1. Field of the Invention
The present disclosure relates to Ethernet over multi-protocol label switching (MPLS) service.
2. Description of the Related Art
Many systems and architectures have been disclosed for handling data traffic over distributed networks. One type of system that has been recently proposed to the Internet Engineering Task Force (IETF) is an Ethernet over multi-protocol label switching (MPLS) architecture.
While the proposed system has many benefits in providing cost effective data services, this system fails to adequately take into consideration scalability issues, such as medium access control (MAC) address computational concerns for networks with large numbers of customer MAC addresses, and maintenance issues, such as providing edge-to-edge troubleshooting.
Accordingly, there is a need for improved systems and methods of providing Ethernet over MPLS.
The present disclosure is generally directed to systems and methods associated with data communications. In a particular embodiment, a method for use of multi-protocol labels switching (MPLS) encapsulation with control word communicated over a distributed computer network is disclosed. The method includes providing MPLS virtual circuit label with the control word associated with a data packet selected from one of a customer data packet and an OAM data packet, and communicating the MPLS packet with control word and the data packet over the distributed computer network.
In another embodiment, a method of handling a data packet within a computer network is disclosed. The data packet is either an unknown unicast, multicast, or broadcast packet. The method includes encapsulating the packet into a multi-packet label switching label and a control word, the control word having a source site identity and a destination site identity. The destination site identity could be a multi-cast identity. The packet is distributed to a plurality of sites associated with the customer virtual private network within the computer network.
In another embodiment, a method of handling a data packet within a computer network where the destination address is known to the local node is disclosed. The method includes encapsulating the packet into a multi-packet label switching label and a control word, the control word having a source site identity and a multi-cast identity; and distributing the packet to a plurality of sites within the computer network.
In another embodiment, a method of handling a data packet at ingress node multi-tenant unit (MTU) is disclosed. The method includes receiving a data packet from a data port responsive to customer equipment; performing customer medium access control address learning; determining whether the data packet is a unicast packet and if the packet is unicast packet and destination address is known to the local node, encapsulating the data packet into a multi-packet label switching label and a control word. The control word has a provider source site identity and a provider destination site identity. If the destination address of the packet is multi-cast, broadcast or unknown unicast address, the data packet is encapsulated into a multi-packet label switching label and a control word. The control word has a provider source site identity and a provider multicast site identity.
In another embodiment, a method of handling a data packet communication is disclosed. The method includes receiving the data packet at an egress multi-tenant unit (MTU) port; performing a mapping between a source medium access control address of the data packet and a provider source site identity; removing a multi-packet label and control word from the data packet to produce an Ethernet data packet; and sending the Ethernet data packet to a destination site. In another embodiment, a method of handling a data packet communication is disclosed. The method includes receiving the data packet at provider edge device (PE); performing provider site ID learning; determining whether the data packet is a unicast packet; if the packet is unicast packet and destination Site-ID is known to the local node, forwarding the packet to the destination PE device; and if the destination Site-ID of the packet is multi-cast, broadcast or unknown unicast address, distributing the packet to a plurality of sites associated with the customer virtual private network within the computer network.
In yet a further embodiment, a method of testing data communication within a network is disclosed. The method includes generating a testing packet for communication by a multi-tenant unit; and communicating the testing packet from the multi-tenant unit to another element within the network. The testing packet includes a control word. The control word includes a site destination identification field and a site source identification field.
In another embodiment, a control word for use in connection with a distributed computer network having customer equipment at a first site where the customer equipment has a plurality of associated medium access control addresses is disclosed. The control word includes a service provider site identification field to represent a group of the plurality of medium access control addresses at the first site.
In another embodiment, a distributed computer data network of a service provider is disclosed. The distributed computer data network includes a first computing node (source multi-tenant unit); a second computing node (provider edge device); a third computing node (provider edge device) a fourth computing node (destination multi-tenant unit); and a data packet communicated between the first computing node and the second computing node, the data packet including a control word having a provider destination identification corresponding to the location of the fourth computing node. The second computing node receives the data packet and forwards the data packet to the third computing node in response to processing the provider destination identification to determine the packet destination.
The use of the same reference symbols in different drawings indicates similar or identical items.
Referring to
The second provider edge equipment unit 108 also includes a site identification learning module 152 and is coupled to MTU 110 via virtual circuit 130. The MTU 110 includes a site identification and customer MAC mapping learning module 146 and VC encapsulation with control word module 144. The MTU 110 is coupled to customer equipment 116 via data link 134. The customer equipment 116 is located at a second site and is associated with a second plurality of MAC addresses 118.
During operation, data packets originating from the customer equipment 112 at the first site are communicated over data link 120 and the first port 122 to the MTU 102. At the MTU 102, a site identification forte first site of the customer equipment 112 is associated with a plurality of MAC addresses for such customer equipment. In addition, the MTU 102 performs site ID and customer MAC mapping learning 142. The MTU 102 communicates with the provider edge equipment 106 by sending a packet with VC encapsulation and control word 160. The control word 160 includes a source site identification (ID) and a destination identification (ID) associated with the first site where the customer equipment 112 is located. Similarly, the destination ID is associated with the destination site, such as the second site where the customer equipment 116 is located.
The provider edge equipment 106, responsive to receipt of the data packet and control word 160, receives the site ID information, performs site ID learning via module 150, and determines the destination ID for further routing of the packet. Data packets are forwarded by the provider edge equipment 106 via the IP/MPLS core network 128 to far end provider edge equipment, such as provider edge equipment 108. The provider edge equipment 108 further passes a packet with VC encapsulation and control word 162 containing the destination site ID via virtual circuit 130 to the MTU 110. The encapsulated control word packet and the associated data packet for the control word 144 are processed at the MTU 110. The site ID, destination ID, and MAC learning processes 146 are performed, MPLS VC label and control word are striped off and the packet is routed and forwarded to the customer equipment 116 at the second site. Finally, the customer equipment 116 forwards the communicated data to the appropriate equipment based on the particular destination MAC address.
Referring to
Referring to
The present disclosure presents a MPLS encapsulation mechanism with Control Word for providing Hierarchical-Virtual Private Local Area Network Service (H-VPLS) using Ethernet over MPLS. VPLS is a class of layer-2 virtual private network (VPN) services that allow multiple customer sites to be connected over a provider managed IP/MPLS infrastructure, so that customer devices appear to be on the same Local Area Network (LAN). The multi-tenant unit (MTU) device performs MPLS VC encapsulation and customer MAC and provider Site-ID mapping learning.
The MPLS encapsulation technique with Control Word may be used to avoid customer MAC handling on provider edge (PE) devices. A new provider Site-ID is provided to represent one or many customer MAC addresses behind a customer facing port (e.g., behind a MTU). PE devices perform a limited amount of network address learning. The MPLS encapsulation with Control Word also provides for OAM delivery (e.g., to facilitate point-to-point, point-to-multi-point reachability testing, performance measurement, or the like). Customer MAC learning at gateway devices may be beneficially reduced or eliminated when a VPLS service spans multiple domains.
The above disclosed subject matter is to be considered illustrative and the appended claims are intended to cover all such modifications and other embodiments which fall within the true spirit and scope of the present invention. Thus, to the maximum extent allowed by law, the scope of the present invention is to be determined by the broadest permissible interpretation of the following claims and their equivalents, and shall not be restricted or limited by the foregoing detailed description.
Number | Name | Date | Kind |
---|---|---|---|
5732071 | Saito et al. | Mar 1998 | A |
5757924 | Friedman et al. | May 1998 | A |
5790541 | Patrick et al. | Aug 1998 | A |
5912891 | Kanai | Jun 1999 | A |
6049528 | Hendel et al. | Apr 2000 | A |
6061728 | Mead et al. | May 2000 | A |
6188689 | Katsube et al. | Feb 2001 | B1 |
6343330 | Khanna et al. | Jan 2002 | B1 |
6512744 | Hughes et al. | Jan 2003 | B1 |
6775239 | Akita et al. | Aug 2004 | B1 |
6967927 | Dugeon et al. | Nov 2005 | B1 |
7092361 | Puppa et al. | Aug 2006 | B2 |
7097008 | Pham et al. | Aug 2006 | B2 |
7155215 | Miernik et al. | Dec 2006 | B1 |
7260097 | Casey | Aug 2007 | B2 |
7283465 | Zelig et al. | Oct 2007 | B2 |
20010009550 | Mizuhara | Jul 2001 | A1 |
20020118644 | Moir | Aug 2002 | A1 |
20020181457 | Mezeul et al. | Dec 2002 | A1 |
20030103522 | Hane | Jun 2003 | A1 |
20030198182 | Pegrum et al. | Oct 2003 | A1 |
20030208525 | Bannai et al. | Nov 2003 | A1 |
20040037279 | Zelig et al. | Feb 2004 | A1 |
20050213594 | Klink | Sep 2005 | A1 |
20060039374 | Belz et al. | Feb 2006 | A1 |
Number | Date | Country | |
---|---|---|---|
20040151180 A1 | Aug 2004 | US |