US20100067385A1 - Ethernet Architecture with Data Packet Encapsulation - Google Patents

Ethernet Architecture with Data Packet Encapsulation Download PDF

Info

Publication number
US20100067385A1
US20100067385A1 US12/624,893 US62489309A US2010067385A1 US 20100067385 A1 US20100067385 A1 US 20100067385A1 US 62489309 A US62489309 A US 62489309A US 2010067385 A1 US2010067385 A1 US 2010067385A1
Authority
US
United States
Prior art keywords
mac
customer
data packet
provider
destination address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/624,893
Inventor
Kuo-Hui Liu
Cheng-Hong Hu
Chin Yuan
Chou Lan Pok
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
AT&T Intellectual Property I LP
Original Assignee
AT&T Intellectual Property I LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by AT&T Intellectual Property I LP filed Critical AT&T Intellectual Property I LP
Priority to US12/624,893 priority Critical patent/US20100067385A1/en
Assigned to AT&T INTELLECTUAL PROPERTY I, L.P. reassignment AT&T INTELLECTUAL PROPERTY I, L.P. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HU, CHENG-HONG, LIU, KUO-HUI, POK, CHOU LAN, YUAN, CHIN
Publication of US20100067385A1 publication Critical patent/US20100067385A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/60Types of network addresses
    • H04L2101/618Details of network addresses
    • H04L2101/622Layer-2 addresses, e.g. medium access control [MAC] addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2212/00Encapsulation of packets

Definitions

  • the present disclosure relates to systems and methods associated with data communications and data packet encapsulation, including various Ethernet services.
  • FIG. 1 is a block diagram that illustrates a general system architecture that provides Ethernet service with MAC-in-MAC encapsulation
  • FIG. 2 illustrates an example of a MAC-in-MAC customer data packet
  • FIG. 3 is a flow diagram illustrating a method for handling customer packets at an ingress point for MAC-in-MAC mode
  • FIG. 4 is a flow diagram illustrating a method of packet handling at an egress point for MAC-in-MAC mode.
  • the present disclosure is generally directed to systems and methods associated with data communications.
  • a method of encapsulating data packets for use in a distributed computer network includes providing a data packet for transmission over the distributed computer network, the data packet selected from one of a customer data packet and an OAM data packet; and encapsulating the data packet with an additional provider MAC header (outer header).
  • This is referred as MAC-in-MAC mechanism in this document.
  • a data packet handling method includes receiving a data packet from a customer facing data port within a network node of a computer network; performing MAC address learning for the received packet; determining whether the data port is a MAC-in-MAC port; performing a packet mapping to a destination MAC address based on a service provider destination MAC address; and encapsulating the received data packet with a header associated with the service provider.
  • a medium access control (MAC) encapsulated data packet for distribution over an Ethernet network includes a provider destination MAC address field; a provider source MAC address field; an Ethertype field; and followed by a customer data packet.
  • the customer data packet encapsulates a provider header that includes the provider destination MAC address field, the provider source MAC address field, and the Ethertype field.
  • an encapsulation method for use in a provider network includes performing a first type of medium access control (MAC) packet encapsulation in a bridged mode at a first node within the provider network; and performing a second type of medium access control (MAC) packet encapsulation in a routed mode at a second node within the provider network.
  • MAC medium access control
  • a method of processing a data packet communicated within a provider network includes receiving an encapsulated data packet at an egress point of a multi tenant unit of the provider network and stripping off a provider header from the encapsulated data packet to produce a data packet selected from one of a customer packet and an OAM packet.
  • a method of processing a data packet communicated within a provider network includes receiving an encapsulated data packet at an egress point of a multi tenant unit of the provider network; stripping off an outer medium access control (MAC) header for an OAM packet in a routed mode; and performing processing on the recovered OAM packet.
  • MAC medium access control
  • the system 100 includes customer equipment at a first site 112 and at a second site 116 .
  • the system 100 also includes Access Nodes 102 and 110 and Core Nodes 106 and 108 .
  • the Nodes can be either Ethernet switches or IP/MPLS capable Ethernet routers.
  • the system 100 includes an Ethernet or Ethernet transport network 128 between the Core Nodes 106 and 108 . This network can also be an IP/MPLS network.
  • the Access Node 102 is linked to the Core Node 106 via circuit 104 and the second Core Node 108 is linked to the second Access Node 110 via circuit 130 . Both circuits 104 and 130 could be either traditional Ethernet links or Ethernet over MPLS (EoMPLS) links.
  • EoMPLS Ethernet over MPLS
  • the customer equipment 112 at the first site is associated with a plurality of MAC addresses 114 and the customer equipment at the second site 116 is associated with a second plurality of MAC addresses 118 .
  • the Access Node 102 includes a MAC-in-MAC encapsulation module 140 and provider MAC and customer MAC mapping learning module 142 .
  • the Access Node 102 upon receiving data packets, encapsulates a provider MAC address.
  • the MAC-in-MAC address header is then communicated via circuit 104 in association with a communicated data packet 160 to the Core Node 106 .
  • the Core Node 106 includes provider MAC learning module 150 for receiving and processing data packet 160 .
  • Core Node 108 includes provider MAC learning module 152 .
  • Communication of the MAC header 162 is made over a circuit 130 to the Access Node 110 .
  • the Access Node 110 includes provider MAC and customer MAC mapping learning module 144 and MAC-in-MAC encapsulation module 146 .
  • data from customer equipment associated with a particular MAC address within the plurality of MAC addresses 114 is communicated via CE 112 at the first site to Access Node 102 .
  • the Access Node 102 converts the MAC address within the set of MAC addresses to a particular provider MAC header in connection with the data packet communicated to the switch 106 .
  • the Core Node 106 performs provider MAC learning, communicates a data packet over the Ethernet network 128 and the data packet is received at Core Node 108 .
  • the Core Node 108 forwards the data packet and the MAC header 162 to destination access switch 110 , which forwards the packet to the customer equipment 116 at the second site, and finally to the customer equipment at the destination MAC address.
  • the destination MAC address is within the second set of MAC addresses 118 .
  • FIG. 2 illustrates an example of a customer packet with MAC-in-MAC encapsulation.
  • FIG. 2 illustrates an example of a customer packet with MAC-in-MAC encapsulation.
  • any number of fields with any lengths e.g., jumbo frames or the like
  • the number and description of fields in the header can be configured in any order or combination thereof according to the specific network requirements.
  • Fields 405 and 410 are each six octets wide, which are populated with provider MAC destination address (DA) and provider MAC source address (SA), respectively.
  • the field 415 defines the new Ethertype as a MAC-in-MAC packet.
  • the MAC DA 420 and MAC SA 425 fields are populated with the customer MAC addresses.
  • the MAC DA and MAC SA fields are encapsulated with the customer router MAC addresses.
  • Fields 420 and 425 are both 6 octets wide.
  • Field 430 is two octets wide and defines the Ethertype field original data packet.
  • Field 435 is the customer payload portion of the MAC-in-MAC packet and has a variable length.
  • Field 440 is the padding area and field 445 is a four octets wide frame check sequence (FCS).
  • Field 415 is 2 octets wide and defines “Ethertype” to identify MAC-in-MAC Ethernet encapsulation. The value of this field can be assigned according to standards employed by the network.
  • Field 420 is 6 octets wide and defines the original MAC DA.
  • Field 425 is 6 octets wide and defines the original MAC SA.
  • Field 430 is 2 octets wide and defines “Ethertype” for the original packet.
  • Field 435 is a combination of various fields defined in a conventional MAC frame.
  • Field 440 can be a variable size pad inserted to comply with employed protocols.
  • Field 445 is four octets wide and defines frame check sequence (FCS) for the MAC-in-MAC Ethernet frame. The Frame Check Sequence (FCS) is re-calculated to include newly defined fields.
  • FCS frame check sequence
  • a provider MAC address is assigned to a customer facing port at an access node that belongs to a customer VPLS based on VLAN information.
  • a port can have many provider MAC addresses based on the number of VLANs supported.
  • packet forwarding within the network nodes is based on the provider's MAC addresses.
  • a mapping between the original customer SA and its corresponding provider SA is learned at ingress as well as the egress of the provider's network. This mapping information is used for MAC-in-MAC encapsulation when the customer packet enters the provider's network.
  • Packets for a VPLS service inside a service provider's network may be forwarded using provider MAC addresses.
  • packets for a VPLS are forwarded using router MAC addresses.
  • a method for handling customer packets at an ingress point for MAC-in-MAC mode is disclosed.
  • a packet is received from a customer facing port, at 804 , and learning for the customer MAC addresses is performed, at 806 .
  • a determination is made, at decision block 808 , of whether a port is a MAC-in-MAC (MiM) port. If a MiM port is detected, then processing continues at decision block 816 .
  • a determination is made at decision step 816 whether the packet is a unicast packet. If the packet is a unicast packet, then a mapping of the packet is located with respect to a destination address with the provider destination address, at 818 .
  • MiM MAC-in-MAC
  • the packet is encapsulated with a provider header, at 822 , and the frame check sequence (FCS) is recalculated, at 824 . If the packet address is not found, at decision 820 , then the outer destination address is set equal to the provider multicast MAC, at step 826 , and processing continues with packet encapsulation, at 822 . After recalculating the FCS, at 824 , another determination of whether a unicast packet is made at decision step 828 . If a unicast mode is detected, then the packet is forwarded according to the provider destination MAC, at 830 , and processing is completed at 840 . In the case where a unicast packet is not detected, then a multicast packet is broadcast to each of the VPLS sites, at 814 .
  • FCS frame check sequence
  • a determination for unicast is made, at decision step 810 . If unicast mode is detected, then the packet is forwarded according to the customer destination MAC at step 812 , and processing is completed at 840 . If unicast is not detected, at decision step 810 , then a multicast mode is pursued and the packet is multicast to each of the VPLS sites, at 814 , and processing is completed at 840 .
  • a packet to be analyzed is received at an egress port at 1004 .
  • decision step 1006 a determination is made whether the packet is for broadcast. If a broadcast packet is detected, then decision step 1008 is evaluated to determine whether the Ethertype is equal to MiM. If the Ethertype is not determined to be set equal to MiM, then traditional MAC learning and packet forwarding is executed, at 1010 , and processing then continues to logic flow marker 1 , at 1012 , and to the end of processing, at 1050 .
  • the outer destination address is compared to the provider MAC. If the outer destination address equals the provider MAC, then a determination is made regarding the Ethertype, at decision step 1032 . If the Ethertype is not equal to the MiM at 1032 , then an error is detected and error handling is performed at 1034 , leading to the end of processing at 1012 , 1050 . Where the Ethertype is equal to MiM, at 1032 , then the inner destination address is compared to the provider MAC, at decision step 1036 . Where the inner destination address is not equal to the provider MAC, then the inner destination address is compared to the broadcast MAC, at decision step 1038 .
  • processing continues at 1040 , where the inner and outer source address mapping is learned and where the provider header is removed, at 1042 .
  • the inner destination address is equal to the broadcast MAC, at decision step 1038 , then processing is continued where the provider header is removed, at 1042 . In either situation, the packet is forwarded to the customer, at 1044 and processing is completed at 1050 .
  • step 1016 processing at this point continues to step 1016 as described above.
  • the provider multicast or MAC at egress at 1028 determination is negative, then an error is detected and error handling is performed at 1030 eventually leading to completion of processing at 1050 .
  • the MAC-in-MAC encapsulation technique may be used to avoid massive customer MAC address handling on provider Core devices.
  • a new provider MAC address is provided to represent one or many customer MAC addresses behind a customer facing port. Core devices perform a limited amount of network address learning.
  • the MAC-in-MAC encapsulation also provides for OAM delivery (e.g., to facilitate point-to-point, point-to-multi-point reachability testing, performance measurement, or the like).
  • Customer MAC address learning at gateway devices may be beneficially reduced or eliminated when a VPLS service spans multiple domains.
  • the disclosed MAC-in-MAC packet encapsulation mechanism is applicable to any Ethernet services, including pure Ethernet, Ethernet over MPLS, VPLS, Ethernet over ATM, Ethernet over frame relay, etc.

Abstract

A method of encapsulating data packets for use in a distributed computer network is disclosed. The method includes providing a data packet for transmission over the distributed computer network, the data packet selected from one of a customer data packet and an OAM data packet; and encapsulating the data packet with a medium access control outer packet. The disclosed data packet handling method includes receiving a data packet from a customer facing data port, the customer facing data port within a network node of a computer network; performing medium access control (MAC) learning for the received packet; determining whether the data port is a MAC-in-MAC port; performing a packet mapping to a destination address based on a service provider destination address; and encapsulating the received data packet with a header associated with the service provider.

Description

    CLAIM OF PRIORITY
  • The present application is a continuation application of, and claims priority to, U.S. patent application Ser. No. 10/394,482, filed Mar. 22, 2003, the contents of which are expressly incorporated herein by reference in their entirety.
  • FIELD OF THE DISCLOSURE
  • The present disclosure relates to systems and methods associated with data communications and data packet encapsulation, including various Ethernet services.
  • BACKGROUND
  • Many systems and architectures have been disclosed for handling data traffic over distributed networks. One type of system that has been recently proposed to the Internet Engineering Task Force (IETF) is using the Ethernet over multi-protocol label switching (MPLS) architecture to implement a virtual private LAN service (VPLS). While the proposed system has many benefits in providing cost effective data services, this system fails to adequately take into consideration scalability issues, such as medium access control (MAC) address computational concerns for networks with large numbers of customer MAC addresses, and maintenance issues, such as providing edge-to-edge troubleshooting.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The use of the same reference symbols in different drawings indicates similar or identical items.
  • FIG. 1 is a block diagram that illustrates a general system architecture that provides Ethernet service with MAC-in-MAC encapsulation;
  • FIG. 2 illustrates an example of a MAC-in-MAC customer data packet;
  • FIG. 3 is a flow diagram illustrating a method for handling customer packets at an ingress point for MAC-in-MAC mode; and
  • FIG. 4 is a flow diagram illustrating a method of packet handling at an egress point for MAC-in-MAC mode.
  • DETAILED DESCRIPTION
  • The present disclosure is generally directed to systems and methods associated with data communications. In a particular embodiment, a method of encapsulating data packets for use in a distributed computer network is disclosed. The method includes providing a data packet for transmission over the distributed computer network, the data packet selected from one of a customer data packet and an OAM data packet; and encapsulating the data packet with an additional provider MAC header (outer header). This is referred as MAC-in-MAC mechanism in this document.
  • In another embodiment, a data packet handling method is disclosed. The data packet handling method includes receiving a data packet from a customer facing data port within a network node of a computer network; performing MAC address learning for the received packet; determining whether the data port is a MAC-in-MAC port; performing a packet mapping to a destination MAC address based on a service provider destination MAC address; and encapsulating the received data packet with a header associated with the service provider.
  • In another embodiment, a medium access control (MAC) encapsulated data packet for distribution over an Ethernet network is disclosed. The MAC encapsulated data packet includes a provider destination MAC address field; a provider source MAC address field; an Ethertype field; and followed by a customer data packet. In other words, the customer data packet encapsulates a provider header that includes the provider destination MAC address field, the provider source MAC address field, and the Ethertype field.
  • In another embodiment, an encapsulation method for use in a provider network is disclosed. The method includes performing a first type of medium access control (MAC) packet encapsulation in a bridged mode at a first node within the provider network; and performing a second type of medium access control (MAC) packet encapsulation in a routed mode at a second node within the provider network.
  • In another embodiment, a method of processing a data packet communicated within a provider network is disclosed. The method includes receiving an encapsulated data packet at an egress point of a multi tenant unit of the provider network and stripping off a provider header from the encapsulated data packet to produce a data packet selected from one of a customer packet and an OAM packet.
  • In another embodiment, a method of processing a data packet communicated within a provider network is disclosed. The method includes receiving an encapsulated data packet at an egress point of a multi tenant unit of the provider network; stripping off an outer medium access control (MAC) header for an OAM packet in a routed mode; and performing processing on the recovered OAM packet.
  • Referring to FIG. 1, a system 100 is disclosed. The system 100 includes customer equipment at a first site 112 and at a second site 116. The system 100 also includes Access Nodes 102 and 110 and Core Nodes 106 and 108. The Nodes can be either Ethernet switches or IP/MPLS capable Ethernet routers. The system 100 includes an Ethernet or Ethernet transport network 128 between the Core Nodes 106 and 108. This network can also be an IP/MPLS network. The Access Node 102 is linked to the Core Node 106 via circuit 104 and the second Core Node 108 is linked to the second Access Node 110 via circuit 130. Both circuits 104 and 130 could be either traditional Ethernet links or Ethernet over MPLS (EoMPLS) links. The customer equipment 112 at the first site is associated with a plurality of MAC addresses 114 and the customer equipment at the second site 116 is associated with a second plurality of MAC addresses 118. The Access Node 102 includes a MAC-in-MAC encapsulation module 140 and provider MAC and customer MAC mapping learning module 142. The Access Node 102, upon receiving data packets, encapsulates a provider MAC address. The MAC-in-MAC address header is then communicated via circuit 104 in association with a communicated data packet 160 to the Core Node 106.
  • The Core Node 106 includes provider MAC learning module 150 for receiving and processing data packet 160. Similarly, Core Node 108 includes provider MAC learning module 152. Communication of the MAC header 162 is made over a circuit 130 to the Access Node 110. The Access Node 110 includes provider MAC and customer MAC mapping learning module 144 and MAC-in-MAC encapsulation module 146. During operation, data from customer equipment associated with a particular MAC address within the plurality of MAC addresses 114 is communicated via CE 112 at the first site to Access Node 102. The Access Node 102 converts the MAC address within the set of MAC addresses to a particular provider MAC header in connection with the data packet communicated to the switch 106. The Core Node 106 performs provider MAC learning, communicates a data packet over the Ethernet network 128 and the data packet is received at Core Node 108. The Core Node 108 forwards the data packet and the MAC header 162 to destination access switch 110, which forwards the packet to the customer equipment 116 at the second site, and finally to the customer equipment at the destination MAC address. The destination MAC address is within the second set of MAC addresses 118.
  • FIG. 2 illustrates an example of a customer packet with MAC-in-MAC encapsulation. For purposes of illustration, in the present example, while specific lengths and number of fields are described, one skilled in art will appreciate that any number of fields with any lengths (e.g., jumbo frames or the like) can be used as defined and supported by the protocols employed in the networks. The number and description of fields in the header can be configured in any order or combination thereof according to the specific network requirements.
  • Fields 405 and 410 are each six octets wide, which are populated with provider MAC destination address (DA) and provider MAC source address (SA), respectively. The field 415 defines the new Ethertype as a MAC-in-MAC packet. For customers that interface with bridging devices, the MAC DA 420 and MAC SA 425 fields are populated with the customer MAC addresses. For customers that interface with routing devices, the MAC DA and MAC SA fields are encapsulated with the customer router MAC addresses. Fields 420 and 425 are both 6 octets wide. Field 430 is two octets wide and defines the Ethertype field original data packet. Field 435 is the customer payload portion of the MAC-in-MAC packet and has a variable length. Field 440 is the padding area and field 445 is a four octets wide frame check sequence (FCS).
  • Field 415 is 2 octets wide and defines “Ethertype” to identify MAC-in-MAC Ethernet encapsulation. The value of this field can be assigned according to standards employed by the network. Field 420 is 6 octets wide and defines the original MAC DA. Field 425 is 6 octets wide and defines the original MAC SA. Field 430 is 2 octets wide and defines “Ethertype” for the original packet. Field 435 is a combination of various fields defined in a conventional MAC frame. Field 440 can be a variable size pad inserted to comply with employed protocols. Field 445 is four octets wide and defines frame check sequence (FCS) for the MAC-in-MAC Ethernet frame. The Frame Check Sequence (FCS) is re-calculated to include newly defined fields.
  • A provider MAC address is assigned to a customer facing port at an access node that belongs to a customer VPLS based on VLAN information. A port can have many provider MAC addresses based on the number of VLANs supported. With MAC-in-MAC encapsulation enabled, packet forwarding within the network nodes is based on the provider's MAC addresses. A mapping between the original customer SA and its corresponding provider SA is learned at ingress as well as the egress of the provider's network. This mapping information is used for MAC-in-MAC encapsulation when the customer packet enters the provider's network.
  • Packets for a VPLS service inside a service provider's network may be forwarded using provider MAC addresses. When a VPLS is router-based (i.e., all network elements in the VLAN are routers), packets are forwarded using router MAC addresses.
  • Referring to FIG. 3, a method for handling customer packets at an ingress point for MAC-in-MAC mode is disclosed. A packet is received from a customer facing port, at 804, and learning for the customer MAC addresses is performed, at 806. A determination is made, at decision block 808, of whether a port is a MAC-in-MAC (MiM) port. If a MiM port is detected, then processing continues at decision block 816. A determination is made at decision step 816 whether the packet is a unicast packet. If the packet is a unicast packet, then a mapping of the packet is located with respect to a destination address with the provider destination address, at 818. If the mapping is found at decision step 820, then the packet is encapsulated with a provider header, at 822, and the frame check sequence (FCS) is recalculated, at 824. If the packet address is not found, at decision 820, then the outer destination address is set equal to the provider multicast MAC, at step 826, and processing continues with packet encapsulation, at 822. After recalculating the FCS, at 824, another determination of whether a unicast packet is made at decision step 828. If a unicast mode is detected, then the packet is forwarded according to the provider destination MAC, at 830, and processing is completed at 840. In the case where a unicast packet is not detected, then a multicast packet is broadcast to each of the VPLS sites, at 814.
  • Referring again to decision block 808, where a MiM port is not detected, then a determination for unicast is made, at decision step 810. If unicast mode is detected, then the packet is forwarded according to the customer destination MAC at step 812, and processing is completed at 840. If unicast is not detected, at decision step 810, then a multicast mode is pursued and the packet is multicast to each of the VPLS sites, at 814, and processing is completed at 840.
  • Referring to FIG. 4, a method of packet handling at an egress point for MAC-in-MAC mode is disclosed. A packet to be analyzed is received at an egress port at 1004. At decision step 1006, a determination is made whether the packet is for broadcast. If a broadcast packet is detected, then decision step 1008 is evaluated to determine whether the Ethertype is equal to MiM. If the Ethertype is not determined to be set equal to MiM, then traditional MAC learning and packet forwarding is executed, at 1010, and processing then continues to logic flow marker 1, at 1012, and to the end of processing, at 1050.
  • Referring back to decision step 1008, if the Ethertype is equal to MiM, then a determination is made whether the inner destination address is equal to the provider MAC, at decision step 1014. Where this determination is positive then the provider header is removed, at 1016, the packet for OAM processing is sent, at 1018, and processing ends at step 1050. In the case where the inner destination address is not equal to the provider MAC, then an error handling routine is performed at 1020 and processing ends at 1050.
  • Referring again to decision step 1006, if the broadcast packet determination is negative, then at decision step 1022, the outer destination address is compared to the provider MAC. If the outer destination address equals the provider MAC, then a determination is made regarding the Ethertype, at decision step 1032. If the Ethertype is not equal to the MiM at 1032, then an error is detected and error handling is performed at 1034, leading to the end of processing at 1012, 1050. Where the Ethertype is equal to MiM, at 1032, then the inner destination address is compared to the provider MAC, at decision step 1036. Where the inner destination address is not equal to the provider MAC, then the inner destination address is compared to the broadcast MAC, at decision step 1038. Where this decision is negative, processing continues at 1040, where the inner and outer source address mapping is learned and where the provider header is removed, at 1042. Where the inner destination address is equal to the broadcast MAC, at decision step 1038, then processing is continued where the provider header is removed, at 1042. In either situation, the packet is forwarded to the customer, at 1044 and processing is completed at 1050.
  • Referring again to decision step 1022, where the outer destination address is not equal to the provider MAC, then a determination is made, at decision step 1024, whether the Ethertype is equal to MiM. Where the Ethertype is not equal to MiM, then processing continues from decision step 1024 to processing step 1010 as described above. Where the Ethertype is equal to MiM, then a determination is made at decision step 1026, whether the inner destination address equals the provider MAC. Where the inner destination address does not equal the provider MAC, then an error is detected and error handling is performed at 1032 and processing is completed at 1012, 1050. Where the inner destination address does equal the provider MAC, then a determination is made, at decision step 1028, regarding multicast. Where a provider multicast or MAC at egress situation is detected at 1028, then processing at this point continues to step 1016 as described above. In the case where the provider multicast or MAC at egress at 1028 determination is negative, then an error is detected and error handling is performed at 1030 eventually leading to completion of processing at 1050.
  • The MAC-in-MAC encapsulation technique may be used to avoid massive customer MAC address handling on provider Core devices. A new provider MAC address is provided to represent one or many customer MAC addresses behind a customer facing port. Core devices perform a limited amount of network address learning. The MAC-in-MAC encapsulation also provides for OAM delivery (e.g., to facilitate point-to-point, point-to-multi-point reachability testing, performance measurement, or the like). Customer MAC address learning at gateway devices may be beneficially reduced or eliminated when a VPLS service spans multiple domains. The disclosed MAC-in-MAC packet encapsulation mechanism is applicable to any Ethernet services, including pure Ethernet, Ethernet over MPLS, VPLS, Ethernet over ATM, Ethernet over frame relay, etc.
  • The above disclosed subject matter is to be considered illustrative and the appended claims are intended to cover all such modifications and other embodiments which fall within the scope of the present invention. Thus, to the maximum extent allowed by law, the scope of the present invention is to be determined by the broadest permissible interpretation of the following claims and their equivalents, and shall not be restricted or limited by the foregoing detailed description.

Claims (20)

1. A computer-implemented method, comprising:
receiving, at an access node device of a service provider network, a data packet from a customer equipment device behind a customer facing port of the access node device, the customer equipment device associated with a customer medium access control (MAC) source address, the data packet including a customer MAC destination address;
determining, at the access node device, a provider MAC source address associated with the customer equipment device, wherein the provider MAC source address is different from the customer MAC source address;
determining, at the access node device, a provider MAC destination address associated with the customer MAC destination address, wherein the provider MAC destination address is different from the customer MAC destination address; and
converting the data packet into an encapsulated data packet, at the access node device, by encapsulating the data packet with a provider MAC header comprising the provider MAC source address and the provider MAC destination address,
wherein the encapsulated data packet is communicated within the service provider network based on the provider MAC source address and the provider MAC destination address.
2. The computer-implemented method of claim 1, wherein the encapsulated data packet is communicated from the access node device to a second access node device associated with the provider MAC destination address via one or more core node devices of the service provider network.
3. The computer-implemented method of claim 2, wherein the second access node device extracts the customer MAC destination address from the encapsulated data packet, determines a second customer equipment device associated with the customer MAC destination address, and forwards the data packet to the second customer equipment device.
4. The computer-implemented method of claim 2, wherein the access node device is associated with a first site that includes a first plurality of customer equipment devices with associated customer MAC addresses, and wherein the second access node device is associated with a second site that includes a second plurality of customer equipment devices with associated customer MAC addresses.
5. The computer-implemented method of claim 1, wherein the data packet received from the customer equipment device includes an operation, administration and maintenance (OAM) data packet.
6. The computer-implemented method of claim 1, wherein the data packet received from the customer equipment device includes a customer data packet.
7. The computer-implemented method of claim 1, wherein the provider MAC source address is determined based on a customer facing port of the access node device that receives the data packet.
8. The computer-implemented method of claim 1, wherein the provider MAC source address is determined based on a multi-tenant unit associated with the customer equipment device.
9. The computer-implemented method of claim 1, wherein the provider MAC source address is determined on a label switching service basis.
10. The computer-implemented method of claim 1, wherein the provider MAC header further comprises a type field that includes an Ethertype value.
11. The computer-implemented method of claim 10, wherein the provider MAC destination address is six octets wide, the provider MAC source address is six octets wide, and the type field is two octets wide.
12. An access node device, comprising:
a customer facing port operable to receive a data packet from a customer equipment device that is associated with a customer medium access control (MAC) source address, the data packet including a customer MAC destination address;
a provider MAC and customer MAC mapping learning module operable to:
determine a provider MAC source address associated with the customer equipment device, wherein the provider MAC source address is different from the customer MAC source address; and
determine a provider MAC destination address associated with the customer MAC destination address, wherein the provider MAC destination address is different from the customer MAC destination address;
a MAC-in-MAC encapsulation module operable to convert the data packet into an encapsulated data packet by encapsulating the data packet with a provider MAC header comprising the provider MAC source address and the provider MAC destination address; and
a communication module operable to communicate the encapsulated data packet to a core node via a service provider network,
wherein the encapsulated data packet is communicated within the service provider network based on the provider MAC source address and the provider MAC destination address.
13. The access node device of claim 12, wherein the provider MAC source address is assigned to the customer facing port based on virtual local area network (VLAN) information.
14. The access node device of claim 13, wherein a plurality of provider MAC source addresses are associated with the customer facing port, wherein each provider MAC source address is associated with a particular VLAN.
15. The access node device of claim 12, wherein the communication module is further operable to receive a second encapsulated data packet, and wherein the provider MAC and customer MAC mapping learning module is further operable to extract a second customer MAC destination address from the second encapsulated data packet and to determine a particular customer equipment device associated with the second customer MAC destination address, and to forward a second data packet included within the encapsulated data packet to the particular customer equipment device via the customer facing port.
16. The access node device of claim 12, wherein a first plurality of customer equipment devices with associated customer MAC addresses communicates with an access node device via the customer facing port.
17. A system, comprising:
a first access node device operable to:
receive a data packet from a customer equipment device behind a customer facing port of the first access node, the customer equipment device associated with a customer medium access control (MAC) source address, the data packet including a customer MAC destination address;
determine a provider MAC source address associated with the customer equipment device, wherein the provider MAC source address is different from the customer MAC source address; and
determine a provider MAC destination address associated with the customer MAC destination address, wherein the provider MAC destination address is different from the customer MAC destination address; and
convert the data packet into an encapsulated data packet by encapsulating the data packet with a provider MAC header comprising the provider MAC source address and the provider MAC destination address; and
a core node device operable to:
receive the encapsulated data packet via a service provider network;
determine a second access node device associated with the provider MAC destination address; and
forward the encapsulated data packet to the second access node device associated with the provider MAC destination address via the service provider network.
18. The system of claim 17, wherein the second access node device extracts the customer MAC destination address from the encapsulated data packet, determines a second customer equipment device associated with the customer MAC destination address, and forwards the data packet to the second customer equipment device.
19. The system of claim 17, wherein the first access node device is associated with a first site that includes a first plurality of customer equipment devices with associated customer MAC addresses, and wherein the second access node device is associated with a second site that includes a second plurality of customer equipment devices with associated customer MAC addresses.
20. The system of claim 17, wherein the encapsulated data packet is forwarded to the second access node device associated with the provider MAC destination address via at least one other core node of the service provider network.
US12/624,893 2003-03-22 2009-11-24 Ethernet Architecture with Data Packet Encapsulation Abandoned US20100067385A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/624,893 US20100067385A1 (en) 2003-03-22 2009-11-24 Ethernet Architecture with Data Packet Encapsulation

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/394,482 US7643424B2 (en) 2003-03-22 2003-03-22 Ethernet architecture with data packet encapsulation
US12/624,893 US20100067385A1 (en) 2003-03-22 2009-11-24 Ethernet Architecture with Data Packet Encapsulation

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US10/394,482 Continuation US7643424B2 (en) 2003-03-22 2003-03-22 Ethernet architecture with data packet encapsulation

Publications (1)

Publication Number Publication Date
US20100067385A1 true US20100067385A1 (en) 2010-03-18

Family

ID=32988394

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/394,482 Expired - Fee Related US7643424B2 (en) 2003-03-22 2003-03-22 Ethernet architecture with data packet encapsulation
US12/624,893 Abandoned US20100067385A1 (en) 2003-03-22 2009-11-24 Ethernet Architecture with Data Packet Encapsulation

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US10/394,482 Expired - Fee Related US7643424B2 (en) 2003-03-22 2003-03-22 Ethernet architecture with data packet encapsulation

Country Status (1)

Country Link
US (2) US7643424B2 (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080240002A1 (en) * 2005-03-11 2008-10-02 Da Tang Mobile Communications Equipment Co., Ltd Wireless Transmission Method of Using Efficient High Performance Frame Structure in Wideband Tdd System
US20090232005A1 (en) * 2007-10-12 2009-09-17 Nortel Networks Limited IP Network and Performance Monitoring Using Ethernet OAM
CN102761471A (en) * 2011-04-29 2012-10-31 无锡江南计算技术研究所 Wireless computing interconnection network and coordinate spatial transformation method
US20130215751A1 (en) * 2012-02-17 2013-08-22 Thomas A. Tetzlaff Methods and arrangements for packet flows in wireless networks
US8718061B2 (en) 2010-11-19 2014-05-06 Industrial Technology Research Institute Data center network system and packet forwarding method thereof
US20140153579A1 (en) * 2006-11-02 2014-06-05 Rockstar Consortium Us Lp Distributed Storage of Routing Information in a Link State Protocol Controlled Network
US20150078387A1 (en) * 2010-06-29 2015-03-19 Futurewei Technologies, Inc. Asymmetric Network Address Encapsulation
CN105187307A (en) * 2015-08-19 2015-12-23 上海斐讯数据通信技术有限公司 MAC-in-MAC (Media Access Control-in-Media Access Control) message transmission method and system based on SDN (Software Defined Network)
US20160150058A1 (en) * 2014-11-25 2016-05-26 Qualcomm Incorporated Ethertype packet discrimination data type
US9912495B2 (en) 2010-05-28 2018-03-06 Futurewei Technologies, Inc. Virtual layer 2 and mechanism to make it scalable
RU2714383C2 (en) * 2015-03-05 2020-02-14 Зте Корпарейшн Method and device for processing switch routing conflict

Families Citing this family (45)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1625696B1 (en) * 2003-05-13 2012-08-08 TELEFONAKTIEBOLAGET LM ERICSSON (publ) An arrangement and a method relating to ethernet access systems
US7813345B2 (en) * 2003-06-05 2010-10-12 At&T Intellectual Property I, L.P. MAC learning using VC-LSP dedicated for broadcast and unknown frames
US7698455B2 (en) * 2003-08-01 2010-04-13 Foundry Networks, Inc. Method for providing scalable multicast service in a virtual private LAN service
US7447212B2 (en) * 2003-09-03 2008-11-04 At&T Intellectual Property I, L.P. Method and system for automating membership discovery in a distributed computer network
US7506065B2 (en) * 2003-11-26 2009-03-17 Hewlett-Packard Development Company, L.P. Remote mirroring using IP encapsulation
US7496688B2 (en) * 2004-01-30 2009-02-24 Ixia Label switched data unit content evaluation
US20050220091A1 (en) * 2004-03-31 2005-10-06 Lavigne Bruce E Secure remote mirroring
US7733856B2 (en) * 2004-07-15 2010-06-08 Alcatel-Lucent Usa Inc. Obtaining path information related to a virtual private LAN services (VPLS) based network
GB2418326B (en) * 2004-09-17 2007-04-11 Hewlett Packard Development Co Network vitrualization
US7460481B2 (en) * 2004-12-01 2008-12-02 Cisco Technology, Inc. Inter-domain TE-LSP with IGP extensions
JP4186971B2 (en) * 2005-09-01 2008-11-26 富士通株式会社 Packet transfer device
CN100417091C (en) * 2005-10-24 2008-09-03 华为技术有限公司 Operation maintenance realizing method and system in network
US7697528B2 (en) * 2005-11-01 2010-04-13 Nortel Networks Limited Multilink trunking for encapsulated traffic
US7746892B2 (en) * 2005-11-02 2010-06-29 Nortel Networks Limited Method and apparatus for transporting ethernet services
CN100488169C (en) * 2005-11-11 2009-05-13 华为技术有限公司 A method for data processing in bridging network and bridging network
CN1852254A (en) * 2006-02-17 2006-10-25 华为技术有限公司 Ethernetwork exchanging apparatus and method for realizing MPLS message retransmission
CN101047631A (en) * 2006-04-29 2007-10-03 华为技术有限公司 Customer position information transmitting method, MAC address automatic allocating method, network creating method and system
CN100521653C (en) * 2006-05-18 2009-07-29 华为技术有限公司 Method and system for nesting group network by skeleton bridging technology
CN101123570B (en) * 2006-08-09 2011-05-18 华为技术有限公司 Data forward method and system between multiple operator Ethernet
US7751318B2 (en) * 2006-08-23 2010-07-06 Cisco Technology, Inc. Method and system for computing AS-disjoint inter-AS traffic engineering-label switched paths (TE-LSPS)
CN100450101C (en) * 2006-08-30 2009-01-07 华为数字技术有限公司 Conversion control method and system of OAM message
CN101179479A (en) * 2006-11-09 2008-05-14 华为技术有限公司 Method, system and node for transmitting operation management and maintenance packet of ethernet
CA2670766A1 (en) * 2007-01-17 2008-07-24 Nortel Networks Limited Method and apparatus for interworking ethernet and mpls networks
US8391148B1 (en) * 2007-07-30 2013-03-05 Rockstar Consortion USLP Method and apparatus for Ethernet data compression
US7895425B2 (en) * 2007-08-03 2011-02-22 Cisco Technology, Inc. Operation, administration and maintenance (OAM) in a service insertion architecture (SIA)
CN101222437B (en) * 2008-01-25 2011-06-15 杭州华三通信技术有限公司 Method and system for transparent transmission of BPDU packet in two-layer switching network
GB2459838B (en) * 2008-05-01 2010-10-06 Gnodal Ltd An ethernet bridge and a method of data delivery across a network
US9276768B2 (en) 2008-05-23 2016-03-01 Nokia Solutions And Networks Oy Providing station context and mobility in a wireless local area network having a split MAC architecture
US8422513B2 (en) * 2008-05-23 2013-04-16 Nokia Siemens Networks Oy Providing station context and mobility in a wireless local area network having a split MAC architecture
JP5157685B2 (en) * 2008-07-02 2013-03-06 日本電気株式会社 COMMUNICATION SYSTEM, NETWORK DEVICE, COMMUNICATION RECOVERY METHOD USED FOR THEM, AND PROGRAM THEREOF
US8594088B2 (en) * 2008-12-08 2013-11-26 Telefonaktiebolaget L M Ericsson (Publ) Multicasting in a provider backbone bridge network
US8971390B2 (en) * 2009-06-15 2015-03-03 Infineon Technologies Ag Power saving in a communication device
CN102170388A (en) * 2010-02-26 2011-08-31 杭州华三通信技术有限公司 Method, system and apparatus for obtaining information of opposite terminal backbone edge bridge devices
CN102170387A (en) * 2010-02-26 2011-08-31 杭州华三通信技术有限公司 Method, system, and device for detecting service connection in tunnel
US8976680B2 (en) * 2010-03-15 2015-03-10 Juniper Networks, Inc. Operations, administration, and management fields for packet transport
US8798077B2 (en) * 2010-12-29 2014-08-05 Juniper Networks, Inc. Methods and apparatus for standard protocol validation mechanisms deployed over a switch fabric system
US8780896B2 (en) 2010-12-29 2014-07-15 Juniper Networks, Inc. Methods and apparatus for validation of equal cost multi path (ECMP) paths in a switch fabric system
WO2013126837A1 (en) * 2012-02-24 2013-08-29 Huawei Technologies Co., Ltd. Balancing of forwarding and address resolution in overlay networks
US9794171B2 (en) 2012-08-30 2017-10-17 Hewlett Packard Enterprise Department LP Modification or addition to forwarding table based on address
CN102868761B (en) * 2012-09-28 2014-10-22 无锡江南计算技术研究所 Cluster network automatic configuration and management method based on space coordinates
US9137155B2 (en) 2012-09-29 2015-09-15 Avaya Inc. Network virtualization in access networks
EP2802111A4 (en) * 2013-03-12 2015-10-07 Huawei Tech Co Ltd Communication method, device and system
EP3107269A1 (en) * 2015-06-17 2016-12-21 Advanced Digital Broadcast S.A. System and method for mac addressing
CN110650168B (en) * 2018-06-27 2021-09-14 华为技术有限公司 Communication method and device thereof
CN112187754B (en) * 2020-09-18 2022-12-16 交控科技股份有限公司 Powerlink-based data packet packaging and analyzing method and data packet structure

Citations (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5732071A (en) * 1993-12-29 1998-03-24 Kabushiki Kaisha Toshiba ATM bridge device and ATM bridging scheme for realizing efficient ATM bridge interconnection
US5757924A (en) * 1995-09-18 1998-05-26 Digital Secured Networks Techolognies, Inc. Network security device which performs MAC address translation without affecting the IP address
US5790541A (en) * 1996-04-01 1998-08-04 Motorola, Inc. Apparatus, method, system and system method for distributed routing in a multipoint communication system
US5912891A (en) * 1996-02-28 1999-06-15 Hitachi, Ltd. Virtual network system
US6049528A (en) * 1997-06-30 2000-04-11 Sun Microsystems, Inc. Trunking ethernet-compatible networks
US6061728A (en) * 1999-05-25 2000-05-09 Cisco Technology, Inc. Arrangement for controlling network proxy device traffic on a transparently-bridged local area network using a master proxy device
US6188689B1 (en) * 1996-10-04 2001-02-13 Kabushiki Kaisha Toshiba Network node and method of frame transfer
US20010009550A1 (en) * 2000-01-26 2001-07-26 Nec Corporation ATM exchange and method of operating the same
US6343330B1 (en) * 1999-05-25 2002-01-29 Cisco Technology, Inc. Arrangement for preventing looping of explorer frames in a transparent bridging domain having multiple entry points
US20020118644A1 (en) * 2000-09-01 2002-08-29 Ian Moir Method and system to implement policy-based network traffic management
US20020181457A1 (en) * 2001-06-01 2002-12-05 Fujitsu Networks Method of addressing and routing data
US6512744B1 (en) * 1999-06-25 2003-01-28 Cisco Technology, Inc. Virtual-channel merging
US20030028890A1 (en) * 2001-08-03 2003-02-06 Swart William D. Video and digital multimedia acquisition and delivery system and method
US20030103522A1 (en) * 2001-12-05 2003-06-05 Mitsubishi Denki Kabushiki Kaisha Packet communication system, a packet communication method and a computer-readable storage medium having a computer program for a communication method
US20030198182A1 (en) * 2001-03-27 2003-10-23 Nortel Networks Limited High-availability packet forwarding apparatus and method
US20030208525A1 (en) * 2002-05-06 2003-11-06 Vinay Bannai System and method for providing transparent lan services
US20040037279A1 (en) * 2002-08-23 2004-02-26 David Zelig Virtual private LAN service using a multicast protocol
US20040081203A1 (en) * 2002-07-16 2004-04-29 Enterasys Networks, Inc. Apparatus and method for a virtual hierarchial local area network
US6775239B1 (en) * 1999-10-29 2004-08-10 Fujitsu Limited Checking communication-path data in MPLS communication scheme
US20050213594A1 (en) * 2002-03-27 2005-09-29 Joachim Klink Method for operation and monitoring of mpls networks
US6967927B1 (en) * 1999-11-23 2005-11-22 France Telecom Method of transmitting data flows over an ATM network and device for implementing the method
US20060039374A1 (en) * 2000-02-14 2006-02-23 David Belz Pipelined packet switching and queuing architecture
US7092361B2 (en) * 2001-12-17 2006-08-15 Alcatel Canada Inc. System and method for transmission of operations, administration and maintenance packets between ATM and switching networks upon failures
US7097008B2 (en) * 2003-09-25 2006-08-29 Capital Tool & Design Ltd Friction assembly and method for manufacturing same
US7155215B1 (en) * 2002-01-04 2006-12-26 Cisco Technology, Inc. System and method for upgrading service class of a connection in a wireless network
US7260097B2 (en) * 2002-01-30 2007-08-21 Nortel Networks Limited Label control method and apparatus for virtual private LAN segment networks
US7283465B2 (en) * 2003-01-07 2007-10-16 Corrigent Systems Ltd. Hierarchical virtual private LAN service protection scheme
US7333482B2 (en) * 2000-12-22 2008-02-19 Interactive People Unplugged Ab Route optimization technique for mobile IP

Patent Citations (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5732071A (en) * 1993-12-29 1998-03-24 Kabushiki Kaisha Toshiba ATM bridge device and ATM bridging scheme for realizing efficient ATM bridge interconnection
US5757924A (en) * 1995-09-18 1998-05-26 Digital Secured Networks Techolognies, Inc. Network security device which performs MAC address translation without affecting the IP address
US5912891A (en) * 1996-02-28 1999-06-15 Hitachi, Ltd. Virtual network system
US5790541A (en) * 1996-04-01 1998-08-04 Motorola, Inc. Apparatus, method, system and system method for distributed routing in a multipoint communication system
US6188689B1 (en) * 1996-10-04 2001-02-13 Kabushiki Kaisha Toshiba Network node and method of frame transfer
US6049528A (en) * 1997-06-30 2000-04-11 Sun Microsystems, Inc. Trunking ethernet-compatible networks
US6061728A (en) * 1999-05-25 2000-05-09 Cisco Technology, Inc. Arrangement for controlling network proxy device traffic on a transparently-bridged local area network using a master proxy device
US6343330B1 (en) * 1999-05-25 2002-01-29 Cisco Technology, Inc. Arrangement for preventing looping of explorer frames in a transparent bridging domain having multiple entry points
US6512744B1 (en) * 1999-06-25 2003-01-28 Cisco Technology, Inc. Virtual-channel merging
US6775239B1 (en) * 1999-10-29 2004-08-10 Fujitsu Limited Checking communication-path data in MPLS communication scheme
US6967927B1 (en) * 1999-11-23 2005-11-22 France Telecom Method of transmitting data flows over an ATM network and device for implementing the method
US20010009550A1 (en) * 2000-01-26 2001-07-26 Nec Corporation ATM exchange and method of operating the same
US20060039374A1 (en) * 2000-02-14 2006-02-23 David Belz Pipelined packet switching and queuing architecture
US20020118644A1 (en) * 2000-09-01 2002-08-29 Ian Moir Method and system to implement policy-based network traffic management
US7333482B2 (en) * 2000-12-22 2008-02-19 Interactive People Unplugged Ab Route optimization technique for mobile IP
US20030198182A1 (en) * 2001-03-27 2003-10-23 Nortel Networks Limited High-availability packet forwarding apparatus and method
US20020181457A1 (en) * 2001-06-01 2002-12-05 Fujitsu Networks Method of addressing and routing data
US20030028890A1 (en) * 2001-08-03 2003-02-06 Swart William D. Video and digital multimedia acquisition and delivery system and method
US20030103522A1 (en) * 2001-12-05 2003-06-05 Mitsubishi Denki Kabushiki Kaisha Packet communication system, a packet communication method and a computer-readable storage medium having a computer program for a communication method
US7092361B2 (en) * 2001-12-17 2006-08-15 Alcatel Canada Inc. System and method for transmission of operations, administration and maintenance packets between ATM and switching networks upon failures
US7155215B1 (en) * 2002-01-04 2006-12-26 Cisco Technology, Inc. System and method for upgrading service class of a connection in a wireless network
US7260097B2 (en) * 2002-01-30 2007-08-21 Nortel Networks Limited Label control method and apparatus for virtual private LAN segment networks
US20050213594A1 (en) * 2002-03-27 2005-09-29 Joachim Klink Method for operation and monitoring of mpls networks
US20030208525A1 (en) * 2002-05-06 2003-11-06 Vinay Bannai System and method for providing transparent lan services
US20040081203A1 (en) * 2002-07-16 2004-04-29 Enterasys Networks, Inc. Apparatus and method for a virtual hierarchial local area network
US20040037279A1 (en) * 2002-08-23 2004-02-26 David Zelig Virtual private LAN service using a multicast protocol
US7283465B2 (en) * 2003-01-07 2007-10-16 Corrigent Systems Ltd. Hierarchical virtual private LAN service protection scheme
US7097008B2 (en) * 2003-09-25 2006-08-29 Capital Tool & Design Ltd Friction assembly and method for manufacturing same

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8018879B2 (en) * 2005-03-11 2011-09-13 China Academy Of Telecommunications Technology Wireless transmission method of using efficient high performance frame structure in wideband TDD system
US20080240002A1 (en) * 2005-03-11 2008-10-02 Da Tang Mobile Communications Equipment Co., Ltd Wireless Transmission Method of Using Efficient High Performance Frame Structure in Wideband Tdd System
US20140153579A1 (en) * 2006-11-02 2014-06-05 Rockstar Consortium Us Lp Distributed Storage of Routing Information in a Link State Protocol Controlled Network
US8918538B2 (en) 2007-10-12 2014-12-23 Rockstar Consortium Us Lp Automatic MEP provisioning in a link state controlled ethernet network
US20090232005A1 (en) * 2007-10-12 2009-09-17 Nortel Networks Limited IP Network and Performance Monitoring Using Ethernet OAM
US7898965B2 (en) * 2007-10-12 2011-03-01 Nortel Networks Limited IP network and performance monitoring using ethernet OAM
US9059918B2 (en) 2007-10-12 2015-06-16 Rpx Clearinghouse Llc Continuity check management in a link state controlled ethernet network
US9912495B2 (en) 2010-05-28 2018-03-06 Futurewei Technologies, Inc. Virtual layer 2 and mechanism to make it scalable
US20150078387A1 (en) * 2010-06-29 2015-03-19 Futurewei Technologies, Inc. Asymmetric Network Address Encapsulation
US10389629B2 (en) * 2010-06-29 2019-08-20 Futurewei Technologies, Inc. Asymmetric network address encapsulation
US10367730B2 (en) 2010-06-29 2019-07-30 Futurewei Technologies, Inc. Layer two over multiple sites
US8718061B2 (en) 2010-11-19 2014-05-06 Industrial Technology Research Institute Data center network system and packet forwarding method thereof
CN102761471A (en) * 2011-04-29 2012-10-31 无锡江南计算技术研究所 Wireless computing interconnection network and coordinate spatial transformation method
US20150109929A1 (en) * 2012-02-17 2015-04-23 Thomas A. Tetzlaff Methods and arrangements for packet flows in wireless networks
US9526029B2 (en) * 2012-02-17 2016-12-20 Intel Corporation Methods and arrangements for packet flows in wireless networks
US9730102B2 (en) * 2012-02-17 2017-08-08 Intel Corporation Methods and arrangements for packet flows in wireless networks
US20130215751A1 (en) * 2012-02-17 2013-08-22 Thomas A. Tetzlaff Methods and arrangements for packet flows in wireless networks
US20160150058A1 (en) * 2014-11-25 2016-05-26 Qualcomm Incorporated Ethertype packet discrimination data type
US9961170B2 (en) * 2014-11-25 2018-05-01 Qualcomm Incorporated Ethertype packet discrimination data type
TWI644552B (en) * 2014-11-25 2018-12-11 美商高通公司 Ethertype packet discrimination data type
RU2714383C2 (en) * 2015-03-05 2020-02-14 Зте Корпарейшн Method and device for processing switch routing conflict
CN105187307A (en) * 2015-08-19 2015-12-23 上海斐讯数据通信技术有限公司 MAC-in-MAC (Media Access Control-in-Media Access Control) message transmission method and system based on SDN (Software Defined Network)

Also Published As

Publication number Publication date
US7643424B2 (en) 2010-01-05
US20040184408A1 (en) 2004-09-23

Similar Documents

Publication Publication Date Title
US7643424B2 (en) Ethernet architecture with data packet encapsulation
US7570648B2 (en) Enhanced H-VPLS service architecture using control word
US7660303B2 (en) Point-to-multipoint functionality in a bridged network
US7079544B2 (en) Apparatus and method for interworking between MPLS network and non-MPLS network
US9166807B2 (en) Transmission of layer two (L2) multicast traffic over multi-protocol label switching networks
US7782841B2 (en) Method and system for transporting data using pseudowire circuits over a bridged network
US9100351B2 (en) Method and system for forwarding data in layer-2 network
US7339929B2 (en) Virtual private LAN service using a multicast protocol
US20040184407A1 (en) Operations, administration, and maintenance data packet and related testing methods
US7180899B2 (en) Multi-tiered Virtual Local area Network (VLAN) domain mapping mechanism
US7839869B1 (en) Method and apparatus for providing virtual point to point connections in a network
EP1471684B1 (en) Method and apparatus for determining shared broadcast domains of network switches, ports and interfaces
US8228928B2 (en) System and method for providing support for multipoint L2VPN services in devices without local bridging
EP1971099A1 (en) A data transfer method and a switching equipment
US7606939B1 (en) Scaling private virtual local area networks (VLANs) across large metropolitan area networks (MANs).
US20040252722A1 (en) Apparatus and method for implementing VLAN bridging and a VPN in a distributed architecture router
US9185035B2 (en) Apparatus and method for processing packet in MPLS-TP network
US20090141729A1 (en) Multiplex method of vlan switching tunnel and vlan switching system
US20050138149A1 (en) Method and system for increasing available user VLAN space
US20040202199A1 (en) Address resolution in IP interworking layer 2 point-to-point connections
US20030210696A1 (en) System and method for routing across segments of a network switch
WO2007104201A1 (en) A method for forwarding message in the service tunnel of the ethernet application and a system thereof
US20130279510A1 (en) Architecture for routing data of a customer network over provider's network in provider backbone bridges
Nenov et al. Transporting Ethernet services in metropolitan area networks (MANS)

Legal Events

Date Code Title Description
AS Assignment

Owner name: AT&T INTELLECTUAL PROPERTY I, L.P.,NEVADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LIU, KUO-HUI;HU, CHENG-HONG;YUAN, CHIN;AND OTHERS;REEL/FRAME:023564/0328

Effective date: 20030522

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION