Detailed description of the invention
For making the purpose of the present invention, technical scheme and advantage clearer, develop simultaneously embodiment referring to the drawings, rightScheme of the present invention is described in further detail.
The embodiment of the present invention proposes message forwarding method in a kind of rapid ring protection protocol networking, in RRPP networkingDisposing the double layer network agreement (SPB, L2VPN or VPLS) of carrying private network, any node, by transmitting-receiving notification packet, is noticing reportGenerate MAC table in control VLAN belonging to literary composition, and be synchronized to in the data vlan of this control VLAN binding;This node is according to lifeThe PW become, and mac address table carries out the forwarding of data message such that it is able to the user for being accessed by RRPP ring provides carryingThe double layer network access service of private network.
Need the equipment supporting SPB, L2VPN or VPLS all to run control protocol in RRPP ring, and assist in this controlView lower transmission control protocol message all runs on certain data vlan of RRPP.Wherein, in RRPP networking, dispose carrying private networkDouble layer network agreement run control protocol, corresponding with corresponding double layer network agreement, such as, dispose carrying private network beDuring SPB, corresponding control protocol is exactly SPB-ISIS agreement.
The data that two or more RRPP Domain, each RRPP Domain protection is different can be configured on same nodeVLAN, to realize flow by data vlan load balancing.To same user's Service Instance, this user's Service Instance on each nodeIdentical data vlan should be configured.Different user's Service Instances can be differently configured data vlan, exist realizing flowLoad balancing on ring.
On ring each node can sync database, generate MAC table, set up PW and E-Packet, below in conjunction with the accompanying drawings, pass throughSpecific embodiment is described in detail:
One, need to carry out the synchronization of data base on RRPP ring between each node:
Explanation as a example by disposing carrying SPB in RRPP networking.For carrying L2VPN or VPLS, there is similar realizationJourney.
Each node on RRPP ring carries out designated intermediate system (DIS) election according to MAC Address or priority,RRPP networking is selected a DIS.
For not electing the node for DIS according to SPB-ISIS protocol generation link-state protocol (Link StateProtocol, LSP) information, and carry in LSP message, it is sent to the election node for DIS.Wherein, LSP information includes opening upFlutterring information and user's Service Instance information, topology information includes the role of node, positional information.
For the node that election is DIS, receive the LSP message that each node sends, in the LSP message that record receivesLSP information.
The node that election is DIS periodically sends full-time sequence protocol Data Unit (Complete Sequence to each nodeNumber PDUs, CSNP) message.
For not electing the node for DIS to receive the CSNP message that DIS sends, carry information according in this CSNP messageDetermine this locality data base in information, if with the synchronizing information in the data base on DIS, the most unanimously, if it is, terminate work asFront flow process;Otherwise, LSP request message, request is started to carry out synchronize content with the data base of DIS to DIS.
The node that election is DIS receives when not electing as the LSP request message of the node transmission of DIS, please to sending LSPThe node seeking message sends the LSP information of LSP response message response request, makes described node carry out database synchronization.
The LSP information that DIS carries in the LSP response message sent includes current active, the joint of i.e. normal workThe nodal information of point, user's service instance identification as belonging to this node, MAC Address etc..
When not electing the node for DIS to receive the LSP response message that DIS sends, the LSP information updating in message is arrivedIn local data base.
At the end of database synchronization, all nodes carry out path computing according to data base and obtain routing information.
RRPP ring is by existing to ISIS, ISIS compatibility for the information announcement such as local domain information, ring information and node roleThe content of SPB-ISIS, i.e. SPB related content is compared with realization.When above-mentioned node sends LSP message, newly-increased realization in messagesThe LSP information of the present invention.
Seeing Fig. 1, Fig. 1 is in node supports that increasing sub TLV when SPB, VPLS or L2VPN in LSP message newly comprisesHold.In Fig. 1, the concrete meaning of each field is as follows:
ISP ID: service provider ID, it is used for distinguishing different service providers network;
Domain identifier (Domain ID): Domain ID corresponding for RRPP;
Ring mark (Ring ID): RRPP ring correspondence Ring ID;
Flag bit (Flags): Interface status flag bit, 01 represents fringe node edge interface, and 02 represents assistant edge jointPoint edge interface, 10 represent main ring host node, and 20 represent subring host node.
This newly-increased TLV is mainly used in carrying the positional information of node.
This sub TLV increases in SPB Link Metric (SPB-Metric) Sub-TLV, is used for showing respective linksFor RRPP ring link.Two interfaces in same RRPP ring, can only see an interface in LSP as.Because RPF examinesWhen looking into, the two interface can be considered as same-interface.
When subring accesses main ring, Edge node and assistant edge node is respectively connected to three of main ring and subringInterface, edge interface correspondence Ring ID is subring ID, and two interfaces accessing main ring are an interface described in the LSP, RingID is main ring ID, and when RPF, these three interface all regards same interface as.
Seeing Fig. 2, Fig. 2 is that node supports that increasing L2VPN/VPLS TLV in LSP message newly during L2VPN/VPLS comprisesContent.In Fig. 2, the concrete meaning of each field is as follows:
VPN ID: be used for representing corresponding for L2VPN/VPLS No. VPN;
VPN Type:VPN type, 1 represents L2VPN, and 2 represent VPLS;
AC State: represent local AC state (UP/DOWN) and MTU information;For making opposite end know, local user accessesThe state of interface, to determine whether this node forwarding data packets.
Label: the local MPLS label information for this VPN application;
Data vlan (B-VLAN): the B-VLAN that this VPN uses.
For SPB, existing SPB-ISIS carries user's Service Instance information, and affiliated data vlan.But for VPLS and L2VPN, also need to increase the TLV in Fig. 2, be used for notifying user's Service Instance information, i.e. VPN ID and VPNType, and affiliated data vlan and carry out the label information needed for PW encapsulation.
Two, the generation of MAC table:
Edge node and assistant edge node had both belonged to main ring, fell within subring, and for convenience, the present invention is specifically realExecute in example, when mentioning the node on main ring, including Edge node and assistant edge node, when mentioning the node in subring,Do not include Edge node and assistant edge node.
The data vlan being pre-configured with on node and control VLAN binding, for when synchronizing MAC Address, controlling VLANWhich data vlan interior MAC table is synchronized in.
On ring, any node other nodes on RRPP ring send MAC notification packet, wherein, the source of this notification packetMAC Address is the MAC Address of this node, and target MAC (Media Access Control) address is the agreement MAC Address of its place ring.
This message forwards on RRPP ring, when other nodes receive MAC notification packet on ring, carries out source mac learning,MAC table is generated in control VLAN belonging to described MAC Address notification packet;This MAC table comprises MAC Address and outgoing interface.
RRPP ring is configured with in data vlan blocking interface, it is to avoid data message forms loop and sends, and the present inventionIn MAC notification packet send in VLAN controlling, therefore, need to terminate the MAC that each node sends on the primary node and noticeMessage.
When any node receives the MAC notification packet that on its place ring, other nodes send, and the notice that will receiveMessage is transmitted to other nodes.When implementing, some special joints need to the MAC notification packet received time, need to carry outSpecial handling, specific as follows:
If on node ring during host node, terminate this MAC notification packet.
If node fringe node or assistant edge node, and the MAC notification packet received is that the node on main ring is sent outWhen sending, other nodes in its place subring do not forward.I.e. node on main ring can receive the joint in main ring and subringThe MAC notification packet that point sends, and the node in subring, can only receive the MAC notification packet that the node in this subring sends.
Therefore, the node in subring can not be learnt to main ring top edge node and auxiliary limit by MAC notification packetThe MAC address entries of the node outside edge node.When the present invention implements, set up master by Edge node and assistant edge nodeThe bridge of the node outside ring top edge node and assistant edge node.
Any node in subring needs to set up on main ring by Edge node and assistant edge node, and assistant edge savesThe MAC address entries of the node outside point and fringe node.
The MAC Address of node outside assistant edge node and fringe node LSP letter in the local database on main ringBreath is searched.
The outgoing interface of this node node to described main ring assistant edge node and fringe node outside is given below, i.e.The outgoing interface that on main ring, assistant edge node is corresponding with the MAC Address of the node outside fringe node.
MAC table in locally created data vlan makes a look up, if there is target MAC (Media Access Control) address is assistant edge nodeMAC address entries corresponding to MAC Address, outgoing interface corresponding in this MAC address entries is saved as this node to described main ring top edgeThe outgoing interface of the node outside point and assistant edge node;
If there is not the MAC address entries that MAC Address that target MAC (Media Access Control) address is assistant edge node is corresponding, and there is purpose MACAddress is the MAC address entries that the MAC Address of fringe node is corresponding, using outgoing interface corresponding in this MAC address entries as this node to instituteState the outgoing interface of node outside main ring top edge node and assistant edge node;
If there is not the MAC address entries that MAC Address that target MAC (Media Access Control) address is assistant edge node is corresponding, and there is not purposeMAC Address is the MAC address entries that the MAC Address of fringe node is corresponding, then this node is to described main ring top edge node and auxiliary limitThe outgoing interface of the node outside edge node is set to sky.
This node is receiving message, when matching the MAC address entries that outgoing interface is sky, abandons the message received.
Edge node and assistant edge node had both belonged to main ring, fell within subring, and for convenience, the present invention is specifically realExecute in example, when mentioning the node on main ring, including Edge node and assistant edge node, when mentioning the node in subring,Do not include Edge node and assistant edge node.
The MAC table that this node will be generated in controlling VLAN according to the routing information calculated by the data base after synchronizing is sameStep arrives in the data vlan bound with this control VLAN, as the MAC table in corresponding data VLAN;This node is the joint on main ringDuring point, during the MAC table of sync edge node and assistant edge node, only by the MAC table synchronization in the controls VLAN of main ring.
Assuming that this main ring controls VLAN is that main ring controls VLAN1, there is a subring, and the control VLAN of this subring is sonRing controls VLAN2.Main ring controls VLAN1 binding data VLAN3 and data VLAN4, and subring controls VLAN2 binding data VLAN5.
Node on main ring and can control all to learn to assistant edge node and fringe node on VLAN2 controlling VLAN1MAC address entries, when the MAC controlled in VLAN is synchronized to the data vlan of binding, in Synchronization Control VLAN1, study is arrivedMAC address entries is in data vlan 3 and data VLAN4.For the node on other nodes, and subring on main ring, only can learnPractise a corresponding MAC address entries, directly synchronize.
The synchronization of MAC table, will control going out of the data vlan that VLAN is revised as binding, MAC Address and correspondence with itInterface is constant.
After the MAC table of data vlan generates, the MAC address entries change in controlling VLAN, or by data message is enteredRow source MAC learns, and link failure, faulty link recover, and all can cause the renewal of MAC address entries in data vlan.Concrete change and disposition are as follows:
The first, any node, when receiving data message, carries out source in the data vlan belonging to this data messageMAC address learning.
If learn to MAC Address exist in MAC address entries, and the outgoing interface of correspondence and the outgoing interface one that arrives of studyCause, maintaining former MAC address entries.When implementing, this MAC address entries can be safeguarded according to configuring condition, such as ageing time etc..
If learn to MAC Address exist in MAC address entries, and the outgoing interface of correspondence is with the outgoing interface that arrives of study notUnanimously, then use study to outgoing interface update the outgoing interface in MAC address entries.
If learn to MAC Address do not exist in MAC address entries, then use study to MAC Address and corresponding going outInterface generates MAC address entries.
The second, when the MAC address entries in the control VLAN that any node learns changes, starts the first short timer device.
At this first short timer device to constantly, the MAC address entries after changing in controlling VLAN is synchronized to and this control VLANIn the data vlan of binding, update the MAC address entries in corresponding data VLAN.
Because during change in topology, particularly after link failure recovery, the renewal controlling the MAC address entries in VLAN can be early than numberAccording to the renewal of the MAC address entries in VLAN, the switching of data traffic requires time for.
The third, any node, as the non-master on ring, receives the link failure (Common-that host node sendsFLUSH-FDB) message, or during link failure recovery (Complete-FLUSH-FDB) message;Or this node is as joint main on ringPoint, detects when link failure or faulty link recover, deletes the MAC table controlled in VLAN, and start the second short timer device.
In the second short timer device timing, if receiving MAC notification packet, carrying out source mac learning and updating control VLANIn MAC address entries, and will update after controls VLAN in MAC address entries be synchronized to and this control VLAN bind data vlanIn, update the MAC address entries in corresponding data VLAN.
When the second short timer device is timed to, the MAC address entries not updated in data vlan is deleted.
In the second and the third implementation, the short timer device of startup, as the time can configure, it is also possible to differSample, when implementing, as configured the intervalometer less than 1 second and more excellent is embodied as timing slightly larger than sending MACThe cycle of notification packet.
Three, the foundation of virtual link (PW):
In any node LSP information in the local database, check and belong to same subscriber Service Instance with this nodeOther nodes time, according to the MAC address entries that the MAC Address of other nodes described in data vlan is corresponding determine this PW go out to connectMouthful, concrete processing procedure is as follows:
For SPB, identify whether to belong to same subscriber Service Instance by I-SID;For L2VPN/VPLS, pass throughVPN ID and VPN Type identifies whether to belong to same subscriber Service Instance.
If this node is the node (with other nodes described in same territory) on main ring, or this node is the joint in subringPoint and with other nodes described on same ring time, obtain the MAC Address conduct of other nodes described in the local databaseFor the MAC Address that this PW is corresponding.
This node if it is determined that described user's Service Instance data vlan in MAC table in there are other nodes describedMAC Address, then using outgoing interface corresponding for this MAC Address as the outgoing interface of described PW;Otherwise, according to locally configured strategy reallyThe outgoing interface of fixed described PW.
If this node is the node in subring, and with other nodes described different rings in same territory on time, according to LSPInformation determines that the MAC Address of other nodes described is MAC Address corresponding for this PW;
This node if it is determined that described user's Service Instance data vlan in MAC table in exist on the ring of this node placeThe MAC Address of assistant edge node, then go out to connect as PW using outgoing interface corresponding for the MAC Address of described assistant edge nodeMouthful;
If it is determined that the edge joint existed in MAC table in the data vlan of described user's Service Instance on the ring of this node placeThe MAC Address of point, and there is not the MAC Address of assistant edge node, then go out to connect by corresponding for the MAC Address of described fringe nodeMouth is as the outgoing interface of PW;
If it is determined that there is not the edge on the ring of this node place in MAC table in the data vlan of described user's Service InstanceThe MAC Address of node, and there is not the MAC Address of assistant edge node, then the outgoing interface of this PW is determined according to the strategy of configuration.
In this implementation, outgoing interface corresponding to the MAC Address of assistant edge node is preferentially set and goes out to connect as PWMouthful, because in existing protocol realizes, the interface of the fringe node on RRPP ring is the most blocked, and assistant edge node leads toChang Buhui is blocked.
Wherein, determine that the outgoing interface of this PW is implemented as follows according to the strategy of configuration:
1, this PW outgoing interface is set for sky.
2, the outgoing interface arranging this PW is broadcast type, all sends data to the interface accessing RRPP ring.If certain connectsMouth is blocking interface, does not sends.
When MAC address entries in data vlan changes, the MAC address entries renewal PW associated with it after use change goes out to connectMouthful.
Here the change of the MAC address entries in data vlan, including newly increasing in MAC address entries certain or some MAC address entries, deletesCertain or some MAC address entries, and the outgoing interface of certain or some MAC Address is updated.
When setting up PW, correspondence can generate PW information, PW encapsulation can be carried out according to this PW information.
Wherein, for SPB, the information of the PW of foundation includes: source MAC, target MAC (Media Access Control) address and outgoing interface ID.Wherein,Source MAC is the MAC Address of this node, and target MAC (Media Access Control) address is the MAC Address of other nodes described, i.e. the MAC of peer nodeAddress;Outgoing interface ID is the outgoing interface ID according to outgoing interface identified above.
For L2VPN/VPLS, the PW information of foundation includes: source MAC, target MAC (Media Access Control) address, MPLS label and go out to connectMouth ID.Wherein, source MAC is the MAC Address of this node, and target MAC (Media Access Control) address is the MAC Address of other nodes described, the most rightThe MAC Address of end node;Outgoing interface ID is the outgoing interface ID according to outgoing interface identified above, and MPLS label is at local data baseMiddle acquisition.
Data message, when carrying out PW encapsulation, uses the information of the PW matched to carry out PW encapsulation.
Four, the forwarding of data message:
Seeing Fig. 3, Fig. 3 is message forwarding method schematic flow sheet in RRPP networking in the specific embodiment of the invention.SpecificallyStep is:
Step 301, when any node receives user data message, according to the target MAC (Media Access Control) address of this user data messageMAC table in user's Service Instance mates the PW of correspondence, carries out PW encapsulation according to the PW matched and forward.
The present invention is when implementing, and each node, can be to the user data after decapsulation when decapsulating PW encapsulated messageMessage carries out source MAC in customer instance and learns, for the PW that the study of this source MAC is corresponding.Realization side hereFormula, compared with realization, is not described in detail.
Node supports the double layer network agreement of different carrying private networks, can carry out different PW encapsulation.
When the double layer network agreement of the carrying private network supported is SPB, PW is encapsulated as MinM mode.Seeing Fig. 4, Fig. 4 isThe embodiment of the present invention being supported, the node of SPB carries out the schematic diagram of PW encapsulation.Consistent compared with MinM packaged type.
When the double layer network agreement of the carrying private network supported is L2VPN/VPLS, the corresponding encapsulated content of PW sees Fig. 5,Fig. 5 is to support in the embodiment of the present invention that the node of L2VPN/VPLS carries out the schematic diagram of PW encapsulation.In Fig. 5, target MAC (Media Access Control) address isThe target MAC (Media Access Control) address of peer node, source MAC is the MAC Address of this node;MPLS Label is private network tags.
If the outgoing interface of the PW matched is sky, then abandon the user data message received.
Step 302, when this node receives PW encapsulated message, determines that whether the target MAC (Media Access Control) address of this PW encapsulated message isThe MAC Address of this node, if it is, this node decapsulates this PW encapsulated message and forwards;Otherwise, this node is at this PW encapsulation reportIn the MAC table in data vlan belonging to literary composition, mate the target MAC (Media Access Control) address of this PW encapsulated message, and by the MAC ground matchedOutgoing interface corresponding to location forwards this PW encapsulated message.
When connecing this PW encapsulated message of encapsulation, the target MAC (Media Access Control) address of the data message after decapsulation need to be learnt to correspondencePW, and how to forward the realization of the user data message after connecing encapsulation, all compared with realization.
If the target MAC (Media Access Control) address of this PW encapsulated message is not this node, this node need to be according in local data VLANMAC address entries forwards this PW encapsulated message.
Step 301 and step 302 in no particular order sequentially, when receiving user data message, perform performing whenStep 301, when receiving PW encapsulated message, performs step 302.
Therefore, when implementing, for supporting the double layer network agreement of different carrying private networks on RRPP ringNode is when forwarding data packets, similar, simply different when concrete PW encapsulation.
Below in conjunction with the accompanying drawings, describe how the present invention realizes message in detail as a example by node supports SPB agreement on RRPP ringForward.
Seeing Fig. 6, Fig. 6 is RRPP networking schematic diagram in the specific embodiment of the invention.In Fig. 1, device A is to equipment FNode on RRPP ring, and support SPB agreement.Private network 1 and private network 2 are for accessing the different stations of the same user of RRPP networkPoint.Ring 1 is main ring, and ring 2 and ring 3 are subring.
In Fig. 6, device A is respectively MAC-A, MAC-B, MAC-C, MAC-D, MAC-E, MAC-F to the MAC Address of equipment F.
After implementing this programme, send in each equipment all control VLAN on the RRPP ring of this equipment place and periodically send outSend MAC notification packet.The cycle of transmission MAC notification packet is configurable to 10 milliseconds when implementing;And the control of ring 1MAC notification packet in VLNA terminates in device A, the MAC notification packet equipment E in the control VLNA of ring 2 terminates, ring 3Control VLNA in MAC notification packet terminate on equipment F.
Each equipment receives the MAC notification packet that other equipment sends, in the control belonging to the MAC notification packet receivedSource MAC study is carried out in VLAN.
As a example by the MAC address entries that study is arrived on equipment D, equipment C and equipment F, specific as follows:
The content that in main ring controls VLAN on equipment D, MAC address entries comprises sees table 1.For:
| MAC Address | Outgoing interface |
| MAC-A | Interface 3 |
| MAC-C | Interface 4 |
Table 1
The content that in subring controls VLAN on equipment D, MAC address entries comprises sees table 2.
| MAC Address | Outgoing interface |
| MAC-F | Interface 4 |
| MAC-C | Interface 4 |
Table 2
The content that in main ring controls VLAN on equipment C, MAC address entries comprises sees table 3.
| MAC Address | Outgoing interface |
| MAC-A | Interface 6 |
| MAC-D | Interface 6 |
Table 3
The content that in subring controls VLAN on equipment C, MAC address entries comprises sees table 4.
| MAC Address | Outgoing interface |
| MAC-F | Interface 10 |
Table 4
The content that in subring controls VLAN on equipment F, MAC address entries comprises sees table 5.
| MAC Address | Outgoing interface |
| MAC-C | Interface 11 |
Table 5
Node in subring, such as equipment F, it is impossible to by the MAC address entries of the node that MAC notification packet learns on main ring,But also can set up on main ring the MAC address entries of the node outside assistant edge node and fringe node;Set as equipment F sets upThe MAC address entries of standby A.
The MAC Address of device A can find in the local database, and in the MAC Address set up device A is given belowOutgoing interface corresponding to MAC Address.
MAC address entries in locally created data vlan makes a look up, if there is target MAC (Media Access Control) address is assistant edge jointThe MAC address entries that the MAC Address of point (equipment C) is corresponding, by outgoing interface corresponding for the MAC Address (MAC-C) to assistant edge contactOutgoing interface as this device-to-device A;
If there is not the MAC address entries that MAC Address that target MAC (Media Access Control) address is assistant edge node is corresponding, and there is purpose MACAddress is the MAC address entries that the MAC Address of fringe node (equipment B) is corresponding, then will be to the MAC Address pair of edge contact (equipment B)The outgoing interface answered is as the outgoing interface of this device-to-device A;
If there is not the MAC address entries that MAC Address that target MAC (Media Access Control) address is assistant edge node is corresponding, and there is not purposeMAC Address is the MAC address entries that the MAC Address of fringe node is corresponding, then the outgoing interface of this device-to-device A is set to sky.
Each equipment is when electing DIS, it is assumed that as a example by being elected by priority, and the priority of equipment C is maximum, then equipmentC election is DIS.
Other equipment can generate LSP information according to SPB-ISIS, and is sent to equipment C by LSP message.
As a example by equipment D and equipment F:
Equipment D can generate LSP information according to SPB-ISIS, wherein accesses two interfaces of RRPP network described in the RRPPBeing an interface, the LSP information of generation includes that topology information (Role Information of equipment and positional information etc.) and user service realityExample information, if the MAC Address of equipment D is MAC-D, the Domain ID in affiliated territory is 1, and Ring ID is 1.
Same equipment F, the LSP information of generation includes topology information and user's Service Instance information, such as the MAC of equipment FLocation is MAC-F, and the territory Domain ID in affiliated territory is 1, and the Ring ID of affiliated ring is 3, and Flags carries 20 flags, with explanationThis equipment is subring host node.
After equipment C is elected as DIS, then periodically issuing CSNP message, other each equipment all carry out data with equipment CStorehouse synchronizes.The LSP information that equipment C produces, all SPB equipment on RRPP ring that describe are its neighbours.
Each equipment sends LSP request message according to the description information on CSNP to equipment C, is receiving what equipment C sentDuring LSP response message, carry out database synchronization according to the content of LSP response message.
All devices in RRPP networking, after database synchronization, can carry out path computing according to data base and obtain path letterBreath.
The MAC address entries controlled in VLAN can be synchronized to according to the routing information calculated and control VLAN binding by each equipmentData vlan in.Know that the MAC address entries that need not synchronize can be asynchronous according to calculating the routing information obtained, save MACThe memory space of list item.
Still as a example by the MAC Address by equipment D, equipment C and equipment F synchronizes.Assume according to routing information, equipment D,The MAC address entries of equipment C and equipment F is required for synchronizing, then concrete process is as follows:
For equipment D, when synchronizing MAC address entries, the MAC address entries that only synchronizer C learns in main ring controls VLAN,Will the MAC address entries that controls in VLAN of equipment D main ring fully synchronized, and subring control VLAN in study to table corresponding for MAC-CItem does not synchronizes.
Corresponding device C and equipment F, owing to not having at different VLAN learnings to same MAC Address, therefore arrives studyMAC address entries all synchronizes.
When the synchronization of MAC table implements, the MAC table controlled in VLAN is copied directly in data MAC of bindingIn MAC table.
After database synchronization, equipment D discovering device F at same RRPP domain with it, and has and configures identical I-with itSID, then create PW on equipment D for the purpose of equipment F.When determining interface, owing to equipment D is main node on the ring, then fromThe outgoing interface finding MAC-F in the MAC table of data vlan is interface 4, then the outgoing interface arranging this PW is interface 4.
On equipment F, discovering device D is configured with identical I-SID with it, and affiliated RRPP domain is identical but affiliated ring different,Equipment F and be the node in subring.Equipment F need to first determine fringe node and the B-MAC of assistant edge node, gets the bid according to LSPWill position determines the MAC Address that MAC-C is assistant edge node, and MAC-B is the MAC Address of fringe node.In data vlanSearching assistant edge node M AC-C in MAC table, obtaining outgoing interface is 11, then the PW outgoing interface to equipment D is set to interface11。
Below as a example by sending datagram between private network 1 and private network 2:
When user data message is sent to private network 2 from private network 1, equipment D presses prior art by message according to example MAC tableCarrying out MinM encapsulation, B-MAC is MAC-F, sends from interface 4.
After equipment C receives the message after encapsulation, find non-equipment MAC of purpose B-MAC, then search the MAC in B-VLANTable forwards.Now according to MAC table, the message after encapsulation is produced from secondary port 10.
After equipment F receives, find the MAC that B-MAC is this equipment of the message after encapsulation, then unseal by prior artFill and forward.
The process that message is sent to private network 1 from private network 2 is similar to, and is not detailed herein.
Between equipment C and D after link failure, device A can detect fault in 30 milliseconds, then sends Common-FLUSH-FDB message, and decontrol the original port 2 blocked.After equipment D receives this Common-FLUSH-FDB message, delete controlAll MAC table in VLAN processed, delete the MAC table in data vlan the most immediately;Start the first short timer device simultaneously.
Each device periodically sends MAC notification packet, and in the most next notice cycle (10 milliseconds), equipment D can receiveThe MAC notification packet sent to other equipment.Equipment D can form MAC address entries after receiving MAC notification packet in controlling VLAN,And by MAC synchronizing information to B-VLAN.
On equipment D, MAC-F outgoing interface becomes 3, and the outgoing interface of the PW being modified to equipment F is outgoing interface 3.
During short timer device timing time-out, equipment D can delete the MAC address entries not updated.The MAC Address pair not updated is describedThe equipment fault answered or do not exist, such as equipment C or equipment F fault, can the MAC ground of sweep equipment C or equipment F on equipment DThese MAC of MAC address entries corresponding to location can be deleted).In device A and equipment B, the MAC address entries to equipment F also can refresh, follow-up fromThe forward-path of equipment D to equipment F just becomes equipment D-device A-equipment B-equipment F.
After when between equipment D and equipment C, link-recovery is normal, port 4 can be blocked by equipment D according to RRPP agreement temporarily,And it is advertised to host node device A.Block secondary port at host node device A, send Complete-FLUSH-FDB message, refreshMAC table.
As a example by equipment D, when receiving Complete-FLUSH-FDB message, delete the MAC table controlled in VLAN, butThe relevant MAC table in data vlan will not be deleted immediately, start a second short timer device.
In the second short timer device timing, when receiving new MAC Address notification packet, it is controlled MAC ground in VLANLocation learns, and updates and the MAC table controlled in MAC Address binding VLAN;Meanwhile, update PW's according to the MAC address entries after more capableOutgoing interface.
When the second short timer device is timed to, the MAC address entries not updated in data vlan is deleted.
Based on same inventive concept, the present invention also proposes a kind of equipment, is applicable as any node in RRPP networking.See the structural representation that Fig. 7, Fig. 7 are the equipment being applied to above-mentioned technology in the specific embodiment of the invention.This equipment includes: receiveBill unit 701, dispensing unit 702 and processing unit 703.
Transmit-Receive Unit 701, is used for receiving and dispatching MAC notification packet;Transceiving data user's message;Transmitting-receiving PW encapsulated message.
Dispensing unit 702, for the control VLAN belonging to the MAC notification packet that receives at Transmit-Receive Unit 701Generate MAC table in VLAN, and be synchronized to and the MAC table in the data vlan of described control VLAN binding;In the local databaseWhen checking other nodes belonging to same subscriber Service Instance with this node, according to other nodes described in data vlanThe MAC address entries that MAC Address is corresponding determines the outgoing interface of this PW;
Processing unit 703, when Transmit-Receive Unit 701 receives user data message, according to this user data messageTarget MAC (Media Access Control) address mates the PW of correspondence in the MAC table in user's Service Instance, carry out PW encapsulation according to the PW matched and touchSend out Transmit-Receive Unit 701 to forward;When described reception unit receives PW encapsulated message, determine the purpose MAC ground of this PW encapsulated messageWhether location is the MAC Address of this equipment, if it is, decapsulate this PW encapsulated message and trigger Transmit-Receive Unit 701 and forward;Otherwise,In the MAC table that dispensing unit 702 generates in the data vlan belonging to this PW encapsulated message, mate the purpose of this PW encapsulated messageMAC Address, and trigger Transmit-Receive Unit 701 and forward this PW encapsulated message by the outgoing interface that the MAC Address that matches is corresponding.
It is preferred that
Dispensing unit 702, when receiving, specifically for Transmit-Receive Unit 701, the MAC notification packet that other nodes send, is carried outSource mac learning, generates MAC table in the control VLAN belonging to described MAC Address notification packet;And the notification packet that will receiveIt is transmitted to other nodes;Wherein, if on this equipment ring during host node, terminate this MAC notification packet;If this equipment edge savesPoint or assistant edge node, and when the MAC notification packet received is the node transmission on main ring, not in its place subringOther nodes forward;Wherein, the node in subring does not include Edge node and assistant edge node;The source MAC of MAC notification packetAddress is the MAC Address of this equipment, and target MAC (Media Access Control) address is the agreement MAC Address of its place ring;According to the routing information calculatedThe MAC table generated in controlling VLAN is synchronized in the data vlan bound with this control VLAN, as in corresponding data VLANMAC table;When this equipment is the node on main ring, during the sync edge node table corresponding with the MAC Address of assistant edge node,Only table corresponding with the MAC Address of assistant edge node for the control VLAN inward flange node of main ring is synchronized.
It is preferred that
Dispensing unit 702, is further used for carrying out DIS election, when this equipment is not elected as DIS, according to control protocolGenerate the LSP message of LSP information carrying self, and trigger Transmit-Receive Unit 701 and be sent to the node that election is DIS;In dataAt the end of storehouse synchronizes, carry out path computing according to data base and obtain routing information.
Transmit-Receive Unit 701, is further used for, when the election of this equipment is for DIS, receiving the LSP message that each node sends, andPeriodically send CSNP message to each node;When receiving the LSP request message that other nodes send, to sending LSP request reportThe node of literary composition sends the LSP information of LSP response message response request, makes described node carry out database synchronization.
It is preferred that
Dispensing unit 702, if the node being further used in the subring of this equipment, sets up to assistant edge on described main ringThe MAC address entries of the node outside node and fringe node;Wherein, the MAC Address in this MAC address entries is auxiliary limit on described main ringThe MAC Address of the node outside edge node and fringe node;MAC address entries in locally created data vlan makes a look up,If there is the MAC address entries that MAC Address that target MAC (Media Access Control) address is assistant edge node is corresponding, go out to connect by corresponding in this MAC address entriesMouth is as the outgoing interface of the node outside this node to described main ring top edge node and assistant edge node;If there is not purposeMAC Address is the MAC address entries that the MAC Address of assistant edge node is corresponding, and there is the MAC that target MAC (Media Access Control) address is fringe nodeThe MAC address entries that address is corresponding, using outgoing interface corresponding in this MAC address entries as this node to described main ring top edge node and auxiliaryHelp the outgoing interface of node outside fringe node;If it is corresponding to there is not the MAC Address that target MAC (Media Access Control) address is assistant edge nodeMAC address entries, and there is not the MAC address entries that MAC Address that target MAC (Media Access Control) address is fringe node is corresponding, then this node arrives described masterThe outgoing interface of the node outside ring top edge node and assistant edge node is set to sky;
Processing unit 703, is further used for when Transmit-Receive Unit 701 receives PW encapsulated message, if matching outgoing interfaceFor empty MAC address entries, then abandon the PW encapsulated message received.
Preferably.
Dispensing unit 702, after the MAC address entries being further used in the control VLAN learnt change, starts first short fixedTime device;At this first short timer device to constantly, the MAC address entries after changing in controlling VLAN is synchronized to and this control VLAN bindsData vlan in, update the MAC address entries in corresponding data VLAN.
It is preferred that
Transmit-Receive Unit 701, when being further used for this equipment as non-master on ring, receives the chain that host node sendsRoad fault message, or link failure recovery message.
Dispensing unit 702, is further used for Transmit-Receive Unit 701 at this equipment as the host node on ring, and receives masterThe link failure message that node sends, or during link failure recovery message;Or this equipment is as host node on ring, link detectedWhen fault or faulty link recover, delete the MAC table controlled in VLAN, and start the second short timer device;At the second short timer deviceIn timing, if Transmit-Receive Unit 701 receives MAC notification packet, carry out source mac learning and update the MAC address entries controlled in VLAN,And the MAC address entries in the control VLAN after updating is synchronized to, with in the data vlan of this control VLAN binding, update corresponding numberAccording to the MAC address entries in VLAN;When the second short timer device is timed to, the MAC address entries not updated in data vlan is deleted.
It is preferred that
Dispensing unit 702, if being the node on main ring specifically for this equipment, or this equipment be the node in subring and withWhen other nodes described are on same ring, obtain the MAC Address of other nodes described in the local database as this PW pairThe MAC Address answered;If it is determined that MAC table in the data vlan of described user's Service Instance exists the MAC of other nodes describedAddress, then using outgoing interface corresponding for this MAC Address as the outgoing interface of described PW;Otherwise, determine according to locally configured strategyThe outgoing interface of described PW.
It is preferred that
Dispensing unit 702, if being the node in subring specifically for this equipment, and with other nodes described in same territoryDifferent rings on time, obtain the MAC Address of other nodes described in the local database as MAC Address corresponding for this PW;IfDetermine the assistant edge node existed in the MAC table in the data vlan of described user's Service Instance on the ring of this equipment placeMAC Address, then using outgoing interface corresponding for the MAC Address of described assistant edge node as the outgoing interface of PW;If it is determined that described useMAC table in the data vlan of family Service Instance exists the MAC Address of fringe node on the ring of this equipment place, and does not existsThe MAC Address of assistant edge node, then using outgoing interface corresponding for the MAC Address of described fringe node as the outgoing interface of PW;IfDetermine the MAC of the fringe node not existed in the MAC table in the data vlan of described user's Service Instance on the ring of this equipment placeAddress, and there is not the MAC Address of assistant edge node, then the outgoing interface of this PW is determined according to the strategy of configuration.
It is preferred that
Dispensing unit 702, during the MAC address entries being further used in data vlan change, uses the MAC address entries after change moreThe outgoing interface of new PW associated with it.
The unit of above-described embodiment can be integrated in one, it is also possible to separates and disposes;A unit can be merged into, it is possible toTo be further split into multiple subelement.
In sum, the present invention by RRPP networking dispose carrying private network double layer network agreement (SPB, L2VPN orVPLS), any node by transmitting-receiving notification packet, in the control VLAN belonging to notification packet generate MAC table, and be synchronized toIn the data vlan of this control VLAN binding;This node is according to the PW generated, and mac address table carries out turning of data messageSend out such that it is able to provide the double layer network of carrying private network to connect for the user in the different user Service Instance that accessed by RRPP ringEnter service.
When link or node failure and fault recovery, give the renewal processing procedure of MAC table, it is possible to realize streamAmount is switched fast.
The above, only presently preferred embodiments of the present invention, it is not intended to limit protection scope of the present invention.AllWithin the spirit and principles in the present invention, any modification, equivalent substitution and improvement etc. made, should be included in the protection of the present inventionWithin the scope of.