WO2011057520A1 - 一种端到端伪线仿真接入的装置和方法 - Google Patents

一种端到端伪线仿真接入的装置和方法 Download PDF

Info

Publication number
WO2011057520A1
WO2011057520A1 PCT/CN2010/077093 CN2010077093W WO2011057520A1 WO 2011057520 A1 WO2011057520 A1 WO 2011057520A1 CN 2010077093 W CN2010077093 W CN 2010077093W WO 2011057520 A1 WO2011057520 A1 WO 2011057520A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
processing module
pwe3
emulation
frame format
Prior art date
Application number
PCT/CN2010/077093
Other languages
English (en)
French (fr)
Inventor
谢密
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Priority to KR1020127014015A priority Critical patent/KR101369138B1/ko
Priority to EP10829484.4A priority patent/EP2485437B1/en
Priority to JP2012539168A priority patent/JP5444474B2/ja
Priority to AU2010317300A priority patent/AU2010317300B2/en
Priority to US13/258,389 priority patent/US8824473B2/en
Priority to BR112012011620-7A priority patent/BR112012011620B1/pt
Priority to RU2012119181/08A priority patent/RU2517695C2/ru
Publication of WO2011057520A1 publication Critical patent/WO2011057520A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • H04L12/4645Details on frame tagging
    • H04L12/465Details on frame tagging wherein a single frame includes a plurality of VLAN tags
    • H04L12/4654Details on frame tagging wherein a single frame includes a plurality of VLAN tags wherein a VLAN tag represents a customer VLAN, e.g. C-Tag
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • H04L12/4645Details on frame tagging
    • H04L12/465Details on frame tagging wherein a single frame includes a plurality of VLAN tags
    • H04L12/4658Details on frame tagging wherein a single frame includes a plurality of VLAN tags wherein a VLAN tag represents a service provider backbone VLAN, e.g. B-Tag, S-Tag
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • H04L12/4645Details on frame tagging
    • H04L12/4666Operational details on the addition or the stripping of a tag in a frame, e.g. at a provider edge node

Definitions

  • the present invention relates to Pseudo Wire Emulation Edge-to-Edge (PWE3) technology, and more particularly to an apparatus and method for end-to-end pseudowire emulation access.
  • PWE3 Pseudo Wire Emulation Edge-to-Edge
  • PWE3 technology is a mechanism for simulating various point-to-point services on a packet switched network (PSN).
  • the simulated services can be time division multiplexed (TDM) private network, asynchronous transmission mode (ATM) network, and frame relay ( FR) Multiple networks such as networks or Ethernet.
  • TDM time division multiplexed
  • ATM asynchronous transmission mode
  • FR frame relay
  • the PWE3 technology uses the tunneling mechanism on the PSN to simulate the necessary attributes of the service.
  • the tunnel is called Pseudo Wire (PW).
  • PW Pseudo Wire
  • the operator can use PWE3 technology to transfer all the transmission services to a converged network.
  • the converged network can be an IP network or a multi-protocol label switching (MPLS) network. From the user's point of view, it can be considered
  • the PWE3 technology simulates a dedicated link or circuit.
  • FIG 1 is a schematic diagram of the structure of the service reference model of the PWE3 technology on the PSN proposed by the Internet Engineering Task Force (IETF).
  • the PE1 and the PE2 are the edge devices of the carrier, and the CE1 and CE2 are user edge devices.
  • One or more PWs are formed between PE 1 and PE2, that is, P WE3 channels.
  • the access link (AC) between the CE and the PE, the AC can be Ethernet, or the non-Ethernet such as the ATM network.
  • the CE is connected to the PE1 and the PE2 through the AC, the communication between the CE1 and the CE2 is implemented through the PW.
  • the PW is carried on the PSN tunnel, and the PSN tunnel determines the data forwarding path.
  • a PSN tunnel can carry multiple PWs.
  • CE1 and CE2 communicate with each other, the user data of CE1 is transmitted to PE1, and the PW label is encapsulated. Then, a tunnel label and a medium access control (MAC) address are encapsulated to form a data packet. The path of the data packet is established by the PW. After being transmitted to PE2, PE2 performs decapsulation on the received data packet and takes out the PW. The tag determines the egress circuit and sends the decapsulated user data to CE2.
  • the model shown in Figure 1 is a reference model for PWE3 technology in practical applications. This model can implement end-to-end pseudowire emulation access to Ethernet or non-Ethernet. The basic principle of the model is generally applicable in practical applications. The specific business needs are different, and the specific application methods of the model are also different.
  • the method for performing the end-to-end pseudowire emulation access to the non-Ethernet is to implement the PWE3 service through the multi-segment PW exchange, that is, the PW encapsulation of the data of the local user before the data is sent to the local PE, and the PW in the PW package.
  • the label is allocated by the local PE, where the PW is only the PW between the local user and the local PE; after receiving the data, the local PE needs to replace the PW label in the previous data with the PW label allocated by the peer PE.
  • the PW is the PW between the local PE and the peer PE, and is used by the local PE to send data to the peer PE.
  • the peer PE After receiving the data, the peer PE needs to replace the PW label to send the data to the peer user.
  • the local PE or the peer PE needs to allocate different PW labels to different users. If the local PE or the peer PE corresponds to multiple users, the PW labels of multiple users consume a lot of label space. Summary of the invention
  • the main object of the present invention is to provide an apparatus and method for end-to-end pseudowire emulation access, which can implement end-to-end pseudowire emulation access to non-Ethernet in the case of saving PE label space. It is possible to avoid switching PW tags multiple times.
  • the present invention provides an apparatus for end-to-end pseudowire emulation access, the apparatus comprising: an emulation processing module and a data processing module;
  • the emulation processing module is configured to: after receiving the non-Ethernet data sent by the local user, encapsulate the inner layer PWE3 frame format, and send the encapsulated data to the data processing module; and is also used to send the data processing module
  • the data decapsulated by the outer layer two-layer virtual private network (L2VPN) frame format performs decapsulation operation of the inner layer PWE3 frame format, and sends the decapsulated non-Ethernet data to the local user;
  • the data processing module is configured to perform encapsulation of the outer L2VPN frame format on the data encapsulated by the inner layer PWE3 frame format sent by the emulation processing module, and send the encapsulated data to the peer PE; After the data sent by the peer PE, the decapsulation operation of the outer L2VPN frame format is performed, and the decapsulated data is sent to the emulation processing module.
  • the data processing module further includes a Layer 2 virtual Ethernet interface (L2VE) module, configured to communicate between the data processing module and the simulation processing module, and the data processing module sends the data to the simulation processing module through the L2VE module, through the L2VE The module receives the data sent by the simulation processing module.
  • L2VE Layer 2 virtual Ethernet interface
  • the simulation processing module further includes an end-to-end pseudowire emulation virtual Ethernet interface PWE3 VE module, which is used for communication between the emulation processing module and the data processing module, and the emulation processing module sends data to the data processing through the PWE3 VE module.
  • the module receives data sent by the data processing module through the PWE3 VE module.
  • the emulation processing module includes one or more PWE3 VE modules.
  • the data processing module includes one or more L2VE modules, and the PWE3 VE module and the L2VE module are corresponding.
  • the invention also provides a method for end-to-end pseudowire emulation access, the method comprising: the local PE receiving the non-Ethernet data sent by the local user, and then encapsulating the inner layer PWE3 frame format; The data is encapsulated in an outer L2VPN frame format, and then the encapsulated data is sent to the peer PE;
  • the local PE After receiving the data sent by the peer PE, the local PE performs the decapsulation of the outer L2VPN frame format and the decapsulation operation of the inner PWE3 frame format, and then sends the decapsulated non-Ethernet data to the local device. user.
  • the local PE performs encapsulation of the inner layer PWE3 frame format, and is:
  • the emulation processing module in the local PE After receiving the non-Ethernet data sent by the local user, the emulation processing module in the local PE performs pseudowire PW encapsulation and PWE3 tunnel encapsulation on the received non-Ethernet data, and then performs virtual office.
  • the domain network VLAN is encapsulated, and the destination medium access control MAC address and the source MAC address are encapsulated, and the encapsulated data is transmitted to the data processing module in the local PE through the PWE3 VE module in the simulation processing module, and the data processing module passes The L2VE module set by itself receives data.
  • the destination MAC address is the MAC address of the peer user edge device CE; the source MAC address is the MAC address of the local user edge device CE.
  • the encapsulating the encapsulated data in an outer L2VPN frame format is specifically: after the data processing module in the local PE receives the encapsulation data sent by the emulation processing module,
  • PW encapsulation and L2VPN tunnel encapsulation then VLAN encapsulation, and encapsulation destination MAC address and source MAC address.
  • the destination MAC address is a MAC address of the peer PE; and the source MAC address is a MAC address of the local PE.
  • the local PE receives the non-Ethernet data sent by the local user, and then encapsulates the inner PWE3 frame format; and then performs the outer L2VPN on the encapsulated data. After the frame format is encapsulated, the encapsulated data is sent to the peer PE. After receiving the data sent by the peer PE, the local PE performs the decapsulation of the outer L2VPN frame format and the decapsulation operation of the inner PWE3 frame format. Then, the non-Ethernet data obtained by decapsulation twice is sent to the local user.
  • the local user and the peer user have established a PWE3 connection relationship between the two parties in the transparent channel provided by the L2VPN, and the data is transmitted between the PEs at both ends through the same L2VPN tunnel for multiple groups of users, so the outer L2VPN
  • the PWs in the frame format encapsulation are all the same value, which avoids the situation of multiple exchanges of PW tags in the prior art, thereby saving a large amount of label space of the PE.
  • FIG. 1 is a schematic structural diagram of a service reference model of a PWE3 technology on a PSN;
  • 2 is a schematic structural diagram of an apparatus for end-to-end pseudowire emulation access according to the present invention
  • 3 is a schematic flowchart of uplink data forwarding in an end-to-end pseudowire emulation access method according to the present invention
  • FIG. 4 is a schematic diagram of data structures before and after uplink data encapsulation of the present invention.
  • FIG. 5 is a schematic flow chart of downlink data forwarding in an end-to-end pseudowire emulation access method according to the present invention
  • FIG. 6 is a schematic diagram of data structures before and after decapsulating downlink data according to the present invention. detailed description
  • the device to be described in the present invention is the carrier edge device PE shown in FIG. 1.
  • the main function module in the existing PE is a service forwarding line card, and the service forwarding line card generally includes: an interface board, a data processing module, and a switch chip.
  • the data processing module may be a network processor or the like.
  • the present invention uses the Layer 2 virtual private network (L2VPN) technology to carry the PWE3 service, that is, the L2VPN service is configured between the PEs at both ends of the PSN network, and the L2VPN may be a virtual dedicated Local area network (VPLS), the inner layer PWE3 service is carried on the outer L2VPN service.
  • L2VPN Layer 2 virtual private network
  • VPLS virtual dedicated Local area network
  • the present invention implements an end-to-end pseudowire emulation access method for non-Ethernet based on the L2VPN technology, that is, realizes transmission of non-Ethernet data between users at both ends of the PSN network.
  • the basic idea of the present invention is that the local PE receives the non-Ethernet data sent by the local user and encapsulates the inner PWE3 frame format; and then encapsulates the encapsulated data in the outer L2VPN frame format, and then encapsulates the encapsulated data.
  • the data is sent to the peer PE;
  • the local PE After receiving the data sent by the peer PE, the local PE performs the decapsulation of the outer L2VPN frame format and the decapsulation operation of the inner PWE3 frame format, and then sends the decapsulated non-Ethernet data to the local device. user.
  • the apparatus includes: an emulation processing module and a data processing module;
  • the emulation processing module is configured to: after receiving the non-Ethernet data sent by the local user, encapsulate the inner layer PWE3 frame format, and send the encapsulated data to the data processing module; and is also used to send the data processing module
  • the decapsulated data in the outer L2VPN frame format performs decapsulation operation of the inner PWE3 frame format, and sends the decapsulated non-Ethernet data to the local user;
  • the data processing module is configured to perform encapsulation of the outer L2VPN frame format on the data encapsulated by the inner layer PWE3 frame format sent by the emulation processing module, and send the encapsulated data to the peer PE; After the data sent by the peer PE, the decapsulation operation of the outer L2VPN frame format is performed, and the decapsulated data is sent to the emulation processing module.
  • the data processing module further includes a Layer 2 virtual Ethernet interface (L2VE) module for communication between the data processing module and the simulation processing module, and the data processing module sends the data to the simulation processing module through the L2VE module, and receives the data through the L2VE module. Simulating the data sent by the processing module;
  • L2VE Layer 2 virtual Ethernet interface
  • the simulation processing module further includes an end-to-end pseudowire emulation virtual Ethernet interface (PWE3 VE) module for simulating communication between the processing module and the data processing module, and the emulation processing module sends data to the data processing through the PWE3 VE module.
  • the module receives data sent by the data processing module through the PWE3 VE module.
  • PWE3 VE pseudowire emulation virtual Ethernet interface
  • FIG. 3 is a schematic flowchart of uplink data forwarding in the method for end-to-end pseudowire emulation access according to the present invention. As shown in FIG. 3, the specific implementation steps of the process are as follows:
  • Step 301 Perform non-Ethernet data sent by the local user in an inner PWE3 frame format.
  • the non-Ethernet data sent by the local user first enters the emulation processing module, and the emulation processing module first performs PW encapsulation and PWE3 tunnel encapsulation on the received non-Ethernet data, and then performs virtual local area network (VLAN) encapsulation, and encapsulates the purpose.
  • VLAN virtual local area network
  • the PW is a PW between the local user and the peer user;
  • the PWE3 tunnel is an inner tunnel carrying the PWE3 service between the local user and the peer user, and the so-called inner tunnel is relative to the outer L2VPN tunnel;
  • the VLAN encapsulation is: encapsulating a VLAN ID corresponding to a PWE3 VE module;
  • the destination MAC address is a MAC address corresponding to a next hop of an inner layer tunnel carrying a PWE3 service, that is, a MAC address of a peer user edge device CE;
  • the source MAC address is the MAC address of the local user edge device CE.
  • the data structure diagram before and after the data encapsulation in this step is shown in FIG. 4 and (b), and is the non-Ethernet data before the encapsulation received by the emulation processing module, and the non-Ethernet data is shown in FIG. (b) is the encapsulated data format.
  • PW Labell and Tunnel Labell are the labels of the PW and PWE3 tunnels respectively.
  • SA1 and DA1 represent the source and destination MAC addresses respectively.
  • VLAN1 is the PWE3 VE module. VLAN ID.
  • the simulation processing module may include multiple PWE3 VE modules for establishing multiple inner layer tunnels, and thus different VLANs correspond to different PWE3 VEs; correspondingly, the data processing module may include multiple L2VE modules, PWE3 VE modules And the L2VE module is a corresponding relationship.
  • the local PE administrator configures the correspondence between the PWE3 VE module and the L2VE module and stores it in the local PE. in.
  • Step 302 Encapsulate the encapsulated data in an outer L2VPN frame format.
  • the data processing module after receiving the encapsulation data sent by the emulation processing module, the data processing module first performs PW encapsulation and L2VPN tunnel encapsulation, and then performs VLAN encapsulation, and encapsulates the destination MAC address and the source MAC address.
  • the PW is a PW between the local PE and the peer PE;
  • the L2VPN tunnel is an L2VPN tunnel between the PEs of the PWE3 service between the local user and the peer user;
  • the VLAN encapsulation is: encapsulation of the local PE interface board The VLAN of the outgoing port;
  • the source MAC address The MAC address of the local PE is the MAC address of the next hop of the outer L2VPN service tunnel, that is, the MAC address of the peer PE.
  • FIG. 4 The data structure diagram before and after the data encapsulation in this step is shown in (b) and (c) of FIG. 4, (b) is the encapsulated data sent by the emulation processing module, and (c) is encapsulated by the data processing module.
  • PW Label2 and Tunnel Label2 are the labels of the PW and L2VPN tunnels respectively.
  • VLAN 2 is the VLAN of the outbound port on the local PE interface board.
  • SA2 and DA2 represent the source and destination MAC addresses respectively.
  • Step 303 Send the encapsulated data to the peer PE.
  • the data processing module sends the encapsulated data to the peer PE through the port on the PE interface board, and sends the data to the peer PE through the L2VPN tunnel.
  • the local user and the peer user have established a PWE3 connection relationship between the two parties in the transparent channel provided by the L2VPN, and the data is transmitted between the PEs at both ends through the same L2VPN tunnel for multiple groups of different users. Therefore, the PWs in the outer L2VPN frame format encapsulation are all the same value, which avoids the situation in which the PW tags are exchanged multiple times in the prior art, thereby saving a large amount of label space of the PE.
  • FIG. 5 is a schematic flowchart of downlink data forwarding in an end-to-end pseudowire emulation access method according to the present invention. As shown in FIG. 5, the specific implementation steps of the process are as follows:
  • Step 501 Perform decapsulation of the data sent by the peer PE in the outer L2VPN frame format. Specifically, the data processing module in the local PE removes the outer PW after receiving the data sent by the peer PE through the L2VPN tunnel. Labels, L2VPN tunnel labels, VLANs 2, SA2, and DA2, and determine the corresponding PWE3 VE module according to VLAN 1. The decapsulated data is sent to the emulation processing module in the local PE through the L2VE module and the PWE3 VE module. Here, the data is sent to the simulation processing module through the PWE3 VE module.
  • Step 502 Perform a decapsulation operation of an inner layer PWE3 frame format on data decapsulated in an outer L2VPN frame format.
  • the simulation processing module strips off the inner layer PW label, the PWE3 tunnel label, the VLAN 1, the SA1, and the DAI, and finally obtains the non-Ethernet data.
  • Step 503 Send the non-Ethernet data obtained by decapsulating twice to the local user.
  • the emulation processing module obtains the port on the PE interface board according to the inner PW label, and obtains the non-Ethernet data obtained after decapsulation. The outgoing interface is sent and transmitted to the local user.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Small-Scale Networks (AREA)

Abstract

本发明公开了一种端到端伪线仿真接入的装置。本发明还同时公开了一种端到端伪线仿真接入的方法,包括:本地运营商边缘设备(PE)接收到本地用户所发的非以太网数据后进行内层端到端伪线仿真(PWE3)帧格式的封装;再对封装后的数据进行外层二层虚拟专用网(L2VPN)帧格式的封装,之后将封装后的数据发送到对端PE;本地PE接收到对端PE所发的数据后,先后执行外层L2VPN帧格式的解封装和内层PWE3帧格式的解封装操作,之后将经两次解封装所得的非以太网数据发送给本地用户。本发明可在节约PE标签空间的情况下实现对非以太网进行端到端伪线仿真接入,可避免多次交换伪线(PW)标签。

Description

一种端到端伪线仿真接入的装置和方法 技术领域
本发明涉及通信领域中的端到端伪线仿真 (Pseudo Wire Emulation Edge-to-Edge, PWE3 )技术, 尤其涉及一种端到端伪线仿真接入的装置和 方法。 背景技术
PWE3技术是一种在分组交换网( PSN )上模拟各种点到点业务的机制, 被模拟的业务可为时分复用 (TDM ) 专线网、 异步传输模式(ATM ) 网、 帧中继 ( FR ) 网或以太网等多种网络。 PWE3技术利用 PSN上的隧道机制 模拟业务的必要属性, 所述隧道称为伪线(Pseudo Wire, PW )。 运营商利 用 PWE3技术可将所有的传送业务转移到一个融合的网络中, 这里, 所述 融合的网络可为 IP 网或多协议标签交换(MPLS ) 网等, 从用户的角度来 看, 可认为 PWE3技术模拟的是一种专用的链路或电路。
图 1为互联网工程任务组( IETF )提出的 PWE3技术在 PSN上的业务 参考模型结构示意图, 如图 1所示, 所述 PE1和 PE2为运营商边缘设备, CE 1与 CE2为用户边缘设备, PE 1与 PE2之间建有一条或多条 P W ,即 P WE3 通道, CE和 PE之间为接入链路( AC ), AC可为以太网, 也可为 ATM网 络等非以太网, CE1和 CE2分别通过 AC接入到 PE1和 PE2后 , 通过 PW 实现 CE1和 CE2双方的通信, PW承载在 PSN隧道上, PSN隧道决定数 据转发路径。 一条 PSN隧道可以承载多条 PW。 CE1和 CE2双方进行通信 时, CE1的用户数据传输到 PE1后先进行 PW标签封装, 再封装一层隧道 标签和介质访问控制 (MAC )地址后形成数据报文, 数据报文经 PW建立 的路径传输到 PE2, PE2对接收到的数据报文执行解封装操作, 并取出 PW 标签以确定出口电路, 将解封出的用户数据发送到 CE2。 图 1 所示的模型 为 PWE3技术在实际应用中的参考模型, 该模型可实现对以太网、 或非以 太网进行端到端伪线仿真接入, 模型的基本原理在实际应用过程中普遍适 用, 具体的业务需求不同, 该模型的具体应用方式也有所不同。
目前, 对非以太网进行端到端伪线仿真接入的方法为通过多段 PW交 换实现 PWE3业务, 即: 本地用户的数据发送到本地 PE前对数据进行 PW 封装, 所述 PW封装中的 PW标签为本地 PE所分配的, 其中, 所述 PW仅 为本地用户与本地 PE间的 PW;本地 PE收到数据后需用对端 PE所分配的 PW标签来替换之前数据中的 PW标签, 所述 PW为本地 PE与对端 PE间 的 PW, 用于本地 PE将数据发送到对端 PE; 对端 PE收到数据后还需再替 换 PW标签, 用以将数据发送到对端用户。 这里, 本地 PE或对端 PE需给 不同的用户分配不同的 PW标签, 如果本地 PE或对端 PE对应多个用户, 那么多个用户的 PW标签会耗费 PE大量的标签空间。 发明内容
有鉴于此, 本发明的主要目的在于提供一种端到端伪线仿真接入的装 置和方法,可在节约 PE标签空间的情况下实现对非以太网进行端到端伪线 仿真接入, 可避免多次交换 PW标签。
为达到上述目的, 本发明的技术方案是这样实现的:
本发明提供了一种端到端伪线仿真接入的装置, 该装置包括: 仿真处 理模块和数据处理模块; 其中,
所述仿真处理模块, 用于接收到本地用户所发的非以太网数据后进行 内层 PWE3帧格式的封装, 并将封装后的数据发送到数据处理模块; 还用 于对数据处理模块所发的经外层二层虚拟专用网 (L2VPN ) 帧格式解封装 的数据执行内层 PWE3 帧格式的解封装操作, 并将解封装后的非以太网数 据发送给本地用户; 所述数据处理模块, 用于对仿真处理模块所发的经内层 PWE3 帧格式 封装的数据执行外层 L2VPN帧格式的封装, 并将封装后的数据发送到对端 PE; 还用于接收到对端 PE所发的数据后, 执行外层 L2VPN帧格式的解封 装操作, 并将解封装的数据发送到仿真处理模块。
其中, 所述数据处理模块进一步包括二层虚拟以太网接口 (L2VE )模 块, 用于数据处理模块和仿真处理模块之间的通信, 数据处理模块通过 L2VE模块将数据发送到仿真处理模块,通过 L2VE模块接收仿真处理模块 所发的数据。
其中, 所述仿真处理模块进一步包括端到端伪线仿真虚拟以太网接口 PWE3 VE模块, 用于仿真处理模块和数据处理模块之间的通信, 仿真处理 模块通过 PWE3 VE模块将数据发送到数据处理模块, 通过 PWE3 VE模块 接收数据处理模块所发的数据。
其中, 所述仿真处理模块包括一个或多个 PWE3 VE模块; 相应的, 所 述数据处理模块包括一个或多个 L2VE模块, PWE3 VE模块和 L2VE模块 为 对应关系。
本发明还提供了一种端到端伪线仿真接入的方法, 该方法包括: 本地 PE接收到本地用户所发的非以太网数据后进行内层 PWE3帧格式 的封装; 再对封装后的数据进行外层 L2VPN帧格式的封装, 之后将封装后 的数据发送到对端 PE;
本地 PE接收到对端 PE所发的数据后, 先后执行外层 L2VPN帧格式 的解封装和内层 PWE3 帧格式的解封装操作, 之后将经两次解封装所得的 非以太网数据发送给本地用户。
其中, 所述本地 PE进行内层 PWE3帧格式的封装, 为:
本地 PE中的仿真处理模块接收到本地用户所发的非以太网数据后,对 收到的非以太网数据进行伪线 PW封装和 PWE3隧道封装, 再进行虚拟局 域网 VLAN封装, 并封装目的介质访问控制 MAC地址和源 MAC地址, 并 将封装后的数据先后经过仿真处理模块中的 PWE3 VE模块传输到本地 PE 中的数据处理模块, 所述数据处理模块通过自身设置的 L2VE模块接收数 据。
其中, 所述目的 MAC地址为对端用户边缘设备 CE的 MAC地址; 所 述源 MAC地址为本地用户边缘设备 CE的 MAC地址。
其中, 所述对封装后的数据进行外层 L2VPN帧格式的封装, 具体为: 本地 PE中的数据处理模块收到仿真处理模块所发的封装数据后,进行
PW封装和 L2VPN隧道封装, 再进行 VLAN封装, 并封装目的 MAC地址 和源 MAC地址。
其中, 所述目的 MAC地址为对端 PE的 MAC地址; 所述源 MAC地 址为本地 PE的 MAC地址。
本发明提供的端到端伪线仿真接入的装置和方法,本地 PE接收到本地 用户所发的非以太网数据后进行内层 PWE3帧格式的封装; 再对封装后的 数据进行外层 L2VPN帧格式的封装, 之后将封装后的数据发送到对端 PE; 本地 PE接收到对端 PE所发的数据后, 先后执行外层 L2VPN帧格式的解 封装和内层 PWE3帧格式的解封装操作, 之后将经两次解封装所得的非以 太网数据发送给本地用户。本发明中本地用户和对端用户已在 L2VPN提供 的透明通道中建立了双方的 PWE3连接关系, 对于多组不同的用户均通过 相同的 L2VPN隧道在两端的 PE之间传输数据,因此外层 L2VPN帧格式封 装中的 PW均为相同的值, 避免了现有技术中多次交换 PW标签的情况, 进而也可节省 PE大量的标签空间。 附图说明
图 1为 PWE3技术在 PSN上的业务参考模型结构示意图;
图 2为本发明端到端伪线仿真接入的装置结构示意图; 图 3 为本发明端到端伪线仿真接入的方法中上行数据转发的流程示意 图;
图 4为本发明上行数据封装前后的数据结构示意图;
图 5 为本发明端到端伪线仿真接入的方法中下行数据转发的流程示意 图;
图 6为本发明下行数据解封装前后的数据结构示意图。 具体实施方式
本发明所要阐述的装置为图 1 中所示的运营商边缘设备 PE, 现有 PE 中的主要功能模块为业务转发线卡, 业务转发线卡一般包括: 接口板、 数 据处理模块和交换芯片, 其中, 所述数据处理模块可为网络处理器等; 本 发明利用二层虚拟专用网 (L2VPN )技术承载 PWE3业务, 即在 PSN网络 两端的 PE 之间配置 L2VPN 业务, 所述 L2VPN 可为虚拟专用局域网 ( VPLS ) , 内层 PWE3业务承载在外层 L2VPN业务之上。 入实现过程中,本发明以 L2VPN技术为基础实现对非以太网进行端到端伪 线仿真接入的方法,即实现在 PSN网络两端的用户之间传输非以太网数据。
本发明的基本思想是:本地 PE接收到本地用户所发的非以太网数据后 进行内层 PWE3帧格式的封装;再对封装后的数据进行外层 L2VPN帧格式 的封装, 之后将封装后的数据发送到对端 PE;
本地 PE接收到对端 PE所发的数据后, 先后执行外层 L2VPN帧格式 的解封装和内层 PWE3 帧格式的解封装操作, 之后将经两次解封装所得的 非以太网数据发送给本地用户。
下面结合附图及具体实施例对本发明作进一步详细说明。
图 2为本发明端到端伪线仿真接入的装置结构示意图, 如图 2所示, 该装置包括: 仿真处理模块和数据处理模块; 其中, 所述仿真处理模块, 用于接收到本地用户所发的非以太网数据后进行 内层 PWE3帧格式的封装, 并将封装后的数据发送到数据处理模块; 还用 于对数据处理模块所发的经外层 L2VPN 帧格式解封装的数据执行内层 PWE3 帧格式的解封装操作, 并将解封装后的非以太网数据发送给本地用 户;
所述数据处理模块, 用于对仿真处理模块所发的经内层 PWE3 帧格式 封装的数据执行外层 L2VPN帧格式的封装, 并将封装后的数据发送到对端 PE; 还用于接收到对端 PE所发的数据后, 执行外层 L2VPN帧格式的解封 装操作, 并将解封装的数据发送到仿真处理模块。
所述数据处理模块进一步包括二层虚拟以太网接口 (L2VE )模块, 用 于数据处理模块和仿真处理模块之间的通信, 数据处理模块通过 L2VE模 块将数据发送到仿真处理模块, 通过 L2VE模块接收仿真处理模块所发的 数据;
所述仿真处理模块进一步包括端到端伪线仿真虚拟以太网接口( PWE3 VE )模块, 用于仿真处理模块和数据处理模块之间的通信, 仿真处理模块 通过 PWE3 VE模块将数据发送到数据处理模块, 通过 PWE3 VE模块接收 数据处理模块所发的数据。
图 3 为本发明端到端伪线仿真接入的方法中上行数据转发的流程示意 图, 如图 3所示, 该流程具体实现步骤如下:
步骤 301 :将本地用户所发的非以太网数据进行内层 PWE3帧格式的封 装;
具体为: 本地用户所发的非以太网数据首先进入仿真处理模块, 仿真 处理模块首先对收到的非以太网数据进行 PW封装和 PWE3隧道封装, 再 进行虚拟局域网 ( VLAN )封装, 并封装目的 MAC地址和源 MAC地址, 并将封装后的数据先后经过 PWE3 VE模块传输到数据处理模块,数据处理 模块通过 L2VE模块接收数据。
其中,所述 PW为本地用户与对端用户间的 PW; 所述 PWE3隧道为 载本地用户与对端用户间 PWE3业务的内层隧道, 所谓内层隧道是相对外 层 L2VPN隧道而言的; 所述 VLAN封装为: 封装 PWE3 VE模块对应的 VLAN ID; 所述目的 MAC地址为承载 PWE3业务的内层隧道的下一跳对 应的 MAC地址, 即对端用户边缘设备 CE的 MAC地址; 所述源 MAC地 址为本地用户边缘设备 CE的 MAC地址。
本步骤中所述数据封装前后的数据结构示意图如图 4 中 )和(b ) 所示, ) 为仿真处理模块接收到的封装前的非以太网数据, 如图 4 所示 将非以太网数据表示为信元, (b ) 为封装后的数据格式, PW Labell 和 Tunnel Labell分别为 PW封装和 PWE3隧道封装的标签, SA1和 DA1分别 表示源 MAC地址和目的 MAC地址, VLAN1 为 PWE3 VE模块对应的 VLAN ID。
这里, 仿真处理模块可包括多个 PWE3 VE模块, 用于建立多条内层隧 道, 因此不同的 VLAN对应不同的 PWE3 VE; 相应的, 所述数据处理模块 可包括多个 L2VE模块, PWE3 VE模块和 L2VE模块是——对应的关系, 在本发明所述端到端伪线仿真接入过程实施之前, 已由当地 PE的管理员配 置好 PWE3 VE模块和 L2VE模块的对应关系并存储于本地 PE中。
步骤 302: 对封装后的数据进行外层 L2VPN帧格式的封装;
具体为: 数据处理模块收到仿真处理模块所发的封装数据后, 首先进 行 PW封装和 L2VPN隧道封装, 再进行 VLAN封装, 并封装目的 MAC地 址和源 MAC地址。
其中, 所述 PW为本地 PE与对端 PE间的 PW; 所述 L2VPN隧道为承 载本地用户与对端用户间 PWE3业务的双方 PE 间的 L2VPN隧道; 所述 VLAN封装为: 封装本地 PE接口板上出端口的 VLAN; 所述源 MAC地址 为本地 PE的 MAC地址,所述目的 MAC地址为外层 L2VPN业务隧道的下 一跳对应的 MAC地址, 即对端 PE的 MAC地址。
本步骤中所述数据封装前后的数据结构示意图如图 4 中 (b )和(c ) 所示, (b ) 为仿真处理模块所发的封装后的数据, (c ) 为数据处理模块封 装后的数据, 如图 4所示, PW Label2和 Tunnel Label2分别为 PW封装和 L2VPN隧道封装的标签 , VLAN2为本地 PE接口板上出端口的 VLAN , SA2 和 DA2分别表示源 MAC地址和目的 MAC地址。
步骤 303: 将封装后的数据发送到对端 PE;
具体为: 数据处理模块将封装后的数据经 PE接口板上的端口发送出 去, 并通过 L2VPN隧道发送到对端 PE。
从上述步骤可见,本发明中本地用户和对端用户已在 L2VPN提供的透 明通道中建立了双方的 PWE3连接关系, 对于多组不同的用户均通过相同 的 L2VPN隧道在两端的 PE之间传输数据,因此外层 L2VPN帧格式封装中 的 PW均为相同的值, 避免了现有技术中多次交换 PW标签的情况, 进而 也可节省 PE大量的标签空间。
图 5 为本发明端到端伪线仿真接入的方法中下行数据转发的流程示意 图, 如图 5所示, 该流程具体实现步骤如下:
步骤 501 : 将对端 PE所发的数据进行外层 L2VPN帧格式的解封装; 具体为: 本地 PE中的数据处理模块收到对端 PE经 L2VPN隧道发来 的数据后, 剥掉外层 PW标签、 L2VPN隧道标签、 VLAN2、 SA2和 DA2 等信息, 并根据 VLAN1确定对应的 PWE3 VE模块, 将解封装后的数据经 L2VE模块和 PWE3 VE模块发送到本地 PE中的仿真处理模块。 这里, 是 通过 PWE3 VE模块将数据发送到仿真处理模块中。
本步骤中所述数据解封装前后的数据结构示意图如图 6中 )和(b ) 所示。 步骤 502: 对进行外层 L2VPN帧格式解封装的数据执行内层 PWE3帧 格式的解封装操作;
具体为: 仿真处理模块剥掉内层 PW标签、 PWE3隧道标签、 VLAN1、 SA1和 DAI等信息后最终得到非以太网数据。
本步骤中所述数据解封装前后的数据结构示意图如图 6中 (b )和(c ) 所示。
步骤 503: 将经两次解封装所得的非以太网数据发送给本地用户; 具体为: 仿真处理模块根据内层 PW标签得到 PE接口板上的端口, 将 解封后得到的非以太网数据从出接口发出, 传输给本地用户。
以上所述, 仅为本发明的较佳实施例而已, 并非用于限定本发明的保 护范围, 凡在本发明的精神和原则之内所作的任何修改、 等同替换和改进 等, 均应包含在本发明的保护范围之内。

Claims

权利要求书
1、 一种端到端伪线仿真接入的装置, 其特征在于, 该装置包括: 仿真 处理模块和数据处理模块; 其中,
所述仿真处理模块, 用于在接收到本地用户所发的非以太网数据后进 行内层端到端伪线仿真 PWE3 帧格式的封装, 并将封装后的数据发送到数 据处理模块; 还用于对数据处理模块发来的经外层二层虚拟专用网 L2VPN 帧格式解封装的数据执行内层 PWE3 帧格式的解封装, 并将解封装后的非 以太网数据发送给本地用户;
所述数据处理模块, 用于对仿真处理模块发来的经内层 PWE3 帧格式 封装的数据执行外层 L2VPN帧格式的封装, 并将封装后的数据发送到对端 运营商边缘设备 PE; 还用于在接收到对端 PE发送的数据后, 执行外层 L2VPN帧格式的解封装, 并将解封装的数据发送到仿真处理模块。
2、 根据权利要求 1所述的端到端伪线仿真接入的装置, 其特征在于, 所述数据处理模块进一步包括:
二层虚拟以太网接口 L2VE模块, 用于实现数据处理模块和仿真处理 模块之间的通信, 数据处理模块通过 L2VE模块将数据发送到仿真处理模 块, 并通过 L2VE模块接收仿真处理模块发送的数据。
3、 根据权利要求 1或 2所述的端到端伪线仿真接入的装置, 其特征在 于, 所述仿真处理模块进一步包括:
端到端伪线仿真虚拟以太网接口 PWE3 VE模块,用于实现仿真处理模 块和数据处理模块之间的通信,仿真处理模块通过 PWE3 VE模块将数据发 送到数据处理模块, 通过 PWE3 VE模块接收数据处理模块发送的数据。
4、 根据权利要求 3所述的端到端伪线仿真接入的装置, 其特征在于, 所述仿真处理模块包括一个或多个 PWE3 VE模块;
相应的, 所述数据处理模块包括一个或多个 L2VE模块, PWE3 VE模 块和 L2VE模块为——对应关系。
5、 一种端到端伪线仿真接入的方法, 其特征在于, 该方法包括: 本地 PE接收到本地用户发送的非以太网数据后进行内层 PWE3帧格式 的封装; 再对封装后的数据进行外层 L2VPN帧格式的封装, 之后将封装后 的数据发送到对端 PE;
本地 PE接收到对端 PE所发的数据后, 先后执行外层 L2VPN帧格式 的解封装和内层 PWE3 帧格式的解封装, 之后将经两次解封装所得的非以 太网数据发送给本地用户。
6、 根据权利要求 5所述的端到端伪线仿真接入的方法, 其特征在于, 所述本地 PE进行内层 PWE3帧格式的封装, 为:
本地 PE中的仿真处理模块接收到本地用户所发的非以太网数据后,对 收到的非以太网数据进行伪线 PW封装和 PWE3隧道封装, 再进行虚拟局 域网 VLAN封装, 封装目的介质访问控制 MAC地址和源 MAC地址, 并将 封装后的数据先后经过仿真处理模块中的 PWE3 VE模块传输到本地 PE中 的数据处理模块, 所述数据处理模块通过自身设置的 L2VE模块接收数据。
7、 根据权利要求 6所述的端到端伪线仿真接入的方法, 其特征在于, 所述目的 MAC地址为对端用户边缘设备 CE的 MAC地址; 所述源 MAC 地址为本地用户边缘设备 CE的 MAC地址。
8、 根据权利要求 5或 6所述的端到端伪线仿真接入的方法, 其特征在 于, 所述对封装后的数据进行外层 L2VPN帧格式的封装, 为:
本地 PE中的数据处理模块收到仿真处理模块所发的封装数据后,进行 PW封装和 L2VPN隧道封装, 再进行 VLAN封装, 并封装目的 MAC地址 和源 MAC地址。
9、 根据权利要求 8所述的端到端伪线仿真接入的方法, 其特征在于, 所述目的 MAC地址为对端 PE的 MAC地址; 所述源 MAC地址为本地 PE 的 MAC地址。
PCT/CN2010/077093 2009-11-16 2010-09-19 一种端到端伪线仿真接入的装置和方法 WO2011057520A1 (zh)

Priority Applications (7)

Application Number Priority Date Filing Date Title
KR1020127014015A KR101369138B1 (ko) 2009-11-16 2010-09-19 의사 회선 에뮬레이션 엣지 투 엣지 접속을 위한 장치 및 방법
EP10829484.4A EP2485437B1 (en) 2009-11-16 2010-09-19 Apparatus and method for pseudo wire emulation edge-to-edge access
JP2012539168A JP5444474B2 (ja) 2009-11-16 2010-09-19 擬似ワイヤエミュレーションエッジトゥエッジアクセス装置及び方法
AU2010317300A AU2010317300B2 (en) 2009-11-16 2010-09-19 Apparatus and method for pseudo wire emulation edge-to-edge access
US13/258,389 US8824473B2 (en) 2009-11-16 2010-09-19 Apparatus and method for pseudo wire emulation edge-to-edge access
BR112012011620-7A BR112012011620B1 (pt) 2009-11-16 2010-09-19 Aparelho e método para acesso à emulação pseudo wire ponto-a-ponto
RU2012119181/08A RU2517695C2 (ru) 2009-11-16 2010-09-19 Устройство и способ для обеспечения доступа путём сквозной эмуляции псевдопровода

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200910180179.2 2009-11-16
CN2009101801792A CN101714937B (zh) 2009-11-16 2009-11-16 一种端到端伪线仿真接入的装置和方法

Publications (1)

Publication Number Publication Date
WO2011057520A1 true WO2011057520A1 (zh) 2011-05-19

Family

ID=42418227

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/077093 WO2011057520A1 (zh) 2009-11-16 2010-09-19 一种端到端伪线仿真接入的装置和方法

Country Status (9)

Country Link
US (1) US8824473B2 (zh)
EP (1) EP2485437B1 (zh)
JP (1) JP5444474B2 (zh)
KR (1) KR101369138B1 (zh)
CN (1) CN101714937B (zh)
AU (1) AU2010317300B2 (zh)
BR (1) BR112012011620B1 (zh)
RU (1) RU2517695C2 (zh)
WO (1) WO2011057520A1 (zh)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102014041B (zh) * 2009-09-04 2015-01-28 中兴通讯股份有限公司 分组传送网络设备和电路仿真业务设备
CN101714937B (zh) * 2009-11-16 2013-08-07 中兴通讯股份有限公司 一种端到端伪线仿真接入的装置和方法
CN106330499A (zh) * 2015-06-25 2017-01-11 中兴通讯股份有限公司 一种时分复用数据的传输方法、装置及网络侧边缘设备
CN105591868B (zh) * 2015-07-15 2019-03-15 新华三技术有限公司 一种虚拟专用网络vpn的接入方法和装置
CN105610672B (zh) * 2016-01-14 2019-04-26 中国联合网络通信集团有限公司 一种信息传输的方法及装置
EP3270547A1 (de) 2016-07-14 2018-01-17 Deutsche Telekom AG Feldbusgerät zum kommunizieren mit einem entfernten automatisierungsgerät

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1625176A (zh) * 2003-12-03 2005-06-08 华为技术有限公司 边缘到边缘伪线仿真协议的实现方法
US20070030851A1 (en) * 2005-08-05 2007-02-08 David Sinicrope Method and arrangement for routing pseudo-wire encapsulated packets
CN1937573A (zh) * 2005-09-22 2007-03-28 华为技术有限公司 实现边缘到边缘伪线仿真业务的mstp设备及方法
US20070280267A1 (en) * 2006-03-03 2007-12-06 Nortel Networks Limited Completely Dry Pseudowires
CN101714937A (zh) * 2009-11-16 2010-05-26 中兴通讯股份有限公司 一种端到端伪线仿真接入的装置和方法

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7006499B2 (en) 2003-04-28 2006-02-28 Alcatel Ip Networks, Inc. Source identifier for MAC address learning
US20050190757A1 (en) * 2004-02-27 2005-09-01 Cisco Technology Inc. Interworking between Ethernet and non-Ethernet customer sites for VPLS
JP2006129359A (ja) * 2004-11-01 2006-05-18 Ntt Communications Kk マルチキャスト回線の確立方法、その方法を用いた通信システム、通信装置、通信装置の制御方法、およびプログラム
US20060182113A1 (en) * 2005-02-17 2006-08-17 Lucent Technologies Inc. Automatic discovery of pseudo-wire peer addresses in ethernet-based networks
CN1852254A (zh) * 2006-02-17 2006-10-25 华为技术有限公司 实现mpls报文转发的以太交换设备和方法
WO2007101140A2 (en) 2006-02-24 2007-09-07 Nortel Networks Ltd. Multi-protocol support over ethernet packet-switched networks
WO2008089370A1 (en) * 2007-01-17 2008-07-24 Nortel Networks Limited Method and apparatus for interworking ethernet and mpls networks
CN101001196A (zh) * 2007-01-25 2007-07-18 华为技术有限公司 一种建立伪线隧道并利用其传送报文的方法和装置
CN100558072C (zh) * 2007-07-20 2009-11-04 华为技术有限公司 三层虚拟专用网转发报文的方法、系统和设备
CN101132365B (zh) * 2007-08-31 2010-09-15 华为技术有限公司 报文的透传方法
US8005095B2 (en) * 2008-04-29 2011-08-23 Arris Group, Inc. Carrier ethernet over DOCSIS

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1625176A (zh) * 2003-12-03 2005-06-08 华为技术有限公司 边缘到边缘伪线仿真协议的实现方法
US20070030851A1 (en) * 2005-08-05 2007-02-08 David Sinicrope Method and arrangement for routing pseudo-wire encapsulated packets
CN1937573A (zh) * 2005-09-22 2007-03-28 华为技术有限公司 实现边缘到边缘伪线仿真业务的mstp设备及方法
US20070280267A1 (en) * 2006-03-03 2007-12-06 Nortel Networks Limited Completely Dry Pseudowires
CN101714937A (zh) * 2009-11-16 2010-05-26 中兴通讯股份有限公司 一种端到端伪线仿真接入的装置和方法

Also Published As

Publication number Publication date
AU2010317300B2 (en) 2014-06-05
BR112012011620B1 (pt) 2021-08-10
KR20120079166A (ko) 2012-07-11
US8824473B2 (en) 2014-09-02
RU2517695C2 (ru) 2014-05-27
AU2010317300A1 (en) 2012-05-31
CN101714937A (zh) 2010-05-26
EP2485437B1 (en) 2017-11-08
BR112012011620A2 (pt) 2017-12-12
CN101714937B (zh) 2013-08-07
US20120219016A1 (en) 2012-08-30
KR101369138B1 (ko) 2014-03-04
JP5444474B2 (ja) 2014-03-19
RU2012119181A (ru) 2013-12-27
JP2013511231A (ja) 2013-03-28
EP2485437A4 (en) 2013-07-31
EP2485437A1 (en) 2012-08-08

Similar Documents

Publication Publication Date Title
US9843507B2 (en) Enhanced hierarchical virtual private local area network service (VPLS) system and method for ethernet-tree (E-tree) services
CN101529814B (zh) 通过以太网交换路径支持多协议标记交换(mpls)应用
US9184935B2 (en) Network communication method and network node device
US7593398B2 (en) Layer-two interworking applied to L2-L3 pseudowires
WO2008092357A1 (fr) Procédé et dispositif pour établir un tunnel pseudocâblé et transmettre un message à l'aide de celui-ci
WO2013145167A1 (ja) Lan多重化装置
WO2009012688A1 (fr) Procédé, système et appareil de réacheminement de message dans un réseau privé virtuel à trois couches
CN101110745A (zh) 衔接二层网络和三层网络的方法、装置和系统
WO2005055548A1 (fr) Procede de mise en oeuvre du protocole d'emulation de pseudo-circuits entre routeurs peripheriques
WO2007143952A1 (fr) Procédé d'accès à un réseau privé virtuel, système privé virtuel, réseau privé virtuel et équipement de bordure du fournisseur
WO2011057520A1 (zh) 一种端到端伪线仿真接入的装置和方法
WO2009021371A1 (fr) Procédé et dispositif permettant de réaliser une émulation pseudo-filaire de bout en bout
WO2011026402A1 (zh) 分组传送网络设备和电路仿真业务设备
WO2011054263A1 (zh) 一种三层虚拟专用网(vpn)的接入方法和接入系统
WO2016206432A1 (zh) 一种时分复用数据的传输方法、装置及网络侧边缘设备
EP2485451B1 (en) Two-layer forwarding method for a pseudo wire (pw) service and system thereof
CN101926132B (zh) 基于ip互通虚拟租用线路的电路仿真的方法和系统
WO2009097771A1 (zh) 转发报文的方法、设备和系统
WO2011079635A1 (zh) 一种实现时分复用数据传输的方法及装置
GB2451738A (en) Method and apparatus for interworking VPLS and Ethernet networks
CN102315999A (zh) 二层虚拟专网互联方法及运营商边缘设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10829484

Country of ref document: EP

Kind code of ref document: A1

REEP Request for entry into the european phase

Ref document number: 2010829484

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2010829484

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 13258389

Country of ref document: US

WWE Wipo information: entry into national phase

Ref document number: 2010317300

Country of ref document: AU

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2012539168

Country of ref document: JP

WWE Wipo information: entry into national phase

Ref document number: 1195/KOLNP/2012

Country of ref document: IN

ENP Entry into the national phase

Ref document number: 20127014015

Country of ref document: KR

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2010317300

Country of ref document: AU

Date of ref document: 20100919

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: A20120723

Country of ref document: BY

WWE Wipo information: entry into national phase

Ref document number: 2012119181

Country of ref document: RU

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112012011620

Country of ref document: BR

REG Reference to national code

Ref country code: BR

Ref legal event code: B01E

Ref document number: 112012011620

Country of ref document: BR

ENP Entry into the national phase

Ref document number: 112012011620

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20120516