CN100428730C - Method for avoiding message loop - Google Patents

Method for avoiding message loop Download PDF

Info

Publication number
CN100428730C
CN100428730C CNB2005101010779A CN200510101077A CN100428730C CN 100428730 C CN100428730 C CN 100428730C CN B2005101010779 A CNB2005101010779 A CN B2005101010779A CN 200510101077 A CN200510101077 A CN 200510101077A CN 100428730 C CN100428730 C CN 100428730C
Authority
CN
China
Prior art keywords
switching node
wire switching
hop
request message
counterfeit wire
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CNB2005101010779A
Other languages
Chinese (zh)
Other versions
CN1874290A (en
Inventor
曾南志
胡春哲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB2005101010779A priority Critical patent/CN100428730C/en
Publication of CN1874290A publication Critical patent/CN1874290A/en
Application granted granted Critical
Publication of CN100428730C publication Critical patent/CN100428730C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention relates to a method for avoiding a message loop, which is applied to a network comprising a plurality of switching nodes with multiple jumping lines and phantom lines. The present invention comprises the following steps that each multi-hop phantom line switching node sends label request messages carrying loop detection data to the next multi-hop phantom line switching node; any multi-hop phantom line switching node can judge whether message loops are generated according to the loop detection data; when the generation of the message loops is determined, the label request messages can be discarded. Loops formed among the switching nodes of the label request messages of a label distribution protocol caused by unreasonable configuration in multi-hop environment can be effectively avoided by using the method of the present invention when a PWE3 network combination network is applied. The present invention can clear obstacles for the application of the PWE 3 combination network and enhance the running efficiency of a system by in-time detection and effective processing to the loops.

Description

A kind of method that prevents message loop
Technical field
The present invention relates to the virtual private network technology of data communication field, more particularly, relate to a kind of method that prevents message loop.
Background technology
Traditional business as telecom operators, lease special line (leased line) can be the communication network that enterprise provides two layers of link, but there is the construction cost height in it, cycle is long, circuit can't be shared, shortcomings such as management difficulty is big, it is many to be not suitable for enterprise customer branch, increase fast characteristics, therefore, along with ATM (asynchronous transfer mode, the abbreviation of AsynchronousTransport Mode) and frame relay (Frame Relay, hereinafter be abbreviated as FR) development of technology, telecom operators begin to adopt virtual circuit (Virtual Circuit) mode that two layers of Connection Service of point-to-point are provided for the client, enterprise sets up the three-layer network of oneself thereon again with the carrying IP (abbreviation of Internet Protocol, Internet protocol), IPX data flow such as (ppp internetwork packet exchange control protocol, the abbreviations of Internet Packet Exchange).Though, the virtual circuit mode is compared with the lease special line, operator provide the time of service short, price is low, but deficiency is arranged also, for example, for VPN (Virtual Private Network Virtual PrivateNetwork below is abbreviated as VPN) is provided on different type network (as ATM, FR) professional and Internet business, operator need build, safeguard multiple independently network, and operating cost is still higher; Another shortcoming is that speed is slower, and configuration is complicated, and when increasing a website, the keeper need carry out a large amount of configuration efforts.
At present, because IP network spreads all over the world, utilize existing IP network to be paid close attention to by each big operator gradually for enterprise provides cheaply private network.Therefore, for remedying the deficiency of above technology, a kind of technology of centrex service that provides on IP network is arisen at the historic moment, this technology is multiprotocol label switching (Multiple protocol Label Switch, below be abbreviated as MPLS) vpn service, IP service and two layers of three-layer VPN service can be provided on same network simultaneously, can set arbitrary velocity easily, and layoutprocedure be simple.Like this, operator just can only manage, move a kind of network, just can provide services such as IP service, three-layer VPN, two-layer VPN, traffic engineering, Differentiated Services simultaneously on this network, thereby greatly reduces the expense of networking, maintenance and operation.
Vpn service based on MPLS has two kinds, is respectively L3 (3, the three layers of Layer) MPLS VPN and L2 (Layer2, the second layer) MPLS VPN.The very big advantage of L2 MPLS VPN is exactly to avoid getting involved like that to L3 VPN user's inside route level, the Maintenance free user's of operator routing iinformation.Along with the continuous development of this technology and application, pseudo wire emulation service (Pseudo wire Emulation Edge-to-Edge hereinafter is abbreviated as PWE3) has end to end been proposed.PWE3 is exactly a kind of L2VPN technology, and it is expanded on the basis of the Martini of original L2VPN technology, has optimized tag distribution protocol (Label Distribution Protocol hereinafter is abbreviated as LDP) signaling and has carried out mutual flow process.The Internet engineering duty group (Internet Engineering Task Force, be abbreviated as IETF) in agreement draft-ietf-pwe3-control-protocol-17.txt, describe new signaling process in detail, mainly be to have increased the Notification message; And in agreement draft-martini-pwe3-segmented-pw-00.txt at original SH-PW (Single-Hop PW, single-hop PW, also claim single-hop pseudo-line) the basis on MH-PW (Multi-hop PW has been proposed, multi-hop PW, also claim multi-hop counterfeit wire) notion, the signaling of pseudo-line exchange and the flow process of forwarding have been described.
Pseudo-line switching technology has solved following three problems: (1) two service provider's edge device can be in different autonomous system (Autonomous System hereinafter is abbreviated as AS) territory; The network type difference of (2) two service provider's edge devices, for example, one is the MPLS network, another is the L2TPv3 network; (3) service provider's edge device performance can't satisfy the demands, and reduces the session number of carrier signaling under the situation of keeping pseudo-line invariable number, allows converging of pseudo-line (Pseudo wire is called for short PW) move.Therefore, pseudo-line service is further expanded, and can stride different AS, can connect MPLS network and L2TPv3 network, to the performance requirement reduction of service provider's edge device.
In the file of draft-ietf-pwe3-segmented-pw-00.txt, mention, when handling the exchange of MPLS control plane, multi-hop PW switching node (Switching PE, hereinafter referred is S-PE) be initially in passive state, promptly only at the starting point and terminal point PE (the Ultimate PE that receive from the multi-hop PW of an end, hereinafter referred is U-PE) LDP mapping message after, could send LDP mapping message to other end U-PE.This does not have initial LDP mapping information necessary with S-PE and conforms to.
When realizing, S-PE can preserve or not preserve far-end U-PE information.If S-PE preserves far-end U-PE information, S-PE need provide a kind of mechanism, guarantees that these information are from website trusty; Even like this, S-PE also may preserve a large amount of useless far-end U-PE information.If can not solve well, may cause business to be obstructed, system effectiveness is low.
If S-PE itself does not preserve far-end U-PE information, then S-PE must have the ability of transmission label request message (LDPrequest message), otherwise multi-hop PW can not normally create.For explanation multi-hop counterfeit wire (multi-hop PW) is created the situation of failing, referring to Fig. 1, in Fig. 1, S-PE does not have the ability that sends LDP request message, and the process of creating multi-hop PW is as follows:
1) configuration U-PE1, U-PE1 sends LDP mapping message (message) to S-PE;
2) S-PE receives LDP mapping message, does not find local corresponding data structure, and this message is abandoned;
3) configuration U-PE2, U-PE2 sends LDP mapping message to S-PE;
4) S-PE receives LDP mapping message, does not find local corresponding data structure, and this message is abandoned;
5) configuration S-PE;
6) U-PE1, U-PE2 can initiatively not send LDP mapping message to S-PE again.Multi-hop PW creates failure.
Multi-hop PW does not create the situation of failure when not preserving far-end U-PE information for solving S-PE itself, and solution shown in Figure 2 can be arranged.In Fig. 2, S-PE has the ability that sends LDP request message, and its multi-hop PW constructive process is as follows:
1) configuration U-PE1, U-PE1 sends LDP mapping message to S-PE;
2) S-PE receives LDP mapping message, does not find local corresponding data structure, and this message is abandoned;
3) configuration U-PE2, U-PE2 sends LDP mapping message to S-PE;
4) S-PE receives LDP mapping message, does not find local corresponding data structure, and this message is abandoned;
5) configuration S-PE, S-PE sends LDP request message to U-PE1, U-PE2;
6) U-PE1, U-PE2 respond the LDP request message of receiving, send LDP mapping message to S-PE once more;
7) S-PE with the LDP mapping message of U-PE1 to the U-PE2 transparent transmission, with the LDP mapping message of U-PE2 to the U-PE1 transparent transmission;
8) the PW state up on U-PE1, S-PE, the U-PE2, multi-hop PW creates successfully.
In the superincumbent process, except S-PE can send the LDP request message to U-PE1 and U-PE2, U-PE1 and U-PE2 also must resend LDP mapping message after receiving LDP request message; In like manner, if U-PE does not preserve far-end U-PE information, then U-PE also must have the ability that sends LDP request message.By making U-PE1, S-PE, U-PE2 have the ability that sends LDP request message, can solve in the multi-hop PW constructive process and can not handle the problem that LDP mapping message causes the establishment failure because configuration falls behind.But mis-arrange, above-mentioned constructive process may cause LDP request message and form loop between a plurality of S-PE.Below with reference to Fig. 3, this is illustrated.
In Fig. 3, because S-PE has the ability that sends LDP request message, so, under multi-hop environment, after last S-PE (supposing S-PE3) configuration is finished, LDP request message can be passed through S-PE1, S-PE2 (clockwise direction) successively and be got back to S-PE3, sends to S-PE1 by S-PE3 once more.Like this, LDP request message can be between S-PE1, S-PE2 and S-PE3 Infinite Cyclic.Counterclockwise as the same.As seen, because the mis-arrange in networking is used can produce message loop, thereby cause communication failure.
Summary of the invention
The invention provides a kind of method that prevents message loop, solving when the PWE3 network organizing is used, under multi-hop environment, cause the problem of LDP request message generation loop between S-PE during owing to mis-arrange.
In order to solve the problems of the technologies described above, the invention provides following technical scheme: a kind of method that prevents message loop, this method are applied to a network that includes a plurality of multi-hop counterfeit wire switching nodes, may further comprise the steps:
Described each multi-hop counterfeit wire switching node sends and carries the multi-hop counterfeit wire switching node of the label request message of loop detection data to next jumping;
Described arbitrary multi-hop counterfeit wire switching node judges whether to produce message loop according to described loop detection data, when determining to produce message loop, abandons described label request message.
In the above-mentioned method that prevents message loop, described arbitrary multi-hop counterfeit wire switching node is according to described loop detection data, also comprises step after judging whether to produce message loop: when determining not produce message loop, receive described label request message.
In the above-mentioned method that prevents message loop, described loop detection data are: the IP address of the multi-hop counterfeit wire switching node of label request message process, the multi-hop counterfeit wire switching node number of label request message process or the life span of label request message.
In the above-mentioned method that prevents message loop, when the IP address of the described loop detection data multi-hop counterfeit wire switching node that is the label request message process, this method specifically comprises: when described each multi-hop counterfeit wire switching node sends label request message, and the IP address of carrying this multi-hop counterfeit wire switching node; Described arbitrary multi-hop counterfeit wire switching node is checked the IP address that whether includes this multi-hop counterfeit wire switching node in the described IP address, when determining to include the IP address of this multi-hop counterfeit wire switching node, abandons described label request message.
In the above-mentioned method that prevents message loop, after described arbitrary multi-hop counterfeit wire switching node is checked the IP address that whether includes this multi-hop counterfeit wire switching node in the described IP address, also comprise step: when determining not comprise the IP address of this multi-hop counterfeit wire switching node, receive described label request message.
In the above-mentioned method that prevents message loop, when multi-hop counterfeit wire switching node number that described loop detection data are the label request message process, this method specifically comprises: when described each multi-hop counterfeit wire switching node sends label request message, described multi-hop counterfeit wire switching node number is added 1; Described arbitrary multi-hop counterfeit wire switching node checks that whether described multi-hop counterfeit wire switching node number surpasses the number that this multi-hop counterfeit wire switching node allows, and when determining to surpass the number of this multi-hop counterfeit wire switching node permission, abandons described label request message.
In the above-mentioned method that prevents message loop, after described arbitrary multi-hop counterfeit wire switching node checks whether described multi-hop counterfeit wire switching node number surpasses the number of this multi-hop counterfeit wire switching node permission, also comprise step: when determining not have to surpass the number of this multi-hop counterfeit wire switching node permission, receive described label request message.
In the above-mentioned method that prevents message loop, the number that described this multi-hop counterfeit wire switching node allows is determined when described node configuration.
In the above-mentioned method that prevents message loop, when described loop detection data were the life span of label request message, this method specifically comprised: when described each multi-hop counterfeit wire switching node sends label request message, described life span is subtracted 1; Described arbitrary multi-hop counterfeit wire switching node checks whether described life span is 0, is defined as at 0 o'clock, abandons described label request message.
In the above-mentioned method that prevents message loop, described arbitrary multi-hop counterfeit wire switching node also comprises step after checking whether described life span is 0: determine to be not or not 0 o'clock, receive described label request message.
In the above-mentioned method that prevents message loop, when described label request message is sent for the first time, described life span be set be one greater than 0 numerical value.
In the above-mentioned method that prevents message loop, described loop detection data are multi-hop counterfeit wire switching node type lengths values structured data.
Implement method provided by the invention, can be when the PWE3 network organizing be used, effectively avoid under multi-hop environment, between the multi-hop counterfeit wire switching node, forming loop because of mis-arrange causes the tag distribution protocol label request message, by timely detection and effective the processing to loop, thereby clear away the obstacles for PWE3 networking application, improve running efficiency of system.
Description of drawings
Fig. 1 is in the prior art, when S-PE can not preserve far-end U-PE message, the process schematic diagram that multi-hop PW creates failure takes place;
Fig. 2 is in the prior art, and after S-PE transmission LDP request message, multi-hop PW creates successful process schematic diagram;
Fig. 3 is in the prior art of Fig. 2, and the schematic diagram of multi-hop PW request message loop takes place during mis-arrange.
Embodiment
Embodiment 1
Under multi-hop environment, utilize first embodiment of the inventive method, in LDP Request message, comprise the IP address of the S-PE of message process exactly, its IP address is with pseudo-line switching node type lengths values structure (PW switchingpoint TLV) record.The data structure details of PW switching point TLV is as follows:
0 1 2 3
0?1?2?3?4?5?6?7?8?9?0?1?2?3?4?5?6?7?8?9?0?1?2?3?4?5?6?7?8?9?0?1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|1|0| PW?sw?TLV (0x096B) | PW?sw?TLV Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Length | Variable?Length?Value |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Variable?Langth?Value |
| ″ |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Wherein:
-PW sw TLV Length, whole byte total length of regulation back, PW exchange point TLV territory
-Type is used for explanation coding Value territory and how is explained
-Length is used for the byte length in regulation Value territory
-Value is by the byte serial of the Length byte length of Type territory regulation coded message to be explained
Wherein, Type territory and Values territory are allocated as follows
Type Length Description (description)
0,x00 0 Reserved (reservation)
0,x01 4 PW ID of last PW traversed (PW of Jing Li PW sign at last)
0x02 Variable PW Switching Point description string (describe by the PW exchange point
String)
0x03 4 IP?address?of?PW?Switching?Point(Optional)
(the IP address (optional) of PW exchange point)
In the present embodiment with the TYPE=0X03 in the above-mentioned data structure, the data field of LENGTH=4 " IP address ", write down the IP address information of the S-PE of this message process, the inspection of the IP address of the S-PE of the process that writes down in the message of utilization to LDP request comes detect-message whether loop takes place.Concrete steps are as follows:
When 1, S-PE sends LDP request message, oneself IP address is joined in the LDP request message with PW swi tching point TLV form;
When 2, S-PE receives LDP request message, whether there is the IP address of this S-PE in the IP address of the S-PE of this message process that inspection is wherein write down.If exist, illustrate to have produced loop that at this moment, S-PE abandons this LDPrequest message.If there is no, then continue to handle this message.
In Fig. 3, suppose that S-PE3 is last configuration.So, when after the LDP request message that S-PE3 sends is passed through S-PE1, S-PE2 in a clockwise direction, getting back to S-PE3, in the time of among the Already in current received PW switching point TLV in IP address of S-PE3 discovery oneself, then produced loop, made the processing that abandons this LDP request message for detecting this LDP request message.As the same to anticlockwise processing of LDP request message and effect.As seen, use method of the present invention, send the S-PE of LDP request message, the IP address of its S-PE is recorded among the PW switching point TLV that S-PE carries in LDP request message, receive the S-PE of LDP request message, whether the IP address of checking oneself is in PW switching pointTLV; If the IP address of oneself is present among the PW switching point TLV, LDPrequest message is abandoned by this S-PE.So just can effectively avoid because the networking mis-arrange causes message LDP request to form the generation of loop between S-PE.
Embodiment 2
Use method provided by the invention, can increase a kind of definition of new data type for PW switching point TLV, its type coding can be distributed by IANA, is assumed to be 0x04, in order to the S-PE number of record LDP Request message process.。Should newly-increased data structure be defined as follows
Type Length?Description
0x04 1 Hop?Count?of?PW?Switching?Point?traversed
The step of the detect-message loop of embodiment 2 is as follows:
1, when S-PE sends LDP request message, the counting among the PW switching point TLV is added 1;
2, when S-PE receives LDP request message, check whether the counting among the PW switching point TLV wherein reaches the maximum of configuration;
If 3 reach maximum, illustrate to have produced loop that S-PE abandons this LDP request message immediately.Otherwise, continue to handle this message.
Wherein, the peaked setting that allows ring to go through counting relates to concrete realization, for example can determine this maximum in the layoutprocedure on S-PE.
Embodiment 3
Embodiment 3 is by the message of carrying PW switching point TLV, under multi-hop environment, the expection life span is counted down automatically, the result that counts down is kept in the described unit that counts down, the definition of this unit that counts down a kind of new data type TTL (life span) that to be exactly us increase for PW switching point TLV, its type coding can be distributed by IANA, is assumed to be 0x05, length is 1, in order to the life span of record LDP Request message.
Specifically describe as follows:
Type Length Description
0x05 1 TTL(Time?To?Live)field?value
In embodiment 3, detection has or not the step of message loop as follows under multi-hop environment:
1, when LDP request message is issued for the first time, S-PE is provided with an initial value in the described unit that counts down by starting;
2, any one S-PE is receiving LDP request message, judges at first whether the data value of this down counter is 0;
If 3 these down counter numerical value are 0, expression produces message loop, and S-PE abandons this LDP request message;
If the value of being somebody's turn to do is non-vanishing, S-PE subtracts 1 with this down counter, continues then to handle.
Allow the peaked setting unification of the S-PE jumping figure of process can not satisfy different multi-hop PW with embodiment 2 and require, embodiment 3 adopts " TTL " method can avoid this point.Multi-hop PW can each comfortable message far-end the maximum of jumping figure is set, the original maximum of down counter promptly is set.
Embodiment 2, embodiment 3 and embodiment 1 different place is, utilizes counting or the method for counting down to detect the loop, under multi-hop environment, and may be with the path of message process is long and erroneous judgement is loop.But the path is long also should be avoided in networking.And the method for the recording messages process node IP address that the embodiment of the invention 1 adopts, for the identification loop, the result is more accurate.

Claims (12)

1, a kind of method that prevents message loop, this method are applied to a network that includes a plurality of multi-hop counterfeit wire switching nodes, it is characterized in that, may further comprise the steps:
Described each multi-hop counterfeit wire switching node sends and carries the multi-hop counterfeit wire switching node of the label request message of loop detection data to next jumping;
Described arbitrary multi-hop counterfeit wire switching node judges whether to produce message loop according to described loop detection data, when determining to produce message loop, abandons described label request message.
2, method according to claim 1, it is characterized in that: described arbitrary multi-hop counterfeit wire switching node is according to described loop detection data, also comprise step after judging whether to produce message loop: when determining not produce message loop, receive described label request message.
3, according to the described method of claim 1, it is characterized in that, described loop detection data are: the I P address of the multi-hop counterfeit wire switching node of label request message process, the multi-hop counterfeit wire switching node number of label request message process or the life span of label request message.
4, according to the described method of claim 3, it is characterized in that, when the IP address of the described loop detection data multi-hop counterfeit wire switching node that is the label request message process, this method specifically comprises: when described each multi-hop counterfeit wire switching node sends label request message, and the IP address of carrying this multi-hop counterfeit wire switching node; Described arbitrary multi-hop counterfeit wire switching node is checked the IP address that whether includes this multi-hop counterfeit wire switching node in the described IP address, when determining to include the IP address of this multi-hop counterfeit wire switching node, abandons described label request message.
5, according to the described method of claim 4, it is characterized in that, after described arbitrary multi-hop counterfeit wire switching node is checked the IP address that whether includes this multi-hop counterfeit wire switching node in the described IP address, also comprise step: when determining not comprise the IP address of this multi-hop counterfeit wire switching node, receive described label request message.
6, according to the described method of claim 3, it is characterized in that, when multi-hop counterfeit wire switching node number that described loop detection data are the label request message process, this method specifically comprises: when described each multi-hop counterfeit wire switching node sends label request message, described multi-hop counterfeit wire switching node number is added 1; Described arbitrary multi-hop counterfeit wire switching node checks that whether described multi-hop counterfeit wire switching node number surpasses the number that this multi-hop counterfeit wire switching node allows, and when determining to surpass the number of this multi-hop counterfeit wire switching node permission, abandons described label request message.
7, according to the described method of claim 6, it is characterized in that, after described arbitrary multi-hop counterfeit wire switching node checks whether described multi-hop counterfeit wire switching node number surpasses the number of this multi-hop counterfeit wire switching node permission, also comprise step: when determining not have to surpass the number of this multi-hop counterfeit wire switching node permission, receive described label request message.
According to the described method of claim 7, it is characterized in that 8, the number that described this multi-hop counterfeit wire switching node allows is determined when described multi-hop counterfeit wire switching node disposes.
According to the described method of claim 3, it is characterized in that 9, when described loop detection data were the life span of label request message, this method specifically comprised: when described each multi-hop counterfeit wire switching node sends label request message, described life span is subtracted 1; Described arbitrary multi-hop counterfeit wire switching node checks whether described life span is 0, is defined as at 0 o'clock, abandons described label request message.
According to the described method of claim 9, it is characterized in that 10, described arbitrary multi-hop counterfeit wire switching node also comprises step after checking whether described life span is 0: determine to be not or not 0 o'clock, receive described label request message.
11, according to the described method of claim 9, it is characterized in that, when described label request message is sent for the first time, described life span is set is one greater than 0 numerical value.
According to the described method of claim 1, it is characterized in that 12, described loop detection data are multi-hop counterfeit wire switching node type lengths values structured data.
CNB2005101010779A 2005-11-02 2005-11-02 Method for avoiding message loop Active CN100428730C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005101010779A CN100428730C (en) 2005-11-02 2005-11-02 Method for avoiding message loop

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005101010779A CN100428730C (en) 2005-11-02 2005-11-02 Method for avoiding message loop

Publications (2)

Publication Number Publication Date
CN1874290A CN1874290A (en) 2006-12-06
CN100428730C true CN100428730C (en) 2008-10-22

Family

ID=37484563

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005101010779A Active CN100428730C (en) 2005-11-02 2005-11-02 Method for avoiding message loop

Country Status (1)

Country Link
CN (1) CN100428730C (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4902440B2 (en) * 2007-06-26 2012-03-21 株式会社日立製作所 Node device and failure detection method
CN102595358A (en) * 2011-11-25 2012-07-18 中兴通讯股份有限公司 Processing method and device for preventing short message from circulating
CN109962846B (en) * 2017-12-25 2020-09-25 华为技术有限公司 Method and device for processing routing protocol message

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1157512A (en) * 1995-11-09 1997-08-20 国际商业机器公司 Adaptive and dynamic message routing system for multinode wormhole networks
US6421440B1 (en) * 1996-09-12 2002-07-16 Alcatel Usa Sourcings, L.P. Method for signalling connection control part message loop prevention
CN1385989A (en) * 2001-05-16 2002-12-18 华为技术有限公司 Method for conrolling short message retransmission time
CN1581797A (en) * 2003-08-11 2005-02-16 中兴通讯股份有限公司 Method for solving signaling dead circle caused from whole-code addressing in communication network
US20050147104A1 (en) * 2003-12-29 2005-07-07 Hamid Ould-Brahim Apparatus and method for multihop MPLS/IP/ATM/frame relay/ethernet pseudo-wire

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1157512A (en) * 1995-11-09 1997-08-20 国际商业机器公司 Adaptive and dynamic message routing system for multinode wormhole networks
US6421440B1 (en) * 1996-09-12 2002-07-16 Alcatel Usa Sourcings, L.P. Method for signalling connection control part message loop prevention
CN1385989A (en) * 2001-05-16 2002-12-18 华为技术有限公司 Method for conrolling short message retransmission time
CN1581797A (en) * 2003-08-11 2005-02-16 中兴通讯股份有限公司 Method for solving signaling dead circle caused from whole-code addressing in communication network
US20050147104A1 (en) * 2003-12-29 2005-07-07 Hamid Ould-Brahim Apparatus and method for multihop MPLS/IP/ATM/frame relay/ethernet pseudo-wire

Also Published As

Publication number Publication date
CN1874290A (en) 2006-12-06

Similar Documents

Publication Publication Date Title
CN101710877B (en) Method, device and system for processing traffic flow based on pseudowire
CN105939260B (en) Overload function in overlay network
CN105245452B (en) Multi-protocol label switching traffic engineering tunnel establishing method and equipment
CN101159690B (en) Multi-protocol label switch forwarding method, device and label switching path management module
CN110324226A (en) Improve the aliasing behavior of more host site flows in ether Virtual Private Network network
CN102684940A (en) Packet loss measurement at service endpoints of a virtual private LAN service
CN101485163A (en) A method and system for optimizing resources for establishing pseudo-wires in a multiprotocol label switching network
EP2624590A2 (en) Method, apparatus and system for interconnected ring protection
US20050141504A1 (en) Methods, systems, and computer program products for encapsulating packet traffic associated with multiple layer two technologies
CN101155076A (en) Method for checking pseudo wire trouble of two-layer special network
CN100499589C (en) Method of phantom lines in multiple hops for building simulation of phantom line from end to end
CN100428730C (en) Method for avoiding message loop
JP5913733B2 (en) Pseudowire extended group messaging in packet-switched networks
JP5913732B2 (en) Pseudowire groups in packet switched networks
CN103634210B (en) Find the method and apparatus of the opposite end PE equipment of VPLS example
CN100466615C (en) Method and apparatus for processing direct connected network route
EP2995045B1 (en) Method and telecom network equipment for aggregating pseudowires
CN100413280C (en) System and method for interconnecting heterogeneous layer 2 VPN applications
JP2006129359A (en) Method of establishing multicast line, communication system using the method, communication apparatus, control method of the communication apparatus, and program
CN103856403B (en) message control method and device
CN100505687C (en) Transmission method for transmitting message of virtual private network in second layer through labels in multiple protocols
CN100450096C (en) Method for determining converting state of end-to-end pseudo-line simulation node
CN106992927A (en) A kind of pseudo-line service retransmission method and device
JP5913734B2 (en) Pseudowire extended group action in packet-switched networks
KR20030035590A (en) Process Method For Transfering Information In Two Layer VPN Based On Multi Protocol Label Switching

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant