CN101945001A - Network protection method and network protection framework - Google Patents

Network protection method and network protection framework Download PDF

Info

Publication number
CN101945001A
CN101945001A CN2009100892366A CN200910089236A CN101945001A CN 101945001 A CN101945001 A CN 101945001A CN 2009100892366 A CN2009100892366 A CN 2009100892366A CN 200910089236 A CN200910089236 A CN 200910089236A CN 101945001 A CN101945001 A CN 101945001A
Authority
CN
China
Prior art keywords
section
end points
main
bridge
dead
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2009100892366A
Other languages
Chinese (zh)
Inventor
敖婷
吴少勇
魏月华
王斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN2009100892366A priority Critical patent/CN101945001A/en
Publication of CN101945001A publication Critical patent/CN101945001A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention provides a network protection method and a network protection framework. Through a double-node protection mould of the invention, a part of networks needing to be protected on a provider backbone bridge traffic engineering (PBB-TE) tunnel which supports traffic engineering are provided with a protection domain consisting of a primary section and a standby section, so that a certain section and an end point bridge of a part of the PBB-TE tunnel are protected to the maximum extent. The PBB-TE segmented protection network framework provided by the invention realizes the partial segmented protection of the PBB-TE tunnel, protects a partial section needing to be protected and solves the problem that the entire Ethernet tunnel needs to be switched when a part fails. The method and the framework have the advantages of enhancing the utilization ratio and reliability of the network, achieving high flexibility on the protection of networking implementation and meeting common requirements during practical networking.

Description

A kind of network protection method and network protection framework
Technical field
The present invention relates to the network protection technology; especially refer to a kind of network protection method and network protection framework of promptly supporting the operator backbone bridging technology (PBB-TE, Provider Backbone Bridge TrafficEngineering) of traffic engineering based on Carrier-class Ethernet technology.
Background technology
Along with the proposition of carrier class Ethernet (CE, Carrier Ethernet) notion, satisfy the communication network demand, connection-oriented ethernet technology is that operator backbone transmission (PBT, Provider BackboneTransport) also is suggested in succession.
The PBT technology is a kind of connection-oriented Ethernet transmission technology, also claims to support the operator backbone bridging technology (PBB-TE, Provider Backbone Bridge Traffic Engineering) of traffic engineering.The PBB-TE technology is based on the PBB technology, its core is that the PBB technology is improved, the source device of CE inserts backbone network target MAC (Media Access Control) address (B-DA at the head of message, Backbone Destination MAC Address), the source MAC (B-SA of backbone network, Backbone Destination MAC Address), backbone network VLAN (B-VLAN, Backbone VLAN) and Service Instance mark (I-TAG, Service InstanceTAG).The source device of CE and the forward-path between the destination device are static configuration in advance, and middle CE equipment can be transmitted the forward efficiency height based on B-DA in transmitting and B-VID to Frame.
Proposition along with the notion of carrier-class Ethernet reaches telecommunications rank standard in order to make Ethernet, to the protection of Ethernet, switch and have higher requirement.In existing P BB-TE protection switching technique, what support at present is protection to flow Service Instance (TESI, Traffic Engineering Service Instance), promptly a kind of protecting tunnel end to end.Not only protection switch time is longer for existing network protection scheme end to end, and the node that involves is many, has lacked the protection to middle link and node.
Fig. 1 is the schematic diagram of the end-to-end protection of PBB-TE in the prior art; as shown in Figure 1; in case middle certain bar link or certain node break down; then must switch whole piece TESI; if have many TESI to pass through on this faulty link or the malfunctioning node, then can cause the switching of many TESI.That is to say; the object of protection of the end-to-end protection of PBB-TE is TESI, breaks down when detecting certain bar work TESI, then needs entering the user's message in this PBB-TE tunnel; adopt the head of another protection TESI correspondence to encapsulate again, allow this flow switch to protection PBB-TE tunnel.
For Ethernet; link, Node Protection are the parts of Ethernet protection; most network failure all is to appear on certain bar link or the node; adopt present end to end network protection scheme; the more important thing is can not realize to the intermediate line link in PBB-TE tunnel and node carry out separately protected; but must carry out full protecting tunnel, reduced the utilance and the reliability of network.
Summary of the invention
In view of this, main purpose of the present invention is to provide a kind of network protection method, can realize to the intermediate line link in PBB-TE tunnel and node carry out separately protected.
Another object of the present invention is to provide a kind of network protection framework, can realize to the intermediate line link in PBB-TE tunnel and node carry out separately protected.
For achieving the above object, technical scheme of the present invention is achieved in that
A kind of network protection method comprises:
For the subnetwork that needs protection on the operator backbone bridging technology PBB-TE tunnel of supporting traffic engineering, the protected field of being made up of with section and dead section main is set;
Detecting network work just often by state-detection, data traffic is transmitted main using on the section;
Main when breaking down on section when detecting by state-detection, with data traffic switch to be used to protect main with section dead section.
Described main with section and the only shared end points bridge of dead section, another end points bridge of described dead section is used to protect main another end points bridge with section.
Between another end points bridge of described shared end points bridge and dead section, between perhaps described shared end points bridge and main another end points bridge, form by a series of local area network (LAN) LAN and intervenient intermediate node bridge with section.
Utilize OAM mechanism to carry out described state-detection between described each end points bridge.
Described shared end points bridge carries out state-detection and comprises:
Described shared end points bridge is main with section and dead section transmission connectivity check messages CCM to its place respectively;
Judge when described shared end points and to receive within a certain period of time by main another end points bridge with section from a main CCM who sends with section, then data traffic according to the data trend of planning main with section on forwarding;
Judge when described shared end points bridge and not receive within a certain period of time that by main another end points bridge with section from a main CCM who sends with section, described shared end points bridge carries the remote failure indication information in sending to the CCM of dead section, at this moment,
If described shared end points bridge is judged and received the CCM that is sent from dead section by another end points bridge of dead section within a certain period of time, then described shared end points bridge changes outbound port, and data traffic is switched on the dead section;
If described shared end points bridge is judged and is not received the CCM that is sent from dead section by another end points bridge of dead section within a certain period of time, described shared end points bridge carries the remote failure indication information in sending to main CCM with section, and continues to send CCM to main section and the dead section used in its place.
Describedly comprise switching on the dead section of protected data flow in the protected field at its place:
Modification is subjected to the pairing clauses and subclauses of transmitting of traffic engineering Service Instance TESI of described protected field protection, and the outbound port in the respective entries is revised as described shared end points bridge corresponding port on dead section.
A kind of network protection framework for the subnetwork that needs protection on the operator backbone bridging technology PBB-TE tunnel of supporting traffic engineering, comprises the protected field of being made up of with section and dead section main;
Detecting network work just often by state-detection, data traffic is transmitted main using on the section;
Main when breaking down on section when detecting by state-detection, with data traffic switch to be used to protect main with section dead section.
Described main with section and the shared end points bridge of dead section, another end points of described dead section is used to protect main another end points bridge with section.
Between another end points bridge of described shared end points bridge and dead section, between perhaps described shared end points bridge and main another end points bridge, form by a series of local area network (LAN) LAN and intervenient intermediate node bridge with section.
The technical scheme that provides from the invention described above as can be seen; by binode protection model of the present invention; for the subnetwork that needs protection on the PBB-TE tunnel; setting has realized the protection to local some section and one the end points bridge in PBB-TE tunnel by the main protected field of forming with section and dead section maximum magnitude.The PBB-TE sectionalised protection network architecture provided by the invention has realized the local segmentation protection in tunnel, and the section of the part that needs protection is protected, and has avoided the problem that breaks down and need whole piece Ethernet tunnel to switch when local.Improved the utilance and the reliability of network, implemented to have suitable flexibility in the protection, the common demand when having satisfied actual networking in networking.
Description of drawings
Fig. 1 is the schematic diagram of the end-to-end protection of PBB-TE in the prior art;
Fig. 2 realizes the network architecture schematic diagram based on binode protection model of Ethernet tunnel segment protection for the present invention;
The flow of Fig. 3 during for the embodiment of network topology structure among the present invention and operate as normal moves towards schematic diagram;
Fig. 4 a moves towards schematic diagram for a certain section flow when breaking down in the embodiment shown in fig. 3;
Fig. 4 b is that the flow when another section breaks down in the embodiment shown in fig. 3 moves towards schematic diagram;
Fig. 4 c is in the embodiment shown in fig. 3, and the flow when the PIB node breaks down or A-B and B-C break down simultaneously moves towards schematic diagram;
Fig. 5 implements the schematic diagram of first network architecture embodiment of protection in the network topology structure of embodiment for the present invention's binode protection model shown in Figure 2;
Fig. 6 implements the schematic diagram of second network architecture embodiment of protection in the network topology structure of embodiment for the present invention's binode protection model shown in Figure 2;
Fig. 7 implements the schematic diagram of the 3rd network architecture embodiment of protection in the network topology structure of embodiment for the present invention's binode protection model shown in Figure 2;
Among the embodiment that Fig. 8 implements in the network topology structure of embodiment for the present invention's binode shown in Figure 2 protection model, DEB realizes the flow chart of protection;
Among the embodiment that Fig. 9 implements in the network topology structure of embodiment for the present invention's binode shown in Figure 2 protection model, PIB realizes the flow chart of protection;
Among the embodiment that Figure 10 implements in the network topology structure of embodiment for the present invention's binode shown in Figure 2 protection model, AIB realizes the flow chart of protection.
Embodiment
Fig. 2 realizes the network architecture schematic diagram based on binode protection model of Ethernet tunnel segment protection for the present invention; binode protection model; the one group of traffic engineering Service Instance on one of them end points on a certain local segment and this section (TESI, Traffic Engineering ServiceInstance) that is used for the PBB-TE network is protected.As shown in Figure 2, for that part of network that needs protection on the PBB-TE tunnel, main section (Primary Segment) and the dead section (Backup Segment) used is set, dead section is used to protect main with section.Main with section and the only shared end points bridge of dead section, another end points bridge of dead section is used to protect main another end points bridge with section.The master forms a v-shaped structure together with section and dead section, forms a protected field.What link to each other with this protected field can be various network topologies, adopts cloud atlas to represent among Fig. 2.
Wherein, the master is used for section, at network work just often, the section at layout data flow path place, main is the one section link that is protected the territory protection with section.Dead section is used for, one section link in its protected field the master being protected with section.As shown in Figure 2, do not have with section under the situation that fault takes place main, data traffic between the B-C main with section on transmit; When main with section on when breaking down, end points bridge B switches to flow on the dead section between the B-D.
The traffic service example is by one group of ether switching path (ESP, Ethernet Switch Path) the MAC Service Instance of Zu Chenging, and ESP is a unidirectional ether forward-path, this path is determined<B-DA by a tlv triple, B-SA, and B-VID>, wherein, B-DA is key target MAC (Media Access Control) address, and B-SA is the backbone network source MAC, and B-VID is a backbone VLAN number.
Main with utilizing OAM mechanism to lead the state-detection of using section between two end points bridges on the section; Can utilize OAM mechanism to carry out the state-detection of dead section between two end points bridges on the dead section.State-detection is carried out in transmission/reception such as the connectivity check messages (CCM, Connectivity Check Message) of passing through the IEEE802.1ag standard, and specific implementation belongs to those skilled in the art's conventional techniques means, repeats no more here.
If detecting the master, the shared end points bridge in the protected field fault is arranged with section; then this shared end points bridge is revised the outbound port of the some respective entries in transmitting; the protected data flow will be transmitted according to new outbound port, continue to transmit thereby flow switched on the dead section in the protected field.Wherein, the respective entries in the transmitting of modification is exactly to be subjected to the TESI of this protected field protection pairing<B-DA, B-VID>and, the outbound port in the respective entries is revised as shared end points bridge corresponding port on dead section.Simultaneously, shared end points bridge also will be with the remote failure indication information by dead section in the CCM that its another end points bridge sends, another end points bridge on the notice dead section, and switching has taken place in shared end points bridge, has switched on the dead section.
The binode protection model that the present invention is shown in Figure 2; not only can realize a certain the main of focused protection that need on the operating path on the tunnel is provided with dead section with section; be used for a certain main protection on the tunnel with section; can also realize that another end points bridge protection on the dead section is main with another end points bridge on the section; break down with another end points bridge on the section when main; then shared this fault of end points bridge energy perception; and switch, switch to dead section and carry out the flow forwarding by another end points bridge on the dead section.Binode protection model supports reversing mode of the present invention and non-reversing mode.
By the present invention's Ethernet tunnel segment protection framework shown in Figure 2; for the subnetwork that needs protection on the PBB-TE tunnel; setting has realized the protection to local some section and one the end points bridge in PBB-TE tunnel by the main protected field of forming with section and dead section maximum magnitude.The PBB-TE sectionalised protection network architecture provided by the invention has realized the local segmentation protection in tunnel, and the section of the part that needs protection is protected, and has avoided the problem that breaks down and need whole piece Ethernet tunnel to switch when local.Improved the utilance and the reliability of network, implemented to have suitable flexibility in the protection, the common demand when having satisfied actual networking in networking.
Below in conjunction with embodiment the enforcement of binode protection model of the present invention is described in detail.
The model that the present invention relates to can be applied between protected two sections to have in the sight of certain association, and this paper is that example describes with network topology structure shown in Figure 3 only, is not limited to the binode protection application of model network architecture of the present invention.The flow of Fig. 3 during for the embodiment of network topology structure among the present invention and operate as normal moves towards schematic diagram; as shown in Figure 3; flow just often; transmitting the part path of being walked is A-B-C; this part forward-path is subjected to two parts protection: backup path A-D-B protection primary path A-B, backup path B-D-C protection primary path B-C.Wherein, in the present networks topological structure, the B node is called main with intermediate axle (PIB, Primary Intermediate Bridge), and the D node is called standby intermediate axle (AIB, Alternative Intermediate Bridge).
Fig. 4 a moves towards schematic diagram for a certain section flow when breaking down in the embodiment shown in fig. 3, if A-B breaks down, shown in Fig. 4 a, data traffic is walked A-D-B-C.
Fig. 4 b is that the flow when another section breaks down in the embodiment shown in fig. 3 moves towards schematic diagram, if B-C breaks down, shown in Fig. 4 b, data traffic is walked A-B-D-C.
Fig. 4 c is in the embodiment shown in fig. 3, and the flow when the PIB node breaks down or A-B and B-C break down simultaneously moves towards schematic diagram, if Node B breaks down, shown in Fig. 4 c, D protects Node B by node, and promptly data traffic is walked A-D-C.
Shown in Fig. 4 a~Fig. 4 c, two backup path A-D-B that configure and B-D-C have shared path B-D.Here claim node A and node C to be called territory edge bridge (DEB, Domain Edge Bridge), and a Node B on primary path of sharing on the path is called PIB, the node D on backup path is called AIB.
In the demand of network topology shown in Figure 3, can adopt binode protection model of the present invention to realize network protection.The specific implementation method is as follows:
Be provided with between node A, the Node B and send out a CCM mutually and carry out link detecting, send out CCM between Node B, the node D mutually and carry out link detecting, send out CCM between node A, the node D mutually and carry out link detecting, send out CCM between Node B, the node C mutually and carry out link detecting, send out CCM between node C, the node D mutually and carry out link detecting.
Fig. 5 protects model to implement the schematic diagram of first network architecture embodiment of protection in the network topology structure of embodiment for the present invention's binode shown in Figure 2, as shown in Figure 5, protected field 1 is set, it is main to be A-B with section, dead section is A-D, and its total end points is A, and B and D protect each other; Protected field 2 is set, and it is main to be C-B with section, and dead section is C-D, and its total end points is C, and B and D protect each other.
Fig. 6 implements the schematic diagram of second network architecture embodiment of protection in the network topology structure of embodiment for the present invention's binode protection model shown in Figure 2.As shown in Figure 6, protected field 3 is set, it is main to be D-B with section, and dead section is D-A; Protected field 4 is set, and it is main to be D-B with section, and dead section is D-C.
Fig. 7 protects model to implement the schematic diagram of the 3rd network architecture embodiment of protection in the network topology structure of embodiment for the present invention's binode shown in Figure 2, as shown in Figure 7, protected field 5 is set, and it is main to be B-A with section, and dead section is B-D; Protected field 6 is set, and it is main with section B-C, and dead section is B-D.The protected field 1-6 here is mutually related, and connectivity of link detects frame CCM can be multiplexing by a plurality of protected fields.
Among the embodiment that Fig. 8 implements in the network topology structure of embodiment for the present invention's binode shown in Figure 2 protection model; DEB realizes the flow chart of protection; suppose under the normal condition; data traffic is transmitted main using on the section according to the data trend of planning; as shown in Figure 8; for the DEB in the protected field, it is implemented protection and may further comprise the steps:
Step 800:DEB is main with section and dead section transmission CCM to its place respectively.Here, the recipient is respectively PIB and AIB.
Step 801:DEB judges whether to receive a CCM who is sent with section from the master by PIB within a certain period of time that if receive, data traffic is transmitted main using on the section according to the data trend of planning, and returns step 800; If do not receive, illustrate that the master with breaking down on the section, enters step 802;
Step 802:DEB carries the remote failure indication information in sending to the CCM of dead section.
Step 803:DEB judges whether to receive the CCM that is sent from dead section by AIB within a certain period of time that if do not receive, the expression dead section has fault, enters step 804; If receive, illustrate that dead section is healthy available, enters step 805.
Step 804:DEB carries the remote failure indication information in sending to main CCM with section, and returns step 800.
Step 805:DEB changes outbound port, and data traffic is switched on the dead section.
Among the embodiment that Fig. 9 implements in the network topology structure of embodiment for the present invention's binode shown in Figure 2 protection model; PIB realizes the flow chart of protection; suppose under the normal condition; data traffic is transmitted main using on the section according to the data trend of planning; as shown in Figure 9; for the PIB in the protected field, it is implemented protection and may further comprise the steps:
Step 900:PIB sends CCM with dead section to DEB and the AIB that it was connected with section by the master in its place protected field respectively.
Whether step 901:PIB detects can receive the CCM that DEB sends from main with section within a certain period of time, if do not receive, illustrate that the master with section breaking down, enters step 902; If receive, then enter step 903.
Can step 902:PIB judges receive the CCM that AIB sends from dead section within a certain period of time, if do not receive, illustrates that dead section breaks down, and then enters step 900; If receive, illustrate that dead section health is available, enter step 904.
Step 903:PIB judges whether the CCM that receives has the remote failure indication information.If the indicative breath of band remote failure illustrates that DEB has detected the far-end fault, then changes step 905 over to; If do not carry the remote failure indication information, illustrate main all healthy available with section and dead section, data traffic continue according to the data trend of planning main with section on forwarding, and return step 900.
Step 904:PIB revise outbound port with data traffic from main with on the dead section that section switches in its place protected field, and return step 900.
Step 905:PIB revises outbound port data traffic is switched to main going up with section, and returns step 900.
Among the embodiment that Figure 10 implements in the network topology structure of embodiment for the present invention's binode shown in Figure 2 protection model; AIB realizes the flow chart of protection; suppose under the normal condition; data traffic is transmitted main using on the section according to the data trend of planning; as shown in figure 10; for the AIB in the protected field, it is implemented protection and may further comprise the steps:
Step 1000:AIB sends CCM with dead section to DEB and the PIB that it was connected with section by the main of its place protected field respectively.
Step 1001:AIB judges whether and can if can receive, enter step 1003 by the CCM that PIB sends from main receiving with section within a certain period of time; If do not receive, enter step 1002.
Step 1002:AIB judges whether and can receive the CCM that DEB sends from dead section within a certain period of time, if can receive, illustrates that dead section health is available, then enters step 1004; If do not receive, illustrate that dead section breaks down, at this moment do not do any step 1000 of moving and return.
Step 1003:AIB judges from main whether carry the remote failure indication information with a section CCM who receives, if do not carry, does not then do any action, and data traffic continues to transmit main using on the section according to the data trend of planning, and returns step 1000; If carry the remote failure indication information, illustrate that far-end has fault, enters step 1004.
Step 1004:AIB will switch on the dead section of protected data flow in the protected field at its place.
The above is preferred embodiment of the present invention only, is not to be used to limit protection scope of the present invention, all any modifications of being done within the spirit and principles in the present invention, is equal to and replaces and improvement etc., all should be included within protection scope of the present invention.

Claims (9)

1. a network protection method is characterized in that, comprising:
For the subnetwork that needs protection on the operator backbone bridging technology PBB-TE tunnel of supporting traffic engineering, the protected field of being made up of with section and dead section main is set;
Detecting network work just often by state-detection, data traffic is transmitted main using on the section;
Main when breaking down on section when detecting by state-detection, with data traffic switch to be used to protect main with section dead section.
2. network protection method according to claim 1 is characterized in that, described main with section and the only shared end points bridge of dead section, another end points bridge of described dead section is used to protect main another end points bridge with section.
3. network protection method according to claim 2; it is characterized in that; between another end points bridge of described shared end points bridge and dead section; between perhaps described shared end points bridge and main another end points bridge, form by a series of local area network (LAN) LAN and intervenient intermediate node bridge with section.
4. network protection method according to claim 3 is characterized in that, utilizes OAM mechanism to carry out described state-detection between described each end points bridge.
5. network protection method according to claim 4 is characterized in that, described shared end points bridge carries out state-detection and comprises:
Described shared end points bridge is main with section and dead section transmission connectivity check messages CCM to its place respectively;
Judge when described shared end points and to receive within a certain period of time by main another end points bridge with section from a main CCM who sends with section, then data traffic according to the data trend of planning main with section on forwarding;
Judge when described shared end points bridge and not receive within a certain period of time that by main another end points bridge with section from a main CCM who sends with section, described shared end points bridge carries the remote failure indication information in sending to the CCM of dead section, at this moment,
If described shared end points bridge is judged and received the CCM that is sent from dead section by another end points bridge of dead section within a certain period of time, then described shared end points bridge changes outbound port, and data traffic is switched on the dead section;
If described shared end points bridge is judged and is not received the CCM that is sent from dead section by another end points bridge of dead section within a certain period of time, described shared end points bridge carries the remote failure indication information in sending to main CCM with section, and continues to send CCM to main section and the dead section used in its place.
6. network protection method according to claim 5 is characterized in that, describedly comprises switching on the dead section of protected data flow in the protected field at its place:
Modification is subjected to the pairing clauses and subclauses of transmitting of traffic engineering Service Instance TESI of described protected field protection, and the outbound port in the respective entries is revised as described shared end points bridge corresponding port on dead section.
7. a network protection framework is characterized in that, for the subnetwork that needs protection on the operator backbone bridging technology PBB-TE tunnel of supporting traffic engineering, comprises the protected field of being made up of with section and dead section main;
Detecting network work just often by state-detection, data traffic is transmitted main using on the section;
Main when breaking down on section when detecting by state-detection, with data traffic switch to be used to protect main with section dead section.
8. network protection framework according to claim 7 is characterized in that, described main with section and the shared end points bridge of dead section, another end points of described dead section is used to protect main another end points bridge with section.
9. network protection framework according to claim 8; it is characterized in that; between another end points bridge of described shared end points bridge and dead section; between perhaps described shared end points bridge and main another end points bridge, form by a series of local area network (LAN) LAN and intervenient intermediate node bridge with section.
CN2009100892366A 2009-07-09 2009-07-09 Network protection method and network protection framework Pending CN101945001A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009100892366A CN101945001A (en) 2009-07-09 2009-07-09 Network protection method and network protection framework

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009100892366A CN101945001A (en) 2009-07-09 2009-07-09 Network protection method and network protection framework

Publications (1)

Publication Number Publication Date
CN101945001A true CN101945001A (en) 2011-01-12

Family

ID=43436786

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009100892366A Pending CN101945001A (en) 2009-07-09 2009-07-09 Network protection method and network protection framework

Country Status (1)

Country Link
CN (1) CN101945001A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104270231A (en) * 2014-09-05 2015-01-07 烽火通信科技股份有限公司 System and method for realizing double-node interconnected pseudo-wire
CN104283778A (en) * 2013-07-10 2015-01-14 杭州华三通信技术有限公司 Flow protection method and device for shortest path bridging network

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104283778A (en) * 2013-07-10 2015-01-14 杭州华三通信技术有限公司 Flow protection method and device for shortest path bridging network
CN104283778B (en) * 2013-07-10 2017-11-14 新华三技术有限公司 Flow rate protecting method and equipment in shortest path bridge network
CN104270231A (en) * 2014-09-05 2015-01-07 烽火通信科技股份有限公司 System and method for realizing double-node interconnected pseudo-wire
CN104270231B (en) * 2014-09-05 2018-02-16 烽火通信科技股份有限公司 A kind of system and method for realizing binode interconnection pseudo-wire

Similar Documents

Publication Publication Date Title
CN101843049B (en) A system and method for Ethernet protection switching in a provider backbone bridging traffic engineering domain
CN102571426B (en) Double-homing protection method and device
US20120127855A1 (en) Method and device for conveying traffic
CN100459531C (en) Method for notifying pseudo-lines fault based on bidirectional transmission detecting protocol
US20120113835A1 (en) Inter-network carrier ethernet service protection
CN101505246B (en) Fault detection and recovery method for network tunnel sectional protection mode
CN103178971A (en) Passive optical network (PON) protecting method and device
CN102484608A (en) Method and device for conveying traffic in network
CN102104520B (en) Ring network protection method and device based on topology information
CN101815006B (en) aggregation control method of links passing through provider network and system
CN101155076B (en) Method for checking pseudo wire trouble of two-layer special network
CN103457817B (en) The guard method of PW+L3VPN a kind of and system
CN101908983B (en) Joint detection method and system for Ethernet local segment protection
CN100446476C (en) Method and apparatus for communicating network trouble dtecting result
CN102118301A (en) Tunnel protection method and device
CN101989944B (en) Method for local protection of Ethernet tunnel and shared node of protection domain working segment
CN101599873B (en) Detection method of connectivity and device therefor
CN101989917A (en) Ethernet tunnel subsection protection method and device
CN101945001A (en) Network protection method and network protection framework
CN101997728B (en) A kind of checkout gear of Ethernet localised protection and method
CN104219073A (en) Message forwarding method and device in SPBM network
CN103166786A (en) Method and system for realizing link tracing
CN102780587B (en) The method of looped network protection is realized in MPLS-TP
CN102104523A (en) Data stream transmission method based on PBB-TE sectional tunnel, and node
CN102195794B (en) A kind of fast switch over method of Ethernet trail protection and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20110112