CN1300985C - Method for processing extra-long message in two-layer virtual special-purpose network - Google Patents

Method for processing extra-long message in two-layer virtual special-purpose network Download PDF

Info

Publication number
CN1300985C
CN1300985C CNB031091385A CN03109138A CN1300985C CN 1300985 C CN1300985 C CN 1300985C CN B031091385 A CNB031091385 A CN B031091385A CN 03109138 A CN03109138 A CN 03109138A CN 1300985 C CN1300985 C CN 1300985C
Authority
CN
China
Prior art keywords
message
length
tunnel
equipment
feedback information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB031091385A
Other languages
Chinese (zh)
Other versions
CN1536832A (en
Inventor
欧阳光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB031091385A priority Critical patent/CN1300985C/en
Publication of CN1536832A publication Critical patent/CN1536832A/en
Application granted granted Critical
Publication of CN1300985C publication Critical patent/CN1300985C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Communication Control (AREA)

Abstract

The present invention discloses a method for solving the maximum transmission unit byte number of a link in a two-layer virtual private network, which comprises that an ICMP protocol is added to a PE device, and the ICMP protocol can issue an error report for the network. When the length of a message sent by a user exceeds 1522 bytes, the ICMP protocol can automatically generate an error report of an unreachable destination, and sends the maximum byte number of the message which can be sent to a host computer of the user in a feedback mode, so that the user can resend a message with a proper length according to the feedback information. By using the method, the size of messages sent by the computer of the user can be limited, that messages the length of which exceeds 1522 bytes appear is prevented from headstream, and that the messages can not be discarded can be effectively ensured.

Description

In two-layer virtual private network, handle the overlength method of message
Invention field
The present invention relates generally to network transmission technology, particularly a kind of method that solves link maximum transmission unit byte number restricted problem in the two-layer virtual private network.
Background technology
In L2VPN (two-layer virtual private network), when user's message passes through the tunnel, it must be encapsulated in new link layer frame head and the tunnel bearing protocol layer, for example, must install two-layer MPLS tag head additional based on the tunnel of MPLS (multiprotocol label switching) agreement.If the link of the link of user side and tunnel side all is based upon on the Ethernet, ethernet user's message is after installing the tunnel protocol head additional like this, maximum frame length will be considerably beyond maximum frame length 1522 bytes of Ethernet protocol, but, handles two-layer protocol because can not carrying out burst to message, so under situation without any measure, the generally all serviced merchant's edge device of this overlength message (is meant the tunnel edge device herein, be designated hereinafter simply as PE equipment) or service provider's equipment (be meant the tunnel intermediate equipment herein, be designated hereinafter simply as P equipment) abandon.Below in conjunction with accompanying drawing this problem is elaborated.
Fig. 1 is a L2VPN typical case networking schematic diagram.As shown in Figure 1, local vlan (VLAN) 8 links to each other with the vlan 12 of far-end by the L2VPN tunnel, and the message that mails to vlan 12 like this from vlan 8 all needs to install tunnel bearing protocol head additional through PE1, just can send in the tunnel then and go.Because in this process, PE1 can not be what agreement of encapsulation inside perception user's the two layer message on earth generally, handles so L2VPN can not carry out burst.L2VPN agreement regulation: surpass MTU (byte number of the link maximum transmission unit) value in tunnel if user's message length adds the length of tunnel encapsulation head, PE equipment cannot be handled by burst, but simply it is abandoned.
But this processing exists very big defective, and in order more clearly to say something, we suppose that the tunnel is based upon on the mpls protocol.Fig. 2 is based on the L2VPN tunnel encapsulation message schematic diagram of mpls protocol.As shown in Figure 2, the original user message can increase the individual byte of 22 or 26 (having under the situation of Vlan tag) after installing the tunnel protocol head additional generally speaking, like this, the message length maximum that enters the MPLS tunnel can arrive the 1522+26=1548 byte, it has substantially exceeded the MTU value 1522 that Ethernet allows, because not allowing to carry out burst, the L2VPN agreement handles, so stipulate that according to Ethernet protocol in the past these overlength messages must be thrown away.
Above-mentioned defective is the significant problem that all L2VPN agreements all face.At this problem, some solutions have been proposed in the prior art.Wherein a solution is: no matter the qualification of Ethernet protocol, MTU value with equipment outlets all on the tunnel changes into more than 1548 bytes by force, present most of Ethernet interface chip all supports to send and receive the Ethernet message that surpasses 1522 bytes, so a lot of equipment are all supported this set, CISCO is that this message has also been got a name specially, is Biggiant message.But, the problem of this solution is: must allow all P equipment and PE equipment all support to receive and send the Ethernet message of this class overlength on the way, otherwise whichever intermediate node is not supported these agreements, all can unconditionally frame be thrown away or carry out mistakenly burst and handle.Under the complex network situation,, and may belong to different equipment vendors and provide because the P node in the middle of the tunnel may be a lot.Therefore, can not guarantee fully that the involved P equipment in L2VPN tunnel all supports this set.Also have a solution, that is, utilize jumbo frame (super large frame) tunneling that Ethernet this paper is encapsulated.This agreement is a kind of agreement of unofficial standard, and it can be supported in the longest message to 9022 bytes of transmission on the Ethernet, and it was the agreement of developing for G bit Ethernet specially originally, solved the MTU problem of oneself but L2VPN can use this agreement.But, this solution also exists and above-mentioned first kind of problem that solution is similar, promptly, must allow all P equipment and PE equipment all support jumbo frame tunneling on the way, otherwise, whichever intermediate node is not supported these agreements, all can unconditionally frame be thrown away or carry out mistakenly burst and handle.Under the complex network situation, the P node in the middle of the tunnel may be a lot, and may belong to different equipment vendors and provide.Therefore, can not guarantee fully that the involved P equipment in L2VPN tunnel, PE equipment and link all support this agreement.
In addition, as to a reference of the present invention, in relevant prior art a kind of processing overlength method of message is arranged, this method adopts ICMP (Internet Control Message Protocol) that the overlength message is controlled.Fig. 3 shows the schematic diagram of this overlength message processing method.As shown in Figure 3, when operation system of computer transmits file by router on network, the message that sends all can use forbids the burst function, promptly, DF in the IP head of message (forbidding the burst flag bit) sign is set, because the DF flag bit is an important symbol position in the known IP agreement, so no longer explanation.If router receives this type of message, and find that again this message length is bigger than interface mtu, because this message has clearly been specified inaccurate burst, so IP agreement regulation, this message must be dropped, and router will be responded to type=3 of source host, the icmp packet of code=4 type, and the MTU value of in this message, carrying interface, after main frame is received this message like this, MTU value that will active adjustment oneself is a value entrained in the icmp packet, and all messages of sending of this main frame all can be worth less than this later on.But this method of the prior art has only provided in the three-layer network APPLICATION IN TRANSMISSION, and is not given in such as the application in the double layer network transmission technology of L2VPN.
Summary of the invention
In order to solve the above-mentioned defective that exists in the prior art, the purpose of this invention is to provide a kind of method that can prevent the message length overlength the two-layer virtual private network from root.
To achieve these goals, the invention provides a kind of overlength method of message of handling in two-layer virtual private network, this method may further comprise the steps: 1) message control protocol of binding on PE equipment; 2) when the message that is sent to described PE equipment from transmitting terminal be that the message of the burst that is under an embargo and its length are when surpassing a predetermined length, the described message control protocol of described PE equipment utilization produces a feedback information automatically and it is returned to transmitting terminal, comprises the permission length of next message in this feedback information at least; 3) transmitting terminal is according to the permission length adjustment message length of the next message in the described feedback information New Development literary composition of delivering newspaper of laying equal stress on.
By utilizing method of the present invention on PE equipment, to bundle a message control protocol, and utilize this agreement that the length of message is controlled, just can limit the length of the message that subscriber computer sends, thereby on the source, prevent the message that surpasses 1522 bytes.Like this, no matter whether P equipment supports above-mentioned two kinds of agreements, can guarantee that message can not be dropped.
Description of drawings
Fig. 1 is a L2VPN typical case networking schematic diagram;
Fig. 2 is based on the L2VPN tunnel encapsulation message schematic diagram of mpls protocol;
Fig. 3 is the processing schematic diagram of the overlength message of DF set in the prior art;
Fig. 4 is according to handling overlength method of message schematic diagram in the described two-layer virtual private network of the embodiment of the invention;
Fig. 5 is the structural representation of the icmp packet in the embodiment of the invention.
Embodiment
Below with reference to Fig. 4 and Fig. 5 embodiments of the invention are elaborated.
In order to reduce router Fragmentation consuming time and to improve network efficiency, present mainstream operation system basically all can be with the DF set of message when network communication, and prepare to adjust by situation the MTU value of oneself at any time.The intent of the present invention is utilized these characteristics exactly, adds an ICMP (Internet Control Message Protocol) and come the MTU value of active adjustment main frame by utilizing this agreement to respond icmp packet on PE equipment, thereby reach the problem that solves L2VPN MTU value.To be elaborated to the specific embodiment of the present invention below.
At first, need on PE equipment, bundle an ICMP agreement.The ICMP agreement is existing three layer protocols, is not to be all in the L2VPN agreement, and its most basic function is to be network issue error reporting, for example feed back to automatically inaccessible icmp packet of purpose of user (Type=3, code=4).At present, nearly all router or three-tier switch are all supported this agreement.As for the detailed process of binding ICMP agreement, because it is known in the art, so repeat no more.
Then, as shown in Figure 4, when the original message that sends at PC entered the tunnel by PE equipment, according to the L2VPN agreement, PE equipment was necessary for it and installs the tunnel protocol head additional.After having installed the tunnel protocol head additional, PE equipment will compare the length that installs the message behind the head additional and the MTU value (maximum length 1522 bytes of Ethernet just) in tunnel, and judge the whether set of DF of message.If this message is the IP message of a DF set, and the MTU value that its length has surpassed the tunnel after installing the tunnel protocol head additional (promptly, 1522 bytes), then PE equipment will abandon this message and respond an icmp packet to PC, and the MTU value that carries out interface in this icmp packet is to feed back to PC.For example, be under the situation about being based upon on the mpls protocol in the tunnel, the MTU value in entrained tunnel can be 1500-26=1474 in the icmp packet.Note, in above-mentioned example, because ICMP agreement regulation must be responded the maximum length of three layers of payload,, could correctly indicate the MTU value in tunnel like this so need remove the length (26 byte) that two layers of frame head (18 byte)+two layers frame CRC check and (4 byte) are removed the tunnel protocol head more earlier.In addition, because the DF of the message in the main flow network service at present is set, so the step of above-mentioned judgement DF set also can be omitted.
Fig. 5 shows the structure of an icmp packet.The MTU value of message (being 1474 in this example) when as shown in Figure 5, in the ICMP of icmp packet frame frame head, having pointed out next time to send.After the icmp packet that receives the above-mentioned MTU of having value, the MTU value that user's PC only needs to reduce own corresponding network interface automatically according to the numerical value that is fed back in the icmp packet (1474) gets final product.Because the main frame of present any support ICP/IP protocol is all supported the ICMP agreement certainly, and the operating process of this agreement also is known, so no longer be described.Like this, even all later on user's messages can paranormal Ethernet MTU value after installing the tunnel protocol head additional.
The present invention utilizes the error reporting feedback function of ICMP agreement, make subscriber's main station initiatively reduce the MTU value of oneself, the defective that arrive to solve on the basis that need not update the equipment that MTU value among the L2VPN does not match and can not burst can guarantee effectively that message can not be dropped.This is very significant replenishing to the L2VPN agreement.
It should be noted though above explanation of the present invention is carried out with reference to its specific embodiment, it does not also mean that it is limitation of the present invention.Those of ordinary skill in the art should be understood that and can make various modifications and conversion to it on the basis of inventive concept.In a word, do not deviate from the various remodeling of spirit of the present invention all within the protection range of the appended claim of the present invention.

Claims (7)

1. in two-layer virtual private network, handle the overlength method of message for one kind, may further comprise the steps:
1) on tunnel edge device PE, adds a message control protocol;
2) when the message that is sent to described PE equipment from transmitting terminal be that the message of the burst that is under an embargo and its length are when surpassing a predetermined length, the described message control protocol of described PE equipment utilization produces a feedback information automatically and it is returned to transmitting terminal, comprises the permission length of next message in this feedback information at least;
3) transmitting terminal is according to the permission length adjustment message length of the next message in the described feedback information New Development literary composition of delivering newspaper of laying equal stress on.
2. method according to claim 1 is characterized in that, described message control protocol is Internet Control Message Protocol ICMP.
3. method according to claim 1 is characterized in that, described predetermined length is the maximum frame length of Ethernet.
4. method according to claim 1 is characterized in that, described step 2) in also comprise and judge that whether described message length surpasses the step of described predetermined length.
5. method according to claim 1 is characterized in that, described step 2) in also comprise the step whether burst flag bit DF is set of forbidding in the IP head of judging described message.
6. method according to claim 1 is characterized in that, described step 2) in the permission length of next message be legal Ethernet message length, maximum is less than described predetermined length.
7. according to any described method in the claim 1 to 6, it is characterized in that, comprise further in the described step 3) that transmitting terminal is adjusted into message length the step of the permission length of the described message that is included in the described feedback information.
CNB031091385A 2003-04-04 2003-04-04 Method for processing extra-long message in two-layer virtual special-purpose network Expired - Fee Related CN1300985C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB031091385A CN1300985C (en) 2003-04-04 2003-04-04 Method for processing extra-long message in two-layer virtual special-purpose network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB031091385A CN1300985C (en) 2003-04-04 2003-04-04 Method for processing extra-long message in two-layer virtual special-purpose network

Publications (2)

Publication Number Publication Date
CN1536832A CN1536832A (en) 2004-10-13
CN1300985C true CN1300985C (en) 2007-02-14

Family

ID=34319203

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB031091385A Expired - Fee Related CN1300985C (en) 2003-04-04 2003-04-04 Method for processing extra-long message in two-layer virtual special-purpose network

Country Status (1)

Country Link
CN (1) CN1300985C (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1956353B (en) * 2005-10-28 2011-07-20 华为技术有限公司 Method of flow management based on tunnel and radio access relay system
CN100454900C (en) * 2006-01-24 2009-01-21 华为技术有限公司 Method and system for quick responding IP banding message
CN101242341B (en) * 2007-02-07 2015-07-29 华为技术有限公司 A kind of method for dispatching message and device
CN101459592B (en) * 2007-12-12 2011-05-11 华为技术有限公司 Method, system and equipment for transmitting packets between supplier edge devices
CN101552728B (en) * 2009-05-12 2012-05-23 北京师范大学 Path MTU discovery method and system facing to IPV6
CN101827031A (en) * 2010-04-22 2010-09-08 中兴通讯股份有限公司 Method and device for packet transmission in user datagram protocol UDP tunnel
JP5672836B2 (en) * 2010-08-09 2015-02-18 日本電気株式会社 COMMUNICATION DEVICE, COMMUNICATION METHOD, AND COMMUNICATION PROGRAM
CN102263699B (en) 2011-08-15 2014-12-24 杭州华三通信技术有限公司 Load balancing implementation method and device applied to MPLS TP (multiprotocol label switch transport profile)
CN102594505A (en) * 2012-02-08 2012-07-18 华为技术有限公司 Data transmission method and device
CN104320359A (en) * 2014-11-24 2015-01-28 上海斐讯数据通信技术有限公司 Data package transmission method and system of stack-based exchanger
CN106330706A (en) * 2015-07-01 2017-01-11 中兴通讯股份有限公司 Method and device for acquiring device interface MRU (Maximum Receive Unit) value
CN109525534A (en) * 2017-09-18 2019-03-26 北京握奇智能科技有限公司 A kind of method and system for guaranteeing message in secure network and not being fragmented

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002044890A2 (en) * 2000-11-28 2002-06-06 Infineon Technologies Ag System for transmitting instructions
JP2003060730A (en) * 2001-08-14 2003-02-28 Nippon Telegr & Teleph Corp <Ntt> Method for transmitting and receiving hdlc signal, hdlc signal device, program thereof and recording medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002044890A2 (en) * 2000-11-28 2002-06-06 Infineon Technologies Ag System for transmitting instructions
JP2003060730A (en) * 2001-08-14 2003-02-28 Nippon Telegr & Teleph Corp <Ntt> Method for transmitting and receiving hdlc signal, hdlc signal device, program thereof and recording medium

Also Published As

Publication number Publication date
CN1536832A (en) 2004-10-13

Similar Documents

Publication Publication Date Title
US7782841B2 (en) Method and system for transporting data using pseudowire circuits over a bridged network
EP1766876B1 (en) Technique for transferring data over a packet switched network
CN100382517C (en) Network QoS test method and system
CN1300985C (en) Method for processing extra-long message in two-layer virtual special-purpose network
US20080317039A1 (en) Methods, systems, and/or devices for providing network access
CN101247353B (en) Stream aging method and network appliance
EP1478129A2 (en) Using network transport tunnels to provide service-based data transport
Xiao et al. Requirements for pseudo-wire emulation edge-to-edge (PWE3)
CN1514585A (en) Method used for detecting conncetion failure, system and network entity
CN100433714C (en) Method for transmission processing IP fragment message
EP3588859A1 (en) Network device configuration versioning
CN100464519C (en) Management method for binding chain circuit state
CN104113513B (en) A kind of detecting host method, apparatus and system
CN109743758A (en) Multi link communications method, communication device and communication system
EP2627037A1 (en) Network configuration method, ring network system, and node
CN101252526B (en) Flow control method as well as VPWS network system
CN101827012A (en) Packet transmitting network as well as method for bearing services of pure three layers of IP packets and outlet node
CN101166138A (en) Device for L2 virtual private network service transmission
CN101262424B (en) Method, device and MPLS communication system for MPLS packet forward
Cisco Cisco uBR7100 Series - Cisco IOS Release 12.2 BC
WO2014117474A1 (en) Routing method, system, and related device
WO2013004184A1 (en) L2 virtual private network interworking
CN103109504A (en) Pseudo-wire providing an in-band control channel using an offset
CN100428740C (en) Informing method for attached circuit connection state in packet exchanging network and service device
CN101159722A (en) Gateway equipment and method of implementing wide area network sharing connection on gateway equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20070214

Termination date: 20150404

EXPY Termination of patent right or utility model