CN101888323A - Ethernet ring network-based PBB-TE protection method - Google Patents
Ethernet ring network-based PBB-TE protection method Download PDFInfo
- Publication number
- CN101888323A CN101888323A CN2010102304624A CN201010230462A CN101888323A CN 101888323 A CN101888323 A CN 101888323A CN 2010102304624 A CN2010102304624 A CN 2010102304624A CN 201010230462 A CN201010230462 A CN 201010230462A CN 101888323 A CN101888323 A CN 101888323A
- Authority
- CN
- China
- Prior art keywords
- node
- ring
- data message
- loopback
- pbb
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Small-Scale Networks (AREA)
Abstract
The invention discloses an Ethernet ring network-based PBB-TE protection method, which comprises the following steps of: quickly recovering communication by utilizing wrap data messages; and triggering the switching of main and backup links by utilizing the wrap data messages. The method solves the problem of expandability of the application of the PBB-TE technology on the ring network, reduces network resources occupied by the CCM messages, and simultaneously avoids momentary interruption of the communication during switching the chains.
Description
Technical field
The present invention relates to network communications technology field, relate in particular to a kind of PBB-TE guard method based on ethernet ring network.
Background technology
Along with CE (Carrier Ethernet, the carrier class Ethernet) proposition of notion, satisfy the communication network demand, connection-oriented ethernet technology---PBT (Provider Backbone Transport, operator backbone transmits) also emerges in October, 2005.After this, all there is operator to adopt the networking of PBT technology both at home and abroad, for the development of PBT technology in metropolitan area network provides the good beginning.
The basis of PBT technology is PBB (the Provider Backbone Bridge of IEEE 802.1ah definition, the operator backbone bridge joint) technology, IEEE calls PBB-TE (Provider Backbone Bridge Traffic Engineering, the operator backbone bridging technology of support traffic engineering) to the PBT technology.The PBB-TE technology is based on the PBB technology, its core is that the PBB technology is improved, the source device of CE inserts B-DA (Backbone Destination MAC Address at the head of message, the backbone network target MAC (Media Access Control) address), B-SA (Backbone Destination MAC Address, the source MAC of backbone network), B-VLAN (Backbone VLAN, the backbone network VLAN) and I-TAG (Service Instance TAG, Service Instance mark).The source device of CE and the forward-path between the destination device are static configuration in advance, and middle CE equipment can be transmitted the forward efficiency height based on B-DA in transmitting and B-VID to Frame.
In order to make Ethernet reach telecommunications rank standard, PBB-TE adopts resist technology usually.Figure 1 shows that the schematic diagram of the end-to-end linear protection in Ethernet tunnel in the prior art, wherein, the end-to-end main tunnel of certain traffic engineering Service Instance be TN1:PE1 ← → P1 ← → P2 ← → P3 ← → PE2, PE1 and PE2 are the end of this tunnel example.TN2:PE1 ← → P5 ← → P6 ← → PE2 is the end-to-end backup tunnel of this traffic engineering Service Instance, in order to distinguish above-mentioned main tunnel TN1 and backup tunnel TN2, is that main tunnel TN1 specifies B-VLAN1 when pre-configured, over run tunnel TN2 specifies B-VLAN2.When end-to-end main tunnel TN1 breaks down, data flow can be switched on the backup tunnel TN2.
PBB-TE adopts CFM (Connectivity Fault Management, the connectivity fault management) mechanism among the IEEE 802.1ag to come tunnel state in the monitoring network constantly.When leading, can transfer to business automatically on the backup path of setting up in advance, realize the protecting tunnel technology with tunnel failure.
In the prior art, by in the tunnel, sending the connectedness that CCM (Continuity Check Message, the connectivity check messages that defines among the IEEE 802.1ag) detects the tunnel.As shown in Figure 2, send CCM mutually along main tunnel TN1 and backup tunnel TN2 respectively between endpoint of a tunnel PE1 and the PE2, the CCM of main tunnel and backup tunnel encapsulates B-VLAN1 and B-VLAN2 respectively.This method has realized the complete trails protection in tunnel.
Though conventional method can realize excellent protection to tunnel path, there is the bad shortcoming of autgmentability, particularly when a ring was shared in a large amount of tunnels, it is more serious that problem can become.Main problem has two aspects, is respectively: 1) two of active/standby tunnel end points will send corresponding C CM message respectively on principal piece and backup segment, and these CCM streams overlap mutually, have taken a large amount of Internet resources.2) communication disruption of moment can take place in link when switching.Be the ring protection link as shown in Figure 3: the link<A on the ring, F 〉, node A is a Control Node.Each Ethernet switching node has connected 10000 subnets on the ring; for the data flow to any two subnets is carried out segment protect; need to send mutually the CCM message between any two nodes on the ring, the path of these CCM messages overlaps mutually, causes Internet resources to be wasted in a large number.
In order to set forth the utilization of the present invention on looped network, we at first introduce the transmission of data flow on looped network of PBB-TE.On looped network, each ring is gone up node and the PBB-TE data message of transmitting on ring is not carried out static configuration is transmitted, only to last ring and down the PBB-TE data message of ring be configured forwarding entry.When the last node of ring is received the data message of PBB-TE, use B-DA and B-VID (ID of B-VLAN number) in the described message to table look-up, if in transmitting, do not find relevant forwarding entry, this node is transmitted described data message (promptly in the multicast mode, this data message is forwarded from another ring upper port), otherwise the PBB-TE data message is forwarded from the port that is searched.
As shown in Figure 4, Node B receives that B0 is behind the data message p that subnet D0 sends, utilization<B, VLAN4, D〉data message P encapsulated (data message after the encapsulation will be designated<B, VLAN4, D〉the tunnel on transmit), utilization<VLAN4 then, D〉to search addresses forwarding table and obtain outbound port b1, Node B forwards PBB-TE data message P from outbound port b1; After node C receives data message P from the c2 port, utilization<VLAN4, D〉search addresses forwarding table, owing to do not find relative transferring item, node C directly forwards data message P from the c1 port; After node D receives data message P from the d2 port, the B-DA that finds PBB-TE data message P head is the MAC Address of node itself, node D peels off the head of PBB-TE data message P in the encapsulation of last ring place, restore data message p utilizes prior art that data message p is forwarded from following central port d3 then.
Summary of the invention
The present invention seeks to provides a kind of PBB-TE guard method based on ethernet ring network at the defective that prior art exists.
The present invention adopts following technical scheme for achieving the above object:
A kind of PBB-TE guard method based on ethernet ring network of the present invention is characterized in that comprising the steps:
1) at first utilizes the fast quick-recovery communication of data message of loopback;
2) utilize loopback (wrap) data message to trigger switching of main/slave link, specific as follows:
When the ring upper port blocking data message of node is transmitted constantly, it is unactivated state that node transfers the forwarding entry of this port blocked association to stand-by state, activates the forwarding entry with their pairings simultaneously, and the forwarding entry that is about to pairing transfers operating state to;
Go up node when ring and receive that the data message of common PBB-TE is that the value of the loopback label L P among the I-SID in the message is 0, if outer B-DA is the MAC Address of this node, node descends the ring operation to this message on the ring, otherwise utilize the B-DA of described data message head and B-VID in transmitting, to table look-up, be divided into following three kinds of situations and handle:
(a) if the forwarding entry of finding changes stand-by state into, described data message will be changed to 1 by the loopback label L P among the I-SID of the data message of loopback by loopback;
(b) if this node does not find relative transferring item in transmitting, so described data message will be changed to 1 by the loopback label L P among the I-SID of the data message of loopback by loopback;
(c) if the outbound port of finding is the ring upper port of unblock, this node is not done any processing to transmitting;
When ring is gone up the ring upper port generation obstruction of node, if this node is received the data message (value of the loopback label L P among the I-SID in the message is 1) of the PBB-TE of loopback, if outer B-DA is the MAC Address of this node, node descends the ring operation (to adopt prior art-802.1Qay to this message, the present invention does not do narration), otherwise utilize the B-DA of described data message head and B-VID in transmitting, to table look-up, be divided into following two kinds of situations and handle:
(A) do not find the outbound port of message in transmitting, this node abandons the data message of described loopback;
(B) if the forwarding entry of finding changes stand-by state into, this node abandons the data message of described loopback;
When ring is gone up node and is received the data message of PBB-TE of loopback, directly this message is forwarded from another ring upper port, copy is a for node analysis simultaneously.Then, node is at first analyzed B-DA, if outer B-DA is the MAC Address of this node, node descends the ring operation (to adopt prior art-802.1Qay to this message, the present invention does not do narration), otherwise utilize the B-DA of described data message head and B-VID in transmitting, to table look-up, be divided into following three kinds of situations and handle:
(1) if the outbound port of finding is the ring upper port that receives this message, it is unactivated state that node transfers this forwarding entry to stand-by state, activates the forwarding entry with its pairing simultaneously.
(2) if the outbound port of finding is another ring upper port, this node is not done any processing to transmitting.
(3) if do not find relative transferring item, this node is not done any processing to transmitting.
The related definition explanation:
The pairing forwarding entry: the pairing forwarding entry mainly is used for selecting active/standby tunnel by node on the ring at PBB-TE tunnel portal place.It contains 2 forwarding entrys, wherein has only one to be in operating state (perhaps claiming state of activation).It is all inequality that the B-VID of two forwarding entrys of pairing and ring are gone up outbound port.
Preferably, when ring was gone up node and received the data message of common PBB-TE, this ring was gone up node and is contained upward port blocked of ring.
Preferably, when ring was gone up node and received the data message of PBB-TE of loopback, this ring was gone up the ring upper port that node not have obstruction.
Preferably, described pairing forwarding entry is used for selecting active/standby tunnel by node on the ring at PBB-TE tunnel portal place, contain 2 forwarding entrys, wherein have only one to be in operating state or to claim state of activation, it is all inequality that the B-VID of two forwarding entrys of pairing and ring are gone up outbound port.
Beneficial effect:
Core content of the present invention is to utilize loopback (wrap) data message to trigger switching of main/slave link, solved the Application Expansion of PBB-TE technology on looped network, the Internet resources that the CCM message takies have been reduced, the instantaneous interruption that communication occurs when also having avoided link switchover simultaneously.
Description of drawings
Fig. 1 and Fig. 2 are PBB-TE protecting tunnel schematic diagrams end to end;
Fig. 3 is the schematic diagram that the user inserts looped network;
Fig. 4 is the schematic diagram that the PBB-TE data are transmitted on looped network;
Fig. 5 and Fig. 6 are workflow diagrams of the present invention;
Fig. 7 and Fig. 8 are an example of the present invention schematic diagrames.
Embodiment
Core content of the present invention is: 1) at first utilize the fast quick-recovery communication of data message of loopback.2) utilize loopback (wrap) data message to trigger switching of main/slave link.For realizing this thought, this invention must realize following function:
Transmit constantly when the ring upper port blocking data message of node, node transfers the forwarding entry of this port blocked association to stand-by state (unactivated state), activates the forwarding entry (that is, the forwarding entry with pairing transfers operating state to) with they pairings simultaneously.
When node (contain ring go up port blocked) is received the data message (value of the loopback label L P among the I-SID in the message is 0) of common PBB-TE, if outer B-DA is the MAC Address of this node, node descends the ring operation (to adopt prior art-802.1Qay to this message, the present invention does not do narration), otherwise utilize the B-DA of described data message head and B-VID in transmitting, to table look-up.Divide 3 kinds of situations to handle:
● if the forwarding entry of finding changes stand-by state into, and described data message will be changed to 1 by the loopback label L P among the I-SID of the data message of loopback by loopback.
● if this node does not find relative transferring item in transmitting, so described data message will be changed to 1 by the loopback label L P among the I-SID of the data message of loopback by loopback.
● if the outbound port of finding is the ring upper port of unblock, and this node is not done any processing to transmitting.When ring is gone up the ring upper port generation obstruction of node, if this node is received the data message (value of the loopback label L P among the I-SID in the message is 1) of the PBB-TE of loopback, if outer B-DA is the MAC Address of this node, node descends the ring operation (to adopt prior art-802.1Qay to this message, the present invention does not do narration), otherwise utilize the B-DA of described data message head and B-VID in transmitting, to table look-up.Divide 2 kinds of situations to handle:
● do not find the outbound port of message in transmitting, this node abandons the data message of described loopback.
● if the forwarding entry of finding changes stand-by state into, and this node abandons the data message of described loopback.
When ring is gone up node (not have block ring upper port) and is received the data message of PBB-TE of loopback, directly this message is forwarded from another ring upper port, copy is a simultaneously supplies node analysis.Then, node is at first analyzed B-DA, if outer B-DA is the MAC Address of this node, node descends the ring operation (to adopt prior art-802.1Qay to this message, the present invention does not do narration), otherwise utilize the B-DA of described data message head and B-VID in transmitting, to table look-up.Divide 3 kinds of situations to handle::
● if the outbound port of finding is the ring upper port that receives this message, and node transfers this forwarding entry to stand-by state (unactivated state), activates the forwarding entry with its pairing simultaneously.
● if the outbound port of finding is another ring upper port, and this node is not done any processing to transmitting.
● if do not find relative transferring item, this node is not done any processing to transmitting.
The related definition explanation:
The pairing forwarding entry: the pairing forwarding entry mainly is used for selecting active/standby tunnel by node on the ring at PBB-TE tunnel portal place.It contains 2 forwarding entrys, wherein has only one to be in operating state (perhaps claiming state of activation).It is all inequality that the B-VID of two forwarding entrys of pairing and ring are gone up outbound port.
In order to further specify the solution of the present invention, shown in step of the present invention was described below, Fig. 5 contained the flow chart of data processing figure that ring is gone up the node of port blocked.Fig. 6 does not comprise the flow chart of data processing figure that ring is gone up the node of port blocked.It needs to be noted, for outstanding description to the present invention program, the present invention to the common Ethernet data message of complexity carry out go up ring operation (being packaged into the PBB-TE data message) and down ring operate (being descapsulated into common Ethernet data message) and do not do narration.
The flow chart description of Fig. 5 is as follows:
Whether step 501, predicate node contain ring is gone up port blocked.Go up port blocked if contain ring, change step 502 over to.
Step 508 abandons described data message.
Step 509 abandons described data message.
The flow chart description of Fig. 6 is as follows:
Whether step 601, predicate node contain ring is gone up port blocked.Do not go up port blocked if do not comprise ring, change step 602 over to.
Step 604 judges whether it is the PBB-TE data message (that is, whether the LP field of I-SID is 1) of loopback.If change step 605 over to, otherwise change step 610 over to.
Step 605, this node directly forward described loopback message from another ring upper port, copy is a for described node analysis simultaneously.Then, node utilizes the B-DA of described data message head and B-VID to table look-up in transmitting.
Whether step 611, judging has relative transferring item in transmitting.If have, change step 612 over to, otherwise change step 613 over to.
Embodiment one
As shown in Figure 9, the node that looped network comprises has A, B, C, D, E and F, and the link that comprises has<A, B 〉,<B, C 〉,<C, D 〉,<D, E 〉,<E, F〉and<F, A〉link.Node A is a Control Node, with its a2 direct port connection link<F, A〉be the ring protection link, the a2 port of node A blocking data message forwarding under the looped network normal condition.Node A, B and D have been connected node on 10000 subnet rings respectively, and sending datagram to subnet D0 by the tunnel on the looped network with subnet B0 below is that example illustrates specific implementation process of the present invention
Under the looped network non-failure conditions, Control Node A blocks the data message forwarding function of its a2 port.Node B receives that B0 is behind the data message p that subnet D0 sends, utilization<B, VLAN4, D〉data message P encapsulated (data message after the encapsulation will be designated<B, VLAN4, D〉the tunnel on transmit), utilization<VLAN4 then, D〉to search addresses forwarding table and obtain outbound port b1, Node B forwards PBB-TE data message P from outbound port b1; After node C receives data message P from the c2 port, utilization<VLAN4, D〉search addresses forwarding table, owing to do not find relative transferring item, node C directly forwards data message P from the c1 port; After node D receives data message P from the d2 port, the B-DA that finds PBB-TE data message P head is the MAC Address of node itself, node D peels off the head of PBB-TE data message P in the encapsulation of last ring place, restore data message p utilizes prior art that data message p is forwarded from following central port d3 then.Therefore, subnet B0 to the send datagram path of p of subnet D0 is:
B0→B→C→D→D0
(wherein, B → C → D is<B VLAN4, D〉tunnel)
As<C, D〉fault taken place in link, and node C blocks the forwarding capability of the data message of c1 port, and outwards periodically sends SF message (fault warning message) along the c2 port; Node D blocks the forwarding capability of the data message of d1 port, and outwards periodically send the SF message along the d2 port, the forwarding entry of the d2 port association that node D also will block transfers stand-by state (unactivated state) to, activate forwarding entry (that is, the forwarding entry with pairing transfers operating state to) simultaneously with their pairings.
After Control Node A receives the SF message, open the data message forwarding function of a2 port.
When node C received PBB-TE data message P on VLAN4, node C utilized the VLAN4 of P head and MAC Address D to table look-up, and did not have to find relevant forwarding entry, and node C is with P data message loopback, and the LP with the I-SID in the message puts 1 simultaneously.
When Node B was received from the data message P of node C loopback, discovery was looping back data message (LP=1), in the multicast mode this message another ring upper port from it was forwarded, and copy is a for node analysis simultaneously.Node B is tabled look-up with the VLAN4 and the MAC Address D of P head, finds that outbound port b1 is identical with the port that receives the P data message, and Node B is with forwarding entry [D, VLAN4, b1] transfer stand-by state (unactivated state) to, simultaneously with the forwarding entry [D of correspondence, VLAN5, b2] transfer state of activation to.
When node A received data message P, discovery was looping back data message (LP=1), in the multicast mode this message another ring upper port from it was forwarded, and copy is a for node analysis simultaneously.Node A tables look-up with the VLAN4 and the MAC Address D of P head, finds that outbound port a1 is identical with the port that receives the P data message, and node A is with forwarding entry [D, VLAN4, a1] transfer stand-by state (unactivated state) to, simultaneously with the forwarding entry [D of correspondence, VLAN5, a2] transfer state of activation to.
When node F (E) received the data message P1 of loopback, discovery was the data message (LP=1) of loopback, in the multicast mode this message another ring upper port from them was forwarded, and copy is a for node analysis simultaneously.Node B (A) is tabled look-up with P head VLAN4 and MAC Address D, does not find relative transferring item, and Node B (A) is left intact to forwarding entry corresponding in transmitting.
After node D receives data message P from the d1 port, the B-DA that finds PBB-TE data message P head is the MAC Address of node itself, node D peels off the head of PBB-TE data message P in the encapsulation of last ring place, restore data message p utilizes prior art that data message p is forwarded from following central port d3 then.
Therefore, subnet B0 to the path that subnet D0 sends datagram is subsequently:
B0→B→A→F→E→D→D0
(wherein, B → A → F → E → D is<B VLAN5, D〉tunnel)
By top analysis, the present invention has solved the difficulty that runs into when traditional segment protect scheme is used well on looped network, has greatly improved the performance of PBB-TE looped network
Certainly; the present invention also can have other various embodiments; under the situation that does not deviate from spirit of the present invention and essence thereof; those of ordinary skill in the art can make various corresponding changes and distortion according to the present invention, but these corresponding changes and distortion all should belong to the protection range of the appended claim of the present invention.
Claims (4)
1. the PBB-TE guard method based on ethernet ring network is characterized in that comprising the steps:
1) at first utilizes the fast quick-recovery communication of data message of loopback;
2) utilize loopback (wrap) data message to trigger switching of main/slave link, specific as follows:
When the ring upper port blocking data message of node is transmitted constantly, it is unactivated state that node transfers the forwarding entry of this port blocked association to stand-by state, activates the forwarding entry with their pairings simultaneously, and the forwarding entry that is about to pairing transfers operating state to;
Go up node when ring and receive that the data message of common PBB-TE is that the value of the loopback label L P among the I-SID in the message is 0, if outer B-DA is the MAC Address of this node, node descends the ring operation to this message on the ring, otherwise utilize the B-DA of described data message head and B-VID in transmitting, to table look-up, be divided into following three kinds of situations and handle:
(a) if the forwarding entry of finding changes stand-by state into, described data message will be changed to 1 by the loopback label L P among the I-SID of the data message of loopback by loopback;
(b) if this node does not find relative transferring item in transmitting, so described data message will be changed to 1 by the loopback label L P among the I-SID of the data message of loopback by loopback;
(c) if the outbound port of finding is the ring upper port of unblock, this node is not done any processing to transmitting;
When ring is gone up the ring upper port generation obstruction of node, if this node is received the data message (value of the loopback label L P among the I-SID in the message is 1) of the PBB-TE of loopback, if outer B-DA is the MAC Address of this node, node descends the ring operation (to adopt prior art-802.1Qay to this message, the present invention does not do narration), otherwise utilize the B-DA of described data message head and B-VID in transmitting, to table look-up, be divided into following two kinds of situations and handle:
(A) do not find the outbound port of message in transmitting, this node abandons the data message of described loopback;
(B) if the forwarding entry of finding changes stand-by state into, this node abandons the data message of described loopback;
When ring is gone up node and is received the data message of PBB-TE of loopback, directly this message is forwarded from another ring upper port, copy is a for node analysis simultaneously.Then, node is at first analyzed B-DA, if outer B-DA is the MAC Address of this node, node descends the ring operation (to adopt prior art-802.1Qay to this message, the present invention does not do narration), otherwise utilize the B-DA of described data message head and B-VID in transmitting, to table look-up, be divided into following three kinds of situations and handle:
(1) if the outbound port of finding is the ring upper port that receives this message, it is unactivated state that node transfers this forwarding entry to stand-by state, activates the forwarding entry with its pairing simultaneously;
(2) if the outbound port of finding is another ring upper port, this node is not done any processing to transmitting;
(3) if do not find relative transferring item, this node is not done any processing to transmitting.
2. a kind of PBB-TE guard method based on ethernet ring network according to claim 1 is characterized in that this ring is gone up node and contained upward port blocked of ring when ring is gone up node and received the data message of common PBB-TE.
3. a kind of PBB-TE guard method based on ethernet ring network according to claim 1 is characterized in that this ring is gone up the ring upper port that node not have obstruction when ring is gone up node and received the data message of PBB-TE of loopback.
4. a kind of PBB-TE guard method according to claim 1 based on ethernet ring network; it is characterized in that described pairing forwarding entry is used for selecting active/standby tunnel by node on the ring at PBB-TE tunnel portal place; contain 2 forwarding entrys; wherein have only one to be in operating state or to claim state of activation, it is all inequality that the B-VID of two forwarding entrys of pairing and ring are gone up outbound port.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010102304624A CN101888323B (en) | 2010-07-19 | 2010-07-19 | Ethernet ring network-based PBB-TE protection method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010102304624A CN101888323B (en) | 2010-07-19 | 2010-07-19 | Ethernet ring network-based PBB-TE protection method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101888323A true CN101888323A (en) | 2010-11-17 |
CN101888323B CN101888323B (en) | 2012-04-11 |
Family
ID=43074056
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2010102304624A Expired - Fee Related CN101888323B (en) | 2010-07-19 | 2010-07-19 | Ethernet ring network-based PBB-TE protection method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101888323B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102045230A (en) * | 2010-12-07 | 2011-05-04 | 中兴通讯股份有限公司 | Ethernet link protection switching method and device |
CN103546383A (en) * | 2013-11-08 | 2014-01-29 | 南车株洲电力机车研究所有限公司 | Redundancy transmission method, device and system for looped network |
CN103782552A (en) * | 2013-09-03 | 2014-05-07 | 华为技术有限公司 | Method for protecting service path, controller, device and system |
CN103795570A (en) * | 2014-01-23 | 2014-05-14 | 杭州华三通信技术有限公司 | Unicast message recovery method and device of stacking switch system with ring topology |
CN104579785A (en) * | 2015-01-19 | 2015-04-29 | 杭州华三通信技术有限公司 | Looped network protecting method and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101425953A (en) * | 2008-12-09 | 2009-05-06 | 中兴通讯股份有限公司 | Address updating method for Ether ring network and network node |
CN101662421A (en) * | 2008-08-28 | 2010-03-03 | 中兴通讯股份有限公司 | Method and device for transmitting control message based on ethernet multi-ring network |
CN101741673A (en) * | 2008-11-25 | 2010-06-16 | 中兴通讯股份有限公司 | Address refreshing method of Ethernet ring |
-
2010
- 2010-07-19 CN CN2010102304624A patent/CN101888323B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101662421A (en) * | 2008-08-28 | 2010-03-03 | 中兴通讯股份有限公司 | Method and device for transmitting control message based on ethernet multi-ring network |
CN101741673A (en) * | 2008-11-25 | 2010-06-16 | 中兴通讯股份有限公司 | Address refreshing method of Ethernet ring |
CN101425953A (en) * | 2008-12-09 | 2009-05-06 | 中兴通讯股份有限公司 | Address updating method for Ether ring network and network node |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102045230A (en) * | 2010-12-07 | 2011-05-04 | 中兴通讯股份有限公司 | Ethernet link protection switching method and device |
CN103782552A (en) * | 2013-09-03 | 2014-05-07 | 华为技术有限公司 | Method for protecting service path, controller, device and system |
WO2015032027A1 (en) * | 2013-09-03 | 2015-03-12 | 华为技术有限公司 | Method, controller, device and system for protecting service path |
CN103782552B (en) * | 2013-09-03 | 2016-10-12 | 华为技术有限公司 | The guard method of a kind of service path, controller, equipment and system |
US10659345B2 (en) | 2013-09-03 | 2020-05-19 | Huawei Technologies Co., Ltd. | Service path protection method, controller, device and system |
CN103546383A (en) * | 2013-11-08 | 2014-01-29 | 南车株洲电力机车研究所有限公司 | Redundancy transmission method, device and system for looped network |
CN103546383B (en) * | 2013-11-08 | 2015-08-05 | 南车株洲电力机车研究所有限公司 | Redundant transmission method, equipment and system on a kind of looped network |
CN103795570A (en) * | 2014-01-23 | 2014-05-14 | 杭州华三通信技术有限公司 | Unicast message recovery method and device of stacking switch system with ring topology |
CN103795570B (en) * | 2014-01-23 | 2018-05-08 | 新华三技术有限公司 | The unicast message restoration methods and device of the stacked switchboard system of ring topology |
CN104579785A (en) * | 2015-01-19 | 2015-04-29 | 杭州华三通信技术有限公司 | Looped network protecting method and device |
CN104579785B (en) * | 2015-01-19 | 2018-07-31 | 新华三技术有限公司 | A kind of looped network protecting method and device |
Also Published As
Publication number | Publication date |
---|---|
CN101888323B (en) | 2012-04-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8018841B2 (en) | Interworking an ethernet ring network and an ethernet network with traffic engineered trunks | |
CN102104520B (en) | Ring network protection method and device based on topology information | |
CN102571426B (en) | Double-homing protection method and device | |
CN102025541B (en) | Method and system for realizing multicast protection | |
US20080002570A1 (en) | Network redundancy method, and middle apparatus and upper apparatus for the network redundancy method | |
CN101997713A (en) | Method for realizing Ethernet path protection switching | |
CN101888323B (en) | Ethernet ring network-based PBB-TE protection method | |
CN101908983B (en) | Joint detection method and system for Ethernet local segment protection | |
CN101227399A (en) | Message transmission method, system and forwarding node | |
CN101989944B (en) | Method for local protection of Ethernet tunnel and shared node of protection domain working segment | |
CN101697525B (en) | Looped network based configuration and data transmission method and system of address forwarding table | |
CN102104519A (en) | Ring network restoring method and device based on topology information | |
CN101789903A (en) | Method, device and system for protecting semi-ring network | |
CN102104523B (en) | Data stream transmission method based on PBB-TE sectional tunnel, and node | |
CN104219073A (en) | Message forwarding method and device in SPBM network | |
CN101977141A (en) | MPLS-TP-based multicast protection method | |
CN101997728B (en) | A kind of checkout gear of Ethernet localised protection and method | |
WO2011020339A1 (en) | Method and system for switching in segment protection | |
CN101854265B (en) | Method and system for detecting local protection of Ethernet tunnel | |
CN102025585A (en) | Method and device for protecting Ethernet tunnel | |
CN101854266B (en) | Method and system for realizing detection based on MAC (Media Access Control) address and finish condition | |
CN102064998B (en) | Ethernet path protection switching method and system | |
CN101888339A (en) | MPLS-TP-based looped network steering protection method | |
CN102195794A (en) | Quick switching method and device for path protection of Ethernet | |
CN101945001A (en) | Network protection method and network protection framework |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20120411 Termination date: 20140719 |
|
EXPY | Termination of patent right or utility model |