WO2007104201A1 - A method for forwarding message in the service tunnel of the ethernet application and a system thereof - Google Patents

A method for forwarding message in the service tunnel of the ethernet application and a system thereof Download PDF

Info

Publication number
WO2007104201A1
WO2007104201A1 PCT/CN2006/003311 CN2006003311W WO2007104201A1 WO 2007104201 A1 WO2007104201 A1 WO 2007104201A1 CN 2006003311 W CN2006003311 W CN 2006003311W WO 2007104201 A1 WO2007104201 A1 WO 2007104201A1
Authority
WO
WIPO (PCT)
Prior art keywords
mac
tunnel
virtual
mac address
service tunnel
Prior art date
Application number
PCT/CN2006/003311
Other languages
French (fr)
Chinese (zh)
Inventor
Jianbing Wang
Chao Hou
Jun Guo
Wenliang Shen
Jing Xu
Gang Xu
Hao Zhang
Xifei Lu
Original Assignee
Huawei Technologies Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co., Ltd. filed Critical Huawei Technologies Co., Ltd.
Publication of WO2007104201A1 publication Critical patent/WO2007104201A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling

Definitions

  • the present invention relates to the field of network communications, and in particular, to a method and system for transmitting a message in a service tunnel of an Ethernet application.
  • Mac-in-Mac is a key technology for PBB (Provider Backbone Bridges) from the IEEE ( Institute for Electrical and Electronics Engineers) 802. lah draft.
  • Mac-in-Mac is an Ethernet application that adds customer Ethernet and carrier Ethernet by adding an outer MAC (Medium Access Control) header and a service instance ID to the outer layer of the customer Ethernet frame.
  • the network is isolated to solve a series of problems caused by the lack of layers in Ethernet applications.
  • IEEE 802. lag proposed the PBT (Provider Backbone Transport) solution.
  • the PBT solution establishes a tunnel through configuration, disables MAC learning and multicast functions, and simplifies networking to meet point-to-point applications.
  • the VRRP Virtual Router Redundancy Protocol
  • the VRRP protocol organizes a group of routers on a local area network into a virtual router.
  • the virtual router is also called a backup group, including a MASTER (primary) router and several BACKUP (backup) routers, with their own IP address and virtual MAC address. Hosts within the network communicate with other networks through the virtual router. If the MASTER router in the backup group fails, the other BACKUP routers in the backup group will take over as the new MASTER and continue to provide routing services to the hosts in the network.
  • the application of the virtual MAC address avoids the problem of the device re-learning ARP (Address Resolution Protocol).
  • a method for transmitting a message in an Ethernet network is as follows: Configuring a MAC and a VLAN by hop by hop on an Ethernet tunnel between a local PE (Provider Edge Device) and a peer PE ( Virtual Local Access Network (Virtual Local Area Network), which distinguishes different tunnels through different VLANs or MACs, and triggers tunnel switching through 802. lag.
  • a local PE Provider Edge Device
  • a peer PE Virtual Local Access Network (Virtual Local Area Network)
  • the client's packets are interconnected with the peer client through Metro Ethernet (Metro Ethernet).
  • PE1 encapsulates the packet in Mac-in-Mac.
  • the packet is input to the primary PBT tunnel.
  • the intermediate P device such as a switch
  • queries the Layer 2 MAC forwarding table the packet is forwarded hop by hop.
  • the peer device PE2 and PE2 terminate the PBT tunnel, the packet is stripped of the outer MAC encapsulation and service instance, and then forwarded to the peer client.
  • the tunnel between the local PE and the peer PE is statically configured.
  • the tunnel between PE1 and PE2 is statically configured.
  • On Switch A (labeled in Figure 2), the primary tunnel A is configured as: Destination MAC: Physical MAC address of PE2/incoming interface 1, VLAN: VLAN1, outgoing interface: outgoing interface A; standby tunnel B configured as: Destination MAC address: Physical MAC address of PE2/incoming interface 2, VLAN: VLAN 2, outgoing interface: Outbound interface B.
  • PE1 detects that the status of the primary tunnel A is faulty through 802. lag 0AM (operation, management, and maintenance). Therefore, the traffic between PE2 is switched to Standby tunnel B (see the label in Figure 2). For the P device in the middle, because the tunnel is configured in advance, the traffic switching only switches from hitting one forwarding entry to hitting another forwarding entry. That is, the entries on the intermediate switch device do not need to be modified. The switching of the tunnel is transparent to the intermediate device.
  • the physical inbound interface and the inbound MAC of the tunnel from PE1 to PE2 may change in the following situations:
  • the port state changes under the trunk port
  • a method for transmitting a message in a service tunnel of an Ethernet application including - Configuring virtual media access to control the MAC address on the carrier edge PE device and the carrier core device of the service tunnel in the MAC-in-Mac network;
  • the PE device and the carrier core device perform packet transmission in the service tunnel by using the configured virtual MAC address.
  • a system for transmitting a message in a service tunnel of an Ethernet application comprising:
  • PE device One or more virtual MAC addresses are configured to identify one or more service tunnels in the MAC-in-Mac network between PE devices.
  • the core device of the carrier the destination address of the corresponding service tunnel in the MAC-in-Mac network is configured by using one or more virtual MAC addresses configured on the PE device; and the virtual MAC address is established according to the configured virtual MAC address.
  • the forwarding entry of the service tunnel is used to perform packet transmission in the service tunnel.
  • the present invention configures the address of the PBT tunnel of the switch and other P devices in the PBT application network by defining one or more virtual MACs and using the defined virtual MAC address. Therefore, when the port data of the PEs at both ends of the PBT tunnel is changed, for example, after the physical MAC address of the PE device is changed, the virtual MAC address needs to be reconfigured on the PE devices at both ends.
  • the forwarding entries on the PBT tunnel switch and other carrier devices need to be reconfigured. It avoids the problem of requiring a large amount of refreshing of the network tunnel configuration, reduces the complexity of the network control plane, reduces the credit sales of the network operator, and improves the scalability of the network.
  • FIG. 1 is a schematic diagram of a PBT networking of a tunnel using a Mac-in-Mac;
  • FIG. 2 is a schematic diagram of a PBT typical application networking diagram of a tunnel using a Mac-in-Mac;
  • FIG. 3 is a process flow diagram of an embodiment of the method of the present invention.
  • FIG. 4 is a schematic diagram of an embodiment of a PBT networking using a virtual MAC address according to the present invention.
  • FIG. 5 is a schematic diagram of an embodiment of a PBT networking using multiple virtual MAC addresses according to the present invention. Mode for carrying out the invention
  • the embodiment of the invention provides a method and a system for transmitting a message in a service tunnel of an Ethernet application.
  • the main technical features of the present invention are: not configuring a Mac-in-Mac service tunnel without using a physical MAC address, and Use a virtual MAC address.
  • Step 3-1 Configure a PBT tunnel of a PE device and a carrier core device in a PBT application network by using a virtual MAC address. the address of.
  • the PBT tunnel including the primary tunnel and the backup tunnel
  • the virtual MAC address is used instead of the physical port MAC address as the PBT tunnel. Destination address.
  • the virtual MAC address of the PBT tunnel of the carrier core device is determined by the destination PE device of the PBT tunnel, that is, the virtual MAC address is configured on the destination PE device of the PBT tunnel, and the carrier is configured by the destination PE device.
  • the destination PE device can be a PE device at both ends of the PBT tunnel. That is, the virtual MAC address is configured on the PE devices at both ends of the PBT tunnel.
  • the format of the above virtual MAC address is the same as the format of the physical MC address, and all adopt IEEE standard format. However, the virtual MAC address requirement is a non-reserved or multicast MAC address, that is, a unicast MAC should be used.
  • the virtual MAC address requires that no collisions occur in the network.
  • the primary tunnel A in the PE1 to PE2 direction on the switch A is configured as: destination MAC: PE2/virtual MAC address, VLAN : VLAN1, Outbound interface: Outbound interface A;
  • the standby tunnel B is configured as: Destination MAC: PE2/Virtual MAC address, VLAN: VLAN2, Outbound interface: Outbound interface B.
  • the above virtual MAC address is determined by configuration on PE2.
  • the virtual MAC address of the standby tunnel in the PE2 to PE1 direction on Switch A is determined by configuration on PE1. '
  • Step 3-2 When the port data of the PE device in the PBT tunnel changes, the virtual MAC address is reconfigured on the PE device. The forwarding entries on the switch and other carrier devices in the PBT application network are not modified.
  • the physical damage of the PE device occurs after the IP address of the PE device, the switch, and the PBT tunnel of the PBT tunnel in the PBT application network is configured.
  • the new PE device needs to be replaced.
  • the physical MAC address of the new PE device and the previous PE device will change.
  • the virtual MAC address is reconfigured on the PE device of the PBT tunnel, and the forwarding entries on the switch and other carrier devices in the PBT application network need not be modified.
  • the PE2 when the physical port data of the PE2 changes and the new PE device needs to be replaced, the PE2 is directly reconfigured on the replaced PE2.
  • the virtual MAC address does not need to be modified on the switch A and other carrier devices. Thereby greatly reducing the workload of network management. Reduce the configuration workload of the PBT network.
  • Entering the control plane can also greatly reduce the requirements on the control plane.
  • PE1 and PE2 carry different services through multiple sets of service tunnels, for example, carrying voice, video, and data applications, etc.
  • multiple groups of service tunnels can be distinguished by configuring different VLANs for different service tunnels.
  • the present invention proposes to configure multiple virtual MAC addresses for multiple groups of service tunnels, each virtual MAC address corresponding to a group of service tunnels, each virtual MAC address uniquely identifying a group of service tunnels. That is, each group of service tunnels is distinguished by using the configured virtual MAC address. Therefore, it is possible to distinguish different service tunnels by configuring different virtual MAC addresses without configuring different VLANs.
  • a system for using a virtual media access control address in an Ethernet application includes
  • PE device One or more virtual MAC addresses are configured to identify one or more service tunnels in the MAC-in-Mac network between PE devices.
  • the PE device includes: one or more service tunnels.
  • the PE device at the destination end can be the PE device at both ends of the service tunnel.
  • the core device of the carrier The destination address of the corresponding service tunnel in the MAC-in-Mac network is configured by using one or more virtual MAC addresses configured on the PE device.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Small-Scale Networks (AREA)

Abstract

A method for using the virtual media access control address in the Ethernet application and a system thereof, the method mainly includes: the MAC (media access control) address is configured in the provider edge PE equipment and the provider core equipment of the service tunnel in the MAC-in-MAC network; the PE equipment and the provider core equipment forward the message in the service tunnel by using the configured virtual MAC address. By using the invention, when the port data of the PE (provider edge equipment) equipment of the PBT (provider backbone transport) tunnel is changed, it is only needed that the virtual MAC address is reconfigured in the destination PE equipment, and it is not needed that the forwarding list is reconfigured in the switch and the other provider equipment of the PBT tunnel.

Description

在以太网应用的业务隧道中进行报文传输的方法和系统 技术领域  Method and system for transmitting message in service tunnel of Ethernet application
本发明涉及网络通讯领域, 尤其涉及一种在以太网应用的业务隧道中进行报文传 输的方法和系统。  The present invention relates to the field of network communications, and in particular, to a method and system for transmitting a message in a service tunnel of an Ethernet application.
发明背景 Background of the invention
Mac- in-Mac是 IEEE ( Institute for Electrical and Electronics Engineers , 电子电气工程师协会) 802. lah草案给出的 PBB (Provider Backbone Bridges, 运营商 骨干网桥)的关键技术。 Mac- in- Mac是一种以太网应用方案, 通过在客户以太网帧外层 添加外层 MAC (Medium Access Control, 媒体访问控制)头和业务实例 ID的方式, 将客 户以太网络和运营商以太网络隔离开来,从而可以解决由于以太网应用没有层次导致的 一系列问题。  Mac-in-Mac is a key technology for PBB (Provider Backbone Bridges) from the IEEE ( Institute for Electrical and Electronics Engineers) 802. lah draft. Mac-in-Mac is an Ethernet application that adds customer Ethernet and carrier Ethernet by adding an outer MAC (Medium Access Control) header and a service instance ID to the outer layer of the customer Ethernet frame. The network is isolated to solve a series of problems caused by the lack of layers in Ethernet applications.
IEEE 802. lag提出了 PBT (Provider Backbone Transport, 运营商骨干网传输) 方案。 PBT方案通过配置方式建立隧道, 关闭 MAC学习和组播功能, 简化组网, 满足点到 点应用。  IEEE 802. lag proposed the PBT (Provider Backbone Transport) solution. The PBT solution establishes a tunnel through configuration, disables MAC learning and multicast functions, and simplifies networking to meet point-to-point applications.
在传统的 IP网络中, 为了提高上行链路 /节点的可靠性, 有时会用 VRRP (Virtual Router Redundancy Protocol , 虚拟路由冗余协议)协议来组网。 VRRP协议将局域网的 一组路由器组织成一个虚拟路由器。 该虚拟路由器也称之为一个备份组, 包括一个 MASTER (主用) 路由器和若干个 BACKUP (备份) 路由器, 拥有自己的 IP地址和虚拟 MAC 地址。 网络内的主机通过该虚拟路由器来与其它网络进行通信。如果备份组内的 MASTER 路由器发生故障时, 备份组内的其它 BACKUP路由器将会接替成为新的 MASTER, 继续向网 络内的主机提供路由服务。 在 VRRP协议中, 虛拟 MAC地址的应用避免了网络倒换时下行 '设备重新学习 ARP (Address Resolution Protocol, 地址解析协议) 的问题。  In the traditional IP network, in order to improve the reliability of the uplink/node, the VRRP (Virtual Router Redundancy Protocol) protocol is sometimes used for networking. The VRRP protocol organizes a group of routers on a local area network into a virtual router. The virtual router is also called a backup group, including a MASTER (primary) router and several BACKUP (backup) routers, with their own IP address and virtual MAC address. Hosts within the network communicate with other networks through the virtual router. If the MASTER router in the backup group fails, the other BACKUP routers in the backup group will take over as the new MASTER and continue to provide routing services to the hosts in the network. In the VRRP protocol, the application of the virtual MAC address avoids the problem of the device re-learning ARP (Address Resolution Protocol).
现有技术中一种在以太网中进行报文传递的方法为: 在本端 PE (Provider Edge Device, 运营商边缘设备)和对端 PE之间的以太网隧道上逐跳配置 MAC和 VLAN (Virtual Local Access Network, 虚拟局域网) , 通过不同的 VLAN或者 MAC来区分不同的隧道, 通过 802. lag来触发隧道的倒换。  In the prior art, a method for transmitting a message in an Ethernet network is as follows: Configuring a MAC and a VLAN by hop by hop on an Ethernet tunnel between a local PE (Provider Edge Device) and a peer PE ( Virtual Local Access Network (Virtual Local Area Network), which distinguishes different tunnels through different VLANs or MACs, and triggers tunnel switching through 802. lag.
在图 1所示的应用了 Mac-in- Mac的隧道的 PBT组网示意图中, 客户的报文经过 Metro Ethernet (城域以太网)与对端客户互通。 客户发出的二层以太网报文到达 PE1后, PE1 对该报文进行 Mac- in-Mac封装, 在该报文中添加二层 MAC头和业务实例后, 将该报文输 入主用 PBT隧道, 中间 P设备 (比如交换机)查询二层 MAC转发表后, 将该报文逐跳转发 到对端设备 PE2, PE2终结 PBT隧道, 将该报文剥去外层 MAC封装和业务实例后, 重新转发 给对端客户。 In the PBT networking diagram of the Mac-in-Mac tunnel shown in Figure 1, the client's packets are interconnected with the peer client through Metro Ethernet (Metro Ethernet). After the Layer 2 Ethernet packet sent by the client reaches PE1, PE1 encapsulates the packet in Mac-in-Mac. After adding the Layer 2 MAC header and service instance to the packet, the packet is input to the primary PBT tunnel. After the intermediate P device (such as a switch) queries the Layer 2 MAC forwarding table, the packet is forwarded hop by hop. After the peer device PE2 and PE2 terminate the PBT tunnel, the packet is stripped of the outer MAC encapsulation and service instance, and then forwarded to the peer client.
上述现有技术中的在以太网中进行报文传递的方法的缺点为: 在本端 PE和对端 PE 之间的隧道都是静态配置的。 比如, 如图 2所示的应用了 Mac- in- Mac的隧道的 PBT典型应 用组网示意图中, PE1和 PE2之间的隧道都是静态配置的。 在交换机 A (见图 2中的标注) 上, 主用隧道 A配置为: 目的 MAC: PE2/入接口 1的物理 MAC地址, VLAN: VLAN1 , 出接口: 出接口 A; 备用隧道 B配置为: 目的 MAC: PE2/入接口 2的物理 MAC地址, VLAN: VLAN2, 出 接口: 出接口 B。 当 PE2的接口 1由于某些原因出现故障时, PE1通过 802. lag 0AM (操作、 管理和维护).感知到主用隧道 A的状态出现故障, 于是, 将到 PE2之间的业务流量切换到 备用隧道 B (见图 2中的标注) 。 对于中间的 P设备来说, 由于隧道是事先配置好的, 流 量的切换只是从命中一个转发表项切换到命中另一个转发表项而已,即中间交换机设备 上的表项不需要修改, 主用隧道的倒换对中间设备是透明的。  The disadvantages of the method for performing packet transmission in the Ethernet in the above-mentioned prior art are as follows: The tunnel between the local PE and the peer PE is statically configured. For example, in the PBT typical application networking diagram of a Mac-in-Mac tunnel as shown in Figure 2, the tunnel between PE1 and PE2 is statically configured. On Switch A (labeled in Figure 2), the primary tunnel A is configured as: Destination MAC: Physical MAC address of PE2/incoming interface 1, VLAN: VLAN1, outgoing interface: outgoing interface A; standby tunnel B configured as: Destination MAC address: Physical MAC address of PE2/incoming interface 2, VLAN: VLAN 2, outgoing interface: Outbound interface B. When interface 1 of PE2 fails for some reason, PE1 detects that the status of the primary tunnel A is faulty through 802. lag 0AM (operation, management, and maintenance). Therefore, the traffic between PE2 is switched to Standby tunnel B (see the label in Figure 2). For the P device in the middle, because the tunnel is configured in advance, the traffic switching only switches from hitting one forwarding entry to hitting another forwarding entry. That is, the entries on the intermediate switch device do not need to be modified. The switching of the tunnel is transparent to the intermediate device.
但当 PE1到 PE2的隧道对应的 PE2上的端口数据发生变化, 比如物理接口 (比如接口 1和接口 2)发生变化时, 则需要重新配置 PE1及所有中间的 P设备上的转发表项, 工作量 很大。  However, when the port data on the PE2 corresponding to the PE1 to PE2 is changed, for example, the physical interface (such as interface 1 and interface 2) is changed, you need to reconfigure the forwarding entries on PE1 and all intermediate P devices. A lot.
一般在如下几种情况下, PE1到 PE2的隧道对应的物理入接口及入接口 MAC可能会发 生变化:  Generally, the physical inbound interface and the inbound MAC of the tunnel from PE1 to PE2 may change in the following situations:
1、 物理损坏, 比如单板损坏需要更换, 这时 MAC地址肯定变化;  1. Physical damage, such as the damage of the board needs to be replaced. At this time, the MAC address must change;
2、 '端口冗余时, 比如 Trunk端口下有端口状态变化;  2. When the port is redundant, for example, the port state changes under the trunk port;
3、 PE2设备更换。  3. Replace the PE2 equipment.
在上述几种情况下, 因为 PE1到 PE2的隧道对应的物理入接口 MAC地址发生了变化, 需要更新两端 PE设备和所有中间的 P设备上的转发表项, 工作量极大, 导致以太网缺乏 可维护性。 发明内容  In the above cases, the MAC address of the physical inbound interface of the PE1 to PE2 is changed. The forwarding entries on the PEs and all the intermediate P devices need to be updated. The workload is extremely high. Lack of maintainability. Summary of the invention
本发明实施例的目的是提供一种在以太网应用的业务隧道中进行报文传输的方法和 系统。 从而可以实现当 PBT隧道的 PE设备的端口数据发生变化时, 不需要对 PBT隧道 的交换机及其它运营商设备上的转发表项进行重新配置。  It is an object of embodiments of the present invention to provide a method and system for transmitting a message in a service tunnel of an Ethernet application. Therefore, when the port data of the PE device of the PBT tunnel changes, the forwarding entries on the PBT tunnel switch and other carrier devices need not be reconfigured.
本发明实施例的目的是通过以下技术方案实现的:  The purpose of the embodiment of the present invention is achieved by the following technical solutions:
一种在以太网应用的业务隧道中进行报文传输的方法, 包括- 在 MAC- in- Mac组网中的业务隧道的运营商边缘 PE设备和运营商核心设备上配置虚 拟媒体访问'控制 MAC地址; A method for transmitting a message in a service tunnel of an Ethernet application, including - Configuring virtual media access to control the MAC address on the carrier edge PE device and the carrier core device of the service tunnel in the MAC-in-Mac network;
所述 PE设备和运营商核心设备使用所述配置的虚拟 MAC地址在所述业务隧道中进 行报文传输。  The PE device and the carrier core device perform packet transmission in the service tunnel by using the configured virtual MAC address.
一种在以太网应用的业务隧道中进行报文传输的系统, 包括:  A system for transmitting a message in a service tunnel of an Ethernet application, comprising:
PE设备: 配置有一个或多个虚拟 MAC地址, 用于标识 PE设备之间的 MAC-in- Mac组网 中的一个或多个业务隧道;  PE device: One or more virtual MAC addresses are configured to identify one or more service tunnels in the MAC-in-Mac network between PE devices.
运营商核心设备: 使用所述 PE设备上配置的一个或多个虚拟 MAC地址来配置所述 MAC-in-Mac组网中的相应的业务隧道的目的地址; 并根据配置的虚拟 MAC地址来建立 针对所述业务隧道的转发表项, 利用该转发表项在所述业务隧道中进行报文传输。  The core device of the carrier: the destination address of the corresponding service tunnel in the MAC-in-Mac network is configured by using one or more virtual MAC addresses configured on the PE device; and the virtual MAC address is established according to the configured virtual MAC address. For the forwarding entry of the service tunnel, the forwarding entry is used to perform packet transmission in the service tunnel.
由上述本发明提供的技术方案可以看出, 本发明通过定义一个或多个虚拟 MAC, 使 用定义的虚拟 MAC地址来配置 PBT应用组网中交换机及其它 P设备的 PBT隧道的地址。从而 可以实现当 PBT隧道的两端 PE设备的端口数据发生变化时, 比如, PE设备的物理入接口 MAC地址发生变化后,只需要在该两端 PE设备上重新配置所述虚拟 MAC地址,不需要对 PBT 隧道的交换机及其它运营商设备上的转发表项进行重新配置。避免了需要大量刷新网络 隧道配置的问题, 减少了网络控制平面的复杂度, 降低了网络运营商的幵销, 提高了网 络的可扩展能力。  As can be seen from the technical solution provided by the present invention, the present invention configures the address of the PBT tunnel of the switch and other P devices in the PBT application network by defining one or more virtual MACs and using the defined virtual MAC address. Therefore, when the port data of the PEs at both ends of the PBT tunnel is changed, for example, after the physical MAC address of the PE device is changed, the virtual MAC address needs to be reconfigured on the PE devices at both ends. The forwarding entries on the PBT tunnel switch and other carrier devices need to be reconfigured. It avoids the problem of requiring a large amount of refreshing of the network tunnel configuration, reduces the complexity of the network control plane, reduces the credit sales of the network operator, and improves the scalability of the network.
附图简要说明 BRIEF DESCRIPTION OF THE DRAWINGS
图 1为一种应用了 Mac-in-Mac的隧道的 PBT组网示意图;  FIG. 1 is a schematic diagram of a PBT networking of a tunnel using a Mac-in-Mac;
图 2为一种应用了 Mac- in-Mac的隧道的 PBT典型应用组网示意图中;  FIG. 2 is a schematic diagram of a PBT typical application networking diagram of a tunnel using a Mac-in-Mac;
图 3为本发明所述方法的实施例的处理流程图;  3 is a process flow diagram of an embodiment of the method of the present invention;
图 4为本发明所述使用虚拟 MAC地址的 PBT组网的实施例的示意图;  4 is a schematic diagram of an embodiment of a PBT networking using a virtual MAC address according to the present invention;
图 5为本发明所述使用多虚拟 MAC地址的 PBT组网的实施例的示意图。 实施本发明的方式  FIG. 5 is a schematic diagram of an embodiment of a PBT networking using multiple virtual MAC addresses according to the present invention. Mode for carrying out the invention
本发明实施例提供了一种在以太网应用的业务隧道中进行报文传输的方法和系 统, 本发明的主要技术特点为: 在配置 Mac- in-Mac业务隧道时不使用物理 MAC地址, 而 使用虚拟 MAC地址。  The embodiment of the invention provides a method and a system for transmitting a message in a service tunnel of an Ethernet application. The main technical features of the present invention are: not configuring a Mac-in-Mac service tunnel without using a physical MAC address, and Use a virtual MAC address.
下面结合附图来详细描述本发明实施例, 以应用了 Mac- in- Mac的隧道的 PBT应用为 例, 本发明所述方法的实施例的处理流程图如图 3所示, 包括如下步骤: 步骤 3-1 : 使用虚拟 MAC地址来配置 PBT应用组网中 PE设备、 运营商核心设备的 PBT 隧道的地址。 在对 PBT应用组网中的运营商核心设备, 比如交换机及其它运营商设备进行 PBT隧 道(包括主用隧道和备用隧道)地址配置时, 使用虚拟 MAC地址而不是物理端口 MAC地址 作为该 PBT隧道的目的地址。上述运营商核心设备的 PBT隧道的虚拟 MAC地址通过 PBT隧道 的目的端 PE设备来确定, 即首先在 PBT隧道的目的端 PE设备配置虚拟 MAC地址, 通过该目 的端 PE设备来配置所述运营商核心设备上的相应 PBT隧道的目的地址。 上述目的端 PE设备可以为 PBT隧道的两端 PE设备, 即在 PBT隧道的两端 PE设备上都 配置虚拟 MAC地址。 上述虚拟 MAC地址的格式与物理 MC地址的格式相同, 都是采用 IEEE的标准格式。 但该虚拟 MAC地址要求是非保留或者组播 MAC地址, 即应该采用单播 MAC。 同时, 该虚拟 MAC地址要求保证在网络中不发生冲突。 . 比如, 在图 4所示的使用虚拟 MAC地址的 PBT组网的实施例的示意图中, 交换机 A上 的 PE1到 PE2方向的主用隧道 A配置为: 目的 MAC: PE2/虚拟 MAC地址, VLAN: VLAN1 , 出接 口: 出接口 A; 备用隧道 B配置为: 目的 MAC: PE2/虚拟 MAC地址, VLAN: VLAN2, 出接口: 出接口 B。上述虚拟 MAC地址由 PE2上通过配置来确定。交换机 A上的 PE2到 PE1方向的备用 隧道的虚拟 MAC地址在 PE1上通过配置来确定。 ' The embodiments of the present invention are described in detail below with reference to the accompanying drawings, and the PBT application of the tunnel to which the Mac-in-Mac is applied is For example, the process flow chart of the embodiment of the method of the present invention is as shown in FIG. 3, and includes the following steps: Step 3-1: Configure a PBT tunnel of a PE device and a carrier core device in a PBT application network by using a virtual MAC address. the address of. When the PBT tunnel (including the primary tunnel and the backup tunnel) is configured for the carrier core equipment in the PBT application network, such as the switch and other carrier equipment, the virtual MAC address is used instead of the physical port MAC address as the PBT tunnel. Destination address. The virtual MAC address of the PBT tunnel of the carrier core device is determined by the destination PE device of the PBT tunnel, that is, the virtual MAC address is configured on the destination PE device of the PBT tunnel, and the carrier is configured by the destination PE device. The destination address of the corresponding PBT tunnel on the core device. The destination PE device can be a PE device at both ends of the PBT tunnel. That is, the virtual MAC address is configured on the PE devices at both ends of the PBT tunnel. The format of the above virtual MAC address is the same as the format of the physical MC address, and all adopt IEEE standard format. However, the virtual MAC address requirement is a non-reserved or multicast MAC address, that is, a unicast MAC should be used. At the same time, the virtual MAC address requires that no collisions occur in the network. For example, in the schematic diagram of the embodiment of the PBT network using the virtual MAC address shown in FIG. 4, the primary tunnel A in the PE1 to PE2 direction on the switch A is configured as: destination MAC: PE2/virtual MAC address, VLAN : VLAN1, Outbound interface: Outbound interface A; The standby tunnel B is configured as: Destination MAC: PE2/Virtual MAC address, VLAN: VLAN2, Outbound interface: Outbound interface B. The above virtual MAC address is determined by configuration on PE2. The virtual MAC address of the standby tunnel in the PE2 to PE1 direction on Switch A is determined by configuration on PE1. '
步骤 3- 2: 当 PBT隧道的 PE设备的端口数据发生变化时, 在该 PE设备上重新配置虚 拟 MAC地址, 不修改 PBT应用组网中交换机及其它运营商设备上的转发表项。  Step 3-2: When the port data of the PE device in the PBT tunnel changes, the virtual MAC address is reconfigured on the PE device. The forwarding entries on the switch and other carrier devices in the PBT application network are not modified.
在使用虛拟 MAC地址对 PBT应用组网中 PE设备、 交换机及其它运营商设备的 PBT隧道 的地址进行配置后, 当 PBT隧道的 PE设备的物理端口数据发生变化时, 比如, PE设备发 生物理损坏, 需要更换新的 PE设备, 此时, 新的 PE设备和以前的 PE设备的物理 MAC地址 会发生变化。此时,在该 PBT隧道的 PE设备上重新配置所述虚拟 MAC地址,不需要修改 PBT 应用组网中交换机及其它运营商设备上的转发表项。  After the physical port data of the PE device of the PBT tunnel changes, for example, the physical damage of the PE device occurs after the IP address of the PE device, the switch, and the PBT tunnel of the PBT tunnel in the PBT application network is configured. The new PE device needs to be replaced. At this time, the physical MAC address of the new PE device and the previous PE device will change. At this time, the virtual MAC address is reconfigured on the PE device of the PBT tunnel, and the forwarding entries on the switch and other carrier devices in the PBT application network need not be modified.
比如, 在上述图 4所示的使用虚拟 MAC地址的 PBT组网的实施例的示意图中, 当 PE2 的物理端口数据发生变化, 需要更换新的 PE设备时, 直接在更换后的 PE2上重新配置上 述虚拟 MAC地址, 不需要修改交换机 A及其它运营商设备上的转发表项。从而大大地减轻 了网络管理的工作量。 减少了 PBT组网的配置工作量。 另外以后如果进行协议扩展, 引 入控制平面, 也能大大降低对控制平面的要求。 For example, in the schematic diagram of the embodiment of the PBT network using the virtual MAC address shown in FIG. 4, when the physical port data of the PE2 changes and the new PE device needs to be replaced, the PE2 is directly reconfigured on the replaced PE2. The virtual MAC address does not need to be modified on the switch A and other carrier devices. Thereby greatly reducing the workload of network management. Reduce the configuration workload of the PBT network. In addition, if the protocol is extended later, Entering the control plane can also greatly reduce the requirements on the control plane.
在 PBT隧道的两端 PE设备上, 可以只配置一个虛拟 MAC地址, 也可以配置多个虚拟 MAC地址, 用于在两端 PE设备之间配置多组 PBT隧道。  On a PE device at both ends of a PBT tunnel, you can configure only one virtual MAC address or multiple virtual MAC addresses to configure multiple PBT tunnels between PEs at both ends.
在典型 PBT应用组网中, 在两端 PE设备之间只需要配置一组隧道(包括主用隧道和 备用隧道),用于承载客户业务。当需要对客户的不同业务给予不同的 SU Service Level Agreement, 服务等级协议) 或者对客户的不同业务进行隔离时, 就可以在两端 PE设备 之间配置多组隧道, 并且为每组隧道配置不同的虚拟 MAC地址。  On a typical PBT application network, you need to configure a group of tunnels (including the primary tunnel and the standby tunnel) to carry customer services. When you need to give different SU Service Level Agreements (Service Level Agreements) to different services of the customer or isolate different services of the customer, you can configure multiple groups of tunnels between PEs at both ends, and configure different configurations for each group of tunnels. Virtual MAC address.
比如, 在图 5所示的使用多虚拟 MAC地址的 PBT组网的实施例的示意图中, 当 PE1和 PE2之间通过多组业务隧道来承载不同的业务, 比如承载语音、 视频和数据应用等业务 时, 可以通过给不同的业务隧道配置不同的 VLAN来区分多组业务隧道。  For example, in the schematic diagram of the embodiment of the PBT network using multiple virtual MAC addresses shown in FIG. 5, when PE1 and PE2 carry different services through multiple sets of service tunnels, for example, carrying voice, video, and data applications, etc. In the service, multiple groups of service tunnels can be distinguished by configuring different VLANs for different service tunnels.
本发明提出给多组业务隧道配置多个虚拟 MAC地址, 每个虚拟 MAC地址和一组业务 隧道相对应, 每个虚拟 MAC地址唯一地标识一组业务隧道。 即利用配置的虚拟 MAC地址对 每组业务隧道进行区分。 从而达到不用配置不同 VLAN, 而仅由配置的不同的虚拟 MAC地 址来区分不同的业务隧道。  The present invention proposes to configure multiple virtual MAC addresses for multiple groups of service tunnels, each virtual MAC address corresponding to a group of service tunnels, each virtual MAC address uniquely identifying a group of service tunnels. That is, each group of service tunnels is distinguished by using the configured virtual MAC address. Therefore, it is possible to distinguish different service tunnels by configuring different virtual MAC addresses without configuring different VLANs.
本发明所述的在以太网应用中使用虚拟媒体访问控制地址的系统, 包括- A system for using a virtual media access control address in an Ethernet application according to the present invention includes
PE设备: 配置有一个或多个虚拟 MAC地址, 用于标识 PE设备之间的 MAC-in-Mac组网 中的一个或多个业务隧道; 该 PE设备包括:一个或多个业务隧道的目的端 PE设备, 该目 的端 PE设备可以为业务隧道的两端 PE设备。 · PE device: One or more virtual MAC addresses are configured to identify one or more service tunnels in the MAC-in-Mac network between PE devices. The PE device includes: one or more service tunnels. The PE device at the destination end can be the PE device at both ends of the service tunnel. ·
运营商核心设备: 使用所述 PE设备上配置的一个或多个虚拟 MAC地址来配置所述 MAC-in- Mac组网中的相应的业务隧道的目的地址。 可以为: 交换机和其它运营商设备。  The core device of the carrier: The destination address of the corresponding service tunnel in the MAC-in-Mac network is configured by using one or more virtual MAC addresses configured on the PE device. Can be: Switches and other carrier devices.
以上所述, 仅为本发明较佳的具体实施方式, 但本发明的保护范围并不局限于此, 任何熟悉本技术领域的技术人员在本发明揭露的技术范围内, 可轻易想到的变化或替 换, 都应涵盖在本发明的保护范围之内。 因此, 本发明的保护范围应该以权利要求的保 护范围为准。  The above is only a preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily think of changes or within the technical scope disclosed by the present invention. Alternatives are intended to be covered by the scope of the present invention. Therefore, the scope of protection of the present invention should be determined by the scope of the claims.

Claims

权利要求 Rights request
1、 一种在以太网应用的业务隧道中进行报文传输的方法, 其特征在于, 包括: 在 MAC-in- Mac组网中的业务隧道的运营商边缘 PE设备和运营商核心设备上配置虚 拟媒体访问控制 MAC地址;  A method for transmitting a packet in a service tunnel of an Ethernet application, comprising: configuring on a carrier edge PE device and a carrier core device of a service tunnel in a MAC-in-Mac network Virtual media access control MAC address;
所述 PE设备和运营商核心设备使用所述配置的虛拟 MAC地址在所述业务隧道中进行 报文传输。  The PE device and the carrier core device perform message transmission in the service tunnel by using the configured virtual MAC address.
2、 根据权利要求 1所述的方法, 其特征在于, 所述的在 PE设备和运营商核心设备 上配置虚拟 MAC地址具体包括:  The method according to claim 1, wherein the configuring the virtual MAC address on the PE device and the carrier core device specifically includes:
在 MAC- in- Mac组网中的业务隧道的目的端 PE设备上配置虚拟 MAC地址;  Configure a virtual MAC address on the PE device at the destination end of the service tunnel in the MAC-in-Mac network.
在所述业务隧道的运营商核心设备上使用所述目的端 PE设备上配置的虚拟 MAC地 址来配置相应所述业务隧道的目的地址, 并根据配置的虚拟 MAC地址来建立针对所述业 务隧道的转发表项。  Determining, by using a virtual MAC address configured on the destination PE device, a destination MAC address of the service tunnel, and establishing a service tunnel for the service tunnel according to the configured virtual MAC address. Forward the entry.
3、 根据权利要求 2所述的方法, 其特征在于, 所述的在 PE设备和运营商核心设备 上配置虚拟 MAC地址还包括:  The method according to claim 2, wherein the configuring the virtual MAC address on the PE device and the carrier core device further includes:
在 MAC- in- Mac组网中的目的端 PE设备上配置多个虚拟 MAC地址, 该多个虚拟 MAC地 址和到达所述目的端 PE设备的多组业务隧道相对应, 根据该多个虚拟 MAC地址对到达所 述目的端 PE设备的多组业务隧道进行区分。  Configuring a plurality of virtual MAC addresses on the destination PE device in the MAC-in-Mac network, where the multiple virtual MAC addresses correspond to multiple sets of service tunnels that reach the destination PE device, according to the multiple virtual MACs. The address distinguishes between multiple groups of service tunnels that reach the destination PE device.
4、 根据权利要求 1所述的方法, 其特征在于, 所述的虚拟 MAC地址为单播 MAC地址, 在网络中.互不冲突。  The method according to claim 1, wherein the virtual MAC address is a unicast MAC address, and does not conflict with each other in the network.
5、 根据权利要求 1、 2、 3或 4所述的方法, 其特征在于, 所述方法还包括- 当所述业务隧道的目的端 PE设备的端口信息发生变化时, 在所述业务隧道的目的 端 PE设备上重新配置所述虚拟 MAC地址。 .  The method according to claim 1, 2, 3 or 4, wherein the method further comprises: when the port information of the destination PE device of the service tunnel changes, in the service tunnel The virtual MAC address is reconfigured on the destination PE device. .
6、 根据权利要求 5所述的方法, 其特征在于, 所述的方法还包括:  The method according to claim 5, wherein the method further comprises:
当使用新的 PE设备来替换所述 MAC- in-Mac组网中的业务隧道的目的端 PE设备, 所 述新的 PE设备的物理入接口 MAC地址发生变化后, 在所述新的 PE设备上重新配置所述虚 拟 MAC地址; 不重新配置所述运营商核心设备上的转发表项。  When the new PE device is used to replace the destination PE device of the service tunnel in the MAC-in-Mac network, after the physical inbound MAC address of the new PE device changes, the new PE device is changed. The virtual MAC address is reconfigured; the forwarding entry on the carrier core device is not reconfigured.
7、 根据权利要求 1所述的方法, 其特征在于, 所述的业务隧道包括运营商骨干网 传输 PBT隧道。  The method according to claim 1, wherein the service tunnel comprises an operator backbone network to transmit a PBT tunnel.
8、 根据权利要求 1所述的方法, 其特征在于, 所述的运营商核心设备包括交换机 和 /或其它运营商设备。 8. The method according to claim 1, wherein the carrier core device comprises a switch and/or other carrier device.
9、 根据权利要求 2所述的方法, 其特征在于, 所述的目的端 PE设备包括: 业务隧 道的两端 PE设备。 The method according to claim 2, wherein the destination PE device comprises: PE devices at both ends of the service tunnel.
10、 一种在以太网应用的业务隧道中进行报文传输的系统, 其特征在于, 包括- PE设备: 配置有一个或多个虚拟 MAC地址, 用于标识 PE设备之间的 MAC- in-Mac组网 中的一个或多个业务隧道;  A system for transmitting a message in a service tunnel of an Ethernet application, comprising: - a PE device: configured with one or more virtual MAC addresses, which are used to identify a MAC-in- between PE devices. One or more service tunnels in the Mac network;
运营商核心设备: 使用所述 PE设备上配置的一个或多个虚拟 MAC地址来配置所述 MAC- in- Mac组网中的相应的业务隧道的目的地址; 并根据配置的虚拟 MAC地址来建立针 对所述业务隧道的转发表项, 利用该转发表项在所述业务隧道中进行报文传输。  The carrier core device: uses one or more virtual MAC addresses configured on the PE device to configure a destination address of a corresponding service tunnel in the MAC-in-Mac network; and establishes according to the configured virtual MAC address. For the forwarding entry of the service tunnel, the forwarding entry is used to perform packet transmission in the service tunnel.
PCT/CN2006/003311 2006-03-13 2006-12-06 A method for forwarding message in the service tunnel of the ethernet application and a system thereof WO2007104201A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CNA2006100574105A CN1897596A (en) 2006-03-13 2006-03-13 Method and system for controlling access address by virtual medium in Ethernet
CN200610057410.5 2006-03-13

Publications (1)

Publication Number Publication Date
WO2007104201A1 true WO2007104201A1 (en) 2007-09-20

Family

ID=37609968

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2006/003311 WO2007104201A1 (en) 2006-03-13 2006-12-06 A method for forwarding message in the service tunnel of the ethernet application and a system thereof

Country Status (2)

Country Link
CN (1) CN1897596A (en)
WO (1) WO2007104201A1 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101364926B (en) * 2007-08-08 2011-06-01 华为技术有限公司 Method and apparatus for network protection
CN101146054B (en) * 2007-11-09 2012-04-18 杭州华三通信技术有限公司 Packet forward method and device under PBT multi-point-to-point mode
CN101499950B (en) * 2008-01-30 2011-12-28 华为技术有限公司 Service provider backbone transmission ring multicast method, multicast ring network and node equipment
CN101286922B (en) * 2008-05-05 2011-02-09 华为技术有限公司 Signalling control method, system and apparatus
CN102148735B (en) * 2010-02-10 2013-07-10 成都市华为赛门铁克科技有限公司 Virtual link establishing method, communication network element and Ethernet network system
US9231831B2 (en) * 2012-11-15 2016-01-05 Industrial Technology Research Institute Method and network system of converting a layer two network from a spanning tree protocol mode to a routed mesh mode without a spanning tree protocol

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030142674A1 (en) * 2002-01-30 2003-07-31 Nortel Networks Limited Label control method and apparatus for virtual private LAN segment networks
CN1671122A (en) * 2004-03-19 2005-09-21 港湾网络有限公司 Method for implementing message forwarding along RPR ring and RPR network
WO2006002230A2 (en) * 2004-06-23 2006-01-05 Nortel Networks Limited Backbone provider bridging networks

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030142674A1 (en) * 2002-01-30 2003-07-31 Nortel Networks Limited Label control method and apparatus for virtual private LAN segment networks
CN1671122A (en) * 2004-03-19 2005-09-21 港湾网络有限公司 Method for implementing message forwarding along RPR ring and RPR network
WO2006002230A2 (en) * 2004-06-23 2006-01-05 Nortel Networks Limited Backbone provider bridging networks

Also Published As

Publication number Publication date
CN1897596A (en) 2007-01-17

Similar Documents

Publication Publication Date Title
JP5106100B2 (en) Differential transfer in addressed carrier networks
EP2051450B1 (en) Method and system for forwarding data between a plurality of provider ethernet networks
US9166807B2 (en) Transmission of layer two (L2) multicast traffic over multi-protocol label switching networks
US8228928B2 (en) System and method for providing support for multipoint L2VPN services in devices without local bridging
US7643424B2 (en) Ethernet architecture with data packet encapsulation
EP3499809B1 (en) Point-to-multipoint functionality in a network with bridges
US20140314090A1 (en) Method and System for Forwarding Data in Layer-2 Network
US20080080535A1 (en) Method and system for transmitting packet
US20040202199A1 (en) Address resolution in IP interworking layer 2 point-to-point connections
WO2011113340A1 (en) Access method and apparatus for multi-protocol label switching layer 2 virtual private network
WO2007076678A1 (en) A data transfer method and a switching equipment
WO2007147340A1 (en) Method, system and device of the ethernet technique exchanging and forwarding
JPH1141272A (en) Lan internet connection
EP1559245A1 (en) Methods and apparatus for broadcast domain interworking
WO2011103764A1 (en) Method for sending ethernet frames in ethernet tree service and provider edge device
US8873431B1 (en) Communications system and method for maintaining topology in a VLAN environment
WO2009092241A1 (en) A message transmitting method, network system and node equipment based on ring
WO2009135392A1 (en) Method, system and device of signaling control
WO2013139159A1 (en) Method for forwarding packet in network and provider edge device
WO2007062592A1 (en) A system, a method, and a router device of layer 2 virtual private network for interconnecting point/multi-points and multi-points
JP2002247089A (en) Packet routing method and device
WO2012092779A1 (en) Service protection method in pbb h-vpls network
WO2011160464A1 (en) Method for forwarding message and switch chip
WO2007104201A1 (en) A method for forwarding message in the service tunnel of the ethernet application and a system thereof
US20100254396A1 (en) Method of connecting vlan systems to other networks via a router

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 06828261

Country of ref document: EP

Kind code of ref document: A1