Multi-protocol Label Switching (MPLS) is a technology for transmitting an IP packet via a network by using a label bound in the IP packet. At present, MPLS is widely applied in Virtual Private Networks (VPNs). MPLS VPN adopts a label switching technology, in which one label corresponds to one piece of customer data traffic in order to separate different pieces of customer data traffic. MPLS can optimize the configuration of network resources to a larger degree and can automatically and rapidly eliminate network failures, so as to provide high availability and reliability. MPLS based layer 2 VPN is a network in which a service provider provides services of the second layer for customers, and is called an MPLS L2VPN.
The MPLS L2VPN typically includes Virtual Private Wire Services (VPWS) adopting a point-to-point mode and Virtual Private LAN Services (VPLS) adopting a point-to-multipoint mode. The service provider configures a L2 connection (that is, a Pseudo Wire (PVV)) between two nodes in a specific customer network. A packet from a Customer Edge Router (CE) of a customer node is transmitted transparently to a CE of another node via the PW. The PW is composed of a pair of unidirectional Label Switched Path Virtual Circuits (LSP VCs) that are opposite in direction with respect to each other.
In an Ethernet VPLS environment, the PE device maintains a Virtual Switch Instance (VSI). The VSI is a particular two-layer forwarding list of a VPLS of each customer. The PE device creates a separate VSI according to forwarding information needed for switching Ethernet frames in a specific VPLS VPN. Through the VSI created by the PE device, Media Access Control (MAC) address learning may be implemented.
The VPLS provides accessibility through the MAC address learning. Each PE device maintains one MAC address list. A typical operation of the VPLS is remote MAC address learning.
A PW is composed of a pair of unidirectional LSP VCs that are opposite in direction with respect to each other, and the PW is not up unless the LSP VCs are both up. When a packet is received from an ingress VC LSP, a mapping relation between the source MAC address of the packet and an egress VC LSP is formed. For an Ethernet packet forwarding path indicated by the solid arrows shown in
When the packet is transmitted on a PW, an inner label (that is, a PW label) and an outer tunnel label are added to the packet. The outer tunnel label is used to transmit the packet to an opposite PE device through the label switching of intermediate devices, and the PW label is used by the opposite PE device to find a corresponding VSI after the packet reaches the opposite PE device.
In order to avoid a loop, a two-layer network usually implements a Spanning Tree Protocol (STP). In the VPLS, fully-connected PW and split horizon forwarding are used to avoid the loop. Specifically, PE devices are fully-connected logically (that is, the fully-connected PW), that is, for each VPLS forwarding instance, each PE device creates a PW tree to other PE devices in the VPLS forwarding instance. Each PE device supports the split horizon forwarding to avoid the loop. According to split horizon forwarding, if a packet is received from a PW, the packet is no longer forwarded to other PWs associated with the VSI to which the PW belongs. In other words, any two PE devices communicate with each other through a PW directly connecting the two PE devices, rather than the packet being forwarded through a third PE device.
The PE devices in one specific VPLS are connected by a full mesh. A relationship between the number of PWs and the number of PE devices in one VPLS instance is the number of PWs=the number of PE devices x (the number of PE devices−1)/2. In a large-scale VPLS network, the number of PWs is very large and the overhead of PW signaling is very large, and thus network management and network expansion become complex. In order to simplify network management and improve network expansibility, the network structure of Hierarchical VPLS (H-VPLS) is introduced.
In H-VPLS, the PE device includes a Network facing Provider Edge (N-PE) device and a User facing Provider Edge (U-PE) device. The U-PE device is taken as a Multi-Tenant Unit (MTU) when a customer accesses a VPN, and is used to connect CE devices and a service provider network. The N-PE device is located at the edge of a core domain of the VPLS network and is used to provide transparent transmission services of packets on the core network. Establishment of a full-mesh connection between the U-PE device and all N-PE devices is not required, but a full-mesh connection is to be established between the N-PE devices through PWs. The H-VPLS decreases the number of PWs and the overhead of PW signaling by using a hierarchical technology.
A U-PW (User Facing Pseudo-Wire) is a PW connection between a U-PE device and a N-PE device. A N-PW (Network Pseudo-Wire) is a PW connection between two N-PE devices. In the example, shown in
In the network structure in
When data switching between the CE1 device and the CE2 device is data switching between local CE devices, if the U-PE device has a bridge function, the U-PE device directly forwards a packet between the CE1 device and the CE2 device, without needing to transmit the packet to the N-PE1 device. But, for the first data packet or broadcast packet whose destination MAC address is unknown, the U-PE device will forward the packet to the N-PE1 device through the U-PW when broadcasting the packet of the CE1 device to the CE2 device, and the N-PE1 device copies the packet and forwards the packet to each opposite CE (for instance, the CE3 device).
The implementation in which there is only one PW between the U-PE device and the N-PE device (or between the MTU and the PE device) has obvious disadvantages, that is, once the PW has failed, all VPNs connected with the convergence device will lose connectivity. And thus, a backup PW may be configured for the U-PE device in the H-VPLS. That is, the U-PE device is respectively connected with different N-PE devices through a main PW and a backup PW. In a normal case, data traffic is forwarded through the main PW; once the VPLS system detects that the main PW has failed, the backup PW is activated to forward the data traffic. The network structure of this implementation is as shown in
In the H-VPLS established by interconnecting the VPWS with the VPLS, the U-PE device is directly connected to the N-PE device through the VPWS. The packet is not forwarded according to a MAC address on the U-PE device, but is forwarded according to a point-to-point forwarding mode of the VPWS, that is, is forwarded through a PW that is found according to an ingress interface. Herein, the U-PW is a PW of the VPWS for the U-PE device, instead of a PW of the VPLS. The network structure is as shown in
Similarly, in order to improve the reliability of the network, a main PW and a backup PW may be configured for the VPWS of H-VPLS shown in
To sum up, the H-VPLS has two modes, one is two-layer VPLS, that is, the VPLS is configured on both the U-PE device and the N-PE device, which may be called a dual homed U-PE H-VPLS (as shown in
In the network structure of the dual homed U-PE H-VPLS or the PW redundancy H-VPLS, when the main PW and the backup PW are switched with each other, a MAC address reclaiming processing is to be performed for related N-PE devices, so as to re-learn routing.
As shown in
The LDP protocol provides two implementations for initiating a MAC address reclaiming message and establishing a message notification path.
In one implementation, the U-PE device initiates a MAC address reclaiming procedure, as shown in
The advantages of this implementation include that the U-PE device knows whether a protection mechanism is configured, but the N-PE device does not know whether the protection mechanism is configured; the U-PE device does not need to transmit the MAC address reclaiming message unless the main PW and the backup PW are both configured; otherwise, this implementation may not be used to transmit the MAC address reclaiming message.
The disadvantages of this implementation include that: after receiving the MAC address reclaiming message. N-PE2 device is to transmit the MAC address reclaiming message to other LDP peers that have established an LDP connection; after receiving the MAC address reclaiming message, the LDP peers determine whether the MAC address reclaiming message is transmitted by a PE device at the same layer (there are two layers in the H-VPLS). If yes, the N-PE2 device does not forward the MAC address reclaiming message to other LDP peers; and thus, this implementation is complex; in addition, if the VPWS+VPLS H-VPLS is applied, the U-PE device does not transmit the MAC address reclaiming message, and thus the convergence procedure cannot be accelerated.
Another implementation is that the newly activated N-PE device (N-PE2 device) initiates a MAC address reclaiming procedure, as shown in
The disadvantages of this implementation include that: the N-PE device does not know whether both a main PW and a backup PW are configured, and the N-PE device does not need to transmit the MAC address reclaiming message unless the main PW and the backup PW are both configured; otherwise, this implementation may not be used to transmit the MAC address reclaiming message. Thus, the newly activated N-PE device needs an additional mechanism to know whether the MAC address reclaiming message needs to be transmitted.
It can be seen from the above two implementations that, on the one hand, the U-PW switching is implemented at a control plane based on a LDP message of the control plane, and thus the convergence speed is slower than that obtained through direct processing at a data plane. In addition, it is uncertain for the processing of MAC list TLV that the protocol standard adopts which one of the two implementations. On the other hand, when an N-PW has failed, no mechanism is used to accelerate the convergence procedure on the U-PE device.
In the above implementations, when an N-PW has failed, as shown in
In order to solve at least some of the problems discussed above, an example provides a PW switching method applied to a MPLS L2VPN, so as to accelerate the convergence speed of the MPLS L2VPN. In the method, a PWACH (Pseudo Wire Associated Channel) at the data plane is used to implement a relatively complete PW FRR (Pseudo Wire Fast Rerouting) solution. In addition, a protection switching mechanism at the same plane with a checking mechanism is used to avoid the participation of the control plane and improve switching speed. Moreover, the example defines a clear MAC address clear mechanism to solve a restore problem after the N-PW has failed.
Several examples will be illustrated hereinafter in detail with reference to the accompanying drawings.
The PWACH (Pseudo-Wire Associated Channel) and the data traffic are multiplexed on a PW, and the PWACH is the same as a forwarding path of the data traffic in a Packet Switch Network (PSN). As shown in
In an example, a new type of PWACH is defined, which is called a PW FRR (Pseudo Wire Fast Re-Routing). An unused type identification value may be used to identify the type of the PW FRR, for instance, 0x0101.
In this example, the states of the main U-PW and the backup U-PW connected with the U-PE include the following types, where the states are defined as the states of the two PWs instead of the state of a single PW.
(1) Normal state: the main PW and the backup PW are both available, and the data traffic is transmitted on the main PW;
(2) Unavailable state: the backup PW is unavailable (because of failure);
(3) Protecting Failure state: the main PW has failed and the data traffic is transmitted on the backup PW;
(4) Protecting Administrative state: a network manager switches the data traffic to the backup PW through a command;
(5) Protecting Redirect state: the main PW and the backup PW are both available, and the data traffic is redirected to the backup PW;
(6) Wait-to-restore state: a state in a restore period controlled by a wait-to-restore timer.
The PW FRR PDU provided by the example may contain any one piece of the above state information. Specifically, fields contained in the PW FRR PDU are shown in Table 1.
When the states of the main U-PW and the backup U-PW change, multiple (for instance, three) PW FRR PDUs (that is, the channel type is the PW FRR PDU, and the following is the same as this) are transmitted continuously and periodically on the backup U-PW, for instance, the period is smaller than or equal to 3.3 ms. In different cases, the values of fields of “protection switching state or command” contained in the PW FRR PDU are different, so that the PE device receiving the PW FRR PDU performs a corresponding operation according the value of the field. The U-PE device usually transmits the PW FRR PDU through the backup U-PW, so as to decrease the interference on the data traffic. In a manual switching procedure, the PW FRR PDU may also be transmitted on the main U-PW.
Processing procedures in various states of the main U-PW and the backup U-PW on the U-PE will be illustrated hereinafter with reference to the accompanying drawings.
In a normal case, as shown in
When the main U-PW has failed and protection switching is needed, as shown in
The N-PE1 device connected with the main U-PW may detect that the main U-PW has failed. In this case, the protection switching procedure includes that: the N-PE1 device transmits the PW FRR PDU to all N-PWs in a VSI to which the main U-PW belongs, and the field of “protection switching state or command” contained in the PW FRR PDU is configured as the “MAC address clear command”, the N-PE device (for instance the N-PE2 device and the N-PE3 device shown in
Similarly, the N-PE2 device connected with the backup U-PW may detect that the backup U-PW has failed. In this case, according to the above protection switching procedure, the N-PE2 device transmits the PW FRR PDU to all N-PWs in a VSI to which the backup U-PW belongs, and the field of “protection switching state or command” contained in the PW FRR PDU is configured as the “MAC address clear command”, the N-PE device (for instance the N-PE1 device and the N-PE3 device) receiving the PW FRR PDU clears MAC addresses associated with the N-PW receiving the PW FRR PDU in the VSI.
When the MPLS PSN is in a Protecting failure state, if the main U-PW becomes available again and a fall back mode is configured, the MPLS PSN initiates a wait-to-restore procedure, as shown in
When the wait-to-restore timer expires, a restore procedure is initiated, that is, a procedure of switching from the backup U-PW to the main U-PW, as shown in
For the manual switching, as shown in
As shown in
The above examples describe the switching and restore procedure when the U-PW has failed, and an example also describes a switching and restore procedure when an N-PW has failed.
When a certain N-PW has failed, the switching may be implemented through a rerouting procedure. As shown in
When detecting that a certain N-PW has been restored following a failure, as shown in
It should be noted that, in practical applications, various processing modes provided by the above examples may be used in combination according to different cases, that is, different processing procedures may be used in different cases respectively.
Based on the same technical idea, an example also provides a PE device that can be applied to the above procedures.
Referring to
The failure checking module 231 is to check connectivity of a main U-PW and a backup U-PW and connectivity of N-PWs.
The failure processing module 232 is to, when the failure checking module 231 detects that one of the main U-PW and the backup U-PW has failed, transmit a MAC address clear command through an N-PW in a VSI to which the failed U-PW belongs, so that an N-PE device receiving the MAC address clear command clears MAC addresses associated with the N-PW for transmitting the MAC address clear command in the VSI. When the failure checking module 231 detects that one of the N-PWs has failed, the failure processing module 232 is to transmit a traffic rerouting command through a U-PW in a VSI to which the failed N-PW belongs, so that a U-PE device receiving the traffic rerouting command performs U-PW switching.
The first failure restore module 233 is to, when receiving normal state indication information transmitted by the U-PE device, transmit the MAC address clear command through the N-PW in the VSI to which the U-PW belongs, so that the N-PE device receiving the MAC address clear command clears the MAC addresses associated with the N-PW for transmitting the MAC address clear command in the VSI, wherein the normal state indication information is transmitted when the U-PE device detects that the failed U-PW returns to normal.
The first failure restore module 233 is further to, before the N-PE device receives the normal state indication information transmitted by the U-PE device and a wait-to-restore timer does not expire, receive wait-to-restore state indication information transmitted by the U-PE device, and block the main U-PW when determining that the wait-to-restore state indication information is from the main U-PW.
In the above N-PE device, the failure processing module 232 is further to, when receiving a command of switching from the main U-PW to the backup U-PW, block the main U-PW according to protecting administrative state indication information contained in the command, and transmit the MAC address clear command through the N-PW in the VSI to which the main U-PW belongs, so that the N-PE device receiving the MAC address clear command clears the MAC addresses associated with the N-PW for transmitting the MAC address clear command in the VSI. When receiving a command of switching from the backup U-PW to the main U-PW, the failure processing module 232 is to block the backup U-PW according to normal state indication information contained in the command and transmit the MAC address clear command to all N-PWs in the VSI to which the U-PW belongs, so that the N-PE device receiving the MAC address clear command clears the MAC addresses associated with the N-PW for transmitting the MAC address clear command in the VSI.
The second failure restore module 234 is to, when the failure checking module detects that the failed N-PW returns to normal, transmit a traffic rerouting clear command to all U-PWs in the VSI to which the N-PW belongs, so that the U-PE device receiving the traffic rerouting clear command switches from the backup U-PW to the main U-PW.
In the above N-PE device, the failure processing module 232 is to transmit a PWACH PDU through the N-PW in the VSI to which the U-PW belongs, where the PWACH PDU contains the MAC address clear command.
In the above N-PE device, the failure processing module 232 is to transmit a PWACH PDU through the U-PW in the VSI to which the N-PW belongs, where the PWACH PDU contains the traffic rerouting command.
Referring to
The failure checking module 241 is to check connectivity of a main U-PW and a backup U-PW.
The failure processing module 242 is to, when the failure checking module 241 detects that the main U-PW has failed, transmit protecting state indication information through the backup U-PW, so that an N-PE device receiving the protecting state indication information switches data traffic to the backup U-PW.
The failure restore module 243 is to, when the failure checking module 241 detects that the failed main U-PW returns to normal, transmit normal state indication information through the backup U-PW, so that an N-PE device receiving the normal state indication information blocks the backup U-PW, and transmits a MAC address clear command through an N-PW in a VSI to which the backup U-PW belongs.
In the above U-PE device, the failure restore module 243 is further to, before the U-PE device transmits the normal state indication information through the backup U-PW and a wait-to-restore timer does not expire, transmit wait-to-restore state indication information through the main U-PW and the backup U-PW respectively, so that an N-PE receiving the wait-to-restore state indication information through the main U-PW blocks the main U-PW.
In the above U-PE device, the failure processing module 242 is further to, when receiving a command of switching from the main U-PW to the backup U-PW, transmit protecting administrative state indication information through the main U-PW, so that an N-PE device receiving the protecting administrative state indication information through the main U-PW blocks the main U-PW, and transmits the MAC address clear command through the N-PW in the VSI to which the main U-PW belongs. When receiving a command of switching from the backup U-PW to the main U-PW, the failure processing module 242 is to transmit normal state indication information through the backup U-PW, so that an N-PE device receiving the normal state indication information through the backup U-PW blocks the backup U-PW, and transmits the MAC address clear command through the N-PW in the VSI to which the backup U-PW belongs.
In the above U-PE device, the failure processing module 242 is further to, when receiving a traffic rerouting command transmitted by the N-PE device, switch the data traffic to another available U-PW. Correspondingly, the failure restore module 243 is further to, when receiving a traffic rerouting clear command transmitted by the N-PE device, switch the data traffic to the U-PW returning to normal.
It should be noted that, the functions of the modules in the N-PE device provided by the examples above may be implemented through one N-PE device, and the functions of the modules in the U-PE device provided by the examples may be implemented through one U-PE device.
Those skilled in the art can understand that the modules in the devices provided by the examples above may be configured in the devices according to the description in the examples, and may also be configured in one or more devices different from those of the examples after being modified. The various modules in the above examples may be integrated into one module, and may also be separated into multiple sub-modules.
The methods and modules disclosed herein may be realized by software accompanied by general hardware platforms, or by hardware. For instance the methods and modules may be implemented by logic circuitry such as one or more ASICs or integrated circuits or as machine readable instructions stored in a memory and executable by a processor. According to an example, the methods disclosed herein may be in the form of a software product, and the computer software product may be stored in a computer readable storage medium and includes machine-readable instructions to make a computer device (such as a handset, a personal computer, a server or a network device such as a switch or router) perform the methods disclosed herein.
It should be noted that those skilled in the art may make improvements and modifications to the methods and devices disclosed herein within the principles of those methods and devices, and the improvements and modifications are to be covered in the protection scope defined herein.
Number | Date | Country | Kind |
---|---|---|---|
201110000953.4 | Jan 2011 | CN | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/CN2011/084911 | 12/29/2011 | WO | 00 | 6/7/2013 |