This invention relates to providing the support of multipoint-to-multipoint services, such as a Virtual Private LAN Service (VPLS), over a communications network.
Packet Switched networks are replacing legacy Time Division Multiplexing (TDM) based networks for their capability to handle in a more optimized and flexible way data traffic, such as Ethernet and Internet Protocol (IP). A type of connectivity which can be implemented on a packet switched network is a multipoint-to-multipoint service. A type of multipoint-to-multipoint service is a Virtual Private LAN Service (VPLS). A set of nodes are interconnected in a multipoint-to-multipoint manner such a way that they appear to form a virtual private Local Area Network.
Several existing methods are known for providing a VPLS over a packet switched network: flat VPLS and Hierarchical VPLS. In a “flat” VPLS, multiple customer sites can communicate with each other as if they were connected to a private Ethernet LAN segment. The VPLS service is defined by establishing a full mesh of connections, called Pseudowires (PW) between all edge nodes forming part of the VPLS. This is shown in
It can be difficult to implement the flat VPLS across multiple network domains. Where protection of traffic is required, considerable effort is needed to manage protection instances. End-to-end protection of the pseudowires extending end-to-end across multiple domains can be problematic. In summary, VPLS suffers from scalability issues when the number of its edge nodes becomes high.
Another form of VPLS is Hierarchical VPLS (H-VPLS). H-VPLS creates a full mesh of connections only in the core sub-network or inside each sub-network.
In an H-VPLS PW and LSP connections only traverse a single network domain. Intermediate nodes PE7, PE8, PE9 must forward traffic between a PW in a Metro network and a PW in the core network, and vice versa. So, traffic between PE2 and PE3 will arrive at PE7. PE7 must forward traffic along the PW between PE7 and PE8. PE7 inspects the MAC address carried within each packet to determine how to forward each packet. This requires each nodes PE7-PE9 to store a MAC forwarding table. This can be a considerable burden on the intermediate nodes, requiring storage and computation resources as well as incurring a forwarding delay. For the network shown in
The present invention seeks to provide an alternative way of providing a Virtual Private LAN Service (VPLS) over a communications network.
An aspect of the present invention provides a method of providing a multipoint-to-multipoint service between a set of edge nodes of a communications network, the network comprising at least two sub-networks and an intermediate node at a boundary between sub-networks, the method comprising:
configuring, for each pair of edge nodes comprising an edge node in a first of the sub-networks and an edge node in a second of the sub-networks, a multi-segment pseudowire connection between the pair of edge nodes, the pseudowire connection passing via at least one intermediate node;
configuring, at the at least one intermediate node, forwarding data which specifies a forwarding relationship between pseudowire segments corresponding to the multi-segment pseudowire connections.
This aspect of the invention provides a way of implementing a multipoint-to-multipoint service, such as a Virtual Private LAN Service (VPLS), over a connection-oriented network. An advantage of using multi-segment pseudowire connections is that the multipoint-to-multipoint service can be provided across a network comprising multiple domains, with the possibility of a protection mechanism per segment. Another advantage of using multi-segment pseudowire connections, end-to-end, between pairs of edge nodes is that it reduces the resources required in the intermediate nodes at boundaries between sub-networks. An intermediate node is only required to switch traffic between pseudowire segments. This considerably reduces the required resources at the intermediate node compared to MAC-based switching as performed in a conventional H-VPLS network.
Each sub-network can be a network domain (e.g. a part of a network under control of a particular Administrative Authority), a part of a network having a particular network type or a part of the network using a particular network technology (e.g. MPLS or MPLS-TP). The multi-segment pseudowires can be carried end-to-end across a network comprising different domains and/or technologies.
Advantageously, the pseudowire segments of the multi-segment pseudowires are carried along Label Switched Paths (LSP) within the network, with a respective pseudowire segment of each of a plurality of the multi-segment pseudowires following a common Label Switched Path (LSP) between nodes. Carrying multiple pseudowires along a common LSP reduces the network resources needed to support the service.
The communications network can have a hub-and-spoke topology, or a full mesh topology, of Label Switched Paths between edge nodes and intermediate nodes.
Edge nodes of a sub-network can be directly connected via single segment pseudowire (SS-PW) connections. Alternatively, edge nodes of a sub-network can be connected via a multi-segment pseudowire (MS-PW) connection which passes via an intermediate node, which has an advantage of reducing the network resources required to support the service, particularly when the pseudowire segments of the multi-segment pseudowire connection are carried by a LSP used by other pseudowire segments.
Another aspect of the invention provides a method of configuring a first intermediate node to implement a multipoint-to-multipoint service between a set of edge nodes of a communications network, the network comprising at least two sub-networks and the first intermediate node at a boundary between sub-networks, with a multi-segment pseudowire connection configured for each pair of edge nodes comprising an edge node in a first of the sub-networks and an edge node in a second of the sub-networks, at least one of the multi segment pseudowire connections passing via the first intermediate node, the method comprising:
configuring, at the first node, forwarding data which specifies a forwarding relationship between pseudowire segments corresponding to the multi-segment pseudowire connection between edge nodes.
Another aspect of the invention provides a method of traffic forwarding at a first intermediate node of a communications network in which a multipoint-to-multipoint service is established between a set of edge nodes, the network comprising at least two sub-networks and the first node at a boundary between sub-networks, with a multi-segment pseudowire connection configured for each pair of edge nodes comprising an edge node in a first of the sub-networks and an edge node in a second of the sub-networks, at least one of the multi segment pseudowire connections passing via the first intermediate node, the method comprising:
receiving a traffic unit with information which identifies the pseudowire segment;
forwarding traffic to another pseudowire segment based on the received information which identifies the pseudowire segment and forwarding data stored at the first intermediate node.
An advantage of this aspect is that the intermediate node is only required to switch traffic between pseudowire segments. This considerably reduces the required resources at the intermediate node compared to MAC-based switching as performed in a conventional H-VPLS network.
Another aspect of the invention provides a method of configuring a first edge node of a communications network to implement a multipoint-to-multipoint service between a set of edge nodes, the network comprising at least two sub-networks and an intermediate node at a boundary between sub-networks, with a multi-segment pseudowire connection configured for each pair of edge nodes comprising the first edge node in a first of the sub-networks and an edge node in a second of the sub-networks, the multi segment pseudowire connections passing via an intermediate node, the method comprising:
configuring, at the first edge node, mapping data which specifies a mapping relationship between a network address corresponding to a traffic destination and an identifier of a multi-segment pseudowire connection.
The network address can be a network address of the destination edge node or a network address of a node served by the destination edge node. Where MAC-in-MAC encapsulation is used within a provider network, customer traffic is encapsulated at an edge node and packets carry an additional header with a destination address corresponding to one of the destination edge nodes of the provider network.
Further aspects of the invention provide apparatus to implement each of these methods.
An aspect of the invention provides apparatus for use at a first intermediate node of a communications network to provide a multipoint-to-multipoint service between a set of edge nodes of the communications network, the network comprising at least two sub-networks and the first intermediate node being positioned at a boundary between sub-networks, the apparatus comprising:
interfaces for interfacing with pseudowire segments of multi-segment pseudowire connections between nodes in the sub-networks, there being a multi-segment pseudowire connection for each pair of edge nodes comprising an edge node in a first of the sub-networks and an edge node in a second of the sub-networks;
a store for storing forwarding data which specifies a forwarding relationship between pseudowire segments of the multi-segment pseudowire connections;
an interface for receiving information to configure the forwarding data.
Another aspect of the invention provides apparatus for use at a first edge node of a communications network to provide a multipoint-to-multipoint service between a set of edge nodes of the communications network, the network comprising at least two sub-networks and an intermediate node at a boundary between sub-networks the apparatus comprising:
interfaces for interfacing with multi-segment pseudowire connections to edge nodes, there being a multi-segment pseudowire connection for each pair of edge nodes comprising the first edge node in a first of the sub-networks and an edge node in a second of the sub-networks, the multi segment pseudowire connections passing via an intermediate node;
a store for storing mapping data which specifies, for each of the multi-segment pseudowire connections, a mapping relationship between a network address corresponding to a traffic destination and an identifier of a multi-segment pseudowire connection.
The functionality described here can be implemented in software, hardware or a combination of these. The functionality can be implemented by means of hardware comprising several distinct elements and by means of a suitably programmed processing apparatus. The processing apparatus can comprise a computer, a processor, a state machine, a logic array or any other suitable processing apparatus. The processing apparatus can be a general-purpose processor which executes software to cause the general-purpose processor to perform the required tasks, or the processing apparatus can be dedicated to perform the required functions. Another aspect of the invention provides machine-readable instructions (software) which, when executed by a processor, perform any of the described methods. The machine-readable instructions may be stored on an electronic memory device, hard disk, optical disk or other machine-readable storage medium. The machine-readable instructions can be downloaded to a processing apparatus via a network connection.
Embodiments of the invention will be described, by way of example only, with reference to the accompanying drawings in which:
In this example, nodes T-PE1-T-PE6 require VPLS connectivity. A set of Multi-Segment Pseudowires (MS-PW) are configured to form the VPLS. A MS-PW is configured to provide an end-to-end path between each pair of T-PE nodes. A Multi-Segment Pseudowire (MS-PW) comprises N “segments”, (where N≧2). Each segment is a Pseudowire portion between a pair of nodes. Considering the end-to-end path between node T-PE1 and T-PE3, this has the routing: T-PE1-S-PE7-S-PE8-T-PE3. There are three segments in total:
A PW, which forms a segment of a MS-PW connection, is carried over a Label Switched Path (LSP). Accordingly, a set of LSPs are also required to transport the MS-PWs. LSP tunnels are terminated at S-PE nodes and traffic is switched between PWs.
MS-PWs and LSPs are routed via a selected set of intermediate nodes S-PE. Multiple MS-PWs follow the same routing, where applicable, with a single LSP carrying a “bundle” of segments belonging to different MS-PWs. A full mesh of LSP tunnels and PWs connect S-PE nodes in the Core area 14. There are two possible options for the topology of metro areas:
To explain the connections that are configured, node T-PE1 will be considered in detail. For Option A (
For Option B (
MS-PW5: T-PE1-S-PE7-T-PE2
The initial segments of MS-PW1-MS-PW5 follow the same routing along between T-PE1 and S-PE7 and can be carried by a single LSP.
Both options provide full network connectivity among all T-PE nodes of different metro areas belonging to the VPLS service. In
In Option A, the S-PEs within a Metro area will directly manage the traffic exchange between them, whereas in Option B the T-PE will be responsible for the appropriate PW swapping also within each Metro area. The main difference between these two options is the number of LSPs required within each Metro area and the behaviour of T-PE nodes and S-PE nodes, which in Option B would act as “proxy” also for the traffic within the same Metro area. The choice between the two options is dependent on the network operator's requirements and network design, which must also take into account traffic engineering criteria.
Where a MS-PW crosses an area (e.g. from Metro A to the Core at node S-PE7) Pseudowire switching (and possibly label swapping) is performed. For end-to-end connections which span a single domain, a Single-Segment Pseudowire (SS-PW) can be used. Although MS-PW1-MS-PW4 have been described as being transported by a single LSP, they can be distributed across multiple LSPs, if desired. S-PE nodes perform PW switching so that full mesh connectivity is obtained for the whole network.
There are various labelling conventions for PWs. In one labelling convention, a combination of a port identifier and a PW label uniquely identifies a PW segment at the switch 20. This is a per interface PW label assignment. In
In another labelling convention each PW has a unique label at a switch 20. This is a per platform PW label assignment. Accordingly, the PW label, by itself, is sufficient to uniquely identify a PW segment and switching table 22 only stores pairs of PW labels corresponding to PW segments that traffic should be switched between.
As previously described, there are various labelling conventions for PWs. In a per interface PW labelling convention, a combination of a PW label and a port identifier (or LSP identifier) uniquely identifies a PW at the switch 40. In a per platform PW labelling assignment each PW has a unique label at the switch 40. In both cases, forwarding table 42 stores information which associates a destination MAC address with a particular one of the pseudowires (MS-PW or SS-PW) terminated at the switch 40.
Entries in the forwarding table 42 at each T-PE node can be created by a MAC flooding and learning mechanism, or by direct configuration by a NMS. A source T-PE will initially receive a frame from the customer with a certain destination MAC address (DMAC), which is not one of the MAC addresses currently stored in the forwarding table 42. Packets are sent over MS-PWs associated to the VPLS service using a flooding mechanism as it is not currently known which MS-PW should be used to deliver traffic to that DMAC. The destination will reply with some traffic on a particular one of the MS-PWs. At this point the source T-PE has learnt which MS-PW to use to reach the DMAC. An entry is added to the forwarding table 42. All frames with that DMAC are sent along the learnt MS-PW, specified in the forwarding table 42 until an ageing time expires. Expiry of an ageing period forces a new learning cycle and helps to keep the forwarding table up-to-date with the current topology of the network. In the case of manual configuration of MAC addresses to MS-PWs the flooding and learning steps are not required. This mechanism applies to both the MS-PWs for inter-domain connections and SS-PWs used for intra-domain connections.
PWs from the sub-network are terminated 53 before traffic is switched by switch 40. Traffic switching and forwarding is based on information contained in the forwarding table 42. Population of the Forwarding table 42 with the association of MAC address and traffic directions is based on the known Ethernet MAC learning process.
The MAC address stored in forwarding table 42 can represent the final destination of traffic (e.g. a Customer Edge node, or device), a destination T-PE node, or a node which is positioned between the destination T-PE node and final traffic destination. The significance of the MAC address will depend on whether some form of MAC encapsulation (called MAC-in-MAC) is being used in network 10. Node T-PE1 only needs to inspect the “outermost” MAC address, where MAC encapsulation is in use.
MS-PWs are terminated 53 at T-PE nodes. At a T-PE node traffic is received from each MS-PW. The node inspects the MAC header of packets to determine which customer port (in that VPLS) the traffic needs to be forwarded to. The node then forwards packets along the correct customer interface.
The example network shown in
The architecture can also be applied to larger networks, with a larger number of core nodes, and networks with a larger number of sub-networks/areas/domains.
Emulation of LAN services within each Metro 11-13 area is based on VPLS functionality; in case of Option A, each T-PE node performs MAC learning/filtering in order to forward traffic to the right destination. Option B will make instead use of the solution proposed by the current invention for all traffic connections, so that each T-PE node must use MAC learning/filtering to forward traffic onto the right direction PW towards the “proxy” S-PE node.
In the MS-VPLS two different behaviours can be associated to PE nodes. T-PE nodes perform MAC switching functionality, while S-PE nodes perform PW switching so they do not need to manage MAC address tables, thereby reducing computation complexity and increasing scalability. The use of S-PE nodes has the advantage to create a hierarchy in the network so that different domains can be supported.
Protection mechanisms can be supported for each segment of the network, so that, as required in multi-domain networks, a fail which occurs in one domain does not affect the others.
The VPLS can be provisioned via a Management Plane (e.g. using with LCT/EMS/NMS) or via a Control Plane (with possible further extensions of LDP or BGP). Although
Compared to VPLS, the MS-VPLS architecture described in
Compared to H-VPLS, the MS-VPLS architecture described in
Modifications and other embodiments of the disclosed invention will come to mind to one skilled in the art having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is to be understood that the invention is not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of this disclosure. Although specific terms may be employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.
Number | Date | Country | Kind |
---|---|---|---|
09172854.3 | Oct 2009 | EP | regional |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/EP2009/063708 | 10/20/2009 | WO | 00 | 8/3/2012 |