Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for implementing tunnel conversion of bi-layer tunnel protocol

A layer-2 tunneling protocol and tunneling technology, applied in the field of layer-2 tunneling protocol tunnel conversion, can solve problems such as slowing down the rate of message forwarding, affecting the rate of message forwarding, and multiple TSA resources, so as to achieve faster rate and improved Packet forwarding rate, effect of saving system resources

Active Publication Date: 2008-11-12
ZTE CORP
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the current static LTS implementation method, during the forwarding process, two tables need to be queried to obtain the tunnel ID (Tunnel ID), session ID (Session ID), IP address of the remote LNS or the Tunnel ID, Session ID, and IP address of the LAC. The forwarding information of the address and the forwarding message are as follows: after checking a table to determine the need to run the LTS service, analyze the PPP field of the L2TP message, and query another L2TP forwarding table according to the information obtained from the analysis to obtain the forwarding information In this way, querying the forwarding table twice and parsing the PPP field of the L2TP message takes up more TSA resources, affects the performance of the device, and slows down the rate of message forwarding
[0006]And the current implementation method of static LTS runs two PPP state machines corresponding to each user on the TSA. These PPP state machines occupy a large amount of system resources and also affect the packet forwarding rate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing tunnel conversion of bi-layer tunnel protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The implementation process of the method for realizing the tunnel conversion of the two-layer tunnel protocol in the present invention is as follows: figure 1 shown, including the following steps:

[0029] Step 101: Establish LAC-TSA tunnel and session, establish TSA-LNS tunnel and session, issue a forwarding table in the direction of LAC-TSA-LNS and a forwarding table in the direction of LNS-TSA-LAC; the forwarding table is in LAC-TSA tunnels and sessions, TSA-LNS tunnels and sessions are established and issued, including forwarding information;

[0030] Specifically include the following steps:

[0031] The LAC initiates a tunnel establishment request to the TSA; the TSA accepts the request and establishes a LAC-TSA tunnel and session with the LAC, and the TSA accepts the request through the TSA-LNS module and establishes a LAC-TSA tunnel and session with the LAC,

[0032] The TSA initiates a tunnel establishment request to the remote LNS; the remote LNS accepts the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for realizing tunneling conversion of two-layer tunneling protocol. The method establishes a TSA-tunnel terminal end LNS tunnel and a dialogue to distribute a forwarding table including the forwarding message with an LAC-TSA-LNS direction and the forwarding table with an LNS-TSA-LAC direction by establishing tunnel starting terminal LAC-tunnel conversion cluster TSA tunnel and a dialogue, which leads to get the conversion messages by searching the forwarding table one time in the process of forwarding LAC or the L2TP messages of the far end LNS forwarding TSA. The method of the invention can help reduce the occupied TSA resource by the static tunnel conversion, thereby further increasing the message forwarding speed.

Description

technical field [0001] The invention relates to a network communication message forwarding technology, more specifically, a method for realizing Layer 2 Tunneling Protocol (LTS, L2TP Tunnel Switching). Background technique [0002] With the high-speed development of the network, various network services are constantly emerging. Among them, virtual private network (VPN) technology has gradually become the focus of attention of various enterprises. [0003] Layer 2 Tunneling Protocol (L2TP, Layer 2 Tunneling Protocol) is an implementation of VPN services. L2TP is mainly implemented by two parts: the tunnel originator (LAC) and the tunnel termination (LNS). According to the protocol, two layer tunnel, encapsulate and forward Point-to-Point Protocol (PPP, Point-to-PointProtocol) packets in the tunnel through User Datagram Protocol (UDP, UserDatagram Protocol), and decapsulate and terminate PPP after the PPP packets arrive at the LNS. [0004] With the continuous growth of L2TP ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/56H04L12/46H04L29/06H04L12/715
Inventor 张可刘小威
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products