CN101753409A - Method, device and system for sharing resources - Google Patents

Method, device and system for sharing resources Download PDF

Info

Publication number
CN101753409A
CN101753409A CN200810180103A CN200810180103A CN101753409A CN 101753409 A CN101753409 A CN 101753409A CN 200810180103 A CN200810180103 A CN 200810180103A CN 200810180103 A CN200810180103 A CN 200810180103A CN 101753409 A CN101753409 A CN 101753409A
Authority
CN
China
Prior art keywords
path
protection path
node
protection
desire
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN200810180103A
Other languages
Chinese (zh)
Inventor
贺佳
张海燕
尧昱
张永军
黄善国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN200810180103A priority Critical patent/CN101753409A/en
Publication of CN101753409A publication Critical patent/CN101753409A/en
Pending legal-status Critical Current

Links

Images

Abstract

The embodiment of the invention discloses a method, a device and a system for sharing resources. The method comprises the following steps: receiving a path message for establishing a protection path, and judging whether the protection path to be established is coincide with the established protection path according to the path message; when the protection path to be established is coincide with the established protection path, judging whether a link and/or a node of the protection path to be established is the same with a link and/or a node protected by the established protection path; and when the link and/or the node of the protection path to be established is different from the link and/or the node protected by the established protection path, sharing the resources of the protection path to be established and the established protection path. The bandwidths among different protection paths whose links are coincide can be shared by the method provided by the embodiment of the invention.

Description

A kind of methods, devices and systems of resource-sharing
Technical field
The present invention relates to communication field, relate in particular to a kind of methods, devices and systems of resource-sharing.
Background technology
QoS (Quality of Service, service quality) and survivability are the two large problems that present Internet faces.Network survivability is meant when system breaks down that network still can be kept the ability of service continuity, and promptly network has certain failover capability.Current Restoration Mechanism based on IP routing protocol needs several seconds time to a few minutes at least, and this will cause losing of a large amount of groupings, thereby causes the decline of serious service quality problem and network performance.
MPLS (Multi-Propocol Label Switching, the multi protocol label exchange) technology is widely used at the current IP network, it is towards the characteristic in path, make the Restoration Mechanism of MPLS can be in the time of expectation when breaking down resume data transmission, the qos requirement after guaranteeing simultaneously to recover.The basic principle of the recovery mechanism of MPLS network is after node detection takes place to fault, notify relevant LSR (Label Switch Router immediately, LSR) reselects route, affected flow is transferred on the backup path, finish fault recovery.Completing successfully fault recovery needs the assurance of two aspects: 1. can set up the backup path that is used for transmitting the traffic carrying capacity that is subjected to fault effects; 2. this backup path is wanted to satisfy the requirement of influenced business to QoS.
The inventor finds that there is following problem at least in prior art in realizing process of the present invention:
Prior art can realize operating path on the link and the resource-sharing protection path, but can not shared resource between the protection path of different operating paths, causes the waste of ample resources.
Summary of the invention
The embodiment of the invention provides a kind of methods, devices and systems of resource-sharing, can make bandwidth sharing between the resource conservation in different operating path.
On the one hand, the embodiment of the invention provides a kind of method of resource-sharing, comprising:
Reception is used to set up the PATH in protection path, judges according to described PATH whether the protection path that desire is set up overlaps with the protection path of having set up;
When protection path that described desire is set up during, judge whether link and/or the node protected in the protection path of described desire foundation and the protection path of having set up be identical with the described protection paths merge of having set up;
When link of being protected when protection path that described desire is set up and the protection path of having set up and/or node are inequality, share protection path and the described resource of protecting the path of having set up that described desire is set up.
On the other hand, the embodiment of the invention provides a kind of device of resource-sharing, comprising: first judge module is used to judge whether the protection path that desire is set up overlaps with the protection path of having set up;
Second judge module is used for judged result when described first judge module and attaches most importance to fashionablely, judges whether link and/or the node protected in protection path that described desire sets up and the described protection path of having set up be identical;
Sharing module is used for sharing protection path and the described resource of protecting the path of having set up that described desire is set up when the judged result of described second judge module when being inequality.
The embodiment of the invention provides a kind of system of resource-sharing, comprising: first node and Section Point;
Described first node is used to send the PATH that is used for setting up the protection path;
Described Section Point is used to receive described PATH, judges according to described PATH whether the protection path that desire is set up overlaps with the protection path of having set up; When protection path that described desire is set up during, judge whether link and/or the node protected in the protection path of described desire foundation and the protection path of having set up be identical with the described protection paths merge of having set up; When link of being protected when protection path that described desire is set up and the protection path of having set up and/or node are inequality, share protection path and the described resource of protecting the path of having set up that described desire is set up.
Compared with prior art, the embodiment of the invention has the following advantages:
In the embodiment of the invention; according to the PATH that receives; judge desire protection path of setting up and the claimed operating path of having set up in protection path not simultaneously; judge whether the protection path that desire is set up overlaps in next node with the protection path of having set up; if the object difference of coincidence and two protection trail protections; shared bandwidth resource then; when like this different resource in different operating path being protected; carry out sharing of resource; both realized this locality protection to network; save a large amount of Internet resources again, can greatly improve the resource utilization of network.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art, to do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art below, apparently, accompanying drawing in describing below only is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the method flow diagram of resource-sharing in the embodiment of the invention;
Fig. 2 is the method flow diagram of resource-sharing in another embodiment of the present invention;
Fig. 3 is a network multicast tree topography in the embodiment of the invention;
Fig. 4 is the method flow diagram of resource-sharing in the embodiment of the invention;
Fig. 5 is the form schematic diagram of object PLNO in the embodiment of the invention;
Fig. 6 is a network heavy-route schematic diagram in the embodiment of the invention;
Fig. 7 is the device schematic diagram of resource-sharing in the embodiment of the invention;
Fig. 8 is the device schematic diagram of resource-sharing in another embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the invention, the technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that is obtained under the creative work prerequisite.
The embodiment of the invention provides a kind of methods, devices and systems of resource-sharing, can improve the network local protection resource utilization when carrying out resource reservation.
The methods, devices and systems of the resource-sharing that the embodiment of the invention is provided below in conjunction with the drawings and specific embodiments are elaborated.
The embodiment of the invention provides a kind of method of resource-sharing, as shown in Figure 1, comprising:
Step 101, reception are used to set up the PATH in protection path, judge according to PATH whether the protection path that desire is set up overlaps with the protection path of having set up;
The route display object that this node can carry according to the PATH (path message) that is used to set up the protection path; judge whether the protection path that desire is set up overlaps in next node with the protection path of having set up; the route display object of setting up the protection path of the route display object in the protection path that desire is set up and preservation is just compared; if next node is identical, judge that then protection path that desire sets up protects the path to overlap in next node with setting up.This route display object is mainly used in the node of sign protection path process.Certainly, also can obtain protection path that desire sets up and protect all nodes that overlap of path with setting up according to route display object, or other self-defining methods.
Step 102, when protection path that desire is set up during with the protection paths merge set up, judge whether link and/or the node protected in the protection path of desire foundation and the protection path of having set up identical;
Concrete, can judge that this protected object comprises according to the protected object that path message is carried: sign Flag field is used to represent that described message is used for link protection and/or Node Protection; First node PLR id field is used to represent to protect the first node ID in path; Next-hop node NHOP id field is used to be illustrated in the next-hop node ID that protects the first node in path on the operating path; Interface Interface id field is used to represent to protect the first node in path by which interface to link to each other with the operating path next-hop node.Compare by the protected object of preserving in protected object that this path message is carried and this node; if it is inequality; node and/or the link that can judge protection path that desire is set up and the protection trail protection of having set up are inequality, and the process of concrete comparison comprises:
Identification field in the protected object that carries according to PATH, obtaining described desire, to set up the object of protecting in the protection path be node or link or node and link; First node field in the protected object that carries according to described PATH is obtained the first node that described desire is set up the protection path; Next-hop node field in the protected object that carries according to described PATH is obtained the next-hop node that described desire is set up the first node of protection operating path that the path is protected; Interface field in the protected object that carries according to described PATH is obtained described desire and is set up the first node in protection path and by which interface links to each other with the operating path next-hop node; The information of obtaining according to described identification field, first node field, next-hop node field and interface field; determine link and/or node that protection path that described desire is set up is protected, and compare with link and/or node that the protection path of having set up is protected.
When step 103, the link of being protected when protection path that desire is set up and the protection path of having set up and/or node are inequality, share desire protection path of setting up and the resource of having set up the protection path.
During shared resource, the resource that the protection path that path message desire is set up needs compares with the protection path reserved resource of having set up; If be not more than the protection path reserved resource of having set up, then share reserved resource, and use and share described reserved resource foundation protection path; If greater than the protection path reserved resource of having set up, then send the message of carrying reserved resource information to downstream node, treat downstream node reply the information of resource is provided after, carry out resource-sharing with established path.Only the method with above-mentioned shared bandwidth is an example, and the resource-sharing between the simple declaration protection path can also be used additive method certainly, realizes sharing of bandwidth, as can perhaps refreshing resource again with the mode polishing resource of increment.
Before judging protection path that desire is set up and whether the protection path of having set up overlap; the identity information (as session object and transmit leg template object) that this node can also carry according to this path message judges whether the protection path that desire sets up is identical with the claimed operating path of having set up in protection path.Just, the identity information of preserving in the identity information in this path message and this node of setting up the protection path is compared, if inequality, then the protection path of desire foundation is inequality with the claimed operating path of having set up in protection path.
The method that the embodiment of the invention provides; be applicable to when carrying out protection quick heavy-route in this locality in the MPLS network; make the protection path can carry out resource-sharing; effectively utilized the little characteristics of two place's fault probability have taken place in the network simultaneously; both realized this locality protection to network; save a large amount of Internet resources again, can greatly improve the resource utilization of network.
The method of the resource-sharing that the embodiment of the invention is provided below by specific embodiment is elaborated, and the node in the MPLS network on certain bar LSP, as shown in Figure 2, comprising when link or downstream adjacent node carry out this locality protection the downstream:
Step 201, in the path message in protection path, carry newly-increased object Protected LinkorNode (protection link/node) and come the sign protection object;
Step 202, path message are transmitted along the protection path, when the node on the protection path receives path message, according to session object SESSION in the path message and transmit leg template object SENDER_TEMPLATE, the corresponding object of carrying with the path message of preserving in the node compares, judge whether to set up the protection path for same LSP, if then handle according to RFC4090; If not, promptly this path message is that then execution in step 203 for another LSP sets up the protection path;
Step 203, judgement are set up whether overlapping in abutting connection with link of protection path through the desire of setting up protection path and this path message of this node; If do not overlap, then according to existing protocol reserved resource and foundation protection path; If coincidence is arranged, then execution in step 204.
Step 204, judge whether same link or node are protected, if then carry out the reservation of bandwidth and the foundation in protection path by the resource reservation mode that defines in the existing protocol according to the Protected LinkorNode object in the path message; Otherwise, execution in step 205;
Wherein, comprise in the Protected LinkorNode object: the Flag field is used to represent that described message is used for link protection and/or Node Protection; The PLR id field is used to represent to protect the first node ID in path; The NHOP id field is used to be illustrated in the next-hop node ID that protects the first node in path on the operating path; The Interface id field is used to represent to protect the first node in path by which interface to link to each other with the next-hop node of operating path.Compare by the protected object of preserving in protected object that this path message is carried and this node, if inequality, can judge that the protection path that desire sets up is inequality with the node/link of the protection trail protection of having set up.
Step 205, protection the setting up in the process of path, with other protection path shared bandwidths;
The resource that the protection path that path message desire is set up needs compares with the protection path reserved resource of having set up; If be not more than the protection path reserved resource of having set up, then resource is enough, and sharing wherein, bandwidth is used for the foundation that other protect paths; If set up protection path reserved resource deficiency, then be not enough part application reserved resource, and path message downstream node is transmitted, to endpoint node; The endpoint node upstream nodes sends RESV message then, receives the reserved resource of the node of this message according to application, carries out resource increase or resource and refreshes, and then realize the shared reservation of resource; This RESV message is sent to source node always, finishes the protection path and sets up and the resource-sharing process.The node of protection path process is preserved resource reservation situation and shared state, when receiving path message later on, protects the foundation in path through same step.Only the method with above-mentioned shared bandwidth is an example, and the resource-sharing between the simple declaration protection path can also be used additive method certainly, realizes sharing of bandwidth, as can perhaps refreshing resource again with the mode polishing resource of increment.
Below in conjunction with Fig. 3 the method that the embodiment of the invention provides is described in detail, as shown in the figure, is a kind of topology situation of MPLS network.Path LSP1:R1-R2-R3-R4-R5-R6 wherein, path LSP2:R10-R11-R12-R13-R14-R15, dotted line is the protection path; Node R 2 on the LSP1 of path is P-LSP1:R2-R7-R8-R9-R5 for the R3 node carries out the backup path that local protection set up; and the node R 12 on the LSP2 is P-LSP2:R12-R8-R9-R13 for path R12R13 carries out the backup path that local protection set up; can learn that two are protected paths all to pass through the R8-R9 link, can carry out sharing of resource., suppose the protection path of path LSP1 for having set up herein, path LSP2 is the protection path that desire is set up, and as shown in Figure 4, then protects the process of specifically setting up in path as follows:
Step 401, node R 12 increase a new object PLNO (ProtectedLinkorNode Object in path message, protection link/node information) show that this protection path is used for protecting which bar link or which node, the formal definition of this object PLNO as shown in Figure 5: fields such as Length, Class-NUM, C-Type all are basic format fields of object in the RSVP; The type field is used to show PLR ID, Interface ID and NHOP id field type; When Type is 0x01, show that the type of protecting the path is IPv4, PLR ID, Interface ID and NHOP ID are 32 bit address; When Type is 0x02, show that the type of protecting the path is IPv6, PLR ID, Interface ID and NHOP ID are 128 bit address.The Length field is represented the length (comprising Type and Length field) of subobject.The Reserve field is a reserved field, for expansion is later on used.The Flag field represents that this path message is used for link protection or Node Protection, and 0x01 is indicated as link protection, and 0x02 is a Node Protection, and 0x03 all protects for both.The PLR id field represents to carry out the node ID of local protection.The Interface id field represents PLR by which interface links to each other with the NHOP node.The next-hop node ID of local node when the NHOP id field is represented to carry out local the protection.By the PLNO object, with PLR ID, Interface ID and NHOP ID and flag bit in conjunction with showing that this path message carries out this locality to which node or which bar link and protect.
After step 402, node R 8 receive this path message, judge that the operating path that this path message represents is identical with the operating path of having preserved; If, then according to existing agreement reserved resource and foundation protection path, otherwise execution in step 403;
Concrete, node R 8 is obtained SESSION and the Sender_Temple in this path message, and compares with the SESSION and the Sender_Temple that preserve; If it is identical, whether the protection path (P-LSP1) of the process R8 that judges the protection path (P-LSP2) that this path message will be set up and set up before is claimed is same operating path (working LSP 1 is same LSP with working LSP 2), if then handle according to RFC4090; Otherwise execution in step 403; Wherein SESSION of Bao Cuning and Sender_Temple are for setting up the LSP1 object in protection path.
In the protection path when setting up, the protection path the node of process all preserved the relevant information in this protection path, this relevant information is path message and each object of carrying thereof, as route display object, SESSION and Sender_Temple object etc.
Step 403, node R 8 judge whether the protection path that this path message is represented overlaps in next node with the protection path of having set up; Node R 8 is obtained the route display object in this path message, and itself and the route display object of preserving are compared, if next-hop node is inequality, then carries out the reservation of bandwidth and the foundation in protection path according to the resource reservation mode that defines in the existing protocol; If next-hop node is identical, execution in step 404;
Whether step 404, node R 8 are judged protection path that this path message is represented and the protection path of having set up, be that same link or same node are protected; If then carry out the reservation of bandwidth and the foundation in protection path by the resource reservation mode that defines in the agreement; Otherwise, execution in step 405;
As shown in Figure 3; protection path by node R 8 has two, the P-LSP2:R12-R8-R9-R13 that the P-LSP1:R2-R7-R8-R9-R5-R6 that has set up (2 pairs of node R of node R 3 are carried out local protection), desire are set up (node R 12 is carried out this locality protection for path R12-R13).
For the path message of transmitting among path P-LSP1, increase the PLNO object in its extension field: Flag is set to 0x02, shows to carry out Node Protection; PLR ID is set to the node ID of R2; InterfaceID is set to 7 (supposing that here node R 2 is by interface 7 and R3 node); NHOP ID is set to the node ID of R3.By the PLNO object; can judge that in conjunction with PLR ID, Interface ID and NHOP ID and Flag flag bit this path message is this locality protection PATH that is used to protect the R3 node; each node at protection path P-LSP1 all keeps this object information, shows that this node is that the R3 node of LSP1 carries out quick heavy-route protection and reserved resource.
For the path message of transmitting among path P-LSP2, increase the PLNO object in its extension field: Flag is set to 0x01, shows to carry out link protection; PLR ID is set to the node ID of R12; InterfaceID is set to 4 (supposing that here node R 12 is by interface 4 and R13 node); NHOP ID is set to the node ID of R13.By the PLNO2 object, can judge that in conjunction with PLR ID, Interface ID and NHOP ID and Flag flag bit this path message is this locality protection PATH that is used to protect the R12-R13 link.
Therefore by the PLNO object, can judge whether the object of the protection trail protection that this path message is represented is identical with the object of the protection trail protection of having set up.Here it should be noted that; node failure can cause the relevant link fault; so when judging whether same resource protected; should be noted that whether this node in the protection of node is overlapped with node in the link protection; if; then can think same resource is protected, can not carry out sharing of resource.P-LSP1 carries out Node Protection to R3 in Fig. 3; P-LSP2 carries out link protection to R12-R13; R3 does not overlap with R12, R13; so just can carry out resource-sharing; if P-LSP2 is the link protection of Rx-R3; then the inefficacy of R3 must cause the link failure of Rx-R3, then can not carry out resource-sharing.
Step 405, set up the path, judge whether the reserved resource in the protection path of having set up is enough, be i.e. the resource that needs of the protection path whether set up of reserved resource greater than desire.The resource that the protection path that path message desire is set up needs compares with the protection path reserved resource of having set up; If be not more than the protection path reserved resource of having set up, then resource is enough, and sharing wherein, bandwidth is used for the foundation that other protect paths; If set up protection path reserved resource deficiency, then be not enough part application reserved resource, and path message downstream node is transmitted, to endpoint node; The endpoint node upstream nodes sends RESV message then, receives the reserved resource of the node of this message according to application, carries out resource increase or resource and refreshes, and then realize the shared reservation of resource; This RESV message is sent to source node always, finishes the protection path and sets up and the resource-sharing process.The node of protection path process is preserved resource reservation situation and shared state, when receiving path message later on, protects the foundation in path through same step.Only the method with above-mentioned shared bandwidth is an example, and the resource-sharing between the simple declaration protection path can also be used additive method certainly, realizes sharing of bandwidth, as can perhaps refreshing resource again with the mode polishing resource of increment.
Protection path P-the LSP1 that has set up in Fig. 3 sentences the R8-R9 link as the protection path in node R 8; and the PATH message that node R 8 is received is used for setting up P-LSP2 also need be with the R8-R9 link during as the protection path; at this moment can consider the resource-sharing of R8-R9, but need to judge whether reserved resource is enough.The endpoint node upstream nodes is replied RESV message, and the node that this RESV message arrives shared resource according to the state of shared resource and the resource of path message application, carries out the shared reservation of resource, through this node RESV message is sent to source node again.Carried out in each protection path of node updates of resource-sharing operation RESV state and maintenance resources and reserved situation and shared state, used for the foundation in later protection path.Intermediate node on the protection path also carries out aforesaid operations and carries out sharing of resource, and safeguards corresponding resource user mode.
Above-mentioned steps has elaborated the method for operation of carrying out resource-sharing in the quick heavy-route process in the MPLS network; effectively utilized the little characteristics of two place's fault probability have taken place in the network simultaneously; when being protected, carries out the different resource in different operating path sharing of resource; both realized this locality protection to network; save a large amount of Internet resources again, can greatly improve the resource utilization of network.
The above-mentioned mechanism that proposes according to the present invention makes that carrying out resource-sharing between the protection path of different operating path in the local guard method of the quick heavy-route of MPLS network becomes possibility, has saved to be used to the Internet resources protected in a large number, has avoided the waste of resource.
As shown in Figure 6, be the quick ordinary circumstance of heavy-route in the MPLS network.Suppose that LSP1 needs the bandwidth of 1 unit, R1-R2-R3-R4-R5-R6 is the operating path of LSP1, and R2-R7-R8-R9-R5 is the protection path of protection node R 3, and when operating path with after protecting the path to set up, every link needs the bandwidth of 1 unit.Simultaneously, another paths LSP2 also needs the bandwidth of 1 unit, and R10-R11-R12-R13-R14-R15 is the operating path of LSP2, and R12-R8-R9-R14 is the protection path of protection node R 13.According to the definition in the rfc4090 agreement, we need R2-R7, R7-R8, and R8-R9, R9-R5, R12-R8, R8-R9, R9-R14 need to reserve the bandwidth of 7 units altogether.And when protecting the foundation in path and resource shared according to the method that the embodiment of the invention provides; R8-R9 does not need to reserve the bandwidth of 2 units; the reservation that 1 unit bandwidth is just arranged is unnecessary; because the inefficacy of R3 and R13 separates; under the situation of single inefficacy; R3 and R13 can not break down simultaneously, so the reserved resource between energy R8-R9 can be shared.Therefore, the bandwidth of 6 units is reserved and protects among the LSP1 R13 node in the R3 node and LSP2 altogether.
Therefore the method that provides of the embodiment of the invention; both kept original local quick heavy-route characteristic of repairing; again on the basis of original technology; expanded necessary function; make in the network protection path in different operating path carry out resource-sharing and become possibility, under the prerequisite that guarantees network reliability, reduced total number of resources that the protection path need be reserved in the network; save the network bandwidth, improved the resource utilization of network.
Be the method that realizes that the embodiment of the invention provides, the embodiment of the invention also provides a kind of resource shared device, as shown in Figure 7, comprising:
First judge module 710 is used to judge whether the protection path that desire is set up overlaps with the protection path of having set up;
Second judge module 720 is used for judged result when described first judge module 710 and attaches most importance to fashionablely, judges whether link and/or the node protected in protection path that described desire sets up and the described protection path of having set up be identical;
Sharing module 730 is used for sharing protection path and the described resource of protecting the path of having set up that described desire is set up when the judged result of described second judge module 720 when being inequality.
On the basis of the foregoing description, as shown in Figure 8, above-mentioned second judge module 720 comprises:
Obtain submodule 7201, be used for judged result when described first judge module 710 and attach most importance to fashionablely, obtain the protected object that described PATH carries;
Comparer module 7202 is used for obtaining protected object that PATH that submodule obtains carries and the protected object of preservation is compared with described;
Notice submodule 7203 is used for notifying described sharing module shared resource when the comparison result of described comparer module 7202 when being inequality.
This node also comprises:
Receiver module 740 is used to receive the PATH that is used to set up the protection path;
The 3rd judge module 750 is used to judge whether the protection path of desire foundation is identical with the claimed operating path of having set up in protection path, if different, trigger first judge module 710 and judges whether the protection path of desire foundation overlaps with the protection path of having set up.
Certainly the node that provides of the embodiment of the invention can also comprise: storage device is used to store the relevant information of having set up the protection path, as route display object etc.
The embodiment of the invention also provides a kind of system of resource-sharing, comprising: first node and Section Point;
First node is used to send the PATH that is used for setting up the protection path;
Section Point is used to receive described PATH, judges according to described PATH whether the protection path that desire is set up overlaps with the protection path of having set up; When protection path that described desire is set up during, judge whether link and/or the node protected in the protection path of described desire foundation and the protection path of having set up be identical with the described protection paths merge of having set up; When link of being protected when protection path that described desire is set up and the protection path of having set up and/or node are inequality, share protection path and the described resource of protecting the path of having set up that described desire is set up.
Above-mentioned Section Point comprises:
First judge module is used to judge whether the protection path that desire is set up overlaps with the protection path of having set up;
Second judge module is used for judged result when described first judge module and attaches most importance to fashionablely, judges whether link and/or the node protected in protection path that described desire sets up and the described protection path of having set up be identical;
Sharing module is used for sharing protection path and the described resource of protecting the path of having set up that described desire is set up when the judged result of described second judge module when being inequality.
Above-mentioned second judge module comprises:
Obtain submodule, be used for judged result when described first judge module and attach most importance to fashionablely, obtain the protected object that described PATH carries;
The comparer module is used for obtaining protected object that PATH that submodule obtains carries and the protected object of preservation is compared with described;
The notice submodule is used for notifying described sharing module shared resource when the comparison result of described comparer module when being inequality.
The methods, devices and systems of the resource-sharing that provides by the embodiment of the invention; the object that node on the protection path carries by the protection path path message that compares the different operating path; judge whether to carry out resource-sharing, finally realize the resource-sharing in the protection path in different operating path.When realizing method that the embodiment of the invention provides, whole agreement is not made amendment, do not change the flow process and the operation of agreement yet, thereby do not increase the complexity of protocol processes.Each node only need be preserved a little simple information and these information are judged the judgement that just can realize resource-sharing, does not increase the difficulty and the complexity of node processing.
Through the above description of the embodiments, those skilled in the art can be well understood to the present invention and can realize by hardware, also can realize by the mode that software adds necessary general hardware platform.Based on such understanding, technical scheme of the present invention can embody with the form of software product, it (can be CD-ROM that this software product can be stored in a non-volatile memory medium, USB flash disk, portable hard drive etc.) in, comprise some instructions with so that computer equipment (can be personal computer, server, the perhaps network equipment etc.) carry out the described method of each embodiment of the present invention.
More than disclosed only be several specific embodiment of the present invention, still, the present invention is not limited thereto, any those skilled in the art can think variation all should fall into protection scope of the present invention.

Claims (13)

1. the method for a resource-sharing is characterized in that, comprising:
Reception is used to set up the PATH in protection path, judges according to described PATH whether the protection path that desire is set up overlaps with the protection path of having set up;
When protection path that described desire is set up during, judge whether link and/or the node protected in the protection path of described desire foundation and the protection path of having set up be identical with the described protection paths merge of having set up;
When link of being protected when protection path that described desire is set up and the protection path of having set up and/or node are inequality, share protection path and the described resource of protecting the path of having set up that described desire is set up.
2. the method for claim 1 is characterized in that, described judge protection path that desire sets up and whether the protection path of having set up overlap before, also comprise:
Whether the protection path of judging described desire foundation is different with the described claimed operating path of having set up in protection path, if different, continues then to judge whether the protection path that desire is set up overlaps with the protection path of having set up.
3. method as claimed in claim 2 is characterized in that, whether the described protection path of judging that described desire sets up is different with the described claimed operating path of having set up in protection path, comprising:
RX path message, the identity object information that described PATH is carried and the identity object information of preservation are compared, if inequality, then the protection path set up of desire is different with the claimed operating path of having set up in protection path; Described identity object information comprises: session object information and transmit leg template object information.
4. the method for claim 1 is characterized in that, whether the described protection path of judging that desire is set up overlaps with the protection path of having set up, comprising:
According to the route display object that described PATH carries, obtain the next-hop node that described PATH is transferred in advance, and with the route display object of setting up the protection path of preserving in next-hop node compare.
5. the method for claim 1 is characterized in that, describedly judges whether link and/or the node protected in protection path that described desire is set up and the protection path of having set up be identical, comprising:
The protected object that carries according to described PATH, link and/or node that link that the protection path that described desire is set up is protected and/or node and the protection path of having set up are protected are compared.
6. method as claimed in claim 5 is characterized in that, describedly judges whether link and/or the node protected in protection path that described desire is set up and the protection path of having set up be identical, comprising:
Identification field in the protected object that carries according to described PATH, obtaining described desire, to set up the object of protecting in the protection path be node or link or node and link;
First node field in the protected object that carries according to described PATH is obtained the first node that described desire is set up the protection path;
Next-hop node field in the protected object that carries according to described PATH is obtained the next-hop node that described desire is set up the first node of protection operating path that the path is protected;
Interface field in the protected object that carries according to described PATH is obtained described desire and is set up the first node in protection path and by which interface links to each other with the operating path next-hop node;
The information of obtaining according to described identification field, first node field, next-hop node field and interface field; determine link and/or node that protection path that described desire is set up is protected, and compare with link and/or node that the protection path of having set up is protected.
7. the method for claim 1 is characterized in that, described protection path and the described resource of having set up the protection path of sharing described desire foundation comprises:
The resource that the protection path that described PATH desire is set up needs compares with the protection path reserved resource of having set up;
If be not more than the described protection path reserved resource of having set up, then share described reserved resource, use the described described reserved resource foundation protection path of sharing;
If greater than the described protection path reserved resource of having set up, then send the message of carrying reserved resource information to downstream node, treat downstream node reply the information of resource is provided after, carry out resource-sharing with established path.
8. the device of a resource-sharing is characterized in that, comprising:
First judge module is used to judge whether the protection path that desire is set up overlaps with the protection path of having set up;
Second judge module is used for judged result when described first judge module and attaches most importance to fashionablely, judges whether link and/or the node protected in protection path that described desire sets up and the described protection path of having set up be identical;
Sharing module is used for sharing protection path and the described resource of protecting the path of having set up that described desire is set up when the judged result of described second judge module when being inequality.
9. device as claimed in claim 8 is characterized in that, also comprises:
Receiver module is used to receive the PATH that is used to set up the protection path;
The 3rd judge module is used to judge whether the protection path of desire foundation is identical with the claimed operating path of having set up in protection path, if different, trigger described first judge module and judges whether the protection path of desire foundation overlaps with the protection path of having set up.
10. install as claimed in claim 8 or 9, it is characterized in that described second judge module comprises:
Obtain submodule, be used for judged result when described first judge module and attach most importance to fashionablely, obtain the protected object that described PATH carries;
The comparer module is used for obtaining protected object that PATH that submodule obtains carries and the protected object of preservation is compared with described;
The notice submodule is used for notifying described sharing module shared resource when the comparison result of described comparer module when being inequality.
11. the system of a resource-sharing is characterized in that, comprising: first node and Section Point;
Described first node is used to send the PATH that is used for setting up the protection path;
Described Section Point is used to receive described PATH, judges according to described PATH whether the protection path that desire is set up overlaps with the protection path of having set up; When protection path that described desire is set up during, judge whether link and/or the node protected in the protection path of described desire foundation and the protection path of having set up be identical with the described protection paths merge of having set up; When link of being protected when protection path that described desire is set up and the protection path of having set up and/or node are inequality, share protection path and the described resource of protecting the path of having set up that described desire is set up.
12. system as claimed in claim 11 is characterized in that, described Section Point comprises:
First judge module is used to judge whether the protection path that desire is set up overlaps with the protection path of having set up;
Second judge module is used for judged result when described first judge module and attaches most importance to fashionablely, judges whether link and/or the node protected in protection path that described desire sets up and the described protection path of having set up be identical;
Sharing module is used for sharing protection path and the described resource of protecting the path of having set up that described desire is set up when the judged result of described second judge module when being inequality.
13. system as claimed in claim 12 is characterized in that, described second judge module comprises:
Obtain submodule, be used for judged result when described first judge module and attach most importance to fashionablely, obtain the protected object that described PATH carries;
The comparer module is used for obtaining protected object that PATH that submodule obtains carries and the protected object of preservation is compared with described;
The notice submodule is used for notifying described sharing module shared resource when the comparison result of described comparer module when being inequality.
CN200810180103A 2008-12-01 2008-12-01 Method, device and system for sharing resources Pending CN101753409A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200810180103A CN101753409A (en) 2008-12-01 2008-12-01 Method, device and system for sharing resources

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200810180103A CN101753409A (en) 2008-12-01 2008-12-01 Method, device and system for sharing resources

Publications (1)

Publication Number Publication Date
CN101753409A true CN101753409A (en) 2010-06-23

Family

ID=42479842

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200810180103A Pending CN101753409A (en) 2008-12-01 2008-12-01 Method, device and system for sharing resources

Country Status (1)

Country Link
CN (1) CN101753409A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297259A (en) * 2012-02-29 2013-09-11 中兴通讯股份有限公司 Method and device for protecting point-to-multipoint multicast service
CN103490998A (en) * 2013-09-09 2014-01-01 杭州华三通信技术有限公司 Protection tunnel building method and device and flow switching method and device
WO2015172629A1 (en) * 2014-05-15 2015-11-19 华为技术有限公司 Message transmission method, apparatus and system
CN105515971A (en) * 2014-10-14 2016-04-20 中兴通讯股份有限公司 Achievement method and device of layered Qos scheduling of resource reuse
WO2016065747A1 (en) * 2014-10-28 2016-05-06 中兴通讯股份有限公司 Method and apparatus for identifying lsp reaggregation in p2mp
CN110138444A (en) * 2019-03-26 2019-08-16 中国人民武装警察部队工程大学 A kind of shared guard method of the multi-area optical network dynamic multicast based on fuzzy game
WO2021190256A1 (en) * 2020-03-26 2021-09-30 华为技术有限公司 Restoration path configuration method and apparatus

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297259A (en) * 2012-02-29 2013-09-11 中兴通讯股份有限公司 Method and device for protecting point-to-multipoint multicast service
CN103297259B (en) * 2012-02-29 2018-07-06 中兴通讯股份有限公司 The guard method of point-to-multipoint multicast service and device
CN103490998A (en) * 2013-09-09 2014-01-01 杭州华三通信技术有限公司 Protection tunnel building method and device and flow switching method and device
CN103490998B (en) * 2013-09-09 2017-09-05 新华三技术有限公司 Protection path method for building up and device, flow switch method and device
WO2015172629A1 (en) * 2014-05-15 2015-11-19 华为技术有限公司 Message transmission method, apparatus and system
CN105515971A (en) * 2014-10-14 2016-04-20 中兴通讯股份有限公司 Achievement method and device of layered Qos scheduling of resource reuse
CN105515971B (en) * 2014-10-14 2019-11-05 中兴通讯股份有限公司 A kind of implementation method and device of the layering Qos scheduling of resource multiplex
WO2016065747A1 (en) * 2014-10-28 2016-05-06 中兴通讯股份有限公司 Method and apparatus for identifying lsp reaggregation in p2mp
CN105634948A (en) * 2014-10-28 2016-06-01 中兴通讯股份有限公司 LSP reconvergence identification method and LSP reconvergence identification device in P2MP
CN105634948B (en) * 2014-10-28 2020-04-10 中兴通讯股份有限公司 LSP reconvergence identification method and device in P2MP
CN110138444A (en) * 2019-03-26 2019-08-16 中国人民武装警察部队工程大学 A kind of shared guard method of the multi-area optical network dynamic multicast based on fuzzy game
WO2021190256A1 (en) * 2020-03-26 2021-09-30 华为技术有限公司 Restoration path configuration method and apparatus

Similar Documents

Publication Publication Date Title
EP1512250B1 (en) Distinguishing between link and node failure to facilitate fast reroute
CN102123097B (en) Method and device for protecting router
EP2761829B1 (en) Point-to-point based multicast label distribution protocol local protection solution
CN101753409A (en) Method, device and system for sharing resources
US8988982B2 (en) Method and apparatus for protection switching in point-to-multipoint network
US20090219806A1 (en) Method, apparatus, and system for protecting head node of point to multipoint label switched path
CN101599859B (en) Method, system and nodes for protecting two-way tunnel
CN101316225A (en) Fault detection method, communication system and label exchange router
CN101547155A (en) Master and standby tunnel load sharing method and flow forwarding equipment
EP2254289B1 (en) Method, device, and system for establishing label switching path in fast rerouting switching
CN104702480A (en) Method and device for establishing tunnel protection group in next generation multicast virtual private network
CN104468208A (en) Detection and recovery method and device for communication faults
Hariyawan Comparison analysis of recovery mechanism at MPLS network
JP2017034463A (en) Protection method, communication system, and end node
CN101192990A (en) A method and device and system for quick rerouting in MPLS network
CN101374106A (en) Method for forwarding data packet on MPLS LSP, network node and system
CN113615132A (en) Fast flooding topology protection
JP2006033124A (en) Tunnel fault notification device and method
CN106161232B (en) tunnel protection switching method and device
CN101656572B (en) Method for realizing permanent shared restoration in ASON network
CN102769552A (en) Method and apparatus for transmitting BFD (bidirectional forwarding detection) message during LSP (label switched path) detection by BFD
CN104717143A (en) Method and equipment for many-one reducibility scene multicast data transmission
CN102571534B (en) Service transmission method based on ring network protection and node used for service transmission
CN102571449A (en) Link switching method and device
CN111901181A (en) Processing method for error rate detection and related equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20100623