CN101414951B - Improved method for T-MPLS tunnel down processing - Google Patents

Improved method for T-MPLS tunnel down processing Download PDF

Info

Publication number
CN101414951B
CN101414951B CN2008102176525A CN200810217652A CN101414951B CN 101414951 B CN101414951 B CN 101414951B CN 2008102176525 A CN2008102176525 A CN 2008102176525A CN 200810217652 A CN200810217652 A CN 200810217652A CN 101414951 B CN101414951 B CN 101414951B
Authority
CN
China
Prior art keywords
tunnel
data message
private network
public network
main
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN2008102176525A
Other languages
Chinese (zh)
Other versions
CN101414951A (en
Inventor
操超鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN2008102176525A priority Critical patent/CN101414951B/en
Publication of CN101414951A publication Critical patent/CN101414951A/en
Application granted granted Critical
Publication of CN101414951B publication Critical patent/CN101414951B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to a method for improving T-MPLS tunnel downlink treatment. In the method, a tunnel type mark and a tunnel end mark in a public network label list are arranged firstly; whether a main tunnel number and an embodiment number corresponding to a private network label in a private network label list and a tunnel protection type and a main tunnel in a tunnel list are effective is judged; and subsequently, whether a data message is transmitted to next node is judged according a public network label and the private network label in the received data message and the values in each list, or the data message is transmitted to a private network side or is discarded. In the invention, active-standby switch of a microcode conveniently and fast is carried out; at the same time, the invention can be adaptable to the tunnel multiplex operation under complex condition.

Description

What a kind of T-MPLS tunnel down was handled improves one's methods
Technical field
The present invention relates to the communications field, what particularly a kind of T-MPLS (Transmission-Multiprotocol Label Switching, the exchange of transmission-multi protocol label) tunnel down was handled improves one's methods.
Background technology
T-MPLS is a kind of based on MPLS (Multiprotocol Label Switching of International Telecommunications Union (ITU-T) definition, the multi protocol label exchange), connection-oriented grouping tranmission techniques, T-MPLS data forwarding face is the subclass of MPLS, and its data are based on that the T-MPLS label transmits.T-MPLS is the application of MPLS in transmitting net, and it is simplified some sophisticated functions of MPLS data forwarding face, and has increased functions such as connection-oriented OAM (operation, management, maintenance) and protection recovery.
The configuration of T-MPLS business mainly is divided into two parts, is respectively example part and T-MPLS tunnel segment; Example partly is mainly used to the data message of private user one side is linked into public network tunnel one side, perhaps the data message with public network tunnel one side is linked into private user one side, we are referred to as CIP (user side interface) configuration the configuration of close private user one side, it has comprised the information (such as interface type, the interface content) that the user inserts; We are referred to as VIP (public network side interface) configuration the configuration of close public network tunnel one side, it comprises the information of public network label list, private network tags table and next jumping of tunnel, normally tunnel information is bundled on the VIP public network label of determining the tunnel and next jumping during configuration.
Being configured on the node of T-MPLS tunnel, each node all are sections of tunnel, have also have into, but all have on the not every node into having; Head (being head node) in the tunnel is not enter the mouth, and the inlet of disappearance is inserted by example and substitutes; Same afterbody (being tail node) in the tunnel also is not outlet, and the outlet of disappearance is also inserted by example and substitutes.Generally the processing of tunnel head node part is referred to as the up processing in tunnel, and the processing of tunnel tail node part is referred to as the downlink processing in tunnel.
The T-MPLS tunnel is directive, the direction in tunnel depends on its inlet and the setting of outlet, no matter be unidirectional tunnel or bidirectional tunnel, all pass through the label forwarding data message, data message comes in to send by outgoing label to go into label again, outgoing label and next jumping are to concern one to one, have had next jumping figure could really find an exit according to message.
The protection type in T-MPLS tunnel mainly contains two kinds, is respectively:
Protection Class1+1: in the porch in tunnel (being the head node place), data message can be replicated two parts, portion mails to main tunnel, portion mails to the protection tunnel, in the exit in tunnel (being tail node place or end), the outlet meeting is carried out analysis and judgement to the data message, if current main tunnel is effective, then the data message forwarding on the main tunnel is gone out, and will protect the data message on the tunnel to abandon; If current main tunnel is invalid, then the data message on the main tunnel is abandoned, and will protect the data message forwarding on the tunnel to go out.
Protection Class1: 1: the porch in the tunnel, inlet judge that to tunnel state if main tunnel is effective, then data message sends from main tunnel; If main tunnel is invalid, then data message sends from the protection tunnel.
In the data message processing procedure of reality, factor is to judge by the inquiry list item according to the operation of message, and how decision is operated then, so need pre-configured list item, list item configuration of the prior art is as follows:
The public network label list: with the public network label is key assignments, and the terminal sign in tunnel writes in the table, when terminal configuration protection type is 1+1 in the tunnel, will abandon a public network label list of information write protection tunnel correspondence; When terminal configuration protection type is 1+1 in the tunnel, in the time of main tunnel failure, write the public network label list of becoming owner of the tunnel correspondence with abandoning an information, will protect the bit clear that abandons in the public network label list of tunnel correspondence simultaneously;
The private network tags table: with the private network tags is key assignments, and instance number writes in the table;
Other list items of public network label list, private network tags table are sky, and the tunnel table also is empty simultaneously.
As shown in Figure 1, in the prior art, T-MPLS tunnel down processing method comprises the steps:
The first step: node extracts the public network label and the private network tags information of described data message from the data message that receives;
Second step: inquiry public network label list, judge the public network label that extracts whether with described public network label list in the tag match that exists, if do not match, then directly abandon; If coupling checks then whether the terminal flag bit in tunnel is effective in the described public network label list,, represent that then data message arrives tunnel end (promptly this node is the tail node in tunnel), carries out for the 3rd step if effectively; If invalid, illustrate that then data message does not arrive end, also need to continue to transmit, give next node with the data message forwarding that receives this moment, changes the first step over to;
The 3rd step: inquiry private network tags table, judge the private network tags extracted whether with described private network tags table in the tag match that exists, if do not match, then directly abandon; If coupling then carried out for the 4th step;
The 4th step: check in the public network label list whether abandon the position effective, if effectively, then data message is abandoned, otherwise data message is sent to private network side.
Such scheme is when tunnel down outlet is provided with the protection type and is 1+1, and the strategy that abandons is not considered the situation that the tunnel is multiplexing, can not effectively support the dynamic learning of microcode part simultaneously, thereby need improve.
Summary of the invention
Technical problem to be solved by this invention is, improving one's methods that a kind of T-MPLS tunnel down handles is provided, and the present invention can conveniently carry out the active and standby switching of microcode, can adapt to the multiplexing operation in tunnel under the complex situations simultaneously.
What a kind of T-MPLS tunnel down was handled improves one's methods, and comprises the steps:
Step 1: node extracts the public network label and the private network tags of the data message that receives;
Step 2: inquiry public network label list, judge described public network label whether with described public network label list in the tag match that exists, if do not match, then abandon described data message; If coupling checks then whether the terminal flag bit in tunnel is effective in the described public network label list, if effectively, then execution in step three; Otherwise, give next node, execution in step one with described data message forwarding;
Step 3: inquiry private network tags table, judge described private network tags whether with described private network tags table in the tag match that exists, if coupling, then execution in step four; Otherwise, abandon described data message;
Step 4: from the private network tags table, obtain the tunnel Taoist monastic name, and, obtain the protection type in tunnel by described tunnel Taoist monastic name inquiry tunnel table; If the protection type is 1:1, then give private network side with data message forwarding; If the protection type is 1+1, then execution in step five;
Step 5: judge that described data message is in main tunnel or in the protection tunnel, and judge whether main tunnel is effective, if described data message in main tunnel and main tunnel effective, perhaps described data message is invalid in protection tunnel and main tunnel, then described data message is sent to private network side; Otherwise, abandon described data message.
Also comprise configuration public network label list, private network tags table and tunnel table before the described step 1.
Described configuration public network label list, private network tags table and tunnel table specifically comprise:
For described public network label list: with the public network label is key assignments, and the tunnel type sign (tunnel that is the current data message place is main tunnel or protection tunnel sign) and the terminal sign in tunnel at this public network label place write in the table;
For described private network tags table: with the private network tags is key assignments, and the pairing main tunnel Taoist monastic name of this private network tags, instance number are write in the table;
For described tunnel table: with main tunnel Taoist monastic name is key assignments, and whether effective marker writes in the table will to protect type, main tunnel.
In the described step 2, when the terminal flag bit in tunnel is effective, also comprise the tunnel type of from the public network label list, obtaining the current place of described data message.
In the described step 4, when inquiry tunnel table, also comprise and obtain effective marker position, main tunnel.
In the described step 5, node judges according to tunnel type that gets access to and effective marker position, main tunnel whether described data message is still effective in protection tunnel and main tunnel in main tunnel.
The present invention judges by main tunnel significance bit in the tunnel table and protection type whether message abandons, rather than judges whether to abandon by label list, has following effect:
1. can conveniently carry out the active and standby switching of microcode;
2. can adapt to the multiplexing operation in tunnel under the complex situations.
Description of drawings
Fig. 1 is the flow chart of T-MPLS tunnel down processing method in the prior art;
Fig. 2 is a flow chart of improving one's methods of the present invention;
Fig. 3 is the method for the invention application scenarios schematic diagram.
Embodiment
Below in conjunction with drawings and the specific embodiments the present invention is described in further details.
As shown in Figure 2, be flow chart of improving one's methods of the present invention, specifically comprise the steps:
Step 200: configuration public network label list, private network tags table and tunnel table;
Among the present invention, each table configuration is as follows:
The public network label list: with the public network label is key assignments, and tunnel type sign at this public network label place (if there is not configuration protection, acquiescence all is a main tunnel sign) and the terminal sign in tunnel are write in the table;
The private network tags table: with the private network tags is key assignments, and the pairing main tunnel Taoist monastic name of this private network tags, instance number are write in the table;
The tunnel table: with main tunnel Taoist monastic name is key assignments, and whether effective marker writes in the table will to protect type, main tunnel.
Protection type in the described tunnel table is defaulted as 1:1, and main tunnel acquiescence effectively.
When the configuration protection type is 1+1 endways; in the time of main tunnel failure; promptly can whether significance bit be switched by revising main tunnel in the described tunnel table, such as: come dynamic learning with the set of making amendment of the main tunnel significance bit in the tunnel table by microcode in the network processing unit.
Step 201: node extracts the public network label and the private network tags of the data message that receives;
Step 202: inquiry public network label list;
Step 203: judge described public network label whether with described public network label list in the tag match that exists, if do not match, then execution in step 215; If coupling, then execution in step 204;
Step 204: check whether the terminal flag bit in tunnel is effective in the described public network label list, if effectively, illustrate that then described data message has arrived the tunnel end, execution in step 206; Otherwise, also no show end of described data message is described, also need to continue to transmit execution in step 205;
Step 205: give next node, execution in step 201 with described data message forwarding;
Step 206: obtain the tunnel type at the current place of described data message from the public network label list, promptly described data message is on the main tunnel or on the protection tunnel;
Step 207: inquiry private network tags table;
Step 208: judge described private network tags whether with described private network tags table in the tag match that exists, if coupling, then execution in step 209; Otherwise, execution in step 215;
Step 209: from the private network tags table, obtain the tunnel Taoist monastic name, and by described tunnel Taoist monastic name inquiry tunnel table, the protection type and the effective marker position, main tunnel that obtain the tunnel;
Among the present invention, the protection type in described tunnel has two kinds of 1:1 and 1+1.
Step 210: whether the protection type of judging the tunnel is 1+1; If then execution in step 211; Otherwise the protection type is 1:1, execution in step 214;
Step 211: the tunnel type that gets access to according to step 206 judges that described data message is whether on main tunnel, if then execution in step 212; Otherwise described data message is being protected on the tunnel execution in step 213;
Step 212: judge according to the effective marker position, main tunnel that step 209 is obtained whether described main tunnel is effective, if effectively, then execution in step 214; Otherwise, execution in step 215;
Protection type in the tunnel is under the situation of 1+1, if main tunnel is effective, then protects the tunnel necessarily invalid; If main tunnel is invalid, then protect the tunnel necessarily effective.
Step 213: judge according to the effective marker position, main tunnel that step 209 is obtained whether described main tunnel is effective, if effectively, then execution in step 215; Otherwise, execution in step 214;
Step 214: described data message is sent to private network side, and the processing of T-MPLS tunnel down finishes;
Step 215: abandon described data message, the processing of T-MPLS tunnel down finishes.
As shown in Figure 3, be the method for the invention application scenarios schematic diagram, include service edge equipment (PE) A and PE B in example 1 and the example 2; Method and method of the present invention by prior art illustrates respectively below:
Example 1 and each table configuration (under the initial situation, main tunnel acquiescence is effectively) of 2 are as follows when using the method for prior art:
The public network label list:
Key assignments Label1 contents in table: the tunnel is effectively terminal
Key assignments Label2 contents in table: the tunnel is terminal effectively, abandon the position effectively
The private network tags table:
Key assignments pwLabel1 contents in table: instance number service1
Key assignments pwLabel2 contents in table: instance number service2
Example table:
Key assignments service1 contents in table: CIP1 exports relevant information
Key assignments service2 contents in table: CIP2 exports relevant information
Wherein the list item of example 1 correspondence has:
Public network label list: key assignments Label1 key assignments Label2
Private network tags table: key assignments pwLabel1
Example table: key assignments service1
The list item of example 2 correspondences has:
Public network label list: key assignments Label2
Private network tags table: key assignments pwLabel2
Example table: key assignments service2
In the method for prior art, enter, then walk the flow process of example 1, can in PE A, be duplicated into two parts, forward from tunnel1, tunnel2 respectively as if the CIP1 mouth of data message from PE A; Hold at PE B, the message public network label of coming from tunnel1 is that Label1, private network tags are pwLabel1, the message public network label of coming from tunnel2 is that Label2, private network tags are pwLabel1, because in the public network label list, abandon the position in the list item of key assignments Label2 correspondence effectively, so the message that tunnel2 comes is dropped, the message that tunnel1 comes is forwarded;
If data message enters from the CIP2 mouth of PE A, then walk the flow process of example 2, can directly be forwarded from tunnel2; At PE B end, the message public network label of coming from tunnel2 is Label2, and private network tags is pwLabel2, owing in the public network label list, abandon the position in the list item of key assignments Label2 correspondence effectively, so the message that tunnel2 comes is dropped.
From top description as can be seen; in case abandon the position effectively in the public network label list of example that protection type is 1+1; then no matter be the data message of coming of the protection tunnel tunnel2 from example 1 or will all be dropped from the data message that the tunnel2 in 2 main tunnel as an example comes, promptly protection type is the example of 1+1 the protection tunnel can not be as the main tunnel of another example.
Configurations of example 1,2 each table are as follows when using the method after the improvement of the present invention:
The public network label list:
Key assignments Label1 contents in table: effective, the main tunnel of tunnel end sign
Key assignments Label2 contents in table: the tunnel is terminal effectively, protection tunnel sign
The private network tags table:
Key assignments pwLabel1 contents in table: main tunnel Taoist monastic name tunnel1, instance number service1
Key assignments pwLabel2 contents in table: main tunnel Taoist monastic name tunnel2, instance number service2
The tunnel table:
Key assignments tunnel1 contents in table: protection main tunnel, Class1+1 is effective
Key assignments tunnel2 contents in table: the protection Class1: 1 main tunnel is effective
Example table:
Key assignments service1 contents in table: CIP1 exports relevant information
Key assignments service2 contents in table: CIP2 exports relevant information
Wherein the list item of example 1 correspondence has:
Public network label list: key assignments Label1 key assignments Label2
Private network tags table: key assignments pwLabel1
Tunnel table: key assignments tunnel1
Example table: key assignments service1
The list item of example 2 correspondences has:
Public network label list: key assignments Label2
Private network tags table: key assignments pwLabel2
Tunnel table: key assignments tunnel2
Example table: key assignments service2
In the method for the invention, enter as if the CIP1 mouth of data message from PE A, then walk the flow process of example 1, data message is duplicated into two parts at PE A, forwards from tunnel1, tunnel2 respectively; At PE B end, the message public network label of coming from tunnel1 is that Label1, private network tags are pwLabel1, and the message public network label of coming from tunnel2 is that Label2, private network tags are pwLabel1:
The message that main tunnel tunnel1 comes:
1. by Lable1 inquiry public network label list, obtain main tunnel sign, the terminal sign in tunnel;
2. by pwLabel1 inquiry private network tags table, obtain main tunnel Taoist monastic name tunnel1, instance number service1;
3. by tunnel1 inquiry tunnel table, obtain protected mode 1+1, current main tunnel is effective;
Because current message in main tunnel, and main tunnel is effective, so do not abandon, message is sent to private network side.
The message that protection tunnel tunnel2 comes:
1. by Lable2 inquiry public network label list, obtain protection tunnel sign, the terminal sign in tunnel;
2. by pwLabel1 inquiry private network tags table, obtain main tunnel Taoist monastic name tunnel1, instance number service1;
3. by tunnel1 inquiry tunnel table, obtain protected mode 1+1, current main tunnel is effective;
4. protecting the tunnel because of current message, but main tunnel is effective, so abandon.
If data message enters from the CIP2 mouth of PE A, then walk the flow process of example 2, data message directly forwards from tunnel2 in PE A; At PE B end, the message public network label of coming from tunnel2 is Label2, and private network tags is pwLabel2:
The message of coming from main tunnel tunnel2:
1. by Lable2 inquiry public network label list, obtain protection tunnel sign, the terminal sign in tunnel;
2. by pwLabel2 inquiry private network tags table, obtain main tunnel Taoist monastic name tunnel2, instance number service2;
3. by tunnel2 inquiry tunnel table, obtain protected mode 1:1;
4. because current protection type is 1:1,, message is sent to private network side so do not abandon.
From above description as can be seen, in the method for the invention, protection type is that can also to protect type as another be the main tunnel of the example of 1:1 for the protection tunnel of the example of 1+1.
The private network tags of same example correspondence is identical, the pairing private network tags of different examples is different, such as, the main tunnel of the private network tags correspondence in the example 1 is tunnel1, and the pairing main tunnel of private network tags is tunnel2 in the example 2, can treat respectively according to the difference of its private network tags so the data of coming from same tunnel comprise.
After adopting of the present invention improving one's methods, whether data message is dropped in the downlink processing, depends on the effective marker position and the protection type in main tunnel; If the protection type is 1:1, then no matter whether the effective marker position in main tunnel is effective, all data message directly is transmitted to private network side, promptly all do not abandon, because under this kind protection type, the state in tunnel is judged in the porch in tunnel; And if the protection type is 1+1, then need this moment the judgment data message on which tunnel and the effective marker position in main tunnel whether effectively decide and abandon data message or give private network side data message forwarding.
The method of the invention can effectively be carried out the active and standby switching of microcode, when OAM monitors the appearance alarm of main tunnel, directly judges by microcode, and the main tunnel significance bit of tunnel table is carried out dynamic learning, can reach the purpose of active and standby switching.

Claims (3)

1. improving one's methods of a T-MPLS tunnel down processing is characterized in that, comprises the steps:
Step 1: configuration public network label list, private network tags table and tunnel table, described configuration public network label list, private network tags table and tunnel table specifically comprise:
For described public network label list: with the public network label is key assignments, and the terminal sign of tunnel type sign and tunnel at this public network label place is write in the table, and the tunnel type sign at described public network label place is defaulted as main tunnel sign;
For described private network tags table: with the private network tags is key assignments, and the pairing main tunnel Taoist monastic name of this private network tags, instance number are write in the table;
For described tunnel table: with main tunnel Taoist monastic name is key assignments, and whether effective marker writes in the table will to protect type, main tunnel, and the protection type in the described tunnel table is defaulted as 1: 1, and main tunnel acquiescence effectively;
Step 2: node extracts the public network label and the private network tags of the data message that receives;
Step 3: inquiry public network label list, judge described public network label whether with described public network label list in the tag match that exists, if do not match, then abandon described data message, the processing of T-MPLS tunnel down finishes; If coupling checks then whether the terminal flag bit in tunnel is effective in the described public network label list, if effectively, then obtain the tunnel type at the current place of described data message from the public network label list, execution in step four; Otherwise, give next node, execution in step two with described data message forwarding;
Step 4: inquiry private network tags table, judge described private network tags whether with described private network tags table in the tag match that exists, if coupling, then execution in step five; Otherwise, abandoning described data message, the processing of T-MPLS tunnel down finishes;
Step 5: from the private network tags table, obtain main tunnel Taoist monastic name, and, obtain the protection type in tunnel by described main tunnel Taoist monastic name inquiry tunnel table; If the protection type is 1: 1, then give private network side with data message forwarding, the processing of T-MPLS tunnel down finishes; If the protection type is 1+1, then execution in step six;
Step 6: judge that described data message is in main tunnel or in the protection tunnel, and judge whether main tunnel is effective, if described data message in main tunnel and main tunnel effective, perhaps described data message is invalid in protection tunnel and main tunnel, then described data message is sent to private network side; Otherwise, abandon described data message.
2. what T-MPLS tunnel down as claimed in claim 1 was handled improves one's methods, and it is characterized in that, in the described step 5, when inquiry tunnel table, also comprises and obtains effective marker position, main tunnel.
3. what T-MPLS tunnel down as claimed in claim 1 or 2 was handled improves one's methods; it is characterized in that; in the described step 6, node judges according to tunnel type that gets access to and effective marker position, main tunnel whether described data message is still effective in protection tunnel and main tunnel in main tunnel.
CN2008102176525A 2008-11-25 2008-11-25 Improved method for T-MPLS tunnel down processing Active CN101414951B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008102176525A CN101414951B (en) 2008-11-25 2008-11-25 Improved method for T-MPLS tunnel down processing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008102176525A CN101414951B (en) 2008-11-25 2008-11-25 Improved method for T-MPLS tunnel down processing

Publications (2)

Publication Number Publication Date
CN101414951A CN101414951A (en) 2009-04-22
CN101414951B true CN101414951B (en) 2011-04-06

Family

ID=40595275

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008102176525A Active CN101414951B (en) 2008-11-25 2008-11-25 Improved method for T-MPLS tunnel down processing

Country Status (1)

Country Link
CN (1) CN101414951B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101662426B (en) * 2009-09-30 2012-06-13 中兴通讯股份有限公司 T-MPLS tunnel protection processing method and system thereof
CN101877677B (en) * 2010-06-25 2014-08-13 中兴通讯股份有限公司 Tunnel switching method and system for multi-protocol label switching services
CN101984604A (en) * 2010-11-12 2011-03-09 中兴通讯股份有限公司 Tunnel multiplexing method in linear protection groups and tail nodes of tunnels
CN102025626B (en) * 2010-12-09 2014-12-10 中兴通讯股份有限公司 Method for forwarding multicast data message and provider edge
CN103716220B (en) * 2012-09-28 2017-08-22 新华三技术有限公司 A kind of data transmission method and its device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1926262A1 (en) * 2006-11-22 2008-05-28 Huawei Technologies Co., Ltd. Method, System and Node for Implementing Subnetwork Connection protection in multi-protocol label switching network
CN101247354A (en) * 2008-03-26 2008-08-20 北京邮电大学 Method for fast recovering heavy route aiming at T-MPLS network multicast
CN101267402A (en) * 2008-05-08 2008-09-17 北京邮电大学 Dual-label transmission and control mechanism based on T-MPLS
CN101662426A (en) * 2009-09-30 2010-03-03 中兴通讯股份有限公司 T-MPLS tunnel protection processing method and system thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1926262A1 (en) * 2006-11-22 2008-05-28 Huawei Technologies Co., Ltd. Method, System and Node for Implementing Subnetwork Connection protection in multi-protocol label switching network
CN101247354A (en) * 2008-03-26 2008-08-20 北京邮电大学 Method for fast recovering heavy route aiming at T-MPLS network multicast
CN101267402A (en) * 2008-05-08 2008-09-17 北京邮电大学 Dual-label transmission and control mechanism based on T-MPLS
CN101662426A (en) * 2009-09-30 2010-03-03 中兴通讯股份有限公司 T-MPLS tunnel protection processing method and system thereof

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
李健等.T—MPLS分组传送技术.《硕博论文》.2007,第23卷(第1期),85-89. *
边巍巍等.基于T-MPLS的分组传送网技术研究.《光通信技术》.2007,(第8期),4-7. *

Also Published As

Publication number Publication date
CN101414951A (en) 2009-04-22

Similar Documents

Publication Publication Date Title
CN102025646B (en) Link switching method and device thereof
CN101605098B (en) Communication device with a path protection function, and network system using the communication device
CN101662426B (en) T-MPLS tunnel protection processing method and system thereof
CN101483558B (en) Method, system and apparatus for packet switching network access by network appliance
US7983267B2 (en) Transmission apparatus and transmission system
CN101931520B (en) Switching method and system
CN101414951B (en) Improved method for T-MPLS tunnel down processing
CN101984591B (en) Service convergence method and system in transport-multiprotocol label switching network
KR101364369B1 (en) Node, monitoring and administration method used thereupon, and transfer system, input circuit, and output circuit using same
CN103634134B (en) Cross-domain protection intercommunication method and system
CN1933422B (en) Network trouble switching method
CN102546855B (en) MAC Address recovery method and PE equipment in VPLS network
CN101252523B (en) Message redirecting method, method and device for reverting redirecting message feature information
CN103368844B (en) Message processing method and LSR in MPLS network
CN104468347B (en) Control method and device of the network data from loopback
CN101674239A (en) Method and device for providing web service
CN104753754A (en) Method and apparatus for transmitting messages
CN102857399A (en) MAC address deleting method, device and system of VPLS dual homing network
CN102437957A (en) Method and device for processing intersected ring of multi-protocol label switching
CN103746891B (en) A kind of guard method of looped network access service, apparatus and system
CN101651566B (en) Method for solving inter-domain link fault
CN103973498B (en) A kind of many home network active-standby path systems of selection and equipment
CN101262438B (en) L2 packet forward method for a switch
CN101984604A (en) Tunnel multiplexing method in linear protection groups and tail nodes of tunnels
CN103716220B (en) A kind of data transmission method and its device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant