The present invention relates to methods and arrangements for simplifying switching in an access network.
Ethernet has been developed mainly as a LAN (Local Area Network) technology, aiming to provide an efficient infrastructure for data networks within a company. Originally it was developed for moderate speed shared media, but current technology applies mainly to point-to-point links up to 10 Gbit/s, interconnected by high capacity Ethernet switches, supporting virtual LAN, VLAN, as described in the standard IEEE 802.1q. A virtual LAN is a group of system, such as computers in a workgroup, that need to communicate with each other, and protocols that restrict the delivery of VLAN frames to members of the VLAN.
A LAN can be partitioned into multiple VLAN:s, where each VLAN is assigned a number called a VLAN identifier that identifies it uniquely within the LAN. A LAN contains at least one VLAN, the default VLAN.
Switches contain advanced self learning features and broadcast behaviour, which are well suited for the building of for example a corporate network, supporting a number of user groups.
However, in public service structures different requirements are put with respect to security, scaling and chargeability of services. In the public network, each user would ideally have his own completely isolated set of work groups available. A particular problem is then that the number of available VLAN tags, each tag defining a user, is limited to a number 4096, which is far from enough to serve hundreds of thosands of users.
In the international patent application No. WO 00/77983 is descibed a telecommunications system in which users can select services. Service networks and users are connected to a switched domain. The service networks are arranged into groups and each group is allocated a VLAN by konfiguring the ports in the switches. The users can select services by configuring their apparatuses to a selected one of the VLAN:S.
In the international patent application No. WO 00/79830 is described a telecommunication system in which users can select services. A switched domain has switches to which service providers and network terminals are connected. The switches have a user port connected to an uplink port in the network terminal. The user port is configured for the different service providers and the network terminals have corresponding service ports. The service ports corresponding to predetermined ones of the services are configured.
In these two applications the number of users is restricted.
In the European patent application EP 1045553 A2 is disclosed VLAN bridging of a network. The network has nodes for changing of addresses. A user sending a message via the network addresses it to a receiver. When the message reaches one of the network nodes the receiver address is changed into a temporary address for the network. This address is changed back when the message leaves the network via another of the network nodes.
Modern Ethernet bridges (also called switches) have a self-learning mechanism to optimize frame delivery and reduce the amount of traffic in a Local Area Network (LAN). The switch automatically learns the device addresses connected to each port (directly or indirectly via other switches) and it only forwards frames to the port associated with the destination address in the frame.
The Ethernet standard IEEE 802.3 describes a mechanism in the protocol, Embedded Source-Routing Information Field (E-RIF), which can be used to describe a path between the source and the destination. However, this mechanism is not part of the addressing information in the frame. Switches, in particular “translational switches”, can use this information to optimize frame forwarding; in standard Ethernet this mechanism is only used to tunnel frames between source-routed environments.
Self-learning switches have some problems when devices move to another port on the switch; the switch handles this by regularly “forgetting” the address information. However, this leads to unnecessary flooding in the network when the switch relearns addresses that never move. Another problem with this technique is scaling; the memory consumption grows linearly to the number of addresses visible behind each port.
Globally administered (“physical”) MAC addresses lack internal structure and are not suitable for describing switching information.
The E-RIF mechanism is located in the frame payload, thus adding to the frame delivery overhead. For small frames this overhead can be quite significant. There is also a restriction that the E-RIF mechanism cannot be used if incoming frames already contain E-RIF information that must not be altered.
The present invention is concerned with a problem how to create a method and an access system with an efficient and comparatively simple way of switching.
Another problem is how to make the switching efficient in both directions between two communicating parts.
Still a problem is how to express the path between the source and destination allowing network equipment to minimize internal resource usage and network bandwidth, i.e. there should be no unnecessary frame duplication (flooding) in the network.
Yet a problem is how to implement support for simplified switching, within the reach of a large scale Public Access network based on Ethernet technology. The invention encompasses switching support for both wired and wireless connections between user devices and terminal points of an access network.
The problem is solved by an access system including two nodes, the nodes being interconnected by an access network supporting exchanging of Ethernet frames. In the access network locally administrated addresses are used. The switching route through the network, or a part of it, is indicated in the frame address field.
Somewhat more in detail the frame address field has directly the identity of the destination node and identities of at least a part of intermediate switching nodes along the switching route. In an alternative the frame address field has an indication, pointing out where the description of the switching route is to be found.
A purpose with the invention is create a method and an access system with an efficient and comparatively simple way of switching.
Another purpose is to make the switching efficient in both directions between two communicating parts.
Still a purpose is to express the path between the source and destination thereby allowing network equipment to minimize internal resource usage and network bandwidth, i.e. there should be no unnecessary frame duplication (flooding) in the network.
Still other purposes are to outline an internal structure of the locally administered MAC addresses (SAMAC), to show how this structure can be used to route frames in the access network, to show how the internal structure can be used to support users changing location to another port on the access network while retaining existing service bindings and to show how the internal structure can be used to simplify the implementation of the Edge Access Server (EAS).
Yet a purpose is to implement support for simplified switching, within the reach of a large scale Public Access network based on Ethernet technology. The invention encompasses switching support for both wired and wireless connections between user devices and terminal points of an access network.
An advantage with the invention is that a method and an access system can be created, having an efficient and comparatively simple way of switching.
Another advantage is that the switching is efficient in both directions between two communicating parts.
Still an advantage is that the path between the source and destination can be expressed so as to allow network equipment to minimize internal resource usage and network bandwidth, i.e. there will be no unnecessary frame duplication (flooding) in the network.
Yet an advantage is that simplified switching can be implemented within the reach of a large scale Public Access network based on Ethernet technology. The invention encompasses switching support for both wired and wireless connections between user devices and terminal points of an access network.
The invention will now be described more in detail with the aid of embodiments and with reference to the enclosed figures.
a shows a diagram over an ethernet frame;
b shows a diagram over a VLAN tag in the frame;
c shows a diagram over an address field in the frame;
The embodiment in
As mentioned, the network ETH1 and the users U11-Um1 utilize Ethernet technology. The Eternet technology therefore will be shortly commented below.
In
In
c shows the source address field S1, which consists of 48 bits. One bit L1 points out whether the address is locally or globally administrated. One bit M1 points out whether the frame FR1 is a multicast frame used for e.g. IP multicast messages. The remaining 46 bits in a field ADR1 are address bits for MAC addresses. Any of the user devices has one globally administrated MAC address, which is given by the manufacturer of the device. The user device UD11 in
In
In a common Ethernet, on one hand, the different participants within each VLAN can communicate with each other freely and efficiently, which is a basic principle of the Ethernet. A first user that wants to contact a second user sends broadcast an address resolution protocol ARP with a request “Who has this IP address?”. Everybody in the network can listen and the second user, that has the IP address in question, sends back his MAC address to the first user. A relation between the users is established. In an access system, on the other hand, a fundamental service is to both enable establishment of service bindings between users and service providers and, in such bindings, provide a transport service through the access system such that the service can be delivered to the user with high security and without any quality degradation. In a multi-service, multi service provider scenario several such bindings must be possible for each user at any given point in time, without interference between the bindings or between bindings for different users. In the present description will be disclosed how a multiservice access system, e.g. the access system ACC1, will fullfill these requirements on the services using Ethernet technology.
To get the access network ACC1 to work, first the users decide which services they select and which VLAN they decide for a certain of the services. Each user can make his own decisions for the correspondence between VLAN and service, independently of the other users. In the present example the user U11 selects the service from the service provider SP1 and decides the VLAN with the tag TAG1 for this service. The user U11 also selects service from provider SP2 and decides the VLAN with the tag TAG2 for this service. Correspondingly the user U11 selects service provider SP3 on the VLAN with the tag TAG3 and service provider SP4 on the VLAN with the tag TAG4. Other users can select other services and decide other VLAN:s. The user U12, for example, selects the service from service provider SP1 and decides the VLAN with the tag TAG3 for this service. The user U12 also selects service from the service provider SP3 and decides the VLAN with the tag TAG1 for this service. The users then send their decisions to the administrative unit AD1 in the edge access server EAS, the users defining themselves by their respective user port. This sending can be performed by any suitable means, e.g. by assigning a web page, by a common letter or by a telephone call. The administrative unit AD1 also has the information about the correspondence between the service providers SP1-SPn and the service agents SA1-SAn. The administrative unit thus has triplets of information containing service agent, VLAN tag and user port. Gradually, when the users U11-Um1 send their information, the administrative unit AD1 will build up the register REG1 in the broadcast handler BH1, as shown in
In the example above the user U11 selected the service from service provider SP1 and decided the VLAN with the tag TAG1. The administrative unit dynamically allocates a unique MAC address SAMAC1 to the service port PT1 of the service agent SA1, connected to the service provider SP1. The address is allocated from a set of locally administrated addresses, LAA. This address is written on the list L111 for the user port UP11 and in a field pointed out by the VLAN tag TAG1. This means that the allocated MAC address SAMAC1 is bound to solely one information pair which has the user port UP11 and the identification tag TAG1 of the VLAN. Now the relation R11 is defined by the address SAMAC1 for the service port PT1, the address being bound to the user port UP11 and the VLAN tag TAG1. It should be noted that no other participant but the service provider SP1 and the user U11 can utilize the relation R11. Following the above examples, a unique MAC address SAMAC2 is dynamically allocated to the service port PT2 of the service agent SA2 and is written in a field defined by the VLAN tag TAG2 on the same list L11. A new relation R21 is created, which is defined by the address SAMAC2 and is bound to the user port UP11 and the VLAN with the tag TAG2. Also a MAC address SAMAC5 is allocated to the service agent SA3, service port PT3, in a field with the tag TAG3 and a MAC address SAMAC6 is allocated to the service agent SA4, service port PT4, in a field with the tag TAG4.
For the user U12 with the user port UP12 a unique MAC address SAMAC3 is dynamically allocated to the service port PT1 of the service agent SA1 and this address is written in a field pointed out by the VLAN tag TAG3 on the list L12. For the user U12 also a MAC address SAMAC4 is dynamically allocated to the service agent SA3, service port PT3, and this address is written in a field pointed out by the VLAN tag TAG1 on the list L12.
It appears from the above that, in the embodiment, each of the service ports PT1-PTn can get associated with a set of the unique MAC addresses for the service agents and that each of these MAC addresses is associated with only one particular of the user ports UP11-UPk1.
The relations between user port and service agent are built up as described above and are stored in the register REG1, but still the user devices can t utilize their respective service. It is in fact not even necessary until now that the user devices are connected. When the users intend to utilize the services they connect their user devices to the wires W11-Wk1 via the VLAN:s as is shown by an example in
The user device UD11 sends a frame FR2 with the addresses and payload as is shown in
In a corresponding manner the other devices of the user U11 send their DHCP requests with their MAC addresses and corresponding VLAN tag, the tags appearing from
The relation R11 is now established on an IP level. When the service agent SA1 gets an IP packet with the address IPUD11 it finds the information in the table TAB1 and sends the packet to the correct receiver with the MAC address UMAC1. The user device UD11 also has the IP address IPSA1 to the service agent, its “default gateway”. The user device UD11 utilizes in conventional manner an ARP request (Address Resolution Protocol) to get a MAC address to the IP address IPSA1. The user device UD11 therefore transmits broadcast the ARP message which is received by the handler H1 in the penult P1 via the user port UP11. The handler adds the identification for the user port and sends the message unicast to the broadcast handler BH1 in the edge access server EAS. The broadcast handler looks in its register REG1 on the list L11 for the user port UP11. On the VLAN tag TAG1 the broadcast handler finds the service agent MAC address SAMAC1. It transmits the address SAMAC1 to the handler H1, which in turn responds with the address SAMAC1 to the user device UD11. With the aid of the address SAMAC1 the user device UD11 now can utilize the relation R11 and get the service from the service provider SP1.
In an alternative embodiment the handler H1 in the penult P1 successively creates the register REG11, shown in
In still an embodiment the register REG11 in the handler H1 is built up when the register REG1 in the broadcast handler BH1 is built up.
Below will be described a number of alternative embodiments.
In the above embodiment is described that a user first made the DHCP request via the access system ACC1 to get the IP addresses. This request then was followed by the ARP request. In an alternative embodiment the configuration is performed in an alternative way by alternative means. The request for the IP addresses can e.g. be performed by so called static configuration. After this configuration the user device makes the ARP request as described above to get the MAC address to its default gateway, the relevant service agent. In the same way as described above all ARP requests from the users, also when not preceeded by a DHCP request, will be intercepted by the penult and result in the address to the respective default gateway. In this way all communication between different users is forced to flow to the service agent. It was also described that the dynamically allocated MAC addresses were locally administrated addresses, LAA. An alternative is that a set of MAC addresses is bought from the IEEE.
The service agent successively builds up a list for translating between IP addresses and user device MAC addresses. When it receives a packet it reads the IP address and if this address is whitin the service agent's own administrated subnet it looks for the IP address and finds the user MAC address. The service agent forwards the packet to this user MAC address and packets with any other IP address will be forwarded to the service provider.
In connection with
In the embodiment in connection with
With the abovementioned further service access relation identifier it is also possible, in an embodiment, that a plurality of MAC addresses are allocated to the port of one of the service agents. Each of these MAC addresses is then bound to a set of relations, each of the relations having its own further identifier.
In connection with
In an embodiment the VLAN tag is transmitted from the service agent to the penult to transmit a requested service to the correct user device. In an alternative embodiment no VLAN tag is transmitted to the penult but only the service agent MAC address, e.g. SAMAC1. The penult itself derives the VLAN identity, e.g. the VLAN tag, from the unique service agent MAC address, defining the service access relation.
In connection with
Above is described the use of DHCP request. For other types of services than IP or other types of establishment of a relation between a user device and a service agent, other types of broadcast service attachment requests can be used.
By the broadcast handler also those alternative requests are replied to by a service agent MAC address, which is identified in the same way as for the DHCP. As an example can be mentioned the use of PPP over Ethernet, PPPoE, where a broadcast PPPOE request will be responded with a service agent MAC address to the service agent acting as PPPoE server. Also, the ARP request is mentioned above. For other protocols than the IP protocol similar procedures are utilized to bring about address resolution.
In connection with a flow chart in
The method of building up the correspondance between IP addresses and MAC addresses will be described in short in connection with flow charts in
The procedure when the service access relation R11 is established in the reverse direction, from the user side to the service agent side, will be described shortly in connection with the flow chart in
The above described arrangements and procedures are related to unicast access between the service agents and the user ports on the penults. In connection with
The aim with the multicast access relation MR11 is, naturally, to distribute a service from the service provider SP19 via the service agent SA19 to the users. Note that this distribution takes place only downstream, from the service provider to the users. The distribution is performed by branching up the service access relation MR11 in the edge access server, in the switches and in the penults. The relation MR11 to the users, which utilize the service from the provider SP19, is defined by one and the same MAC address, in the example a MAC address SAMAC19 allocated to the service agent SAl9 by the administrative unit AD1. Each multicast flow from this service agent has a specific multicast address to which all participating users are listening. In the multicast frames transmitted via the relation MR11 the multicast bit M1 in
In connection with
The services from the service providers SP1-SPn must be delivered with a certain quality level. The resources within the access system ACC1 are however limited, which delimits the quality level. An example on a limited resource is the available bandwidth. Many relations, as the relation R11, are to be transmitted via the connections between the service agent and a switch, between the switch and the penult and between the penult and the user VLAN, which relations have to share the available bandwidth. The quality of service for the relations are deicided in agreements and are denoted for each relation in the register REG1 in
It can happen that a participant tries to make more use of the access system ACC1 than the agreement allows, e.g. sends more traffic than it is agreed. This means that the participant's traffic even after shaping takes more bandwidth than the bandwidth parameter allows. The system can look upon the unique service agent MAC address in the frames and compare with the agreement. In the relation that uses too much bandwidth the system can apply policing and delet some of the transmitted frames. Also for this function the system has to look on the further service access relation identifier in the alternative embodiment for identifying the relations.
It can also happen that the users exchange their MAC addresses by some means and tries to utilize the access system ACC1 for communication between themselves and not with the service providers. To prevent such a behaviour the penults can have a traffic filter, e.g. a filter F21 at the user port UP21 in the penult P2. The filter reads the addresses in the transmitted frames. Frames from the user devices may only have the service agent MAC addresses or the broadcast address as destination address. Frames to the user devices may only have the service agent MAC addresses as source address. Other addresses are not allowed and frames with such addresses are deleted in the filter. Also, broadcast messages from a user, which are not to be handled by any of the service agents, are deleted.
The MAC addresses can have an internal address structure that is adapted to the structure of the access network ETH1. This can simplify the implementation of the network and its components in the access system ACC1.
In
There are two predefined flag bits in the flag field 141 according to the Ethernet standard:
To describe the invention some definitions have to be made:
A route in this context is a description of a path from the source to the destination. The route may contain a complete description of the path, with all intermediate steps included, or a partial description of the path, with only some steps included; in the latter case other mechanisms such as self-learning switches are used for the steps omitted from the route description.
An EAS Route, shown as the field 142 in
A User Route, shown as the field 143 in
A route, EAS or User Route, can be specified via a direct or an indirect description. A direct route description contains the path information used to route the frame “in situ”, i.e. the actual route, or an encoding of it, is contained in the address itself. An indirect route description contains a reference to the path information located elsewhere, for example, in the network equipment such as the edge access server EAS or the penult P1 . . . Pk.
Different embodiments of a service agent MAC address may contain zero, one or both of the route fields 142 and 143, but the flag field 141 is mandatory. It should be noted that even if one or both of the route fields are omitted, the service agent MAC address still constitutes a valid address denoting one of the service agents in the edge access server EAS.
Below four examples on different route descriptions are given in connection with FIGS. 15 to 20.
Direct, Partial Route Structure
Direct, Complete User Route
Indirect Partial Route
Finding a path in this case is similar to how it is described in connection with
An embodiment of the indirect User Route is suitable to support mobility for a user, that needs to move between different locations. Moving a service binding from one of the user ports to another, simply implies updating the penult tables in the involved penults. Depending on the type of indirect user route description used, updating of tables in other nodes may also be necessary.
Indirect Complete User Route
Finding a path in this case is similar to how it is described in connection with
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/SE03/00211 | 2/7/2003 | WO |