CN103973825B - Method, node device and the sending method of MAC Address accessibility are noticed in stacking network - Google Patents

Method, node device and the sending method of MAC Address accessibility are noticed in stacking network Download PDF

Info

Publication number
CN103973825B
CN103973825B CN201310041145.1A CN201310041145A CN103973825B CN 103973825 B CN103973825 B CN 103973825B CN 201310041145 A CN201310041145 A CN 201310041145A CN 103973825 B CN103973825 B CN 103973825B
Authority
CN
China
Prior art keywords
tlv
mac address
network
stacking network
mac
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310041145.1A
Other languages
Chinese (zh)
Other versions
CN103973825A (en
Inventor
翟洪军
肖敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201310041145.1A priority Critical patent/CN103973825B/en
Publication of CN103973825A publication Critical patent/CN103973825A/en
Application granted granted Critical
Publication of CN103973825B publication Critical patent/CN103973825B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Small-Scale Networks (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention provides method, node device and the sending method that MAC Address accessibility is noticed in a kind of stacking network, and the method for notice MAC Address accessibility includes:The fringe node of stacking network outwards notices MAC Address accessibility TLV, TLV by an IS IS examples and carries virtual process identifications;Intermediate node builds the LSDB of the IS IS examples for noticing MAC Address accessibility TLV, MAC Address accessibility TLV is transferred into other fringe nodes after MAC Address accessibility TLV is received;Other fringe nodes build the LSDB of IS IS examples, and build for the mapping table between the separate purpose C MAC of virtual process identifications and stacking network outer layer forwarding mark according to LSDB after MAC Address accessibility TLV is received." the information that MAC Address accessibility TLV " is carried of the method extension existing standard of the present invention, and on the basis of it need not introduce new ESADI agreements, it is specified that for noticing the processing mode of the IS IS examples of MAC Address accessibility and network node after the IS IS protocol massages for belonging to the IS IS examples are received.

Description

Method, node device and the sending method of MAC Address accessibility are noticed in stacking network
Technical field
The present invention relates to the communications field, more particularly, to the side that MAC Address accessibility is noticed in a kind of stacking network Method, node device and sending method.
Background technology
Ethernet is currently network most commonly used in the mininets such as enterprise network, Campus Networks and data center network Technology, penetrate into extensively among the daily production and living of people.But advised with using the network of ethernet technology network Mould constantly expands, and also displays more and more the drawbacks of traditional ethernet.First, the scalability of traditional ethernet is not It is good.The data message encapsulation format of traditional ethernet is as shown in figure 1, using media access control(Media Access Control, referred to as MAC)Address and virtual local area network tags(Virtual Local Area Network tag, referred to as VLAN-TAG)The VLAN-ID of middle carrying identifies as forwarding, and what MAC Address therein represented is the number for producing the data message According to source(Also commonly referred to as main frame or website, are hereinafter represented with main frame)Packaged MAC Address, VLAN-ID represent be The mark of logical network is divided on physical network, the interface that identical VLAN-ID is configured with network node belongs to identical and patrolled Network is collected, different logical network matches different forward tables in forwarding data packets, mutually isolated.Due to it is above-mentioned tradition with The single layer network characteristic netted very much, on the one hand, the forward table of all-network node is required for preserving the MAC Address bar of main frame in network Mesh, when network size is very big, the relatively low network node of performance will can't bear the heavy load;On the other hand, VLAN-ID in Ether frame Length only has 12 bits, can only at most divide individual logical network more than 4,000, and when network size is very big, the quantity of logical network is just Can not meet the needs of network.Secondly, the link utilization of traditional ethernet is low and network convergence is slow.Traditional ethernet is using life Into tree protocol(Spanning Tree Protocol, referred to as STP)Carry out anti-loops, Spanning-Tree Protocol is possessing protocol realization While simple advantage, the drawbacks of link utilization is low and network convergence is slow is also brought, this is when network size is very big Time, which shows, to be especially apparent.Again, the security of traditional ethernet is relatively low.The single layer network characteristic of traditional ethernet easily triggers The broadcast storm of the whole network, thus in traditional ethernet any one network node all may initiate for whole network attack and Destroy.
In order to overcome a variety of drawbacks when above-mentioned traditional ethernet is applied to large-scale network-estabilishing, International Standards Organization electrically and Electronic Engineering Association(Institute of Electrical and Electronics Engineers, referred to as IEEE) With Internet Engineering Task group(Internet Engineering Task Force, referred to as IETF)Profit is all proposed respectively Use stacking network(Overlay Network)Transmit the solution of Ethernet service.It is so-called to utilize stacking network transmission ether Network service, exactly network is layered, marks a core layer for being referred to as stacking network in the middle diaphyseal portion of network, fold The fringe node of screening network is once encapsulated to the original Ether frame for entering the network, the destination address of data message after encapsulation The remote edge node synchronization of stacking network is pointed to, is then forwarded in stacking network according to the destination address of message after encapsulation, Once decapsulated again after reaching the remote edge node synchronization of stacking network, recover original Ether frame.Transmitted using stacking network Ethernet service, stacking network and the access layer network of periphery can be kept apart, be sealed by introducing one layer of new data surface Be filled with solve traditional ethernet scalability problem, by using different from traditional ethernet use STP protocol newly Chain of command agreement carrys out anti-loops and established to route, to solve the problems, such as that link utilization is low and network convergence is slow, and by upper State new data surface encapsulation come with chain of command agreement together with solve safety issue.
The stacking network solution that IEEE is proposed is referred to as the shortest path bridging of MAC patterns(Shortest Path Bridging-MAC Mode, referred to as SPBM), its technical standard includes what is issued respectively in Augusts, 2008 and in June, 2012 802.1ah provider backbone bridge(Provider Backbone Bridges, referred to as PBB)Standard and 802.1aq shortest paths Footpath bridges(Shortest Path Bridging, referred to as SPB)Standard, the data that the two standards define SPBM respectively are put down Surface technology and control plane technology.The SPBM data-plane technologies of PBB standard 802.1ah defineds are using MAC-in-MAC Encapsulation, specific encapsulation format is as shown in Fig. 2 be wherein packaged with the original Ether frame that main frame is sent(That is customer frame), the visitor of encapsulation Client media accessing to control address is carried in the frame of family(Customer MAC Address, referred to as C-MAC)And customer frame VLAN-TAG, for customer frame when the stacking network is entered, network edge node can encapsulate one layer newly outside customer frame Forwarding mark, i.e. Backbone Media accessing to control address(Backbone MAC Address, referred to as B-MAC)With key virtual office Domain network mark label(Backbone VLAN tag, referred to as B-TAG), B-MAC include 6 bytes purpose B-MAC and 6 bytes source B-MAC, B-TAG include the key VLAN ID of 12 bits(Backbone VLAN Identifier, referred to as B- VID), back-bone traffic example label can be additionally encapsulated between B-TAG and C-MAC(Backbone Service Instance tag, referred to as I-TAG), I-TAG includes the back-bone traffic instance identification of 24 bits(Backbone Service Instance Identifier, referred to as I-SID).The fringe node that PBB is encapsulated in SPBM stacking networks is completed, message encapsulation After the completion of, all nodes in the stacking network including fringe node carry out message according to purpose B-MAC and B-VID and turned Hair, and I-SID has no effect on the forwarding of message only in isolation of the fringe node as different business example.It is superimposed for SPBM The fringe node of network, one or more customer frame VID on an inbound port are mapped to an I-SID, one or more I-SID is mapped to a B-VID, and one or more purpose C-MAC are mapped to a purpose B-MAC, wherein customer frame VID Mapping table between I-SID and between I-SID and B-VID is obtained by manual configuration, and purpose C-MAC and purpose Mapping table between B-MAC is then to learn to obtain by data surface.In addition, the mapping between purpose C-MAC and purpose B-MAC Table is separate based on each I-SID, that is to say, that different I- is directed on the fringe node of SPBM stacking networks The mapping table between different purpose C-MAC and purpose B-MAC be present in SID.The SPBM controls of SPB standard 802.1aq defineds Planar technique is using ISIS-SPB(It is applied to the IS-IS of SPB network)Link-state routing protocol, the agreement are with state Intermediate System-to-Intermediate System as defined in the standard ISO10589 of border(Intermediate System to Intermediate System, referred to as IS-IS)Based on link-state routing protocol, corresponding customization and extension have been carried out for SPBM network.
The stacking network solution that IETF is proposed has many kinds, is carried wherein there is two kinds of main schemes to employ with IEEE The similar control plane technology of the SPBM stacking networks that go out, it is more that both schemes are respectively that IETF Trill working groups define Link transparency interconnects(Transparent Interconnection of Lots of Links, referred to as Trill)Overlay network The virtual expansible LAN that network and IETF Nvo3 working groups define(Virtual eXtensible Local Area Network, referred to as VXLAN)Stacking network.The control surface technology of Trill stacking networks is using ietf standard RFC6326 The ISIS-Trill of defined(It is applied to the IS-IS of Trill networks)Link-state routing protocol, the agreement are marked with the world Based on IS-IS link-state routing protocols as defined in quasi- ISO10589, corresponding customization and expansion have been carried out for Trill networks Exhibition;The control surface technology of VXLAN stacking networks has continued to use existing Routing Protocol in IP network, and one of option is exactly The ISIS-IP of RFC1195 defineds(It is applied to the IS-IS of IP network)Link-state routing protocol, the agreement are with the world Based on IS-IS link-state routing protocols as defined in standard ISO10589, corresponding customization and expansion have been carried out for IP network Exhibition.Different from IEEE propose SPBM stacking networks use PBB datum planes encapsulate, Trill stacking networks using The Trill datum planes encapsulation that RFC6325 and a series of RFC being updated to RFC6325 are defined, specific encapsulation format is such as Shown in Fig. 3, wherein being packaged with the original Ether frame that main frame is sent(That is customer frame), customer frame enter the stacking network when Wait, network edge node can encapsulate one layer of new forwarding mark, i.e. the egress Nickname of 16 bits outside customer frame(It is close Claim)With the ingress Nickname of 16 bits, fine grained label can be additionally encapsulated between C-MAC and customer frame payload (Fine-Grained Label, referred to as FGL), FGL includes the fine grained label value of 24 bits(Fine-Grained Label Value, referred to as FGL Value).The fringe node that Trill is encapsulated in Trill stacking networks is completed, after the completion of message encapsulation, All nodes in stacking network including fringe node carry out message forwarding according to egress Nickname, and FGL Value only in isolation of the fringe node as different business example, has no effect on the forwarding of message.For Trill stacking networks Fringe node, one or more customer frame VID on an inbound port are mapped to a FGL Value, one or more Purpose C-MAC is mapped to an egress Nickname, and the mapping table between wherein customer frame VID and FGL Value is logical Manual configuration acquisition is crossed, and the mapping table between purpose C-MAC and egress Nickname then both can be by data surface Practise and obtaining, can also be noticed and obtained by chain of command.Learn compared to by data surface, the advantage noticed by chain of command is Just mapping table can be built before the actual data traffic of transmission and completed, to avoid the customer frame received due to fringe node Purpose C-MAC mapping table entries lack and caused by all egress multicasts consequence.In order to notice purpose by chain of command Mapping table between C-MAC and egress Nickname, RFC6165 defines one, and referred to as " MAC Address accessibility TLV's " is new IS-IS TLV(Type/Length/Value, type/length/assignment), specific encapsulation format as shown in figure 4, the TLV by IS-IS Link State Protocol Data Unit(Link State PDU, referred to as LSP)Message carries, and can be in same LSP Occur in message multiple.IETF Trill Working Group Drafts draft-ietf-trill-esadi-01 defines Trill superpositions The point of termination station address distribution information used in network(End Station Address Distribution Information, referred to as ESADI)Although agreement, ESADI agreements make use of " the MAC Address accessibility that RFC6165 is defined TLV " notices the mapping table between purpose C-MAC and egress Nickname, but due to consideration that this reflects in stacking network The change of firing table may very frequently, if directly in the ISIS-Trill protocol massages encapsulated independent of Trill data surfaces If carrying this TLV, frequently restraining again for Trill stacking networks can be triggered, the unstable of network is brought, so just providing this TLV is not carried directly in ISIS-Trill protocol massages, but in the ESADI encapsulated using Trill data surfaces newly defined Carried in protocol massages.In addition, the mapping table between purpose C-MAC and egress Nickname is to be based on each FGL Value It is separate, that is to say, that to exist on the fringe node of Trill stacking networks for different FGL Value different Mapping table between purpose C-MAC and egress Nickname.Both it had been different from the PBB that the SPBM stacking networks that IEEE is proposed use Datum plane encapsulates, the Trill datum planes encapsulation used also different from the IETF Trill stacking networks proposed, VXLAN superpositions The VXLAN datum planes that network defines using ietf draft draft-mahalingam-dutt-dcops-vxlan-02 seal Dress, specific encapsulation format is as shown in figure 5, be wherein packaged with the original Ether frame that main frame is sent(That is customer frame), customer frame entering When entering the stacking network, network edge node can encapsulate one layer of new forwarding outside customer frame and identify, i.e. outside 4 bytes The outer layer purpose IP address of layer source IP address and 4 bytes, can additionally encapsulate VXLAN between outer layer UDP heads and C-MAC Head(header), VXLAN heads include the VXLAN network identities of 24 bits(VXLAN Network Identifier, referred to as For VNI).The fringe node that VXLAN is encapsulated in VXLAN stacking networks is completed, after the completion of message encapsulation, including fringe node Stacking network in all nodes message forwarding is carried out according to outer layer purpose IP, and VNI is only in fringe node as different The isolation of VXLAN virtual networks, have no effect on the forwarding of message.For the fringe node of VXLAN stacking networks, an inbound port On one or more customer frame VID be mapped to a VNI, one or more purpose C-MAC are mapped to an outer layer mesh IP, the wherein mapping table between customer frame VID and VNI is obtained by manual configuration, and purpose C-MAC and outer layer purpose Mapping table between IP then learns to obtain by data surface.In addition, the mapping table between purpose C-MAC and outer layer purpose IP is base Separate in each VNI, that is to say, that difference be present for different VNI on the fringe node of VXLAN stacking networks Purpose C-MAC and outer layer purpose IP between mapping table.
The RFC6822 that IETF IS-IS working groups issue in December, 2012 defines a kind of referred to as more examples of IS-IS (IS-IS Multiple Instances)Technology, the technology allow one run IS-IS control plane agreements network Internal to enable multiple IS-IS examples simultaneously, each IS-IS examples are separate, do not interfere with each other, the letter being respectively completed in this example Notice task is ceased, and individually belongs to the link shape of this example according to this example advertised information structure received on the network node State database(Link State Database, referred to as LSDB).Mentioned in RFC6822, how real why formulate IS-IS Example technology, exactly in order to allow IS-IS control planes agreement to transmit some non-routes while routing iinformation is transmitted Information(Such as the information that some applications are related), and it is desirable that transmitting for these non-routing iinformations will not receive for the route of network Hold back and have an impact.In order to distinguish different IS-IS examples in the more case technologies of application IS-IS, RFC6822 defines example mark Know(Instance Identifier, referred to as IID)TLV, specific encapsulation format as shown in fig. 6, the TLV include it is one long Spend for the IID of 2 bytes(Span 0 ~ 65535), IID#0 is not support the old network of the more examples of IS-IS to set as compatibility The reservation instance identification that standby standard instance uses, when IID is non-zero value, if the IS-IS examples that this IID is represented are supported The more topologies of IS-IS defined in RFC5120(IS-IS Multiple Topology), then the TLV can also include this example The one or more topological ID supported.
By above-mentioned three kinds existing stacking network technology SPBM, Trill and VXLAN explanation can be seen that this three Kind technology all encapsulates the virtual process identifications that functional mechanism identical length is 24 bits in datum plane(In SPBM technologies The VNI in FGL Value and VXLAN technologies in I-SID, Trill technology), functional mechanism phase is all employed in control plane Same IS-IS control plane agreements(ISIS-Trill the and VXLAN technologies in ISIS-SPB, Trill technology in SPBM technologies In ISIS-IP).Wherein SPBM technologies and VXLAN technologies lack is noticed outside purpose C-MAC and stacking network by control plane Mapping table between layer forwarding mark(Alternatively referred to as notice MAC Address accessibility)Method, although Trill technologies define ESADI agreements, using RFC6165 define " MAC Address accessibility TLV " notices this mapping table, but still has two and lack Fall into, first, the information that the TLV is carried is not enough to structure for different FGL Value and separate purpose C-MAC with going out Mapping table between node Nickname;Second, ESADI agreements are in order to evade using Intermediate System to Intermediate System message to carry " MAC Address The frequent oscillation problem of network that accessibility TLV " may trigger, define the new ESADI using the encapsulation of Trill data surfaces and assist Message is discussed to carry the TLV, but this causes Trill network edge nodes to support Intermediate System to Intermediate System and ESADI agreements simultaneously again, Implement complex, and can not directly apply to dependent on the ESADI agreements of Trill data surfaces encapsulation and equally use IS- Other stacking network technologies of IS control plane agreements(Such as SPBM technologies and VXLAN technologies)In.
The content of the invention
In order to solve techniques discussed above defect, the present invention, which provides, notices MAC Address accessibility in a kind of stacking network Method, node device and sending method, extension existing standard " MAC Address accessibility TLV " carry information, and It need not introduce on the basis of new ESADI agreements, it is specified that for noticing special the IS-IS examples and net of MAC Address accessibility Processing mode of the network node after the Intermediate System to Intermediate System message for belonging to the special IS-IS examples is received, this method can be applied simultaneously In a variety of stacking network technologies for equally using IS-IS control plane agreements.
To achieve the above object, the present invention takes following technical scheme:
A kind of announcement media access control(MAC)The method of address reachability, it is to centre suitable for application intermediate system System(IS-IS)The stacking network of control plane agreement, this method include:
The fringe node of stacking network outwards notices MAC Address accessibility type/length/assignment by an IS-IS examples (TLV), TLV carries virtual process identifications;
The intermediate node of stacking network is built for noticing MAC Address accessibility after MAC Address accessibility TLV is received The LSD of TLV IS-IS examples(LSDB), MAC Address accessibility TLV is then transferred to its of stacking network Its fringe node;
Other fringe nodes of stacking network build the LSDB of IS-IS examples after MAC Address accessibility TLV is received, And built according to LSDB for the separate purpose client media accessing to control address of virtual process identifications(C-MAC)With folding Mapping table between screening network outer layer forwarding mark.
Preferably, IS-IS examples are an IS-IS examples of the IS-IS standard instances for being different from notice routing iinformation, its Middle instance identification(IID)Value is non-zero, and all nodes in stacking network all identify IS-IS using identical IID Example.
Preferably, virtual process identifications are back-bone traffic instance identification(I-SID), and/or fine grained label value(FGL Value), and/or virtual expansible LAN(VXLAN)Network identity(VNI).
A kind of media access control(MAC)Address reachability type/length/assignment(TLV)Sending method, suitable for folded Screening network and MAC Address accessibility TLV is by Intermediate System-to-Intermediate System(IS-IS)Link State Protocol Data Unit (LSP)Message carries, and the sending method includes:
The fringe node of stacking network outwards notices MAC Address accessibility TLV by an IS-IS examples;
The intermediate node of stacking network sends MAC Address accessibility TLV to folded after MAC Address accessibility TLV is received Other fringe nodes of screening network.
Preferably, MAC Address accessibility TLV includes:
One or more sub- TLV(sub-TLV), sub-TLV is with including the MAC for being applied to a certain stacking network encapsulation technology Location reachability information;
Sub-TLV carries the virtual process identifications of corresponding a certain stacking network.
Preferably, sub-TLV includes identifying the subtype of the type of corresponding stacking network(sub-Type).
Preferably, MAC Address accessibility TLV occurs one or many in same LSP messages.
A kind of fringe node, is suitable for use with Intermediate System-to-Intermediate System(IS-IS)The overlay network of control plane agreement Network,
Fringe node, for passing through the outside announcement media access control of an IS-IS examples(MAC)Address reachability type/ Length/assignment(TLV), TLV carries virtual process identifications;
Or for after MAC Address accessibility TLV is received, building the LSD of IS-IS examples (LSDB), and built according to LSDB for the separate purpose client media accessing to control address of virtual process identifications(C- MAC)With the mapping table between stacking network outer layer forwarding mark.
Preferably, IS-IS examples are an IS-IS examples of the IS-IS standard instances for being different from notice routing iinformation, its Middle instance identification(IID)Value is non-zero, and all nodes in stacking network all identify IS-IS using identical IID Example.
Preferably, virtual process identifications are back-bone traffic instance identification(I-SID), and/or fine grained label value(FGL Value), and/or virtual expansible LAN(VXLAN)Network identity(VNI).
A kind of intermediate node, is suitable for use with Intermediate System-to-Intermediate System(IS-IS)The overlay network of control plane agreement Network,
Intermediate node, for receiving media access control from the fringe node of stacking network(MAC)Address reachability class Type/length/assignment(TLV)Afterwards, the LSD of the IS-IS examples for noticing MAC Address accessibility TLV is built (LSDB), then MAC Address accessibility TLV is transferred to other fringe nodes of stacking network.
A kind of stacking network, including above-mentioned fringe node and intermediate node.
For the present invention due to taking techniques discussed above scheme, it includes advantages below:Be easily achieved and with existing row Industry standard is compatible.
Brief description of the drawings
Accompanying drawing described herein is used for providing a further understanding of the present invention, forms the part of the application, the present invention Exemplary embodiment and its illustrate be used for explain the present invention, be not construed as limiting the invention;In the accompanying drawings:
Fig. 1 is the traditional ethernet data message encapsulation format figure of prior art;
Fig. 2 is the SPBM datum plane encapsulation format figures of prior art;
Fig. 3 is the Trill datum plane encapsulation format figures of prior art;
Fig. 4 is the MAC Address accessibility TLV encapsulation format figures of prior art;
Fig. 5 is the VXLAN datum plane encapsulation format figures of prior art;
Fig. 6 is the instance identification TLV encapsulation format figures of prior art;
Fig. 7 is the flow chart for the method that MAC Address accessibility is noticed in the stacking network of one embodiment of the present of invention;
Fig. 8 is the MAC Address accessibility TLV encapsulation format figures according to the present invention;
Fig. 9 is the stacking network schematic diagram that SPBM is only supported in application example one of the present invention;
Figure 10 is the MAC Address accessibility TLV encapsulation format figures used in application example one of the present invention;
Figure 11 is the stacking network schematic diagram for supporting SPBM, Trill and VXLAN in application example two of the present invention simultaneously;With And
Figure 12 is the MAC Address accessibility TLV encapsulation format figures used in application example two of the present invention.
Embodiment
In order that technical scheme is more clearly understood, the present invention is done with specific embodiment below in conjunction with the accompanying drawings It is further elaborated on.It should be noted that in the case where not conflicting, it is various in the embodiment and embodiment in the application Mode can be mutually combined.
In the stacking network for applying IS-IS control plane agreements, defined by extending ietf standard RFC6165 " MAC Address accessibility TLV " carry information, and regulation be used for notice MAC Address accessibility special IS-IS examples and Processing mode of the network node after the Intermediate System to Intermediate System message for belonging to the special IS-IS examples is received, there is provided one kind does not increase The required protocol type supported of network, it can be applied to support the network of a variety of stacking network technologies simultaneously, be easily achieved and with showing There is the method that MAC Address accessibility is noticed in the compatible stacking network of professional standard.
Fig. 7 is the flow chart for the method that MAC Address accessibility is noticed in the stacking network of one embodiment of the present of invention, such as Shown in Fig. 7, this method may comprise steps of:
Step 702, the fringe node of stacking network outwards noticed by an IS-IS examples " MAC Address accessibility TLV ", The TLV carries virtual process identifications.
Invention provides for new " MAC Address accessibility TLV ", the specific encapsulation that a kind of IS-IS LSP messages carry Form is as shown in figure 8, include one or more sub- TLV in the TLV(sub-TLV), correspondingly one kind uses subclass to each sub-TLV Type(sub-Type)The stacking network technology being identified, and because purpose C-MAC and the forwarding of stacking network outer layer are identified(Such as The outer layer purpose IP in egress Nickname and VXLAN technology in purpose B-MAC, Trill technology in SPBM technologies)It Between mapping table be to be directed to different virtual process identifications(Such as the FGL in I-SID, Trill technology in SPBM technologies VNI in Value and VXLAN technologies)It is separate, so being carried in each sub-TLV to should stacking network technology Length be 24 bits virtual process identifications.Present invention provide that new " MAC Address accessibility TLV " can be same Occur in LSP messages one or many.
In order to evade, using Intermediate System to Intermediate System message, to carry, " network that MAC Address accessibility TLV " may trigger is frequent Oscillation problem, and using protocol complexity caused by the ESADI agreements defined in Trill stacking networks and can not be applied to Other stacking networks(Such as SPBM network and VXLAN networks)The problem of middle, the present invention are proposed using ietf standard RFC6822 The more case technologies of IS-IS, outwards notice that " MAC Address accessibility TLV ", referred herein is special by special IS-IS examples The IS-IS examples of door are an IS-IS standard instances for being different from notice routing iinformation(IID#0)Another IS-IS example (IID values are non-zero, such as value 65535), and all to identify this using identical IID special for all nodes in stacking network IS-IS examples.Regulation according to RFC6822 to the more case technologies of the IS-IS, " MAC that stacking network fringe node is outwards noticed Address reachability TLV " always with carry the special IS-IS examples IID instance identification TLV simultaneously be present in it is same In LSP messages.
Step 704, the intermediate node of stacking network is receiving what fringe node was outwards noticed by special IS-IS examples " after MAC Address accessibility TLV ", structure belongs to the LSDB of the special IS-IS examples, then will " MAC Address accessibility TLV " biographies It is handed to other fringe nodes of stacking network.
Because the intermediate node of stacking network need not be built between purpose C-MAC and stacking network outer layer forwarding mark Mapping table, so they " simply serve information to pass dedicated for notice in MAC Address accessibility TLV " IS-IS examples The effect passed, the mechanism for the transmission information that they are used are exactly the IS-IS floodings standardized(Flooding)Mechanism, and pass through Structure belongs to the LSDB of the special IS-IS examples, and the IS-IS LSDB synchronizations of standardization and update mechanism ensure information The reliability of transmission.
Step 706, other fringe nodes of stacking network are to receive fringe node outside by special IS-IS examples The carrying virtual process identifications of notice " after MAC Address accessibility TLV ", structure belongs to the LSDB of the special IS-IS examples, and Identified according to LSDB structures for the separate purpose C-MAC of different virtual process identifications and the forwarding of stacking network outer layer Between mapping table.
Belong to except that can be built as the intermediate node of stacking network dedicated for noticing " MAC Address accessibility TLV " IS-IS examples LSDB, the fringe node of stacking network also need to according to the LSDB build purpose C-MAC with outside stacking network Mapping table between layer forwarding mark, and can be according to from " extracting in MAC Address accessibility TLV " and be simultaneously stored in LSDB not Same virtual process identifications build separate mapping table.
The present invention is further described below by way of two application examples.
Application example one
In this application example, stacking network is a stacking network for only supporting SPBM.
Fig. 9 is the stacking network schematic diagram that SPBM is only supported in application example one of the present invention, with reference to shown in Fig. 7 and Fig. 9, this Each network node notice of application example and processing procedure mainly comprise the following steps:
Step 902, the fringe node of SPBM stacking network is only supported to pass through special IS-IS examples(IID values 65535)Outwards " MAC Address accessibility TLV ", the TLV carry the I-SID that length is 24 bits for notice.
In the IS-IS LSP messages that fringe node 1,2,3 and 4 outwards floods at the same carry " MAC Address accessibility TLV " and " instance identification TLV "." MAC Address accessibility TLV " specific encapsulation format is as shown in Figure 10, because the stacking network is one SPBM stacking network is only supported, so " MAC Address accessibility TLV ", should only comprising the sub-TLV that a subtype is SPBM Sub-TLV includes length as the virtual process identifications I-SID in the SPBM stacking networks of 24 bits." instance identification TLV " tool Body encapsulation format is specifically applied to notice MAC Address as shown in fig. 6, the IID values in the TLV are fixed as 65535 for identifying The IS-IS examples of reachability information.
Step 904, the intermediate node of stacking network is receiving what fringe node was outwards noticed by special IS-IS examples " after MAC Address accessibility TLV ", structure belongs to the LSDB of the special IS-IS examples, then will " MAC Address accessibility TLV " biographies It is handed to other fringe nodes of stacking network.
Intermediate node 5,6 and 7 receives " MAC Address accessibility TLV " and " instance identification of the flooding of fringe node 1,2,3 and 4 After TLV ", structure belongs to the LSDB of IS-IS examples 65535, and the effect of the LSDB is not the LSDB mono- as belonging to IS-IS examples 0 Sample is in order to generate routing table, but in order to which MAC Address reachability information is flooded to fringe node.
Step 906, other fringe nodes of stacking network pass through special IS-IS examples receiving other fringe nodes The carrying I-SID's outwards noticed " after MAC Address accessibility TLV ", builds the LSDB for belonging to the special IS-IS examples, and root According to LSDB structures for the mapping table between separate different I-SID purpose C-MAC and purpose B-MAC.
After fringe node 1,2,3 and 4 receives the IS-IS LSP messages of other fringe nodes flooding, except with intermediate node The LSDB for belonging to IS-IS examples 65535 can equally be built, it is also necessary to according to the LSDB build purpose C-MAC and purpose B-MAC it Between mapping table, and for from " extracting in MAC Address accessibility TLV " and be simultaneously stored in the different I-SID in LSDB, edge Node can build separate mapping table.
Application example two
In this application example, stacking network is one while supports SPBM, Trill and VXLAN stacking network.
Figure 11 is the stacking network schematic diagram that application example two of the present invention supports SPBM, Trill and VXLAN simultaneously, with reference to Shown in Fig. 7 and Figure 11, each network node notice of this application example and processing procedure mainly comprise the following steps:
Step 1102, while the fringe node of SPBM, Trill and VXLAN stacking network is supported to pass through special IS-IS Example(IID values 65535)Outwards " MAC Address accessibility TLV ", the TLV carry the I- that length is 24 bits simultaneously for notice The VNI that SID, length are the FGL Value of 24 bits and length is 24 bits.
In the IS-IS LSP messages that fringe node 1,2,3 and 4 outwards floods at the same carry " MAC Address accessibility TLV " and " instance identification TLV "." MAC Address accessibility TLV " specific encapsulation format is as shown in figure 12, because the stacking network is one SPBM, Trill and VXLAN stacking network are supported simultaneously, so " MAC Address accessibility TLV " includes three subtypes and distinguished For SPBM, Trill and VXLAN sub-TLV, the sub-TLV that its sub-types is SPBM includes the SPBM that length is 24 bits Virtual process identifications I-SID in stacking network, the sub-TLV that subtype is Trill include the Trill that length is 24 bits and folded Virtual process identifications FGL Value, the sub-TLV that subtype is VXLAN in screening network include the VXLAN that length is 24 bits Virtual process identifications VNI in stacking network." instance identification TLV " specific encapsulation format is as shown in fig. 6, IID in the TLV Value is fixed as 65535, for identifying the IS-IS examples for being specifically applied to notice MAC Address reachability information.
Step 1104, the intermediate node of stacking network receives what fringe node was outwards noticed by special IS-IS examples " after MAC Address accessibility TLV ", structure belongs to the LSDB of the special IS-IS examples, then will " MAC Address accessibility TLV " biographies It is handed to other fringe nodes of stacking network.
Intermediate node 5,6 and 7 receives " MAC Address accessibility TLV " and " instance identification of the flooding of fringe node 1,2,3 and 4 After TLV ", structure belongs to the LSDB of IS-IS examples 65535, and the effect of the LSDB is not the LSDB mono- as belonging to IS-IS examples 0 Sample is in order to generate routing table, but in order to which MAC Address reachability information is flooded to fringe node.
Step 1106, other fringe nodes of stacking network receive fringe node by special IS-IS examples to The carrying virtual process identifications of outer notice " after MAC Address accessibility TLV ", structure belongs to the LSDB of the special IS-IS examples, And marked according to LSDB structures for the separate purpose C-MAC of different virtual process identifications and the forwarding of stacking network outer layer Mapping table between knowledge.
After fringe node 1,2,3 and 4 receives the IS-IS LSP messages of other fringe nodes flooding, except with intermediate node The LSDB for belonging to IS-IS examples 65535 can equally be built, it is also necessary to according to the LSDB build purpose C-MAC and purpose B-MAC it Between mapping table, the mapping table between purpose C-MAC and egress Nickname, and purpose C-MAC and outer layer purpose IP it Between mapping table, and for from " extracting in MAC Address accessibility TLV " and be simultaneously stored in the different I-SID in LSDB, difference FGL Value and different VNI, fringe node can build separate mapping table.
Embodiment described above is only presently preferred embodiments of the present invention, is not intended to limit the scope of the present invention, this The technical staff in field can deliberately carry out various modifications and variations without departing from the spirit and scope of the present invention to the present invention.This Sample, if these modifications and variations of the present invention belong within the scope of the claims in the present invention and its equivalent technologies, then this hair It is bright to be also intended to comprising including these modifications and variations.

Claims (12)

  1. A kind of 1. method of announcement media access control MAC addresses accessibility, suitable for applying Intermediate System-to-Intermediate System IS- The stacking network of IS control plane agreements, methods described include:
    The fringe node of the stacking network outwards notices MAC Address accessibility type/length/assignment by an IS-IS examples TLV, the TLV carry virtual process identifications;
    The intermediate node of the stacking network is built for noticing the MAC after the MAC Address accessibility TLV is received The LSD LSDB of location accessibility TLV IS-IS examples, the MAC Address accessibility TLV is then transferred to institute State other fringe nodes of stacking network;
    It is real to build the IS-IS after the MAC Address accessibility TLV is received for other fringe nodes of the stacking network The LSDB of example, and control is accessed for the separate purpose client media of the virtual process identifications to build according to the LSDB Mapping table between address C-MAC and stacking network outer layer forwarding mark processed.
  2. 2. according to the method for claim 1, it is characterised in that
    The IS-IS examples are an IS-IS example of the IS-IS standard instances for being different from notice routing iinformation, wherein example It is non-zero to identify IID values, and all nodes in the stacking network all identify the IS-IS using identical IID Example.
  3. 3. according to the method for claim 1, it is characterised in that
    The virtual process identifications are back-bone traffic instance identification I-SID, and/or fine grained label value FGLValue, and/or void Intend expansible LAN VXLAN network identities VNI.
  4. A kind of 4. MAC address accessibility type/length/assignment TLV sending method, suitable for stacking network And the MAC Address accessibility TLV is by Intermediate System-to-Intermediate System IS-IS Link State Protocol Data Unit LSP messages Carry, described sender method includes:
    The fringe node of stacking network outwards notices MAC Address accessibility TLV by an IS-IS examples;
    The intermediate node of the stacking network is after the MAC Address accessibility TLV is received, by the MAC Address accessibility TLV Send to other fringe nodes of the stacking network.
  5. 5. according to the method for claim 4, it is characterised in that the MAC Address accessibility TLV includes:
    One or more sub- TLV sub-TLV, the sub-TLV are with including the MAC for being applied to a certain stacking network encapsulation technology Location reachability information;
    The sub-TLV carries the virtual process identifications of corresponding a certain stacking network.
  6. 6. according to the method for claim 5, it is characterised in that
    The sub-TLV includes the subtype sub-Type for identifying the type of corresponding stacking network.
  7. 7. according to the method for claim 4, it is characterised in that
    The MAC Address accessibility TLV occurs one or many in same LSP messages.
  8. 8. a kind of fringe node, the stacking network of Intermediate System-to-Intermediate System IS-IS control plane agreements is suitable for use with, its It is characterised by,
    The fringe node, for passing through the outside announcement media access control MAC addresses accessibility type/length of an IS-IS examples Degree/assignment TLV, the TLV carries virtual process identifications;
    Or for after the MAC Address accessibility TLV is received, building the LSD of the IS-IS examples LSDB, and built for the separate purpose client media access control of the virtual process identifications according to the LSDB Mapping table between location C-MAC and stacking network outer layer forwarding mark.
  9. 9. fringe node according to claim 8, it is characterised in that
    The IS-IS examples are an IS-IS example of the IS-IS standard instances for being different from notice routing iinformation, wherein example It is non-zero to identify IID values, and all nodes in the stacking network all identify the IS-IS using identical IID Example.
  10. 10. fringe node according to claim 8, it is characterised in that
    The virtual process identifications are back-bone traffic instance identification I-SID, and/or fine grained label value FGLValue, and/or void Intend expansible LAN VXLAN network identities VNI.
  11. 11. a kind of intermediate node, the stacking network of Intermediate System-to-Intermediate System IS-IS control plane agreements is suitable for use with, Characterized in that,
    The intermediate node, for from the fringe node of stacking network receive MAC address accessibility type/ After length/assignment TLV, the LSD of the IS-IS examples for noticing the MAC Address accessibility TLV is built LSDB, then the MAC Address accessibility TLV is transferred to other fringe nodes of the stacking network.
  12. 12. a kind of stacking network, it is characterised in that including the fringe node as described in claim 8 to 10 is any and such as right It is required that the intermediate node described in 11.
CN201310041145.1A 2013-02-01 2013-02-01 Method, node device and the sending method of MAC Address accessibility are noticed in stacking network Active CN103973825B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310041145.1A CN103973825B (en) 2013-02-01 2013-02-01 Method, node device and the sending method of MAC Address accessibility are noticed in stacking network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310041145.1A CN103973825B (en) 2013-02-01 2013-02-01 Method, node device and the sending method of MAC Address accessibility are noticed in stacking network

Publications (2)

Publication Number Publication Date
CN103973825A CN103973825A (en) 2014-08-06
CN103973825B true CN103973825B (en) 2017-12-22

Family

ID=51242857

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310041145.1A Active CN103973825B (en) 2013-02-01 2013-02-01 Method, node device and the sending method of MAC Address accessibility are noticed in stacking network

Country Status (1)

Country Link
CN (1) CN103973825B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105471693B (en) * 2014-08-18 2019-02-05 华为技术有限公司 A kind of file transmitting method and network node
US10218604B2 (en) 2015-01-19 2019-02-26 Hewlett Packard Enterprise Development Lp Engines to prune overlay network traffic
CN105337868B (en) * 2015-12-09 2018-03-30 上海斐讯数据通信技术有限公司 A kind of method and device of TRILL network MAC address learning
CN106941437B (en) 2016-01-04 2020-11-17 中兴通讯股份有限公司 Information transmission method and device
CN107786451A (en) * 2016-08-30 2018-03-09 中兴通讯股份有限公司 The transmission method and device of a kind of metadata
CN113037631B (en) * 2016-10-14 2022-07-22 华为技术有限公司 Address transmission method and network equipment
CN108683580B (en) * 2018-05-24 2020-11-03 西安电子科技大学 Virtual local area network data processing method based on Mac address division
CN112543136B (en) * 2019-09-23 2023-04-21 上海诺基亚贝尔股份有限公司 Method and device for inhibiting flooding flow in PBB-EVPN core network
CN115277309B (en) * 2022-07-26 2024-08-27 中国电信股份有限公司 Message forwarding method and device, storage medium and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102404181A (en) * 2010-09-08 2012-04-04 华为技术有限公司 Address corresponding relationship sending method of layer 2 protocol utilizing link state routing
CN102577331A (en) * 2010-05-28 2012-07-11 华为技术有限公司 Virtual layer 2 and mechanism to make it scalable
CN102740329A (en) * 2011-04-15 2012-10-17 中兴通讯股份有限公司 Method and apparatus of parameter distribution, and method and apparatus of parameter configuration

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7746892B2 (en) * 2005-11-02 2010-06-29 Nortel Networks Limited Method and apparatus for transporting ethernet services

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102577331A (en) * 2010-05-28 2012-07-11 华为技术有限公司 Virtual layer 2 and mechanism to make it scalable
CN102404181A (en) * 2010-09-08 2012-04-04 华为技术有限公司 Address corresponding relationship sending method of layer 2 protocol utilizing link state routing
CN102740329A (en) * 2011-04-15 2012-10-17 中兴通讯股份有限公司 Method and apparatus of parameter distribution, and method and apparatus of parameter configuration

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Extensions to IS-IS for Layer-2 Systems;A. Banerjee,D. Ward;《Internet Engineering Task Force》;20110430;全文 *
IS-IS Multi-Instance;S. Previdi, Ed.,L. Ginsberg,A. Roy,D. Ward;《Internet Engineering Task Force》;20121130;全文 *

Also Published As

Publication number Publication date
CN103973825A (en) 2014-08-06

Similar Documents

Publication Publication Date Title
CN103973825B (en) Method, node device and the sending method of MAC Address accessibility are noticed in stacking network
CN109218178B (en) Message processing method and network equipment
US8144715B2 (en) Method and apparatus for interworking VPLS and ethernet networks
US10148566B2 (en) Split-horizon packet forwarding in a multi-home PBB-EVPN network
Andersson et al. Provider provisioned virtual private network (VPN) terminology
CN102804693B (en) For realizing the method and apparatus of L2 VPN on ip networks
US8634297B2 (en) Probing specific customer flow in layer-2 multipath networks
US8027347B2 (en) Border gateway protocol extended community attribute for layer-2 and layer-3 virtual private networks using 802.1ah-based tunnels
CN104396192B (en) Dissymmetric network address encapsulates
EP2541841B1 (en) Method for sending ethernet frames in ethernet tree service and provider edge device
CN103269299B (en) Message forwarding method in SPBM network and device
CN107040463A (en) For avoiding due to the system that the flow that asymmetric MAC is learned floods
US20100118882A1 (en) Method, Apparatus, and System For Packet Transmission
ES2654394T3 (en) Automatic I-SID configuration system and procedure in GMPLS-controlled Ethernet provider trunk bridged networks
EP2104896A1 (en) Border gateway protocol procedures for mpls and layer-2 vpn using ethernet-based tunnels
CN103227745B (en) Shortest path bridge net and layer 3 VLAN interoperability methods and common edge device
EP2928133B1 (en) Method and apparatus for accessing shortest-route bridge network in multi-homed manner
CN107070789A (en) The flow black hole of active active PBB EVPN redundancies is avoided and rapid fusion
CN101552727A (en) Method of transmitting and receiving message and a provider edge router
CN104079466B (en) A kind of message processing method and equipment
CN103067278B (en) A kind of method for transmission processing of Frame, equipment and system
WO2012122844A1 (en) Method and system for domain-based interconnection of transparent interconnection over lots of links network
CN104378302B (en) Address corresponding relation sending method and route bridge device
WO2012113251A1 (en) Trill network interconnection method and system
Wu et al. Research on the application of cross-domain VPN technology based on MPLS BGP

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant