WO2017181637A1 - Openflow protocol-based sdn l2vpn implementation method and system - Google Patents

Openflow protocol-based sdn l2vpn implementation method and system Download PDF

Info

Publication number
WO2017181637A1
WO2017181637A1 PCT/CN2016/102798 CN2016102798W WO2017181637A1 WO 2017181637 A1 WO2017181637 A1 WO 2017181637A1 CN 2016102798 W CN2016102798 W CN 2016102798W WO 2017181637 A1 WO2017181637 A1 WO 2017181637A1
Authority
WO
WIPO (PCT)
Prior art keywords
level
flow
group table
sdn
network
Prior art date
Application number
PCT/CN2016/102798
Other languages
French (fr)
Chinese (zh)
Inventor
杜伟涛
Original Assignee
烽火通信科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 烽火通信科技股份有限公司 filed Critical 烽火通信科技股份有限公司
Priority to SG11201804250YA priority Critical patent/SG11201804250YA/en
Priority to MYPI2018701855A priority patent/MY198118A/en
Publication of WO2017181637A1 publication Critical patent/WO2017181637A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • H04L12/4645Details on frame tagging
    • H04L12/4666Operational details on the addition or the stripping of a tag in a frame, e.g. at a provider edge node
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/50Routing or path finding of packets in data switching networks using label swapping, e.g. multi-protocol label switch [MPLS]

Definitions

  • the present invention relates to the field of SDN networks, and in particular, to a method and system for implementing an SDN network L2VPN based on the OPEN_FLOW protocol.
  • the purpose of the present invention is to overcome the deficiencies of the above background art, and to provide an implementation method and system for an SDN network L2VPN based on the OPEN_FLOW protocol, which provides great help for an operator to quickly open a customer dedicated line service under the SDN network architecture, and the network is no longer dependent.
  • the service provider can quickly open the collection service through the android-based APP software provided by the equipment manufacturer.
  • the invention provides an implementation method of an SDN network L2VPN based on the OPEN_FLOW protocol, comprising the following steps:
  • NNI service model is implemented by a primary flow table and a three-level nested group table:
  • the first level flow table is used to identify the user data packet; when the matching field of the user data stream has a corresponding flow entry matching, the corresponding application action of the first level flow table is executed; Level nested group table for processing;
  • the pseudo-line label is encapsulated according to the bucket action in the group table, and the data stream enters after processing.
  • the second level group table is processed;
  • the label switching path LSP label is encapsulated according to the bucket action in the group table.
  • the data stream enters the third-level group table for processing after processing;
  • the NNI---> UNI service model of the SDN Layer 2 VPN is implemented by a three-level flow table and a first-level group table:
  • the first level flow table is used to identify the packets on the network side, and the data flow on the network side has corresponding The flow entry is matched, and the corresponding application action of the first-level flow table is executed, and the data flow is transferred to the second-level flow table;
  • the second-level flow table is used to match the LSP label on the network side, and the egress action in the action action pops up the LSP label on the network side, and then the data flow is switched to the third-level flow table.
  • the third-level flow table is used to process the inner layer pseudo-line label.
  • the application action of the third-level flow table is executed, when all the third-level flow tables are After the application action is executed, the data flow will be transferred to the group table, and the group table determines the export of the data packet.
  • the first level flow table is a three-state content address memory table.
  • the matching domain of the first-level flow table is a receiving port + Vlan + Ethernet type, and is used for performing shunt processing on different user data.
  • step A after the egress lookup is performed in the third-level group table, if there is a link aggregation protection related configuration, the process proceeds to the link aggregation process.
  • the group table has a related process of the user label. If the user label does not need to be processed, the user message is directly sent from a specified physical port.
  • the invention also provides an SDN network L2VPN implementation system based on the OPEN_FLOW protocol, which comprises a software defined network SDN layer 2 virtual private network VPN user network interface UNI---> network-network interface NNI service model and SDN Layer 2 VPN NNI--->UNI business model,
  • the UNI--->NNI service model of the SDN Layer 2 VPN is implemented by a primary flow table and a three-level nested group table:
  • the first level flow table is used to identify user data packets; when the user data stream matches If the corresponding flow entry is matched, the corresponding application action of the first-level flow table is executed; the subsequent service is transferred to the three-level nested group table for processing;
  • the pseudo-line label is encapsulated according to the bucket action in the group table, and the data stream enters after processing.
  • the second level group table is processed;
  • the label switching path LSP label is encapsulated according to the bucket action in the group table.
  • the data stream enters the third-level group table for processing after processing;
  • the NNI---> UNI service model of the SDN Layer 2 VPN is implemented by a three-level flow table and a first-level group table:
  • the first-level flow table is used to identify the packet on the network side.
  • the corresponding application action of the first-level flow table is executed, and the data flow is switched to the second-level flow table.
  • the second-level flow table is used to match the LSP label on the network side, and the egress action in the action action pops up the LSP label on the network side, and then the data flow is switched to the third-level flow table.
  • the third-level flow table is used to process the inner layer pseudo-line label.
  • the application action of the third-level flow table is executed, when all the third-level flow tables are After the application action is executed, the data flow will be transferred to the group table, and the group table determines the export of the data packet.
  • the first level flow table is a three-state content address memory table.
  • the matching domain of the first-level flow table is a receiving port + Vlan + Ethernet type, and is used for performing shunt processing on different user data.
  • the group table has related processing of user tags, and if the user tags do not need to be processed, the user reports The text is sent directly from a specified physical port.
  • the present invention greatly assists the operator to quickly open the customer dedicated line service under the SDN network architecture.
  • the network opening is no longer dependent on the network management, and the service provider can quickly open the customer service through the android system-based APP software provided by the equipment manufacturer.
  • the service provider can completely ignore the difference between the underlying devices and configure the service in the cloud.
  • FIG. 1 is a flow chart of data processing of an L2VPN UNI--->NNI in an embodiment of the present invention.
  • FIG. 2 is a flow chart of data processing of an L2VPN NNI---> UNI in the embodiment of the present invention.
  • the invention is based on Marvell's programmable NP (Network Processor) chip to realize virtual private line service, and the forwarding flow table design fully complies with the relevant provisions in the ONF OPEN FLOW protocol 1.4.0.
  • Ing_Port_Tbl Inbound port table, this entry is based on Np (Network Processor, Network processor) physical port, each Np physical port has an inbound port table;
  • Np Network Processor, Network processor
  • My_Mac_Tbl port Mac table, this table is used to check the packet Mac address
  • Table0_Tbl The first-level flow table, which is used to distinguish data packets of different users.
  • the match_field (matching field) of the flow table is the receiving port + Vlan + Ethernet type.
  • Table1_Tbl a second-level flow table, which is used to match a label of a network-side LSP (Label Switched Path), and a match_field is an LSP label.
  • Table 2_Tbl a third-level flow table, which is used to match PW (Pseudo Wire) tags, and match_field is a PW tag;
  • Group0_Bucket1_Tbl The Bucket1 table of the first-level group is used to encapsulate the PW label for PW1:1 protection.
  • the Bucket2 table of the first-level group is mainly used to encapsulate the standby PW label when PW1:1 protection is applied.
  • the Bucket1 table of the second-level group is mainly used to encapsulate the primary LSP label and the Ethernet VLAN (Virtual Local Area Network, DMAC (Destination media access control)).
  • VLAN Virtual Local Area Network, DMAC (Destination media access control)
  • Group1_Bucket2_Tbl The bucket1 table of the second-level group is mainly used to encapsulate the LSP label, Ethernet VLan, and Dmac when LSP1:1 protection is applied.
  • Group2_Bucket1_Tbl The third-level Group table is mainly used to encapsulate the data packet Smac (Source media access control).
  • the SDN Layer 2 VPN service is composed of the UNI (User Network Interface)--->NNI (Network Network Interface) direction and the NNI--->UNI direction. The following two directions are used. The processing is explained separately.
  • the embodiment of the invention provides an SDN network L2VPN implementation system based on the OPEN_FLOW protocol, which includes an SDN Layer 2 VPN UNI--->NNI service model and an SDN Layer 2 VPN NNI---> UNI service model.
  • the embodiment of the invention further provides an implementation method of an SDN network L2VPN based on the OPEN_FLOW protocol, comprising the following steps:
  • the SDN Layer 2 VPN UNI--->NNI service model is implemented by a primary flow table and a three-level nested Group table:
  • the first level flow table table0 is a TCAM (Ternary Content Addressable Memory) table, which is used to identify user data packets. Since the TCAM table is tri-state, the match_field can be a port. Any combination with the user Vlan, this matching method greatly facilitates the shunting of different user data. When the match field of the user data stream has a corresponding flow entry matching, the corresponding Apply action of table0 will be executed. According to our flow table design, the subsequent business will be transferred to the three-level nested Group table for processing.
  • TCAM Binary Content Addressable Memory
  • the PW label is encapsulated according to the group type (group type). If there is no PW protection, the PW label is encapsulated according to the bucket action in the group table. After processing, the data stream will enter the second level group for processing.
  • the label switching path LSP label is encapsulated according to the bucket action in the group table.
  • the data stream enters the third-level group table for processing.
  • the processing of the second-level group table is similar to that of the first-level group table. The only difference is that the LSP label is encapsulated, and the processing of LSP 1:1 is also performed in the second-level flow table.
  • the third-level group is used for the egress lookup.
  • the egress lookup is performed. If there is a configuration related to the link aggregation protection (Lag), the process of the Lag process is transferred to the L2VPN.
  • Layer 2 Virtual Private Network, the second layer of virtual private network) UNI to NNI basic processing flow is over.
  • the SDN Layer 2 VPN NNI---> UNI service model is implemented by a three-level flow table and a first-level group table:
  • the first level flow table table0 is a TCAM table, which is used to identify the packets on the network side.
  • the corresponding Apply action of the table0 is executed, and the data flow is performed.
  • the second stage flow table table1 is a TCAM table, which is used to identify the packets on the network side.
  • the second-level flow table table1 is used to match the network-side LSP label. Because it is a Layer 2 VPN service, the pop-up action in the application action (Ipop, Ipop: Internal popup of the Apply Action) pops up the LSP label on the network side. Then the data stream is transferred to the third-level flow table table2;
  • the third-level flow table table2 is used to process the inner PW tag.
  • the Apply action of the third-level flow table table2 is executed, when all the third-level flow tables are applied. After the Action is executed, the data flow will be transferred to the Group table.
  • the group table determines the export of the data packet. In the group table, there is a related processing of the Ctag (Customer Tag). If the user tag (tag) does not need to be processed, the user packet is directly sent from a specified physical port.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Disclosed in the present invention are an OpenFlow protocol-based SDN L2VPN implementation method and system, related to the SDN field. The method comprises the following steps: an SDN L2VPN UNI-->NNI service model implemented with one flow table level and three levels of nested group tables: a first level flow table identifying a user data message; when a user data stream match field matches a corresponding flow entry, executing the corresponding apply action of the first level flow table; if there is no pseudowire protection in a first level group table, executing pseudowire tag encapsulation according to a bucket action in the group table; if there is no pseudowire protection in a second group table, executing LSP tag encapsulation and LSP 1:1 processing according to a bucket action in the group table; a third level group table executing egress port lookup. The present invention helps operators in an SDN network architecture to rapidly activate group customer dedicated line service, making network activation no longer dependent on a network administrator.

Description

基于OPEN_FLOW协议的SDN网络L2VPN实现方法及系统Method and system for implementing SDN network L2VPN based on OPEN_FLOW protocol 技术领域Technical field
本发明涉及SDN网络领域,具体是涉及一种基于OPEN_FLOW协议的SDN网络L2VPN实现方法及系统。The present invention relates to the field of SDN networks, and in particular, to a method and system for implementing an SDN network L2VPN based on the OPEN_FLOW protocol.
背景技术Background technique
随着移动设备、虚拟服务器、云服务等的快速发展,传统网络架构的弊端越发凸显,传统网络越来越不能适应当今的网络需求。例如:大部分的传统网络是层次化并且基于客户服务器模型的静态架构,这种静态的架构已经不能很好的适应现在的企业数据动态计算和存储的状况。随着云服务的快速增长,企业越来越希望能够按需快速接入公共网络和共享其他IT(Information Technology,信息技术/互联网技术)资源,而传统网络由于复杂的协议,部署相当困难,网络工程师们往往需要花费数日至数月,才能将一个网络搭建调试完成,供给用户使用,这极大的限制了企业的发展。With the rapid development of mobile devices, virtual servers, cloud services, etc., the drawbacks of traditional network architectures become more and more prominent, and traditional networks are increasingly unable to adapt to today's network needs. For example, most traditional networks are hierarchical and based on the static architecture of the client server model. This static architecture is not well adapted to the current state of dynamic computing and storage of enterprise data. With the rapid growth of cloud services, enterprises are increasingly hoping to quickly access public networks and share other IT (Information Technology/Internet Technology) resources on demand. Traditional networks are difficult to deploy due to complex protocols. Engineers often take days to months to complete a network setup and commissioning, which is used by users. This greatly limits the development of the enterprise.
另外,传统网络的扩展也是一项非常复杂的任务,当一台设备需要加入已存在的一个网络时,网络工程师可能需要对全网的设备进行配置,SDN(Software Defined Network,软件定义网络)网络的出现将从根本上解决诸如上述的一些网络问题。In addition, the extension of the traditional network is also a very complicated task. When a device needs to join an existing network, the network engineer may need to configure the entire network device, SDN (Software Defined Network) network. The emergence of these will fundamentally solve some network problems such as the above.
随着SDN网络技术的快速发展,可以预见未来将会有越来越多的SDN网络被部署,在SDN网络架构下,转发层面对VPWS(Virtual Pseudo Wire Service,虚拟专用线路业务)的具体实现成为本领域亟待解决的技术难题。 With the rapid development of SDN network technology, it is foreseeable that more and more SDN networks will be deployed in the future. Under the SDN network architecture, the specific implementation of the VPWS (Virtual Pseudo Wire Service) in the forwarding layer becomes Technical problems to be solved in the field.
发明内容Summary of the invention
本发明的目的是为了克服上述背景技术的不足,提供一种基于OPEN_FLOW协议的SDN网络L2VPN实现方法及系统,对SDN网络架构下运营商快速开通集客专线业务提供巨大的帮助,网络开通不再依赖于网管,服务提供商可以通过设备厂商配套的基于android系统的APP软件快速开通集客业务。The purpose of the present invention is to overcome the deficiencies of the above background art, and to provide an implementation method and system for an SDN network L2VPN based on the OPEN_FLOW protocol, which provides great help for an operator to quickly open a customer dedicated line service under the SDN network architecture, and the network is no longer dependent. In the network management, the service provider can quickly open the collection service through the android-based APP software provided by the equipment manufacturer.
本发明提供一种基于OPEN_FLOW协议的SDN网络L2VPN实现方法,包括以下步骤:The invention provides an implementation method of an SDN network L2VPN based on the OPEN_FLOW protocol, comprising the following steps:
A、软件定义网络SDN二层虚拟专用网络VPN的用户网络接口UNI--->网络-网络接口NNI业务模型由一级流表和三级嵌套的群组表实现:A. Software-defined network SDN Layer 2 Virtual Private Network VPN User Network Interface UNI---> Network-Network Interface The NNI service model is implemented by a primary flow table and a three-level nested group table:
第一级流表用来对用户数据报文进行识别;当用户数据流的匹配域有相应的流条目与之匹配,则第一级流表的相应应用动作被执行;之后的业务转向到三级嵌套的群组表进行处理;The first level flow table is used to identify the user data packet; when the matching field of the user data stream has a corresponding flow entry matching, the corresponding application action of the first level flow table is executed; Level nested group table for processing;
在第一级群组表里,根据群组表类型来区分是否有伪线保护,如果没有伪线保护,则根据群组表里的桶动作进行伪线标签的封装,处理完后数据流进入第二级群组表进行处理;In the first-level group table, whether there is pseudo-line protection according to the group table type, if there is no pseudo-line protection, the pseudo-line label is encapsulated according to the bucket action in the group table, and the data stream enters after processing. The second level group table is processed;
在第二级群组表里,根据群组表类型来区分是否有伪线伪线保护,如果没有伪线保护,此时会根据群组表里的桶动作进行标签交换路径LSP标签的封装及LSP1:1的处理,处理完后数据流进入第三级群组表进行处理;In the second-level group table, whether there is a pseudo-line pseudo-line protection according to the group table type, if there is no pseudo-line protection, the label switching path LSP label is encapsulated according to the bucket action in the group table. After processing LSP1:1, the data stream enters the third-level group table for processing after processing;
在第三级群组表里,进行出口查找;In the third level group table, perform an export lookup;
B、SDN二层VPN的NNI--->UNI业务模型由三级流表和一级群组表实现:B. The NNI---> UNI service model of the SDN Layer 2 VPN is implemented by a three-level flow table and a first-level group table:
第一级流表用来识别网络侧的报文,当网络侧的数据流有相应 的流条目与之匹配,则第一级流表的相应应用动作被执行,数据流转向第二级流表;The first level flow table is used to identify the packets on the network side, and the data flow on the network side has corresponding The flow entry is matched, and the corresponding application action of the first-level flow table is executed, and the data flow is transferred to the second-level flow table;
第二级流表用来匹配网络侧LSP标签,应用动作中的弹出动作将网络侧LSP标签弹出,再将数据流转向第三级流表;The second-level flow table is used to match the LSP label on the network side, and the egress action in the action action pops up the LSP label on the network side, and then the data flow is switched to the third-level flow table.
第三级流表用来处理内层伪线标签,当有相应的流条目与内层伪线标签相匹配,则第三级流表的应用动作被执行,当所有的第三级流表的应用动作执行完后,数据流会转向群组表,群组表决定了数据包的出口。The third-level flow table is used to process the inner layer pseudo-line label. When there is a corresponding flow item matching the inner layer pseudo-line label, the application action of the third-level flow table is executed, when all the third-level flow tables are After the application action is executed, the data flow will be transferred to the group table, and the group table determines the export of the data packet.
在上述技术方案的基础上,所述第一级流表是一张三态内容寻址存储器表。Based on the above technical solution, the first level flow table is a three-state content address memory table.
在上述技术方案的基础上,所述第一级流表的匹配域为接收端口+Vlan+以太网类型,用于对不同用户数据进行分流处理。On the basis of the foregoing technical solution, the matching domain of the first-level flow table is a receiving port + Vlan + Ethernet type, and is used for performing shunt processing on different user data.
在上述技术方案的基础上,步骤A中,在第三级群组表里,进行出口查找以后,如果有链路聚合保护的相关配置,则转入链路聚合处理的流程。On the basis of the foregoing technical solution, in step A, after the egress lookup is performed in the third-level group table, if there is a link aggregation protection related configuration, the process proceeds to the link aggregation process.
在上述技术方案的基础上,步骤B中,所述群组表里有用户标签的相关处理,如果用户标签不需要处理,用户报文直接从一个指定的物理口发送去。On the basis of the foregoing technical solution, in the step B, the group table has a related process of the user label. If the user label does not need to be processed, the user message is directly sent from a specified physical port.
本发明还提供一种基于OPEN_FLOW协议的SDN网络L2VPN实现系统,该系统包括软件定义网络SDN二层虚拟专用网络VPN的用户网络接口UNI--->网络-网络接口NNI业务模型和SDN二层VPN NNI--->UNI业务模型,The invention also provides an SDN network L2VPN implementation system based on the OPEN_FLOW protocol, which comprises a software defined network SDN layer 2 virtual private network VPN user network interface UNI---> network-network interface NNI service model and SDN Layer 2 VPN NNI--->UNI business model,
SDN二层VPN的UNI--->NNI业务模型由一级流表和三级嵌套的群组表实现:The UNI--->NNI service model of the SDN Layer 2 VPN is implemented by a primary flow table and a three-level nested group table:
第一级流表用来对用户数据报文进行识别;当用户数据流的匹配 域有相应的流条目与之匹配,则第一级流表的相应应用动作被执行;之后的业务转向到三级嵌套的群组表进行处理;The first level flow table is used to identify user data packets; when the user data stream matches If the corresponding flow entry is matched, the corresponding application action of the first-level flow table is executed; the subsequent service is transferred to the three-level nested group table for processing;
在第一级群组表里,根据群组表类型来区分是否有伪线保护,如果没有伪线保护,则根据群组表里的桶动作进行伪线标签的封装,处理完后数据流进入第二级群组表进行处理;In the first-level group table, whether there is pseudo-line protection according to the group table type, if there is no pseudo-line protection, the pseudo-line label is encapsulated according to the bucket action in the group table, and the data stream enters after processing. The second level group table is processed;
在第二级群组表里,根据群组表类型来区分是否有伪线伪线保护,如果没有伪线保护,此时会根据群组表里的桶动作进行标签交换路径LSP标签的封装及LSP1:1的处理,处理完后数据流进入第三级群组表进行处理;In the second-level group table, whether there is a pseudo-line pseudo-line protection according to the group table type, if there is no pseudo-line protection, the label switching path LSP label is encapsulated according to the bucket action in the group table. After processing LSP1:1, the data stream enters the third-level group table for processing after processing;
在第三级群组表里,进行出口查找;In the third level group table, perform an export lookup;
SDN二层VPN的NNI--->UNI业务模型由三级流表和一级群组表实现:The NNI---> UNI service model of the SDN Layer 2 VPN is implemented by a three-level flow table and a first-level group table:
第一级流表用来识别网络侧的报文,当网络侧的数据流有相应的流条目与之匹配,则第一级流表的相应应用动作被执行,数据流转向第二级流表;The first-level flow table is used to identify the packet on the network side. When the data flow on the network side has a corresponding flow entry, the corresponding application action of the first-level flow table is executed, and the data flow is switched to the second-level flow table. ;
第二级流表用来匹配网络侧LSP标签,应用动作中的弹出动作将网络侧LSP标签弹出,再将数据流转向第三级流表;The second-level flow table is used to match the LSP label on the network side, and the egress action in the action action pops up the LSP label on the network side, and then the data flow is switched to the third-level flow table.
第三级流表用来处理内层伪线标签,当有相应的流条目与内层伪线标签相匹配,则第三级流表的应用动作被执行,当所有的第三级流表的应用动作执行完后,数据流会转向群组表,群组表决定了数据包的出口。The third-level flow table is used to process the inner layer pseudo-line label. When there is a corresponding flow item matching the inner layer pseudo-line label, the application action of the third-level flow table is executed, when all the third-level flow tables are After the application action is executed, the data flow will be transferred to the group table, and the group table determines the export of the data packet.
在上述技术方案的基础上,所述第一级流表是一张三态内容寻址存储器表。Based on the above technical solution, the first level flow table is a three-state content address memory table.
在上述技术方案的基础上,所述第一级流表的匹配域为接收端口+Vlan+以太网类型,用于对不同用户数据进行分流处理。 On the basis of the foregoing technical solution, the matching domain of the first-level flow table is a receiving port + Vlan + Ethernet type, and is used for performing shunt processing on different user data.
在上述技术方案的基础上,所述SDN二层VPN的UNI--->NNI业务模型的实现过程中,在第三级群组表里,进行出口查找以后,如果有链路聚合保护的相关配置,则转入链路聚合处理的流程。On the basis of the foregoing technical solutions, in the implementation process of the UNI->-NNI service model of the SDN Layer 2 VPN, after the egress lookup in the third-level group table, if there is link aggregation protection related If it is configured, it will go to the process of link aggregation processing.
在上述技术方案的基础上,所述SDN二层VPN的NNI--->UNI业务模型的实现过程中,所述群组表里有用户标签的相关处理,如果用户标签不需要处理,用户报文直接从一个指定的物理口发送去。On the basis of the foregoing technical solution, in the implementation process of the NNI->-UNI service model of the SDN Layer 2 VPN, the group table has related processing of user tags, and if the user tags do not need to be processed, the user reports The text is sent directly from a specified physical port.
与现有技术相比,本发明的优点如下:The advantages of the present invention over the prior art are as follows:
(1)本发明对SDN网络架构下运营商快速开通集客专线业务提供巨大的帮助,网络开通不再依赖于网管,服务提供商可以通过设备厂商配套的基于android系统的APP软件快速开通集客业务。(1) The present invention greatly assists the operator to quickly open the customer dedicated line service under the SDN network architecture. The network opening is no longer dependent on the network management, and the service provider can quickly open the customer service through the android system-based APP software provided by the equipment manufacturer.
(2)基于标准的open flow协议,服务提供商可以完全忽略底层设备的差异,在云端就可以进行业务配置。(2) Based on the standard open flow protocol, the service provider can completely ignore the difference between the underlying devices and configure the service in the cloud.
(3)对于硬件资源依据网络情况,可以灵活的进行动态调整。(3) Dynamic adjustment of hardware resources according to network conditions.
附图说明DRAWINGS
图1是本发明实施例中L2VPN UNI--->NNI的数据处理流程图。1 is a flow chart of data processing of an L2VPN UNI--->NNI in an embodiment of the present invention.
图2是本发明实施例中L2VPN NNI--->UNI的数据处理流程图。2 is a flow chart of data processing of an L2VPN NNI---> UNI in the embodiment of the present invention.
具体实施方式detailed description
下面结合附图及具体实施例对本发明作进一步的详细描述。The present invention will be further described in detail below with reference to the drawings and specific embodiments.
本发明是基于Marvell公司可编程NP(Network Processor,网络处理器)芯片实现虚拟专线业务,转发流表设计完全符合ONF OPEN FLOW协议1.4.0中的相关规定。The invention is based on Marvell's programmable NP (Network Processor) chip to realize virtual private line service, and the forwarding flow table design fully complies with the relevant provisions in the ONF OPEN FLOW protocol 1.4.0.
二层VPN(Virtual Private Network,虚拟专用网络)业务实现相关流表简要介绍如下:A brief description of the flow table of the Layer 2 VPN (Virtual Private Network) service implementation is as follows:
Ing_Port_Tbl:入端口表,此表项是基于Np(Network Processor, 网络处理器)物理端口的,每个Np物理端口有一张入端口表;Ing_Port_Tbl: Inbound port table, this entry is based on Np (Network Processor, Network processor) physical port, each Np physical port has an inbound port table;
My_Mac_Tbl:端口Mac表,此表用来进行数据包Mac地址检查;My_Mac_Tbl: port Mac table, this table is used to check the packet Mac address;
Table0_Tbl:第一级流表,此流表用于区分不同用户的数据报文,流表的match_field(匹配域)为接收端口+Vlan+以太网类型;Table0_Tbl: The first-level flow table, which is used to distinguish data packets of different users. The match_field (matching field) of the flow table is the receiving port + Vlan + Ethernet type.
Table1_Tbl:第二级流表,此流表用于匹配网络侧LSP(Label Switched Path,标签交换路径)标签,match_field为LSP标签;Table1_Tbl: a second-level flow table, which is used to match a label of a network-side LSP (Label Switched Path), and a match_field is an LSP label.
Table2_Tbl:第三级流表,此流表用于匹配PW(Pseudo Wire,伪线)标签,match_field为PW标签;Table 2_Tbl: a third-level flow table, which is used to match PW (Pseudo Wire) tags, and match_field is a PW tag;
Group0_Bucket1_Tbl:第一级Group(群组表)的Bucket1表主要用于封装PW1:1保护时的主用PW标签;Group0_Bucket1_Tbl: The Bucket1 table of the first-level group is used to encapsulate the PW label for PW1:1 protection.
Group0_Bucket2_Tbl:第一级Group的Bucket2表主要用于封装PW1:1保护时的备用PW标签;Group0_Bucket2_Tbl: The Bucket2 table of the first-level group is mainly used to encapsulate the standby PW label when PW1:1 protection is applied.
Group1_Bucket1_Tbl:第二级Group的Bucket1表主要用于封装LSP1:1保护时的主用LSP标签、以太网VLAN(Virtual Local Area Network,虚拟局域网、Dmac(Destination media access control,目的硬件地址);Group1_Bucket1_Tbl: The Bucket1 table of the second-level group is mainly used to encapsulate the primary LSP label and the Ethernet VLAN (Virtual Local Area Network, DMAC (Destination media access control)).
Group1_Bucket2_Tbl:第二级Group的Bucket1表主要于封装LSP1:1保护时的备用LSP标签、以太网VLan、Dmac;Group1_Bucket2_Tbl: The bucket1 table of the second-level group is mainly used to encapsulate the LSP label, Ethernet VLan, and Dmac when LSP1:1 protection is applied.
Group2_Bucket1_Tbl:第三级Group表主要用于封装数据包Smac(Source media access control,源硬件地址)。Group2_Bucket1_Tbl: The third-level Group table is mainly used to encapsulate the data packet Smac (Source media access control).
SDN二层VPN业务由UNI(User Network Interface,用户网络接口)--->NNI(Network Network Interface,网络-网络接口)方向和NNI--->UNI方向共同构成,下面对这两个方向的处理分别进行说明。 The SDN Layer 2 VPN service is composed of the UNI (User Network Interface)--->NNI (Network Network Interface) direction and the NNI--->UNI direction. The following two directions are used. The processing is explained separately.
本发明实施例提供一种基于OPEN_FLOW协议的SDN网络L2VPN实现系统,该系统包括SDN二层VPN UNI--->NNI业务模型和SDN二层VPN NNI--->UNI业务模型。The embodiment of the invention provides an SDN network L2VPN implementation system based on the OPEN_FLOW protocol, which includes an SDN Layer 2 VPN UNI--->NNI service model and an SDN Layer 2 VPN NNI---> UNI service model.
本发明实施例还提供一种基于OPEN_FLOW协议的SDN网络L2VPN实现方法,包括以下步骤:The embodiment of the invention further provides an implementation method of an SDN network L2VPN based on the OPEN_FLOW protocol, comprising the following steps:
A、参见图1所示,SDN二层VPN UNI--->NNI业务模型由一级流表和三级嵌套的Group表实现:A. Referring to Figure 1, the SDN Layer 2 VPN UNI--->NNI service model is implemented by a primary flow table and a three-level nested Group table:
第一级流表table0是一张TCAM(Ternary Content Addressable Memory,三态内容寻址存储器)表,此流表用来对用户数据报文进行识别,由于TCAM表是三态的,match_field可以为端口和用户Vlan的任意组合,这种匹配方式极大的方便了对不同用户数据进行分流处理。当用户数据流的match field有相应的flow entry(流条目)与之匹配,则table0的相应Apply Action(应用动作)则会被执行。根据我们的流表设计,之后的业务会转向到三级嵌套的Group表进行处理。The first level flow table table0 is a TCAM (Ternary Content Addressable Memory) table, which is used to identify user data packets. Since the TCAM table is tri-state, the match_field can be a port. Any combination with the user Vlan, this matching method greatly facilitates the shunting of different user data. When the match field of the user data stream has a corresponding flow entry matching, the corresponding Apply action of table0 will be executed. According to our flow table design, the subsequent business will be transferred to the three-level nested Group table for processing.
在第一级Group表里,首先会根据Group Type(群组表类型)来区分是否有PW保护,如果没有PW保护,此时会根据Group表里的bucket action(桶动作)进行PW标签的封装,处理完后数据流会进入第二级Group进行处理。In the first-level group table, the PW label is encapsulated according to the group type (group type). If there is no PW protection, the PW label is encapsulated according to the bucket action in the group table. After processing, the data stream will enter the second level group for processing.
在第二级群组表里,根据群组表类型来区分是否有伪线伪线保护,如果没有伪线保护,此时会根据群组表里的桶动作进行标签交换路径LSP标签的封装及LSP1:1的处理,处理完后数据流进入第三级群组表进行处理。第二级Group表的处理类似于第一级Group表,唯一不同的是进行LSP标签的封装,LSP1:1的处理也在第二级流表中进行。 In the second-level group table, whether there is a pseudo-line pseudo-line protection according to the group table type, if there is no pseudo-line protection, the label switching path LSP label is encapsulated according to the bucket action in the group table. After the LSP1:1 is processed, the data stream enters the third-level group table for processing. The processing of the second-level group table is similar to that of the first-level group table. The only difference is that the LSP label is encapsulated, and the processing of LSP 1:1 is also performed in the second-level flow table.
第三级Group用于出口查找,在第三级群组表里,进行出口查找;如果有Lag(Link aggregation,链路聚合)保护的相关配置,则会转入Lag处理的流程,至此L2VPN(Layer 2Virtual Private Network,二层虚拟专用网)UNI到NNI的基本处理流程就完了。The third-level group is used for the egress lookup. In the third-level group table, the egress lookup is performed. If there is a configuration related to the link aggregation protection (Lag), the process of the Lag process is transferred to the L2VPN. Layer 2 Virtual Private Network, the second layer of virtual private network) UNI to NNI basic processing flow is over.
B、参见图2所示,SDN二层VPN NNI--->UNI业务模型由三级流表和一级Group表实现:B. As shown in Figure 2, the SDN Layer 2 VPN NNI---> UNI service model is implemented by a three-level flow table and a first-level group table:
第一级流表table0是一张TCAM表,此表用来识别网络侧的报文,当网络侧的数据流有相应的flow entry与之匹配,则table0的相应Apply Action会被执行,数据流转向第二级流表table1;The first level flow table table0 is a TCAM table, which is used to identify the packets on the network side. When the data flow on the network side has a corresponding flow entry, the corresponding Apply action of the table0 is executed, and the data flow is performed. Turn to the second stage flow table table1;
第二级流表table1是用来匹配网络侧LSP标签的,由于是二层VPN业务,此时应用动作中的弹出动作(Apply Action的Ipop,Ipop:Internal popup)会将网络侧LSP标签弹出,再将数据流转向第三级流表table2;The second-level flow table table1 is used to match the network-side LSP label. Because it is a Layer 2 VPN service, the pop-up action in the application action (Ipop, Ipop: Internal popup of the Apply Action) pops up the LSP label on the network side. Then the data stream is transferred to the third-level flow table table2;
第三级流表table2用来处理内层PW标签,当有相应的flow entry与此标签相匹配,则第三级流表table2的Apply Action会被执行,当所有的第三级流表的Apply Action执行完后,数据流会转向Group table(群组表)。Group table决定了数据包的出口,在Group table里有Ctag(Customer tag,用户标签)的相关处理,如果用户tag(标签)不需要处理,用户报文直接从一个指定的物理口发送去。The third-level flow table table2 is used to process the inner PW tag. When there is a corresponding flow entry matching the tag, the Apply action of the third-level flow table table2 is executed, when all the third-level flow tables are applied. After the Action is executed, the data flow will be transferred to the Group table. The group table determines the export of the data packet. In the group table, there is a related processing of the Ctag (Customer Tag). If the user tag (tag) does not need to be processed, the user packet is directly sent from a specified physical port.
本领域的技术人员可以对本发明实施例进行各种修改和变型,倘若这些修改和变型在本发明权利要求及其等同技术的范围之内,则这些修改和变型也在本发明的保护范围之内。A person skilled in the art can make various modifications and variations to the embodiments of the present invention, and such modifications and variations are within the scope of the present invention. .
说明书中未详细描述的内容为本领域技术人员公知的现有技术。 The contents not described in detail in the specification are prior art known to those skilled in the art.

Claims (10)

  1. 一种基于OPEN_FLOW协议的SDN网络L2VPN实现方法,其特征在于,包括以下步骤:An implementation method of SDN network L2VPN based on OPEN_FLOW protocol, characterized in that it comprises the following steps:
    A、软件定义网络SDN二层虚拟专用网络VPN的用户网络接口UNI--->网络-网络接口NNI业务模型由一级流表和三级嵌套的群组表实现:A. Software-defined network SDN Layer 2 Virtual Private Network VPN User Network Interface UNI---> Network-Network Interface The NNI service model is implemented by a primary flow table and a three-level nested group table:
    第一级流表用来对用户数据报文进行识别;当用户数据流的匹配域有相应的流条目与之匹配,则第一级流表的相应应用动作被执行;之后的业务转向到三级嵌套的群组表进行处理;The first level flow table is used to identify the user data packet; when the matching field of the user data stream has a corresponding flow entry matching, the corresponding application action of the first level flow table is executed; Level nested group table for processing;
    在第一级群组表里,根据群组表类型来区分是否有伪线保护,如果没有伪线保护,则根据群组表里的桶动作进行伪线标签的封装,处理完后数据流进入第二级群组表进行处理;In the first-level group table, whether there is pseudo-line protection according to the group table type, if there is no pseudo-line protection, the pseudo-line label is encapsulated according to the bucket action in the group table, and the data stream enters after processing. The second level group table is processed;
    在第二级群组表里,根据群组表类型来区分是否有伪线伪线保护,如果没有伪线保护,此时会根据群组表里的桶动作进行标签交换路径LSP标签的封装及LSP1:1的处理,处理完后数据流进入第三级群组表进行处理;In the second-level group table, whether there is a pseudo-line pseudo-line protection according to the group table type, if there is no pseudo-line protection, the label switching path LSP label is encapsulated according to the bucket action in the group table. After processing LSP1:1, the data stream enters the third-level group table for processing after processing;
    在第三级群组表里,进行出口查找;In the third level group table, perform an export lookup;
    B、SDN二层VPN的NNI--->UNI业务模型由三级流表和一级群组表实现:B. The NNI---> UNI service model of the SDN Layer 2 VPN is implemented by a three-level flow table and a first-level group table:
    第一级流表用来识别网络侧的报文,当网络侧的数据流有相应的流条目与之匹配,则第一级流表的相应应用动作被执行,数据流转向第二级流表;The first-level flow table is used to identify the packet on the network side. When the data flow on the network side has a corresponding flow entry, the corresponding application action of the first-level flow table is executed, and the data flow is switched to the second-level flow table. ;
    第二级流表用来匹配网络侧LSP标签,应用动作中的弹出动作将网络侧LSP标签弹出,再将数据流转向第三级流表;The second-level flow table is used to match the LSP label on the network side, and the egress action in the action action pops up the LSP label on the network side, and then the data flow is switched to the third-level flow table.
    第三级流表用来处理内层伪线标签,当有相应的流条目与内层 伪线标签相匹配,则第三级流表的应用动作被执行,当所有的第三级流表的应用动作执行完后,数据流会转向群组表,群组表决定了数据包的出口。The third-level flow table is used to process the inner layer pseudo-line label when there is a corresponding stream entry and inner layer. When the pseudo-line labels match, the application action of the third-level flow table is executed. When all the application actions of the third-level flow table are performed, the data flow turns to the group table, and the group table determines the export of the data packet. .
  2. 如权利要求1所述的基于OPEN_FLOW协议的SDN网络L2VPN实现方法,其特征在于:所述第一级流表是一张三态内容寻址存储器表。The SDN network L2VPN implementation method based on the OPEN_FLOW protocol according to claim 1, wherein the first level flow table is a three-state content address memory table.
  3. 如权利要求1所述的基于OPEN_FLOW协议的SDN网络L2VPN实现方法,其特征在于:所述第一级流表的匹配域为接收端口+Vlan+以太网类型,用于对不同用户数据进行分流处理。The method for implementing an SDN network L2VPN based on the OPEN_FLOW protocol according to claim 1, wherein the matching domain of the first-level flow table is a receiving port + Vlan + Ethernet type, and is used for performing shunt processing on different user data.
  4. 如权利要求1所述的基于OPEN_FLOW协议的SDN网络L2VPN实现方法,其特征在于:步骤A中,在第三级群组表里,进行出口查找以后,如果有链路聚合保护的相关配置,则转入链路聚合处理的流程。The method for implementing an SDN network L2VPN based on the OPEN_FLOW protocol according to claim 1, wherein in step A, after the egress lookup in the third-level group table, if there is a link aggregation protection related configuration, Transfer to the process of link aggregation processing.
  5. 如权利要求1所述的基于OPEN_FLOW协议的SDN网络L2VPN实现方法,其特征在于:步骤B中,所述群组表里有用户标签的相关处理,如果用户标签不需要处理,用户报文直接从一个指定的物理口发送去。The method for implementing an SDN network L2VPN based on the OPEN_FLOW protocol according to claim 1, wherein in the step B, the group table has a related process of user tags, and if the user tag does not need to be processed, the user message directly A specified physical port is sent.
  6. 一种基于OPEN_FLOW协议的SDN网络L2VPN实现系统,其特征在于:该系统包括软件定义网络SDN二层虚拟专用网络VPN的用户网络接口UNI--->网络-网络接口NNI业务模型和SDN二层VPN NNI--->UNI业务模型,An SDN network L2VPN implementation system based on OPEN_FLOW protocol, characterized in that: the system comprises a software defined network SDN layer 2 virtual private network VPN user network interface UNI---> network-network interface NNI service model and SDN Layer 2 VPN NNI--->UNI business model,
    SDN二层VPN的UNI--->NNI业务模型由一级流表和三级嵌套的群组表实现:The UNI--->NNI service model of the SDN Layer 2 VPN is implemented by a primary flow table and a three-level nested group table:
    第一级流表用来对用户数据报文进行识别;当用户数据流的匹配域有相应的流条目与之匹配,则第一级流表的相应应用动作被执行; 之后的业务转向到三级嵌套的群组表进行处理;The first level flow table is used to identify the user data packet; when the matching field of the user data stream has a corresponding flow entry matching, the corresponding application action of the first level flow table is executed; The subsequent business turns to the three-level nested group table for processing;
    在第一级群组表里,根据群组表类型来区分是否有伪线保护,如果没有伪线保护,则根据群组表里的桶动作进行伪线标签的封装,处理完后数据流进入第二级群组表进行处理;In the first-level group table, whether there is pseudo-line protection according to the group table type, if there is no pseudo-line protection, the pseudo-line label is encapsulated according to the bucket action in the group table, and the data stream enters after processing. The second level group table is processed;
    在第二级群组表里,根据群组表类型来区分是否有伪线伪线保护,如果没有伪线保护,此时会根据群组表里的桶动作进行标签交换路径LSP标签的封装及LSP1:1的处理,处理完后数据流进入第三级群组表进行处理;In the second-level group table, whether there is a pseudo-line pseudo-line protection according to the group table type, if there is no pseudo-line protection, the label switching path LSP label is encapsulated according to the bucket action in the group table. After processing LSP1:1, the data stream enters the third-level group table for processing after processing;
    在第三级群组表里,进行出口查找;In the third level group table, perform an export lookup;
    SDN二层VPN的NNI--->UNI业务模型由三级流表和一级群组表实现:The NNI---> UNI service model of the SDN Layer 2 VPN is implemented by a three-level flow table and a first-level group table:
    第一级流表用来识别网络侧的报文,当网络侧的数据流有相应的流条目与之匹配,则第一级流表的相应应用动作被执行,数据流转向第二级流表;The first-level flow table is used to identify the packet on the network side. When the data flow on the network side has a corresponding flow entry, the corresponding application action of the first-level flow table is executed, and the data flow is switched to the second-level flow table. ;
    第二级流表用来匹配网络侧LSP标签,应用动作中的弹出动作将网络侧LSP标签弹出,再将数据流转向第三级流表;The second-level flow table is used to match the LSP label on the network side, and the egress action in the action action pops up the LSP label on the network side, and then the data flow is switched to the third-level flow table.
    第三级流表用来处理内层伪线标签,当有相应的流条目与内层伪线标签相匹配,则第三级流表的应用动作被执行,当所有的第三级流表的应用动作执行完后,数据流会转向群组表,群组表决定了数据包的出口。The third-level flow table is used to process the inner layer pseudo-line label. When there is a corresponding flow item matching the inner layer pseudo-line label, the application action of the third-level flow table is executed, when all the third-level flow tables are After the application action is executed, the data flow will be transferred to the group table, and the group table determines the export of the data packet.
  7. 如权利要求6所述的基于OPEN_FLOW协议的SDN网络L2VPN实现系统,其特征在于:所述第一级流表是一张三态内容寻址存储器表。The SDN network L2VPN implementation system based on the OPEN_FLOW protocol according to claim 6, wherein the first level flow table is a three-state content address memory table.
  8. 如权利要求6所述的基于OPEN_FLOW协议的SDN网络L2VPN实现系统,其特征在于:所述第一级流表的匹配域为接收端 口+Vlan+以太网类型,用于对不同用户数据进行分流处理。The SDN network L2VPN implementation system based on the OPEN_FLOW protocol according to claim 6, wherein the matching domain of the first-level flow table is a receiving end Port + Vlan + Ethernet type, used to offload different user data.
  9. 如权利要求6所述的基于OPEN_FLOW协议的SDN网络L2VPN实现系统,其特征在于:所述SDN二层VPN的UNI--->NNI业务模型的实现过程中,在第三级群组表里,进行出口查找以后,如果有链路聚合保护的相关配置,则转入链路聚合处理的流程。The SDN network L2VPN implementation system based on the OPEN_FLOW protocol according to claim 6, wherein: in the implementation process of the UNI->-NNI service model of the SDN Layer 2 VPN, in the third-level group table, After the egress lookup, if there is a link aggregation protection related configuration, the process proceeds to the link aggregation process.
  10. 如权利要求6所述的基于OPEN_FLOW协议的SDN网络L2VPN实现系统,其特征在于:所述SDN二层VPN的NNI--->UNI业务模型的实现过程中,所述群组表里有用户标签的相关处理,如果用户标签不需要处理,用户报文直接从一个指定的物理口发送去。 The SDN network L2VPN implementation system based on the OPEN_FLOW protocol according to claim 6, wherein in the implementation of the NNI---> UNI service model of the SDN Layer 2 VPN, the group table has a user label. Related processing, if the user tag does not need to be processed, the user message is sent directly from a specified physical port.
PCT/CN2016/102798 2016-04-19 2016-10-21 Openflow protocol-based sdn l2vpn implementation method and system WO2017181637A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
SG11201804250YA SG11201804250YA (en) 2016-04-19 2016-10-21 Openflow protocol-based sdn l2vpn implementation method and system
MYPI2018701855A MY198118A (en) 2016-04-19 2016-10-21 Openflow protocol-based sdn l2vpn implementation method and system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610244447.2A CN105915428B (en) 2016-04-19 2016-04-19 SDN network L2VPN realization method and systems based on OPEN_FLOW agreements
CN201610244447.2 2016-04-19

Publications (1)

Publication Number Publication Date
WO2017181637A1 true WO2017181637A1 (en) 2017-10-26

Family

ID=56747470

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/102798 WO2017181637A1 (en) 2016-04-19 2016-10-21 Openflow protocol-based sdn l2vpn implementation method and system

Country Status (4)

Country Link
CN (1) CN105915428B (en)
MY (1) MY198118A (en)
SG (1) SG11201804250YA (en)
WO (1) WO2017181637A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114374648A (en) * 2020-10-14 2022-04-19 芯启源(南京)半导体科技有限公司 Method for realizing intelligent network card by combining NP chip with TCAM

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105915428B (en) * 2016-04-19 2018-09-18 烽火通信科技股份有限公司 SDN network L2VPN realization method and systems based on OPEN_FLOW agreements
CN109788041B (en) * 2017-12-29 2020-07-28 中国联合网络通信有限公司广东省分公司 SDN cloud network integrated system based on UTN network
CN108965090B (en) * 2018-07-12 2020-12-22 中国联合网络通信集团有限公司 VPN network user routing number control method and SDN controller
CN112153010B (en) * 2020-08-31 2023-01-20 北京全路通信信号研究设计院集团有限公司 Network security shooting range system and operation method thereof
CN115499272B (en) * 2022-07-29 2023-05-30 天翼云科技有限公司 Inter-cloud high-speed-based link switching method and device and computer equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103595647A (en) * 2013-11-27 2014-02-19 北京邮电大学 OpenFlow-based downlink signaling processing method for SDN (Software Defined Network) virtualization platform
CN103746892A (en) * 2013-11-27 2014-04-23 北京邮电大学 SDN virtualization platform uplink signaling flow label processing method based on OpenFlow
CN105052083A (en) * 2013-03-15 2015-11-11 思科技术公司 A programmable management engine for networks
CN105915428A (en) * 2016-04-19 2016-08-31 烽火通信科技股份有限公司 SDN L2VPN implementation method and system based on OPEN_FLOW protocol

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105052083A (en) * 2013-03-15 2015-11-11 思科技术公司 A programmable management engine for networks
CN103595647A (en) * 2013-11-27 2014-02-19 北京邮电大学 OpenFlow-based downlink signaling processing method for SDN (Software Defined Network) virtualization platform
CN103746892A (en) * 2013-11-27 2014-04-23 北京邮电大学 SDN virtualization platform uplink signaling flow label processing method based on OpenFlow
CN105915428A (en) * 2016-04-19 2016-08-31 烽火通信科技股份有限公司 SDN L2VPN implementation method and system based on OPEN_FLOW protocol

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114374648A (en) * 2020-10-14 2022-04-19 芯启源(南京)半导体科技有限公司 Method for realizing intelligent network card by combining NP chip with TCAM
CN114374648B (en) * 2020-10-14 2024-03-19 芯启源(南京)半导体科技有限公司 Method for realizing intelligent network card by combining NP chip with TCAM

Also Published As

Publication number Publication date
MY198118A (en) 2023-08-04
SG11201804250YA (en) 2018-06-28
CN105915428A (en) 2016-08-31
CN105915428B (en) 2018-09-18

Similar Documents

Publication Publication Date Title
WO2017181637A1 (en) Openflow protocol-based sdn l2vpn implementation method and system
US11444864B2 (en) Optimized datapath troubleshooting with trace policy engine
US10148459B2 (en) Network service insertion
US9800497B2 (en) Operations, administration and management (OAM) in overlay data center environments
US9853898B1 (en) Dynamic service chain provisioning
US9385950B2 (en) Configurable service proxy local identifier mapping
US9699064B2 (en) Method and an apparatus for network state re-construction in software defined networking
US11115328B2 (en) Efficient troubleshooting in openflow switches
US11588717B2 (en) Troubleshooting multi-layered networks using datapath analysis
CN107018059B (en) A kind of message forwarding method and device
WO2015165212A1 (en) Packet processing method, device and computer storage medium
US20220191136A1 (en) Label Management Method, Data Stream Processing Method, and Device
EP3808031A1 (en) Robust node failure detection mechanism for sdn controller cluster
CN108604997B (en) Method and apparatus for a control plane to configure monitoring of Differentiated Services Coding Points (DSCPs) and Explicit Congestion Notifications (ECNs)
WO2016041379A1 (en) Method and apparatus for implementing nni ping
EP2656553B1 (en) Method and arrangement for transferring data packets
WO2018193285A1 (en) Method and apparatus for enabling a scalable multicast virtual private network service across a multicast label distribution protocol network using in-band signaling
CN107517149A (en) A kind of virtual LAN aggregation method and device
WO2015188706A1 (en) Data frame processing method, device and system
US20200067829A1 (en) Methods and devices for intelligent selection of channel interfaces
WO2018205728A1 (en) Method for processing stack split, computer device and computer readable storage medium
US11218406B2 (en) Optimized datapath troubleshooting
WO2015123946A1 (en) Data forwarding method and device
WO2014139385A1 (en) Message forwarding method for multi-service bearer network device and device thereof

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 11201804250Y

Country of ref document: SG

NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16899221

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 16899221

Country of ref document: EP

Kind code of ref document: A1