Absrtact: First of all, this paper puts forward the IVs (Intelligent Virtual Exchange) technology system, then expounds the IVS core operation mechanism and the performance test of IVs system, and finally points out that IVs is a new type of transmission technology which can be used in metropolitan area.
1. Introduction
According to the 2005 Global Ethernet Switch Market share analysis report released by Gannet2006 in March, the output of Ethernet switch increased by 9% Year-on-year, sales increased by 7% to $1.29 billion, of which Gigabit Ethernet exchange accounted for 61%. At the same time, Ethernet applications have been from the LAN to the metropolitan area Network, wide area network expansion, but the traditional Ethernet technology mainly exists in 5 problems [1]: The QoS guarantee mechanism is unreasonable to end, the protection mechanism is imperfect, performance monitoring and internal OAM ability is weak, scalability and resource utilization are insufficient, and user's management and security are poor.
These problems appear relatively prominent in the application of Ethernet in metropolitan area network and WAN. How to solve these problems has become a hotspot in the field of Ethernet, and the International standards Organizations (IEEE, ITU-T, MEF, IETF, etc.) have been studied. At present, the main solution is: Mplsl2[2],qinq[3],vlan ID routable solution Goe[4],mac in MAC solution (this is a similar q in Q scheme).
In order to find the solution, the author put forward the concept of Vlanidswitch [5] In 2001, which mainly solves the problem of "expansibility and utilization of resources" of Ethernet, and forms the first generation of virtual Exchange (VIRTUALSWITCH,VS) products--isn8850e , which is a VS product based on its broadband access server ISN 8850 platform, in collaboration with Huawei. Since the first generation VS products used the VLAN ID switch centralized processing and the manual configuration Way, the system capacity and the application situation is limited, therefore started in 2002, from the actual demand, the author has carried on the second generation intelligent Virtual Switch, intelligent virtual switches, IVS) [6] Research and design, focusing on solving the other 4 problems of Ethernet.
Generally speaking, the innovation of IVs is: to replace the original Vlanid bridge concept to construct a new forwarding model, to find a balance between SPC switching technology and data exchange technology, to design new protocols, to introduce user numbering and centralized management concepts, and to Vlanidswitch. Provides the possibility for large-scale use of IVS technology.
2. System structure
IVs employs a 3-tier functional architecture: The hosting forwarding layer, the connection control layer, and the business Control layer, as shown in Figure 1.
Fig. 1 IVs System Model structure
The IVs bearer forwarding layer is composed of a Vlanidswitch data forwarding entity (Datarelay Entity,dre) through Ethernet high-speed connection, which mainly undertakes the transfer of Ethernet traffic.
The IVs connection control layer is composed of a network signaling entity (Networksignalingentity,nse) with a connection control function, which is connected by a resource Guarantee interconnection protocol (Resourceprove interconnect PROTOCOL,RPIP). To undertake the functions of reserving, establishing, maintaining, dismantling and calling Records (CDR) of the End-to-end connection resources. This layer is an important aspect of the connecting link in the IVS system, which provides the business interface to the business control layer through the user interface portion of the Interconnection Protocol (RPIP UNI), and goes down through the public Open Policy Service Enhanced version Protocol (common open Police Service plus,cops+ And the carrier forwarding layer forms the control transmitting interface.
The IVs Business Control layer consists of a business triggering function entity (servicetriggerentity,ste) and a Business Control registration entity (ServiceControl REGISTER,SCR), which records user data, including physical location, logical identification, User rights, authentication methods, interface capabilities and other information. When the business is triggered, Ste accesses the SCR for data querying, obtains the necessary business information, and then directs the connection control layer to establish the related circuit.
oam/Management is responsible for providing management, monitoring, maintenance, alarm, and other functions, monitoring and maintenance of various functional components including carrying forward layer, connection control layer and business control layer, such as Dre, NSE, Ste and SCR.