WO2008025279A1 - Système, procédé et appareil pour mettre en œuvre un transfert de message - Google Patents

Système, procédé et appareil pour mettre en œuvre un transfert de message Download PDF

Info

Publication number
WO2008025279A1
WO2008025279A1 PCT/CN2007/070472 CN2007070472W WO2008025279A1 WO 2008025279 A1 WO2008025279 A1 WO 2008025279A1 CN 2007070472 W CN2007070472 W CN 2007070472W WO 2008025279 A1 WO2008025279 A1 WO 2008025279A1
Authority
WO
WIPO (PCT)
Prior art keywords
mac
service instance
packet
instance number
local area
Prior art date
Application number
PCT/CN2007/070472
Other languages
English (en)
Chinese (zh)
Inventor
Qianying Zhu
Bing Liang
Jinhua Ye
Original Assignee
Huawei Technologies Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co., Ltd. filed Critical Huawei Technologies Co., Ltd.
Publication of WO2008025279A1 publication Critical patent/WO2008025279A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]

Definitions

  • the present invention relates to the field of communication technologies, and in particular, to a message transmission system, method and apparatus. Background of the invention
  • Ethernet has become one of the most popular solutions.
  • the MAC-IN-MAC network exchanges and transmits data based on the carrier network MAC address, that is, the physical address of the network. Since the switching and transmission of data frames are performed inside the carrier network, and the user's Ethernet frame is encapsulated in the MAC-IN-MAC tunnel and transmitted only as data, this technology implements the user MAC address and the carrier. The purpose of the overlap of network MAC addresses.
  • MAC-IN-MAC Since the protocol for MAC-IN-MAC is just in the draft stage, there is no mature implementation technology at present, but according to the current architecture of network equipment, it is generally implemented on a Layer 3 switch.
  • MAC-IN-MAC based processing is implemented by means of a network processor (NP) and a switching network.
  • the network processor (NP) receives the Ethernet packet sent by the downlink device, and then sends the packet to the switching network board.
  • the switching network forwards the packet to the corresponding uplink interface board according to the destination port number.
  • the network processor (NP) performs the MAC-IN-MAC encapsulation process.
  • the interface board receives the MAC-IN-MAC packet, and the network processor (NP) completes the packet identification and de-encapsulation, and learns and aging the MAC address. After processing, the packet is uploaded to the switching network. Forward to the corresponding Downstream port.
  • NP network processor
  • a large part of current network equipment is a pure Ethernet switch, and the network processor (NP) cannot be used to implement an end-to-end MAC-IN-MAC solution.
  • the core chip of a pure Ethernet switch is a Layer 2 switch chip, and its core switch chip only forwards packets through the MAC and the virtual LAN, and cannot recognize the frame structure of the MAC-IN-MAC message. Summary of the invention
  • the embodiment of the invention provides a message transmission system, method and device based on the MAC-IN-MAC protocol, thereby realizing the identification and transmission of MAC-IN-MAC messages between pure Layer 2 switching devices.
  • a device for transmitting a message based on the MAC-IN-MAC protocol including,
  • the encapsulation information obtaining module is configured to obtain MAC-IN-MAC header information according to the virtual local area network user number and the user destination physical address in the received virtual local area network message;
  • the encapsulating module is configured to encapsulate the virtual local area network packet according to the MAC-IN-MAC packet header information to form a MAC-IN-MAC packet.
  • a device for transmitting a message based on the MAC-IN-MAC protocol including,
  • the decapsulation information obtaining module is configured to obtain a encapsulation mode according to the service instance number in the received MAC-IN-MAC packet.
  • a decapsulation module configured to decapsulate the MAC-IN-MAC packet according to the encapsulation mode, to obtain a virtual local area network message.
  • a system for transmitting a message based on the MAC-IN-MAC protocol including
  • the Layer 2 switching device is configured to receive the virtual LAN packet and send the virtual LAN packet.
  • the network-side interface board is configured to receive the virtual LAN packet sent by the Layer 2 switching device, according to the virtual local area network user number and the user purpose in the virtual local area network text. Physical address acquisition
  • the virtual LAN packet is encapsulated to form a MAC-IN-MAC packet, and the MAC-IN-MAC packet is sent out.
  • a system for transmitting a message based on the MAC-IN-MAC protocol including
  • the network side interface board is configured to receive the MAC-IN-MAC packet, obtain the encapsulation mode according to the service instance number in the MAC-IN-MAC packet, and solve the MAC-IN-MAC packet according to the encapsulation mode. Encapsulate, get a virtual LAN message,
  • the Layer 2 switching device is configured to receive the virtual LAN packet sent by the network side interface board, and send the virtual local area network packet.
  • a method for transmitting a message based on the MAC-IN-MAC protocol comprising:
  • the MAC-IN-MAC packet is sent to the MAC-IN-MAC tunnel.
  • a method for transmitting a message based on the MAC-IN-MAC protocol comprising:
  • the encapsulation mode is obtained according to the service instance number in the MAC-IN-MAC packet, and the MAC-IN-MAC packet is decapsulated according to the encapsulation mode to obtain a virtual local area network packet.
  • the technical solution provided by the embodiment of the present invention can support MAC-IN-MAC protocol processing in a pure virtual local area network switching system with a Layer 2 switch chip as a core switch chip, and expands the switching service of the virtual local area network switch, thereby avoiding Layer 2 switching. Defects with limited chip functionality. Moreover, it can support multiple services such as a virtual private network (VPN) and a traffic engineering of a Layer 2 switching chip based on MAC-IN-MAC packets in a pure Ethernet switching system using a Layer 2 switching chip as a core switching chip.
  • VPN virtual private network
  • FIG. 1 is a schematic diagram of a message transmission system based on a MAC-IN-MAC protocol according to an embodiment of the present invention
  • FIG. 2 is a flowchart of a method for encapsulating an Ethernet packet into a MAC-IN-MAC according to an embodiment of the present invention
  • FIG. 3 is a flowchart of decapsulating a MAC-IN-MAC packet according to an embodiment of the present invention
  • FIG. 4 is a schematic structural diagram of a system for transmitting a packet based on a MAC-IN-MAC protocol according to an embodiment of the present invention
  • FIG. 5 is a schematic structural diagram of an embodiment of a network interface board according to the present invention.
  • FIG. 6 is a schematic structural view of another embodiment of a mesh panel according to the present invention.
  • FIG. 7 is a schematic structural diagram of still another embodiment of a network interface board according to the present invention. Mode for carrying out the invention
  • the MAC-IN-MAC-based packet transmission scheme provided by the present invention is configured to encapsulate the Ethernet packet into a MAC-IN-MAC packet and the basic configuration of the Layer 2 Ethernet switch.
  • the MAC-IN-MAC grammar is encapsulated into Ethernet 4 ⁇ text processing, so that the Layer 3 device is not required, and the Ethernet packet can be transmitted by using the MAC-IN-MAC protocol, thereby reducing the cost.
  • the system for transmitting packets based on the MAC-IN-MAC protocol in this embodiment includes a local Layer 2 switching device (such as an Ethernet switch) and a peer Layer 2 switching device.
  • the LAN packet (VLAN packet) transmitted from the user-side interface board is sent to the network-side interface board of the local Layer 2 switching device through the core switching chip (the Layer 2 switching chip) of the local switching device.
  • the network-side interface board of the layer switching device converts the received VLAN packets into MAC-IN-MAC packets and sends them to the MAC-IN-MAC tunnel.
  • the network-side interface board of the peer-layer Layer 2 switching device receives the MAC-IN-MAC packet of the MAC-IN-MAC tunnel and converts the MAC-IN-MAC packet into a VLAN packet.
  • the network cable connected to the network interface board of the peer Layer 2 switching device carries the MAC-IN-MAC tunnel.
  • the local Layer 2 switching device and the peer Layer 2 switching device are both Ethernet switches, and the VLAN text is taken as an example.
  • VLAN table virtual local area network table
  • C- virtual local area network user number
  • SID service instance number
  • Table 1 mainly includes the following information: whether MAC-IN-MAC encapsulation is required for the virtual local area network; a service instance number (hereinafter referred to as a service instance number) that identifies the carrier network; and a limitation of MAC address learning for the virtual local area network frequency.
  • the virtual local area network table structure is as shown in Table 1:
  • V line 0 BIT [31] 0 this virtual LAN is invalid
  • This virtual LAN has learned the MAC address
  • the physical address table is configured, including the mapping between the service instance number, the physical destination address of the user, and the physical destination address of the network.
  • the structure is as shown in Table 2:
  • P-MAC DA peer network side destination MAC address MAC, 48b it line 4 BIT[31:0]
  • PNOD line 5 BIT[30:16] parent node address, 15b it
  • the network destination physical address can be known.
  • the service instance number and the user destination physical address can be used as an index to look up the physical address table.
  • the index has a total of 76 bits (service instance number: 28 bits, user destination physical address: 48 bits), that is, 2 76 entries. Even if each entry only supports 64 bits, the entire table size reaches 2 76 *64 bits.
  • the external RAM is generally only 8 ⁇ 36Mbit, which is difficult to meet the demand, so the hash algorithm can be used to shorten the index.
  • Physical address table index Since the hash algorithm inevitably brings conflicts (the essence of the hash algorithm is to map the large space corresponding to ⁇ to the small space corresponding to ⁇ , two different ⁇ may get the same ⁇ ), so design this physics
  • the address table is in the form of a hash. The different indexes ( ⁇ ) of the same table entry address ( ⁇ ) are strung together by a chain.
  • ⁇ 1, ⁇ 2 obtains ⁇ by hashing, then the first one
  • the node (parent node) stores the information, and at the same time, the table entry has an address pointer to the child node storing the ⁇ 2 information, so that ⁇ 2 can be found along the ⁇ .
  • the MAC-IN-MAC-based packet transmission needs to be configured with a virtual local area network label.
  • the label is used to carry multiple service instances and is mapped by the service instance number. Therefore, a BTAG table needs to be configured on the network side interface board. It can be used to find the carrier virtual LAN label ( ⁇ -VLAN TAG) and encapsulation mode through the service instance number.
  • the table structure is as shown in the table.
  • the service instance number is 28 bits, the service instance number can also be hashed here to get the BTAG table index.
  • the hash algorithm can adopt the same algorithm as step 103, and details are not described herein again.
  • converting an Ethernet packet to a MAC-IN-MAC may include the following steps:
  • Step 101 The Ethernet packet sent from the user interface board carries a virtual local area network (C-VLAN ID), a user source physical address (C-MAC SA), and a user destination physical address (C-MAC DA). Wait.
  • the network-side interface board of the local Ethernet switch searches the virtual local area network table by using the virtual local area network user number in the Ethernet packet to determine whether the Ethernet packet needs to be encapsulated in MAC-IN-MAC. If necessary, the service instance number of the identifier carrier network allocated for the virtual local area network is obtained according to the virtual local area network user number included in the Ethernet packet.
  • Step 102 Perform a hash operation on the physical destination address of the user and the service instance number obtained in step 101 to obtain a 16-bit physical address table index.
  • Step 103 Find a physical address table by using the obtained physical address table index, and determine whether the physical destination address and the service instance number corresponding to the physical address table index match the user destination physical address of the user and the service instance number obtained in step 101. If yes, step 104 is performed, and if not, step 105 is performed.
  • Step 104 The memory direct access value (P-MAC DA value) stored in the physical address table is taken as the physical destination address of the network, that is, the carrier network destination address is obtained, and then step 106 is performed.
  • P-MAC DA value The memory direct access value
  • Step 105 Check whether the entry in the physical address table is a link end. If not, find the next node according to the address pointer of the next child node in the entry until the matching node is found; if a matching node is found , the P-MAC DA value stored in the physical address table is taken as the physical destination address of the network, that is, the destination address of the carrier network is obtained, After step 106 is performed. If no matching node is found at the end of the list, the packet is encapsulated with a Layer 2 broadcast address (all F) broadcast to all network physical addresses.
  • All F Layer 2 broadcast address
  • Step 106 Perform a hash operation on the service instance number to obtain an index of the BTAG table, and use the BTAG table index to search the BTAG table to obtain a carrier virtual local area network label (P-VLAN TAG) and a encapsulation mode.
  • P-VLAN TAG carrier virtual local area network label
  • Step 107 Determine whether the obtained encapsulation mode is a transparent mode or an STAG mode.
  • the MAC-IN-MAC protocol supports two encapsulation modes: transparent mode and STAG mode.
  • Step 108 If the obtained encapsulation mode is STAG mode, the outer VLAN is popped up, and then the MAC-IN-MAC packet header (including the service instance number, the network destination physical address, and the carrier virtual local area network label) is added, and is recalculated.
  • the CRC replaces the original CRC field.
  • the CRC32 algorithm specified by IEEE802.1ah can be used.
  • Step 109 If the obtained encapsulation mode is transparent mode, the original message (including CRC) is regarded as a payload, and the MAC-IN-MAC3 ⁇ 4 header and the new CRC field are added.
  • the CRC32 algorithm specified by IEEE802.1ah can be used.
  • the peer Layer 2 switching device transmits the MAC-IN-MAC file to the local device (such as an Ethernet switch) by the peer interface board
  • the MAC-IN-MAC tunnel is transmitted.
  • the MAC-IN-MAC packet decapsulation process is performed on the network-side interface board, and the Ethernet packet is transmitted to the Layer 2 switch chip and transmitted by the user-side interface board.
  • the MAC-IN-MAC3 packet decapsulation may include the following steps:
  • Step 201 Receive a MAC-IN-MAC packet of the MAC-IN-MAC tunnel, and determine, according to the packet header carried in the packet, that the packet is a MAC-IN-MAC packet.
  • Step 202 Perform a hash operation on the service instance number in the MAC-IN-MAC packet header.
  • the BTAG table index is obtained, and the BTAG table is indexed by the BTAG table index (Table 3) to obtain the encapsulation mode of the packet when it enters the tunnel.
  • Step 203 Determine whether the obtained encapsulation mode is a transparent mode or an STAG mode. If the STAG mode is performed in step 204, if it is in the transparent mode, step 205 is performed.
  • Step 204 Check the BTAG table through the BTAG table index to obtain the outer VLAN value, add the outer VLAN value found at the same time as the MAC-IN-MAC packet header is popped up, and recalculate the CRC byte (CRC32 algorithm). Then it is sent to the Layer 2 switch chip.
  • Step 205 The MAC-IN-MAC packet header and the last CRC byte are directly popped up, and the Ethernet packet is returned to the Layer 2 switch chip.
  • Step 206 Perform physical address table maintenance on the physical destination address and service table of the network destination carried in the MAC-IN-MAC packet.
  • the network side interface board can have a 24K address space, wherein 16K stores the link header, and 8K stores the linked list information of the conflict address.
  • the MAC address limit of the current virtual local area network is detected from the virtual local area network table. According to the MAC address limit and the number of learned, if the limit has been reached, no learning is performed; if not, the physical destination address of the user is performed together with the service instance number. Hash operation, to find the physical address table, if the P-MAC DA value matching the packet is found, indicating that the MAC address has been learned, the entry is not refreshed; if no matching value is found, Then add the P-MAC DA carried in the packet to the physical address table. After learning, refresh the number of counters in the virtual local area network table.
  • an aging mechanism can be introduced to prevent the unused entries from occupying the storage space. If the specified entry does not receive the corresponding entry in the table.
  • FIG. 4 is a schematic structural diagram of a system for transmitting a message based on a MAC-IN-MAC protocol according to an embodiment of the present invention.
  • the system may include a local network side interface board and a peer network side connection. Mouth board.
  • the local network side interface board is connected to the local Layer 2 switching device.
  • the peer network side interface board is connected to the peer Layer 2 switching device.
  • the local network side interface board is connected to the peer network side interface board through a network cable and is used to carry the MAC-IN-MAC tunnel.
  • the local Layer 2 switching device has a core switching chip (a Layer 2 switching chip), which can receive Ethernet packets sent from the user-side interface, and send the Ethernet packets to the local network side interface.
  • a core switching chip a Layer 2 switching chip
  • the local network side interface board is configured with a local packet conversion chip, which is used to encapsulate the received Ethernet packet into a MAC-IN-MAC packet, and the encapsulated MAC-IN-MAC packet is passed through the MAC- The IN-MAC tunnel is sent to the peer network side interface board.
  • the local packet conversion chip adopts a packaging method similar to that of Embodiment 1, and is not mentioned here.
  • a peer packet conversion chip is configured on the peer network side interface board to receive the MAC-IN-MAC packet of the MAC-IN-MAC tunnel, and decapsulate the MAC-IN-MAC packet into an Ethernet. Message.
  • the peer packet conversion chip adopts a decapsulation method similar to that of Embodiment 2, and details are not described herein again.
  • the peer network-side interface board sends the decapsulated Ethernet packets to the peer Layer 2 switch chip.
  • Fig. 5 shows an embodiment of a schematic diagram of the structure of the local end network.
  • the local network side interface board may further include a storage module, configured to store a preset VLAN table, a physical address table, and a BTAG table.
  • the local end conversion chip may include an encapsulation information acquisition module and an encapsulation module, and the encapsulation information acquisition module is configured to obtain MAC-IN-MAC related information, and may include a service instance number acquisition module and a network destination physical address acquisition module. , encapsulation mode acquisition module and package module.
  • the service instance number obtaining module is configured to search the VLAN table in the storage module according to the virtual local area network user number, obtain the service instance number of the identifier carrier network allocated for the virtual local area network, and send the physical address and the encapsulation mode of the network destination to the network.
  • the network destination physical address obtaining module is configured to hash the service instance number obtained by the service instance number obtaining module and the physical destination address of the user carried in the Ethernet packet, obtain a physical address table index, and search and store according to the physical address table index.
  • the physical address table in the module obtains the physical destination address of the network and sends it to the encapsulation module.
  • the encapsulation mode obtaining module is configured to perform hash operation on the service instance number to obtain
  • the BTAG table index is used to search the BTAG table in the storage module according to the BTAG table index, and obtain the operator virtual local area network label and encapsulation mode, and send the label to the encapsulation module.
  • the encapsulating module is configured to encapsulate the received Ethernet packet according to the encapsulation mode, and obtain a MAC-IN-MAC packet.
  • the encapsulating module first determines whether the encapsulation mode sent by the encapsulation mode acquisition module is a transparent mode or an STAG mode.
  • the outer VLAN of the Ethernet packet is popped up, and then the MAC-IN-MAC encapsulation header (including the service instance number, the network destination physical address, and the carrier virtual LAN label) is added, and Calculate the CRC to replace the original CRC field.
  • the CRC32 algorithm specified by IEEE802.1ah can be used.
  • the original message (including CRC) is regarded as the payload, and the MAC-IN-MAC packet header and the new CRC field are added. Can be used here
  • the local network ⁇ port sends the encapsulated MAC-IN-MAC packet
  • the peer network side interface board may further include a storage module, configured to store a preset VLAN table, a physical address table, and a BTAG table.
  • the peer packet conversion chip may include a decapsulation mode and a decapsulation module.
  • the decapsulation mode obtaining module is configured to use the service instance number in the MAC-IN-MAC packet header.
  • the hash operation is performed to obtain the BTAG table index, and the BTAG table is searched for the BTAG table (Table 3) to obtain the encapsulation mode and the outer VLAN value of the packet when it enters the tunnel, and is sent to the decapsulation module.
  • the decapsulation module first determines whether the obtained encapsulation mode is a transparent mode or an STAG mode. If the STAG mode is performed in step 204, if it is in the transparent mode, step 205 is performed.
  • the decapsulation module adds the outer VLAN value found at the same time as the MAC-IN-MAC header is popped up, and recalculates the CRC byte (CRC32 algorithm), and then sends it to the Layer 2 switch chip.
  • the decapsulation module directly pops up the MAC-IN-MAC packet header and the last CRC byte, and restores the Ethernet packet to the Layer 2 switch chip.
  • the peer network side interface board may further include an update module for refreshing the physical address table stored in the storage module.
  • the step of updating the physical address table by the update module is similar to that described in Embodiment 2 and will not be described here.
  • the device that receives the MAC-IN-MAC packet may be provided by the embodiment of the present invention.
  • the peer Layer 2 switching device can also be other devices that can identify MAC-IN-MAC packets.
  • the peer layer 2 switching device provided by the foregoing embodiment of the present invention can receive the MAC-IN-MAC packet sent by the local layer 2 switching device provided by the embodiment of the present invention, and can also receive the MAC-IN sent by other devices. -MAC message. Therefore, according to another embodiment of the present invention, the network side interface board may also include both a packaging function and a decapsulation function.
  • the network side interface board may include only one storage module, and is used to store a preset VLAN table, a physical address table, and a BTAG table.
  • a network interface board that includes both a package function and a decapsulation function is shown.
  • the network interface board may include a message exchange chip and a storage module.
  • the file exchange chip may include a package function module and a decapsulation function module.
  • the package function module may include a service instance number acquisition module, a network destination physical address acquisition module, a package mode acquisition module, and a package module.
  • the service instance number obtaining module is configured to search the VLAN table in the storage module according to the virtual local area network user number, obtain the service instance number of the identifier carrier network allocated for the virtual local area network, and send the physical address and the encapsulation mode of the network destination to the network. Block and package modules.
  • the network destination physical address obtaining module is configured to hash the service instance number obtained by the service instance number obtaining module and the physical destination address of the user carried in the Ethernet packet, obtain a physical address table index, and search and store according to the physical address table index.
  • the physical address table in the module obtains the physical destination address of the network and sends it to the encapsulation module.
  • the encapsulation mode acquisition module is configured to perform a hash operation on the service instance number, obtain an index of the BTAG table, and search the BTAG table in the storage module according to the BTAG table index, obtain the carrier virtual local area network label and the encapsulation mode, and send the label to the encapsulation module.
  • the encapsulating module is configured to encapsulate the received Ethernet packet according to the encapsulation mode, and obtain a MAC-IN-MAC packet.
  • the encapsulating module first determines whether the encapsulation mode sent by the encapsulation mode acquisition module is a transparent mode or an STAG mode.
  • the outer VLAN of the Ethernet packet is popped up, and then the MAC-IN-MAC encapsulation header (including the service instance number, the network destination physical address, and the carrier virtual LAN label) is added, and Calculate the CRC to replace the original CRC field.
  • the CRC32 algorithm specified by IEEE802.1ah can be used.
  • the original message (including CRC) is regarded as the payload, and the MAC-IN-MAC packet header and the new CRC field are added. Can be used here
  • the decapsulation function module may include a decapsulation mode acquisition module and a decapsulation module.
  • the decapsulation mode obtaining module is configured to perform a hash operation on the service instance number in the MAC-IN-MAC packet header, obtain an index of the BTAG table, and use the BTAG table index to check the BTAG table (Table 3), and obtain the packet in the entry.
  • the encapsulation mode and outer VLAN value of the tunnel are sent to the decapsulation module.
  • the decapsulation module first determines whether the obtained encapsulation mode is a transparent mode or an STAG mode. If it is STAG mode, the decapsulation module adds the outer VLAN value found at the same time as the MAC-IN-MAC header is popped up, and recalculates the CRC byte (CRC32 algorithm), and then sends it to the Layer 2 switch chip.
  • STAG mode the decapsulation module adds the outer VLAN value found at the same time as the MAC-IN-MAC header is popped up, and recalculates the CRC byte (CRC32 algorithm), and then sends it to the Layer 2 switch chip.
  • the decapsulation module directly pops up the MAC-IN-MAC packet header and the last CRC byte, and restores the Ethernet packet to the Layer 2 switch chip.
  • the network side interface board may further include an update module for refreshing the physical address table stored in the storage module.
  • the step of updating the physical address table by the update module is similar to that described in Embodiment 2, and details are not described herein again.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

L'invention concerne un système, un procédé et un appareil pour mettre en œuvre le transfert de message sur la base du protocole MAC-IN-MAC. Une mise en œuvre pour l'appareil peut comprendre : un module d'acquisition d'informations de paquetage, acquérant les informations d'en-tête MAC-IN-MAC sur la base de l'identifiant (ID) de l'utilisateur VLAN et de l'adresse physique à visée utilisateur dans le message VLAN reçu ; un module de paquetage, empaquetant le message VLAN sur la base des informations d'en-tête MAC-IN-MAC pour former un message MAC-IN-MAC. À l'aide de la solution de l'invention, un appareil à deux couches peut identifier et transférer le message MAC-IN-MAC, sans NP, et l'objectif de transférer le message à faible coût est réalisé.
PCT/CN2007/070472 2006-08-23 2007-08-14 Système, procédé et appareil pour mettre en œuvre un transfert de message WO2008025279A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CNA200610111345XA CN101132285A (zh) 2006-08-23 2006-08-23 一种实现mac-in-mac的系统及方法
CN200610111345.X 2006-08-23

Publications (1)

Publication Number Publication Date
WO2008025279A1 true WO2008025279A1 (fr) 2008-03-06

Family

ID=39129418

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2007/070472 WO2008025279A1 (fr) 2006-08-23 2007-08-14 Système, procédé et appareil pour mettre en œuvre un transfert de message

Country Status (2)

Country Link
CN (1) CN101132285A (fr)
WO (1) WO2008025279A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117938989A (zh) * 2024-03-18 2024-04-26 湖南戎腾网络科技有限公司 5g信令与用户数据的关联方法、装置、设备及存储介质

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2489172B1 (fr) 2010-05-28 2020-03-25 Huawei Technologies Co., Ltd. Couche virtuelle 2 et mécanisme pour la rendre évolutive
JP5830093B2 (ja) 2010-06-29 2015-12-09 ホアウェイ・テクノロジーズ・カンパニー・リミテッド 非対称ネットワーク・アドレス・カプセル化
CN101986666B (zh) * 2010-11-05 2013-07-24 清华大学 基于虚拟网络接口和反向地址转换的网络数据传输方法
CN102143072B (zh) * 2011-03-21 2013-12-04 北京华为数字技术有限公司 一种进行流控配置的方法和网络设备
CN102420760A (zh) * 2011-12-02 2012-04-18 盛科网络(苏州)有限公司 通过以太网封装包处理头来实现芯片间转发的方法及装置
WO2014089746A1 (fr) * 2012-12-10 2014-06-19 华为技术有限公司 Procédé et dispositif de réacheminement de messages
CN104539477B (zh) * 2014-12-15 2017-10-27 国家计算机网络与信息安全管理中心 一种对多条以太线路报文信息采集的方法

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1474564A (zh) * 2002-08-05 2004-02-11 ��Ϊ�������޹�˾ 一种虚拟局域网之间的通信方法
CN1691629A (zh) * 2004-04-30 2005-11-02 华为技术有限公司 在基于弹性分组环的网络中实现二层设备互连的方法
CN1738296A (zh) * 2005-09-12 2006-02-22 中兴通讯股份有限公司 一种在不同类型网络间实现虚交换的方法

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1474564A (zh) * 2002-08-05 2004-02-11 ��Ϊ�������޹�˾ 一种虚拟局域网之间的通信方法
CN1691629A (zh) * 2004-04-30 2005-11-02 华为技术有限公司 在基于弹性分组环的网络中实现二层设备互连的方法
CN1738296A (zh) * 2005-09-12 2006-02-22 中兴通讯股份有限公司 一种在不同类型网络间实现虚交换的方法

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117938989A (zh) * 2024-03-18 2024-04-26 湖南戎腾网络科技有限公司 5g信令与用户数据的关联方法、装置、设备及存储介质

Also Published As

Publication number Publication date
CN101132285A (zh) 2008-02-27

Similar Documents

Publication Publication Date Title
WO2008025279A1 (fr) Système, procédé et appareil pour mettre en œuvre un transfert de message
CN107370674B (zh) 一种数据传输的方法、设备和系统
JP6032278B2 (ja) Lan多重化装置
US7130303B2 (en) Ethernet packet encapsulation for metropolitan area ethernet networks
US8472438B2 (en) Efficient encapsulation of packets transmitted on a packet-pseudowire over a packet switched network
ES2450644T3 (es) Método, dispositivo y sistema de gestión de etiqueta de red de acceso
WO2009012688A1 (fr) Procédé, système et appareil de réacheminement de message dans un réseau privé virtuel à trois couches
WO2005107176A1 (fr) Procede pour le transfert de message dans un reseau en boucle souple a commutation par paquets
EP1903723A1 (fr) Méthode et appareil de transmission de message
AU2011244044A1 (en) Efficient encapsulation of packets transmitted on a packet-pseudowire over a Packet Switched Network
WO2008083570A1 (fr) Procédé et dispositif d'unité réseau pour transférer le message de test
CN107770072B (zh) 一种发送和接收报文的方法和设备
WO2009021371A1 (fr) Procédé et dispositif permettant de réaliser une émulation pseudo-filaire de bout en bout
WO2007085198A1 (fr) Procédé et système de transmission de données
TWI667899B (zh) 電子設備及用於通訊的方法
WO2008080315A1 (fr) Procédé, équipement et système de transmission de données
JP2022537296A (ja) Evpnメッセージ転送方法、システム、記憶媒体及び端末
CN106330499A (zh) 一种时分复用数据的传输方法、装置及网络侧边缘设备
JP5242702B2 (ja) Ipインターワーキングvllを介する回線エミュレーション
WO2012109864A1 (fr) Procédé et dispositif de transfert de messages
JP2005012381A (ja) データ転送装置及びその方法並びにそれを用いたデータ通信システム及びプログラム
BR112012011620B1 (pt) Aparelho e método para acesso à emulação pseudo wire ponto-a-ponto
JP2022516355A (ja) データ送信方法及び機器
WO2007093095A1 (fr) Procédé pour mettre en oeuvre l'acheminement de messages mpls et équipement correspondant
CN115550104B (zh) Axi总线扩展方法、装置、电子设备及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07800948

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

NENP Non-entry into the national phase

Ref country code: RU

122 Ep: pct application non-entry in european phase

Ref document number: 07800948

Country of ref document: EP

Kind code of ref document: A1