer-2 multipath networks | |
US8027347B2 (en) | Border gateway protocol extended community attribute for layer-2 and layer-3 virtual private networks using 802.1ah-based tunnels | |
CN104396192B (en) | Dissymmetric network address encapsulates | |
EP2541841B1 (en) | Method for sending ethernet frames in ethernet tree service and provider edge device | |
CN103269299B (en) | Message forwarding method in SPBM network and device | |
CN107040463A (en) | For avoiding due to the system that the flow that asymmetric MAC is learned floods | |
US20100118882A1 (en) | Method, Apparatus, and System For Packet Transmission | |
ES2654394T3 (en) | Automatic I-SID configuration system and procedure in GMPLS-controlled Ethernet provider trunk bridged networks | |
EP2104896A1 (en) | Border gateway protocol procedures for mpls and layer-2 vpn using ethernet-based tunnels | |
CN103227745B (en) | Shortest path bridge net and layer 3 VLAN interoperability methods and common edge device | |
EP2928133B1 (en) | Method and apparatus for accessing shortest-route bridge network in multi-homed manner | |
CN107070789A (en) | The flow black hole of active active PBB EVPN redundancies is avoided and rapid fusion | |
CN101552727A (en) | Method of transmitting and receiving message and a provider edge router | |
CN104079466B (en) | A kind of message processing method and equipment | |
CN103067278B (en) | A kind of method for transmission processing of Frame, equipment and system | |
WO2012122844A1 (en) | Method and system for domain-based interconnection of transparent interconnection over lots of links network | |
CN104378302B (en) | Address corresponding relation sending method and route bridge device | |
WO2012113251A1 (en) | Trill network interconnection method and system | |
Wu et al. | Research on the application of cross-domain VPN technology based on MPLS BGP |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |