CN101132371B - Pseudo-wire business protection method - Google Patents
Pseudo-wire business protection method Download PDFInfo
- Publication number
- CN101132371B CN101132371B CN2007101470076A CN200710147007A CN101132371B CN 101132371 B CN101132371 B CN 101132371B CN 2007101470076 A CN2007101470076 A CN 2007101470076A CN 200710147007 A CN200710147007 A CN 200710147007A CN 101132371 B CN101132371 B CN 101132371B
- Authority
- CN
- China
- Prior art keywords
- packet network
- network tunnel
- bandwidth
- pseudo
- tunnel
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
This invention puts forward a protection method for PW service, which sets up a residual bandwidth databse of PSN tunnel and searches for PSN tunnel combination meeting the requirement of the being protected PW service bandwidth in the database to constitute a logic PSN tunnel and turns the PW service to the logic PSN tunnel to protect the PW service when testing that the current multiplex PSN tunnel of the PW service is faulty.
Description
Technical field
The present invention relates to the communications field, particularly a kind of guard method of pseudo-line service.
Background technology
Pseudo-line (PW; Pseudo Wire) be a kind of at packet switching network (PSN; Packet SwitchNetwork) goes up the mechanism of simulating various point to point service, PTP; The business of being simulated can be time division multiplexing (TDM, Time Division Multiplex and Multiplexer) special line, asynchronous transfer mode (ATMAsynchronous Transfer Model), frame relay (FR, Frame Relay) or Ethernet etc.PW can utilize the tunneling mechanism on the PSN to simulate a kind of necessary attribute of business.PW can encapsulate the protocol Data Unit (PDU, Protocol Data Unit) of special services, and PDU contains necessary data of emulation special services and control information in the inside.The PW emulation mechanisms can be transferred to all transport services the network of a fusion, among multi protocol label exchange (MPLS, Multi Protocol Label Switching) or Internet protocol (IP, Internet protocol).From user's angle, PW can be considered to a kind of link or circuit of special use.
Traditional P W protection passage all is the unidirectional PSN tunnel that utilizes, and the service protection of PW emulation just is subject to a certain PSN tunnel like this, when protecting channel failure on the one hand, makes that professional protected reliability is not high; When two internodal arbitrary PSN tunnel bandwidth of carrying the PW business all can not satisfy the service protection demand, this business just can not be protected on the other hand.
The data transmission method and the system of a patent CN200510009215 multi-protocol label switching network; Mention at label switched path (LSP; Label Switched Path) when breaking down; In time out of order LSP is stopped distributing data, the present invention does not utilize the remaining bandwidth of LSP to realize the think of of the defencive function that PW is professional
Summary of the invention
The present invention proposes a kind of guard method of pseudo-line service, find out and utilize in the network remaining bandwidth of PSN tunnel to realize protection the business of PW emulation.To solve the problems referred to above that prior art exists, improve utilization of network bandwidth, strengthen the reliability of protection.
The guard method that the PW that the present invention proposes is professional utilizes many PSN tunnel remaining bandwidths that the PW business is protected, and it is characterized in that, may further comprise the steps:
A) set up packet network tunnel remaining bandwidth database, record packet network tunnel bandwidth is used information;
B) obtain the bandwidth parameter of the pseudo-line service that needs protection, the packet network tunnel combination of bandwidth demand is satisfied in search in packet network tunnel remaining bandwidth database, forms logic packet network tunnel;
C),, then pseudo-line service is switched to logic packet network tunnel if detect the current multiplexing packet network tunnel fails of pseudo-line service with the protection passage of logic packet network tunnel as pseudo-line service;
D) if there is the new business access need take the remaining bandwidth in the packet network tunnel in the logic packet network tunnel, then utilize the packet network tunnel remaining bandwidth in the packet network tunnel remaining bandwidth database to substitute.
Further, the tunnel bandwidth of packet network described in the step a) uses the information content to comprise source node, destination node, identifier, the remaining bandwidth in packet network tunnel and the bandwidth that is taken by logic packet network tunnel.
Further, in the step d),, then insert new business, abandon protecting passage if can not find new bandwidth combination; Or abandon inserting new business, keep the protection passage.
If the multiplexing former packet network tunnel restoration of pseudo-line service is then returned switching services to former passage, or switching services is not gone back to former tunnel.
The PSN tunnel remaining bandwidth that utilizes that the present invention proposes carries out the method for PW service protection, has made full use of the remaining bandwidth in the network, has increased the flexibility and the reliability of PW service protection, has practiced thrift cost, has increased benefit.
Description of drawings
Fig. 1 utilizes the PSN tunnel remaining bandwidth to carry out PW service protection flow chart;
Fig. 2 be embedded MPLS multi-service transport platform (MSTP: device network topological diagram Multi-Service TransportPlatform):
Fig. 3 is a network PSN tunnel sketch map:
Fig. 4 is remaining bandwidth database data structure figure:
Fig. 5 is the professional figure of PW1:
Fig. 6 is a logic LSP data structure diagram.
Embodiment
To combine accompanying drawing and specific embodiment that the guard method of a kind of pseudo-line service of the present invention is elaborated below.
Fig. 1 utilizes the PSN tunnel remaining bandwidth to carry out PW service protection flow chart.
Fig. 2 is the MSTP device network topological diagram of embedded MPLS, and this network is the network topology structure that is connected to form by the technological MSTP equipment utilization SDH (SDH, Synchronous Digital Hierarchy) of a plurality of embedded MPLS.
Fig. 3 is a network PSN tunnel sketch map.
Describe below in conjunction with Fig. 1,2 and 3 pairs of methods of the present invention, wherein:
Remaining bandwidth data record between table 1 A, G
Table 2 satisfies the data record of the professional logic LSP of PW1
Table 3 is found out the remaining bandwidth data record between A behind the logic LSP, G
Remaining bandwidth data record when table 4 has new business to insert between A, G
After inserting, table 5 new business satisfies the data record of the professional logic LSP of PW1
Table 6 new business inserts the remaining bandwidth data record between back A, G
Certainly; The present invention also can have other multiple enforcements; Under the situation that does not deviate from spirit of the present invention and essence thereof; Those of ordinary skill in the art work as can make various corresponding changes and distortion according to the present invention, but these corresponding changes and distortion all should belong to the protection range of the appended claim of the present invention.
Claims (3)
1. pseudo-line service guard method utilizes many packet network tunnel remaining bandwidths that pseudo-line service is protected, and it is characterized in that, may further comprise the steps:
A) set up packet network tunnel remaining bandwidth database, record packet network tunnel bandwidth is used information; Said packet network tunnel bandwidth uses the information content to comprise source node, destination node, identifier, the remaining bandwidth in packet network tunnel and the bandwidth that is taken by logic packet network tunnel;
B) obtain the bandwidth parameter of the pseudo-line service that needs protection, the packet network tunnel combination of bandwidth demand is satisfied in search in packet network tunnel remaining bandwidth database, forms logic packet network tunnel;
C),, then pseudo-line service is switched to logic packet network tunnel if detect the current multiplexing packet network tunnel fails of pseudo-line service with the protection passage of logic packet network tunnel as pseudo-line service;
D) if there is the new business access need take the remaining bandwidth in the packet network tunnel in the logic packet network tunnel, then utilize best-fit from packet network tunnel remaining bandwidth database, to find out the alternative occupied packet network tunnel, packet network tunnel that packet network tunnel remaining bandwidth satisfies bandwidth demand.
2. the method for claim 1 is characterized in that: in the step d), if can not find new bandwidth combination, then insert new business, abandon protecting passage; Or abandon inserting new business, keep the protection passage.
3. the method for claim 1 is characterized in that: if the multiplexing former packet network tunnel restoration of pseudo-line service is then gone back to switching services to former tunnel, or switching services do not gone back to former tunnel.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2007101470076A CN101132371B (en) | 2007-08-11 | 2007-08-11 | Pseudo-wire business protection method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2007101470076A CN101132371B (en) | 2007-08-11 | 2007-08-11 | Pseudo-wire business protection method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101132371A CN101132371A (en) | 2008-02-27 |
CN101132371B true CN101132371B (en) | 2012-07-11 |
Family
ID=39129499
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2007101470076A Expired - Fee Related CN101132371B (en) | 2007-08-11 | 2007-08-11 | Pseudo-wire business protection method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101132371B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101656630B (en) * | 2009-09-09 | 2015-09-16 | 中兴通讯股份有限公司 | A kind of service protecting method and system |
CN105743817A (en) * | 2014-12-08 | 2016-07-06 | 中兴通讯股份有限公司 | Tunnel bandwidth adjusting method and device |
CN106034043B (en) * | 2015-03-18 | 2020-01-07 | 中兴通讯股份有限公司 | Method and device for improving multiplex section switching frequency in packet transport network |
-
2007
- 2007-08-11 CN CN2007101470076A patent/CN101132371B/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
CN101132371A (en) | 2008-02-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1625176B (en) | Realization method of edge to edge pseudo-line simulation protocol | |
CN107438028B (en) | Method and equipment for processing customer service | |
EP2084866B1 (en) | Network availability enhancement technique for packet transport networks | |
US8667374B2 (en) | Video transmission systems and methods over carrier ethernet | |
US7606886B1 (en) | Method and system for providing operations, administration, and maintenance capabilities in packet over optics networks | |
US8179900B2 (en) | Edge node redundant system in label switching network | |
CN102571426B (en) | Double-homing protection method and device | |
US8190966B1 (en) | Systems and methods for implementing end-to-end checksum | |
CN102724118B (en) | Label distribution method and device | |
US20180176131A1 (en) | Apparatus and methods of routing with control vectors in a synchronized adaptive infrastructure (sain) network | |
EP1766876B1 (en) | Technique for transferring data over a packet switched network | |
US20210152898A1 (en) | Transmission network system, data switching and transmission method, apparatus and equipment | |
CN101286922B (en) | Signalling control method, system and apparatus | |
CN106982161B (en) | Method and equipment for keeping and deleting label in ring network protection | |
CN101577719B (en) | A kind of double hot standby method, device and system | |
CN104038443A (en) | Method for establishing hard pipe as well as method and device for transmitting messages in network | |
CN107277187B (en) | The system and method for ARP warm back-up Fast synchronization | |
CN102055727A (en) | Data encapsulation method, encapsulation equipment and branch unit in multi-service transport network | |
CN104618150A (en) | Business configuration method and system under two layer-to-three layer business scene of PTN | |
CN101132371B (en) | Pseudo-wire business protection method | |
KR20160137813A (en) | Packet transmission apparatus of processing oam packets and protection messages | |
CN101237403A (en) | Service multiplexing method for Ethernet | |
CN101453412B (en) | Method and apparatus for automatic topology discovery and resource management in PBB network | |
CN104618057A (en) | Packet transport network non-damage protection switching method and system | |
CN108924046B (en) | Method and system for protecting GRE tunnel bearing service |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20120711 Termination date: 20160811 |
|
CF01 | Termination of patent right due to non-payment of annual fee |