CN119172319A - A service flow rate limiting system, method and device - Google Patents
A service flow rate limiting system, method and device Download PDFInfo
- Publication number
- CN119172319A CN119172319A CN202411356036.3A CN202411356036A CN119172319A CN 119172319 A CN119172319 A CN 119172319A CN 202411356036 A CN202411356036 A CN 202411356036A CN 119172319 A CN119172319 A CN 119172319A
- Authority
- CN
- China
- Prior art keywords
- leaf node
- uplink
- traffic
- layer
- switch
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/20—Traffic policing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/22—Alternate routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/24—Multipath
- H04L45/247—Multipath using M:N active or standby paths
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/50—Routing or path finding of packets in data switching networks using label swapping, e.g. multi-protocol label switch [MPLS]
- H04L45/507—Label distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
- H04L49/10—Packet switching elements characterised by the switching fabric construction
- H04L49/113—Arrangements for redundant switching, e.g. using parallel planes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The embodiment of the application provides a service flow rate limiting system, a method and a device, which relate to the technical field of networks, wherein the service flow rate limiting system comprises a main leaf node and a standby leaf node, wherein the main leaf node is in communication connection with the standby leaf node, and the main leaf node and the standby leaf node are both connected with a switch; the system comprises a main leaf node, a standby leaf node, a main leaf node and a terminal device, wherein the main leaf node is used for receiving first uplink traffic and second uplink traffic, forwarding the first uplink traffic and the second uplink traffic according to preset uplink bandwidths, and the first uplink traffic and the second uplink traffic are sent by the terminal device through a switch, and the preset uplink bandwidths are the maximum uplink bandwidths which can be used by the terminal device. The scheme provided by the embodiment of the application can be used for accurately limiting the private line service flow of the terminal equipment.
Description
Technical Field
The present application relates to the field of network technologies, and in particular, to a system, a method, and an apparatus for traffic speed limiting.
Background
A switch in the network, such as an OLT (Optical LINE TERMINAL) may be connected to the terminal device to provide a traffic forwarding service for the terminal device. The same switch may be connected to a plurality of Leaf nodes, which are Leaf nodes in a Spine-Leaf network structure. Multiple leaf nodes are capable of forwarding traffic for the switch. When the same exchanger is connected with two leaf nodes, a double-return double-activity access scene is formed. Double rule means that one switch is connected to two leaf nodes, double rule means that both leaf nodes can forward traffic for the switch. When the switch is connected with a plurality of leaf nodes, traffic of terminal equipment connected with the switch can be forwarded through the plurality of leaf nodes. This makes it difficult to limit the traffic rate of the dedicated traffic of the terminal device.
Taking a dual-home dual-living access scenario as an example, referring to fig. 1, a schematic diagram of a first speed limiting mode in the related art is shown. The figure contains, as a switch OLT, a Customer Premise Equipment (CPE), and two leaf nodes connected to the OLT, respectively a-leaf1 and a-leaf2, the dashed lines between a-leaf1 and a-leaf2 indicating that both remain dual active based on the link aggregation protocol. In the scenario shown in FIG. 1, if the available bandwidth provided to the CPE is required to be 100M, the A-leaf1 and A-leaf2 may each be rate limited by 50M on the interfaces of A-leaf1 and A-leaf2, since both A-leaf1 and A-leaf2 are capable of forwarding CPE traffic. In this case, if there are multiple traffic flows in the dedicated line service of the terminal device, the OLT may forward different traffic flows with different leaf nodes. The two leaf nodes each limit 50M, totaling CPE limit 100M. However, if there is only one traffic flow (indicated by a dashed double arrow in the figure), the OLT can only forward the traffic flow with one leaf node, and the CPE speed limit is reduced to 50M, so that the available bandwidth requirement of the CPE100M cannot be met.
In another case, referring to fig. 2, which is a schematic diagram of a second speed limiting mode in the related art, the network structure of fig. 2 is the same as that of fig. 1. The difference is that both leaf nodes limit speed by 100M. In this case, if there is only one traffic flow, the OLT performs traffic flow forwarding with only one leaf node, and the CPE has a speed limit of 100M. However, if there are multiple traffic flows (two traffic flows are represented by two dashed double-headed arrows in the figure), the OLT may forward different traffic flows with different leaf nodes, where each leaf node limits speed by 100M, and the total speed limit of the two leaf nodes is 200M, which is higher than the available bandwidth of the CPE 100M.
Therefore, under the scene that the switch is connected with a plurality of leaf nodes and the plurality of leaf nodes can carry out traffic forwarding, the special line traffic of the terminal equipment connected with the switch is difficult to carry out accurate speed limiting.
Disclosure of Invention
The embodiment of the application aims to provide a system, a method and a device for limiting the speed of service flow, so as to accurately limit the speed of the special line service flow of terminal equipment. The specific technical scheme is as follows:
In a first aspect, an embodiment of the present application provides a traffic speed limiting system, where the traffic speed limiting system includes a primary leaf node and a backup leaf node, where the primary leaf node is communicatively connected to the backup leaf node, and the primary leaf node and the backup leaf node are both connected to a switch;
The standby leaf node is configured to receive a first uplink traffic, and forward the first uplink traffic to the active leaf node;
The primary leaf node is configured to receive the first uplink traffic and the second uplink traffic, and forward the first uplink traffic and the second uplink traffic according to a preset uplink bandwidth;
The first uplink flow and the second uplink flow are sent by the terminal equipment through the switch, and the preset uplink bandwidth is the maximum uplink bandwidth which can be used by the terminal equipment.
In a second aspect, an embodiment of the present application provides a traffic speed limiting method applied to a backup leaf node, where the backup leaf node is communicatively connected to a primary leaf node, and both the primary leaf node and the backup leaf node are connected to a switch, where the method includes:
Receiving a first uplink flow, wherein the first uplink flow is sent by a terminal device through the switch;
And forwarding the first uplink traffic to the active leaf node, so that the active leaf node forwards the received uplink traffic according to a preset uplink bandwidth.
In a third aspect, an embodiment of the present application provides a traffic speed limiting method applied to a primary leaf node, where the primary leaf node is communicatively connected to a backup leaf node, and the primary leaf node and the backup leaf node are both connected to a switch, where the method includes:
Receiving a first uplink flow forwarded by the standby leaf node;
Receiving a second uplink flow;
Forwarding the first uplink traffic and the second uplink traffic according to a preset uplink bandwidth;
The first uplink flow is sent by the terminal equipment to the standby leaf node through the switch, the second uplink flow is sent by the terminal equipment to the main leaf node through the switch, and the preset uplink bandwidth is the maximum uplink bandwidth which can be used by the terminal equipment.
In a fourth aspect, an embodiment of the present application provides a traffic speed limiting device applied to a backup leaf node, where the backup leaf node is communicatively connected to a primary leaf node, and the primary leaf node and the backup leaf node are both connected to a switch, where the device includes:
The first flow receiving module is used for receiving first uplink flow which is sent by the terminal equipment through the switch;
And the first traffic forwarding module is used for forwarding the first uplink traffic to the main leaf node so that the main leaf node forwards the received uplink traffic according to a preset uplink bandwidth.
In a fifth aspect, an embodiment of the present application provides a traffic speed limiting device applied to a primary leaf node, where the primary leaf node is communicatively connected to a backup leaf node, and the primary leaf node and the backup leaf node are both connected to a switch, where the device includes:
a fourth flow receiving module, configured to receive a first uplink flow forwarded by the standby leaf node;
a fifth flow receiving module, configured to receive a second uplink flow;
the fourth flow forwarding module is used for forwarding the first uplink flow and the second uplink flow according to a preset uplink bandwidth;
The first uplink flow is sent by the terminal equipment to the standby leaf node through the switch, the second uplink flow is sent by the terminal equipment to the main leaf node through the switch, and the preset uplink bandwidth is the maximum uplink bandwidth which can be used by the terminal equipment.
In a sixth aspect, an embodiment of the present application provides a backup leaf node, where the backup leaf node is communicatively connected to an active leaf node, where the active leaf node and the backup leaf node are both connected to a switch, and the backup leaf node includes:
A processor;
A transceiver;
A machine-readable storage medium storing machine-executable instructions executable by the processor, the machine-executable instructions causing the processor to perform the steps of:
Receiving a first uplink flow, wherein the first uplink flow is sent by a terminal device through the switch;
And forwarding the first uplink traffic to the active leaf node, so that the active leaf node forwards the received uplink traffic according to a preset uplink bandwidth.
In a seventh aspect, an embodiment of the present application provides an active leaf node, where the active leaf node is communicatively connected to a standby leaf node, and the active leaf node and the standby leaf node are both connected to a switch, where the active leaf node includes:
A processor;
A transceiver;
A machine-readable storage medium storing machine-executable instructions executable by the processor, the machine-executable instructions causing the processor to perform the steps of:
Receiving a first uplink flow forwarded by the standby leaf node;
Receiving a second uplink flow;
Forwarding the first uplink traffic and the second uplink traffic according to a preset uplink bandwidth;
The first uplink flow is sent by the terminal equipment to the standby leaf node through the switch, the second uplink flow is sent by the terminal equipment to the main leaf node through the switch, and the preset uplink bandwidth is the maximum uplink bandwidth which can be used by the terminal equipment.
In an eighth aspect, embodiments of the present application provide a computer readable storage medium having a computer program stored therein, which when executed by a processor implements the method according to any of the second or third aspects.
In a ninth aspect, embodiments of the present application also provide a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method of any of the above second or third aspects.
The embodiment of the application has the beneficial effects that:
The service flow rate limiting system provided by the embodiment of the application comprises a main leaf node and a standby leaf node which are both connected with a switch, and the switch is connected with terminal equipment. The upstream traffic of the terminal device can be sent to the primary leaf node and the backup leaf node, respectively. For the first uplink traffic addressed to the spare leaf node, the spare leaf node forwards the first uplink traffic to the active leaf node, and then the active leaf node continues forwarding. For the second upstream traffic addressed to the primary leaf node, the primary leaf node directly forwards the second upstream traffic. That is, although the switch would send upstream traffic to the active leaf node and the standby leaf node, respectively, eventually all upstream traffic is forwarded out of the traffic rate-limiting system through the active leaf node. Therefore, the main leaf node can monitor all uplink traffic, so that the speed limit of the uplink traffic is realized under the scene that the switch is connected with a plurality of leaf nodes and the plurality of leaf nodes can forward traffic.
Drawings
In order to more clearly illustrate the embodiments of the application or the technical solutions in the prior art, the drawings used in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the application, and other embodiments may be obtained according to these drawings to those skilled in the art.
FIG. 1 is a schematic diagram of a first speed limiting mode in the related art;
FIG. 2 is a schematic diagram of a second speed limiting mode in the related art;
fig. 3 is a schematic view of an application scenario provided in an embodiment of the present application;
FIG. 4 is a schematic diagram of a traffic speed limiting system in the related art;
Fig. 5 is a schematic structural diagram of a first traffic speed limiting system according to an embodiment of the present application;
Fig. 6 is a flow chart of a first traffic speed limiting method according to an embodiment of the present application;
Fig. 7 is a schematic structural diagram of a second traffic speed limiting system according to an embodiment of the present application;
Fig. 8 is a schematic diagram of a traffic forwarding path according to an embodiment of the present application;
fig. 9 is a flow chart of a second traffic speed limiting method according to an embodiment of the present application;
fig. 10 is a flow chart of a third traffic speed limiting method according to an embodiment of the present application;
fig. 11 is a schematic structural diagram of a first traffic speed limiting device according to an embodiment of the present application;
fig. 12 is a schematic structural diagram of a second traffic speed limiting device according to an embodiment of the present application;
fig. 13 is a schematic structural diagram of a standby leaf node according to an embodiment of the present application;
fig. 14 is a schematic structural diagram of a primary leaf node according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. Based on the embodiments of the present application, all other embodiments obtained by the person skilled in the art based on the present application are included in the scope of protection of the present application.
In order to better illustrate an application scenario of an embodiment of the present application, first, an application scenario of an embodiment of the present application will be described with reference to fig. 3.
Referring to fig. 3, a schematic view of an application scenario is provided in an embodiment of the present application.
The figure contains a vBRAS (vi rtual Broadband Remote ACCESS SERVER, virtual bandwidth remote access server) -VP (Control Plane) 1 and vBRAS-CP2 as cloud resource pools and metropolitan area cloud networks. Also included in fig. 3 are DV (DATA CENTER ) -leaf docked with vbas-CP 1, DC-leaf docked with vbas-CP 2. Also included in fig. 3 are two VRs (Core routers) that interface 163 with the Core network of the network segment. The fig. 3 further includes two S-leaf, where each S-leaf is connected to one of pUP1, pUP2, and pUP3, and each of pUP1, pUP2, and pUP3 is a home bandwidth service gateway, and is located in a vbas-UP (User Plane) pool. Fig. 3 also includes two a-leaf, both of which are connected to the OLT, which is also connected to the ONU (Optical Network Unit ) and CPE. Two a-leaf remain dual alive based on the link aggregation protocol. For example, the link aggregation protocol may be S-trunk or other link aggregation protocol.
Two spines are also included in fig. 3. Each Spine is connected to a respective DC-leaf, a respective A-leaf, and a respective S-leaf. Another VR connects to a Spine, and the two VR connects to different spines.
In ONE example, ONE and puc 1-puc 3 are used to implement home bandwidth services, IPTV (Internet Protocol Television, web tv) services, and the like. CPE is used to implement government or enterprise services.
Thus, the forwarding paths for traffic of home bandwidth traffic and IPTV traffic may be puc to S-leaf to Spine to VR to the core network. Or the forwarding path may be pUP to S-leaf to Spine to A-leaf to OLT to ONU.
The forwarding path for traffic of government or enterprise traffic may be CPE to OLT to a-leaf to Spine to VR to the core network.
The location of pUP1, pUP2, pUP3 in the vBRAS-UP pool can be rate-limited by the vBRAS-UP device. An EVPN (Ethernet Virtual Private Network ) VPLS (Vi rtualPrivate LAN SERVICE, virtual private local area network service) over SRv (Segment Routing Internet Protocol Version, sixth edition internet protocol segment routing) can be established between the a-Leaf and S-Leaf.
In the application scenario shown in fig. 3, the above-mentioned problem exists when the ONU and the VPE connected to the OLT are speed-limited.
In order to solve the above-mentioned problems, a processing method is proposed in the related art, and the CPE in fig. 3 has the above-mentioned speed limiting problem as an example. The related art approach is for the CPE to add a dedicated link between the OLT and the a-leaf separately.
Referring to fig. 4, a schematic diagram of a traffic speed limiting system in the related art is shown. The connection between CPE, OLT, A-leaf1 and A-leaf2 in the figures is shown in FIG. 3 and will not be described in detail.
A pair of dashed double arrows in the figure are newly added dedicated links, in which case the OLT accesses in a dual-homing single-active manner. That is, the OLT is connected to both A-leaf1 and A-leaf2, but only the link with A-leaf1 is active and the link with A-leaf2 is inactive. I.e. traffic is forwarded only through a-leaf 1. Thus, 100M is limited on A-leaf1 and A-leaf2, respectively, but 100M limiting of CPE can be achieved because traffic is forwarded only through A-leaf 1.
However, the adoption of the mode requires a new special link, requires additional consumption of light path resources, has high construction cost, and is not available under construction-free conditions.
In order to accurately limit the speed of the private line traffic of the terminal equipment connected with the switch under the scene that the switch is connected with a plurality of leaf nodes and the plurality of leaf nodes can forward the traffic, the embodiment of the application provides a traffic speed limiting system, a traffic speed limiting method and a traffic speed limiting device.
Referring to fig. 5, a schematic structural diagram of a first traffic speed limiting system according to an embodiment of the present application includes a primary leaf node 501 and a backup leaf node 502, where the primary leaf node 501 is communicatively connected to the backup leaf node 502, and both the primary leaf node 501 and the backup leaf node 502 are connected to a switch.
It should be noted that, the number of active leaf nodes 501 included in the traffic speed limiting system may be one, or one or more, standby leaf nodes 502, and only one standby leaf node 502 is shown in fig. 5. In the case where there are a plurality of spare leaf nodes 502, in the case where the primary leaf node does not fail, each spare leaf node 502 performs the same steps, which will be described below by taking one spare leaf node as an example.
Referring to fig. 6, a flow chart of a first traffic speed limiting method according to an embodiment of the present application includes the following steps S601 to S604.
S601, the backup leaf node 502 receives the first upstream traffic.
Wherein the first uplink traffic is sent by the terminal device through the switch.
And S602, the standby leaf node 502 forwards the first uplink traffic to the main leaf node 501.
And S603, the primary leaf node 501 receives the first uplink traffic and the second uplink traffic.
Wherein the second upstream traffic is sent by the terminal device through the switch,
And S604, the main leaf node 501 forwards the first uplink traffic and the second uplink traffic according to a preset uplink bandwidth.
The preset uplink bandwidth is the maximum uplink bandwidth that the terminal device can use.
After receiving the second upstream traffic sent by the terminal device, the switch encapsulates the second upstream traffic to obtain a second destination MAC (MEDIA ACCESS Control) address in the ethernet header of the second upstream traffic, where the second destination MAC address is the MAC address of the interface on the primary leaf node 501, so that after the primary leaf node 501 determines that the second destination MAC address is the MAC address of the self interface, the ethernet header of the outer layer is decapsulated, and forwarding the second upstream traffic according to the destination IP address of the inner layer IP header through the interface.
In addition, the above uplink traffic forwarding process is a forwarding process for one terminal device, and for each terminal device, the same forwarding process may be adopted to forward uplink traffic. The above-mentioned primary leaf node 501 may record the correspondence between the device information of different terminal devices and the preset uplink bandwidth of the terminal device. Therefore, the terminal equipment to which the first uplink flow and the second uplink flow belong can be determined according to the information contained in the first uplink flow and the second uplink flow, and the preset uplink bandwidth of the terminal equipment is determined. And further, when the first uplink traffic and the second uplink traffic are forwarded, the total traffic forwarding speed of the first uplink traffic and the second uplink traffic is ensured not to exceed the preset uplink bandwidth.
From the above, the traffic speed limiting system provided by the embodiment of the present application includes the primary leaf node and the backup leaf node, both of which are connected to the switch, and the switch is connected to the terminal device. The upstream traffic of the terminal device can be sent to the primary leaf node and the backup leaf node, respectively. For the first uplink traffic addressed to the spare leaf node, the spare leaf node forwards the first uplink traffic to the active leaf node, and then the active leaf node continues forwarding. For the second upstream traffic addressed to the primary leaf node, the primary leaf node directly forwards the second upstream traffic. That is, although the switch would send upstream traffic to the active leaf node and the standby leaf node, respectively, eventually all upstream traffic is forwarded out of the traffic rate-limiting system through the active leaf node. Therefore, the main leaf node can monitor all uplink traffic, so that the speed limit of the uplink traffic is realized under the scene that the switch is connected with a plurality of leaf nodes and the plurality of leaf nodes can forward traffic.
In another embodiment of the present application, the active leaf node 501 further performs the following steps a-B.
And step A, sending a first routing protocol message to other network nodes outside the service flow rate limiting system.
Specifically, after the primary leaf node 501 sends the first routing protocol packet to the other network nodes, the other network nodes can learn the route for sending the downstream traffic to the primary leaf node 501, and then the other network nodes can send the downstream traffic to the primary leaf node 501. However, the spare leaf node 502 will not send routing protocol messages to other network nodes, so that other network nodes cannot learn the route of the downstream traffic sent to the spare leaf node 502, and will not send the downstream traffic to the spare leaf node 502.
And B, receiving and forwarding the first downlink traffic aiming at the terminal equipment to the switch according to the preset downlink bandwidth.
The above-mentioned primary leaf node 501 may record the correspondence between the device information of different terminal devices and the preset downlink bandwidth of the terminal device. Therefore, the terminal equipment to which the first downlink flow belongs can be determined according to the information contained in the first downlink flow, and the preset uplink bandwidth of the terminal equipment can be determined. And further, when the first downlink traffic is forwarded, the traffic forwarding speed is ensured not to exceed the preset downlink bandwidth.
From the above, in the embodiment of the present application, only the primary leaf node will send the first routing protocol packet to other network nodes, and the standby leaf node will not send the routing protocol packet to other network nodes. Other network nodes can only learn the route for forwarding the downlink traffic to the main leaf node, and only forward the downlink traffic to the main leaf node when the downlink traffic is sent to the terminal equipment. Therefore, all the downlink traffic sent to the terminal equipment is forwarded through the main leaf node, and the main leaf node can monitor all the downlink traffic sent to the terminal equipment, so that the speed limit of the downlink traffic aiming at the terminal equipment is realized.
In one embodiment of the present application, VPLS examples, layer three virtual interfaces of a network layer, layer two virtual interfaces of a link layer, physical sub-interfaces of a physical layer and physical interfaces are respectively configured in the active leaf node and the standby leaf node, the active leaf node and the standby leaf node are connected through VPLS PW (Pseudo-wire), the physical interfaces are connected with the switch, physical sub-interfaces in the same leaf node are connected with the physical interfaces, the layer three virtual interfaces are in one-to-one correspondence with VLANs (Vi rtual Local Area Network, virtual local area networks) of the physical sub-interfaces, the physical sub-interfaces send the uplink traffic to the layer three virtual interfaces corresponding to the layer three virtual interfaces after receiving the uplink traffic, and the layer three virtual interfaces send the downlink traffic to the physical sub-interfaces corresponding to the layer three virtual interfaces after receiving the downlink traffic, and the layer three virtual interfaces in the same leaf node are associated with the same VPLS examples with the physical sub-interfaces.
It should be noted that, there may be a layer three virtual interface and multiple physical subinterfaces in each leaf node, so long as the layer three virtual interfaces and the multiple physical subinterfaces are in one-to-one correspondence.
Referring to fig. 7, a schematic structural diagram of a second traffic speed limiting system according to an embodiment of the present application is shown, where a left dashed box represents a primary leaf node 501 and a right side represents a standby leaf node 502.
The primary leaf node 501 includes a physical interface P1, where the physical interface P1 is connected to physical subinterfaces P1.1 and P1.2. The primary leaf node 501 also includes a first layer two virtual interface, represented in fig. 7 as L2-VE 1. The primary leaf node 501 further includes two first layer three virtual interfaces, denoted by L3VE1.1 and L3VE1.2, L3VE1.1 corresponds to P1.1, and L3VE1.2 corresponds to P1.2.
The standby leaf node 502 includes a physical interface P2, where the physical interface P2 is connected to physical subinterfaces P2.1 and P2.2. Also included in the alternate leaf node 502 is a layer two virtual interface, represented in FIG. 7 as L2-VE 2. The standby leaf node 502 further includes two second layer three virtual interfaces, indicated by L3VE2.1 and L3VE2.2, respectively, L3VE2.1 corresponds to P2.1 and L3VE2.2 corresponds to P2.2.
The dashed boxes throughout the primary leaf node 501 and the backup leaf node 502 in the figure represent VPLS instances, which contain L2-VE1, L2-VE2, P1.1, P1.2 representing L2-VE1, L2-VE2, P1.1, P1.2 binding to the same VPLS instance. The primary leaf node 501 and the backup leaf node 502 are connected by a VPLS PW, thereby constructing a two-layer path between the two leaf nodes. The VPLS PW is established based on the physical path between the P3 interfaces in the physical layer of the two leaf nodes.
Link aggregation is deployed between the P1 interface and the P2 interface of the main leaf node 501 and the standby leaf node 502, and the two interfaces are connected through the P3 interface, so that the link aggregation heartbeat keep-alive between the main leaf node 501 and the standby leaf node 502 is realized.
On this basis, the specific forwarding flow of the uplink traffic can be seen from the following step V-step G.
In step V, the first VPLS instance in the standby leaf node 502 forwards the first upstream traffic to the active leaf node 501 through the VPLS PW based on the first destination MAC address of the first upstream traffic.
The first destination MAC address is the MAC address of the first layer three virtual interface in the main leaf node.
After receiving the first uplink traffic sent by the terminal device, the switch encapsulates the first uplink traffic with the first destination MAC address in the ethernet header as the MAC address of the interface on the primary leaf node 501, so after receiving the first uplink traffic, the first VPLS instance searches the MAC table based on the first destination MAC address, determines that the next hop IP address is the tunnel IP address of the VPLS PW, encapsulates the tunnel header with the destination IP address as the tunnel IP address for the first uplink traffic, and forwards the first uplink traffic encapsulated with the tunnel header to the primary leaf node 501 through the VPLS PW according to the destination IP address of the tunnel header.
And step D, the second VPLS instance in the main leaf node 501 sends the first uplink traffic to the first layer three virtual interface through the first layer two virtual interface based on the first destination MAC address.
After the second VPLS instance receives the first uplink traffic, decapsulating the tunnel header at the outer layer, and determining that the destination MAC address in the ethernet header is the virtual MAC address of the first layer three virtual interface, and transmitting the first uplink traffic to the first layer three virtual interface through the first layer two virtual interface. The first layer three virtual interfaces unpack the Ethernet header of the first uplink flow, and then the routing table look-up table forwarding is carried out according to the destination IP address in the IP header of the inner layer.
And E, receiving a second uplink flow by the second physical interface of the main leaf node 501, and sending the second uplink flow to the first physical sub-interface according to a second destination MAC address of the second uplink flow.
The second destination MAC address is the MAC address of the first layer three virtual interface, and the first physical sub-interface corresponds to the first layer three virtual interface.
Each first physical sub-interface corresponds to a first layer three virtual interface, the second destination MAC address of the second uplink flow is the virtual MAC address of the first layer three virtual interface, and the second physical sub-interface sends the second uplink flow to the first physical sub-interface corresponding to the first layer three virtual interface of which the MAC address is the second destination MAC address of the second uplink flow.
And F, the first physical sub-interface transmits the second uplink flow to the first layer three virtual interface through the first layer two virtual interface according to the second destination MAC address.
Specifically, the first physical sub-interface corresponds to a first layer three virtual interface corresponding to the second destination MAC address, and the second uplink traffic is transparently transferred to the first layer three virtual interface through a first layer two virtual interface.
And G, forwarding the first uplink traffic and the second uplink traffic by the first layer three virtual interfaces according to a preset uplink bandwidth.
Specifically, the corresponding relation between the device information of different terminal devices and the preset uplink bandwidth of the terminal device is configured in the first layer three virtual interface, so that the terminal device to which the terminal device belongs can be determined according to the information contained in the first uplink flow and the second uplink flow, and the preset uplink bandwidth of the terminal device can be determined. And further, when the first uplink traffic and the second uplink traffic are forwarded, the total traffic forwarding speed of the first uplink traffic and the second uplink traffic is ensured not to exceed the preset uplink bandwidth.
In addition, in the aspect of forwarding the first downlink traffic, after the first layer three interface receives the first downlink traffic, the first layer three interface sends the first downlink traffic to a first physical subinterface corresponding to the first layer three interface through a first layer two virtual interface, the first physical subinterface sends the first downlink traffic to a second physical interface, the first downlink traffic is sent to a switch through the second physical interface, and the switch forwards the first downlink traffic to a terminal device.
In addition, in the above-mentioned main leaf node 501, a plurality of first layer three virtual interfaces may be used to forward uplink traffic and downlink traffic of different terminal devices, where different first layer three virtual interfaces may be used to forward uplink traffic and downlink traffic of one or more terminal devices.
In addition, in the case that the virtual MAC address of the first layer three virtual interface of the primary leaf node 501 is in the active available state, the virtual MAC address of the layer three virtual interface of the backup leaf node 502 is in the inactive unavailable state, that is, the switch will not forward the upstream traffic with the virtual MAC address of the layer three virtual interface of the backup leaf node as the destination MAC address. Other network nodes do not forward downstream traffic with the virtual MAC address of the layer three virtual interface of the spare leaf node as the destination MAC address.
Referring to fig. 8, a schematic diagram of a traffic forwarding path is provided in an embodiment of the present application.
In comparison with fig. 7, a switch (OLT) is shown which is connected to a primary leaf node 501 and to a backup leaf node 502, the OLT connecting two terminal devices, terminal device 1 and terminal device 2, respectively. The IP address of the terminal device 1 is 192.168.0.2, and the IP address of the terminal device 2 is 192.168.0.3. The gateway addresses of the primary leaf node 501 and the backup leaf node 502 are both configured in the address pool 192.168.0.1. The above IP addresses are only examples, and specific values of the IP addresses are not limited in the embodiment of the present application.
There are two arrows from the terminal device 1 to L3VE1.1 in the figure, representing the forwarding paths of the upstream traffic. Where the arrow passing through the alternate leaf node 502 represents the forwarding path of the first upstream traffic and the other arrow represents the forwarding path of the second upstream traffic.
The arrow from L3VE1.1 to terminal device 1 in the figure indicates the forwarding path of downstream traffic.
In addition, because of the possibility of failure of the active leaf node 501, in order to ensure that traffic forwarding can still be performed normally after the active leaf node 501 fails, a VRRP (Vi rtual Router Redundancy Protocol ) and a VSRP (Virtual Service Redundancy Protocol, virtual traffic redundancy protocol) may be configured between the active leaf node 501 and the standby leaf node 502. Heartbeat keep-alive for VRRP and VSRP is achieved through VPLS PW. Thus, through the VPLS PW, the active leaf node 501 may monitor whether the standby leaf node 502 is malfunctioning, and the standby leaf node 502 may also monitor whether the active leaf node 501 is malfunctioning.
The primary leaf node 501 and the backup leaf node 502 are negotiated between the leaf nodes through VRRP.
To address the problem of failure of the primary leaf node 501, the backup leaf node 502 also performs the following step H.
And step H, if the main leaf node 501 is determined to be in a fault state, receiving a third uplink flow, and forwarding the third uplink flow according to the preset uplink bandwidth.
Wherein the third uplink traffic is sent by the terminal device through the switch.
After the primary leaf node 501 fails, if the backup leaf node 502 detects that the primary leaf node 501 fails through the VRRP heartbeat, the backup leaf node 502 is changed to a new primary leaf node, and the virtual MAC address of the backup leaf node 502 is activated. Then VSPR after synchronizing the VRRP state, notify the routing module of the standby leaf node 502 that the original active leaf node 501 is faulty, and traffic forwarding is required.
After the failure of the original primary leaf node 501, the interface between the original primary leaf node 501 and the switch fails, and the switch can no longer send the third upstream traffic to the original primary leaf node 501, so the switch can only send the third upstream traffic to the original backup leaf node 502. On this basis, the backup leaf node 502 also determines that the primary leaf node 501 fails and is not capable of forwarding the third uplink traffic, and the backup leaf node 502 is changed to a new primary leaf node, and the new primary leaf node may perform forwarding of the third uplink traffic based on the manner shown in the foregoing steps S601-S604, and the specific forwarding manner is not described herein.
Therefore, in the scheme provided by the embodiment of the application, after the main leaf node fails, the standby leaf node can be used as a new main leaf node, so that the normal forwarding of the uplink traffic is ensured, and the speed limiting processing of the uplink traffic can be still completed.
In another embodiment of the present application, the spare leaf node 502 may also perform the following steps I-J.
And step I, if the main leaf node 501 is determined to be in a fault state, sending a second routing protocol message to other network nodes outside the service flow speed limiting system.
And J, receiving and forwarding second downlink traffic aiming at the terminal equipment to the switch according to the preset downlink bandwidth.
As described above, the backup leaf node 502 determines that the primary leaf node 501 is in the failure state, and then changes itself to a new primary leaf node to forward the second downstream traffic. The specific forwarding process can be referred to the description of the previous step a-step B, and will not be repeated here.
Therefore, in the scheme provided by the embodiment of the application, after the main leaf node fails, the standby leaf node can be used as a new main leaf node, so that the normal forwarding of the downlink traffic is ensured, and the speed limiting processing of the downlink traffic can be still completed.
In yet another embodiment of the present application, in order to ensure the security of the network, the device information of the above terminal device is recorded in the active leaf node 501.
Specifically, the device information may include information such as a user name, an IP address, and a VLAN name to which the user belongs.
The primary leaf node 501 also performs the following step K.
And step K, forwarding the first uplink flow and the second uplink flow which accord with the equipment information.
If the information of the first uplink flow and the second uplink flow accords with the equipment information, the flow is indicated to be the flow of a normal terminal user, and the flow forwarding is performed normally. If the information of the first upstream traffic and the second upstream traffic does not match the device information, it is indicated that the traffic is for an unregistered illegal end user, and the traffic may be discarded and not forwarded.
In addition, in the case where the internal structure of the primary leaf node 501 is the structure shown in fig. 7, the device information is arranged in the first layer three virtual interface, and the first layer three virtual interface verifies the traffic information to determine whether or not the received traffic information matches the device information.
Further, the device information may be recorded in the spare leaf node 502, so that after the primary leaf node 501 fails, the spare leaf node 502 may continue to verify traffic information as a new primary leaf node.
From the above, the active leaf node in the scheme provided by the embodiment of the application can also verify the information of the received traffic before forwarding the traffic, thereby preventing illegal terminal equipment from being counterfeited and ensuring network security.
Corresponding to the traffic speed limiting system, the embodiment of the application also provides a traffic speed limiting method applied to the standby leaf node.
Referring to fig. 9, a flow chart of a second traffic speed limiting method according to an embodiment of the present application is applied to a backup leaf node, where the backup leaf node is connected to a primary leaf node through a VPLS PW, and the primary leaf node and the backup leaf node are both connected to a switch, where the method includes the following steps S901 to S902.
And S901, receiving the first uplink traffic.
The first uplink traffic is sent by the terminal device through the switch.
And S902, forwarding the first uplink traffic to the main leaf node so that the main leaf node forwards the received uplink traffic according to a preset uplink bandwidth.
From the above, the traffic speed limiting system provided by the embodiment of the present application includes the primary leaf node and the backup leaf node, both of which are connected to the switch, and the switch is connected to the terminal device. The upstream traffic of the terminal device can be sent to the primary leaf node and the backup leaf node, respectively. For the first uplink traffic addressed to the spare leaf node, the spare leaf node forwards the first uplink traffic to the active leaf node, and then the active leaf node continues forwarding. For the second upstream traffic addressed to the primary leaf node, the primary leaf node directly forwards the second upstream traffic. That is, although the switch would send upstream traffic to the active leaf node and the standby leaf node, respectively, eventually all upstream traffic is forwarded out of the traffic rate-limiting system through the active leaf node. Therefore, the main leaf node can monitor all uplink traffic, so that the speed limit of the uplink traffic is realized under the scene that the switch is connected with a plurality of leaf nodes and the plurality of leaf nodes can forward traffic.
In one embodiment of the present application, a first VPLS instance, a layer three virtual interface of a network layer, a layer two virtual interface of a link layer, a physical subinterface of a physical layer, and a physical interface are configured in the spare leaf node, the primary leaf node and the spare leaf node are connected through a virtual private lan service VPLS pseudowire PW, the physical interface is connected to the switch, the physical subinterface is connected to the physical interface, the layer three virtual interface corresponds to a virtual local area network VLAN of the physical subinterface one by one, and the layer three virtual interface and the physical subinterface are associated with the same VPLS instance;
the above step S902 is implemented by the following step L.
And step L, the first VPLS example forwards the first uplink traffic to the main leaf node through the VPLSPW based on the first destination MAC address of the first uplink traffic, so that the main leaf node forwards the received uplink traffic according to a preset uplink bandwidth.
In one embodiment of the present application, the method further includes:
If the main leaf node is determined to be in a fault state, receiving third uplink flow, wherein the third uplink flow is sent by the terminal equipment through the switch;
and forwarding the third uplink flow according to the preset uplink bandwidth.
Therefore, in the scheme provided by the embodiment of the application, after the main leaf node fails, the standby leaf node can be used as a new main leaf node, so that the normal forwarding of the uplink traffic is ensured, and the speed limiting processing of the uplink traffic can be still completed.
In one embodiment of the application, the method further comprises:
If the main leaf node is determined to be in a fault state, sending a second routing protocol message to other network nodes outside the service flow speed limiting system;
And receiving and forwarding second downlink traffic for the terminal equipment to the switch according to the preset downlink bandwidth.
Therefore, in the scheme provided by the embodiment of the application, after the main leaf node fails, the standby leaf node can be used as a new main leaf node, so that the normal forwarding of the downlink traffic is ensured, and the speed limiting processing of the downlink traffic can be still completed.
Corresponding to the traffic speed limiting system, the embodiment of the application also provides a traffic speed limiting method applied to the main leaf node.
Referring to fig. 10, a flow chart of a third traffic speed limiting method according to an embodiment of the present application is applied to a primary leaf node, where the primary leaf node is communicatively connected to a backup leaf node, and the primary leaf node and the backup leaf node are both connected to a switch, where the method includes the following steps S1001-S1003.
S1001, receiving the first uplink traffic forwarded by the standby leaf node.
S1002, receiving a second uplink flow.
S1003, forwarding the first uplink traffic and the second uplink traffic according to a preset uplink bandwidth.
The first uplink flow is sent by the terminal equipment to the standby leaf node through the switch, the second uplink flow is sent by the terminal equipment to the main leaf node through the switch, and the preset uplink bandwidth is the maximum uplink bandwidth which can be used by the terminal equipment.
From the above, the traffic speed limiting system provided by the embodiment of the present application includes the primary leaf node and the backup leaf node, both of which are connected to the switch, and the switch is connected to the terminal device. The upstream traffic of the terminal device can be sent to the primary leaf node and the backup leaf node, respectively. For the first uplink traffic addressed to the spare leaf node, the spare leaf node forwards the first uplink traffic to the active leaf node, and then the active leaf node continues forwarding. For the second upstream traffic addressed to the primary leaf node, the primary leaf node directly forwards the second upstream traffic. That is, although the switch would send upstream traffic to the active leaf node and the standby leaf node, respectively, eventually all upstream traffic is forwarded out of the traffic rate-limiting system through the active leaf node. Therefore, the main leaf node can monitor all uplink traffic, so that the speed limit of the uplink traffic is realized under the scene that the switch is connected with a plurality of leaf nodes and the plurality of leaf nodes can forward traffic.
In one embodiment of the application, the method further comprises:
Sending a first routing protocol message to other network nodes outside the service flow rate limiting system;
And receiving and forwarding the first downlink traffic aiming at the terminal equipment to the switch according to the preset downlink bandwidth.
From the above, in the embodiment of the present application, only the primary leaf node will send the first routing protocol packet to other network nodes, and the standby leaf node will not send the routing protocol packet to other network nodes. Other network nodes can only learn the route for forwarding the downlink traffic to the main leaf node, and only forward the downlink traffic to the main leaf node when the downlink traffic is sent to the terminal equipment. Therefore, all the downlink traffic sent to the terminal equipment is forwarded through the main leaf node, and the main leaf node can monitor all the downlink traffic sent to the terminal equipment, so that the speed limit of the downlink traffic aiming at the terminal equipment is realized.
In one embodiment of the present application, the primary leaf node is configured with a second VPLS instance, a layer three virtual interface of a network layer, a layer two virtual interface of a link layer, a physical subinterface of a physical layer, and a physical interface, where the primary leaf node is connected with the standby leaf node through a virtual private lan service VPLS pseudowire PW, the physical interface is connected with the switch, the physical subinterface is connected with the physical interface, the layer three virtual interface corresponds to a virtual lan VLAN of the physical subinterface one by one, and the layer three virtual interface is associated with the same VPLS instance with the physical subinterface;
The above step S1003 may be implemented by the following steps M1 to M4.
And M1, the second VPLS instance sends the first uplink flow to the first layer three virtual interface through the first layer two virtual interface based on the first destination MAC address of the first uplink flow.
And M2, after the second physical interface of the main leaf node receives the second uplink flow, sending the second uplink flow to a first physical sub-interface according to a second destination MAC address of the second uplink flow, wherein the second destination MAC address is the MAC address of the first layer three virtual interface, and the first physical sub-interface corresponds to the first layer three virtual interface.
And M3, the first physical sub-interface sends the second uplink flow to the first layer three virtual interface through the first layer two virtual interface according to the second destination MAC address.
And M4, forwarding the first uplink traffic and the second uplink traffic by the first layer three virtual interfaces according to a preset uplink bandwidth.
In one embodiment of the present application, the device information of the terminal device is recorded in the active leaf node, and the above step S1003 may be implemented by the following step N.
And N, forwarding the first uplink flow and the second uplink flow which accord with the equipment information according to the preset uplink bandwidth.
From the above, the active leaf node in the scheme provided by the embodiment of the application can also verify the information of the received traffic before forwarding the traffic, thereby preventing illegal terminal equipment from being counterfeited and ensuring network security.
Corresponding to the traffic speed limiting system, the embodiment of the application also provides a traffic speed limiting device applied to the standby leaf node.
Referring to fig. 11, a schematic structural diagram of a first traffic speed limiting device according to an embodiment of the present application is applied to a backup leaf node, where the backup leaf node is communicatively connected to a primary leaf node, and the primary leaf node and the backup leaf node are both connected to a switch, where the device includes:
a first traffic receiving module 1101, configured to receive a first uplink traffic, where the first uplink traffic is sent by the terminal device through the switch;
And the first traffic forwarding module 1102 is configured to forward the first uplink traffic to the active leaf node, so that the active leaf node forwards the received uplink traffic according to a preset uplink bandwidth.
From the above, the traffic speed limiting system provided by the embodiment of the present application includes the primary leaf node and the backup leaf node, both of which are connected to the switch, and the switch is connected to the terminal device. The upstream traffic of the terminal device can be sent to the primary leaf node and the backup leaf node, respectively. For the first uplink traffic addressed to the spare leaf node, the spare leaf node forwards the first uplink traffic to the active leaf node, and then the active leaf node continues forwarding. For the second upstream traffic addressed to the primary leaf node, the primary leaf node directly forwards the second upstream traffic. That is, although the switch would send upstream traffic to the active leaf node and the standby leaf node, respectively, eventually all upstream traffic is forwarded out of the traffic rate-limiting system through the active leaf node. Therefore, the main leaf node can monitor all uplink traffic, so that the speed limit of the uplink traffic is realized under the scene that the switch is connected with a plurality of leaf nodes and the plurality of leaf nodes can forward traffic.
In one embodiment of the present application, a first VPLS instance, a layer three virtual interface of a network layer, a layer two virtual interface of a link layer, a physical subinterface of a physical layer, and a physical interface are configured in the spare leaf node, the primary leaf node and the spare leaf node are connected through a virtual private lan service VPLS pseudowire PW, the physical interface is connected to the switch, the physical subinterface is connected to the physical interface, the layer three virtual interface corresponds to a virtual local area network VLAN of the physical subinterface one by one, and the layer three virtual interface and the physical subinterface are associated with the same VPLS instance;
the first traffic forwarding module 1102 is specifically configured to:
The first VPLS instance forwards the first upstream traffic to the active leaf node through the VPLS PW based on a first destination medium access control MAC address of the first upstream traffic.
In one embodiment of the application, the apparatus further comprises:
A third flow receiving module, configured to receive a third uplink flow if it is determined that the primary leaf node is in a failure state, where the third uplink flow is sent by the terminal device through the switch;
and the third flow forwarding module is used for forwarding the third uplink flow according to the preset uplink bandwidth.
Therefore, in the scheme provided by the embodiment of the application, after the main leaf node fails, the standby leaf node can be used as a new main leaf node, so that the normal forwarding of the uplink traffic is ensured, and the speed limiting processing of the uplink traffic can be still completed.
In one embodiment of the application, the apparatus further comprises:
the second protocol message sending module is used for sending a second routing protocol message to other network nodes outside the service flow speed limiting system if the main leaf node is determined to be in a fault state;
and the second traffic receiving module is used for receiving and forwarding the second downlink traffic aiming at the terminal equipment to the switch according to the preset downlink bandwidth.
Therefore, in the scheme provided by the embodiment of the application, after the main leaf node fails, the standby leaf node can be used as a new main leaf node, so that the normal forwarding of the downlink traffic is ensured, and the speed limiting processing of the downlink traffic can be still completed.
Corresponding to the traffic speed limiting system, the embodiment of the application also provides a traffic speed limiting device applied to the main leaf node.
Referring to fig. 12, a schematic structural diagram of a second traffic speed limiting device according to an embodiment of the present application is applied to a primary leaf node, where the primary leaf node is communicatively connected to a backup leaf node, and the primary leaf node and the backup leaf node are both connected to a switch, where the device includes:
A fourth traffic receiving module 1201, configured to receive the first uplink traffic forwarded by the standby leaf node;
A fifth flow receiving module 1202, configured to receive a second uplink flow;
a fourth traffic forwarding module 1203, configured to forward the first uplink traffic and the second uplink traffic according to a preset uplink bandwidth;
The first uplink flow is sent by the terminal equipment to the standby leaf node through the switch, the second uplink flow is sent by the terminal equipment to the main leaf node through the switch, and the preset uplink bandwidth is the maximum uplink bandwidth which can be used by the terminal equipment.
From the above, the traffic speed limiting system provided by the embodiment of the present application includes the primary leaf node and the backup leaf node, both of which are connected to the switch, and the switch is connected to the terminal device. The upstream traffic of the terminal device can be sent to the primary leaf node and the backup leaf node, respectively. For the first uplink traffic addressed to the spare leaf node, the spare leaf node forwards the first uplink traffic to the active leaf node, and then the active leaf node continues forwarding. For the second upstream traffic addressed to the primary leaf node, the primary leaf node directly forwards the second upstream traffic. That is, although the switch would send upstream traffic to the active leaf node and the standby leaf node, respectively, eventually all upstream traffic is forwarded out of the traffic rate-limiting system through the active leaf node. Therefore, the main leaf node can monitor all uplink traffic, so that the speed limit of the uplink traffic is realized under the scene that the switch is connected with a plurality of leaf nodes and the plurality of leaf nodes can forward traffic.
In one embodiment of the application, the apparatus further comprises:
the first protocol message sending module is used for sending a first routing protocol message to other network nodes outside the service flow speed limiting system;
And the sixth flow receiving module is used for receiving and forwarding the first downlink flow aiming at the terminal equipment to the switch according to the preset downlink bandwidth.
From the above, in the embodiment of the present application, only the primary leaf node will send the first routing protocol packet to other network nodes, and the standby leaf node will not send the routing protocol packet to other network nodes. Other network nodes can only learn the route for forwarding the downlink traffic to the main leaf node, and only forward the downlink traffic to the main leaf node when the downlink traffic is sent to the terminal equipment. Therefore, all the downlink traffic sent to the terminal equipment is forwarded through the main leaf node, and the main leaf node can monitor all the downlink traffic sent to the terminal equipment, so that the speed limit of the downlink traffic aiming at the terminal equipment is realized.
In one embodiment of the present application, the primary leaf node is configured with a second VPLS instance, a layer three virtual interface of a network layer, a layer two virtual interface of a link layer, a physical subinterface of a physical layer, and a physical interface, where the primary leaf node is connected with the standby leaf node through a virtual private lan service VPLS pseudowire PW, the physical interface is connected with the switch, the physical subinterface is connected with the physical interface, the layer three virtual interface corresponds to a virtual lan VLAN of the physical subinterface one by one, and the layer three virtual interface is associated with the same VPLS instance with the physical subinterface;
the fourth traffic forwarding module 1203 is specifically configured to:
The second VPLS instance sends the first uplink traffic to the first layer three virtual interface through a first layer two virtual interface based on a first destination MAC address of the first uplink traffic;
After receiving a second uplink flow, a second physical interface of the main leaf node sends the second uplink flow to a first physical sub-interface according to a second destination MAC address of the second uplink flow, wherein the second destination MAC address is an MAC address of the first layer three virtual interface, and the first physical sub-interface corresponds to the first layer three virtual interface;
The first physical sub-interface sends the second uplink flow to the first layer three virtual interface through the first layer two virtual interface according to the second destination MAC address;
And the first layer three virtual interfaces forward the first uplink traffic and the second uplink traffic according to a preset uplink bandwidth.
In one embodiment of the present application, the device information of the terminal device is recorded in the active leaf node, and the fourth traffic forwarding module 1203 is specifically configured to:
and forwarding the first uplink traffic and the second uplink traffic which accord with the equipment information according to the preset uplink bandwidth.
From the above, the active leaf node in the scheme provided by the embodiment of the application can also verify the information of the received traffic before forwarding the traffic, thereby preventing illegal terminal equipment from being counterfeited and ensuring network security.
Corresponding to the foregoing traffic speed limiting system, the embodiment of the present application further provides a backup leaf node, where the backup leaf node is in communication connection with a primary leaf node, and the primary leaf node and the backup leaf node are both connected to a switch, as shown in fig. 13, where the backup leaf node includes:
A processor 1301;
A transceiver 1304;
A machine-readable storage medium 1302, the machine-readable storage medium 1302 storing machine-executable instructions executable by the processor 1301, the machine-executable instructions causing the processor 1301 to:
Receiving a first uplink flow, wherein the first uplink flow is sent by a terminal device through the switch;
And forwarding the first uplink traffic to the active leaf node, so that the active leaf node forwards the received uplink traffic according to a preset uplink bandwidth.
As shown in fig. 13, the network device may also include a communication bus 1303. The processor 1301, machine-readable storage medium 1302, and transceiver 1304 communicate with each other via a communication bus 1303, where the communication bus 1303 may be a peripheral component interconnect (PERIPHERAL COMPONENT INTERCONNECT, PCI) bus, or an extended industry standard architecture (Extended Industry Standard Architecture, EISA) bus, among others. The communication bus 1303 may be classified into an address bus, a data bus, a control bus, and the like.
The transceiver 1304 may be a wireless communication module, and the transceiver 1304 performs data interaction with other devices under the control of the processor 1301.
The machine-readable storage medium 1302 may include random access Memory (Random Access Memory, RAM) or may include Non-Volatile Memory (NVM), such as at least one disk Memory. Additionally, the machine-readable storage medium 1302 may also be at least one storage device located remotely from the aforementioned processor.
The processor 1301 may be a general purpose processor including a central Processing unit (Central Processing Unit, CPU), a network processor (Network Processor, NP), etc., or may be a digital signal processor (DIGITAL SIGNAL Processing, DSP), application SPECIFIC INTEGRATED VI rcuit (ASIC), field-Programmable gate array (Field-Programmable GATE ARRAY, FPGA) or other Programmable logic device, discrete gate or transistor logic device, discrete hardware components.
From the above, the traffic speed limiting system provided by the embodiment of the present application includes the primary leaf node and the backup leaf node, both of which are connected to the switch, and the switch is connected to the terminal device. The upstream traffic of the terminal device can be sent to the primary leaf node and the backup leaf node, respectively. For the first uplink traffic addressed to the spare leaf node, the spare leaf node forwards the first uplink traffic to the active leaf node, and then the active leaf node continues forwarding. For the second upstream traffic addressed to the primary leaf node, the primary leaf node directly forwards the second upstream traffic. That is, although the switch would send upstream traffic to the active leaf node and the standby leaf node, respectively, eventually all upstream traffic is forwarded out of the traffic rate-limiting system through the active leaf node. Therefore, the main leaf node can monitor all uplink traffic, so that the speed limit of the uplink traffic is realized under the scene that the switch is connected with a plurality of leaf nodes and the plurality of leaf nodes can forward traffic.
In one embodiment of the present application, a first VPLS instance, a layer three virtual interface of a network layer, a layer two virtual interface of a link layer, a physical subinterface of a physical layer, and a physical interface are configured in the spare leaf node, the primary leaf node and the spare leaf node are connected through a virtual private lan service VPLS pseudowire PW, the physical interface is connected to the switch, the physical subinterface is connected to the physical interface, the layer three virtual interface corresponds to a virtual local area network VLAN of the physical subinterface one by one, and the layer three virtual interface and the physical subinterface are associated with the same VPLS instance;
The forwarding, by the VPLS PW, the first upstream traffic to the active leaf node specifically includes:
The first VPLS instance forwards the first upstream traffic to the active leaf node through the VPLS PW based on a first destination medium access control MAC address of the first upstream traffic.
In one embodiment of the application, the machine-executable instructions further cause the processor 1201 to perform the steps of:
If the main leaf node is determined to be in a fault state through the VPLS PW, receiving third uplink flow, wherein the third uplink flow is sent by the terminal equipment through the switch;
and forwarding the third uplink flow according to the preset uplink bandwidth.
Therefore, in the scheme provided by the embodiment of the application, after the main leaf node fails, the standby leaf node can be used as a new main leaf node, so that the normal forwarding of the uplink traffic is ensured, and the speed limiting processing of the uplink traffic can be still completed.
In one embodiment of the application, the machine executable instructions further cause the processor 1301 to perform the steps of:
If the main leaf node is determined to be in a fault state, sending a second routing protocol message to other network nodes outside the service flow speed limiting system;
And receiving and forwarding second downlink traffic for the terminal equipment to the switch according to the preset downlink bandwidth.
Therefore, in the scheme provided by the embodiment of the application, after the main leaf node fails, the standby leaf node can be used as a new main leaf node, so that the normal forwarding of the downlink traffic is ensured, and the speed limiting processing of the downlink traffic can be still completed.
Corresponding to the foregoing traffic speed limiting system, the embodiment of the present application further provides a primary leaf node, where the primary leaf node is communicatively connected to a backup leaf node, and the primary leaf node and the backup leaf node are both connected to a switch, as shown in fig. 14, where the primary leaf node includes:
a processor 1401;
a transceiver 1404;
A machine-readable storage medium 1402, the machine-readable storage medium 1402 storing machine-executable instructions executable by the processor 1401, the machine-executable instructions causing the processor 1401 to perform the steps of:
Receiving a first uplink flow forwarded by the standby leaf node;
Receiving a second uplink flow;
Forwarding the first uplink traffic and the second uplink traffic according to a preset uplink bandwidth;
The first uplink flow is sent by the terminal equipment to the standby leaf node through the switch, the second uplink flow is sent by the terminal equipment to the main leaf node through the switch, and the preset uplink bandwidth is the maximum uplink bandwidth which can be used by the terminal equipment.
As shown in fig. 14, the network device may also include a communication bus 1403. The processor 1401, the machine-readable storage medium 1402, and the transceiver 1404 communicate with each other via a communication bus 1403, where the communication bus 1403 may be a peripheral component interconnect standard (PERIPHERAL COMPONENT INTERCONNECT, PCI) bus or an extended industry standard architecture (Extended Industry Standard Architecture, EISA) bus, among others. The communication bus 1403 may be divided into an address bus, a data bus, a control bus, and the like.
The transceiver 1404 may be a wireless communication module, and the transceiver 1404 performs data interaction with other devices under the control of the processor 1401.
The machine-readable storage medium 1402 may include random access Memory (Random Access Memory, RAM) or may include Non-Volatile Memory (NVM), such as at least one disk Memory. Additionally, the machine-readable storage medium 1402 may also be at least one storage device located remotely from the aforementioned processor.
The processor 1401 may be a general purpose processor including a central Processing unit (Central Processing Unit, CPU), a network processor (Network Processor, NP), etc., or may be a digital signal processor (DIGITAL SIGNAL Processing, DSP), application SPECIFIC INTEGRATED VI rcuit (ASIC), field-Programmable gate array (Field-Programmable GATE ARRAY, FPGA) or other Programmable logic device, discrete gate or transistor logic device, discrete hardware components.
From the above, the traffic speed limiting system provided by the embodiment of the present application includes the primary leaf node and the backup leaf node, both of which are connected to the switch, and the switch is connected to the terminal device. The upstream traffic of the terminal device can be sent to the primary leaf node and the backup leaf node, respectively. For the first uplink traffic addressed to the spare leaf node, the spare leaf node forwards the first uplink traffic to the active leaf node, and then the active leaf node continues forwarding. For the second upstream traffic addressed to the primary leaf node, the primary leaf node directly forwards the second upstream traffic. That is, although the switch would send upstream traffic to the active leaf node and the standby leaf node, respectively, eventually all upstream traffic is forwarded out of the traffic rate-limiting system through the active leaf node. Therefore, the main leaf node can monitor all uplink traffic, so that the speed limit of the uplink traffic is realized under the scene that the switch is connected with a plurality of leaf nodes and the plurality of leaf nodes can forward traffic.
In one embodiment of the application, the machine-executable instructions further cause the processor 1401 to perform the steps of:
Sending a first routing protocol message to other network nodes outside the service flow rate limiting system;
And receiving and forwarding the first downlink traffic aiming at the terminal equipment to the switch according to the preset downlink bandwidth.
From the above, in the embodiment of the present application, only the primary leaf node will send the first routing protocol packet to other network nodes, and the standby leaf node will not send the routing protocol packet to other network nodes. Other network nodes can only learn the route for forwarding the downlink traffic to the main leaf node, and only forward the downlink traffic to the main leaf node when the downlink traffic is sent to the terminal equipment. Therefore, all the downlink traffic sent to the terminal equipment is forwarded through the main leaf node, and the main leaf node can monitor all the downlink traffic sent to the terminal equipment, so that the speed limit of the downlink traffic aiming at the terminal equipment is realized.
In one embodiment of the present application, the primary leaf node is configured with a second VPLS instance, a layer three virtual interface of a network layer, a layer two virtual interface of a link layer, a physical subinterface of a physical layer, and a physical interface, where the primary leaf node is connected with the standby leaf node through a virtual private lan service VPLS pseudowire PW, the physical interface is connected with the switch, the physical subinterface is connected with the physical interface, the layer three virtual interface corresponds to a virtual lan VLAN of the physical subinterface one by one, and the layer three virtual interface is associated with the same VPLS instance with the physical subinterface;
forwarding the first uplink traffic and the second uplink traffic according to a preset uplink bandwidth specifically includes:
The second VPLS instance sends the first uplink traffic to the first layer three virtual interface through a first layer two virtual interface based on a first destination MAC address of the first uplink traffic;
After receiving a second uplink flow, a second physical interface of the main leaf node sends the second uplink flow to a first physical sub-interface according to a second destination MAC address of the second uplink flow, wherein the second destination MAC address is an MAC address of the first layer three virtual interface, and the first physical sub-interface corresponds to the first layer three virtual interface;
The first physical sub-interface sends the second uplink flow to the first layer three virtual interface through the first layer two virtual interface according to the second destination MAC address;
And the first layer three virtual interfaces forward the first uplink traffic and the second uplink traffic according to a preset uplink bandwidth.
In one embodiment of the present application, the recording the device information of the terminal device in the active leaf node, and the forwarding the first uplink traffic and the second uplink traffic specifically includes:
and forwarding the received traffic in case the information of the received traffic conforms to the device information.
From the above, the active leaf node in the scheme provided by the embodiment of the application can also verify the information of the received traffic before forwarding the traffic, thereby preventing illegal terminal equipment from being counterfeited and ensuring network security.
In yet another embodiment of the present application, a computer readable storage medium is provided, in which a computer program is stored which, when executed by a processor, implements the steps of any traffic rate limiting method applied to a primary leaf node or a backup leaf node.
In yet another embodiment of the present application, there is also provided a computer program product containing instructions which, when run on a computer, cause the computer to perform the steps of any of the traffic rate limiting methods of the above embodiments applied to either the primary leaf node or the backup leaf node.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the present application, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another, for example, by wired (e.g., coaxial cable, optical fiber, digital Subscriber Line (DSL)), or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid state disk Solid STATE DISK (SSD)), etc.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one.," does not exclude the presence of additional identical elements in a process, method, article, or apparatus that comprises the element.
In this specification, each embodiment is described in a related manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for the method, apparatus, backup leaf node, primary leaf node, computer-readable storage medium, computer program product embodiments, the description is relatively simple as it is substantially similar to the method embodiments, where relevant see the section description of the method embodiments.
The foregoing description is only of the preferred embodiments of the present application and is not intended to limit the scope of the present application. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application are included in the protection scope of the present application.
Claims (19)
1. A traffic speed limiting system is characterized by comprising a main leaf node and a standby leaf node, wherein the main leaf node is in communication connection with the standby leaf node, and the main leaf node and the standby leaf node are both connected with a switch;
The standby leaf node is configured to receive a first uplink traffic, and forward the first uplink traffic to the active leaf node;
The primary leaf node is configured to receive the first uplink traffic and the second uplink traffic, and forward the first uplink traffic and the second uplink traffic according to a preset uplink bandwidth;
The first uplink flow and the second uplink flow are sent by the terminal equipment through the switch, and the preset uplink bandwidth is the maximum uplink bandwidth which can be used by the terminal equipment.
2. The system of claim 1, wherein the active leaf node is further configured to:
Sending a first routing protocol message to other network nodes outside the service flow rate limiting system;
And receiving and forwarding the first downlink traffic aiming at the terminal equipment to the switch according to the preset downlink bandwidth.
3. The system of claim 1, wherein the primary leaf node and the backup leaf node are respectively configured with a VPLS instance, a layer three virtual interface of a network layer, a layer two virtual interface of a link layer, a physical sub-interface of a physical layer and a physical interface, the primary leaf node and the backup leaf node are connected through a virtual private lan service VPLS pseudowire PW, the physical interface is connected with the switch, a physical sub-interface in the same leaf node is connected with the physical interface, the layer three virtual interfaces are in one-to-one correspondence with a virtual local area network VLAN of the physical sub-interface, and the layer three virtual interface in the same leaf node is associated with the physical sub-interface with the same VPLS instance;
Forwarding the first uplink traffic to the active leaf node through the VPLS PW based on a first destination medium access control MAC address of the first uplink traffic by a first VPLS instance in the standby leaf node, where the first destination MAC address is a MAC address of a first layer three virtual interface in the active leaf node;
The second VPLS instance in the main leaf node sends the first uplink flow to the first layer three virtual interface through the first layer two virtual interface based on the first destination MAC address;
The second physical interface of the main leaf node receives second uplink traffic, and sends the second uplink traffic to a first physical sub-interface according to a second destination MAC address of the second uplink traffic, wherein the second destination MAC address is the MAC address of the first layer three virtual interface, and the first physical sub-interface corresponds to the first layer three virtual interface;
The first physical sub-interface sends the second uplink flow to the first layer three virtual interface through the first layer two virtual interface according to the second destination MAC address;
And the first layer three virtual interfaces forward the first uplink traffic and the second uplink traffic according to a preset uplink bandwidth.
4. A system according to any of claims 1-3, wherein the backup leaf node is further configured to:
And if the main leaf node is determined to be in a fault state, receiving a third uplink flow, and forwarding the third uplink flow according to the preset uplink bandwidth, wherein the third uplink flow is sent by the terminal equipment through the switch.
5. A system according to any of claims 1-3, wherein the backup leaf node is further configured to:
If the main leaf node is determined to be in a fault state, sending a second routing protocol message to other network nodes outside the service flow speed limiting system;
And receiving and forwarding second downlink traffic for the terminal equipment to the switch according to the preset downlink bandwidth.
6. The system according to claim 1 or 2, characterized in that the device information of the terminal device is recorded in the active leaf node;
The primary leaf node is specifically configured to forward a first uplink traffic and a second uplink traffic that conform to the device information.
7. A traffic speed limiting method, applied to a backup leaf node, where the backup leaf node is communicatively connected to a primary leaf node, and both the primary leaf node and the backup leaf node are connected to a switch, the method comprising:
Receiving a first uplink flow, wherein the first uplink flow is sent by a terminal device through the switch;
And forwarding the first uplink traffic to the active leaf node, so that the active leaf node forwards the received uplink traffic according to a preset uplink bandwidth.
8. The method of claim 7, wherein the backup leaf node is configured with a first VPLS instance, a layer three virtual interface of a network layer, a layer two virtual interface of a link layer, a physical subinterface of a physical layer, and a physical interface, the primary leaf node and the backup leaf node are connected by a VPLS pseudowire PW, the physical interface is connected to the switch, the physical subinterface is connected to the physical interface, the layer three virtual interface corresponds to a VLAN of the physical subinterface one to one, and the layer three virtual interface is associated with the same VPLS instance with the physical subinterface;
The forwarding the first upstream traffic to the active leaf node includes:
The first VPLS instance forwards the first upstream traffic to the active leaf node through the VPLS PW based on a first destination medium access control MAC address of the first upstream traffic.
9. The method according to claim 7 or 8, characterized in that the method further comprises:
If the main leaf node is determined to be in a fault state, receiving third uplink flow, wherein the third uplink flow is sent by the terminal equipment through the switch;
and forwarding the third uplink flow according to the preset uplink bandwidth.
10. The method according to claim 7 or 8, characterized in that the method further comprises:
If the main leaf node is determined to be in a fault state, sending a second routing protocol message to other network nodes outside the service flow speed limiting system;
And receiving and forwarding second downlink traffic for the terminal equipment to the switch according to the preset downlink bandwidth.
11. The traffic speed limiting method is applied to a primary leaf node, the primary leaf node and a standby leaf node are in communication connection, and the primary leaf node and the standby leaf node are both connected with a switch, and the method comprises the following steps:
Receiving a first uplink flow forwarded by the standby leaf node;
Receiving a second uplink flow;
Forwarding the first uplink traffic and the second uplink traffic according to a preset uplink bandwidth;
The first uplink flow is sent by the terminal equipment to the standby leaf node through the switch, the second uplink flow is sent by the terminal equipment to the main leaf node through the switch, and the preset uplink bandwidth is the maximum uplink bandwidth which can be used by the terminal equipment.
12. The method of claim 11, wherein the method further comprises:
Sending a first routing protocol message to other network nodes outside the service flow rate limiting system;
And receiving and forwarding the first downlink traffic aiming at the terminal equipment to the switch according to the preset downlink bandwidth.
13. The method of claim 11, wherein the primary leaf node is configured with a second VPLS instance, a layer three virtual interface of a network layer, a layer two virtual interface of a link layer, a physical subinterface of a physical layer, and a physical interface, the primary leaf node and the backup leaf node are connected by a VPLS pseudowire PW, the physical interface is connected to the switch, the physical subinterface is connected to the physical interface, the layer three virtual interface corresponds to a VLAN of the physical subinterface one to one, and the layer three virtual interface is associated with the same VPLS instance with the physical subinterface;
forwarding the first uplink traffic and the second uplink traffic according to a preset uplink bandwidth, including:
The second VPLS instance sends the first uplink traffic to the first layer three virtual interface through a first layer two virtual interface based on a first destination MAC address of the first uplink traffic;
After receiving a second uplink flow, a second physical interface of the main leaf node sends the second uplink flow to a first physical sub-interface according to a second destination MAC address of the second uplink flow, wherein the second destination MAC address is an MAC address of the first layer three virtual interface, and the first physical sub-interface corresponds to the first layer three virtual interface;
The first physical sub-interface sends the second uplink flow to the first layer three virtual interface through the first layer two virtual interface according to the second destination MAC address;
And the first layer three virtual interfaces forward the first uplink traffic and the second uplink traffic according to a preset uplink bandwidth.
14. The method of claim 11, wherein the recording device information of the terminal device in the active leaf node, the forwarding the first upstream traffic and the second upstream traffic, comprises:
and forwarding the first uplink traffic and the second uplink traffic which accord with the equipment information.
15. A traffic speed limiting device, for use with a backup leaf node, the backup leaf node being in communication with a primary leaf node, the primary leaf node and the backup leaf node both being connected to a switch, the device comprising:
The first flow receiving module is used for receiving first uplink flow which is sent by the terminal equipment through the switch;
And the first traffic forwarding module is used for forwarding the first uplink traffic to the main leaf node so that the main leaf node forwards the received uplink traffic according to a preset uplink bandwidth.
16. A traffic speed limiting device, applied to a primary leaf node, where the primary leaf node is communicatively connected to a backup leaf node, and the primary leaf node and the backup leaf node are both connected to a switch, the device comprising:
a fourth flow receiving module, configured to receive a first uplink flow forwarded by the standby leaf node;
a fifth flow receiving module, configured to receive a second uplink flow;
the fourth flow forwarding module is used for forwarding the first uplink flow and the second uplink flow according to a preset uplink bandwidth;
The first uplink flow is sent by the terminal equipment to the standby leaf node through the switch, the second uplink flow is sent by the terminal equipment to the main leaf node through the switch, and the preset uplink bandwidth is the maximum uplink bandwidth which can be used by the terminal equipment.
17. A spare leaf node, wherein a communication connection is provided between the spare leaf node and a primary leaf node, the primary leaf node and the spare leaf node are both connected to a switch, the spare leaf node comprising:
A processor;
A transceiver;
A machine-readable storage medium storing machine-executable instructions executable by the processor, the machine-executable instructions causing the processor to perform the steps of:
Receiving a first uplink flow, wherein the first uplink flow is sent by a terminal device through the switch;
And forwarding the first uplink traffic to the active leaf node, so that the active leaf node forwards the received uplink traffic according to a preset uplink bandwidth.
18. The utility model provides a primary leaf node, its characterized in that, communication connection between primary leaf node and the reserve leaf node, primary leaf node with reserve leaf node all links to each other with the switch, primary leaf node includes:
A processor;
A transceiver;
A machine-readable storage medium storing machine-executable instructions executable by the processor, the machine-executable instructions causing the processor to perform the steps of:
Receiving a first uplink flow forwarded by the standby leaf node;
Receiving a second uplink flow;
Forwarding the first uplink traffic and the second uplink traffic according to a preset uplink bandwidth;
The first uplink flow is sent by the terminal equipment to the standby leaf node through the switch, the second uplink flow is sent by the terminal equipment to the main leaf node through the switch, and the preset uplink bandwidth is the maximum uplink bandwidth which can be used by the terminal equipment.
19. A computer readable storage medium, characterized in that the computer readable storage medium has stored therein a computer program which, when executed by a processor, implements the method of any of claims 7-10 or 11-14.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202411356036.3A CN119172319A (en) | 2024-09-26 | 2024-09-26 | A service flow rate limiting system, method and device |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202411356036.3A CN119172319A (en) | 2024-09-26 | 2024-09-26 | A service flow rate limiting system, method and device |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN119172319A true CN119172319A (en) | 2024-12-20 |
Family
ID=93889906
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202411356036.3A Pending CN119172319A (en) | 2024-09-26 | 2024-09-26 | A service flow rate limiting system, method and device |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN119172319A (en) |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20100290485A1 (en) * | 2009-05-18 | 2010-11-18 | Luca Martini | Regulation of network traffic in virtual private networks |
| CN102014061A (en) * | 2010-11-25 | 2011-04-13 | 福建星网锐捷网络有限公司 | Upstream flow control method and device for intranet core switch |
| CN102724126A (en) * | 2012-06-27 | 2012-10-10 | 福建星网锐捷网络有限公司 | Method, device and equipment for forwarding Ethernet tree (E-tree) service message |
| CN109729019A (en) * | 2018-12-28 | 2019-05-07 | 新华三技术有限公司 | The method for limiting speed and device of private line service in a kind of EVPN networking |
| CN116938826A (en) * | 2023-09-14 | 2023-10-24 | 中移(苏州)软件技术有限公司 | Network speed limiting methods and devices, systems, and electronic equipment |
-
2024
- 2024-09-26 CN CN202411356036.3A patent/CN119172319A/en active Pending
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20100290485A1 (en) * | 2009-05-18 | 2010-11-18 | Luca Martini | Regulation of network traffic in virtual private networks |
| CN102014061A (en) * | 2010-11-25 | 2011-04-13 | 福建星网锐捷网络有限公司 | Upstream flow control method and device for intranet core switch |
| CN102724126A (en) * | 2012-06-27 | 2012-10-10 | 福建星网锐捷网络有限公司 | Method, device and equipment for forwarding Ethernet tree (E-tree) service message |
| CN109729019A (en) * | 2018-12-28 | 2019-05-07 | 新华三技术有限公司 | The method for limiting speed and device of private line service in a kind of EVPN networking |
| CN116938826A (en) * | 2023-09-14 | 2023-10-24 | 中移(苏州)软件技术有限公司 | Network speed limiting methods and devices, systems, and electronic equipment |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11296908B2 (en) | Using multiple ethernet virtual private network (EVPN) routes for corresponding service interfaces of a subscriber interface | |
| CN109218178B (en) | Message processing method and network equipment | |
| US9019814B1 (en) | Fast failover in multi-homed ethernet virtual private networks | |
| US10693679B2 (en) | Using multiple ethernet virtual private network (EVPN) routes for corresponding service interfaces of a subscriber interface | |
| US9781032B1 (en) | MPLS label usage in ethernet virtual private networks | |
| JP6234440B2 (en) | Support for 802.1AQ over IETF VPN | |
| CN103873368B (en) | Ethernet message forwarding method and access device | |
| JP5542927B2 (en) | Inter-node link aggregation system and method | |
| CN101741742B (en) | Message processing method, access equipment and communication system | |
| CN112422307B (en) | Method, equipment and system for EVPN and VPLS coexistence dual-activity | |
| CN101286922B (en) | Signalling control method, system and apparatus | |
| CN112929274A (en) | Method, equipment and system for processing route | |
| WO2020024828A1 (en) | Communication method, communication device and communication system | |
| WO2013139159A1 (en) | Method for forwarding packet in network and provider edge device | |
| CN113381929B (en) | Route processing method, gateway equipment and computer storage medium | |
| WO2009082905A1 (en) | Method, system and switch device for dynamically establishing multicast virtual local area network | |
| US20170118105A1 (en) | Connectivity fault management in a communication network | |
| CN108737183A (en) | A kind of monitoring method and device of forwarding-table item | |
| CN101783743B (en) | Business protection method and switching node | |
| CN101692654B (en) | Method, system and equipment for HUB-Spoken networking | |
| WO2015027736A1 (en) | Method and device for implementing hierarchical virtual private lan service | |
| CN101702664A (en) | Data transmission method, device and system of virtual local area network | |
| CN119172319A (en) | A service flow rate limiting system, method and device | |
| CN114760248B (en) | Message transmission method, equipment and system | |
| WO2012016471A1 (en) | Topology convergence method and service provider edge |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination |