[go: up one dir, main page]

WO2012103758A1 - 网络中的二层业务处理方法和系统以及设备 - Google Patents

网络中的二层业务处理方法和系统以及设备 Download PDF

Info

Publication number
WO2012103758A1
WO2012103758A1 PCT/CN2011/081377 CN2011081377W WO2012103758A1 WO 2012103758 A1 WO2012103758 A1 WO 2012103758A1 CN 2011081377 W CN2011081377 W CN 2011081377W WO 2012103758 A1 WO2012103758 A1 WO 2012103758A1
Authority
WO
WIPO (PCT)
Prior art keywords
port
link
switching device
packet
user edge
Prior art date
Application number
PCT/CN2011/081377
Other languages
English (en)
French (fr)
Inventor
普云
罗勇
陈颖
孟凡敏
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2012103758A1 publication Critical patent/WO2012103758A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2854Wide area networks, e.g. public data networks
    • H04L12/2856Access arrangements, e.g. Internet access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • H04L41/0663Performing the actions predefined by failover planning, e.g. switching to standby network elements

Definitions

  • the present invention claims to be submitted to the Chinese Patent Office on January 31, 2011, the application number is 201110033988.8, and the invention name is "Layer 2 business processing methods and systems and devices in the network". Priority of Chinese Patent Application, the entire contents of which is incorporated herein by reference.
  • the present invention relates to communications technologies, and in particular, to a Layer 2 service processing method and system and device in a network.
  • a dual-homing protection technology of a network device node is to connect one network node to two different network devices in another network area through two links of the active and standby nodes, so as to protect the mutual backup of the primary and backup links. Improve the reliability of the network.
  • Multi-chassis Link Aggregation Group (MC-LAG) is a relatively common dual-homing protection technology for Ethernet links. Specifically, the LAG refers to bundling multiple links connected to the same device to increase bandwidth and improve link reliability. The aggregated link can be regarded as a logical link.
  • the MC-LAG is an extension of the LAG in the device. The data links on multiple devices can be aggregated together to form a link aggregation group, thereby increasing the available bandwidth.
  • the Layer 2 network includes: a switch 11 and a Digital Subscriber Line Access Multiplexer (DSLAM). Terminal 13 and router 14.
  • the port connected to the DSLAM 12 is the A port, and the link between the switch and the DSLAM 12 is the main link; the port connected to the DSLAM 12 is the B port, and the link between the switch and the DSLAM 12 is Alternate link.
  • DSLAM 12 Digital Subscriber Line Access Multiplexer
  • the switch 11 sends the multicast service or the unicast service received from the router 14 to the DSLAM 12 through the A port and the primary link, and then the multicast service or the unicast service is sent by the DSLAM 12. Connected terminal 13.
  • the switch 11 can send the multicast service or unicast service received from the router 14 to the DSLAM 12 through the B port and the backup link, and then the multicast service or the unicast service is performed by the DSLAM 12. It is sent to the terminal 13 connected to it.
  • the egress port in the Media Access Control (MAC) forwarding table of the user on the switch is still the A port, resulting in downlink unicast or multicast services.
  • the faulty link cannot be bypassed, which in turn causes end-to-end services to fail to recover quickly.
  • MAC Media Access Control
  • Embodiments of the present invention provide a Layer 2 service processing method, system, and device in a network, which are used to solve the problem in the prior art, when a network device is protected by a link dual-homing, and a link is protected and switched. The problem of long-term recovery of the second-tier service is too long.
  • the embodiment of the present invention provides a Layer 2 service processing method in a network, where the network includes a user edge device and a switching device, where the first port of the user edge device is connected to the third port of the switching device.
  • the second port of the user edge device is connected to the fourth port of the switching device, and the method includes: setting a link connected to the first port as a primary link, and blocking the second port; Activating, opening the second port, and transmitting, by the second port, the monitoring information carrying the user edge device to the switching device, when detecting that the fault occurs in the link of the first port connection. a packet, so that the switching device establishes a correspondence between the interception information and the fourth port according to the packet.
  • An embodiment of the present invention provides a user edge device, including: a first port, configured to be connected to a third port on the switching device;
  • a second port configured to be connected to a fourth port on the switching device
  • a setting module configured to set a link connected to the first port as a primary link, and block the second port
  • a fault processing module configured to activate/open the second port when detecting that the link of the first port connection fails
  • a network interface module configured to send, by using the fourth port, a packet carrying the interception information of the user edge device to the switching device, so that the switching device establishes the interception information according to the packet and the Correspondence of the fourth port.
  • the embodiment of the invention provides a network side device, including:
  • a third port configured to be connected to the first port of the user edge device
  • a fourth port configured to be connected to the second port of the user edge device
  • a packet receiving module configured to receive, by the fourth port, a packet from the user edge device when the link connected to the first port is faulty, where the packet carries the user edge device Monitoring information;
  • a message processing module configured to establish, according to the message, the corresponding relationship between the interception information and the fourth port.
  • An embodiment of the present invention provides a Layer 2 service processing system, where the system includes a user edge device and a switching device, where the user edge device is provided with a first port and a second port, the first port and the The third port on the switching device is connected, and the second port is connected to the fourth port on the switching device.
  • the user edge device is configured to set a link connected to the first port as a primary link, and block The second port activates/opens the second port when detecting that the link connected to the first port is faulty, and sends the user edge device to the switching device by using the second port And the switching device, configured to establish, according to the packet, the correspondence between the interception information and the fourth port.
  • a Layer 2 service processing method, system, and device in the network of the embodiment of the present invention the user edge device and the switching device are configured in the network, where the first port of the user edge device is connected to the third port of the switching device, and the user edge
  • the second port of the device is connected to the fourth port of the switching device, and the link connected to the first port is the main link, and the second port is blocked.
  • the device is activated.
  • the second port is opened, and the packet carrying the interception information of the user edge device is sent to the switching device through the second port, so that the switching device establishes the correspondence between the monitoring information and the fourth port according to the packet, thereby solving the present problem.
  • the network device is protected by the link dual-homing and the link is protected, the Layer 2 service recovery time in the network is too long, and the Layer 2 service is quickly restored.
  • FIG. 1 is a schematic structural diagram of a Layer 2 network based on MC-LAG in the prior art
  • FIG. 2 is a flowchart of an embodiment of a Layer 2 service processing method in a network according to the present invention
  • FIG. 4 is a schematic diagram of a network structure of a Layer 2 network under the dual-homing protection technology of the Ethernet link based on the Layer 2 service processing in the network; 5 is a flowchart of another embodiment of a method for processing a layer 2 service in a network according to the present invention; FIG. 6 is a flowchart of still another embodiment of a method for processing an end-to-end service according to the present invention;
  • FIG. 7 is a schematic diagram of a two-layer network structure of a dual-homing protection technology of a wireless optical network (Passive Optical Network) for implementing Layer 2 service processing in a network;
  • Passive Optical Network Wireless Optical Network
  • FIG. 8 is a schematic structural diagram of an embodiment of a CE device according to the present invention.
  • FIG. 9 is a schematic structural diagram of an embodiment of a network side device according to the present invention.
  • FIG. 10 is a schematic structural diagram of an embodiment of a Layer 2 service processing system according to the present invention.
  • FIG. 2 is a flowchart of an embodiment of a Layer 2 service processing method in a network according to the present invention.
  • FIG. 3 is a schematic structural diagram of a network architecture based on Layer 2 service processing according to the present invention. As shown in FIG. 2 and FIG. 3, the network is as shown in FIG. 2 and FIG. 3.
  • the first port of the CE device 21 is connected to the third port of the first switching device 22, and the first port and the first port of the CE device 21 are connected to the first port.
  • a third port of the switching device 22 is connected.
  • the method in this embodiment includes:
  • Step 101 Set the link connected to the first port as the primary link, and block the second port.
  • the CE device 21 can set the link connected to the first port as the primary link, that is, set the link between the first port and the third port as the primary link, and receive the first switching device. Forward unicast, multicast, and broadcast messages.
  • the CE device 21 can also set the link to which the second port is connected. With the link, the link between the second port and the fourth port is set as the backup link, and the second port is blocked, so that the CE device 21 receives the unicast, multicast, and broadcast messages through the first port.
  • the link between the second port and the fourth port may be set by the CE device, which is not limited to which link is the primary link and which is the backup link.
  • the primary link is the primary link
  • the link between the first port and the third port is set as the backup link, and the first port is blocked, so that the CE device receives the unicast, multicast, and broadcast packets through the second port. .
  • Step 102 When detecting that the link connected to the first port is faulty, activate/open the second port, and send, by using the second port, the packet carrying the interception information of the CE device 21 to the fourth port, so that the first The switching device 22 establishes a correspondence between the monitoring information and the fourth port according to the message.
  • the monitoring information of the CE device 21 may include the MAC address information of the CE device 21, or the MAC address information of the CE device 21 and the user equipment connected to the CE device 21.
  • Address information the packet can be specifically an Address Resolution Protocol (ARP) packet.
  • ARP Address Resolution Protocol
  • the CE device 21 can send an ARP packet to the fourth port of the first switching device by using the second port, where the first switching device 22 can
  • the ARP packet received by the fourth port is configured to set the egress port in the unicast forwarding table to the fourth port, that is, the correspondence between the interception information and the fourth port is established, so that the first switching device 22 can pass the fourth port.
  • the unicast forwarding table further includes the MAC address information of the CE device 21, or the MAC address information of the CE device 21 and the address information of the user equipment.
  • the interception information of the CE device 21 can be a multicast program identifier, and the text can be specifically an Internet Group Management Protocol (Internet Group Management Protocol; It is called: IGMP) Request (Request) message;
  • IGMP Internet Group Management Protocol
  • the CE device 21 can reach the first switching device through the second port.
  • the fourth port sends an IGMP Request message, and the first switching device 22 can set the egress port in the multicast forwarding table to the fourth port according to the IGMP Request message received from the fourth port, so that the first switching device 22 can The multicast service is sent to the second port through the fourth port.
  • the CE device 21 when the CE device 21 processes the Layer 3 service, the CE device 21 needs to report its own MAC address, so that the first switching device 22 saves the MAC address in the forwarding table, and sets the outgoing port as the fourth port.
  • the port when the first switching device 22 receives the downlink packet from the network side, the downlink packet carries the MAC address of the CE device 21 and the IP address of the user equipment, and the downlink packet is sent according to the egress port in the forwarding table. The message is sent to the CE device 21 through the fourth port.
  • the CE device 21 stores the correspondence between the MAC address and the IP address of the user equipment. After receiving the downlink packet, the MAC address of the packet is removed, and the user is removed. The IP address of the device is changed to the MAC address of the user device and then sent to the user device through the corresponding port.
  • the CE device 21 When the CE device 21 processes the Layer 2 service, the CE device 21 needs to report its own MAC address and the MAC address of the connected user equipment, and the first switching device 22 stores the two MAC addresses in the forwarding table, respectively.
  • the egress port is configured as a fourth port.
  • the downlink packet When receiving the downlink packet carrying the MAC address of the user equipment, the downlink packet is sent to the CE device 21 through the fourth port according to the forwarding table, and the CE device 21 is configured according to the MAC address of the user equipment. Forward the downlink packet to the user equipment.
  • the user edge device and the switching device are configured in the network, where the first port of the user edge device is connected to the third port of the switching device, and the second port of the user edge device is connected to the fourth port of the switching device. Connected, and set the link connected to the first port as the primary link, and block the second port; when detecting that the link connected to the first port fails, activate/open the second port, and connect The second port sends a packet carrying the interception information of the user edge device to the switching device, so that the switching device establishes the corresponding relationship between the monitoring information and the fourth port according to the packet, thereby solving the prior art in the network device.
  • the Layer 2 service in the network recovers too long. The Layer 2 service is quickly restored.
  • FIG 4 is a schematic diagram of a network structure of a Layer 2 network under the dual-homing protection technology of the Ethernet link based on the Layer 2 service processing in the network.
  • the Layer 2 network includes: a switch 31 and a switch 32. Switch 33, switch 34, router 35 and user equipment 36.
  • the first port of the switch 31 is connected to the third port of the switch 34 through the switch 32, and the second port of the switch 31 is connected to the fourth port of the switch 34 through the switch 33.
  • FIG. 5 is a flowchart of another embodiment of a method for processing a Layer 2 service in a network according to the present invention.
  • the present embodiment is based on the network architecture shown in FIG. 4, and the Layer 2 service is a unicast service, and the CE device is a switch. 31.
  • the first switching device is the switch 34, the second switching device is the switch 32, and the third switching device is the switch 33.
  • the technical solution of this embodiment is described in detail.
  • the method in this embodiment includes:
  • Step 201 Set the link between the first port and the switch 32 as the primary link, set the link between the second port and the switch 33 as the standby link, and block the second port.
  • Step 202 Perform Address Resolution Protocol snooping (ARP snooping), and listen to the protocol (Internet Protocol; IP address) and the MAC address corresponding to the IP address of the network between the user equipments. .
  • ARP snooping Address Resolution Protocol snooping
  • the switch 31 sets the link between the first port and the switch 32 as the main link
  • the ARP packet is broadcast to the network side, and the ARP packet includes the IP address of the user equipment and the
  • the switch 34 After receiving the ARP packet through the third port, the switch 34 sets the egress port in the unicast forwarding table to the third port, where the unicast forwarding table is configured.
  • the item includes the address information of the switch 31 and the address information of the user equipment, so that the switch 34 transmits the unicast service received from the router 35 to the switch 32 through the third port according to the egress port, and the switch 32 passes the main link.
  • the unicast service is forwarded to the switch 31.
  • Step 203 When detecting that the link connected to the first port is faulty, the second port is opened/activated, and the ARP packet carrying the MAC address of the switch 31 and the MAC address of the user equipment is sent to the fourth port through the second port.
  • the switch 34 establishes the correspondence between the MAC address of the switch 31 and the MAC address of the user equipment and the fourth port according to the ARP packet.
  • the unicast forwarding entry includes the MAC address of the switch 31 and the MAC address of the user equipment.
  • the failure between the first port and the third port may include: a failure of the primary link, a failure of the link between the switch 32 and the switch 34, or a link in the network between the switch 32 and the switch 34. Or the node has failed.
  • the network may be a Layer 2 Ethernet, a Layer 3 Ethernet, or a Multi-Protocol Label Switching (MPLS) network.
  • MPLS Multi-Protocol Label Switching
  • the switch 31 detects whether the link connected to the first port is faulty.
  • the implementation manner may be as follows:
  • the first type the switch 34 sends a second detection message to the switch 32 every predetermined time.
  • the switch 32 sends a first detection message to the switch 31 every predetermined time.
  • the first detection message and the second detection message may be managed by the Ether operation. (Operation Administration Maintenance; referred to as: 0 AM) Message or other detection message.
  • a notification message is sent to the switch 31, informing the switch 31 that the link or node in the network between the switch 34 and the switch 32 is faulty, or that the fault occurs between the link between the switch 34 and the switch 32.
  • the switch 31 does not receive the first detection message sent by the switch 32 within a predetermined time, it is determined that the primary link is faulty.
  • the switch 34 sends a second detection message to the switch 31 through the switch 32 every predetermined time.
  • the switch 31 does not receive the second detection message forwarded by the switch 34 through the switch 32 within the predetermined time, it determines that the failure is the primary link failure; or, the failure occurs on the link between the switch 32 and the switch 34; or the failure A link or node that appears in the network between switch 32 and switch 34.
  • the switch 31 when the switch 31 detects that the link connected to the first port is faulty, the switch 31 can open/activate the second port, and will carry the MAC address of the switch 31 and the ARP packet of the MAC of the user equipment. Broadcasting to the network side, because the link connected to the first port is faulty, the second port is opened. Therefore, the ARP packet can be sent to the switch 33 through the second port, and the switch 33 sends the ARP packet to the switch 34.
  • the switch 34 learns the MAC address of the switch 31 and the MAC address of the user equipment on the fourth port, so that the egress port in the unicast forwarding table is the fourth port, where
  • the unicast forwarding table further includes the address information of the switch 31 and the MAC address of the user equipment, that is, the MAC address of the switch 31 and the correspondence between the MAC address of the user equipment and the fourth port are established, so that the switch 34 will
  • the unicast service received by the router 35 is sent to the switch 33 through the fourth port, and then the unicast service is forwarded by the switch 33 to the switch 31.
  • the switch 31 forwards unicast traffic to the user Device 36.
  • the link between the first port and the switch 32 is set as the primary link
  • the link between the second port and the switch 33 is set as the standby link
  • the second port is blocked.
  • the blocked second port is opened/activated, and the MAC address of the switch 31 and the MAC address of the user equipment are carried in the ARP, and the MAC address of the user equipment to be monitored is monitored.
  • the ARP packet is sent to the fourth port through the second port, so that the switch 34 receives the ARP packet through the fourth port, and establishes the MAC address of the switch 31 and the MAC address of the user equipment according to the ARP packet.
  • Corresponding relationship with the fourth port which solves the problem that the unicast service recovery time is too long when the network device passes the link dual-homing protection and the link protection switchover is implemented in the prior art, and the unicast service is realized. Quick recovery.
  • FIG. 6 is a flowchart of still another embodiment of a method for processing an end-to-end service according to the present invention.
  • the embodiment is based on the network architecture shown in FIG. 4, and the end-to-end service is a multicast service, and the CE device is a switch. 31.
  • the first switching device is the switch 34
  • the second switching device is the switch 32
  • the third switching device is the switch 33.
  • the technical solution of this embodiment is described in detail.
  • the method in this embodiment includes:
  • Step 301 Set the link between the first port and the switch 32 as the primary link, set the link between the second port and the switch 33 as the standby link, and block the second port.
  • Step 302 Perform Internet Group Management Protocol snooping (IGMP snooping) or an IGMP proxy server (proxy) to listen to a user request in the user equipment, where the user request includes a multicast program identifier.
  • IGMP snooping Internet Group Management Protocol snooping
  • proxy server proxy
  • the switch 34 when the link between the first port and the switch 32 is set as the primary link, the IGMP request (Request) message carrying the multicast program identifier is passed through the first port because the second port is blocked.
  • the primary link of the port is sent to the switch 32, and the switch 32 sends the TGMP Request message to the switch 34.
  • the switch 34 After receiving the IGMP Request message through the first port, the switch 34 sets the egress port in the multicast forwarding table.
  • the first port is such that the switch 34 sends the multicast service received from the router 35 to the switch 32 through the first port according to the egress port, and the switch 32 forwards the multicast service to the switch 31 through the primary link.
  • Step 303 When detecting that the link connected to the first port is faulty, activate/open the second port, and send an IGMP Request message carrying the multicast program identifier to the fourth port through the second port, so that the switch 34 is configured according to the switch
  • the IGMP Request message received by the fourth port establishes the correspondence between the multicast program identifier and the fourth port.
  • the manner in which the switch 31 detects that the link connected to the first port is faulty is the same as that in the embodiment shown in FIG. 5, and details are not described herein again.
  • the switch 31 when the switch 31 detects that the link connected to the first port is faulty, the switch 31 may open the previously blocked second port, and carry the multicast program identifier in the IGMP Request message.
  • the standby link connected to the second port is sent to the switch 32, and the switch 32 sends the IGMP Request message to the switch 34.
  • the fourth port of the switch 34 After receiving the IGMP Request message, the fourth port of the switch 34 quickly sets the multicast forwarding table.
  • the outbound port is the fourth port, that is, the correspondence between the multicast program identifier and the fourth port is established, so that the switch 34 forwards the multicast service received by the router 35 to the switch 33 through the fourth port according to the corresponding relationship.
  • the multicast service is forwarded by the switch 33 to the switch 31, and finally the switch 31 forwards the multicast service to the user equipment 36.
  • the link between the first port and the switch 32 is set as the primary link
  • the link between the second port and the switch 33 is set as the standby link
  • the second port is blocked.
  • the received multicast program identifier is carried in the IGMP Request message, and is sent to the switch 33 through the standby link connected to the second port, and then sent to the switch 34 by the switch 33.
  • the switch 34 receives the IGMP Request message through the fourth port.
  • the egress port in the multicast forwarding table is set to be the fourth port, that is, the correspondence between the multicast program identifier and the fourth port is established, thereby solving the problem in the prior art that the network device is dual-homed through the link, and When the link is protected and switched, the multicast service recovery time is too long, and the multicast service is quickly recovered.
  • FIG. 7 is a schematic diagram of a Layer 2 network structure of a dual-homing protection technology for a PON based on a Layer 2 service processing in a network.
  • the Layer 2 network includes: an Optical Network Unit (ONU) 41.
  • ONU Optical Line Terminal
  • OLT Optical Line Terminal
  • switch 44 Optical Line Terminal
  • router 45 and user equipment 46.
  • the first port of the ONU 41 is connected to the third port of the switch 44 through the OLT 42
  • the second port of the ONU 41 is connected to the fourth port of the switch 44 through the OLT 43
  • the ONU 41 respectively passes through the 1:N optical splitter. It is connected to the OLT 42 and the OLT 43.
  • the CE device is the ONU 41, the first switching device switch 44, the second switching device is the OLT 42, and the third switching device is the OLT 43.
  • the implementation of the Layer 2 service in the network may also be based on the dual-layer network of the dual-homing protection technology of the PON shown in FIG. 7. The implementation principle is similar to the implementation of the method embodiment shown in FIG. 5 or FIG. No longer.
  • FIG. 8 is a schematic structural diagram of an embodiment of a CE device according to the present invention. As shown in FIG. 7, the CE device in this embodiment includes: a first port 51, a second port 52, a setting module 53, a fault processing module 54, and a network interface. Module 55.
  • the first port 51 is connected to the third port on the first switching device, the second port 52 is connected to the fourth port on the first switching device, and the setting module 53 is configured to set the link connected to the first port 51 to be a primary link, and blocking the second port 52; the fault processing module 54 is configured to open/activate the second port 52 when detecting that the fault occurs when the link connected to the first port 51 fails;
  • the network interface module 55 is configured to send, by using the second port 52, a message carrying the interception information of the CE device to the first switching device.
  • the CE device of this embodiment can perform the technical solution of the method embodiment shown in FIG. 2, and the principle is similar, and details are not described herein again.
  • the user edge device and the switching device are configured in the network, where the first port of the user edge device is connected to the third port of the switching device, and the second port of the user edge device is connected to the fourth port of the switching device. Connected, and set the link connected to the first port as the primary link, and block the second port; when detecting that the link connected to the first port is faulty, activate/open the second port, and through the second port.
  • the switching device sends the packet carrying the interception information of the user edge device, so that the switching device establishes the corresponding relationship between the monitoring information and the fourth port according to the packet, thereby solving the prior art, When the protection of the link occurs, the Layer 2 service recovery time in the network is too long, and the Layer 2 service is quickly restored.
  • the first port 51 of the CE device in this embodiment may be connected to the third port of the first switching device by using the second switching device, and the second port of the CE device.
  • the port 52 is further connected to the fourth port of the first switching device by using the third switching device, and the setting module 53 in the CE device is specifically configured to set a link between the first port 51 and the second switching device as a main link.
  • the link between the second port and the third switching device is set as the standby link, and the second port 52 is blocked.
  • the network interface module 55 of the embodiment is specifically configured to send an ARP resolution protocol packet carrying the address information of the CE device to the fourth port through the second port 52.
  • the network interface module 55 is specifically configured to send the CE device to the fourth port through the second port 52.
  • ARP packet of the address information and the address information of the user equipment connected to the CE device may be specifically a MAC address.
  • the network interface module of this embodiment is specifically configured to send an IGMP Request message carrying a multicast program identifier to the fourth port through the second port 52.
  • FIG. 9 is a schematic structural diagram of an embodiment of a network side device according to the present invention.
  • the device in this embodiment includes: a third port 61, a fourth port 62, a packet receiving module 63, and a message processing module 64.
  • the third port 61 is configured to be connected to the first port of the CE device;
  • the fourth port 62 is configured to be connected to the second port of the CE device;
  • the message receiving module 63 is configured to: when the link connected to the first port is faulty And receiving, by the fourth port 62, the packet from the CE device, where the packet carries the monitoring information of the user equipment;
  • the packet processing module 64 is configured to establish the correspondence between the monitoring information and the fourth port 62 according to the packet.
  • the packet receiving module 63 receives the ARP packet carrying the address information of the CE device from the CE device through the fourth port 62 when the link connected to the first port of the CE device is faulty, the packet processing is performed.
  • the module 64 sets the egress port in the unicast forwarding table to be the fourth port 62 according to the ARP packet carrying the address information of the CE device, that is, the correspondence between the address information of the CE device and the fourth port 62 is established.
  • the information can be specifically a MAC address. Or,
  • the fourth port 62 receives the ARP carrying the address information of the CE device and the address information of the user equipment connected to the CE device.
  • the packet processing module 64 sets the egress port in the unicast forwarding table to be the fourth port 62 according to the ARP packet, that is, the address information of the CE device and the address information of the user equipment connected to the CE device and the fourth device are set. Correspondence of port 62.
  • the address information may be specifically MAC address; or,
  • the packet processing module 64 receives the IGMP Request message from the CE device.
  • the IGMP Request message received by the fourth port 62 is used to set the egress port in the multicast forwarding table to be the fourth port 62, that is, the correspondence between the multicast program identifier and the fourth port 62 is established.
  • the fourth port receives the packet that is sent by the CE device and carries the interception information of the CE device, and establishes a correspondence between the interception information and the fourth port, thereby solving the problem in the prior art that the network device passes.
  • the Layer 2 service in the network recovers too long. The Layer 2 service is quickly restored.
  • the network side device may further include a network interface module, configured to receive a packet from the network side, and the packet processing module 64 is further configured to use the corresponding relationship.
  • the packet from the network side is forwarded to the CE device.
  • the system in this embodiment includes: a first switching device 71 and a CE device 72, wherein the CE device 72 is provided with a A port and a second port are connected to the third port on the first switching device 71, and the second port is connected to the fourth port on the first switching device 71.
  • the CE device 72 is configured to set the link connected to the first port as the primary link, block the second port, and activate/open the second port when detecting that the link connected to the first port is faulty.
  • the second port sends a packet carrying the interception information of the CE device 72 to the first switching device 71.
  • the first switching device 71 is configured to establish a correspondence between the interception information and the fourth port according to the packet.
  • the interception information may include a multicast program identifier
  • the first switching device 71 is further configured to receive a packet carrying the multicast program identifier from the network side, according to the multicast program identifier and the fourth port.
  • the corresponding relationship is that the packet from the network side is multicast to the CE device 72 through the fourth port.
  • the intercepting information may further include the address information of the CE device 72, or the address information of the CE device 72 and the address information of the user equipment connected to the CE device 72, and the first switching device 71 is further configured to receive the network side.
  • the packet carrying the address information is unicast to the CE device 72 through the fourth port according to the correspondence between the address information and the fourth port.
  • the system solves the problem that the recovery time of the Layer 2 service is too long when the network device is protected by the dual-homing protection of the link and the link is protected, and the Layer 2 service is fast. restore.
  • the system may further include a second switching device and a third switching device, where the first port of the CE device 72 passes The second switching device is connected to the third port of the first switching device 71, and the second port of the CE device 72 is connected to the fourth port of the first switching device 71 through the third switching device.
  • the CE device 72 can be a switch; the first switching device 71, the second switching device, and the third switching device can be a switch, a Provider Edge (PE) device, or an MPLS device. More specifically, the primary link and the alternate link can be LAGs.
  • PE Provider Edge
  • the system may further include a second switching device and a third switching device, wherein the first port of the CE device 72
  • the second port of the first switching device 71 is connected to the third port of the first switching device 71.
  • the second port of the CE device 72 is connected to the fourth port of the first switching device 71 through the third switching device.
  • the CE device 72 can be an ONU; the second switching device and the third switching device can be an OLT, and the first switching device 71 can be a switch, a PE device, or an MPLS device.
  • CE equipment 72 is connected to the second switching device by the first optical splitter, and the CE device 72 and the third switching device are connected by the second optical splitter, wherein the first optical splitter and the second optical splitter
  • the router is a 1: N optical splitter.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本发明提供一种网络中的二层业务处理方法和系统以及设备,该网络包括用户边缘设备和交换设备,其中,用户边缘设备的第一端口与交换设备的第三端口相连,用户边缘设备的第二端口与交换设备的第四端口相连,该方法包括:设置第一端口所连接的链路为主链路,并阻塞第二端口;当检测到第一端口连接的链路出现故障时,激活/打开第二端口,通过第二端口向交换设备发送携带用户边缘设备的监听信息的报文,以使得交换设备根据报文建立俄监听信息和第四端口的对应关系。

Description

网络中的二层业务处理方法和系统以及设备 本申请要求于 2011 年 01 月 31 日提交中国专利局、 申请号为 201110033988.8、 发明名称为"网络中的二层业务处理方法和系统以及设备" 的中国专利申请的优先权, 其全部内容通过引用结合在本申请中。 技术领域 本发明实施例涉及通信技术, 尤其涉及一种网络中的二层业务处理方法和 系统以及设备。
背景技术 网络设备节点的双归保护技术是一种把一个网络节点通过主备两条链路连 接到另外一个网络区域中两个不同的网络设备上, 以通过主备链路的相互备份 保护来提高网络的可靠性。 多框链路聚合组 (Multi-chassis Link Aggregation Group; 简称: MC-LAG )是比较常见的针对以太链路的双归保护技术。 具体的, LAG是指将多条连接到同一设备的链路捆绑在一起, 以便于增加带宽和改善链 路的可靠性。 聚合的链路可以的当作是一条逻辑链路, MC-LAG是对设备内的 LAG的扩展, 可以将多个设备上的数据链路聚合在一起形成链路聚合组, 从而 提高可用带宽, 并且当某条链路或某个设备失效时, 自动将数据业务切换到 MC-LAG的其他可用链路上, 从而增强链路的可靠性。 图 1为现有技术中二层网络的结构示意图, 如图 1所示, 该二层网络包括: 交换机 11、数字用户线路接入复用器( Digital Subscriber Line Access Multiplexer; 简称: DSLAM ) 12、 终端 13和路由器 14。 其中, 交换机 11与 DSLAM 12相 连的端口为 A端口,且与 DSLAM 12之间的链路为主链路;交换机 11与 DSLAM 12相连的端口为 B端口, 且与 DSLAM 12之间的链路为备用链路。 在主链路正 常状态时, 交换机 11通过 A端口和主链路, 将从路由器 14接收的组播业务或 单播业务, 发送给 DSLAM 12, 再由 DSLAM 12将该组播业务或单播业务发送 给与之连接的终端 13。 当主链路出现故障时, 交换机 11可以通过 B端口和备用 链路, 将从路由器 14接收的组播业务或单播业务, 发送给 DSLAM 12, 再由 DSLAM 12将该组播业务或单播业务发送给与之连接的终端 13。 然而,当主链路出现故障时,交换机上该终端的用户的媒体访问控制(Media Access Control; 简称: MAC )转发表中的出端口仍然是 A端口, 从而导致下行 的单播业务或组播业务不能绕过故障链路, 进而导致端到端业务不能够快速恢 复。
发明内容 本发明实施例提供一种网络中的二层业务处理方法和系统以及设备, 用以 解决现有技术中, 在网络设备通过链路双归属保护, 且链路发生保护切换时, 网络中的二层业务恢复时间过长的问题。 本发明实施例提供一种网络中的二层业务处理方法, 其中, 所述网络包括 用户边缘设备和交换设备, 其中, 所述用户边缘设备的第一端口与所述交换设 备的第三端口相连, 所述用户边缘设备的第二端口与所述交换设备的第四端口 相连, 所述方法包括: 设置所述第一端口所连接的链路为主链路, 并阻塞所述第二端口; 当检测到故障出现在所述第一端口连接的链路出现故障时, 激活 /打开所述 第二端口, 通过所述第二端口向所述交换设备发送携带所述用户边缘设备的监 听信息的报文, 以使得所述交换设备根据所述报文建立所述监听信息和所述第 四端口的对应关系。 本发明实施例提供一种用户边缘设备, 包括: 第一端口, 用于与交换设备上的第三端口相连;
第二端口, 用于与所述交换设备上的第四端口相连;
设置模块, 用于设置所述第一端口所连接的链路为主链路, 并阻塞所述第 二端口;
故障处理模块, 用于当检测到所述第一端口连接的链路出现故障时, 激活 / 打开所述第二端口;
网络接口模块, 用于通过所述第四端口向所述交换设备发送携带所述用户 边缘设备的监听信息的报文, 以使得所述交换设备根据所述报文建立所述监听 信息和所述第四端口的对应关系。
本发明实施例提供一种网络侧设备, 包括:
第三端口, 用于与用户边缘设备的第一端口相连;
第四端口, 用于与所述用户边缘设备的第二端口相连;
报文接收模块, 用于在所述第一端口连接的链路出现故障时, 通过所述第 四端口接收来自所述用户边缘设备的报文, 所述报文携带有所述用户边缘设备 的监听信息;
报文处理模块, 用于根据所述报文建立所述监听信息和所述第四端口的对 应关系。
本发明实施例提供一种二层业务处理系统, 其中, 所述系统包括用户边缘 设备和交换设备, 所述用户边缘设备上设置有第一端口和第二端口, 所述第一 端口和所述交换设备上的第三端口相连, 所述第二端口和所述交换设备上的第 四端口相连,
所述用户边缘设备, 用于设置所述第一端口所连接的链路为主链路, 阻塞 所述第二端口, 当检测到所述第一端口连接的链路出现故障时, 激活 /打开所述 第二端口, 通过所述第二端口向所述交换设备发送携带有所述用户边缘设备的 监听信息的报文; 所述交换设备, 用于根据所述报文建立所述监听信息和第四端口的对应关 系。
本发明实施例的网络中的二层业务处理方法和系统以及设备, 通过在网络 中设置用户边缘设备和交换设备, 其中, 用户边缘设备的第一端口与交换设备 的第三端口相连, 用户边缘设备的第二端口与交换设备的第四端口相连, 并设 置第一端口所连接的链路为主链路, 并阻塞第二端口; 当检测到第一端口连接 的链路出现故障时, 激活 /打开第二端口, 并通过第二端口向交换设备发送携带 有用户边缘设备的监听信息的报文, 以使得交换设备根据该报文建立监听信息 和第四端口的对应关系, 从而解决了现有技术中, 在网络设备通过链路双归属 保护, 且链路发生保护切换时, 网络中的二层业务恢复时间过长的问题, 实现 了二层业务的快速恢复。
附图说明 为了更清楚地说明本发明实施例或现有技术中的技术方案, 下面将对实施 例或现有技术描述中所需要使用的附图作一简单地介绍, 显而易见地, 下面描 述中的附图是本发明的一些实施例, 对于本领域普通技术人员来讲, 在不付出 创造性劳动性的前提下, 还可以根据这些附图获得其他的附图。 图 1为现有技术中基于 MC-LAG的二层网络的结构示意图; 图 2为本发明网络中的二层业务处理方法的一个实施例的流程图; 图 3为本发明基于二层业务处理的网络架构的一个结构示意图; 图 4 为实现网络中的二层业务处理所基于的以太链路的双归保护技术下的 二层网络的网络结构示意图; 图 5为本发明网络中的二层业务处理方法的另一个实施例的流程图; 图 6为本发明端到端业务的处理方法的又一个实施例的流程图;
图 7 为实现网络中的二层业务处理所基于的无线光网络(Passive Optical Network; 简称: PON ) 的双归保护技术的二层网络结构示意图;
图 8为本发明 CE设备的一个实施例的结构示意图;
图 9为本发明网络侧设备的一个实施例的结构示意图;
图 10为本 明二层业务处理系统的一个实施例的结构示意图。
具体实施例
为使本发明实施例的目的、 技术方案和优点更加清楚, 下面将结合本发明 实施例中的附图, 对本发明实施例中的技术方案进行清楚、 完整地描述, 显然, 所描述的实施例是本发明一部分实施例, 而不是全部的实施例。 基于本发明中 的实施例, 本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其 他实施例, 都属于本发明保护的范围。
图 2为本发明网络中的二层业务处理方法的一个实施例的流程图, 图 3为 本发明基于二层业务处理的网络架构的一个结构示意图, 如图 2和图 3所述, 该网络包括用户边缘(Customer Edge; 简称: CE )设备 21、 第一交换设备 22, 该 CE设备 21的第一端口与第一交换设备 22的第三端口相连, 该 CE设备 21 的第一端口与第一交换设备 22的第三端口相连, 本实施例的方法包括:
步骤 101、 设置第一端口所连接的链路为主链路, 并阻塞第二端口。
在本实施例中, CE设备 21可以设置第一端口所连接的链路为主链路, 即 设置第一端口与第三端口之间的链路为主链路, 用于接收第一交换设备转发的 单播、 组播以及广播报文。 CE设备 21还可以设置第二端口所连接的链路为备 用链路, 即设置第二端口与第四端口之间的链路为备用链路, 并阻塞该第二端 口, 从而使得 CE设备 21通过第一端口接收单播、 组播以及广播报文。
本实施例中并不对哪个链路是主链路, 哪个是备用链路进行限制, 本领域 技术人员可以根据实际需要任意设置, 例如: CE设备可以设置第二端口与第四 端口之间的链路为主链路, 设置第一端口与第三端口之间的链路为备用链路, 并阻塞该第一端口,从而使得 CE设备通过第二端口接收单播、组播业务以及广 播报文。
步骤 102、 当检测到第一端口连接的链路出现故障时, 激活 /打开第二端口, 通过第二端口向第四端口发送携带有 CE设备 21的监听信息的报文, 以使得该 第一交换设备 22根据报文建立监听信息和第四端口的对应关系。
在本实施例中, 当二层业务为单播业务时, CE设备 21 的监听信息可以包 括 CE设备 21的 MAC地址信息; 或者包括 CE设备 21的 MAC地址信息和 CE 设备 21 连接的用户设备的地址信息, 报文可以具体为地址解析协议(Address Resolution Protocol; 简称: ARP )报文。 当检测到第一端口连接的链路出现故障, 即主链路出现故障时, CE设备 21可以通过第二端口向第一交换设备的第四端 口发送 ARP报文,第一交换设备 22可以根据通过第四端口接收的该 ARP报文, 将单播转发表中的出端口设置为第四端口, 即建立监听信息和第四端口的对应 关系, 从而使得第一交换设备 22可以通过第四端口向第二端口发送单播业务。 其中, 单播转发表中还包括 CE设备 21的 MAC地址信息, 或者 CE设备 21的 MAC地址信息和用户设备的地址信息。
当二层业务为组播业务时, CE设备 21 的监听信息可以为组播节目标识, 则才艮文可以具体为因特网组管理协议( Internet Group Management Protocol; 简 称: IGMP )请求(Request )报文; 当检测到故障出现在第一端口和第三端口之 间, 即主链路出现故障时, CE设备 21 可以通过第二端口向第一交换设备的第 四端口发送 IGMP Request报文, 第一交换设备 22可以根据从第四端口接收的 该 IGMP Request报文, 将组播转发表中的出端口设置为第四端口, 从而使得第 一交换设备 22可以通过第四端口向第二端口发送组播业务。
需要说明的是, 当 CE设备 21处理的是三层业务时, CE设备 21需要上报 自身的 MAC地址, 这样第一交换设备 22会在转发表中保存该 MAC地址, 并 设置出端口为第四端口, 当第一交换设备 22收到来自网络侧的下行报文时, 该 下行报文携带有 CE设备 21的 MAC地址以及用户设备的 IP地址, 根据转发表 中的出端口, 将该下行报文通过第四端口发送给 CE设备 21 ; 另外, CE设备 21 上保存有用户设备的 MAC地址和 IP地址的对应关系, 在收到下行报文后, 去 掉报文中自身的 MAC地址, 将用户设备的 IP地址换成用户设备的 MAC地址 后通过对应端口发送给用户设备。
当 CE设备 21处理的是二层业务时, CE设备 21需要上报的是自身的 MAC 地址以及连接的用户设备的 MAC地址, 第一交换设备 22分别在转发表中保存 这两个 MAC地址,并设置出端口为第四端口,当接收到携带有用户设备的 MAC 地址的下行报文时, 根据转发表将下行报文通过第四端口发送给 CE设备 21 , CE设备 21根据用户设备的 MAC地址将下行报文转发给用户设备。
在本实施例中, 通过在网络中设置用户边缘设备和交换设备, 其中, 用户 边缘设备的第一端口与交换设备的第三端口相连, 用户边缘设备的第二端口与 交换设备的第四端口相连, 并设置第一端口所连接的链路为主链路, 并阻塞第 二端口; 当检测到第一端口连接的链路出现故障时, 激活 /打开第二端口, 并通 过第二端口向交换设备发送携带有用户边缘设备的监听信息的报文, 以使得交 换设备根据该报文建立监听信息和第四端口的对应关系, 从而解决了现有技术 中, 在网络设备通过链路双归属保护, 且链路发生保护切换时, 网络中的二层 业务恢复时间过长的问题, 实现了二层业务的快速恢复。
图 4 为实现网络中的二层业务处理所基于的以太链路的双归保护技术下的 二层网络的网络结构示意图, 如图 4所示, 该二层网络包括: 交换机 31、 交换 机 32、 交换机 33、 交换机 34、 路由器 35和用户设备 36。 其中, 交换机 31的 第一端口通过交换机 32与交换机 34的第三端口相连, 交换机 31的第二端口通 过交换机 33与交换机 34的第四端口相连。
图 5 为本发明网络中的二层业务处理方法的另一个实施例的流程图, 本实 施例以上述图 4所示网络架构为基础, 并以二层业务为单播业务、 CE设备为交 换机 31、 第一交换设备为交换机 34、 第二交换设备为交换机 32、 第三交换设备 为交换机 33为例, 详细介绍本实施例的技术方案, 如图 5所示, 本实施例的方 法包括:
步骤 201、 设置第一端口与交换机 32之间的链路为主链路, 设置第二端口 与交换机 33之间的链路为备用链路, 并阻塞第二端口。
步骤 202、 进行地址解析协议侦听 ( Address Resolution Protocol snooping; 简称: ARP snooping ) ,监听到用户设备的网络之间互连的协议( Internet Protocol; 简称: IP )地址和该 IP地址对应的 MAC地址。
在本实施例中, 当交换机 31设置第一端口与交换机 32之间的链路为主链 路时, 将 ARP报文向网络侧广播, 该 ARP报文中包括用户设备的 IP地址和该
IP地址对应的 MAC地址以及交换机机 31的 MAC地址,由于阻塞了第二端口, 因此, 该 ARP报文从交换机 32转发给交换机 34, 交换机 34通过第三端口接收 到该 ARP报文后, 将单播转发表中的出端口设置为第三端口, 其中, 该单播转 发表项中包括交换机 31的地址信息和用户设备的地址信息,从而使得交换机 34 根据该出端口, 将从路由器 35接收的单播业务通过第三端口发送给交换机 32, 并由交换机 32通过主链路将该单播业务转发给交换机 31。
步骤 203、 在检测到第一端口连接的链路出现故障时, 打开 /激活第二端口, 通过第二端口向第四端口发送携带有交换机 31的 MAC地址和用户设备的 MAC 地址的 ARP报文, 以使得交换机 34根据 ARP报文, 建立交换机 31的 MAC地 址和用户设备的 MAC地址与第四端口的对应关系。
在本实施例中, 该单播转发表项中包括交换机 31的 MAC地址和用户设备 的 MAC地址。 具体的, 第一端口和第三端口之间的故障可以包括: 主链路出现 故障、 交换机 32与交换机 34之间的链路出现故障, 或者交换机 32与交换机 34 之间的网络中的链路或节点出现故障。 其中, 该网络可以为二层以太网、 三层 以太网或者多协议标签交换( Multi-Protocol Label Switching; 简称: MPLS ) 网 络。
另外, 在本实施例中, 交换机 31检测第一端口连接的链路是否出现故障的 实现方式可以有如下几种方式:
第一种: 交换机 34每隔预定时间向交换机 32发送第二检测消息, 交换机 32每隔预定时间向交换机 31发送第一检测消息,该第一检测消息和第二检测消 息可以是以太操作管理维护( Operation Administration Maintenance;简称: 0 AM ) 消息或其他检测消息。
若在预定时间内, 交换机 32没有接收到交换机 34发送的第二检测消息, 则发送通知消息给交换机 31 , 告知交换机 31故障出现在交换机 34与交换机 32 之间的网络中的链路或节点, 或者故障出现在交换机 34与交换机 32之间的链 路。
或者, 若在预定时间内, 交换机 31没有接收到交换机 32发送的第一检测 消息, 则判定主链路出现故障。
第二种: 交换机 34每隔预定时间通过交换机 32向交换机 31发送第二检测 消息。
若在预定时间内, 交换机 31没有接收到交换机 34通过交换机 32转发的第 二检测消息, 则判定故障为主链路故障; 或者, 故障出现在交换机 32和交换机 34之间的链路; 或者故障出现在交换机 32和交换机 34之间的网络中的链路或 者节点。
在本实施例中, 交换机 31在检测到第一端口连接的链路出现故障时, 交换 机 31可以打开 /激活第二端口, 并将携带有交换机 31的 MAC地址和用户设备 的 MAC的 ARP报文向网络侧广播, 由于第一端口连接的链路出现故障, 打开 第二端口, 因此, 可以通过第二端口向交换机 33发送 ARP报文, 并由交换机 33将该 ARP报文发送给交换机 34,交换机 34通过第四端口接收到该 ARP报文 后, 快速在第四端口学习到交换机 31的 MAC地址和用户设备的 MAC地址, 从而设置单播转发表中的出端口为第四端口, 其中, 该单播转发表中还包括交 换机 31的地址信息和用户设备的 MAC地址, 即建立交换机 31的 MAC地址和 用户设备的 MAC地址与第四端口的对应关系, 使得交换机 34根据对应关系, 将从路由器 35接收的单播业务, 通过第四端口发送给交换机 33 , 再由交换机 33将该单播业务转发给交换机 31 , 最后由交换机 31将该单播业务转发给用户 设备 36。
在本实施例中, 通过设置第一端口与交换机 32之间的链路为主链路、 设置 第二端口与交换机 33 之间的链路为备用链路, 并阻塞第二端口, 当交换机 31 在检测到第一端口连接的链路出现故障时, 打开 /激活阻塞的第二端口, 并将交 换机 31的 MAC地址和用户设备的 MAC地址携带在 ARP中, 将监听到的用户 设备的 MAC地址携带在 APR报文中, 通过第二端口发送给第四端口, 以供交 换机 34通过第四端口接收该 ARP报文, 并根据该 ARP报文, 建立交换机 31 的 MAC地址和用户设备的 MAC地址与第四端口的对应关系, 从而解决了现有 技术中, 在网络设备通过链路双归属保护, 且链路发生保护切换时, 单播业务 恢复时间过长的问题, 实现了单播业务的快速恢复。
图 6 为本发明端到端业务的处理方法的又一个实施例的流程图, 本实施例 以上述图 4所示网络架构为基础, 并以端到端的业务为组播业务、 CE设备为交 换机 31、 第一交换设备为交换机 34、 第二交换设备为交换机 32、 第三交换设备 为交换机 33为例, 详细介绍本实施例的技术方案, 如图 6所示, 本实施例的方 法包括:
步骤 301、 设置第一端口与交换机 32之间的链路为主链路, 设置第二端口 与交换机 33之间的链路为备用链路, 并阻塞第二端口。
步骤 302、进行因特网组管理协议侦听( Internet Group Management Protocol snooping; 简称: IGMP snooping )或者 IGMP代理服务器(proxy ) , 监听到用 户设备中的用户请求, 该用户请求包括组播节目标识。
在本实施例中, 当设置第一端口与交换机 32之间的链路为主链路时, 由于 阻塞第二端口, 携带有组播节目标识的 IGMP请求( Request )报文是通过第一 端口连接的主链路发送给交换机 32 , 并由交换机 32将该 TGMP Request报文发 送给交换机 34, 交换机 34通过第一端口接收到该 IGMP Request报文后, 设置 组播转发表中的出端口为第一端口, 从而使得交换机 34根据出端口, 将从路由 器 35接收的组播业务通过第一端口发送给交换机 32, 并由交换机 32通过主链 路将该组播业务转发给交换机 31。
步骤 303、 当检测到第一端口连接的链路出现故障时, 激活 /打开第二端口, 通过第二端口向第四端口发送携带有组播节目标识的 IGMP Request报文, 以使 得交换机 34根据第四端口接收的 IGMP Request报文, 建立组播节目标识和第 四端口的对应关系。
具体的, 交换机 31检测第一端口连接的链路是否出现故障的实现方式与图 5所示实施例中的检测方式相同, 此处不再赘述。
另外, 在本实施例中, 当交换机 31在检测到第一端口连接的链路出现故障 时, 交换机 31可以打开先前阻塞的第二端口, 并将组播节目标识携带在 IGMP Request报文中, 通过第二端口连接的备用链路发送给交换机 32, 再由交换机 32将该 IGMP Request报文发送给交换机 34, 交换机 34的第四端口接收到该 IGMP Request报文后, 快速设置组播转发表中的出端口为第四端口, 即建立组 播节目标识和第四端口的对应关系, 使得交换机 34根据该对应关系, 将由路由 器 35接收的组播业务, 通过第四端口转发给交换机 33 , 再由交换机 33将该组 播业务转发给交换机 31 , 最后由交换机 31将该组播业务转发给用户设备 36。
在本实施例中, 通过设置第一端口与交换机 32之间的链路为主链路、 设置 第二端口与交换机 33 之间的链路为备用链路, 并阻塞第二端口, 当交换机 31 在检测第一端口连接的链路出现故障时, 打开先前阻塞的第二端口, 并将监听 到的组播节目标识携带在 IGMP Request报文中, 通过第二端口连接的备用链路 发送给交换机 33 , 再由交换机 33发送给交换机 34, 交换机 34通过第四端口接 收到该 IGMP Request报文后, 快速设置组播转发表中的出端口为第四端口, 即 建立组播节目标识和第四端口的对应关系, 从而解决了现有技术中, 在网络设 备通过链路双归属保护, 且链路发生保护切换时, 组播业务恢复时间过长的问 题, 实现了组播业务的快速恢复。
图 7为实现网络中的二层业务处理所基于的 PON的双归保护技术的二层网 络结构示意图,如图 7所示,该二层网络包括:光网络单元( Optical Network Unit; 简称: ONU ) 41、 光线路终端( Optical Line Terminal; 简称: OLT ) 42、 OLT 43、 交换机 44、 路由器 45和用户设备 46。 其中, ONU 41的第一端口通过 OLT 42 与交换机 44的第三端口相连, ONU 41的第二端口通过 OLT 43与交换机 44的 第四端口相连, 且 ONU 41分别通过 1 : N光分路器与 OLT 42和 OLT 43相连。 需要说明的是, 本实施例中, CE设备为 ONU 41、 第一交换设备交换机 44, 第 二交换设备为 OLT 42以及第三交换设备为 OLT 43。 且实现网络中的二层业务 处理还可以基于图 7所示的 PON的双归保护技术的二层网络, 其实现原理与图 5或图 6所示的方法实施例的实现方式类似, 此处不再赘述。
图 8为本发明 CE设备的一个实施例的结构示意图, 如图 7所示, 本实施例 的 CE设备包括: 第一端口 51、 第二端口 52、 设置模块 53、 故障处理模块 54 和网络接口模块 55。 其中, 第一端口 51与第一交换设备上的第三端口相连, 第 二端口 52与第一交换设备上的第四端口相连, 设置模块 53用于设置第一端口 51所连接的链路为主链路, 并阻塞第二端口 52; 故障处理模块 54用于在检测 到故障出现在第一端口 51连接的链路出现故障时, 打开 /激活第二端口 52; 网 络接口模块 55用于通过第二端口 52向第一交换设备发送携带有 CE设备的监听 信息的报文。
本实施例的 CE设备可以执行图 2所示的方法实施例的技术方案,其原理类 似, 此处不再赘述。
在本实施例中, 通过在网络中设置用户边缘设备和交换设备, 其中, 用户 边缘设备的第一端口与交换设备的第三端口相连, 用户边缘设备的第二端口与 交换设备的第四端口相连, 并设置第一端口所连接的链路为主链路, 并阻塞第 二端口; 当检测到第一端口连接的链路出现故障时, 激活 /打开第二端口, 并通 过第二端口向交换设备发送携带有用户边缘设备的监听信息的报文, 以使得交 换设备根据该报文建立监听信息和第四端口的对应关系, 从而解决了现有技术 中, 在网络设备通过链路双归属保护, 且链路发生保护切换时, 网络中的二层 业务恢复时间过长的问题, 实现了二层业务的快速恢复。
进一步的, 在上述图 8所示实施例的基础上, 本实施例中的 CE设备的第一 端口 51还可以通过第二交换设备与第一交换设备的第三端口相连, CE设备的 第二端口 52还可以通过第三交换设备与第一交换设备的第四端口相连, 则 CE 设备中的设置模块 53具体用于设置第一端口 51和第二交换设备之间的链路为 主链路; 设置第二端口与第三交换设备之间的链路为备用链路, 并阻塞第二端 口 52。
更进一步的, 在上述图 8 所示实施例的基础上, 本实施例的网络接口模块 55具体用于通过第二端口 52向第四端口发送携带有 CE设备的地址信息的 ARP 解析协议报文。 或者,
网络接口模块 55具体用于通过第二端口 52向第四端口发送携带有 CE设备 的地址信息和与 CE设备所连接的用户设备的地址信息的 ARP报文。 需要说明的是, 该地址信息可以具体为 MAC地址。
更进一步的, 在上述图 8 所示实施例的基础上, 本实施例的网络接口模块 具体用于通过第二端口 52向第四端口发送携带有组播节目标识的 IGMP Request 报文。
图 9为本发明网络侧设备的一个实施例的结构示意图, 如图 9所示, 本实 施例的设备包括: 第三端口 61、 第四端口 62、 报文接收模块 63和报文处理模 块 64。 其中, 第三端口 61用于与 CE设备的第一端口相连; 第四端口 62用于 与 CE设备的第二端口相连; 报文接收模块 63用于在第一端口连接的链路出现 故障时, 通过第四端口 62接收来自 CE设备的报文, 该报文携带有用户设备的 监听信息; 报文处理模块 64用于根据报文建立监听信息和第四端口 62的对应 关系。
具体的,当报文接收模块 63在 CE设备的第一端口连接的链路出现故障时, 通过第四端口 62接收来自 CE设备的携带有 CE设备的地址信息的 ARP报文, 则报文处理模块 64根据携带有 CE设备的地址信息的 ARP报文,设置单播转发 表中的出端口为第四端口 62, 即建立 CE设备的地址信息与第四端口 62的对应 关系, 其中, 该地址信息可以具体为 MAC地址。 或者,
当报文接收模块 63在 CE设备的第一端口连接的链路出现故障时, 通过第 四端口 62接收来自 CE设备的携带有 CE设备的地址信息和 CE设备连接的用户 设备的地址信息的 ARP报文, 则报文处理模块 64根据该 ARP报文, 设置单播 转发表中的出端口为第四端口 62,即建立 CE设备的地址信息和 CE设备连接的 用户设备的地址信息与第四端口 62的对应关系。 其中, 该地址信息可以具体为 MAC地址; 或者,
当报文接收模块 63在 CE设备的第一端口连接的链路出现故障时, 通过第 四端口 62接收来自 CE设备的携带有组播节目标识的 IGMP Request报文;则报 文处理模块 64根据通过第四端口 62接收的该 IGMP Request报文, 设置组播转 发表中的出端口为第四端口 62,即建立组播节目标识与第四端口 62的对应关系。
在本实施例中, 通过第四端口接收来自 CE设备发送的携带有 CE设备的监 听信息的报文, 建立监听信息与第四端口的对应关系, 从而解决了现有技术中, 在网络设备通过链路双归属保护, 且链路发生保护切换时, 网络中的二层业务 恢复时间过长的问题, 实现了二层业务的快速恢复。
进一步的, 在上述图 9 所示的实施例的基础上, 该网络侧设备还可以包括 网络接口模块, 用于接收来自网络侧的报文, 则报文处理模块 64还用于根据该 对应关系将来自网络侧的报文转发给 CE设备。
图 10为本发明二层业务处理系统的一个实施例的结构示意图, 如图 10所 示, 本实施例的系统包括: 第一交换设备 71和 CE设备 72, 其中, CE设备 72 上设置有第一端口和第二端口,第一端口和第一交换设备 71上的第三端口相连, 第二端口和第一交换设备 71上的第四端口相连。 具体的, CE设备 72用于设置 第一端口所连接的链路为主链路, 阻塞第二端口, 当检测到第一端口连接的链 路出现故障时, 激活 /打开第二端口, 通过第二端口向第一交换设备 71发送携带 有 CE设备 72的监听信息的报文;第一交换设备 71用于根据该报文建立监听信 息和第四端口的对应关系。
进一步的, 该监听信息可以包括组播节目标识, 则第一交换设备 71还用于 接收来自网络侧的携带有组播节目标识的报文, 根据组播节目标识和第四端口 的对应关系将来自网络侧的报文通过第四端口组播给 CE设备 72。 或者, 该监听信息还可以包括 CE设备 72的地址信息, 或者包括 CE设备 72的地 址信息和 CE设备 72所连接的用户设备的地址信息,则第一交换设备 71还用于 接收来自网络侧的携带有地址信息的报文, 根据该地址信息和第四端口的对应 关系, 将来自网络侧的携带有该地址信息的报文通过第四端口单播给 CE设备 72。
在本实施例中, 该系统解决了现有技术中, 在网络设备通过链路双归属保 护, 且链路发生保护切换时, 二层业务恢复时间过长的问题, 实现了二层业务 的快速恢复。
进一步的,在本发明的另一个实施例中,在上述图 10所示实施例的基础上, 该系统还可以包括第二交换设备和第三交换设备, 其中, CE设备 72的第一端 口通过第二交换设备与第一交换设备 71的第三端口相连, CE设备 72的第二端 口通过第三交换设备与第一交换设备 71的第四端口相连。
具体的, CE设备 72可以为交换机; 第一交换设备 71、 第二交换设备和三 交换设备可以为交换机、运营商边缘(Provider Edge; 简称: PE )设备或者 MPLS 设备。 更为具体的, 主链路和备用链路可以为 LAG。
更进一步的, 在本发明的又一个实施例中, 在上述图 10所示实施例的基础 上, 该系统还可以包括第二交换设备和第三交换设备, 其中, CE设备 72的第 一端口通过第二交换设备与第一交换设备 71的第三端口相连, CE设备 72的第 二端口通过第三交换设备与第一交换设备 71的第四端口相连。
具体的, 该 CE设备 72可以为 ONU; 第二交换设备和第三交换设备可以为 OLT, 第一交换设备 71可以为交换机、 PE设备或者 MPLS设备。 且 CE设备 72与第二交换设备之间通过第一光分路器相连接, CE设备 72与第三交换设备 之间通过第二光分路器相连接, 其中第一光分路器和第二光分路器为 1 : N光分 路器。
本领域普通技术人员可以理解: 实现上述方法实施例的全部或部分步骤可 以通过程序指令相关的硬件来完成, 前述的程序可以存储于一计算机可读取存 储介质中, 该程序在执行时, 执行包括上述方法实施例的步骤; 而前述的存储 介质包括: ROM、 RAM, 磁碟或者光盘等各种可以存储程序代码的介质。
最后应说明的是: 以上实施例仅用以说明本发明的技术方案, 而非对其限 制; 尽管参照前述实施例对本发明进行了详细的说明, 本领域的普通技术人员 应当理解: 其依然可以对前述各实施例所记载的技术方案进行修改, 或者对其 中部分技术特征进行等同替换; 而这些修改或者替换, 并不使相应技术方案的 本质脱离本发明各实施例技术方案的精神和范围。

Claims

权利要求书
1、 一种网络中的二层业务处理方法, 其特征在于, 所述网络包括用户边缘 设备和交换设备, 其中, 所述用户边缘设备的第一端口与所述交换设备的第三 端口相连, 所述用户边缘设备的第二端口与所述交换设备的第四端口相连, 所 述方法包括:
设置所述第一端口所连接的链路为主链路, 并阻塞所述第二端口; 当检测到所述第一端口连接的链路出现故障时, 激活 /打开所述第二端口, 通过所述第二端口向所述交换设备发送携带所述用户边缘设备的监听信息的报 文, 以使得所述交换设备根据所述报文建立所述监听信息和所述第四端口的对 应关系。
2、 根据权利要求 1所述的方法, 其特征在于:
所述监听信息包括所述用户边缘设备的地址信息, 或者, 包括所述用户边 缘设备的地址信息和所述用户边缘设备所连接的用户设备的地址信息。
3、 根据权利要求 2所述的方法, 其特征在于, 所述地址信息为设备的媒体 访问控制 MAC地址。
4、 根据权利要求 1所述的方法, 其特征在于, 所述监听信息包括组播节目 标识。
5、 一种用户边缘设备, 其特征在于, 包括:
第一端口, 用于与交换设备上的第三端口相连;
第二端口, 用于与所述交换设备上的第四端口相连;
设置模块, 用于设置所述第一端口所连接的链路为主链路, 并阻塞所述第 二端口;
故障处理模块, 用于当检测到所述第一端口连接的链路出现故障时, 激活 / 打开所述第二端口;
网络接口模块 , 用于通过所述第二端口向所述交换设备发送携带所述用户 边缘设备的监听信息的报文, 以使得所述交换设备根据所述报文建立所述监听 信息和所述第四端口的对应关系。
6、 一种网络侧设备, 其特征在于, 包括:
第三端口, 用于与用户边缘设备的第一端口相连;
第四端口, 用于与所述用户边缘设备的第二端口相连;
报文接收模块, 用于在所述第一端口连接的链路出现故障时, 通过所述第 四端口接收来自所述用户边缘设备的报文, 所述报文携带有所述用户边缘设备 的监听信息;
报文处理模块, 用于根据所述报文建立所述监听信息和所述第四端口的对 应关系。
7、 根据权利要求 6所述的设备, 其特征在于,
所述网络侧设备还包括网络接口模块, 用于接收来自网络侧的报文; 所述报文处理模块还用于根据所述对应关系将来自所述网络侧的报文转发 给所述用户边缘设备。
8、 一种二层业务处理系统, 其特征在于, 所述系统包括用户边缘设备和交 换设备, 所述用户边缘设备上设置有第一端口和第二端口, 所述第一端口和所 述交换设备上的第三端口相连, 所述第二端口和所述交换设备上的第四端口相 连, 所述用户边缘设备, 用于设置所述第一端口所连接的链路为主链路, 阻塞 所述第二端口, 当检测到所述第一端口连接的链路出现故障时, 激活 /打开所述 第二端口, 通过所述第二端口向所述交换设备发送携带有所述用户边缘设备的 监听信息的报文;
所述交换设备, 用于根据所述报文建立所述监听信息和第四端口的对应关 系。
9、 根据权利要求 8所述的系统, 其特征在于, 所述监听信息包括组播节目 标识, 则所述交换设备还用于接收来自网络侧的携带有所述组播节目标识的报 文, 根据组播节目标识和所述第四端口的对应关系将来自网络侧的报文通过第 四端口组播给所述用户边缘设备。
10、 根据权利要求 8或 9所述的系统, 所述监听信息包括所述用户边缘设 备的地址信息, 或者包括所述用户边缘设备的地址信息和所述用户边缘设备所 连接的用户设备的地址信息, 则所述交换设备还用于接收来自网络侧的携带有 地址信息的报文, 根据地址信息和第四端口的对应关系将来自网络侧的携带有 地址信息的报文通过所述第四端口单播给所述用户边缘设备。
PCT/CN2011/081377 2011-01-31 2011-10-27 网络中的二层业务处理方法和系统以及设备 WO2012103758A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201110033988.8A CN102137009B (zh) 2011-01-31 2011-01-31 网络中的二层业务处理方法和系统以及设备
CN201110033988.8 2011-01-31

Publications (1)

Publication Number Publication Date
WO2012103758A1 true WO2012103758A1 (zh) 2012-08-09

Family

ID=44296668

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/081377 WO2012103758A1 (zh) 2011-01-31 2011-10-27 网络中的二层业务处理方法和系统以及设备

Country Status (2)

Country Link
CN (1) CN102137009B (zh)
WO (1) WO2012103758A1 (zh)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9830239B2 (en) 2013-01-30 2017-11-28 Hewlett Packard Enterprise Development Lp Failover in response to failure of a port
CN112751607A (zh) * 2019-10-31 2021-05-04 中兴通讯股份有限公司 链路聚合端口的保护切换方法及系统
CN113923076A (zh) * 2021-09-06 2022-01-11 长沙市同迅计算机科技有限公司 一种基于sd-wan的以太网二层数据交换方法
CN116232987A (zh) * 2023-01-31 2023-06-06 苏州盛科通信股份有限公司 报文转发方法、装置、交换机和计算机可读存储介质

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102137009B (zh) * 2011-01-31 2015-01-07 华为技术有限公司 网络中的二层业务处理方法和系统以及设备
EP2916486A4 (en) * 2012-12-20 2015-12-16 Huawei Tech Co Ltd DENSITY PROCESS, OPTICAL LINE EQUIPMENT AND SYSTEM IN A PASSIVE OPTICAL NETWORK
JP6119562B2 (ja) * 2013-11-06 2017-04-26 日立金属株式会社 ネットワークシステムおよびネットワーク中継装置
JP6278800B2 (ja) * 2014-04-03 2018-02-14 APRESIA Systems株式会社 中継システムおよびスイッチ装置
CN104683245B (zh) * 2015-03-18 2018-03-20 新华三技术有限公司 一种互联网组管理协议代理方法和装置
CN105591837B (zh) * 2015-10-27 2019-01-08 新华三技术有限公司 一种链路监控方法和装置
CN107948105B (zh) * 2018-01-02 2020-08-25 联想(北京)有限公司 控制设备的端口状态的方法和系统
CN108494691B (zh) * 2018-06-22 2021-02-26 新华三技术有限公司 一种组播转发方法、装置及隧道端点设备
CN109088826A (zh) * 2018-09-27 2018-12-25 山东理工大学 软件定义数据中心光网络内一种基于全光网络编码的可靠组播方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070183314A1 (en) * 2006-02-03 2007-08-09 Santera Systems, Inc. Methods, systems, and computer program products for implementing link redundancy in a media gateway
CN101060485A (zh) * 2007-05-11 2007-10-24 杭州华三通信技术有限公司 拓扑改变报文的处理方法和处理装置
CN101079795A (zh) * 2007-07-27 2007-11-28 杭州华三通信技术有限公司 数据转发方法及转发设备
CN102137009A (zh) * 2011-01-31 2011-07-27 华为技术有限公司 网络中的二层业务处理方法和系统以及设备

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101252525B (zh) * 2008-04-03 2010-09-01 杭州华三通信技术有限公司 一种pon网络中的链路备份方法和设备
CN101299718B (zh) * 2008-06-13 2011-04-13 华为技术有限公司 端口切换方法、网络设备及网络系统
CN101695043B (zh) * 2009-10-15 2015-06-10 中兴通讯股份有限公司 一种热备份端口复用的方法及网络系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070183314A1 (en) * 2006-02-03 2007-08-09 Santera Systems, Inc. Methods, systems, and computer program products for implementing link redundancy in a media gateway
CN101060485A (zh) * 2007-05-11 2007-10-24 杭州华三通信技术有限公司 拓扑改变报文的处理方法和处理装置
CN101079795A (zh) * 2007-07-27 2007-11-28 杭州华三通信技术有限公司 数据转发方法及转发设备
CN102137009A (zh) * 2011-01-31 2011-07-27 华为技术有限公司 网络中的二层业务处理方法和系统以及设备

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9830239B2 (en) 2013-01-30 2017-11-28 Hewlett Packard Enterprise Development Lp Failover in response to failure of a port
CN112751607A (zh) * 2019-10-31 2021-05-04 中兴通讯股份有限公司 链路聚合端口的保护切换方法及系统
CN113923076A (zh) * 2021-09-06 2022-01-11 长沙市同迅计算机科技有限公司 一种基于sd-wan的以太网二层数据交换方法
CN116232987A (zh) * 2023-01-31 2023-06-06 苏州盛科通信股份有限公司 报文转发方法、装置、交换机和计算机可读存储介质

Also Published As

Publication number Publication date
CN102137009B (zh) 2015-01-07
CN102137009A (zh) 2011-07-27

Similar Documents

Publication Publication Date Title
CN102137009B (zh) 网络中的二层业务处理方法和系统以及设备
US9036466B2 (en) Methods and apparatus for improving network communication using ethernet switching protection
JP4899959B2 (ja) Vpn装置
CN103178971B (zh) Pon保护方法及装置
US20130021896A1 (en) Method, system, and device for protecting multicast in communication network
CN102025541B (zh) 一种实现组播保护的方法及系统
US9059902B2 (en) Procedures, apparatuses, systems, and computer-readable media for operating primary and backup network elements
CN101227397B (zh) 保护链路的方法、设备和系统
US20120087232A1 (en) Link state relay for physical layer emulation
US20130272114A1 (en) Pseudo wire switching method and device
CN100512292C (zh) 一种实时恢复业务的装置及方法
CN100571205C (zh) 一种接入网络中的组播业务保护方法及其系统、装置
WO2007115493A1 (fr) Procédé, dispositif et système pour réaliser la commutation dans le réseau à double anneau de réseau vpls
WO2012167624A1 (zh) 一种故障处理方法、汇聚节点及光网络保护系统
CN102282805B (zh) 一种业务保护方法及接入设备
CN101374075A (zh) 保护组播源的方法、装置和系统
WO2010045832A1 (zh) 用于以太环网的链路聚合组的保护方法及装置
WO2012130034A1 (zh) 一种vpls快速重路由方法和设备
WO2008046358A1 (en) A method and device to realize punch-through of point-to-multipoint network link status
CN103023665B (zh) 一种组播业务保护的方法、网络设备和系统
WO2012024952A1 (zh) 一种基于点到多点业务的路径切换方法及系统
CN109327318B (zh) 一种sdn管理网络架构和建立sdn管理网络的方法
CN113542932B (zh) 网络的主备切换方法、系统、设备和存储介质
WO2012171378A1 (zh) 解决vpls接入l3故障切换导致断流的方法及路由器
CN101262412B (zh) 一种具有最小时延的组播恢复的方法及其接入设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11857563

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11857563

Country of ref document: EP

Kind code of ref document: A1