In a remote connection network structure of a Multi-Protocol Label Switch (MPLS) Layer 2 Virtual Private Network (L2VPN), layer 2 data is transparently transmitted in a uniform MPLS or Internet Protocol (IP) backbone network which cannot be perceived by users. For users, it seems like nodes are directly connected with one another via Ethernet links. At present, a network management system of an MPLS L2VPN performs automatic detection. A VPN is detected by reading Virtual Switch Instance (VSI) configuration information in a provider edge (PE) by a visiting device.
Features of the present disclosure are illustrated by way of example and not limited in the following figure(s), in which like numerals indicate like elements, in which:
For simplicity and illustrative purposes, the present disclosure is described by referring to examples thereof. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present disclosure. It will be readily apparent however, that the present disclosure may be practiced without limitation to these specific details. In other instances, some methods and structures have not been described in detail so as not to unnecessarily obscure the present disclosure. As used herein, the term “includes” means includes but not limited to, the term “including” means including but not limited to. The term “based on” means based at least in part on. Quantities of an element, unless specifically mentioned, may be one or a plurality of, or at least one.
Examples of the present disclosure provide technical schemes for detecting an access CE device of a PE device which is applicable to an MPLS L2VPN composed of CE devices and PE devices.
According to an example, automatic detection of an access CE device of a PE device in an MPLS L2VPN may be performed. For example, VSI 1 is in PE 1. For example, the network management apparatus, which may be a network management server, may obtain information for VSIs in PE 1, such as identifying VSI 1 in PE 1. The network management apparatus may communicate with PE 1 and other PE devices and CE devices via a network to obtain the desired information. The network management apparatus obtains an encapsulation Virtual Local Area Network (VLAN) ID corresponding to VSI 1 by using the value of the VSI 1, and obtains a Service VLAN (SVLAN) ID in VLAN mapping information of a CE 1 which is adjacent to PE 1. The network management apparatus determines CE 1 is an access CE device of PE 1 in the VSI 1 in response to a determination that the SVLAN ID is identical to the encapsulation VLAN ID. The same procedure may be performed to determine CE 2 is an access CE device of PE 2 for VSI 2. An example of the network management apparatus is further described with respect to
At block 201, a VSI in a PE device is obtained, and an encapsulation VLAN ID corresponding to the VSI is obtained by using the value of the VSI.
In an example, all VSIs in the PE device may be obtained by using command lines, and an encapsulation VLAN corresponding to each VSI may be obtained by using the value of the VSI.
At block 202, an SVLAN ID in VLAN mapping information in a CE device adjacent to the PE device in the VSI is obtained.
In an example, the CE device adjacent to the PE device in a VSI may be determined based on layer 2 topology and CEs whose information has been imported into the network management system.
An application policy, e.g., a quality of service (QoS) policy, configured for the incoming traffic (i.e., in the ingress direction) of a customer-side port (i.e., a downlink port) of a CE device adjacent to the PE device in a VSI may be obtained, and traffic behavior defined by using the QoS policy may also be obtained. The SVLAN ID configured for the traffic behavior may be obtained by using the traffic behavior obtained.
There may be multiple VSIs in the PE device. In this case, an SVLAN ID in VLAN mapping information of a CE device adjacent to the PE device in each VSI may be obtained respectively.
Correspondingly, there may be multiple CE devices that are adjacent to the PE device in a VSI. In this case, an SVLAN ID in VLAN mapping information of each CE device adjacent to the PE device in the VSI may be obtained respectively.
At block 203, it is determined the CE device is an access CE device of the PE device in the VSI in response to a determination that the SVLAN ID is identical to the encapsulation VLAN ID.
In an example, after the encapsulation VLAN ID corresponding to the VSI of the PE device and the SVLAN ID in the VLAN mapping information of the CE device adjacent to the PE device in the VSI are obtained, it is determined whether the SVLAN ID is identical to the encapsulation VLAN ID to determine whether the CE device is the access CE device of the PE device in the VSI. It is determined the CE device is the access CE device of the PE device in the VSI in response to a determination that the SVLAN ID is identical to the VLAN ID.
The technical scheme is further illustrated by referring to certain specific application scenario to make the technical scheme more apparent.
At block 301, all VSIs in a PE device are read in by using command lines.
At block 302, a VSI in a PE device is selected, and an encapsulation VLAN ID corresponding to the VSI is obtained by using the value of the VSI.
In this example, a PE device which has only one VSI is taken as an example to simplify the description. The value of the VSI is “vpn2”. As shown in
At block 303, CE devices adjacent to the PE device in the VSI are determined based on layer 2 topology and CE devices that have been imported into the network management system.
Suppose in the example, the number of CE devices adjacent to the PE device in VSI “vpn2” is 2 (CE1 and CE2).
At block 304, a CE device adjacent to the PE device in the VSI is selected, and an SVLAN ID in VLAN mapping information in the CE device is obtained.
Taking CE1 as an example, as shown in
At block 305, a determination is made as to whether the SVLAN ID is identical to the encapsulation VLAN ID. If yes, at block 308, it is determined the CE device is an access CE device of the PE device in the VSI.
In the example, since the SVLAN ID in the VLAN mapping information of CE1 and the encapsulation VLAN ID corresponding to VSI “vpn2” are both “321”, it is determined that CE1 is the access CE device of the PE device in VSI “vpn2”.
If the determination at block 305 is no (i.e., the SVLAN ID is not identical to the encapsulation VLAN ID), at block 306, the PE device determines whether there is a CE device adjacent to the PE device in the VSI that has not been selected. If yes, processing returns to block 304 for the next CE device that is adjacent to the PE device in the VSI.
In the example, since the PE device has another adjacent CE device CE2 in VSI “vpn2”, it is further determined whether CE2 is an access CE device of the PE device in VSI “vpn2”.
If the determination at block 306 is no (i.e., there are no more CE devices adjacent to the PE device that have not been selected), at block 307, the PE device determines whether there is a VSI that has not been selected. If yes, the processing returns to block 302 for the next VSI. Otherwise, the method is terminated in response to a determination that there is no VSI that has not been selected.
In this example, since the PE device has only one VSI, after automatic detection of an access CE device in VSI “vpn2” is performed, the method is terminated.
In an example, the above process may be automatically implemented by a machine according to pre-defined machine readable instructions executed by a processor. The method may be implemented in the background.
The technical scheme implements automatic detection of an access CE device of a PE device in an MPLS L2VPN by obtaining a VSI in a PE device, obtaining an encapsulation Virtual Local Area Network (VLAN) ID corresponding to the value of the VSI, obtaining a Service VLAN (SVLAN) ID in VLAN mapping information of a CE device adjacent to the PE device, and determining the CE device is an access CE device of the PE device in the VSI in response to a determination that the SVLAN ID is identical to the encapsulation VLAN ID.
Based on the above concept, various examples of the present disclosure also provide an apparatus for detecting an access CE device of a PE device which can implement the above method.
A first obtaining module 51 obtains a VSI in a PE device, and obtains an encapsulation VLAN ID corresponding to the VSI by using the value of the VSI.
A second obtaining module 52 obtains an SVLAN ID in VLAN mapping information in a CE device adjacent to the PE device.
A determining module 53 determines the CE device is an access CE device of the PE device in the VSI in response to a determination that the SVLAN ID is identical to the encapsulation VLAN ID.
The second obtaining module 52 may obtain an SVLAN ID in VLAN mapping information in an adjacent CE device in each VSI respectively when the PE device has multiple VSIs.
The second obtaining module 52 may obtain an SVLAN ID in VLAN mapping information in each adjacent CE device in an VSI respectively when the PE device has multiple adjacent CE devices in the VSI.
The second obtaining module 52 may obtain the SVLAN ID in the VLAN mapping information in the CE device adjacent to the PE device in the VSI by: obtaining an QoS policy configured for the incoming traffic of the customer-side port of the CE device, obtaining a traffic behavior defined by the QoS policy; and obtaining the SVLAN ID configured for the traffic behavior by using the traffic behavior.
The CPU 60 performs calculations of data. The memory 61 stores various types of data, e.g., intermediate data of a calculation and a calculation result, information obtained from a PE device and from a CE device, and so on. The internal bus 64 implements information interactions between the components, and may be a bus or a collection of multiple wired or wireless links.
The apparatus shown in
It should be understood that in the above processes and structures, not all of the procedures and modules are necessary. Certain procedures or modules may be omitted according to the needs. The order of the procedures is not fixed, and can be adjusted according to the needs. Those skilled in the art can understand the modules 51-53 in the apparatus of
Through the above description, those skilled in the art may understand that the examples of the present disclosure may be implemented by hardware or by a hardware platform together with software including machine readable instructions stored in a non-transitory storage medium. Thus, the examples may be embodied by a software product.
In various examples, the hardware may be implemented by dedicated hardware or hardware executing machine readable instructions. For example, the hardware may comprise dedicated circuitry or logic that is permanently configured (e.g., as a special-purpose processor, such as a field programmable gate array (FPGA) or an application-specific integrated circuit (ASIC)) to perform certain operations. The hardware may also comprise programmable logic or circuitry (e.g., as encompassed within a general-purpose processor or other programmable processor) that is temporarily configured by software to perform certain operations.
Machine readable instructions for the modules 51-53 shown in
The non-transitory computer readable medium 62 may include floppy disk, hard drive, magneto-optical disk, compact disk (such as CD-ROM, CD-R, CD-RW, DVD-ROM, DVD-RAM, DVD-RW, DVD+RW), magnetic tape drive, Flash card, ROM and so on. Optionally, the program code may be downloaded from a server computer via a communication network.
The scope of the claims should not be limited by the embodiments set forth in the examples, but should be given the broadest interpretation consistent with the description as a whole.
Number | Date | Country | Kind |
---|---|---|---|
201310086887.6 | Mar 2013 | CN | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/CN2013/088279 | 12/2/2013 | WO | 00 |