WO2008008556A1 - Ethernet layer 2 protocol packet switching - Google Patents

Ethernet layer 2 protocol packet switching Download PDF

Info

Publication number
WO2008008556A1
WO2008008556A1 PCT/US2007/060775 US2007060775W WO2008008556A1 WO 2008008556 A1 WO2008008556 A1 WO 2008008556A1 US 2007060775 W US2007060775 W US 2007060775W WO 2008008556 A1 WO2008008556 A1 WO 2008008556A1
Authority
WO
WIPO (PCT)
Prior art keywords
tag
packet
protocol
frame
network
Prior art date
Application number
PCT/US2007/060775
Other languages
French (fr)
Inventor
Robert W. Klessig
Vijayakumar Raghavendran
Muralidhara R. Basavaraju
Original Assignee
Cisco Technology, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cisco Technology, Inc. filed Critical Cisco Technology, Inc.
Priority to EP07756385.6A priority Critical patent/EP2041929B1/en
Priority to CN200780026336.3A priority patent/CN101491029B/en
Publication of WO2008008556A1 publication Critical patent/WO2008008556A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/66Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • H04L12/4645Details on frame tagging
    • H04L12/465Details on frame tagging wherein a single frame includes a plurality of VLAN tags
    • H04L12/4654Details on frame tagging wherein a single frame includes a plurality of VLAN tags wherein a VLAN tag represents a customer VLAN, e.g. C-Tag
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • H04L12/4645Details on frame tagging
    • H04L12/465Details on frame tagging wherein a single frame includes a plurality of VLAN tags
    • H04L12/4658Details on frame tagging wherein a single frame includes a plurality of VLAN tags wherein a VLAN tag represents a service provider backbone VLAN, e.g. B-Tag, S-Tag
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • H04L12/467Arrangements for supporting untagged frames, e.g. port-based VLANs

Definitions

  • This disclosure relates generally to digital computer network technology, and more particularly, improved Ethernet services.
  • Packet-switched describes the type of network in which relatively small units of data called packets are routed through a network based on the destination address contained within each packet. Breaking communication down into packets allows the same data path to be shared among many users in the network. This type of communication between sender and receiver is known as connectionless (rather than dedicated). Most traffic over the Internet uses packet switching and the Internet is basically a connectionless network.
  • FIG. IA is a diagram illustrative of an Ethernet LAN using a hub.
  • FIG. IB is a diagram illustrative of an Ethernet LAN using an Ethernet switch.
  • FIG. 2A is a diagram illustrating how VLAN tags are inserted inside an untagged Ethernet frame to create a tagged Ethernet frame in accordance with IEEE 802. IQ.
  • FIG. 2B is a diagram illustrating a Q-in-Q tagged Ethernet frame.
  • FIG. 3 is a diagram illustrating a network suitable for use with embodiments of the invention.
  • FIG.4 is a diagram illustrating a network portion that is suitable for use with embodiments of the invention.
  • FIG. 5 is a diagram illustrating a method of implementing anN:l VLAN scheme according to some embodiments of the invention.
  • a method includes assigning a Provider Virtual Local Area Network tag (S-TAG) and an IEEE 802.1 Q tag header (C-TAG) to a group of ports to implement a N: 1 Virtual Local Area Network (VLAN) allocation scheme, the group of ports included in an access node that communicatively connects a Customer Edge (CE) device to a Provider Edge (PE) device.
  • the method further includes receiving a frame from the CE device, the frame containing a Layer 2 (L2) protocol, packet, and switching the frame based upon the S-TAG and the C-TAG.
  • S-TAG Provider Virtual Local Area Network tag
  • C-TAG IEEE 802.1 Q tag header
  • An apparatus includes an access node, the access node including ports, the access node operable to perform downlink switching based upon a unique Provider Virtual Local Area Network tag (S-TAG) and a unique IEEE 802.1 Q tag header (C-TAG) that is assigned to each port.
  • S-TAG Provider Virtual Local Area Network tag
  • C-TAG unique IEEE 802.1 Q tag header
  • logic may be encoded in one or more tangible media for execution and when executed may be operable to insert a tag into a frame that is transmitted from a Customer Edge (CE) device, the tag including a Provider Virtual Local Area Network tag (S-TAG) and a IEEE 802.1 Q tag header (C-TAG), and perform downlink switching based upon the S-TAG and the C-TAG.
  • CE Customer Edge
  • S-TAG Provider Virtual Local Area Network tag
  • C-TAG IEEE 802.1 Q tag header
  • a Media Access Control (MAC) address is the unique hexadecimal serial number assigned to an Ethernet network device to identify it on the network. With Ethernet devices, this address can be permanently set at the time of manufacture or configured during installation. Each network device has at least one unique MAC address, so that it will be able to receive only the frames that were sent to it. IfMAC addresses were not unique, there would be no way to distinguish between two stations.
  • MAC Media Access Control
  • NICs Network Interface Cards
  • routers, bridges, and switches may have multiple MAC addresses.
  • Network devices with multiple MAC addresses typically have a MAC address for each port on the network device.
  • Ethernet uses variable-length frames of data to transmit information from a source to one or more destinations. Every Ethernet frame has two fields defined as the source and destination addresses, which indicate the MAC address of the network devices where a frame originated and the MAC address of the network device where the frame is destined, respectively.
  • Ethernet Layer 2 (L2) switching allows frames to be switched in the network based on their MAC address.
  • the switch checks the frame's destination MAC address and, if known, sends the frame to the output port from which it learned the destination MAC.
  • Ethernet L2 switching Two important elements in Ethernet L2 switching are the MAC address and the Virtual Local Area Network (VLAN).
  • IP Internet Protocol
  • L3 Layer 3
  • Ethernet L2 switching references end stations via the MAC address.
  • IP Internet Protocol
  • 3P addresses are assigned by administrators and can be reused in different private networks
  • MAC addresses are supposed to be globally unique, because they are indicative of the hardware itself.
  • MAC addresses are generally not assigned by the network administrator.
  • the MAC addresses can be overwritten or duplicated, but this is not the norm.
  • Ethernet is a broadcast medium. Without the concept of VLANs, a broadcast sent by a station on the Local Area Network (LAN) is sent to all physical segments of the switched LAN.
  • LAN Local Area Network
  • FIG. IA is a diagram illustrative of an Ethernet LAN using a hub, while
  • FIG. IB is a diagram illustrative of an Ethernet LAN using an Ethernet switch.
  • Ethernet hub of FIG. IA all stations Al, A2, Bl, B2 on the LAN share the same physical segment.
  • a 10-Mbps hub for example, allows broadcast and unicast traffic between the stations that share the 10-Mbps bandwidth.
  • the Ethernet switch of FIG. IB allows, for example, each segment a 100-Mbps connection, and it segments the LAN into two logical domains, VLAN 10 and VLAN 20.
  • VLANs are independent of the stations themselves.
  • the VLAN is an allocation by the switch.
  • ports 1 and 2 are allocated to VLAN 10, while ports 3 and 4 are allocated to VLAN 20.
  • the switch tags the traffic with the VLAN assigned to the interface and makes the switching decisions based on that VLAN number. The result is that traffic within a VLAN is isolated from traffic within other VLANs.
  • MAC learning allows the Ethernet switch to learn the MAC addresses of the stations in the network to identify on which port to send the traffic.
  • LAN switches normally keep a MAC learning table (or a bridge table) and a VLAN table.
  • the MAC learning table associates the MACs/VLANs with a given port, and the VLAN table associates the port with a VLAN.
  • a MAC learning table and a VLAN table that are associated with the Ethernet switch of FIG. IB appear at the right side of FIG. IB.
  • the MAC learning table and the VLAN table show that the Ethernet switch has learned the MAC addresses of stations Al, A2, B l, and B2 on ports 1, 2, 4, and 3, respectively. It also shows that ports 1 and 2 are associated with VLAN 10 and ports 3 and 4 are associated with VLAN 20.
  • IEEE 802.1 Q which, is incorporated by reference, defines how an Ethernet frame gets tagged with a VLAN ID. The VLAN ID may be assigned by the switch and not the end station.
  • the switch assigns a VLAN number to a port, and every frame received on that port gets allocated that VLAN ID.
  • the Ethernet switches switch frames between the same VLANs. Traffic between different VLANs is sent to a routing function within the switch itself (if the switch supports L3 forwarding) or an external router.
  • FIG. 2A is a diagram illustrating how VLAN tags are inserted inside an untagged Ethernet frame 200 to create a tagged Ethernet frame 250 in accordance with IEEE 802. IQ.
  • the untagged Ethernet frame 200 includes a destination MAC address 205, a source MAC address 210, a Type field 215, and the data 220.
  • an 802.1Q tag header 225 is inserted between the source MAC address 210 and the Type field 215.
  • the 802. IQ tag header 225 consists of a 2-byte Type field 225a and a 2-byte Tag Control Info (TCI) field 225b.
  • the Type field 225a is set to 0X8100 to indicate an 802. IQ tagged frame.
  • the 3 leftmost bits of TCI field 225b indicates the priority in accordance with
  • the 802. IQ priority field may specify up to eight different priority levels that can be used to offer different levels of service within the network.
  • the 12 rightmost bits of TCI field 225b constitute the VLAN ID field, which allows the assignment of up to 4096 (2 12 ) VLAN numbers to distinguish the different VLAN tagged frames.
  • VLAN stacking that is, to do multiple VLAN tagging to the same Ethernet frame, creating a stack of VLAN IDs. Different entities can then do L2 switching on the different levels of the VLAN stack.
  • This concept of VLAN stacking may conveniently be referred to as "Q-in-Q", which is short for "IEEE 802. IQ in IEEE 802. IQ.”
  • FIG. 2B is a diagram illustrating a conventional Q-in-Q tagged Ethernet frame 270.
  • the Q-in-Q Ethernet frame 270 includes an additional Provider VLAN (PVLAN) tag 260 that is inserted between the source MAC address 210 and the 802.1 Q tag header 225.
  • PVLAN Provider VLAN
  • the PVLAN tag 260 consists of a 2-byte Type field 260a and a 2-byte TCI field 260b.
  • the 802. IQ tag header 225 may be referred to as a C- TAG
  • the PVLAN tag 260 may be referred to as an S-TAG.
  • FIG. 3 is a diagram illustrating an example network 300 that is suitable for use with embodiments of the invention.
  • the network 300 includes a Service Provider (SP) network 305, which may be, for example, a Metro Ethernet Network (MEN).
  • SP Service Provider
  • MEN Metro Ethernet Network
  • a MEN is a computer network based on the Ethernet standard that covers a metropolitan area.
  • the network 300 further includes at least one Provider Equipment (PE) device 310 at the edge of the SP network 305, which is communicatively connected to an access node 315 by an Ethernet uplink 325.
  • PE Provider Equipment
  • the access node 315 may be, for example, a Digital Subscriber Line Access Multiplexer (DSLAM).
  • DSLAM Digital Subscriber Line Access Multiplexer
  • Other networks suitable for use with embodiments of the invention may include more than one access node 315, each of which is communicatively connected to a corresponding PE 310 by its own Ethernet uplink 325.
  • the network 300 also includes a number of Customer Edge (CE) devices 320 that are each communicatively connected to the access node 315 by a link 335.
  • Each of the links 335 may use any transport technology, i.e., Frame Relay, Asynchronous Transfer Mode (ATM), Ethernet VLAN, etc.
  • ATM Asynchronous Transfer Mode
  • each of the CEs 320 is communicatively connected to the PE 310 by its corresponding link 335, the access node 315, and the Ethernet uplink 325, which collectively may be referred to as a Virtual User Network Interface (VUNI). It is desirable for the access node 315 to maintain the Virtual UNI for each ofthe CEs 320.
  • VUNI Virtual User Network Interface
  • a L2 protocol is typically operative.
  • Ethernet Local Management Interface (E-LMI) is one example of such a protocol.
  • the E-LMI protocol allows configuration and status information for the sendees at a UNI of a MEN to be transferred from the MEN to a CE device coupled to the MEN at the UNI. Further details regarding the E-LMI protocol may be found in U.S. Patent Application Ser. No. 10/811,458, which was filed on 26 March 2004, and is hereby incorporated by reference.
  • FIG. 4 is a diagram illustrating an example network portion 400 that is suitable for use with embodiments of the invention.
  • the network portion 400 includes a PE device 410 that is communicatively connected to a DSLAM 430 by an Ethernet uplink 420.
  • the DSLAM 430 is communicatively connected to DSL modems 440 and 450 by links 445 and 455.
  • the DSL modems 440, 450 are considered CE devices, with DSL modem 440 belonging to Customer A and DSL modem 450 belonging to Customer B.
  • the PE 410 is the gateway to a SP network (not shown), which may be a MEN.
  • the DSL modems 440, 450 may transmit and receive frames representing video, data, Voice over Internet Protocol (VoIP) 5 as well as untagged frames.
  • VoIP Voice over Internet Protocol
  • the Ethernet uplink 420, the DSLAM 430, and the links 445, 455 constitute a Virtual UNI for each of the customers A, B. Not only is it desirable to maintain the Virtual UNI between the CE and. the PE for each of the customers, but it is also desirable to offer different classes of service such as triple play as described above.
  • These dual purposes may be accomplished using at least two broad classes of VLAN allocation paradigms.
  • a unique VLAN identification is assigned to a port of the DSLAM 430 using either a unique S-TAG or a unique S-TAG, C-TAG pair.
  • the uniqueness of the S-TAG should be maintained in the aggregation network.
  • This paradigm may be denoted 1:1 VLAN to indicate a one-to-one mapping between port and VLAN.
  • Tables IA and IB which appear below, illustrate a conventional method of implementing a 1 : 1 VLAN scheme.
  • Tables IA and IB which appear below, illustrate a conventional method of implementing a 1 : 1 VLAN scheme.
  • Table IA is illustrative of an example 1:1 VLAN scheme that may be used to identify both a customer and a type of data frame for purpose of providing classes of service, such as triple play.
  • DSLAM 430 receives different types of frames from Customers A and B.
  • DSLAM 430 inserts an S-TAG into the frame to uniquely identify the port or customer, and also inserts a C-TAG to identify the type of frame. The frames are then sent on to the PE 410.
  • an S-TAG value of 101 is associated with Customer A, and C-TAG values of 10 and 11 are used to represent VoIP frames or Data frames, respectively. If the frames from Customers A and B are untagged, then the DSLAM will not insert a C-TAG.
  • Table IB is illustrative of the Customer Look-Up Table that is kept by the DSLAM 430 for the 1 : 1 VLAN scheme described in Table IA. Downlink frames received from the PE 410 are switched according to Table IB. As shown in Table IB, the DSLAM 430 knows the exact destination or port (Customer A or Customer B) for each of the received frames based upon the S-TAG value.
  • Table 2 A is illustrative of another example 1 :1 VLAN scheme that may be used to identify both a customer and. a type of data frame for purpose of providing classes of service, such as triple play.
  • DSLAM 430 receives different types of frames from Customers A and B.
  • DSLAM 430 inserts both an S-TAG and a C-TAG into the frame, similar to the scheme described in Table IA.
  • the S-TAG is used to identify the type of frame
  • the C-TAG is used to identify the port or customer.
  • C-TAG values of 10 and 11 are associated with Customers A and B, respectively, while S-TAG values of 101, 102, and 104 are used to represent VoEP frames, data frames, and untagged frames, respectively.
  • Table 2B is illustrative of the Service Look-Up Table that is kept by the DSLAM 430 for the 1 : 1 VLAN scheme described in Table 2A, As shown in Table 2B, the DSLAM 430 knows the exact type of frame for each frame received from the PE 410 based upon the S-TAG value. The DSLAM 430 also knows the exact destination or port (Customer A or Customer B) for each of the received frames based upon the C-TAG value as specified in Table 2A..
  • the same S- TAG or S-TAG, C-TAG pair is assigned to a group of ports on the DSLAM 430.
  • This paradigm may be denoted JV; 1 VLAN Xo indicate a many-to-one mapping between ports and VLAN.
  • Example criteria for grouping of the ports may be the same originating Virtual Private Network (VPN), the same service, the same "destination" Service Provider (SP), etc.
  • Table 3 A is illustrative of an example N:l VLAN scheme that may be used to identify a type of data frame for purpose of providing classes of service, such as triple play.
  • DSLAM 430 receives different types of frames from Customers A and B.
  • DSLAM 430 inserts an S-TAG to identify the type of frame.
  • S-TAG values of 101, 102, and 104 are used to represent VoIP frames, data frames, and untagged frames, respectively.
  • the DSLAM 430 ignores the C-TAG and will not insert a C-TAG into an untagged frame in an effort to reduce usage of the VLAN space.
  • the DSLAM 430 is able to determine the type of frame based upon the S-TAG value, as illustrated in Table 3B.
  • the DSLAM 430 must perform downlink switching based upon some other field. This is usually performed using the destination MAC address 205, which forms part of untagged Ethernet frames, tagged Ethernet frames in accordance with IEEE 802. IQ, and Q-in-Q tagged Ethernet frames as illustrated in FIGs. 2 A and 2B.
  • a L2 control protocol such as E-LMI is typically running on the aggregation network between the CE and the PE.
  • the presence of a L2 control protocol, such as E-LMI, on the aggregation network may cause problems because downlink switching is typically based upon the destination MAC address 205.
  • E-LMI frame uses a standard MultiCAST (MCAST) address as the destination MAC address 205, making it impossible to switch downlink frames to the appropriate customer using the destination MAC address. This problem may exist with other L2 protocols as well.
  • MCAST MultiCAST
  • the DSLAM 430 when operating in a N: 1 VLAN regime the DSLAM 430 should operate in a similar manner as was described for the 1:1 VLAN scheme.
  • the DSLAM 430 may use a unique S-TAG to forward the L2 protocol frames to the PE 410.
  • the DSLAM may assign a unique value to each port and indicate it to the PE 410 as a C-TAG frame within the L2 protocol frame.
  • FIG. 5 is a diagram illustrating an example method of implementing a N: 1
  • FIG. 5 illustrates an untagged E-LMI frame A sent from the CE to the DSLAM, as well as a tagged E-LMI frame B sent from the DSLAM to the PE.
  • the DSLAM inserts a special tag 550 into frame A to produce frame B, which is otherwise the same as frame A.
  • the special tag 550 consists of an Ethertype (Etype) field 552, a S-TAG 554, another Etype field 556, and a C-TAG 558, each of which is two bytes long.
  • the portions of Frame A and Frame B that are common to both of the frames include a Destination MAC Address (DA) field 500, a Source MAC Address (SA) field 510, an E-LMI Type field 520, a Data field 530, and a Cyclic Redundancy Check (CRC) field 540.
  • DA Destination MAC Address
  • SA Source MAC Address
  • E-LMI Type field 520 E-LMI Type field
  • Data field 530 Data field
  • CRC Cyclic Redundancy Check
  • the TSF: 1 VLAN scheme described above and illustrated in FIG. 5 is similar to the 1 : 1 VLAN example described above in Table 2A, which also uses a unique S- TAG and C-TAG, but does not perform downlink switching based upon the C- TAG.
  • the DSLAM uses a unique S-TAG to tunnel the E-LMI packets to the PE, and additionally assigns a unique value to each port and sends it to the PE as a C-TAG frame.
  • downlink switching is performed in this N:l VLAN scheme based on the special tag 550, and not based on the destination MAC address as in standard E-LMI.
  • N:l VLAN schemes similar to the embodiment described above may be implemented with other L2 protocols that may be running on the aggregation network.
  • the other L2 protocols may include Cisco Discovery Protocol (CDP), UniDirectional Link Detection (UDLD), Port Aggregation Protocol (PAgP), Port Based Network Access Control (IEEE 802. IX), and Link Aggregation Control Protocol (LACP).
  • CDP Cisco Discovery Protocol
  • UDLD UniDirectional Link Detection
  • PAgP Port Aggregation Protocol
  • IEEE 802. IX Port Based Network Access Control
  • LACP Link Aggregation Control Protocol
  • the DSLAM uses a unique S-TAG to tunnel the L2 protocol packets to the PE, and additionally assigns a unique value to each port and sends it to the PE as a C-TAG frame within the L2 protocol packet.

Abstract

In one embodiment, an apparatus includes an access node, and the access node includes ports. The access node is operable to perform downlink switching based upon a unique Provider Virtual Local Area Network tag (S-TAG) and a unique IEEE 802. IQ tag header (C-TAG) that is assigned to each port.

Description

ETHERNET LAYER 2 PROTOCOL PACKET SWITCHING
CROSS-REFERENCE TO RELATED APPLICATIONS This application claims priority from U.S. provisional patent application 60/807,430, which was filed on 14 July 2006. U.S. provisional patent application 60/807,430 is incorporated by reference in its entirety.
TECHNICAL FIELD
This disclosure relates generally to digital computer network technology, and more particularly, improved Ethernet services.
BACKGROUND
Packet-switched describes the type of network in which relatively small units of data called packets are routed through a network based on the destination address contained within each packet. Breaking communication down into packets allows the same data path to be shared among many users in the network. This type of communication between sender and receiver is known as connectionless (rather than dedicated). Most traffic over the Internet uses packet switching and the Internet is basically a connectionless network.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. IA is a diagram illustrative of an Ethernet LAN using a hub. FIG. IB is a diagram illustrative of an Ethernet LAN using an Ethernet switch.
FIG. 2A is a diagram illustrating how VLAN tags are inserted inside an untagged Ethernet frame to create a tagged Ethernet frame in accordance with IEEE 802. IQ.
FIG. 2B is a diagram illustrating a Q-in-Q tagged Ethernet frame. FIG. 3 is a diagram illustrating a network suitable for use with embodiments of the invention. FIG.4 is a diagram illustrating a network portion that is suitable for use with embodiments of the invention.
FIG. 5 is a diagram illustrating a method of implementing anN:l VLAN scheme according to some embodiments of the invention.
DESCRIPTION OF EXAMPLE EMBODIMENTS
1. OVERVIEW
A method according to an example embodiment of the invention includes assigning a Provider Virtual Local Area Network tag (S-TAG) and an IEEE 802.1 Q tag header (C-TAG) to a group of ports to implement a N: 1 Virtual Local Area Network (VLAN) allocation scheme, the group of ports included in an access node that communicatively connects a Customer Edge (CE) device to a Provider Edge (PE) device. The method further includes receiving a frame from the CE device, the frame containing a Layer 2 (L2) protocol, packet, and switching the frame based upon the S-TAG and the C-TAG.
An apparatus according to an example embodiment of the invention includes an access node, the access node including ports, the access node operable to perform downlink switching based upon a unique Provider Virtual Local Area Network tag (S-TAG) and a unique IEEE 802.1 Q tag header (C-TAG) that is assigned to each port.
According to another example embodiment of the invention, logic may be encoded in one or more tangible media for execution and when executed may be operable to insert a tag into a frame that is transmitted from a Customer Edge (CE) device, the tag including a Provider Virtual Local Area Network tag (S-TAG) and a IEEE 802.1 Q tag header (C-TAG), and perform downlink switching based upon the S-TAG and the C-TAG.
2. EXAMPLE EMBODIMENTS A Media Access Control (MAC) address is the unique hexadecimal serial number assigned to an Ethernet network device to identify it on the network. With Ethernet devices, this address can be permanently set at the time of manufacture or configured during installation. Each network device has at least one unique MAC address, so that it will be able to receive only the frames that were sent to it. IfMAC addresses were not unique, there would be no way to distinguish between two stations.
Devices on a network monitor network traffic and search for their own MAC address in each frame to determine whether they should decode it or not. Special circumstances exist for broadcasting to every device on the network. Although some types of network devices, such as Network Interface Cards (NICs), typically have a single MAC address, other types of network devices, such, as routers, bridges, and switches, may have multiple MAC addresses. Network devices with multiple MAC addresses typically have a MAC address for each port on the network device.
Ethernet uses variable-length frames of data to transmit information from a source to one or more destinations. Every Ethernet frame has two fields defined as the source and destination addresses, which indicate the MAC address of the network devices where a frame originated and the MAC address of the network device where the frame is destined, respectively.
Ethernet Layer 2 (L2) switching allows frames to be switched in the network based on their MAC address. When a frame arrives at the switch, the switch checks the frame's destination MAC address and, if known, sends the frame to the output port from which it learned the destination MAC.
Two important elements in Ethernet L2 switching are the MAC address and the Virtual Local Area Network (VLAN). In the same way that Internet Protocol (IP) routing references stations on the networks via a Layer 3 (L3) IP address, Ethernet L2 switching references end stations via the MAC address. However, unlike IP, in which 3P addresses are assigned by administrators and can be reused in different private networks, MAC addresses are supposed to be globally unique, because they are indicative of the hardware itself. Thus, MAC addresses are generally not assigned by the network administrator. In some cases the MAC addresses can be overwritten or duplicated, but this is not the norm. Ethernet is a broadcast medium. Without the concept of VLANs, a broadcast sent by a station on the Local Area Network (LAN) is sent to all physical segments of the switched LAN. The VLAN concept allows the segmentation of the LAN into logical entities, and traffic is localized within those logical entities. For example, a university campus may be allocated multiple VLANs — one dedicated for faculty, one dedicated for students, and the third dedicated for visitors. Broadcast traffic within each of these VLANs is isolated to that VLAN. FIG. IA is a diagram illustrative of an Ethernet LAN using a hub, while
FIG. IB is a diagram illustrative of an Ethernet LAN using an Ethernet switch.
With the Ethernet hub of FIG. IA, all stations Al, A2, Bl, B2 on the LAN share the same physical segment. A 10-Mbps hub, for example, allows broadcast and unicast traffic between the stations that share the 10-Mbps bandwidth. On the other hand, the Ethernet switch of FIG. IB allows, for example, each segment a 100-Mbps connection, and it segments the LAN into two logical domains, VLAN 10 and VLAN 20.
The concept of VLANs is independent of the stations themselves. The VLAN is an allocation by the switch. In FIG. IB, ports 1 and 2 are allocated to VLAN 10, while ports 3 and 4 are allocated to VLAN 20. When stations Al and A2 send traffic, the switch tags the traffic with the VLAN assigned to the interface and makes the switching decisions based on that VLAN number. The result is that traffic within a VLAN is isolated from traffic within other VLANs.
MAC learning allows the Ethernet switch to learn the MAC addresses of the stations in the network to identify on which port to send the traffic. LAN switches normally keep a MAC learning table (or a bridge table) and a VLAN table.
The MAC learning table associates the MACs/VLANs with a given port, and the VLAN table associates the port with a VLAN. A MAC learning table and a VLAN table that are associated with the Ethernet switch of FIG. IB appear at the right side of FIG. IB. The MAC learning table and the VLAN table show that the Ethernet switch has learned the MAC addresses of stations Al, A2, B l, and B2 on ports 1, 2, 4, and 3, respectively. It also shows that ports 1 and 2 are associated with VLAN 10 and ports 3 and 4 are associated with VLAN 20. IEEE 802.1 Q, which, is incorporated by reference, defines how an Ethernet frame gets tagged with a VLAN ID. The VLAN ID may be assigned by the switch and not the end station. In this case, the switch assigns a VLAN number to a port, and every frame received on that port gets allocated that VLAN ID. The Ethernet switches switch frames between the same VLANs. Traffic between different VLANs is sent to a routing function within the switch itself (if the switch supports L3 forwarding) or an external router.
FIG. 2A is a diagram illustrating how VLAN tags are inserted inside an untagged Ethernet frame 200 to create a tagged Ethernet frame 250 in accordance with IEEE 802. IQ.
Referring to FIG. 2A, the untagged Ethernet frame 200 includes a destination MAC address 205, a source MAC address 210, a Type field 215, and the data 220. To create the tagged Ethernet frame 250, an 802.1Q tag header 225 is inserted between the source MAC address 210 and the Type field 215. The 802. IQ tag header 225 consists of a 2-byte Type field 225a and a 2-byte Tag Control Info (TCI) field 225b.
The Type field 225a is set to 0X8100 to indicate an 802. IQ tagged frame. The 3 leftmost bits of TCI field 225b indicates the priority in accordance with
IEEE 802.1Q, which is incorporated by reference. The 802. IQ priority field may specify up to eight different priority levels that can be used to offer different levels of service within the network. The 12 rightmost bits of TCI field 225b constitute the VLAN ID field, which allows the assignment of up to 4096 (212) VLAN numbers to distinguish the different VLAN tagged frames.
Some Ethernet applications, such as Metro Ethernet, require extensions to L2 switching . An example is the ability to do VLAN stacking — that is, to do multiple VLAN tagging to the same Ethernet frame, creating a stack of VLAN IDs. Different entities can then do L2 switching on the different levels of the VLAN stack. This concept of VLAN stacking may conveniently be referred to as "Q-in-Q", which is short for "IEEE 802. IQ in IEEE 802. IQ."
FIG. 2B is a diagram illustrating a conventional Q-in-Q tagged Ethernet frame 270. When compared to the tagged Ethernet frame 250 of FIG. 2A, it can be seen that the Q-in-Q Ethernet frame 270 includes an additional Provider VLAN (PVLAN) tag 260 that is inserted between the source MAC address 210 and the 802.1 Q tag header 225.
Like the 802. IQ tag header 225, the PVLAN tag 260 consists of a 2-byte Type field 260a and a 2-byte TCI field 260b. For convenience, the 802. IQ tag header 225 may be referred to as a C- TAG, and the PVLAN tag 260 may be referred to as an S-TAG.
FIG. 3 is a diagram illustrating an example network 300 that is suitable for use with embodiments of the invention. Referring to FIG. 3, the network 300 includes a Service Provider (SP) network 305, which may be, for example, a Metro Ethernet Network (MEN). A MEN is a computer network based on the Ethernet standard that covers a metropolitan area.
The network 300 further includes at least one Provider Equipment (PE) device 310 at the edge of the SP network 305, which is communicatively connected to an access node 315 by an Ethernet uplink 325. The access node 315 may be, for example, a Digital Subscriber Line Access Multiplexer (DSLAM). Other networks suitable for use with embodiments of the invention, may include more than one access node 315, each of which is communicatively connected to a corresponding PE 310 by its own Ethernet uplink 325.
The network 300 also includes a number of Customer Edge (CE) devices 320 that are each communicatively connected to the access node 315 by a link 335. Each of the links 335 may use any transport technology, i.e., Frame Relay, Asynchronous Transfer Mode (ATM), Ethernet VLAN, etc. Thus, each of the CEs 320 is communicatively connected to the PE 310 by its corresponding link 335, the access node 315, and the Ethernet uplink 325, which collectively may be referred to as a Virtual User Network Interface (VUNI). It is desirable for the access node 315 to maintain the Virtual UNI for each ofthe CEs 320. In the region between interface A and interface B, which may also be referred to as an aggregation network, a L2 protocol is typically operative. Ethernet Local Management Interface (E-LMI) is one example of such a protocol. The E-LMI protocol allows configuration and status information for the sendees at a UNI of a MEN to be transferred from the MEN to a CE device coupled to the MEN at the UNI. Further details regarding the E-LMI protocol may be found in U.S. Patent Application Ser. No. 10/811,458, which was filed on 26 March 2004, and is hereby incorporated by reference. FIG. 4 is a diagram illustrating an example network portion 400 that is suitable for use with embodiments of the invention.
Referring to FIG. 4, the network portion 400 includes a PE device 410 that is communicatively connected to a DSLAM 430 by an Ethernet uplink 420. The DSLAM 430 is communicatively connected to DSL modems 440 and 450 by links 445 and 455. The DSL modems 440, 450 are considered CE devices, with DSL modem 440 belonging to Customer A and DSL modem 450 belonging to Customer B. Like the PE 310 in FIG. 3, the PE 410 is the gateway to a SP network (not shown), which may be a MEN. As illustrated in FIG. 4, the DSL modems 440, 450 may transmit and receive frames representing video, data, Voice over Internet Protocol (VoIP)5 as well as untagged frames. It is a goal of many SPs to offer varying classes of service depending on the type of frame. As one example, when congestion is present in a network, it might be desirable to give priority to a customer's VoIP frames at the expense of data frames. This differentiation between VoIP, data, and video in order to provide preferential treatment to specific types of frames may be referred to as "triple play."
Similar to the situation described above in FIG. 3, the Ethernet uplink 420, the DSLAM 430, and the links 445, 455 constitute a Virtual UNI for each of the customers A, B. Not only is it desirable to maintain the Virtual UNI between the CE and. the PE for each of the customers, but it is also desirable to offer different classes of service such as triple play as described above. These dual purposes may be accomplished using at least two broad classes of VLAN allocation paradigms. According to the first class of VLAN allocation paradigm, a unique VLAN identification is assigned to a port of the DSLAM 430 using either a unique S-TAG or a unique S-TAG, C-TAG pair. The uniqueness of the S-TAG should be maintained in the aggregation network. This paradigm may be denoted 1:1 VLAN to indicate a one-to-one mapping between port and VLAN.
Tables IA and IB, which appear below, illustrate a conventional method of implementing a 1 : 1 VLAN scheme. When referring to Tables IA and IB, as well as the other Tables that follow in this specification, it is helpful to continually refer to FIG. 4. Table IA is illustrative of an example 1:1 VLAN scheme that may be used to identify both a customer and a type of data frame for purpose of providing classes of service, such as triple play. In this VLAN scheme, DSLAM 430 receives different types of frames from Customers A and B. DSLAM 430 inserts an S-TAG into the frame to uniquely identify the port or customer, and also inserts a C-TAG to identify the type of frame. The frames are then sent on to the PE 410.
As shown in Table IA, an S-TAG value of 101 is associated with Customer A, and C-TAG values of 10 and 11 are used to represent VoIP frames or Data frames, respectively. If the frames from Customers A and B are untagged, then the DSLAM will not insert a C-TAG.
Table IB is illustrative of the Customer Look-Up Table that is kept by the DSLAM 430 for the 1 : 1 VLAN scheme described in Table IA. Downlink frames received from the PE 410 are switched according to Table IB. As shown in Table IB, the DSLAM 430 knows the exact destination or port (Customer A or Customer B) for each of the received frames based upon the S-TAG value.
Table IA
Figure imgf000009_0001
Table IB
Figure imgf000009_0002
Table 2 A is illustrative of another example 1 :1 VLAN scheme that may be used to identify both a customer and. a type of data frame for purpose of providing classes of service, such as triple play. In this VLAN scheme, DSLAM 430 receives different types of frames from Customers A and B. In this scheme, DSLAM 430 inserts both an S-TAG and a C-TAG into the frame, similar to the scheme described in Table IA. In this scheme, however, the S-TAG is used to identify the type of frame, and the C-TAG is used to identify the port or customer.
As shown in Table 2A, C-TAG values of 10 and 11 are associated with Customers A and B, respectively, while S-TAG values of 101, 102, and 104 are used to represent VoEP frames, data frames, and untagged frames, respectively.
Table 2B is illustrative of the Service Look-Up Table that is kept by the DSLAM 430 for the 1 : 1 VLAN scheme described in Table 2A, As shown in Table 2B, the DSLAM 430 knows the exact type of frame for each frame received from the PE 410 based upon the S-TAG value. The DSLAM 430 also knows the exact destination or port (Customer A or Customer B) for each of the received frames based upon the C-TAG value as specified in Table 2A..
Table 2A
Figure imgf000010_0001
Table 2B
Figure imgf000010_0002
According to the second class of VLAN allocation paradigm, the same S- TAG or S-TAG, C-TAG pair is assigned to a group of ports on the DSLAM 430. This paradigm may be denoted JV; 1 VLAN Xo indicate a many-to-one mapping between ports and VLAN. Example criteria for grouping of the ports may be the same originating Virtual Private Network (VPN), the same service, the same "destination" Service Provider (SP), etc.
Table 3 A is illustrative of an example N:l VLAN scheme that may be used to identify a type of data frame for purpose of providing classes of service, such as triple play. In this VLAN scheme, DSLAM 430 receives different types of frames from Customers A and B. In this scheme, DSLAM 430 inserts an S-TAG to identify the type of frame. S-TAG values of 101, 102, and 104 are used to represent VoIP frames, data frames, and untagged frames, respectively.
However, as is typical with networks operating this sort of N:l VLAN scheme, the DSLAM 430 ignores the C-TAG and will not insert a C-TAG into an untagged frame in an effort to reduce usage of the VLAN space.
Table 3A
Figure imgf000011_0001
Table 3B
Figure imgf000011_0002
When downlink frames are subsequently received from the PE 410 for delivery to the appropriate customer, the DSLAM 430 is able to determine the type of frame based upon the S-TAG value, as illustrated in Table 3B.
Since the C-TAG values are ignored in this N:l VLAN scheme, the DSLAM 430 must perform downlink switching based upon some other field. This is usually performed using the destination MAC address 205, which forms part of untagged Ethernet frames, tagged Ethernet frames in accordance with IEEE 802. IQ, and Q-in-Q tagged Ethernet frames as illustrated in FIGs. 2 A and 2B.
As was explained above, a L2 control protocol such as E-LMI is typically running on the aggregation network between the CE and the PE. The presence of a L2 control protocol, such as E-LMI, on the aggregation network may cause problems because downlink switching is typically based upon the destination MAC address 205. For example, an E-LMI frame uses a standard MultiCAST (MCAST) address as the destination MAC address 205, making it impossible to switch downlink frames to the appropriate customer using the destination MAC address. This problem may exist with other L2 protocols as well.
To solve the problem described above, when operating in a N: 1 VLAN regime the DSLAM 430 should operate in a similar manner as was described for the 1:1 VLAN scheme. Thus, according to example embodiments of the invention, the DSLAM 430 may use a unique S-TAG to forward the L2 protocol frames to the PE 410.
Further according to example embodiments of the invention, the DSLAM may assign a unique value to each port and indicate it to the PE 410 as a C-TAG frame within the L2 protocol frame. FIG. 5 is a diagram illustrating an example method of implementing a N: 1
VLAN scheme in accordance with some embodiments of the invention. FIG. 5 illustrates an untagged E-LMI frame A sent from the CE to the DSLAM, as well as a tagged E-LMI frame B sent from the DSLAM to the PE.
As shown in FIG. 5, the DSLAM inserts a special tag 550 into frame A to produce frame B, which is otherwise the same as frame A. The special tag 550 consists of an Ethertype (Etype) field 552, a S-TAG 554, another Etype field 556, and a C-TAG 558, each of which is two bytes long. The portions of Frame A and Frame B that are common to both of the frames include a Destination MAC Address (DA) field 500, a Source MAC Address (SA) field 510, an E-LMI Type field 520, a Data field 530, and a Cyclic Redundancy Check (CRC) field 540. The size in bytes of each of these fields 500, 510, 520? 530, 540 is shown to the left of the field.
The TSF: 1 VLAN scheme described above and illustrated in FIG. 5 is similar to the 1 : 1 VLAN example described above in Table 2A, which also uses a unique S- TAG and C-TAG, but does not perform downlink switching based upon the C- TAG. In this case, the DSLAM uses a unique S-TAG to tunnel the E-LMI packets to the PE, and additionally assigns a unique value to each port and sends it to the PE as a C-TAG frame. Thus, downlink switching is performed in this N:l VLAN scheme based on the special tag 550, and not based on the destination MAC address as in standard E-LMI.
According to other example embodiments of the invention, N:l VLAN schemes similar to the embodiment described above may be implemented with other L2 protocols that may be running on the aggregation network. The other L2 protocols may include Cisco Discovery Protocol (CDP), UniDirectional Link Detection (UDLD), Port Aggregation Protocol (PAgP), Port Based Network Access Control (IEEE 802. IX), and Link Aggregation Control Protocol (LACP). In these instances, similar to the embodiments described above that use E-LMI as the L2 protocol in the aggregation network, the DSLAM uses a unique S-TAG to tunnel the L2 protocol packets to the PE, and additionally assigns a unique value to each port and sends it to the PE as a C-TAG frame within the L2 protocol packet. One of skill in the art will recognize that the concepts taught herein can be tailored to a particular application in many other advantageous ways. In particular, those skilled in the art will recognize that the illustrated embodiments are but examples of many alternative implementations that will become apparent upon reading this disclosure.
The preceding embodiments are examples. Although the specification may refer to "an", "one", "another", or "some" embodiment(s) in several locations, this does not necessarily mean that each such reference is to the same embodiment(s), or that the feature only applies to a single embodiment.

Claims

1. A method comprising: assigning a Provider Virtual Local Area Network tag (S-TAG) and an IEEE 802. IQ tag header (C-TAG) to a group of ports to implement a N:l Virtual Local Area Network (VLAN) allocation scheme, the group of ports included in an access node that communicatively connects a Customer Edge (CE) device to a Provider Edge (PE) device; and receiving a frame from the CE device, the frame containing a Layer 2 (L2) protocol packet; and switching the frame based upon the S-TAG and the C-TAG.
2. The method of claim 1. wherein switching the frame based upon the S-TAG and the C-TAG comprises: inserting a tag into the frame, the tag including the S-TAG and the C-TAG; and forwarding the L2 protocol packet to a Provider Edge (PE) device based on the S-TAG.
3. The method of claim 2, wherein the L2 protocol packet comprises an Ethernet Local Management Interface (E-LMI) packet.
4. The method of claim 2, wherein the L2 protocol packet comprises one selected from the group consisting of a Cisco Discovery Protocol (CDP) packet, a UniDirectional Link Detection (UDLD) packet, a Port Aggregation Protocol (PAgP) packet; a Port Based Network Access Control (IEEE 802.1 X) packet, and a Link Aggregation Control Protocol (LACP) packet.
5. The method of claim 2, wherein the access node comprises a Digital Subscriber Line Access Multiplexer (DSLAM).
6. An apparatus comprising an access node, the access node including ports, the access node operable to perform downlink switching based upon a unique Provider Virtual Local Area Network tag (S-TAG) and a unique IEEE 802. IQ tag header (C-TAG) that is assigned to each port.
7. The apparatus of claim 6, the access node operable to insert one or more tags into a frame received from a Customer Edge (CE) device, the tags including the S-TAG and the C-TAG.
8. The apparatus of claim 7, the access node operable to communicate with a Provider Edge (PE) device located at the edge of a Service Provider (SP) network using an uplink.
9. The apparatus of claim 8, wherein the SP network comprises a Metro Ethernet Network (MEN).
10. The apparatus of claim 8, the access node comprising a Digital Subscriber Line Access Multiplexer (DSLAM). the DSLAM operable to forward a Layer 2 (L2) protocol packet to the PE device based upon the S-TAG.
11. The apparatus of claim 10, wherein the L2 protocol packet comprises an Ethernet Local Management Interface (E-LMI) packet.
12. Logic encoded in one or more tangible media for execution and when executed operable to: insert a tag into a frame that is transmitted from a Customer Edge (CE) device, the tag including a Provider Virtual Local Area Network tag (S-TAG) and a IEEE 802. IQ tag header (C-TAG); and perform downlink switching based upon the S-TAG and the C-TAG.
13. The logic of claim 12, wherein the performance of downlink switching based upon the S-TAG and the C-TAG comprises: forwarding a Layer 2 (L2) protocol packet included in the frame to a Provider Edge (PE) device based upon the S-TAG; and perform downlink switching based upon the C-TAG, the C-TAG including a unique value for a port of an access node.
14. The logic of claim 13, wherein the L2 protocol packet comprises an Ethernet Local Management Interface (E-LMI) packet.
15. The logic of claim 13, wherein the L2 protocol packet is selected from the group consisting of a Cisco Discovery Protocol (CDP) packet, a UniDirectional Link Detection (UDLD) packet, a Port Aggregation Protocol (PAgP) packet, a Port Based Network Access Control (IEEE 802. IX) packet, and. a Link Aggregation Control Protocol (LACP) packet.
16. The logic of claim 13, wherein the tag comprises: a first two-byte Ethertype (Etype) field disposed adjacent to the S-TAG; and a second two-byte Etype field disposed immediately between the S-TAG and the C-TAG.
17. The logic of claim 12, when executed further operable to implement a N: 1 Virtual Local Area Network (VLAN) allocation scheme.
PCT/US2007/060775 2006-07-14 2007-01-19 Ethernet layer 2 protocol packet switching WO2008008556A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP07756385.6A EP2041929B1 (en) 2006-07-14 2007-01-19 Ethernet layer 2 protocol packet switching
CN200780026336.3A CN101491029B (en) 2006-07-14 2007-01-19 Ethernet layer 2 protocol packet switching

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US80743006P 2006-07-14 2006-07-14
US60/807,430 2006-07-14
US11/551,183 US8085790B2 (en) 2006-07-14 2006-10-19 Ethernet layer 2 protocol packet switching
US11/551,183 2006-10-19

Publications (1)

Publication Number Publication Date
WO2008008556A1 true WO2008008556A1 (en) 2008-01-17

Family

ID=38923546

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2007/060775 WO2008008556A1 (en) 2006-07-14 2007-01-19 Ethernet layer 2 protocol packet switching

Country Status (4)

Country Link
US (1) US8085790B2 (en)
EP (1) EP2041929B1 (en)
CN (1) CN101491029B (en)
WO (1) WO2008008556A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8085790B2 (en) 2006-07-14 2011-12-27 Cisco Technology, Inc. Ethernet layer 2 protocol packet switching

Families Citing this family (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060091061A1 (en) * 2004-11-02 2006-05-04 Baldwin Filters, Inc. Filter assembly with sealing system
US20060091064A1 (en) * 2004-11-02 2006-05-04 Baldwin Filters, Inc. Filter apparatus with separable seal support frame
US8189599B2 (en) * 2005-08-23 2012-05-29 Rpx Corporation Omni-protocol engine for reconfigurable bit-stream processing in high-speed networks
WO2008021372A2 (en) * 2006-08-11 2008-02-21 Slt Logic Llc Enhanced ethernet protocol for shortened data frames within a constrained neighborhood based on unique id
CN101018228B (en) * 2006-12-22 2011-11-23 华为技术有限公司 A port convergence method and device
ES2377886T3 (en) * 2007-02-05 2012-04-02 Koninklijke Kpn N.V. VLAN numbering in access networks
US7839800B2 (en) * 2008-01-24 2010-11-23 Cisco Technology, Inc. Multiple I-service registration protocol (MIRP)
CN101651670B (en) * 2008-10-29 2012-08-15 中国科学院声学研究所 Integrated management method for services and users in Ethernet service operation and system thereof
JP5381080B2 (en) * 2008-12-22 2014-01-08 富士通株式会社 Frame transfer apparatus and frame transfer method
CN101510855B (en) * 2009-04-10 2011-06-15 华为技术有限公司 Method and apparatus for processing QinQ message
US8549178B2 (en) * 2009-05-29 2013-10-01 Futurewei Technologies, Inc. Using provider backbone bridged network to reduce the number of media access control addresses visible to core bridges in the data center
CN102045184B (en) * 2009-10-22 2012-09-05 华为技术有限公司 Automatic management method for customer edge equipment and PE equipment
US8611352B2 (en) 2010-04-20 2013-12-17 Marvell World Trade Ltd. System and method for adapting a packet processing pipeline
CN101895427B (en) * 2010-07-23 2014-08-13 中兴通讯股份有限公司 Stream-based virtual local area network processing method and system
JP5691388B2 (en) * 2010-10-25 2015-04-01 富士通株式会社 Reception device, communication device, and reception method
US8565069B2 (en) * 2010-11-23 2013-10-22 Force10 Networks, Inc. Method of shrinking a data loss window in a packet network device
WO2012093335A1 (en) 2011-01-06 2012-07-12 Marvell Israel (M.I.S.L) Ltd. Network device with a programmable core
US8462666B2 (en) 2011-02-05 2013-06-11 Force10 Networks, Inc. Method and apparatus for provisioning a network switch port
US9288288B2 (en) 2011-06-27 2016-03-15 Marvell Israel (M.I.S.L) Ltd. FCoE over trill
US9729431B1 (en) * 2011-08-16 2017-08-08 Marvell International Ltd. Using standard fields to carry meta-information
US8989188B2 (en) 2012-05-10 2015-03-24 Cisco Technology, Inc. Preventing leaks among private virtual local area network ports due to configuration changes in a headless mode
US9716671B2 (en) 2012-07-30 2017-07-25 Hewlett Packard Enterprise Development Lp Provider bridged network communication
US9948497B2 (en) * 2013-03-15 2018-04-17 Verizon Patent And Licensing Inc. System for and method of automatically discovering and configuring NIDs
CN103200115B (en) * 2013-04-19 2016-01-20 杭州华三通信技术有限公司 Flow control methods in a kind of SPB network and equipment
US10382228B2 (en) * 2014-06-26 2019-08-13 Avago Technologies International Sales Pte. Limited Protecting customer virtual local area network (VLAN) tag in carrier ethernet services
US20160191956A1 (en) * 2014-12-15 2016-06-30 Cable Television Laboratories, Inc. Software defined networking in a cable tv system
US10171306B2 (en) * 2015-02-26 2019-01-01 Cisco Technology, Inc. Automatic discovery and provisioning of multi-chassis etherchannel peers
EP3300318B1 (en) * 2015-06-30 2021-06-23 Huawei Technologies Co., Ltd. Methods for communicating by using remote network element port, and apparatuses
CN105049367B (en) * 2015-09-10 2019-01-29 北京星网锐捷网络技术有限公司 A kind of flow allocation method and access device of aggregated links
US11362880B2 (en) * 2017-05-12 2022-06-14 Hirschmann Automotive Gmbh Network-operating method in which a query is broadcast by SNMP protocol
US10880211B2 (en) 2019-05-06 2020-12-29 Seth Gregory Friedman Transaction encoding and verification by way of data-link layer fields
US10868707B1 (en) 2019-09-16 2020-12-15 Liquid-Markets-Holdings, Incorporated Zero-latency message processing with validity checks
WO2021252423A1 (en) 2020-06-08 2021-12-16 Liquid-Markets-Holdings, Incorporated Hardware-based transaction exchange
US11171810B1 (en) * 2020-10-07 2021-11-09 Hewlett Packard Enterprise Development Lp Misconfigured uplink identification

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6216167B1 (en) * 1997-10-31 2001-04-10 Nortel Networks Limited Efficient path based forwarding and multicast forwarding
US20020007412A1 (en) * 2000-03-10 2002-01-17 Olivier Paridaens Method to perform end-to-end authentication, and related customer premises network termination and access network server
US20040103282A1 (en) * 2002-11-26 2004-05-27 Robert Meier 802.11 Using a compressed reassociation exchange to facilitate fast handoff
US6789121B2 (en) * 2002-02-08 2004-09-07 Nortel Networks Limited Method of providing a virtual private network service through a shared network, and provider edge device for such network
US20050063397A1 (en) * 2003-09-19 2005-03-24 Cisco Technology, Inc. Methods and apparatus for switching between Metro Ethernet networks and external networks
WO2006026933A1 (en) 2004-09-10 2006-03-16 Huawei Technologies Co., Ltd. A method for raising access capacity of wide-band access equipment user

Family Cites Families (65)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE1963079C2 (en) * 1969-12-16 1975-07-31 Gelenkwellenbau Gmbh, 4300 Essen Sealing for the needle roller bearings of the universal joint journals of a cardan joint
US4692918A (en) * 1984-12-17 1987-09-08 At&T Bell Laboratories Reliable local data network arrangement
DE3838945A1 (en) * 1987-11-18 1989-06-08 Hitachi Ltd NETWORK SYSTEM WITH LOCAL NETWORKS AND WITH A HIERARCHICAL CHOICE OF PATH
US5016244A (en) * 1989-09-08 1991-05-14 Honeywell Inc. Method for controlling failover between redundant network interface modules
US5128600A (en) * 1990-12-17 1992-07-07 Hughes Aircraft Company Method for removing excess electrolyte from a nickel-cadmium cell
US5229988A (en) * 1992-01-21 1993-07-20 Hewlett-Packard Company System and method for distinguishing proxy replies of interconnecting devices from duplicate source address replies of non-interconnecting devices on a network
US5371852A (en) * 1992-10-14 1994-12-06 International Business Machines Corporation Method and apparatus for making a cluster of computers appear as a single host on a network
FI97599C (en) * 1993-08-20 1997-01-10 Nokia Telecommunications Oy Arrangements and procedure for updating the subscriber position in a group of radio networks
US5473599A (en) * 1994-04-22 1995-12-05 Cisco Systems, Incorporated Standby router protocol
US5825759A (en) * 1994-10-26 1998-10-20 Telefonaktiebolaget Lm Ericsson Distributing network services and resources in a mobile communications network
US5572528A (en) * 1995-03-20 1996-11-05 Novell, Inc. Mobile networking method and apparatus
US5793763A (en) * 1995-11-03 1998-08-11 Cisco Technology, Inc. Security system for network address translation systems
US5835696A (en) * 1995-11-22 1998-11-10 Lucent Technologies Inc. Data router backup feature
US5862451A (en) * 1996-01-22 1999-01-19 Motorola, Inc. Channel quality management in a cable telephony system
JP2838998B2 (en) * 1996-02-07 1998-12-16 日本電気株式会社 Mobile terminal and mobile network
US5729537A (en) * 1996-06-14 1998-03-17 Telefonaktiebolaget L M Ericsson (Publ) Method and apparatus for providing anonymous data transfer in a communication system
US6078575A (en) * 1996-10-01 2000-06-20 Lucent Technologies Inc. Mobile location management in ATM networks
US6108300A (en) * 1997-05-02 2000-08-22 Cisco Technology, Inc Method and apparatus for transparently providing a failover network device
US5943604A (en) * 1997-10-31 1999-08-24 Cisco Technology, Inc. Echo device method for locating upstream ingress noise gaps at cable television head ends
US6728249B2 (en) * 1998-06-27 2004-04-27 Intel Corporation System and method for performing cut-through forwarding in an ATM network supporting LAN emulation
US6418476B1 (en) * 1998-06-29 2002-07-09 Nortel Networks, Limited Method for synchronizing network address translator (NAT) tables using the open shortest path first opaque link state advertisement option protocol
US6195705B1 (en) * 1998-06-30 2001-02-27 Cisco Technology, Inc. Mobile IP mobility agent standby protocol
US6331984B1 (en) * 1998-08-21 2001-12-18 Nortel Networks Limited Method for synchronizing network address translator (NAT) tables using the server cache synchronization protocol
US6512774B1 (en) * 1999-03-18 2003-01-28 3Com Corporation Fail over with multiple network interface cards
US6801949B1 (en) * 1999-04-12 2004-10-05 Rainfinity, Inc. Distributed server cluster with graphical user interface
US6751191B1 (en) * 1999-06-29 2004-06-15 Cisco Technology, Inc. Load sharing and redundancy scheme
US6952421B1 (en) * 1999-10-07 2005-10-04 Cisco Technology, Inc. Switched Ethernet path detection
US6493341B1 (en) * 1999-12-31 2002-12-10 Ragula Systems Combining routers to increase concurrency and redundancy in external network access
US6839829B1 (en) * 2000-01-18 2005-01-04 Cisco Technology, Inc. Routing protocol based redundancy design for shared-access networks
US7058007B1 (en) * 2000-01-18 2006-06-06 Cisco Technology, Inc. Method for a cable modem to rapidly switch to a backup CMTS
US7068712B1 (en) * 2000-01-18 2006-06-27 Cisco Technology, Inc. Cable network redundancy architecture
US20020120697A1 (en) * 2000-08-14 2002-08-29 Curtis Generous Multi-channel messaging system and method
US7042876B1 (en) * 2000-09-12 2006-05-09 Cisco Technology, Inc. Stateful network address translation protocol implemented over a data network
US6885667B1 (en) * 2000-12-26 2005-04-26 Cisco Technology, Inc. Redirection to a virtual router
US7047314B2 (en) * 2000-12-28 2006-05-16 Oki Electric Industry Co., Ltd. Duplicate private address translating system and duplicate address network system
US6775235B2 (en) * 2000-12-29 2004-08-10 Ragula Systems Tools and techniques for directing packets over disparate networks
US6618388B2 (en) * 2001-01-05 2003-09-09 Extreme Networks Method and system for VMAN protocol
GB2371706B (en) * 2001-01-30 2003-04-23 3Com Corp Link aggregation control for network devices
US7092389B2 (en) * 2001-01-30 2006-08-15 At&T Corp. Technique for ethernet access to packet-based services
US7136374B1 (en) * 2001-03-19 2006-11-14 Juniper Networks, Inc. Transport networks supporting virtual private networks, and configuring such networks
JP4075318B2 (en) * 2001-04-18 2008-04-16 株式会社日立製作所 Protocol conversion method and address conversion server
US7254834B2 (en) * 2001-10-18 2007-08-07 The Board Of Regents Of The University Of Nebraska Fault tolerant firewall sandwiches
US7227863B1 (en) * 2001-11-09 2007-06-05 Cisco Technology, Inc. Methods and apparatus for implementing home agent redundancy
JP4349766B2 (en) * 2001-12-07 2009-10-21 株式会社日立製作所 Address translation device
US20030200463A1 (en) * 2002-04-23 2003-10-23 Mccabe Alan Jason Inter-autonomous system weighstation
US7191331B2 (en) * 2002-06-13 2007-03-13 Nvidia Corporation Detection of support for security protocol and address translation integration
US7272148B2 (en) * 2002-06-27 2007-09-18 Hewlett-Packard Development Company, L.P. Non-ALG approach for application layer session traversal of IPv6/IPv4 NAT-PT gateway
US7180899B2 (en) * 2002-10-29 2007-02-20 Cisco Technology, Inc. Multi-tiered Virtual Local area Network (VLAN) domain mapping mechanism
CN1640071A (en) * 2002-12-03 2005-07-13 富士通株式会社 Communication device and band control method
US7385973B1 (en) * 2003-02-21 2008-06-10 Nortel Networks Limited Method and apparatus for VLAN ID discovery
US20050174943A1 (en) * 2003-09-10 2005-08-11 Shiwei Wang End-to-end mapping of VLAN ID and 802.1P COS to multiple BSSID for wired and wireless LAN
CN1286297C (en) * 2003-09-25 2006-11-22 华为技术有限公司 Method of realizing sign delivery of user's position
US8165156B1 (en) * 2003-12-16 2012-04-24 Telefonaktiebolaget Lm Ericsson (Publ) Ethernet DSL access multiplexer and method providing dynamic service selection and end-user configuration
US20050190757A1 (en) * 2004-02-27 2005-09-01 Cisco Technology Inc. Interworking between Ethernet and non-Ethernet customer sites for VPLS
US8054751B2 (en) * 2004-05-10 2011-11-08 Alcatel Lucent Remote access link fault indication mechanism
US7492763B1 (en) * 2004-07-16 2009-02-17 Applied Micro Circuits Corporation User-specified key creation from attributes independent of encapsulation type
US7969971B2 (en) * 2004-10-22 2011-06-28 Cisco Technology, Inc. Ethernet extension for the data center
US7564869B2 (en) * 2004-10-22 2009-07-21 Cisco Technology, Inc. Fibre channel over ethernet
US9088669B2 (en) * 2005-04-28 2015-07-21 Cisco Technology, Inc. Scalable system and method for DSL subscriber traffic over an Ethernet network
US7835370B2 (en) * 2005-04-28 2010-11-16 Cisco Technology, Inc. System and method for DSL subscriber identification over ethernet network
US7602778B2 (en) * 2005-06-29 2009-10-13 Cisco Technology, Inc. System and methods for compressing message headers
CN100563205C (en) 2005-12-05 2009-11-25 杭州华三通信技术有限公司 The implementation method of user-isolated virtual local area network (LAN) and the network equipment of application thereof
WO2007071002A1 (en) * 2005-12-20 2007-06-28 Ixia Method and system for testing a connection
US20070153799A1 (en) * 2006-01-03 2007-07-05 Alcatel Providing services over hybrid networks
US8085790B2 (en) 2006-07-14 2011-12-27 Cisco Technology, Inc. Ethernet layer 2 protocol packet switching

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6216167B1 (en) * 1997-10-31 2001-04-10 Nortel Networks Limited Efficient path based forwarding and multicast forwarding
US20020007412A1 (en) * 2000-03-10 2002-01-17 Olivier Paridaens Method to perform end-to-end authentication, and related customer premises network termination and access network server
US6789121B2 (en) * 2002-02-08 2004-09-07 Nortel Networks Limited Method of providing a virtual private network service through a shared network, and provider edge device for such network
US20040103282A1 (en) * 2002-11-26 2004-05-27 Robert Meier 802.11 Using a compressed reassociation exchange to facilitate fast handoff
US20050063397A1 (en) * 2003-09-19 2005-03-24 Cisco Technology, Inc. Methods and apparatus for switching between Metro Ethernet networks and external networks
WO2006026933A1 (en) 2004-09-10 2006-03-16 Huawei Technologies Co., Ltd. A method for raising access capacity of wide-band access equipment user
EP1755278A1 (en) 2004-09-10 2007-02-21 Huawei Technologies Co., Ltd. A method for raising access capacity of wide-band access equipment user

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2041929A4

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8085790B2 (en) 2006-07-14 2011-12-27 Cisco Technology, Inc. Ethernet layer 2 protocol packet switching

Also Published As

Publication number Publication date
EP2041929A1 (en) 2009-04-01
EP2041929A4 (en) 2013-05-29
EP2041929B1 (en) 2019-10-16
US20080013547A1 (en) 2008-01-17
CN101491029B (en) 2014-12-10
US8085790B2 (en) 2011-12-27
CN101491029A (en) 2009-07-22

Similar Documents

Publication Publication Date Title
US8085790B2 (en) Ethernet layer 2 protocol packet switching
US7660303B2 (en) Point-to-multipoint functionality in a bridged network
US7974223B2 (en) Virtual private LAN service over ring networks
US7260097B2 (en) Label control method and apparatus for virtual private LAN segment networks
US8194656B2 (en) Metro ethernet network with scaled broadcast and service instance domains
KR100612318B1 (en) Apparatus and method for implementing vlan bridging and a vpn in a distributed architecture router
US8228928B2 (en) System and method for providing support for multipoint L2VPN services in devices without local bridging
US7548541B2 (en) Managing VLAN traffic in a multiport network node using customer-specific identifiers
JP5106100B2 (en) Differential transfer in addressed carrier networks
US7808997B2 (en) Method and system for forwarding data between a plurality of provider Ethernet networks
US20040184408A1 (en) Ethernet architecture with data packet encapsulation
US20220210064A1 (en) Address registration
Xinzhan et al. Discuss on VLAN stacking in Packet Network
EP1672848A1 (en) L3 VLAN reuse with L2 forwarding prevention to increase effective number of IP VLANs
Klessig Ethernet services over metro ethernet networks

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 200780026336.3

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07756385

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2007756385

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE

NENP Non-entry into the national phase

Ref country code: RU