The present application claims priority under 35 U.S.C 119 (a)-(d) to Chinese Patent application number 201110458173.4, filed on Dec. 31, 2011, which is incorporated by reference in its entirety.
Computer service users and computer resources are increasingly contained in geographically dispersed networks for delivery as a service to users over public networks such as the Internet. As such resources, for example, applications, storage and other IT (information technology) infrastructure are distributed in geographically dispersed locations, interconnection between such resources is important to make them work like a unified enterprise such that the resources can be delivered over public networks to end users easily, quickly, securely and reliably.
A Virtual Private Network (VPN) is an example of network technologies that create a secure network connection over a public network such as the Internet. The VPN uses different types of VPN protocols to secure the transport of data traffic over a public network infrastructure. IP (Internet Protocol) in IP/GRE (Generic Route Encapsulation) and MPLS (Multiple Label Switching) are examples of such VPN protocols.
Cloud computing is another example of such network technologies. In a cloud computing environment, users usually entrust remote services with their data, software and computation.
The disclosure will be described by way of non-limiting examples with reference to the accompanying Figures, in which:—
The second network depicted in
As data traffic between the first network and the second network is transported over a public network, the data traffic will usually be encapsulated or encrypted using a tunneling protocol. While there are many tunneling protocols, GRE (Generic Routing Encapsulation) is used as a convenient example herein because this is a protocol widely used to transport data packets over IP. MPLS (Multiprotocol Label Switching) and IPSec are other tunneling protocols which are suitable for transport of data traffic over IP.
When a network device, say CE1, of the first network sends a traffic comprising data packets designated to another network device CE2 on the same network, the network device CE2 will send the traffic to the router PE1 for forwarding. The router PE1 upon receipt of the data packet will look up the routing and forwarding table and then forward the traffic to CE2 according to the unique device identifier carried in the data packet.
When the network device CE1 sends traffic to the Internet, the router PE1 upon receipt of the traffic will route the traffic of IP packets to its Internet port and then forward the traffic to the Internet and establish data communication with a destination network or device.
When the network device CE1 sends a traffic comprising data packets designated to another network device CE4 (the ‘destination network device’) on the other network, which is part of the VPN, the router PE1 would not be able to find the unique device identifier of CE4 on the routing and forwarding table. On the other hand, the Router PE1 (or more exactly the processor of the Router PE1) would be able to identify from the destination address of the destination network device, for example the IP header of the destination IP address, that the destination network device is on the same VPN. As a result, the Router PE1 will forward the traffic to the tunneling interface for forwarding to other sub-networks of the VPN after GRE encapsulation of the data packets as depicted in
Before the Router PE1 will forward the tunnel heading traffic to the tunneling interface, the Router PE1 will communicate with another edge device, which is a designated edge device identified as Extranet PE in
Upon receipt of a device access inquiry from an edge device such as PE1 or PE2 to request for device access information as depicted in
The Extranet PE will need to collect and store the device access information of all the network devices in order to have them available for use by other edge or gateway devices of the VPN. Initially, the Extranet PE will identity all branch networks (also known as subnets') of the VPN by going through a neighbor discovery process as depicted in
As all the device access information of all the network devices of the entire VPN is now kept on a designated edge device, which is the Extranet PE in the present example, there is no need to use a flooding protocol to discover the VPN subnets or the edge devices of the subnets.
In one example, two dedicated tunnels, namely, an ordinary IP GRE tunnel and an extended IP GRE tunnel, are maintained on the Extranet PE. The ordinary IP GRE tunnel is allocated for data traffic of unicast or multicast packets having known device identifier of the destination device, and this type of traffic will be forwarded to the known destination. The extended IP GRE tunnel is allocated for data traffic of unicast or multicast packets having unknown device identifier, and this type of traffic will be returned to the source edge device with the encapsulated device access information requested.
With such a dedicated edge device to hold the device access information of all network devices on the VPN, the use of flooding protocols for discovery can be alleviated. At the same time, the problem of conflicting device identifier information such as conflicting MAC addresses and Hash conflicts occurred during use of flooding protocols for neighbor discovery can also be alleviated.
While two VPN subnets are depicted in the example of
As an example, the designated apparatus Extranet PE can be a dedicated network access apparatus provided for VPN management or as a VPN PE (provider edge) device configured to operate as an ordinary PE as well as the designated apparatus.
There is disclosed a network access apparatus comprising a tunneling interface to collect device access information of network devices of a first computer network having a first network gateway device and device access information of network devices of a second computer network having a second network gateway device, wherein the apparatus is to send device access information of network devices of said first computer network to said second computer network upon receipt of an inquiry for request of device access information from said second computer network, and vice versa. The Extranet PE is an example of such a network access apparatus. The provision of a designated network access apparatus mitigates the need of using a flooding protocol, which is non-bandwidth friendly to manage a VPN.
There is also disclosed a network gateway device for facilitating network devices of a first computer network to communicate with each other and to communicate with devices of a second and other computer networks, wherein the apparatus is to look for locally stored network device access information upon receipt of data which are destined to a destination network device in order to forward the received data to the destination network device; and wherein the apparatus comprises a tunneling interface which is to send an inquiry to a designated network access apparatus which is outside of the first computer network when the device access information of the destination network device is not found locally in the first computer network. The edge devices such as PE1 and PE2 are examples of such a network gateway device.
In addition, there is disclosed computer network system comprising a first computer network having a first network gateway device, a second computer network having a second network gateway device, and a network access apparatus. The first computer network, the second computer network and the network access apparatus are to communicate via a public network such as the internet using a tunneling protocol. The network access apparatus comprises a tunneling interface to collect device access information of network devices of said first computer network and device access information of said second computer network, and wherein the network apparatus is to send device access information of network devices of said first computer network to said second computer network upon receipt of device access information inquiry from said second computer network, and vice versa. Such an example of network system demonstrations an example application of the network access apparatus of the present disclosure in cloud computing environment utilizing layer 2 VPN interconnect of the advantageous EVI technology.
The above examples can be implemented by hardware, software or firmware or a combination thereof. For example the various methods, processes and functional units described herein may be implemented by a processor (the term processor is to be interpreted broadly to include a CPU, processing unit, ASIC, logic unit, or programmable gate array etc.). The processes, methods and functional units may all be performed by a single processor or split between several processers; reference in this disclosure or the claims to a ‘processor’ should thus be interpreted to mean ‘one or more processors’. The processes, methods and functional modules can be implemented as machine readable instructions executable by one or more processors, hardware logic circuitry of the one or more processors or a combination thereof. Further the teachings herein may be implemented in the form of a software product. The computer software product is stored in a storage medium and comprises a plurality of instructions for making a computer device (which can be a personal computer, a server or a network device such as a router, switch, access point etc.) implement the method recited in the examples of the present disclosure.
Number | Date | Country | Kind |
---|---|---|---|
201110458173.4 | Dec 2011 | CN | national |