WO2014040553A1 - 一种建立通信链路的方法、系统及装置 - Google Patents

一种建立通信链路的方法、系统及装置 Download PDF

Info

Publication number
WO2014040553A1
WO2014040553A1 PCT/CN2013/083425 CN2013083425W WO2014040553A1 WO 2014040553 A1 WO2014040553 A1 WO 2014040553A1 CN 2013083425 W CN2013083425 W CN 2013083425W WO 2014040553 A1 WO2014040553 A1 WO 2014040553A1
Authority
WO
WIPO (PCT)
Prior art keywords
vbd
message
packets
mac address
packet
Prior art date
Application number
PCT/CN2013/083425
Other languages
English (en)
French (fr)
Inventor
张宝亚
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Priority to ES13837728.8T priority Critical patent/ES2616839T3/es
Priority to EP13837728.8A priority patent/EP2897328B1/en
Publication of WO2014040553A1 publication Critical patent/WO2014040553A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4604LAN interconnection over a backbone network, e.g. Internet, Frame Relay
    • H04L12/462LAN interconnection over a bridge based backbone
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling

Definitions

  • the present invention relates to a Layer 2 Virtual Private Networks (L2VPN) technology in the field of packet communications, and in particular, to a method and an apparatus for establishing a broadcast domain in an L2VPN.
  • L2VPN Layer 2 Virtual Private Networks
  • the L2VPN is composed of an edge device (PE, Provider Edge) and a user access device (CE, Customer Edge); the connection between the PE and the CE is an access circuit (AC, Attachment Circuit), and the connection between the PE and the PE is pseudo. Line (PW, Pseudo Wire).
  • the networking model of the L2VPN transmission packet includes a virtual private wire service (VPWS) and a virtual private LAN service (VPLS).
  • the VPWS is a point-to-point service model, that is, a virtual private network (VPN) composed of devices ranging from a source CE to a destination CE, where AC and PW correspond to each other.
  • VPN virtual private network
  • the VPLS is a multi-point to multi-point service model, that is, the broadcast packet is sent through multiple PWs and/or ACs in the VPN, specifically: the PE performs the broadcast packet according to the number of all PWs and ACs connected to the PE.
  • Copying determining whether to discard the broadcast packet according to the attributes of each outgoing PW and/or AC and the incoming PW and/or AC. If discarded, the egress performs discarding processing; if not, discards each The broadcast message is sent by the PW and/or the AC.
  • the PE cannot establish a smaller broadcast domain in the VPN, causing the PE to perform unnecessary packet replication and waste the bandwidth of the PE internal channel.
  • the purpose of the embodiments of the present invention is to provide a method and a device for establishing a broadcast domain in an L2VPN, which can reduce the overhead and workload of the PW in the PE configuration, and reduce the waste of the internal channel bandwidth by the VPLS broadcast.
  • An embodiment of the present invention provides a method for establishing a broadcast domain in an L2VPN.
  • the method includes: when a packet is received from an AC, the virtual bridge domain (VBD, Virtual Bridge Domain) identifier of the packet is detected according to the AC attribute table. ID, Index ); If the VDU ID and the destination media access control (MAC, Media Access Control) address of the packet cannot be obtained from the forwarding table, the VBD is obtained from the VBD table according to the VBD ID, according to the encapsulation rule.
  • the VBD is obtained from the VBD table according to the VBD ID.
  • the decapsulation rule is sent after the message is decapsulated.
  • the AC attribute table is: a table consisting of the AC portal information on the PE, the VBD ID corresponding to the AC portal, and the virtual private network VPN ID.
  • the VBD table is: a table consisting of one or more VBD records, each VBD record is identified by a VBD ID, and each VBD record includes all AC and PW exit information allocated by the current PE to the VBD. .
  • the forwarding table includes: a source MAC address, a destination MAC address, a VBD ID, a VPN ID, a PW, or an AC egress information of the packet.
  • the packet exit is not obtained from the forwarding table according to the VBD ID and the destination MAC address of the packet
  • the egress of the corresponding VBD is obtained from the VBD table according to the VBD ID
  • the packet is encapsulated according to the encapsulation rule, and includes: Extract the destination MAC address of the packet, and determine whether the PW or AC exit of the packet can be detected from the forwarding table according to the VBD ID and the destination MAC address. If yes, obtain the PW or AC exit of the packet, and export the packet to the PW.
  • the packet is encapsulated by the VBD ID according to the encapsulation rule, or the packet with the outlet being AC is sent directly.
  • the VBD ID is used to find all the AC and/or PW outlets in the same VBD from the VBD. If the current PE is in the VPWS mode, the packets with the PW are encapsulated with the VBD ID according to the encapsulation rules. If the current PE is in the VPLS mode, the packets are copied according to the number of ACs and/or PWs. The packets with the PWs are encapsulated with the VBD ID according to the encapsulation rules. Or the outgoing message is sent directly to the AC.
  • the encapsulation rule is: Add the VBD ID to the specified field of the packet.
  • the packet exit is not obtained from the forwarding table according to the VBD ID and the destination MAC address of the packet
  • the egress of the corresponding VBD is obtained from the VBD table according to the VBD ID
  • the packet is decapsulated according to the decapsulation rule. , including:
  • the VBD ID is used to search for all AC and/or PW outlets in the same VBD from the VBD table.
  • the PE determines whether the current mode is VPWS mode or VPLS mode. If the current PE is in VPWS mode, the packet is exported as PW. If the current PE is in the VPLS mode, the packets are copied according to the number of ACs and/or PWs, and the packets are exported as PWs. The packet is directly sent out, and/or the packet destined for the AC is sent out according to the decapsulation rule.
  • the decapsulation rule is: deleting the VBD ID and the PW information from the specified field of the packet.
  • An embodiment of the present invention further provides an apparatus for establishing a broadcast domain in an L2VPN, where the apparatus includes: an AC processing module, a control module, and a PW processing module;
  • the AC processing module is configured to: when receiving the packet sent by the control module, find the VBD ID of the packet according to the AC attribute table, and if not, obtain the VBD ID and the destination MAC address of the packet from the forwarding table in the control module. If the packet is exported, the VBD is obtained from the VBD table according to the VBD ID, and the packet is encapsulated according to the encapsulation rule;
  • the control module is configured to send the packet to the AC processing module when receiving the packet from the AC, and send the packet to the PW processing module when receiving the packet from the PW, and the AC processing module and the PW processing module.
  • the PW processing module is configured to: when the packet is received, if the packet exit cannot be obtained from the forwarding table in the control module according to the VBD ID and the destination MAC address of the packet, the VBD ID is obtained from the VBD table in the control module according to the VBD ID.
  • the VBD exit is sent after the packet is decapsulated according to the decapsulation rule.
  • control module is configured to save an AC attribute table consisting of the AC portal information on the PE and the VBD ID and VPN ID corresponding to the AC portal.
  • control module is configured to save a VBD table, where the VBD table includes a table consisting of one or more VBD records, each VBD record is identified by a VBD ID, and each VBD record includes a current PE. All AC and PW exit information assigned to this VBD.
  • control module is configured to save a forwarding table.
  • the forwarding table includes: a source MAC address, a destination MAC address, a VBD ID, a VPN ID, a PW, or an AC outlet information.
  • the AC processing module is configured to extract the destination MAC address of the packet, and determine whether the PW or the AC egress of the packet can be detected from the forwarding table of the control module according to the VBD ID and the destination MAC address, and if so, Obtain the PW or AC exit of the packet, which will be The packet whose interface is a PW is encapsulated by the VBD ID according to the encapsulation rule, or the packet whose exit is AC is directly sent out. If not, the VBD ID is used to search all the ACs in the same VBD from the VBD table of the control module. If the PE is in the VPWS mode, the PW will be sent out in the VPLS mode.
  • the packet will be sent out.
  • the packet is copied according to the number of the AC and/or the PW, and the packet whose output is the PW is encapsulated by the VBD ID according to the encapsulation rule, and/or the packet whose output is the AC is directly sent out.
  • the PW processing module is configured to extract the VBD ID and the destination MAC address of the packet, and determine whether the PW or the AC outlet of the packet can be detected from the forwarding table of the control module according to the VBD ID and the destination MAC address. If yes, the packet with the outgoing PW is sent directly, or the packet with the outgoing AC is decapsulated according to the decapsulation rule; if not, the VBD ID is used to find all ACs in the same VBD from the VBD table of the control module. And/or the PW exit, and determine whether the current mode is VPWS mode or VPLS mode.
  • the mode is VPWS mode
  • the packet with the egress PW is sent directly, or the packet with the egress AC is decapsulated according to the decapsulation rule.
  • the packets are copied according to the number of ACs and/or PWs, and the packets with the outgoing PWs are directly sent out, and/or packets destined for the AC are decapsulated according to the decapsulation rules.
  • the decapsulation rule is: the VBD ID and the PW information are deleted from the specified field of the message.
  • the device is installed as a logical unit in the PE.
  • the method and device for establishing a broadcast domain in the L2VPN provided by the embodiment of the present invention can obtain the packet corresponding to the VBD from the VBD table according to the VBD ID, and encapsulate the packet into the VBD report according to the encapsulation rule.
  • the message is sent, and the message sent by the PW is obtained from the VBD table according to the VBD ID, and the packet is decapsulated according to the decapsulation rule.
  • the VBD ID can be passed.
  • the VBD ID can be used to distinguish the newly added VBD domain, and the PE zone can distribute the broadcast packets to different VBDs. This reduces the number of discarded packets and reduces the VPLS broadcast to internal channels. Waste of bandwidth.
  • FIG. 1 is a schematic flowchart of a method for establishing a broadcast domain in an L2VPN according to an embodiment of the present invention
  • FIG. 2 is a schematic structural diagram of a device for establishing a broadcast domain in an L2VPN according to an embodiment of the present invention.
  • the basic idea of the embodiment of the present invention is: when receiving a packet from the AC, the VBD ID of the packet is found according to the AC attribute table; if the packet exit cannot be obtained from the forwarding table according to the VBD ID and the destination MAC address of the packet, Then, the VBD is obtained from the VBD table and the packet is encapsulated according to the encapsulation rule. If the packet is received from the PW, the packet cannot be obtained from the forwarding table according to the VBD ID and the destination MAC address of the packet. If the egress is obtained, the egress of the corresponding VBD is obtained from the VBD table according to the VBD ID, and the packet is decapsulated according to the decapsulation rule.
  • the method for establishing a broadcast domain in the L2VPN proposed by the embodiment of the present invention, as shown in FIG. 1, includes the following steps:
  • Step 101 After the PE creates the VPN, set the AC attribute table and the VBD table.
  • configure a VPN for the PE create a VPN, and set an AC attribute table and a VBD information table according to the VBD networking plan.
  • the VPN configuration is performed to create a VPN as an existing technology, which may include: creating, managing, and maintaining a PW connection, which is not described herein;
  • the VBD network planning is as follows: According to the actual networking requirements, each VPN is divided into one. One or more VBDs, set an identifier for each VBD, and divide each VBD into a device; the AC attribute table is a table consisting of the AC portal information on the PE and the VBD ID and VPN ID corresponding to the AC portal.
  • the AC portal information is the logical interface information defined for each AC connection in the PE device, and may include the identifier, attributes, and the like of the interface.
  • the VBD table is: a table consisting of one or more VBD records. Each VBD record is identified by a VBD ID, and each VBD record includes all AC and PW export information that the current PE allocates to the VBD; and the AC and PW export information may be an identifier of the AC and the PW.
  • step 101 it is also possible to determine whether to enable the VBD function according to actual needs. If the VBD function is enabled, step 102 is performed; if the VBD function is not enabled, subsequent processing is performed according to the prior art, and the description is not repeated here. Process flow.
  • Step 102 The PE determines whether the packet sent by the AC or the PW is received. If the packet sent by the AC is received, the process proceeds to step 103. If the packet sent by the PW is received, the process proceeds to step 106.
  • Step 103 The PE finds the VBD ID from the AC attribute table according to the AC entry of the packet.
  • the detecting the VBD ID from the AC attribute table includes: searching the record corresponding to the AC entry information of the packet from the AC attribute table, extracting the VPN ID corresponding to the entry, and one or more VBDs in the found record. ID;
  • the AC entry of the packet is the information corresponding to the AC interface that receives the packet, and the method for obtaining the packet is the prior art, and details are not described herein.
  • Step 104 The PE extracts the destination MAC address from the packet, and determines whether the AC or PW exit of the packet can be detected from the forwarding table by using the VBD ID and the destination MAC address. If yes, the packet with the PW is encapsulated according to the encapsulation. After the rule is encapsulated with the VBD ID, the packet is sent directly to the AC, and the process is terminated. Otherwise, go to step 105.
  • the forwarding table includes: a source MAC address, a destination MAC address, a VBD ID, a VPN ID, a PW, or an AC egress information of the packet;
  • the destination MAC address, the VBD ID, and the VPN ID are used as the identifiers for distinguishing the forwarding tables.
  • the method for establishing the forwarding table is the prior art, and is not described here.
  • the encapsulation rule is: adding the VBD ID to the specified field of the packet; wherein the packet may be a flow label existing in the prior art; the sending is sent according to the prior art, and the sending is not performed here. Narration.
  • Step 105 The PE detects the AC and/or the PW outlet from the VBD table according to the VBD ID.
  • the packet that is exported to the PW is encapsulated by the VBD ID according to the encapsulation rule, and/or the packet whose output is AC is directly sent out. Process flow.
  • the PE uses the VBD ID to search for all AC and/or PW outlets in the same VBD from the VBD table, and the PE determines whether the current mode is the VPWS mode or the VPLS mode. If the current PE is in the VPWS mode, the packet is exported as a PW. After being encapsulated by the VBD ID according to the encapsulation rules, the message is sent directly to the AC.
  • the packets are copied according to the number of ACs and/or PWs, and/or the packets with the PWs are encapsulated with the VBD ID according to the encapsulation rules. Issued directly.
  • Step 106 The PE extracts the VBD ID and the destination MAC address of the packet, and determines whether the AC or PW exit of the packet can be detected from the forwarding table according to the VBD ID and the destination MAC address. If yes, the packet is exported as a PW. If the packet is directly sent out, or the packet whose output is AC is decapsulated according to the decapsulation rule, the process ends. Otherwise, go to step 107.
  • the decapsulation rule is: deleting the VBD ID and the PW information in the packet; wherein the PW information is the content added in the PW transmission message specified in the prior art, and details are not described herein.
  • Step 107 The PE obtains the AC and/or PW exits from the VBD table according to the VBD ID; sends the packet with the outgoing port as the PW, and/or sends the packet whose output is the AC according to the decapsulation rule.
  • the PE uses the VBD ID to search for all AC and/or PW outlets in the same VBD from the VBD table, and the PE determines whether the current mode is the VPWS mode or the VPLS mode. If the current PE is in the VPWS mode, the packet is exported as a PW. Emit it directly, or send the packet whose exit is AC according to the decapsulation rule;
  • the packets are copied according to the number of the AC and/or the PW, and the packets with the outgoing PW are directly sent out, and/or the packets with the outgoing AC are decapsulated according to the decapsulation rules. Issued afterwards.
  • an embodiment of the present invention provides a device for establishing a broadcast domain in an L2VPN, where the device includes: an AC processing module 21, a control module 23, and a PW processing module 22;
  • the AC processing module 21 is configured to: when receiving the packet sent by the control module 23, find the VBD ID of the packet according to the AC attribute table, and if not according to the VBD ID and the destination MAC address of the packet, the control module 23
  • the forwarding table obtains the packet egress, and obtains the corresponding VBD egress from the VBD table according to the VBD ID, and encapsulates the packet according to the encapsulation rule;
  • the control module 23 is configured to send the packet to the AC processing module 21 when receiving the packet from the AC, and send the packet to the PW processing module 22 and the AC processing module 21 when receiving the packet from the PW.
  • the PW processing module 22 provides a forwarding table and a VBD table;
  • the PW processing module 22 is configured to: when the message is received, if the message exit cannot be obtained from the forwarding table in the control module 23 according to the VBD ID and the destination MAC address of the packet, the VBD in the control module 23 according to the VBD ID.
  • the table obtains the egress of the corresponding VBD, and sends the packet according to the decapsulation rule.
  • the control module 23 is configured to set an AC attribute table, a VBD information table, a MAC address table, and a label table after the VPN is created.
  • the control module 23 is configured to perform VPN configuration on the PE, create a VPN, and then set an AC attribute table and a VBD information table according to the VBD networking plan.
  • the VBD network planning is as follows: According to actual networking requirements, each VPN is configured. Divide one or more VBDs for each The VBD sets the identity and divides the components into devices for each VBD.
  • the control module 23 is configured to save the AC attribute table.
  • the AC attribute table is a table consisting of the AC portal information on the PE and the VBD ID and the VPN ID corresponding to the AC portal.
  • the AC entry information is PE.
  • the logical interface information defined for each AC connection in the device may include the identifier, attributes, and the like of the interface.
  • the control module 23 is configured to save a VBD table, where the VBD table is: a table consisting of one or more VBD records, each VBD record is identified by a VBD ID, and each VBD record includes a current PE assigned to the All AC and PW export information of the VBD; the AC and PW export information may be identifiers of the AC and the PW.
  • the VBD table is: a table consisting of one or more VBD records, each VBD record is identified by a VBD ID, and each VBD record includes a current PE assigned to the All AC and PW export information of the VBD; the AC and PW export information may be identifiers of the AC and the PW.
  • the control module 23 is configured to maintain a PW information table, including a PW label table and a PW attribute table.
  • the PW label table includes a VPN ID to which the PW belongs.
  • the PW attribute table is used for VPN multiplexing on the MS-PW. Forwarding on the MS-PW, obtaining the PW according to the PW and VBD ID.
  • the control module 23 is configured to determine, in real time, whether the packet sent by the AC is received or the packet sent by the PW, and if the packet sent by the AC is received, the packet is sent to the AC processing module 21, if After receiving the packet sent by the PW, the packet is sent to the PW processing module 22.
  • the AC processing module 21 is configured to extract the destination MAC address of the packet, and determine whether the PW or the AC egress of the packet can be detected from the forwarding table of the control module 23 according to the VBD ID and the destination MAC address, and if yes, obtain After the PW or AC exit of the packet, the packet with the outgoing PW is encapsulated with the VBD ID, or the packet with the exit AC is sent directly; if not, the VBD ID is used to find the same from the VBD table of the control module 23. All the ACs and/or PWs in the VBD, if the current PE is in the VPWS mode, the packets that are exported to the PW are encapsulated with the VBD ID and then sent out.
  • the packets are copied according to the number of the AC and/or the PW, and the packets with the outgoing PW are encapsulated with the VBD ID, and/or the packets with the outgoing AC are sent directly.
  • the control module 23 is configured to store a forwarding table consisting of a source MAC address, a destination MAC address, a VBD ID, a VPN ID, a PW, or an AC egress information of the packet, and multiple forwarding tables may exist at the same time, and the destination MAC address is used.
  • the VBD ID and the VPN ID are used to distinguish the identification MAC address table of each forwarding table by the destination MAC address and the VBD ID, or the destination MAC address, the VBD ID, and the VPN ID. If the VBD ID is globally unique, the former can be used, if the VBD ID It is the only one in the VPN and needs to use the latter.
  • the PW processing module 22 is configured to extract a destination MAC address of the packet, and determine whether the PW or the AC egress of the packet can be detected from the forwarding table of the control module 23 according to the VBD ID and the destination MAC address, and if yes, obtain If the packet is exported to the PW, the packet is sent out as the PW or the packet destined for the AC is sent out according to the decapsulation rule. If not, the VBD table of the control module 23 is used. Find all AC and/or PW outlets in the same VBD, and copy the packets according to the number of AC and PW outlets. After the PW header and VBD ID in the packets with the outgoing AC are deleted, the packets are sent from the AC, and/or The message with the exit PW is sent directly.
  • the above device can be installed in the PE as a logical unit.
  • the AC processing module 21 and the PW processing module 22 may be implemented by a packet processor (PP) in the PE; and the control module 23 may be implemented by a central processing unit (CPU) chip in the PE.
  • PP packet processor
  • CPU central processing unit

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Small-Scale Networks (AREA)

Abstract

本发明公开了一种二层虚拟专用网(L2VPN)中广播域的建立方法,包括:当从接入电路(AC)收到报文时,根据AC属性表查出报文虚拟桥域(VBD)标识(ID),若不能根据VBD ID和报文目的介质访问控制(MAC)地址从转发表获取出口,则根据VBD ID从VBD表获取VBD的出口,按照封装规则封装报文后发出;当从伪线(PW)收到报文时,若不能根据报文VBD ID和目的MAC地址从转发表中获取出口,则根据VBD ID从VBD表获取VBD的出口,根据解封装规则解封报文后发出。本发明还公开了一种L2VPN中广播域的建立装置,采用本发明能减小配置PW的开销,及减少边缘设备(PE)内部通道带宽的浪费。

Description

一种建立通信链路的方法、 系统及装置 技术领域
本发明涉及分组通信领域中的二层虚拟专用网( L2VPN, Layer 2 Virtual Private Networks )技术,尤其涉及一种 L2VPN中广播域的建立方法及装置。 背景技术
L2VPN由边缘设备( PE, Provider Edge )和用户接入设备( CE, Customer Edge )组成; PE与 CE之间的连接为接入电路 ( AC , Attachment Circuit ), PE与 PE之间的连接为伪线( PW, Pseudo Wire )。 所述 L2VPN传输报文的 组网模型有虚拟伪线业务( VPWS, Virtual Private Wire Service )和虚拟专 用局域网业务( VPLS, Virtual Private LAN Service ) 两种。
其中, 所述 VPWS为点到点的业务模型, 即从源 CE到目的 CE之间各 个设备组成的虚拟专用网 (VPN, Virtual Private Networks ) 中, AC与 PW ——对应。 但是, 由于所述点到点的业务模型中, 同一条 PW无法被多个 VPN复用, 所以每增加一个 VPN就需要增加一条 PW的配置, 如此会给 PE的配置带来不便。所述 VPLS为多点到多点的业务模型, 即在 VPN中将 广播报文通过多条 PW和 /或 AC发出, 具体为: PE将广播报文按照自身连 接的所有 PW和 AC的数量进行复制, 在出口根据各个出 PW和 /或 AC和 入 PW和 /或 AC的属性, 确定是否丟弃该广播报文, 如果丟弃, 则出口做 丟弃处理; 如果不丟弃, 则从各个出 PW和 /或 AC发送该广播报文。 但是, 由于上述 VPLS中发送广播报文的过程中, PE无法在 VPN中建立更小的广 播域, 导致 PE进行一些不必要的报文复制, 浪费 PE内部通道的带宽。
可见, 现有 L2VPN技术中, 由于在 VPWS这种点到点的业务模型中, 一个 PW无法被多个 VPN域复用, 导致 PE配置 PW的开销以及工作量较 大;在 VPLS这种多点到多点的业务模型中, PE无法在 VPN中建立更小的 广播域, 导致 PE进行一些不必要的报文复制, 浪费 PE内部通道的带宽。 发明内容
有鉴于此,本发明实施例的目的在于提供一种 L2VPN中广播域的建立 方法及装置, 能减小 PE配置 PW的开销及工作量, 以及减少 VPLS广播对 内部通道带宽的浪费。
为达到上述目的, 本发明实施例的技术方案是这样实现的:
本发明实施例提供了一种 L2VPN中广播域的建立方法, 该方法包括: 当从 AC收到报文时, 根据 AC属性表查出报文的虚拟桥域( VBD, Virtual Bridge Domain )标识( ID, Index ); 若不能根据 VBD ID和报文 的目的介质访问控制 ( MAC, Media Access Control )地址从转发表获取 报文出口, 则根据 VBD ID从 VBD表获取对应 VBD的出口, 按照封装 规则封装报文后发出; 当从 PW收到报文时, 若不能根据报文的 VBD ID 和目的 MAC地址从转发表中获取报文出口, 则根据 VBD ID从 VBD表 获取对应 VBD的出口, 根据解封装规则解封报文后发出。
上述方案中, 所述 AC属性表为: 由所在 PE上 AC入口信息, 和 AC入口对应的 VBD ID及虚拟专用网 VPN ID组成的表。
上述方案中,所述 VBD表为: 由一个或多个 VBD记录组成的表格, 每个 VBD记录以 VBD ID为标识, 每个 VBD记录中包含当前 PE分配 给该 VBD的所有 AC和 PW出口信息。
上述方案中, 所述转发表包括: 报文的源 MAC地址、 目的 MAC地 址、 VBD ID、 VPN ID、 PW或 AC出口信息。
上述方案中, 所述若不能根据 VBD ID和报文的目的 MAC地址从 转发表获取报文出口,则根据 VBD ID从 VBD表获取对应 VBD的出口, 按照封装规则封装报文后发出, 包括: 提取报文的目的 MAC地址, 判断是否能根据 VBD ID和目的 MAC 地址从转发表中查出报文的 PW或 AC 出口, 若能, 则获取报文的 PW 或 AC出口, 将出口为 PW的报文按照封装规则用 VBD ID封装后发出, 或将出口为 AC的报文直接发出;
若不能, 则利用 VBD ID从 VBD表查找相同 VBD中所有 AC和 / 或 PW出口, 如果当前 PE为 VPWS模式, 则将出口为 PW的报文按照 封装规则用 VBD ID封装后发出, 或将出口为 AC的报文直接发出; 如 果当前 PE为 VPLS模式, 则将报文按照 AC和 /或 PW出口的数量进复 制, 将出口为 PW的报文按照封装规则用 VBD ID封装后发出, 和 /或将 出口为 AC的报文直接发出; 其中, 所述封装规则为: 将 VBD ID增加 在报文的指定的字段中。
上述方案中, 所述若不能根据报文的 VBD ID和目的 MAC地址从 转发表中获取报文出口, 则根据 VBD ID从 VBD表获取对应 VBD的出 口, 根据解封装规则解封报文后发出, 包括:
提取 文的 VBD ID和目的 MAC地址,判断是否能才艮据 VBD ID和 目的 MAC地址从转发表中查出报文的 PW或 AC 出口, 若能, 则将出 口为 PW的报文直接发出, 或将出口为 AC的报文根据解封装规则解封 后发出;
若不能, 则利用 VBD ID从 VBD表查找相同 VBD中所有 AC和 / 或 PW出口, PE判断当前所处模式为 VPWS模式还是 VPLS模式,如果 当前 PE为 VPWS模式, 则将出口为 PW的报文直接发出, 或者将出口 为 AC的报文根据解封装规则解封后发出; 如果当前 PE为 VPLS模式, 则将报文按照 AC和 /或 PW出口的数量进复制, 将出口为 PW的报文直 接发出, 和 /或, 将出口为 AC的报文根据解封装规则解封后发出; 其中, 所述解封装规则为:将 VBD ID和 PW信息从报文的指定的字段中删除。 本发明实施例还提供了一种 L2VPN中广播域的建立装置, 该装置包 括: AC处理模块、 控制模块和 PW处理模块; 其中,
AC处理模块, 配置为当收到控制模块发来的报文时,根据 AC属性 表查出报文的 VBD ID , 若不能根据 VBD ID和报文的目的 MAC地址从 控制模块中的转发表获取报文出口,则根据 VBD ID从 VBD表获取对应 VBD的出口, 按照封装规则封装报文后发出;
控制模块, 配置为当从 AC收到报文时, 将报文发给 AC处理模块, 当从 PW收到报文时, 将报文发给 PW处理模块, 以及为 AC处理模块 和 PW处理模块提供转发表以及 VBD表;
PW处理模块, 配置为当收到报文时, 若不能根据报文的 VBD ID和 目的 MAC地址从控制模块中的转发表获取报文出口, 则根据 VBD ID 从控制模块中的 VBD表获取对应 VBD的出口, 根据解封装规则解封报 文后发出。
上述方案中,所述控制模块,配置为保存由所在 PE上 AC入口信息, 和 AC入口对应的 VBD ID及 VPN ID组成的 AC属性表。
上述方案中, 所述控制模块, 配置为保存 VBD表, 所述 VBD表包 括由一个或多个 VBD记录组成的表格, 每个 VBD记录以 VBD ID为标 识,每个 VBD记录中包含当前所在 PE分配给该 VBD的所有 AC和 PW 出口信息。
上述方案中, 所述控制模块, 配置为保存转发表; 所述转发表包括: 才艮文的源 MAC地址、 目的 MAC地址、 VBD ID、 VPN ID、 PW或 AC出 口信息。
上述方案中, 所述 AC处理模块, 配置为提取报文的目的 MAC地 址, 判断是否能根据 VBD ID和目的 MAC地址从控制模块的转发表查 出报文的 PW或 AC出口, 若能, 则获取报文的 PW或 AC出口, 将出 口为 PW的报文按照封装规则用 VBD ID封装后发出, 或将出口为 AC 的报文直接发出; 若不能, 则利用 VBD ID从控制模块的 VBD表中查找 相同 VBD中所有 AC和 /或 PW出口, 如果所在 PE当前为 VPWS模式, 则将出口为 PW的报文按照封装规则用 VBD ID封装后发出, 或将出口 为 AC的报文直接发出, 如果所在 PE当前为 VPLS模式, 则将报文按照 AC和 /或 PW出口的数量进复制, 将出口为 PW的报文按照封装规则用 VBD ID封装后发出, 和 /或将出口为 AC的报文直接发出; 其中, 所述 封装规则为: 将 VBD ID增加在报文的指定的字段中。
上述方案中, 所述 PW处理模块, 配置为提取报文的 VBD ID和目 的 MAC地址,判断是否能根据 VBD ID和目的 MAC地址从控制模块的 转发表中查出报文的 PW或 AC出口, 若能, 则将出口为 PW的报文直 接发出, 或将出口为 AC的报文根据解封装规则解封后发出; 若不能, 则利用 VBD ID从控制模块的 VBD表查找相同 VBD中所有 AC和 /或 PW 出口, 判断当前所处模式为 VPWS模式还是 VPLS模式, 如果为 VPWS 模式, 则将出口为 PW的报文直接发出, 或者将出口为 AC的报文根据 解封装规则解封后发出, 如果当前为 VPLS模式, 则将报文按照 AC和 / 或 PW出口的数量进复制, 将出口为 PW的报文直接发出, 和 /或, 将出 口为 AC的报文根据解封装规则解封后发出; 其中, 所述解封装规则为: 将 VBD ID和 P W信息从报文的指定的字段中删除。
上述方案中, 所述装置作为逻辑单元安装在 PE中。
本发明实施例所提供的 L2VPN 中广播域的建立方法及装置, 能够将 AC发来的报文根据 VBD ID从 VBD表获取对应 VBD的出口,并按照封 装规则将报文封装为本 VBD 的报文发出, 以及将 PW发来的报文根据 VBD ID从 VBD表获取对应 VBD的出口, 按照解封装规则将报文解封 装后发出。如此,在 VPWS这种点到点的业务模型中,就可以通过 VBD ID 来区分新增的 VBD域, 从而就不需在 PE中配置更多的 PW用来传输不同 VPN中的数据, 如此可以减小配置 PW的开销及工作量; 并且, 在 VPLS 这种多点到多点的业务模型中, 能通过 VBD ID来区分新增的 VBD域, 使 PE区分发往不同 VBD的广播报文, 从而可减少复制报文后丟弃的情况, 进而减少 VPLS广播对内部通道带宽的浪费。 附图说明
图 1为本发明实施例的 L2VPN中广播域的建立方法流程示意图; 图 2为本发明实施例的 L2VPN中广播域的建立装置组成结构示意图。 具体实施方式
本发明实施例的基本思想是: 当从 AC收到报文时, 根据 AC属性 表查出报文的 VBD ID; 若不能根据 VBD ID和报文的目的 MAC地址从 转发表获取报文出口,则根据 VBD ID从 VBD表获取对应 VBD的出口, 按照封装规则封装报文后发出; 当从 PW收到报文时, 若不能根据报文 的 VBD ID和目的 MAC地址从转发表中获取报文出口, 则根据 VBD ID 从 VBD表获取对应 VBD的出口, 根据解封装规则解封报文后发出。
下面结合附图及具体实施例对本发明再作进一步详细的说明。
本发明实施例提出的 L2VPN中广播域的建立方法, 如图 1所示, 包 括以下步骤:
步骤 101 : PE创建 VPN后, 设置 AC属性表和 VBD表。
具体的, 对 PE进行 VPN配置, 创建 VPN, 再根据 VBD组网规划 设置 AC属性表和 VBD信息表;
这里, 所述进行 VPN配置, 创建 VPN为现有技术, 可以包括: PW 连接的创建、 管理和维护, 这里不做赘述;
所述 VBD组网规划为: 根据实际组网需求, 将每个 VPN划分出一 个或多个 VBD, 为每个 VBD设定标识, 并为每个 VBD划分组成设备; 所述 AC属性表为由所在 PE上 AC入口信息, 和 AC入口对应的 VBD ID及 VPN ID组成的表; 其中, 所述 AC入口信息为 PE设备中为 每个 AC连接定义的逻辑接口信息,可以包括接口的标识、属性等内容; 所述 VBD表为: 由一个或多个 VBD记录组成的表格, 每个 VBD 记录以 VBD ID为标识, 每个 VBD记录中包含当前 PE分配给该 VBD 的所有 AC和 PW出口信息; 所述 AC及 PW出口信息可以为 AC及 PW 的标识。
另外,完成步骤 101之后,还可以根据实际需要,判断是否开启 VBD 功能, 如果开启 VBD功能, 则执行步骤 102; 如不开启 VBD功能, 则 按照现有技术进行后续处理, 这里不做赘述, 结束处理流程。
步骤 102: PE判断当前是否收到 AC或 PW发来的报文,若收到 AC 发来的报文,则执行步骤 103 ;若收到 PW发来的报文,则执行步骤 106。
步骤 103 : PE根据报文的 AC入口从 AC属性表查出 VBD ID。
这里, 所述从 AC属性表查出 VBD ID包括: 从 AC属性表中, 查 找报文的 AC入口信息对应的记录,在查找到的记录中提取该入口对应 的 VPN ID以及一个或多个 VBD ID;
所述报文的 AC入口为接收到报文的 AC接口对应的信息, 其获取 方法为现有技术, 这里不做赘述。
步骤 104: PE从报文中提取目的 MAC地址, 判断是否能利用 VBD ID和目的 MAC地址从转发表中查出报文的 AC或 PW出口, 若能, 则 将出口为 PW的报文按照封装规则用 VBD ID封装后发出,或将出口为 AC的报文直接发出, 结束处理流程; 否则, 执行步骤 105。
这里, 所述转发表包括: 报文的源 MAC地址、 目的 MAC地址、 VBD ID、 VPN ID、 PW或 AC出口信息等; PE中可以同时存在多个转发表, 使用目的 MAC地址、 VBD ID、 VPN ID作为区分各个转发表的标识; 建 立转发表的方法为现有技术, 这里不做赘述。
所述封装规则为: 将 VBD ID增加在报文的指定的字段中; 其中, 所述报文可以为现有技术中已有的流标签; 所述发送为按照现有技术发 送, 这里不做赘述。
步骤 105 : PE根据 VBD ID从 VBD表查出 AC和 /或 PW出口; 将 出口为 PW的报文按照封装规则用 VBD ID封装后发出, 和 /或将出口为 AC的报文直接发出, 结束处理流程。
具体为: PE利用 VBD ID从 VBD表查找相同 VBD中所有 AC和 / 或 PW出口, PE判断当前所处模式为 VPWS模式还是 VPLS模式,如果 当前 PE为 VPWS模式,则将出口为 PW的报文按照封装规则用 VBD ID 封装后发出, 或将出口为 AC的报文直接发出;
如果当前 PE为 VPLS模式, 则将报文按照 AC和 /或 PW出口的数 量进复制, 和 /或将出口为 PW的报文按照封装规则用 VBD ID封装后发 出, 将出口为 AC的报文直接发出。
步骤 106: PE提取报文的 VBD ID和目的 MAC地址, 判断是否能 根据 VBD ID和目的 MAC地址从转发表中查出报文的 AC或 PW出口, 若能, 则将出口为 PW的报文直接发出, 或将出口为 AC的报文根据解 封装规则解封后发出, 结束处理流程; 否则, 执行步骤 107。
这里, 所述解封装规则为: 将报文中的 VBD ID和 PW信息删除; 其中,所述 PW信息为现有技术中规定的在 PW传输报文时增加的内容, 这里不做赘述。
步骤 107: PE根据 VBD ID从 VBD表获取 AC和 /或 PW出口; 将 出口为 PW的报文直接发出, 和 /或, 将出口为 AC的报文根据解封装规 则解封后发出。 具体为: PE利用 VBD ID从 VBD表查找相同 VBD中所有 AC和 / 或 PW出口, PE判断当前所处模式为 VPWS模式还是 VPLS模式,如果 当前 PE为 VPWS模式, 则将出口为 PW的报文直接发出, 或者将出口 为 AC的报文根据解封装规则解封后发出;
如果当前 PE为 VPLS模式, 则将报文按照 AC和 /或 PW出口的数 量进复制, 将出口为 PW的报文直接发出, 和 /或, 将出口为 AC的报文 根据解封装规则解封后发出。
如图 2所示,本发明实施例提供了一种 L2VPN中广播域的建立装置, 该装置包括: AC处理模块 21、 控制模块 23和 PW处理模块 22; 其中,
AC 处理模块 21, 配置为当收到控制模块 23 发来的报文时, 根据 AC属性表查出报文的 VBD ID,若不能根据 VBD ID和报文的目的 MAC 地址从控制模块 23中的转发表获取报文出口, 则根据 VBD ID从 VBD 表获取对应 VBD的出口, 按照封装规则封装报文后发出;
控制模块 23, 配置为当从 AC收到报文时, 将报文发给 AC处理模 块 21, 当从 PW收到报文时, 将报文发给 PW处理模块 22, 以及为 AC 处理模块 21和 PW处理模块 22提供转发表以及 VBD表;
PW处理模块 22, 配置为当收到报文时, 若不能根据报文的 VBD ID 和目的 MAC地址从控制模块 23中的转发表获取报文出口,则根据 VBD ID从控制模块 23中的 VBD表获取对应 VBD的出口, 根据解封装规则 解封报文后发出。
所述控制模块 23, 配置为创建 VPN后, 设置 AC属性表、 VBD信 息表、 MAC地址表以及标签表。
所述控制模块 23, 配置为对 PE进行 VPN配置, 创建 VPN, 再根 据 VBD组网规划设置 AC属性表和 VBD信息表; 所述 VBD组网规划 为: 根据实际组网需求, 将每个 VPN划分出一个或多个 VBD, 为每个 VBD设定标识, 并为每个 VBD划分组成设备。
所述控制模块 23, 配置为保存 AC属性表; 所述 AC属性表为由所 在 PE上 AC入口信息, 和 AC入口对应的 VBD ID及 VPN ID组成的 表; 其中, 所述 AC入口信息为 PE设备中为每个 AC连接定义的逻辑 接口信息, 可以包括接口的标识、 属性等内容。
所述控制模块 23, 配置为保存 VBD表, 所述 VBD表为: 由一个或 多个 VBD记录组成的表格,每个 VBD记录以 VBD ID为标识,每个 VBD 记录中包含当前 PE分配给该 VBD的所有 AC和 PW出口信息;所述 AC 及 PW出口信息可以为 AC及 PW的标识。
所述控制模块 23, 配置为维护 PW信息表, 包括 PW标签表, PW 属性表; 所述 PW标签表包括 PW所属的 VPN ID; 所述 PW属性表用于 MS-PW上 VPN复用, 用于 MS-PW下行转发, 根据 PW和 VBD ID获 取 PW。
所述控制模块 23, 配置为实时判断当前接收到 AC发来的报文, 还 是 PW发来的报文, 若收到 AC发来的报文, 则将报文发送给 AC处理 模块 21, 若收到 PW发来的报文, 则将报文发给 PW处理模块 22。
所述 AC处理模块 21, 配置为提取报文的目的 MAC地址, 判断是 否能根据 VBD ID、 目的 MAC地址从控制模块 23的转发表中查出报文 的 PW或 AC出口, 若能, 则获取才艮文的 PW或 AC出口, 将出口为 PW 的报文用 VBD ID封装后发出, 或将出口为 AC的报文直接发出; 若不 能, 则利用 VBD ID从控制模块 23的 VBD表查找相同 VBD中所有 AC 和 /或 PW出口, 如果当前 PE为 VPWS模式, 则将出口为 PW的报文用 VBD ID封装后发出, 将出口为 AC 的报文直接发出, 如果当前 PE为 VPLS模式, 则将报文按照 AC和 /或 PW出口的数量进复制, 将出口为 PW的报文用 VBD ID封装后发出, 和 /或将出口为 AC的报文直接发出。 所述控制模块 23, 配置为保存由报文的源 MAC地址、 目的 MAC地 址、 VBD ID、 VPN ID、 PW或 AC出口信息等组成的转发表; 可以同时存 在多个转发表, 使用目的 MAC地址、 VBD ID、 VPN ID作为区分各个转发 表的标识 MAC地址表用目的 MAC地址及 VBD ID、或者目的 MAC地址、 VBD ID及 VPN ID 进行存储, 如果 VBD ID是全局唯一可以使用前者, 如果 VBD ID是 VPN内唯一, 需要使用后者。
所述 PW处理模块 22, 配置为提取报文的目的 MAC地址, 判断是 否能根据 VBD ID、 目的 MAC地址从控制模块 23的转发表中查出报文 的 PW或 AC出口, 若能, 则获取才艮文的 PW或 AC出口, 将出口为 PW 的报文直接发出, 或将出口为 AC的报文根据解封装规则解封后发出; 若不能, 则利用 VBD ID从控制模块 23的 VBD表查找相同 VBD中所 有 AC和 /或 PW出口, 将报文按照 AC和 PW出口的数量进行复制, 将 出口为 AC的报文中的 PW头和 VBD ID删除后从 AC发出报文, 和 /或 将出口为 PW的报文直接发出。
上述装置可以作为逻辑单元安装在 PE中。其中, 所述 AC处理模块 21和 PW处理模块 22可以有 PE中的数据包处理器(PP )实现; 控制模 块 23可以由 PE中的中央处理器 (CPU ) 芯片实现。
以上所述, 仅为本发明的较佳实施例而已, 并非用于限定本发明的 保护范围。

Claims

权利要求书
1、 一种二层虚拟专用网 L2VPN中广播域的建立方法, 该方法包括: 当从接入电路 AC收到报文时, 根据 AC属性表查出报文的虚拟桥 域 VBD标识 ID; 若不能才艮据 VBD ID和^艮文的目的介质访问控制 MAC 地址从转发表获取报文出口, 则根据 VBD ID从 VBD表获取对应 VBD 的出口, 按照封装规则封装报文后发出;
当从伪线 PW收到报文时, 若不能根据报文的 VBD ID和目的 MAC 地址从转发表中获取报文出口,则根据 VBD ID从 VBD表获取对应 VBD 的出口, 根据解封装规则解封报文后发出。
2、 根据权利要求 1所述的方法, 其中, 所述 AC属性表为: 由所在 边缘设备 PE上 AC入口信息, 和 AC入口对应的 VBD ID及虚拟专用网 VPN ID组成的表。
3、 根据权利要求 2所述的方法, 其中, 所述 VBD表为: 由一个或 多个 VBD记录组成的表格,每个 VBD记录以 VBD ID为标识,每个 VBD 记录中包含当前 PE分配给该 VBD的所有 AC和 PW出口信息。
4、 根据权利要求 3所述的方法, 其中, 所述转发表包括: 报文的源 MAC地址、 目的 MAC地址、 VBD ID、 VPN ID、 PW或 AC出口信息。
5、 根据权利要求 4所述的方法, 其中, 所述若不能根据 VBD ID和 报文的目的 MAC地址从转发表获取报文出口, 则根据 VBD ID从 VBD 表获取对应 VBD的出口, 按照封装规则封装报文后发出, 包括:
提取报文的目的 MAC地址, 判断是否能根据 VBD ID和目的 MAC 地址从转发表中查出报文的 PW或 AC 出口, 若能, 则获取报文的 PW 或 AC出口, 将出口为 PW的报文按照封装规则用 VBD ID封装后发出, 或将出口为 AC的报文直接发出;
若不能, 则利用 VBD ID从 VBD表查找相同 VBD中所有 AC和 / 或 PW出口, 如果当前 PE为 VPWS模式, 则将出口为 PW的报文按照 封装规则用 VBD ID封装后发出, 或将出口为 AC的报文直接发出; 如 果当前 PE为 VPLS模式, 则将报文按照 AC和 /或 PW出口的数量进复 制, 将出口为 PW的报文按照封装规则用 VBD ID封装后发出, 和 /或将 出口为 AC的报文直接发出;
其中, 所述封装规则为: 将 VBD ID增加在报文的指定的字段中。
6、根据权利要求 4所述的方法,其中, 所述若不能根据报文的 VBD ID和目的 MAC地址从转发表中获取报文出口, 则根据 VBD ID从 VBD 表获取对应 VBD的出口, 根据解封装规则解封报文后发出, 包括:
提取 文的 VBD ID和目的 MAC地址,判断是否能才艮据 VBD ID和 目的 MAC地址从转发表中查出报文的 PW或 AC 出口, 若能, 则将出 口为 PW的报文直接发出, 或将出口为 AC的报文根据解封装规则解封 后发出;
若不能, 则利用 VBD ID从 VBD表查找相同 VBD中所有 AC和 / 或 PW出口, PE判断当前所处模式为 VPWS模式还是 VPLS模式,如果 当前 PE为 VPWS模式, 则将出口为 PW的报文直接发出, 或者将出口 为 AC的报文根据解封装规则解封后发出; 如果当前 PE为 VPLS模式, 则将报文按照 AC和 /或 PW出口的数量进复制, 将出口为 PW的报文直 接发出, 和 /或, 将出口为 AC的报文根据解封装规则解封后发出;
其中, 所述解封装规则为: 将 VBD ID和 PW信息从报文的指定的 字段中删除。
7、 一种 L2VPN中广播域的建立装置, 该装置包括: AC处理模块、 控制模块和 PW处理模块; 其中,
AC处理模块, 配置为当收到控制模块发来的报文时,根据 AC属性 表查出报文的 VBD ID , 若不能根据 VBD ID和报文的目的 MAC地址从 控制模块中的转发表获取报文出口,则根据 VBD ID从 VBD表获取对应 VBD的出口, 按照封装规则封装报文后发出;
控制模块, 配置为当从 AC收到报文时, 将报文发给 AC处理模块, 当从 PW收到报文时, 将报文发给 PW处理模块, 以及为 AC处理模块 和 PW处理模块提供转发表以及 VBD表;
PW处理模块, 配置为当收到报文时, 若不能根据报文的 VBD ID和 目的 MAC地址从控制模块中的转发表获取报文出口, 则根据 VBD ID 从控制模块中的 VBD表获取对应 VBD的出口, 根据解封装规则解封报 文后发出。
8、 根据权利要求 7所述的装置, 其中,
所述控制模块, 配置为保存由所在 PE上 AC入口信息, 和 AC入口 对应的 VBD ID及 VPN ID组成的 AC属性表。
9、 根据权利要求 8所述的装置, 其中,
所述控制模块, 配置为保存 VBD表, 所述 VBD表包括由一个或多 个 VBD记录组成的表格, 每个 VBD记录以 VBD ID为标识, 每个 VBD 记录中包含当前所在 PE分配给该 VBD的所有 AC和 PW出口信息。
10、 根据权利要求 9所述的装置, 其中,
所述控制模块,配置为保存转发表; 所述转发表包括:报文的源 MAC 地址、 目的 MAC地址、 VBD ID、 VPN ID、 PW或 AC出口信息。
11、 根据权利要求 10所述的装置, 其中,
所述 AC处理模块, 配置为提取报文的目的 MAC地址, 判断是否 能根据 VBD ID和目的 MAC地址从控制模块的转发表查出报文的 PW或 AC出口, 若能, 则获取报文的 PW或 AC出口, 将出口为 PW的报文按 照封装规则用 VBD ID封装后发出, 或将出口为 AC的报文直接发出; 若不能, 则利用 VBD ID从控制模块的 VBD表中查找相同 VBD中所有 AC和 /或 PW出口, 如果所在 PE当前为 VPWS模式, 则将出口为 PW 的报文按照封装规则用 VBD ID封装后发出, 或将出口为 AC的报文直 接发出, 如果所在 PE当前为 VPLS模式, 则将报文按照 AC和 /或 PW 出口的数量进复制, 将出口为 PW的报文按照封装规则用 VBD ID封装 后发出, 和 /或将出口为 AC的报文直接发出;
其中, 所述封装规则为: 将 VBD ID增加在报文的指定的字段中。
12、 根据权利要求 10所述的装置, 其中,
所述 PW处理模块, 配置为提取报文的 VBD ID和目的 MAC地址, 判断是否能根据 VBD ID和目的 MAC地址从控制模块的转发表中查出 报文的 PW或 AC出口, 若能, 则将出口为 PW的报文直接发出, 或将 出口为 AC的报文根据解封装规则解封后发出; 若不能, 则利用 VBD ID 从控制模块的 VBD表查找相同 VBD中所有 AC和 /或 PW出口,判断当 前所处模式为 VPWS模式还是 VPLS模式, 如果为 VPWS模式, 则将出 口为 PW的报文直接发出, 或者将出口为 AC的报文根据解封装规则解 封后发出, 如果当前为 VPLS模式, 则将报文按照 AC和 /或 PW出口的 数量进复制, 将出口为 PW的报文直接发出, 和 /或, 将出口为 AC的报 文根据解封装规则解封后发出;
其中, 所述解封装规则为: 将 VBD ID和 PW信息从报文的指定的 字段中删除。
13、 根据权利要求权 7至 12任一项所述的装置, 其中, 所述装置作 为逻辑单元安装在 PE中。
PCT/CN2013/083425 2012-09-14 2013-09-12 一种建立通信链路的方法、系统及装置 WO2014040553A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
ES13837728.8T ES2616839T3 (es) 2012-09-14 2013-09-12 Método, sistema y aparato para establecer un enlace de comunicación
EP13837728.8A EP2897328B1 (en) 2012-09-14 2013-09-12 Method, system and apparatus for establishing communication link

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210341669.8 2012-09-14
CN201210341669.8A CN102857400B (zh) 2012-09-14 2012-09-14 一种二层虚拟专用网中广播域的建立方法及装置

Publications (1)

Publication Number Publication Date
WO2014040553A1 true WO2014040553A1 (zh) 2014-03-20

Family

ID=47403606

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/083425 WO2014040553A1 (zh) 2012-09-14 2013-09-12 一种建立通信链路的方法、系统及装置

Country Status (4)

Country Link
EP (1) EP2897328B1 (zh)
CN (1) CN102857400B (zh)
ES (1) ES2616839T3 (zh)
WO (1) WO2014040553A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111092822A (zh) * 2019-12-25 2020-05-01 安徽皖通邮电股份有限公司 一种vpls的pw线性保护转发负载均衡的方法

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102857400B (zh) * 2012-09-14 2016-03-30 中兴通讯股份有限公司 一种二层虚拟专用网中广播域的建立方法及装置
CN109936503B (zh) * 2017-12-15 2021-04-23 上海诺基亚贝尔股份有限公司 基于evpn的网状vpws系统和建立网状vpws实例的方法及设备
CN108322338B (zh) * 2018-01-23 2021-02-26 新华三技术有限公司 一种广播抑制方法和vtep设备
CN110417655B (zh) * 2018-04-28 2021-07-02 中兴通讯股份有限公司 一种数据报文转发的方法及装置
CN113726633B (zh) * 2021-08-12 2023-04-07 中国联合网络通信集团有限公司 转发方法和转发装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070206492A1 (en) * 2003-01-07 2007-09-06 Corrigent Systems Ltd. Hierarchical virtual private lan service protection scheme
CN101588379A (zh) * 2009-06-26 2009-11-25 迈普通信技术股份有限公司 二层虚拟专用网多点接入方法
CN101616082A (zh) * 2009-07-29 2009-12-30 杭州华三通信技术有限公司 一种虚拟专用局域网服务网络中报文处理的方法及设备
CN102857400A (zh) * 2012-09-14 2013-01-02 中兴通讯股份有限公司 一种二层虚拟专用网中广播域的建立方法及装置

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE60314033T2 (de) * 2002-03-15 2008-01-31 Broadcom Corp., Irvine Schellpfadimplementierung für transparente LAN-Dienste über(MPLS)
CN100442772C (zh) * 2005-10-19 2008-12-10 华为技术有限公司 一种桥接转发方法
CN101938415B (zh) * 2010-08-30 2012-07-18 北京傲天动联技术有限公司 网络转发设备的快速转发方法
CN102594651A (zh) * 2011-01-07 2012-07-18 华为数字技术有限公司 一种pbb h-vpls网络中的业务保护方法
CN102333028B (zh) * 2011-06-22 2013-02-13 杭州华三通信技术有限公司 一种分层式二层虚拟专用网发送报文的方法及通信设备

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070206492A1 (en) * 2003-01-07 2007-09-06 Corrigent Systems Ltd. Hierarchical virtual private lan service protection scheme
CN101588379A (zh) * 2009-06-26 2009-11-25 迈普通信技术股份有限公司 二层虚拟专用网多点接入方法
CN101616082A (zh) * 2009-07-29 2009-12-30 杭州华三通信技术有限公司 一种虚拟专用局域网服务网络中报文处理的方法及设备
CN102857400A (zh) * 2012-09-14 2013-01-02 中兴通讯股份有限公司 一种二层虚拟专用网中广播域的建立方法及装置

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111092822A (zh) * 2019-12-25 2020-05-01 安徽皖通邮电股份有限公司 一种vpls的pw线性保护转发负载均衡的方法

Also Published As

Publication number Publication date
CN102857400A (zh) 2013-01-02
CN102857400B (zh) 2016-03-30
EP2897328B1 (en) 2017-01-25
EP2897328A4 (en) 2015-09-30
EP2897328A1 (en) 2015-07-22
ES2616839T3 (es) 2017-06-14

Similar Documents

Publication Publication Date Title
CN107959654B (zh) 一种数据传输方法、装置及混合云系统
WO2014040553A1 (zh) 一种建立通信链路的方法、系统及装置
WO2018041152A1 (zh) 宽带远程接入服务器控制平面功能和转发平面功能的分离
US7385973B1 (en) Method and apparatus for VLAN ID discovery
CN102170385B (zh) 一种以太树业务中以太网帧的发送方法和运营商边缘设备
US8085791B1 (en) Using layer two control protocol (L2CP) for data plane MPLS within an L2 network access node
JP2021530912A (ja) ネットワークスライス制御方法及び装置、コンピュータ読み取り可能な記憶媒体
CN101277245B (zh) 一种l2vpn跨域的实现方法、系统和装置
WO2009127128A1 (zh) 一种防止以太无源光网络中下行数据洪泛的方法
WO2014067280A1 (zh) 组播处理方法、装置及系统
WO2010034255A1 (zh) 数据传输方法及网络节点和数据传输系统
WO2009067871A1 (fr) Procédé, système et dispositif de gestion de sécurité d'accès d'utilisateur
WO2013155959A1 (en) Accessing ip network and edge devices
WO2014194711A1 (zh) 报文处理方法、设备标签处理方法及设备
WO2016180020A1 (zh) 一种报文处理方法、设备和系统
US20060031925A1 (en) Access control method and apparatus
WO2009049503A1 (fr) Procédé et dispositif permettant de découvrir automatiquement une topologie de réseau et de gérer des ressources sur un réseau pbb te
WO2009021371A1 (fr) Procédé et dispositif permettant de réaliser une émulation pseudo-filaire de bout en bout
WO2013139159A1 (zh) 在网络中转发报文的方法和运营商边缘设备
WO2007124679A1 (fr) Procédé et système de communication en réseau
WO2013139270A1 (zh) 实现三层虚拟专用网络的方法、设备及系统
US8594127B2 (en) Communication device and communication method
WO2015161736A1 (zh) 一种指示组播转发表项的方法及设备
WO2006108344A1 (fr) Procede de realisation de reseau prive virtuel
WO2011057512A1 (zh) 以太网业务接入承载隧道的方法、运营商边缘设备和系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13837728

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

REEP Request for entry into the european phase

Ref document number: 2013837728

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2013837728

Country of ref document: EP