Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for realizing private VPLS (virtual private LAN (local area network) service)

A business and traffic technology, applied in the field of communication, can solve problems such as not supporting mutual isolation of nodes, increasing system burden and management complexity, and achieving the effect of ensuring business security and flexible networking applications

Active Publication Date: 2012-09-05
盐城恒茂园林绿化有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] There are mainly three ways to implement the E-TREE function based on the existing VPLS network: (1) carry the Root / Leaf attribute of the access link (AC) through the control word. ) to enable the control word mode, and occupy the control word to identify this attribute; (2) establish Root PW and Leaf PW on a virtual switching instance (VSI) respectively to realize the isolation of user services. The disadvantage of this method is More PWs need to be established, which increases the burden on the system and the complexity of management; (3) Configure Root VLAN and Leaf VLAN on the VSI, advertise and establish VLAN mapping between VSIs, so as to realize the isolation of user services. The disadvantage is that it only supports root and leaf attributes, that is, it can only realize the isolation between leaf and leaf nodes, and does not support the isolation of some user nodes under the same VSI instance, while some user groups can communicate with each other

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for realizing private VPLS (virtual private LAN (local area network) service)
  • Method and system for realizing private VPLS (virtual private LAN (local area network) service)
  • Method and system for realizing private VPLS (virtual private LAN (local area network) service)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0068] refer to figure 1 In this embodiment, CE12 and CE32 are isolated, that is, CE12 and CE32 are isolated from each other, and CE12 and CE32 can only communicate with CE21; CE11, CE31, CE33 and CE22 form a community, that is, CE11, CE31, CE33 and CE22 can communicate with each other. It can also communicate with CE21, but cannot communicate with the isolated nodes CE12 and CE32; PE21 is Promiscuous, equivalent to a sink node, all users can communicate with PE21, and communicate with the upper core device or server through PE21.

[0069] For example, PE1 is connected to CE11 and CE12. The attribute of CE12 is isolated, and the attribute of CE11 is community. The specific processing flow is as follows:

[0070] (1) When PE1 receives user traffic from CE11, the corresponding AC attribute is community, that is, PE1 can communicate with the AC with the same attribute as the local PE or remote PE, and can also communicate with promiscuous. Therefore, on the local PE, PE1 needs ...

Embodiment 2

[0077] refer to figure 2 , this embodiment is a subset of Embodiment 1. In this embodiment, CE21 is the root node (promicuous), and other ACs are leaf nodes (isolated); for example, on the PE1 device, the specific processing flow is as follows:

[0078] (1) When PE1 receives user traffic from CE11, the corresponding AC attribute is leaf (isolated), that is, PE1 can only communicate with AC2 of remote PE2, and is isolated from the local AC and ACs of other PEs; according to the local The AC mapping table finds the corresponding egress as PW1; in addition, the local AC1 and AC2 need to be isolated, which can be isolated through VLAN inspection at the L2 layer;

[0079] (2) When PE1 receives leaf AC traffic from PE2 or PE3, according to the local AC mapping table, it cannot be forwarded from the local AC, and traffic isolation can be realized through L2VLAN inspection;

[0080] (3) When PE1 receives the traffic of the remote rootAC from PE2, since the encapsulated VLAN ID=100,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for realizing a private VPLS (virtual private LAN (local area network) service), which are both implemented through the following steps: configuring attributes and corresponding VLAN ID (virtual local area network identifiers) on AC (access link) sides of a PE (provider edge); extending a LDP (label distribution protocol) protocol, and establishing a local AC mapping table and a remote AC mapping table on the PE; and carrying out flow isolation on CE (user edge) services according to the local AC mapping table. According to the method and system disclosed by the utility model, the isolation of user services is realized in a VPLS network, the user flow isolation can be realized according to the application requirements of operators, and the intercommunication of users in a particular set also can be realized; and the users all can be intercommunicated with a convergent node. In addition, a function of E-TREE also can be realized in the VPLS network, therefore, an effect of flexible networking application can be achieved according to the requirements of operators, and the safety of services can be ensured.

Description

technical field [0001] The present invention relates to the communication field, in particular to a method and system for realizing a private virtual private network service (VirtualPrivate LAN Service, VPLS). Background technique [0002] With the rapid development of telecommunication technology, it is an irresistible trend to carry multiple services through Internet Protocol / Multiprotocol Label Switching (IP / MPLS) technology. The ALL-IP of network traffic and the flattening of network structure provide the possibility for MPLS technology to move down from the network core layer and aggregation layer to the access layer. With the application of VPLS technology in the access network (Access Network), it is necessary to consider how to realize the isolation of user traffic and the security of services in a multi-user environment. In addition, with the development of metro Ethernet technology, operators require the function of electronic tree (E-TREE) in the VPLS network, th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/46H04L12/56H04L29/06H04L45/50
Inventor 张君辉喻敬海
Owner 盐城恒茂园林绿化有限公司