(19)
(11)EP 2 860 918 B1

(12)EUROPEAN PATENT SPECIFICATION

(45)Mention of the grant of the patent:
25.10.2017 Bulletin 2017/43

(21)Application number: 13873039.5

(22)Date of filing:  11.09.2013
(51)International Patent Classification (IPC): 
H04L 12/70(2013.01)
H04L 12/46(2006.01)
H04L 12/721(2013.01)
H04L 12/761(2013.01)
(86)International application number:
PCT/CN2013/083318
(87)International publication number:
WO 2014/114092 (31.07.2014 Gazette  2014/31)

(54)

MESSAGE PROCESSING METHOD AND SYSTEM IN MULTI-HOMING ACCESS OVERLAY NETWORK

NACHRICHTENVERARBEITUNGSVERFAHREN UND -SYSTEM IN EINEM MULTIHOMING-NETZWERK MIT ZUGANGSÜBERLAGERUNG

PROCÉDÉ ET SYSTÈME DE TRAITEMENT DE MESSAGES DANS UN RÉSEAU SUPERPOSÉ À ACCÈS MULTI-HÉBERGEMENT


(84)Designated Contracting States:
AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

(30)Priority: 23.01.2013 CN 201310024844

(43)Date of publication of application:
15.04.2015 Bulletin 2015/16

(73)Proprietor: ZTE Corporation
Shenzhen, Guangdong 518057 (CN)

(72)Inventors:
  • LIAO, Ting
    Shenzhen Guangdong 518057 (CN)
  • DAI, Xuehui
    Shenzhen Guangdong 518057 (CN)
  • HU, Fangwei
    Shenzhen Guangdong 518057 (CN)

(74)Representative: Awapatent AB 
Junkersgatan 1
582 35 Linköping
582 35 Linköping (SE)


(56)References cited: : 
EP-A1- 2 226 973
CN-A- 101 039 227
CN-A- 101 778 446
US-A1- 2011 299 406
EP-A1- 2 282 453
CN-A- 101 577 931
US-A1- 2011 235 545
US-A1- 2012 027 017
  
  • ZHAI T SENEVIRATHNE CISCO SYSTEMS R PERLMAN INTEL LABS D EASTLAKE 3RD M ZHANG HUAWEI H: "RBridge: Pseudo-Nickname; draft-hu-trill-pseudonode-nickname-04.txt" , RBRIDGE: PSEUDO-NICKNAME; DRAFT-HU-TRILL-PSEUDONODE-NICKNAME-04.TXT, INTERNET ENGINEERING TASK FORCE, IETF; STANDARDWORKINGDRAFT, INTERNET SOCIETY (ISOC) 4, RUE DES FALAISES CH- 1205 GENEVA, SWITZERLAND, 12 December 2012 (2012-12-12), pages 1-21, XP015089045, [retrieved on 2012-12-12]
  • H. ZHAI ET AL.: 'RBridge: Pseudo-Nickname, draft-hu-trill-pseudonode-nickname-04' INTERNET -DRAFT 10 December 2012, pages 1 - 22, XP015089045
  
Note: Within nine months from the publication of the mention of the grant of the European patent, any person may give notice to the European Patent Office of opposition to the European patent granted. Notice of opposition shall be filed in a written reasoned statement. It shall not be deemed to have been filed until the opposition fee has been paid. (Art. 99(1) European Patent Convention).


Description

Technical Field



[0001] The present invention relates to the communication field, and in particular, to a message processing method and system in a multi-homing access overlay network.

Background of the Related Art



[0002] In order to realize supporting the large two-layer network of the data center, multiple overlay encapsulation technologies are proposed correspondingly, which perform the mapping study of the customer side MAC and the corresponding overlay access node identifier correspondingly through performing encapsulation and decapsulation of the original message in the edge device of the overlay network, and perform the corresponding control plane information interaction through the control plane in the overlay network, in order to carry the node identifier and interacting other information required to be carried for head encapsulation, such that it is realized that the overlay encapsulation of the original message is performed on the edge access device of the overlay network, and is then forwarded on the overlay intermediate transmission node, and reach the remote end target edge device and perform the overlay decapsulation, therefore, the transmission of the original message in the large two-layer network is completed.

[0003] For example, the TRILL technology (Transparent Interconnection over Lots of Links) in the overlay encapsulation technology is a protocol used for solving the insufficient of the Spanning Tree protocol (STP) in the large-scale data center. In the two-layer network, the STP avoids the loop through blocking the redundant link, but it causes the waste (blocking) of the bandwidth of the redundant link at the same time. The TRILL solves the loop problem of the two-layer network through introducing the Intermediate System to Intermediate System (IS-IS) route protocol into the two-layer network, and realizes the multiple paths (or called the Equivalent Cost Multiple Path (ECMP)) of the two-layer network at the same time.

[0004] In the TRILL network (Campus), the device running the TRILL protocol is called as the route network bridge (RBridge), the device encapsulating the original message into the TRILL message at the entry of the network is called as the ingress route network bridge (RBridge), and the route network bridge decapsulating the TRILL data frame into the original data frame and forwarding to the end device at the exit of the TRILL network is called as the Egress route network bridge (RBridge). And the Egress RB will also study and record the information table {internal layer source MAC, Ingress_Nickname, ......} of the data frame at the same time. The edge devices of the current overlay network all perform one-to-one mapping relationship study when studying and storing the mapping of the MAC and the overlay network device identifier.

[0005] Meanwhile, the multi-homing access is a very common network deploying scene in the data center, where the terminal accesses the network through two or more than two links. The interfaces on the devices forming a group of multi-homing access are thought to join the same link aggregation group, and these devices are thought to be the member devices in the same link aggregation group. To the TRILL network specifically, the terminal accesses the TRILL network through multiple links and through multiple ingress RBs, these uplinks and the ingress RBridges make up one multi-homing group, and the RBridge device runs the link aggregation protocol (such as IEEE 802.1AX-REV). Because the message sent by the terminal may be encapsulated by different RBridges which belong to the multi-homing group, in this way, when the egress RBridge of the remote end performs the MAC study, the frequently stir (called the flip-flop) of the Ingress-Nickname of the MAC table entry will occur since the same one MAC can only study the mapping of only one overlay network device identifier, , which causes the instability of the MAC address table, and even will cause the disordered sequence of the returning flow and packet loss, resulting in the breakoff of the conversation.

[0006] As shown in FIG. 1, the customer side device 1 is connected to the RB1 and the RB2 at the same time, so the terminal accesses the links of the RB1 and the RB2 respectively and then forms one multi-homing group. When the customer side device 1 communicates with the customer side device 3, the two links of the RB1 and the RB2 connecting the customer side device 1 form the multi-homing binding relationship; the MAC1 on the customer side device 1 forms the TRILL encapsulation to reach the RB5 through the RB1 first, and the RB5 studies the mapping relationship between the nickname of the RB1 and the MAC1; when the flow of the MAC1 coming from the RB2 reaches the RB5, the RB5 will study the mapping relationship between the nickname of the RB2 and the MAC1, and covers the mapping relationship between the nickname of the RB1 and the MAC1. When there are MAC1 flow sent to the RB5 ceaselessly from the RB1 and the RB2 at the same time, the MAC1 related entries on the RB5 will be incessantly refreshed and covered. To other overlay networks, such as the SPB network, etc., when the terminal accesses multiple network bridges of the SPB network through the multi-homing access mode, the problem of the above-mentioned flip-flop of MAC table entry also exists.

[0007] The document "RBridge: Pseudo-Nickname; draft-hu-trill-pseudonode-nickname-04", TRILL Working Group, Internet-Draft, Intended status: Standards Track, Expires: June 13, 2013, discloses a method for using a Virtual RBridge group, together with its Pseudo-nickname to avoid the ingress RBridge nick name associated to this end station needs to be changed in remote RBridges' forwarding tables.

[0008] The document EP2226973A1 discloses a method for routing frames in a TRILL network using service VLAN identifiers.

[0009] The document EP2282453A1 discloses a method for routing frames in a short path computer network for a multi-homed legacy bridge node.

[0010] The document US20110235545A1 discloses a method of MAC-addresses based virtual route aggregation.

[0011] The document US20110299406A1 discloses a system for detecting a path between two nodes.

Content of the Invention



[0012] The present invention provides a message processing method and system in a multi-homing access overlay network, and the technical problem required to be solved is how to avoid the flip-flop problem of the MAC entry.

[0013] In order to solve the above-mentioned technical problem, the present invention provides the following technical scheme.

[0014] A message processing method in a multi-homing access overlay network comprises:

when an edge device receives a data message from an interface bounded with multi-homing access, setting an identifier indicating that the data message is from multi-homing access in overlay encapsulation performed on the data message, and sending the data message after the overlay encapsulation to the overlay network.



[0015] Preferably, the method further has the following characteristics: the method further comprises:

after a remote end edge device receives the data message sent by the edge device, if data messages sent by multiple edge devices carry the identifier indicating from the multi-homing access and internal layer source MACs are same, then storing a mapping relationship between one same MAC address and multiple overlay network device identifiers in the data message.



[0016] Preferably, the method further has the following characteristics: the overlay network is a Transparent Interconnection over Lots of Links (TRILL) network or a shortest path bridge (SPB) network.

[0017] Preferably, the method further has the following characteristics:

in the TRILL network, a mapping relationship of multiple overlay network device identifiers in one same link aggregation group and one same MAC address refers to a mapping relationship of multiple route network bridge nicknames and the same MAC address; and

in the SPB network, the mapping relationship of multiple overlay network device identifiers in one same link aggregation group and one same MAC address refers to a mapping relationship of multiple backbone media access control addresses and one same customer media access control address.



[0018] Preferably, the method further has the following characteristics: in the TRILL network, the identifier is represented through setting a particular bit of a reserved field; or, is represented by an expanded option indicated by a non-zero expansion of an Oplength field.

[0019] Preferably, the method further has the following characteristics: the option further carries member link information of the multi-homing access through an expansion type - length - value (TLV).

[0020] Preferably, the method further has the following characteristics: in the SPB network, the identifier is represented through setting a particular bit of a reserved field.

[0021] Preferably, the method further has the following characteristics: the method further comprises:

when the messages of the same MAC address received by the remote end edge device have a message carrying the identifier, and also have a common message not carrying the identifier, then deleting an originally studied mapping relationship of the MAC address and the multiple network device identifiers, and studying and storing according to the mapping relationship of the MAC address and the network device in the common message.



[0022] An edge device, applied in an overlay network, comprises:

an encapsulation apparatus, configured to: when a data message is received from an interface bounded with multi-homing access, set an identifier indicating that the data message is from multi-homing access in overlay encapsulation performed on the data message; and

a sending apparatus, configured to: send the data message after the overlay encapsulation to the overlay network.



[0023] Preferably, the edge device further has the following characteristics: the overlay network is a Transparent Interconnection over Lots of Links (TRILL) network or a shortest path bridge (SPB) network.

[0024] Preferably, the edge device further has the following characteristics: in the TRILL network, a mapping relationship of multiple overlay network device identifiers in one same link aggregation group and one same MAC address refers to a mapping relationship of multiple route network bridge nicknames and the same MAC address; and
in the SPB network, the mapping relationship of multiple overlay network device identifiers in one same link aggregation group and one same MAC address refers to a mapping relationship of multiple backbone media access control addresses and one same customer media access control address.

[0025] Preferably, the edge device further has the following characteristics: in the TRILL network, the identifier is represented through setting a particular bit of a reserved field, or an expanded option indicated by a non-zero expansion of an Oplength field.

[0026] Preferably, the edge device further has the following characteristics: the option further carries member link information of the multi-homing access through an expansion type - length - value (TLV).

[0027] Preferably, the edge device further has the following characteristics: in the SPB network, the identifier is represented through setting a particular bit of a reserved field.

[0028] An egress edge device, applied in an overlay network, comprises:

a receiving apparatus, configured to: receive a data message carrying overlay encapsulation sent by an ingress edge device; and

a storage apparatus, configured to: after the data message sent by the edge device is received, if data messages sent by multiple edge devices carry an identifier indicating that the data message is from multi-homing access and internal layer source MACs are same, then store a mapping relationship between one same MAC address and multiple overlay network device identifiers in the data message.



[0029] Preferably, the egress edge device further has the following characteristics: the overlay network is a Transparent Interconnection over Lots of Links (TRILL) network or a shortest path bridge (SPB) network.

[0030] Preferably, the egress edge device further has the following characteristics:

in the TRILL network, a mapping relationship of multiple overlay network device identifiers in one same link aggregation group and one same MAC address refers to a mapping relationship of multiple route network bridge nicknames and the same MAC address; and

in the SPB network, the mapping relationship of multiple overlay network device identifiers in one same link aggregation group and one same MAC address refers to a mapping relationship of multiple backbone media access control addresses and one same customer media access control address.



[0031] Preferably, the egress edge device further has the following characteristics: the method further comprises:

a processing apparatus, configured to: connect to the storage apparatus, when the received messages of the same MAC address have a message carrying the identifier, and also have a common message not carrying the identifier, then delete an originally studied mapping relationship of the MAC address and the multiple network device identifiers, and study and store according to the mapping relationship of the MAC address and the network device in the common message.



[0032] A message processing system in a multi-homing access overlay network, comprising an edge device described according to any one of the above text and an egress edge device described according to any one of the above text.

[0033] The embodiment provided by the present invention does not need to control the expansion of the plane protocol specially, while only need to carry the corresponding identifier in the data message head, of which the realization principle is simple.

Brief Description of Drawings



[0034] 

FIG. 1 is diagram one of a network scene provided by an embodiment of the present invention;

FIG. 2 is a flow chart of a method embodiment for message processing in a multi-homing access overlay network provided by the present invention;

FIG. 3 is a diagram two of a network scene provided by an embodiment of the present invention;

FIG. 4 is a diagram of a specific TRILL head in an embodiment of the present invention;

FIG. 5 is a definition graph one of a fixed option expansion attribute in an embodiment of the present invention;

FIG. 6 is a definition graph two of a fixed option expansion attribute in an embodiment of the present invention;

FIG. 7 is a specific expansion TLV diagram carried by LAG information in an embodiment of the present invention;

FIG. 8 is an encapsulation diagram of a SPB in an embodiment of the present invention;

FIG. 9 is description graph of a specific field of I-TAG in an embodiment of the present invention;

FIG. 10 is a structure diagram of a message processing system embodiment in a multi-homing access overlay network provided by the present invention.


Preferred Embodiments of the Present Invention



[0035] The present invention is described in detail with reference to the accompanying drawings and the specific embodiment hereinafter. It should be illustrated that, in the case of not conflicting, the embodiments in the present application and features in these embodiments can be combined with each other.

[0036] FIG. 2 is a flow chart of a method embodiment for processing messages in a multi-homing access overlay network provided by the present invention. The method embodiment shown in FIG. 2 includes the following steps.

[0037] In step 201, when an edge device receives a data message from an interface bounded with multi-homing access, an identifier indicating that the data message is from multi-homing access is set in overlay encapsulation performed on the data message.

[0038] In step 202, the edge device sends the data message after the overlay encapsulation at the overlay network.

[0039] In step 203, after a remote end edge device receives the data message sent by the edge device, if data messages sent by multiple edge devices carry the identifier and internal layer source MACs are same, then a mapping relationship between same one MAC address and multiple overlay network device identifiers in the data message is stored.

[0040] In order to solve the flip-flop problem of the MAC address table, through the method of identifying the terminal as the multi-homing access by using a special mark at the overlay head of the data plane, after receiving the data message of the identifier, the egress edge device of the remote end stores the mapping relationship of multiple overlay network node identifiers in the same one link aggregation group and the customer side MAC address at the same time (for the TRILL network, it is to store the mapping relationship of multiple Rbridge nicknames and the same MAC address; for the SPB network, it is to store the mapping relationship of multiple B-MACs and the same one C-MAC), to solve the problem of the MAC skipping ceaselessly under the multi-homing access situation, and enable the return message of the remote end edge device encapsulated with different node identifiers, thus realizing the load balancing from the remote end to the local.

[0041] Wherein, the using of the mapping relation of the multiple overlay network device identifiers in the same link aggregation group and the same MAC address can include the following steps.

[0042] When receiving the mapping relationship of a certain overlay network device identifier and the MAC address in the link aggregation group, the remote end edge device only updates the aging time of the mapping relationship corresponding to the overlay network device in the mapping relationship of the multiple overlay network device identifiers in the link aggregation group and the MAC address.

[0043] When multiple flows for a certain target MAC address are received and needed to send to the overlay network, if the MAC address is corresponding to multiple overlay network device identifiers in the same link aggregation group, then it can encapsulate different overlay message heads for different flows according to the multiple overlay network device identifiers to send to the overlay network.

[0044] The method embodiment of the present invention is further described in detail through seven application examples hereinafter, including the follows.

[0045] Application example one: the specific implementation method one of the TRILL technology of the present invention.

[0046] When the customer side device multi-homing accesses the TRILL network, there will be the corresponding multi-homing behavior perception in the interfaces of the multi-homing access boundary RB, and then when the data messages from these interfaces need to encapsulate and forward to the remote end through the TRILL of the RB, the two links of the RB1 and the RB2 connecting the customer side device 1 as shown in FIG. 1 form the multi-homing binding relationship. If the customer side device is one host computer, when the MAC 1 of the customer side device 1 communicates with the MAC 3 of the customer side device 3, and when its application protocol of the upper layer has the flows of different applications sent out, different flows can be sent to different boundary route network bridges, and the boundaries RB1 and RB2 form the corresponding TRILL encapsulation message to be forwarded in the TRILL field; in order to solve the skipping problem of the mapping relationship of the MAC 1 on the remote end RB5 to the nicknames of the RB1 and the RB2, through carrying the special identifier in the message encapsulation of the data plane to make the remote end edge device establish the implementation different with the existing MAC study mechanism, when the same terminal performs the multi-homing access, the mapping table of the remote end MAC address and the nickname will not be frequently covered, but it can be stored at the same time.

[0047] The specific implementation mode one is described as follows: as shown in FIG. 4, when the TRILL encapsulation is performed on the boundary RB, the MAC skipping problem under the multi-homing access scene is solved through the non-zero setting of the oplength (the value indicates the expansion head length value of the TRILL head, the unit is 4-byte length, wherein, according to the existing standard, the first 4 bytes indicate the fixed expansion of the head expansion attribute identifier). Through the illustration of the fixed expansion attribute of the first 4 bytes (referring to FIG. 5 and FIG. 6), the expansion is made to carry the LAG information of the multi-homing access information. Wherein, the CItES bit of the Crit of the expansion attribute needs to be set (that is, set as 1), which indicates that the LAG information TLV of the present invention needs the egress-ingress process.

[0048] In the TRILL network, the identifier is represented by the bit of the reserved field or the oplength field in the data message, through carrying the member link information of the multi-homing access in the option of the data message, wherein, the member link information carried by the option includes the link aggregation group number and the RB nickname information of the member in the link aggregation group.

[0049] FIG. 7 is a specific format of the LAG information TLV defined by the present invention, wherein, the APP bit needs to be set as 11 to indicate that it is the expansion needing to be processed by the source and target nodes for the boundary encapsulation and decapsulation; the type is set as a fixed value, such as, 1, to indicate that it is the information expansion of the multi-homing access group; the length indicates the expansion TLV length, and the specific TLV content carries the multi-homing access LAG ID information of 16 bit and the Nickname information of other members in the same multi-homing access group, wherein, the LAG ID is the local LAG link aggregation group number.

[0050] Still in the scene of FIG. 1, the customer side device 1 communicates with the customer side device 3, the two links of the RB1 and the RB2 connecting the customer side device 1 form the LAG binding relationship of the multi-homing access, the MAC1 on the customer side device 1 forms the TRILL encapsulation and carries the non-zero special identifier of which the oplength is 2 through the RB1 first, makes the expansion attribute of the first 4 bytes be set through the CItES in the Crit through the option field expansion after the nickname in the TRILL head, to indicate that the expansion only needs the source and target nodes requiring the processing. The expansion TLV type value of the second 4 bytes indicates the carrying of the multi-homing access group information, and the specific TLV content carries the nickname information and the LAG ID information of the group member RB2. The message which carries the special identifier reaches the RB5, the RB5 studies the mapping relationship of the nickname of the RB1 and the MAC1, and analyzes the nickname value of the RB2 carried in the option in the LAG TLV according to the non-zero special identifier at the same time, and alternatively forms the mapping relationship of the nickname of the RB2 and the MAC1. And when receiving the TRILL carrying the head encapsulation identifier of the special identifier downloaded from the LAG member link interface of the RB2, the mapping relationship of the MAC1 and the nickname of the RB1, and stores the mapping relationship of the MAC1 and the nickname of the RB2 or updates the aging time of the mapping table entry from the MAC1 to the RB2 (if the entry is already established) at the same time. Therefore, two nickname mapping entries of the MAC1 are formed on the RB5, to make the MAC/VLAN not skip again.

[0051] The application example two: the production, update and deletion of the table entry of the specific implementation method one of the TRILL technology of the present invention.

[0052] The two table entries described in the embodiment one are formed when issued to the forwarding plane chip, and when the chip has the ability of mapping multiple table entries of the same MAC/VLAN at the same time, these two table entries are issued at the same time, so that it realizes the load sharing by forming different head encapsulations for different flows of the same MAC/VLAN of the forwarding plane. Particularly, when the multiple flows of a certain target MAC address are received, if the target MAC address is corresponding to the multiple overlay network device identifiers in the same link aggregation group, then different encapsulations are performed on different flows according to the multiple overlay network device identifiers, and sent to the target MAC address.

[0053] When there is the message carrying the multi-homing access identifier, described by the above-mentioned embodiment, being sent to the RB5 ceaselessly, it is maintained and updated by using the current MAC refreshing mechanism. The update of the table entry is performed on the RB5 according to the message receiving situation related to the MAC; and when there is no MAC message being sent on the RB5, after the aging time is overdue, the table entry is made to be aged and deleted. And if there is also a carrying notification of the mapping relationship of the control plane at the same time, and if the priority of the control plane notification is higher than the locally studied priority, then the corresponding mapping relationship according to the control plane notification performs the refreshing and updating.

[0054] And when the message is decapsulated on the RB5, if it is found that there is the message with the MAC1 carrying the multi-homing special identifier coming over, and there is also the message not carrying the special identifier coming over, then it is processed according to the conflict situation. The conflict situation is processed as follows: when the messages of the same MAC1 have the sent out option expansion message of the multi-homing access identifier, and also have the sent out common messages, then the remote end boundary RB thinks that the multi-homing relationship makes mistakes when analyzing the message; and the mapping relationship of the MAC 1 of the remote end node with the nicknames of the RB 1 and the RB2 formed by the multi-homing access relationship of the option expansion can be covered and refreshed by the mapping relationship of the MAC and the nickname in the common message at the same time.

[0055] When the MAC1 is moved from the RB1 and the RB2 to the customer side device 2 under the RB3, the RB4 and the RB6, because of the update of the group member relationship in the TRILL expansion head option in the new multi-homing access link group, if now it carries the LAG ID and the nickname information of other group members at the same time, then it needs the expansion length of two 4 bytes. When the remote end RB5 studies the special TRILL encapsulation message, the mapping of the MAC1 to the RB3, the RB4 and the RB6 will be formed, and the original table entry of the MAC1 and the RB1 and the RB2 will be deleted meanwhile.

[0056] And when moving to the node without the LAG binding and the node sends out the common TRILL encapsulation message without the special identifier, as the conflict situation processing described under the present embodiment, the following common TRILL encapsulation message can cover the several-for-one nickname and MAC table entry which is formed originally.

[0057] When the member link within the multi-homing access group fails, for example, if there are originally two nodes as the multi-homing members exist, as shown in FIG. 1, when the access link of the customer side device 1 of the RB1 therein fails, then the RB2 selects to forward according to the common message after feeling the access of this member of the member group fails, and the new mapping table is generated according to the conflict situation on the RB5, to make the flow coming over from the remote end forward normally only through the RB2. And if there are three original nodes as the LAG members exist, when one member link fails, then after the normal forwarding member device feels the failure, the failed member will be deleted in the carried option expansion information, therefore, the remote end node will remove the binding relationship of the MAC and the invalid member after receiving the update flow encapsulation message.

[0058] The application example three: the specific implementation method two of the TRILL technology of the present invention.

[0059] The specific implementation description is as follows: as shown in FIG. 4, when the boundary RB performs the TRILL encapsulation, the MAC skipping problem under the multi-homing access scene is solved through setting the bit in the two bits reserved. For example, these two bits are set as 01 to indicate that the terminal accesses through the LAG link; still in the scene of FIG. 1, the customer side device 1 communicates with the the customer side device 3, the two links of the RB1 and the RB2 connecting to the customer side device 1 form the LAG binding relationship, and the MAC1 on the customer side device 1 forms the TRILL encapsulation carrying the special identifier to reach the RB5 through the RB1 first, and the RB5 studies the mapping relationship of the nickname of the RB1 and the MAC1; according to the special identifier, when there is the MAC flow, carrying the special identifier to the customer side device 3 under the RB5, of the MAC1 coming over from the RB2 to be forwarded to the RB5, the mapping relationship of the MAC1 to the RB2 is formed when keeping the original mapping relationship of the nickname and the MAC1 of the RB1 at the same time, therefore, two mapping entries of the nickname of the MAC1 are formed on the RB5.

[0060] The application example four: the production, update and deletion of the table entry of the specific implementation method two of the TRILL technology of the present invention.

[0061] The table entry maintenance is mainly the same as described in the application example two, however, when the moving happens to other multi-homing access binding interfaces, for example, when the MAC1 moves from the RB1 and the RB2 to the customer side device 2 under the RB3, the RB4 and the RB6, because the LAG bit is also set, if it is also the 01 identifier which is carried, then the mapping of the MAC1 to the RB1, the RB2, the RB3, the RB4 and the RB6 will be formed on the remote end RB5 at the same time; however, the moving has already happened at this moment and the RB1 and the RB2 cannot reach the MAC1 any more, therefore, when it is required to forward through the original message on the moved RB3, RB4 or RB6, the two bits of the special RESV fields are set as, such as, 10, which indicates that there is the moving happened; the original formed table entries of the MAC1 to the RB1 and the RB2 are deleted, and the newest mapping table entry is studied. The message sent out subsequently carries the 01 of the RB3 or the RB4 or the RB6 to indicate that the message accessed by the LAG continues to be transmitted according to the LAG procedure.

[0062] The application example five: the specific implementation application description one of the TRILL network of the present invention.

[0063] Then when there are the different application flow messages on the remote-end such as RB5 to be sent from the MAC2 to the MAC1, different Nickname encapsulation can be formed according to the table entry sent from the chip, so that load sharing is formed for the remote end sending the messages to the customer side device at the multi-homing link side as well. And when it is realized with the method one, if the message is sent to the RB5 only through the RB1 in FIG. 1, but because it carries the member information RB2, the source MACs carried in the message can be reached through by the RB1 and RB2 by the RB5 at the same time only according to the message coming over from the RB1. When multiple flow reaching the MAC1 come over from the remote-end, different Nicknames can be encapsulated to realize the load sharing of the same MAC/VLAN at the network side. When the message of a certain target MAC address is received, and if the target MAC address is corresponding to multiple overlay network device identifiers in the same link aggregation group, then the message of the target MAC address is sent according to the multiple overlay network device identifiers.

[0064] When the customer side device is one Hypervisor (management program), as shown in FIG. 3, which carries the encapsulated message, such as, the VXLAN, sent to the edge device, and the message received by the edge device will be continuously encapsulated only according to the outer layer MAC. By using the method of the present invention, the load sharing of the flow of different VMs can be realized between the RB1 and the RB2 under the Hypervisor.

[0065] The application example six: the specific implementation description of the SPB network of the embodiment of the present invention.

[0066] In the overlay encapsulation of the SPB network shown in FIG. 8, because the coming CMAC will form the mapping relationship with the BMAC, in order to solve the current carrying problem of the multi-homing access, the corresponding expansion can be performed through setting the resv1 field in FIG. 9. The identifier is expressed through the bit of the reserved field, and through carrying the member link information, having the link aggregation group number and the RB nickname information of the member in the link aggregation group, of the multi-homing access in the reserved field of the data message, so that it enables the realization of the study of the mapping relationship from the same one customer media access control address CMAC to multiple backbone media access control addresses BMAC in the remote end edge device in the SPB network as described and shown in the above TRILL when there is the multi-homing access, to solve the skipping problem of the MAC when there is the multi-homing access of the SPB network and realize the load sharing of the returning message of the remote end edge device at the same time.

[0067] The application example seven: the specific implementation description.

[0068] When the abilities of the chip in the network on different devices are different for the entry number of the same MAC/VLAN mapping, for example, the existing chip can only support one mapping on default, and when there is the demand on the load sharing of the returning message, the chip is required to expand to support multiple mappings; and it will not bring the compatibility problem by uniformly adopting the above-mentioned description method. When the multi-homing access is performed on the data center network, the deployment scheme should be unified; if the above-mentioned description method is confirmed, then the encapsulation notification of the data plane is uniformly adopted; when the receiving side of the remote end analyzes the message carrying the special identifier, it is sent to the CPU for processing according to the special identifier, and forms the multiple mapping entries associated with the MAC which carries the special identifier at the same time. If the chip can only support the existence of one table entry of the same MAC, it is issued according to one fixed mapping entry therein which is issued and selected by its own algorithm finally, to solve the MAC skipping problem. If the chip can support multiple mapping table entries of the same MAC at the same time and certainly if the hardware study can be processed at the same time, there is no need to send to the software for processing, and multiple mapping entries are issued at the same time, therefore solving the MAC skipping problem and also making the returning message of the remote end to form the load sharing correspondingly.

[0069] When there are the boundaries of more than two nodes forming the LAG binding, the present invention can also be covered. And when the overlay encapsulation and decapsulation operates on the terminal, it can also be expanded and supported. The realization of the multi-homing access of other overlay networks can be realized according to this as well.

[0070] FIG. 10 is a structure diagram of the edge device embodiment provided by the present invention. As shown in FIG. 10, the edge device is called the first edge device and applied in an overlay network, including the follows.

[0071] An encapsulation apparatus 1001 is configured to: when a data message is received from an interface bounded with multi-homing access, set an identifier indicating that the data message is from multi-homing access in overlay encapsulation performed on the data message; and
a sending apparatus is configured to 1002: send the data message after the overlay encapsulation to the overlay network.

[0072] Wherein, the overlay network is a Transparent Interconnection over Lots of Links (TRILL) network or a shortest path bridge (SPB) network.

[0073] Wherein, in the TRILL network, the identifier is represented through setting a particular bit of a reserved field; or, the identifier is represented by an expanded option indicated by a non-zero expansion of an Oplength field.

[0074] Wherein, the option further carries member link information of the multi-homing access through an expansion type - length - value (TLV).

[0075] Wherein, in the SPB network, the identifier is represented through setting a particular bit of a reserved field.

[0076] In addition, the present invention further provides an egress edge device, which is called the second edge device and applied in an overlay network, including the follows.

[0077] A receiving apparatus is configured to: receive a data message carrying overlay encapsulation sent by an ingress edge device; and
a storage apparatus is configured to: after the data message sent by the edge device is received, if data messages sent by multiple edge devices carry an identifier indicating from multi-homing access and internal layer source MACs are same, then store a mapping relationship between one the multiple overlay network device identifiers in the same link aggregation group to which the data message belongs and the same MAC address.

[0078] Wherein, the overlay network is the TRILL network or the SPB network.

[0079] Wherein, in the TRILL network, a mapping relationship of multiple overlay network device identifiers in one same link aggregation group and one same MAC address refers to a mapping relationship of multiple route network bridge nicknames and the one same MAC address; and
in the SPB network, the mapping relationship of multiple overlay network device identifiers in one same link aggregation group and one same MAC address refers to a mapping relationship of multiple backbone media access control addresses and one same customer media access control address.

[0080] Wherein, the edge device further includes:

a processing apparatus, configured to: connected to the storage apparatus, when the received messages of the same MAC address have a message carrying the identifier, and also have a common message not carrying the identifier, then delete an originally studied mapping relationship of the MAC address and the multiple network device identifiers, and study and store according to the mapping relationship of the MAC address and the network device in the common message.



[0081] In addition, the present invention provides a message processing system in a multi-homing access overlay network, including a first edge device and a second edge device.

[0082] It can be understood by those skilled in the art that all or part of steps in the above-mentioned embodiment can be fulfilled by the computer program flow, and the computer program flow can be stored in a computer readable storage medium, and the computer program flow is executed on the corresponding hardware platform (such as a system, a device, an apparatus, a component, etc.), and includes one of the steps of the method embodiment or its combination when being executed.

[0083] Alternatively, all or part of the steps in the above-mentioned embodiments also can be implemented by the integrated circuits. Those steps can be made into integrated circuit modules one after another respectively, or multiple modules or steps therein are made into a single integrated circuit module for implementation. This way, the present invention is not limit to any specific combination of the hardware and software.

[0084] Each device / function module / function unit in the above-mentioned embodiment can be implemented by the universal calculating apparatus, and they can be integrated in a single calculating apparatus, or distributed in the network made up by a plurality of calculating apparatus.

[0085] Each device / function module / function unit in the above-mentioned embodiment can be stored in a computer readable storage medium when it is implemented in the form of the software function module and is sold or used as an individual product. The above-mentioned computer readable storage medium can be a read only memory, a magnetic disk or an optical disk, etc.

[0086] The above description is only the specific embodiment of the present invention and is not intended to limit the protection scope of the present invention. Those modifications and replacements which can be thought out easily by those skilled in the art in the technical scope disclosed by the present invention should be embodied in the protection scope of the present invention. Therefore, the protection scope of the present invention should be based on the protection scope described by the claims.

Industrial Applicability



[0087] The edge device and system embodiments provided by the embodiment of the present invention do not need to the expansion of the specific control plane protocol, while only need to carry the corresponding identifier in the head of the data message, of which the realization principle is simple.


Claims

1. A multi-homing access overlay network message processing method, characterized by comprising:

when receiving a data message from an interface bounded with multi-homing access, an edge device setting an identifier indicating that the data message is from multi-homing access in the data message, then performing overlay encapsulation on the data message (201), and sending the data message on which the overlay encapsulation is performed to the overlay network (202);

after a remote end edge device receives the data message sent by the edge device, if data messages sent by multiple edge devices carry the identifier indicating that the data messages are from the multi-homing access and internal layer source MACs are same, then storing a mapping relationship between one same MAC address and multiple overlay network device identifiers in the data messages (203).


 
2. The method according to claim 1, further comprising:

when the messages of the same MAC address received by the remote end edge device comprises a message carrying the identifier, and also a common message not carrying the identifier, then deleting an originally studied mapping relationship of the MAC address and the multiple network device identifiers, and studying and storing a mapping relationship of the MAC address and the network device in the common message.


 
3. The method according to claim 1 or 2, wherein, the overlay network is a Transparent Interconnection over Lots of Links (TRILL) network or a shortest path bridge (SPB) network.
 
4. The method according to claim 3, wherein,
in the TRILL network, a mapping relationship of multiple overlay network device identifiers in one same link aggregation group and one same MAC address refers to a mapping relationship of multiple route network bridge nicknames and the one same MAC address; and
in the SPB network, the mapping relationship of multiple overlay network device identifiers in one same link aggregation group and one same MAC address refers to a mapping relationship of multiple backbone media access control addresses and one same customer media access control address.
 
5. The method according to claim 3, wherein, in the TRILL network, the identifier is represented through a particular bit of a reserved field; or, the identifier is represented by an expanded option indicated by a non-zero expansion of an Oplength field;
wherein, the option further carries member link information of the multi-homing access through an expansion type - length - value (TLV).
 
6. The method according to claim 3, wherein, in the SPB network, the identifier is represented through a particular bit of a reserved field.
 
7. An edge device, applied in a multi-homing access overlay network, characterized by comprising:

an encapsulation apparatus (1001), configured to: when a data message is received from an interface bounded with multi-homing access, set an identifier indicating that the data message is from multi-homing access in the data message, then perform overlay encapsulation on the data message; and

a sending apparatus(1002), configured to: send the data message on which the overlay encapsulation is performed to the overlay network.


 
8. The edge device according to claim 7, wherein, the overlay network is a Transparent Interconnection over Lots of Links (TRILL) network or a shortest path bridge (SPB) network.
 
9. The edge device according to claim 8, wherein,
in the TRILL network, a mapping relationship of multiple overlay network device identifiers in one same link aggregation group and one same MAC address refers to a mapping relationship of multiple route network bridge nicknames and the one same MAC address; and
in the SPB network, the mapping relationship of multiple overlay network device identifiers in one same link aggregation group and one same MAC address refers to a mapping relationship of multiple backbone media access control addresses and one same customer media access control address;

wherein, in the SPB network, the encapsulation apparatus (1001) is configured to set the identifier which is represented through a particular bit of a reserved field.


 
10. The edge device according to claim 8, wherein, in the TRILL network, the identifier is represented through a particular bit of a reserved field, or an expanded option indicated by a non-zero expansion of an Oplength field; wherein, the option further carries member link information of the multi-homing access through an expansion type - length - value (TLV).
 
11. An egress edge device, applied in a multi-homing access overlay network, characterized by comprising:

a receiving apparatus, configured to: receive a data message carrying overlay encapsulation sent by an ingress edge device; and

a storage apparatus, configured to: after the data message sent by the ingress edge device is received, if data messages sent by multiple ingress edge devices carry an identifier indicating that the data message is from multi-homing access and internal layer source MACs are same, then store a mapping relationship between one same MAC address and multiple overlay network device identifiers in the data messages.


 
12. The egress edge device according to claim 11, wherein, the overlay network is a Transparent Interconnection over Lots of Links (TRILL) network or a shortest path bridge (SPB) network.
 
13. The egress edge device according to claim 12, wherein,
in the TRILL network, a mapping relationship of multiple overlay network device identifiers in one same link aggregation group and one same MAC address refers to a mapping relationship of multiple route network bridge nicknames and the one same MAC address; and
in the SPB network, the mapping relationship of multiple overlay network device identifiers in one same link aggregation group and one same MAC address refers to a mapping relationship of multiple backbone media access control addresses and one same customer media access control address.
 
14. The egress edge device according to claim 11, wherein, the egress edge device further comprises:

a processing apparatus, configured to: connect to the storage apparatus, and when the received messages of the one same MAC address have both a message carrying the identifier and a common message not carrying the identifier, then delete an originally studied mapping relationship of the MAC address and the multiple network device identifiers, and study and store according to a mapping relationship of the MAC address and the network device in the common message.


 
15. A system for processing a message in a multi-homing access overlay network, characterized by comprising an edge device described according to any one of claims 7 to 10 and an egress edge device described according to any one of claims 11 to 14.
 


Ansprüche

1. Nachrichtenverarbeitungsverfahren in einem Multi-Homing Access Overlay-Netzwerk, dadurch gekennzeichnet, dass es Folgendes umfasst:

beim Empfangen einer Datennachricht von einer Schnittstelle, die mit einem Multi-Homing-Zugriff begrenzt ist, setzt eine Netzwerkrandkomponente einen Identifikator, der anzeigt, dass die Datennachricht von dem Multi-Homing-Zugriff stammt, in der Datennachricht, führt dann eine Overlay-Verkapselung an der Datennachricht (201) aus und sendet die Datennachricht, an der die Overlay-Verkapselung ausgeführt wurde, an das Overlay-Netzwerk (202);

nachdem eine am entfernten Ende befindliche Netzwerkrandkomponente die durch die Netzwerkrandkomponente gesendete Datennachricht empfangen hat, und falls Datennachrichten, die durch mehrere Netzwerkrandkomponenten gesendet wurden, den Identifikator transportieren, der anzeigt, dass die Datennachrichten von dem Multi-Homing-Zugriff stammen, und Internal Layer Source-MACs dieselben sind, wird eine Abbildungsbeziehung zwischen einer einzelnen selben MAC-Adresse und mehreren Overlay-Netzwerkkomponenten-Identifikatoren in den Datennachrichten (203) gespeichert.


 
2. Verfahren nach Anspruch 1, das des Weiteren Folgendes umfasst:

wenn die Nachrichten derselben MAC-Adresse, die durch die am entfernten Ende befindliche Netzwerkrandkomponente empfangen werden, eine Nachricht umfassen, die den Identifikator transportiert, und außerdem eine gemeinsame Nachricht, die den Identifikator nicht transportiert, umfassen, dann Löschen einer ursprünglich untersuchten Abbildungsbeziehung der MAC-Adresse und der mehreren Netzwerkkomponenten-Identifikatoren, und Untersuchen und Speichern einer Abbildungsbeziehung der MAC-Adresse und der Netzwerkkomponente in der gemeinsamen Nachricht.


 
3. Verfahren nach Anspruch 1 oder 2, wobei das Overlay-Netzwerk ein Transparent Interconnection over Lots of Links (TRILL)-Netzwerk oder ein Shortest Path Bridge (SPB)-Netzwerk ist.
 
4. Verfahren nach Anspruch 3,
wobei sich in dem TRILL-Netzwerk eine Abbildungsbeziehung mehrerer Overlay-Netzwerkkomponenten-Identifikatoren in einer selben Link-Aggregationsgruppe und einer selben MAC-Adresse auf eine Abbildungsbeziehung mehrerer Routennetzwerkbrücken-Nicknames und die eine selbe MAC-Adresse bezieht; und
wobei sich in dem SPB-Netzwerk die Abbildungsbeziehung mehrerer Overlay-Netzwerkkomponenten-Identifikatoren in einer selben Link-Aggregationsgruppe und einer selben MAC-Adresse auf eine Abbildungsbeziehung mehrerer Backbone-Media Access Control-Adressen und eine selbe Customer Media Access Control-Adresse bezieht.
 
5. Verfahren nach Anspruch 3, wobei
in dem TRILL-Netzwerk der Identifikator durch ein bestimmtes Bit eines reservierten Feldes repräsentiert wird; oder der Identifikator durch eine erweiterte Option repräsentiert wird, die durch eine Nichtnull-Erweiterung eines Oplength-Feldes angezeigt wird; und
wobei die Option des Weiteren Element-Link-Informationen des Multi-Homing-Zugriffs durch einen Erweiterungs-Typ-Länge-Wert (Type Length Value, TLV) transportiert.
 
6. Verfahren nach Anspruch 3, wobei in dem SPB-Netzwerk der Identifikator durch ein bestimmtes Bit eines reservierten Feldes repräsentiert wird.
 
7. Netzwerkrandkomponente, die in einem Multi-Homing Access Overlay-Netzwerk angewendet wird, dadurch gekennzeichnet, dass sie Folgendes umfasst:

eine Verkapselungsvorrichtung (1001), die für Folgendes konfiguriert ist: wenn eine Datennachricht von einer Schnittstelle empfangen wird, die mit einem Multi-Homing-Zugriff begrenzt ist, Setzen eines Identifikators, der anzeigt, dass die Datennachricht von einem Multi-Homing-Zugriff stammt, in der Datennachricht, und dann Ausführen einer Overlay-Verkapselung an der Datennachricht; und

eine Sendevorrichtung (1002), die für Folgendes konfiguriert ist: Senden der Datennachricht, an der die Overlay-Verkapselung ausgeführt wurde, an das Overlay-Netzwerk.


 
8. Netzwerkrandkomponente nach Anspruch 7, wobei das Overlay-Netzwerk ein Transparent Interconnection over Lots of Links (TRILL)-Netzwerk oder ein Shortest Path Bridge (SPB)-Netzwerk ist.
 
9. Netzwerkrandkomponente nach Anspruch 8,
wobei sich in dem TRILL-Netzwerk eine Abbildungsbeziehung mehrerer Overlay-Netzwerkkomponenten-Identifikatoren in einer selben Link-Aggregationsgruppe und einer selben MAC-Adresse auf eine Abbildungsbeziehung mehrerer Routennetzwerkbrücken-Nicknames und die eine selbe MAC-Adresse bezieht; und
wobei sich in dem SPB-Netzwerk die Abbildungsbeziehung mehrerer Overlay-Netzwerkkomponenten-Identifikatoren in einer selben Link-Aggregationsgruppe und einer selben MAC-Adresse auf eine Abbildungsbeziehung mehrerer Backbone-Media Access Control-Adressen und eine selbe Customer Media Access Control-Adresse bezieht.
wobei in dem SPB-Netzwerk die Verkapselungsvorrichtung (1001) dafür konfiguriert ist, den Identifikator zu setzen, der durch ein bestimmtes Bit eines reservierten Feldes repräsentiert wird.
 
10. Netzwerkrandkomponente nach Anspruch 8, wobei in dem TRILL-Netzwerk der Identifikator durch ein bestimmtes Bit eines reservierten Feldes oder eine erweiterte Option, die durch eine Nicht-null-Erweiterung eines Oplength-Feldes angezeigt wird, repräsentiert wird; wobei die Option des Weiteren Element-Link-Informationen des Multi-Homing-Zugriffs durch einen Erweiterungs-Typ-Länge-Wert (Type Length Value, TLV) transportiert.
 
11. Austritts-Netzwerkrandkomponente, die in einem Multi-Homing Access Overlay-Netzwerk angewendet wird, dadurch gekennzeichnet, dass sie Folgendes umfasst:

eine Empfangsvorrichtung, die für Folgendes konfiguriert ist: Empfangen einer Datennachricht, die eine Overlay-Verkapselung transportiert, die durch eine Eintritts-Netzwerkrandkomponente gesendet wurde; und

eine Speichervorrichtung, die für Folgendes konfiguriert ist: nachdem die durch die Eintritts-Netzwerkrandkomponente gesendete Datennachricht empfangen wurde, und falls durch mehrere Eintritts-Netzwerkrandkomponenten gesendete Datennachrichten einen Identifikator transportieren, der anzeigt, dass die Datennachricht von einem Multi-Homing-Zugriff stammt, und Internal Layer Source-MACs dieselben sind, Speichern einer Abbildungsbeziehung zwischen einer selben MAC-Adresse und mehreren Overlay-Netzwerkkomponenten-Identifikatoren in den Datennachrichten.


 
12. Austritts-Netzwerkrandkomponente nach Anspruch 11, wobei das Overlay-Netzwerk ein Transparent Interconnection over Lots of Links (TRILL)-Netzwerk oder ein Shortest Path Bridge (SPB)-Netzwerk ist.
 
13. Austritts-Netzwerkrandkomponente nach Anspruch 12,
wobei sich in dem TRILL-Netzwerk eine Abbildungsbeziehung mehrerer Overlay-Netzwerkkomponenten-Identifikatoren in einer selben Link-Aggregationsgruppe und einer selben MAC-Adresse auf eine Abbildungsbeziehung mehrerer Routennetzwerkbrücken-Nicknames und die eine selbe MAC-Adresse bezieht; und
wobei sich in dem SPB-Netzwerk die Abbildungsbeziehung mehrerer Overlay-Netzwerkkomponenten-Identifikatoren in einer selben Link-Aggregationsgruppe und einer selben MAC-Adresse auf eine Abbildungsbeziehung mehrerer Backbone-Media Access Control-Adressen und eine selbe Customer Media Access Control-Adresse bezieht.
 
14. Austritts-Netzwerkrandkomponente nach Anspruch 11, wobei die Austritts-Netzwerkrandkomponente des Weiteren Folgendes umfasst:

eine Verarbeitungsvorrichtung, die für Folgendes konfiguriert ist: Verbinden mit der Speichervorrichtung, und wenn die empfangenen Nachrichten der einen selben MAC-Adresse sowohl eine Nachricht haben, die den Identifikator transportiert, als auch eine gemeinsame Nachricht haben, die den Identifikator nicht transportiert, dann Löschen einer ursprünglich untersuchten Abbildungsbeziehung der MAC-Adresse und der mehreren Netzwerkkomponenten-Identifikatoren und Untersuchen und Speichern gemäß einer Abbildungsbeziehung der MAC-Adresse und der Netzwerkkomponente in der gemeinsamen Nachricht.


 
15. System zum Verarbeiten einer Nachricht in einem Multi-Homing Access Overlay-Netzwerk, dadurch gekennzeichnet, dass es eine Netzwerkrandkomponente nach einem der Ansprüche 7 bis 10 und eine Austritts-Netzwerkrandkomponente nach einem der Ansprüche 11 bis 14 umfasst.
 


Revendications

1. Procédé de traitement de message dans un réseau superposé à accès multi-hébergement, caractérisé en ce qu'il comprend :

lors de la réception d'un message de données en provenance d'une interface délimitée avec un accès multi-hébergement, un dispositif de frontière règle un identifiant indiquant que le message de données provient d'un accès multi-hébergement dans le message de données, puis effectue une encapsulation de superposition sur le message de données (201), et envoie le message de données sur lequel l'encapsulation de superposition est effectuée au réseau superposé (202) ;

après qu'un dispositif de frontière distant a reçu le message de données envoyé par le dispositif de frontière, si des messages de données envoyés par de multiples dispositifs de frontière portent l'identifiant indiquant que les messages de données proviennent de l'accès multi-hébergement et des MAC de source de couche interne sont identiques, alors la mémorisation d'une relation de mappage entre une même adresse MAC et de multiples identifiants de dispositifs de réseau superposé dans les messages de données (203).


 
2. Procédé selon la revendication 1, comprenant en outre :

lorsque les messages de la même adresse MAC reçus par le dispositif de frontière distant comprennent un message portant l'identifiant et un message commun ne portant pas l'identifiant, alors la suppression d'une relation de mappage initialement étudiée de l'adresse MAC et des multiples identifiants de dispositifs de réseau, et l'étude et la mémorisation d'une relation de mappage de l'adresse MAC et du dispositif de réseau dans le message commun.


 
3. Procédé selon la revendication 1 ou 2, dans lequel le réseau superposé est un réseau d'interconnexion transparente sur de nombreuses liaisons (TRILL) ou un réseau de pont de trajet le plus court (SPB).
 
4. Procédé selon la revendication 3, dans lequel
dans le réseau TRILL, une relation de mappage de multiples identifiants de dispositifs de réseau superposé dans un même groupe d'agrégation de liaisons et une même adresse MAC fait référence à une relation de mappage de multiples surnoms de pont de réseau d'acheminement et la même adresse MAC ; et
dans le réseau SPB, la relation de mappage de multiples identifiants de dispositifs de réseau superposé dans un même groupe d'agrégation de liaisons et une même adresse MAC fait référence à une relation de mappage de multiples adresses de commande d'accès au support de dorsale et une même adresse de commande d'accès au support de client.
 
5. Procédé selon la revendication 3, dans lequel, dans le réseau TRILL, l'identifiant est représenté par l'intermédiaire d'un bit particulier d'un champ réservé ; ou l'identifiant est représenté par une option étendue indiquée par une expansion non nulle d'un champ Oplength ;
dans lequel l'option porte en outre des informations de liaison de membre de l'accès multi-hébergement par l'intermédiaire d'un type - longueur - valeur (TLV) d'expansion.
 
6. Procédé selon la revendication 3, dans lequel, dans le réseau SPB, l'identifiant est représenté par l'intermédiaire d'un bit particulier d'un champ réservé.
 
7. Dispositif de frontière, appliqué dans un réseau superposé à accès multi-hébergement, caractérisé en ce qu'il comprend :

un appareil d'encapsulation (1001), configuré pour : lors de la réception d'un message de données en provenance d'une interface délimitée avec un accès multi-hébergement, le réglage d'un identifiant indiquant que le message de données provient d'un accès multi-hébergement dans le message de données, puis l'exécution d'une encapsulation de superposition sur le message de données ; et

un appareil d'envoi (1002) configuré pour : l'envoi du message de données sur lequel l'encapsulation de superposition est effectuée au réseau superposé.


 
8. Dispositif de frontière selon la revendication 7, dans lequel le réseau superposé est un réseau d'interconnexion transparente sur de nombreuses liaisons (TRILL) ou un réseau de pont de trajet le plus court (SPB).
 
9. Dispositif de frontière selon la revendication 8, dans lequel
dans le réseau TRILL, une relation de mappage de multiples identifiants de dispositifs de réseau superposé dans un même groupe d'agrégation de liaisons et une même adresse MAC fait référence à une relation de mappage de multiples surnoms de pont de réseau d'acheminement et la même adresse MAC ; et
dans le réseau SPB, la relation de mappage de multiples identifiants de dispositifs de réseau superposé dans un même groupe d'agrégation de liaisons et une même adresse MAC fait référence à une relation de mappage de multiples adresses de commande d'accès au support de dorsale et une même adresse de commande d'accès au support de client ;
dans lequel, dans le réseau SPB, l'appareil d'encapsulation (1001) est configuré pour le réglage de l'identifiant qui est représenté par l'intermédiaire d'un bit particulier d'un champ réservé.
 
10. Dispositif de frontière selon la revendication 8, dans lequel, dans le réseau TRILL, l'identifiant est représenté par l'intermédiaire d'un bit particulier d'un champ réservé ou par une option étendue indiquée par une expansion non nulle d'un champ Oplength ; dans lequel l'option porte en outre des informations de liaison de membre de l'accès multi-hébergement par l'intermédiaire d'un type - longueur - valeur (TLV) d'expansion.
 
11. Dispositif de frontière de sortie, appliqué dans un réseau superposé à accès multi-hébergement, caractérisé en ce qu'il comprend :

un appareil de réception configuré pour : la réception d'un message de données portant une encapsulation superposée envoyé par un dispositif de frontière d'entrée ; et

un appareil de mémorisation configuré pour : après la réception du message de données envoyé par le dispositif de frontière d'entrée, si des messages de données envoyés par de multiples dispositifs de frontière d'entrée portent un identifiant indiquant que les messages de données proviennent de l'accès multi-hébergement et les MAC de source de couche interne sont identiques, alors la mémorisation d'une relation de mappage entre une même adresse MAC et de multiples identifiants de dispositifs de réseau superposé dans les messages de données.


 
12. Dispositif de frontière de sortie selon la revendication 11, dans lequel le réseau superposé est un réseau d'interconnexion transparente sur de nombreuses liaisons (TRILL) ou un réseau de pont de trajet le plus court (SPB).
 
13. Dispositif de frontière de sortie selon la revendication 12, dans lequel
dans le réseau TRILL, une relation de mappage de multiples identifiants de dispositifs de réseau superposé dans un même groupe d'agrégation de liaisons et une même adresse MAC fait référence à une relation de mappage de multiples surnoms de pont de réseau d'acheminement et la même adresse MAC ; et
dans le réseau SPB, la relation de mappage de multiples identifiants de dispositifs de réseau superposé dans un même groupe d'agrégation de liaisons et une même adresse MAC fait référence à une relation de mappage de multiples adresses de commande d'accès au support de dorsale et une même adresse de commande d'accès au support de client.
 
14. Dispositif de frontière de sortie selon la revendication 11, dans lequel le dispositif de frontière de sortie comprend en outre :

un appareil de traitement configuré pour : se connecter à l'appareil de mémorisation et, lorsque les messages reçus de la même adresse MAC ont un message portant l'identifiant et un message commun ne portant pas l'identifiant, alors supprimer une relation de mappage initialement étudiée de l'adresse MAC et des multiples identifiants de dispositifs de réseau, et étudier et mémoriser une relation de mappage de l'adresse MAC et du dispositif de réseau dans le message commun.


 
15. Système de traitement d'un message dans un réseau superposé à accès multi-hébergement, caractérisé en ce qu'il comprend un dispositif de frontière décrit selon l'une quelconque des revendications 7 à 10 et un dispositif de frontière de sortie décrit selon l'une quelconque des revendications 11 à 14.
 




Drawing

















Cited references

REFERENCES CITED IN THE DESCRIPTION



This list of references cited by the applicant is for the reader's convenience only. It does not form part of the European patent document. Even though great care has been taken in compiling the references, errors or omissions cannot be excluded and the EPO disclaims all liability in this regard.

Patent documents cited in the description