Method for processing extra-long message in two-layer virtual special-purpose network

A dedicated network and layer-2 virtualization technology, applied in the field of network transmission, can solve problems such as error fragmentation processing, unspecified application of layer-2 network transmission technology, frame discarding, etc.

Inactive Publication Date: 2004-10-13
HUAWEI TECH CO LTD
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the problem with this solution is that all P devices and PE devices along the route must support receiving and sending such ultra-long Ethernet packets, otherwise, no matter which intermediate node does not support these protocols, the frame will be unco

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for processing extra-long message in two-layer virtual special-purpose network
  • Method for processing extra-long message in two-layer virtual special-purpose network
  • Method for processing extra-long message in two-layer virtual special-purpose network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] The following will refer to Figure 4 and Figure 5 Embodiments of the present invention will be described in detail.

[0016] In order to reduce the time-consuming fragmentation operation of the router and improve network efficiency, the current mainstream operating systems basically set the DF bit of the message when communicating on the network, and are ready to adjust their MTU value according to the situation at any time. The intention of the present invention is to utilize this feature, add an ICMP (Internet Control Message Protocol) on the PE equipment and actively adjust the MTU value of the host computer by using the protocol to respond to the ICMP message, so as to solve the problem of the L2VPN MTU value . Specific embodiments of the present invention will be described in detail below.

[0017] First, an ICMP protocol needs to be bundled on the PE device. The ICMP protocol is an existing three-layer protocol, not all in the L2VPN protocol. One of its most...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for solving link maxim transmitting unit byte amount in two-stage virtual special network, it includes adding a ICMP protocol on PE device, the ICMP protocol can send error report for network, when the length of message sent by user is more than 1522 bytes, the ICMP protocol generates a error report of 'target untouchable' automatically and it can sends the maxim byte amount of message to the user computer, thus the user can resend message with proper length according to the feedback information. By the invention, it can limit the size of message of user computer, prevent from occurring message whose length exceeds 1522 bytes at the source, it can guarantee that the message won't be aborted.

Description

field of invention [0001] The invention generally relates to network transmission technology, in particular to a method for solving the problem of limiting the number of bytes of the maximum transmission unit of a link in a two-layer virtual private network. Background technique [0002] In L2VPN (Layer 2 Virtual Private Network), when a user message passes through a tunnel, it must be encapsulated in a new link layer frame header and tunnel bearer protocol layer, for example, based on the MPLS (Multiprotocol Label Switching) protocol Tunnels must be equipped with two layers of MPLS label headers. If both the link on the user side and the link on the tunnel side are established on the Ethernet, the maximum frame length of the Ethernet user packet after adding the tunnel protocol header will far exceed the maximum frame length of the Ethernet protocol of 1522 bytes , but because it is impossible for the Layer 2 protocol to fragment the packet, such super-long packets are gen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L12/28
Inventor 欧阳光
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products