CN102780587A - Method for realizing ring network protection in MPLS-TP (Multi-Protocol Label Switching Transport Profile) - Google Patents
Method for realizing ring network protection in MPLS-TP (Multi-Protocol Label Switching Transport Profile) Download PDFInfo
- Publication number
- CN102780587A CN102780587A CN2012102930129A CN201210293012A CN102780587A CN 102780587 A CN102780587 A CN 102780587A CN 2012102930129 A CN2012102930129 A CN 2012102930129A CN 201210293012 A CN201210293012 A CN 201210293012A CN 102780587 A CN102780587 A CN 102780587A
- Authority
- CN
- China
- Prior art keywords
- network element
- network
- message
- lsp
- protection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a method for realizing ring network protection in MPLS-TP (Multi-Protocol Label Switching Transport Profile). The method comprises the following steps of: establishing a ring network protection group in a ring network; establishing a special ring network forwarding path for forwarding an LSP (Label Switch Path) in an interrupted or continuous manner in the ring network protection group; and using a certain packed format for a message forwarded on the LSP so that all messages in next hop appointing the port are completely transmitted by the protection path when a certain port in a network element has faults in the process of transmitting or receiving the messages; and recovering the transmitting or receiving of the messages in the path in normal working condition when the faults of the port are recovered. The method has the fault detection, channel link protection and node protection of the MPLS-TP ring network so that the MPLS-TP network can deploy the ring network so as to realize high and reliable network.
Description
Technical field
The present invention relates to network communications technology field, relate in particular to the method that in MPLS-TP, realizes looped network protection.
Background technology
MPLS-TP (Multi-Protocol Label Switching Transport Profile; Multiprotocol label switching transmission network standard) be to be proposed in April, 2008 by the joint working group that ITU-T and IETF set up, its predecessor is the T-MPLS technical standard that ITU-T began to develop in May, 2005.
Along with development of Communication Technique, MPLS-TP becomes main flow direction of transmission network development.The MPLS-TP technology is simplified multiprotocol label switching (mpls), pseudo-line (MPLS/PW) technology and is transformed, and has introduced notions such as transmitting net layering, OAM and protection, meets the demand that transmits net.MPLS-TP has proposed the notion of layering in order to adapt to the demand of transmission network, mainly the section of being divided into layer (Section Layer), LSP layer (Label Switch Path Layer), PW layer (Pseudo Wire Layer).Define OAM separately (Operations, Administration, and Maintenance) standard to each layer, also defined the linear protection standard of LSP (Label Switch Path) and PW (Pseudo Wire).
Protection is as a core topic in the MPLS-TP network; The main reliability guarantee of being responsible for network; Under the situation that network breaks down or transmission quality reduces, accomplish by faulty link and switch the normal service communication of recovery in the shortest time to backup link.In IETF RFC5654 the inside protection has been proposed clear and definite demand, mainly be divided into linear protection and looped network protection based on topology.Linear protection mainly provides the protection of LSP (Label Switch Path) and PW (Pseudo Wire), at present comparative maturity.Looped network protection does not also have clear and definite implementation method at present; The present invention proposes a kind of OAM standard of utilizing section layer (Section Layer), and the implementation method of looped network protection is provided, and accomplishes the annular networking of MPLS-TP; Realize that protection is switched fast, reach the application demand of transmission network.
Summary of the invention
Main purpose of the present invention is to MPLS-TP network looped network protection demand, provides a kind of mechanism to accomplish fault detect, link protection, the Node Protection of MPLS-TP looped network, makes the MPLS-TP network can dispose looped network, realizes the network of high reliability.
For realizing above-mentioned purpose; The present invention proposes following technical scheme: the method that realizes looped network protection among a kind of MPLS-TP; In looped network, create the looped network protection group, comprise the protection path LSP of network element in the looped network protection group, in the message process of transmitting; When certain port of network element broke down, the message that said port is pointed in all next jumpings was all transmitted by said protection path; Comprise:
From the mapping table of LSP and outlet network element, search corresponding outlet network element ID and the label that enters the mouth;
Exchange or be pressed into identification (RFID) tag to the message label that will transmit;
Encapsulate said message and be pressed among the LSP according to the outlet network element ID; And
The label entering looped network that is pressed among the LSP is transferred to outlet network element ID corresponding net element node.
Further, when said network element was protected the start node of LSP, the message of forwarding directly was pressed into the inlet label; When said network element was protected the intermediate node of LSP, the label of the message of forwarding was exchanged into the inlet label.
In the mapping table of said LSP and outlet network element,, then identify with the corresponding FEC of network element if when said network element is protected the start node of LSP; Protected the intermediate node of LSP like said network element, then identified with the corresponding label of going into.
Said protection path is for interrupting/continue transmitting LSP.
Said message comprises the G-ACH head, comprises source network element ID and purpose network element ID in the G-ACH head.
When the port failure of said network element recovered, the transmitted traffic of message returned in the network path of normal condition in the protection path.
The present invention also proposes to realize among the another kind of MPLS-TP method of looped network protection; In looped network, create the looped network protection group, comprise the protection path LSP of network element in the looped network protection group, in the receiving course of message; When certain port of network element breaks down, the operation of message is comprised:
The packet loss that source network element ID in the message is identical with said network element ID;
The message that purpose network element ID in the message is identical with said network element ID is resolved, and transmits according to vpn label; And
Purpose network element ID in the message and said network element ID message inequality are transmitted along said LSP.
Said protection path is for interrupting/continue transmitting LSP.
Said message comprises the G-ACH head, comprises said source network element ID and purpose network element ID in the G-ACH head.
When the port failure of said network element recovered, the reception flow of message returned in the network path of normal condition in the protection path.
Compared with prior art; Realize the method for looped network protection among the MPLS-TP that the present invention proposes; Make the MPLS-TP network can dispose looped network, practiced thrift the input of the network equipment, the network service guarantee of high reliability is provided; Thereby make the MPLS-TP packet switching network can really replace traditional SDH (Synchronous Digital Hierarchy, SDH) transmission network.
Description of drawings
Fig. 1 is the sketch map that network element ID distributes in the MPLS-TP looped network of the present invention;
Fig. 2 is the sketch map that data message encapsulation format among the forwarding LSP is being interrupted/continuing in the present invention;
Fig. 3 is interruption/continue the to transmit sketch map of LSP of two different directions in network element, setting up of the present invention;
Fig. 4 is that the present invention is interrupting/continuing transmitting the flow chart that carries out the data message reception among the LSP;
Fig. 5 is the workflow diagram of protection group when sending datagram literary composition in the looped network of the present invention;
Fig. 6 is the flow chart of the present invention's different conditions work in network.
Embodiment
To combine accompanying drawing of the present invention below, the technical scheme in the preferred embodiment of the present invention will be carried out clear, complete description.
The MPLS-TP looped network protection implementation method that the present invention proposes is through creating the looped network protection group, and in the process of in this looped network, transmitting and receiving according to message, the different operating state according to network element carries out different processing, with the reliability of guarantee network.
What the present invention created the looped network protection group mainly comprises following process:
Sign creates NE: the network element that this stage is mainly in the looped network distributes a unique sign; Adopt numeral to come representation; A network element in each digital unique identification looped network, sign can adopt the manual configuration fraction, also can employ system's MAC Address certainly and calculate.As shown in Figure 1, the device A allocation identification is 1, and the equipment B allocation identification is 2, and equipment C allocation identification is 3, and equipment D allocation identification is 4.
Create the mapping table of LSP (Label Switching Path, label switched path) and outlet network element: this stage is mainly the binding relationship of creating outlet network element ID that each bar protected LSP in looped network and corresponding MPLS forwarding label (promptly this network element of LSP in the table one goes into to identify).In the binding relationship table, if being intermediate node then this network element of protected LSP, this network element identifies with the corresponding label of going into, used corresponding FEC to identify if this network element protects the start node of LSP and represent that binding relationship is shown in following table one:
Table one LSP and the mapping table that exports network element
This network element of LSP is gone into sign | Go out looped network unit sign | Go out looped network unit and go into label |
50 | 1 | 100 |
51 | 2 | 100 |
52 | 4 | 201 |
LSP1 | 2 | 202 |
Next create the looped network forward-path, this stage is created the special LSP of two different directions, and the present invention is called Break-and-Continue LSP (interrupting/continue transmitting LSP).Break-and-Continue LSP is mainly with the characteristic of face; Promptly when message will be transmitted, must adopt encapsulation format among the present invention on this type LSP, be illustrated in figure 2 as the message encapsulation format in the present embodiment; It transmits head by the MPLS standard; G-ACH (Generic Associated Channel, general federated passage) head and initial data are formed, and wherein carry source network element ID and purpose network element ID in the G-ACH head.
Create the binding of looped network forward-path and port: this stage is confirmed port and the binding relationship of protecting the path; Create a protection group; When two ports of network element in looped network all just often; All messages are pressed original route and are transmitted, and when certain port of network element broke down, all next messages of jumping this interface of sensing were all by protecting the path to transmit.As shown in Figure 3, network element C protection group has the Break-and-Continue LSP1 and the Break-and-Continue LSP2 of two different directions.
As shown in Figure 4, when from then on network element receives message on the LSP, check at first whether the source network element ID in the message is identical with this network element sign, if identical, then showing has loop that dropping packets and notification applications layer events corresponding take place; Secondly; Whether the purpose network element ID in the inspection message is identical with this network element sign; If identical then this message and carry out corresponding decapsulation of terminating is transmitted according to vpn label then, if different then normally transmit according to the label of Break-and-Continue LSP.
As shown in Figure 5, in the looped network protection group, when two interfaces in the looped network of network element place all during operate as normal, the protection group gets into normal operating conditions; When network element was in this state, all messages were normally transmitted by original route.
When an interface broke down in the looped network of network element place, the looped network protection group got into the protection operating state, and when network element was in this state, institute's handlebar faulty link was done following the processing as the message of next jumping:
If LSP is a start node by protection; Then from the mapping table of creating LSP and outlet network element, search corresponding outlet network element ID and the label that enters the mouth; Be pressed into the inlet label to the data message that will transmit then and according to the head of outlet network element ID encapsulation GACH, the label that finally is pressed into Break-and-Continue LSP gets into looped network and is transferred to outlet network element ID corresponding net element node.
If LSP is an intermediate node by protection; Then from the mapping table of LSP and outlet network element, search corresponding outlet network element ID and the label that enters the mouth; Be exchanged into the inlet label to the label of the data message that will transmit then and according to the head of outlet network element ID encapsulation GACH, the label that finally is pressed into Break-and-Continue LSP gets into looped network and is transferred to outlet network element ID corresponding net element node.
Be illustrated in figure 6 as the state variation flow chart of MPLS-TP looped network protection implementation method of the present invention in network application; When the listens for network event module in the network finds that the network thing takes place; The decision event type is that break down incident or port failure of port recovers incident, and the incident if port breaks down then finds the corresponding looped network protection group of fault interface; The message reception of normal state and the flow that sends are switched to the protection path, make the looped network protection group get into the protection operating state.
When network event is port failure recovery incident; Find the corresponding looped network protection group of fault interface; And the flow under the guard mode is returned in the path of former normal operating conditions; Thereby when being implemented in port network and breaking down, realize the quick protection of network path is switched, reach the application demand of transmission network.
Technology contents of the present invention and technical characterictic have disclosed as above; Yet those of ordinary skill in the art still maybe be based on teaching of the present invention and announcements and are done all replacement and modifications that does not deviate from spirit of the present invention; Therefore; Protection range of the present invention should be not limited to the content that embodiment discloses, and should comprise various do not deviate from replacement of the present invention and modifications, and is contained by the present patent application claim.
Claims (10)
1. realize the method for looped network protection among the MPLS-TP; It is characterized in that: in looped network, create the looped network protection group; The protection path LSP that comprises network element in the looped network protection group; In the message process of transmitting, when certain port of network element broke down, the message that said port is pointed in all next jumpings was all transmitted by said protection path; Comprise:
From the mapping table of LSP and outlet network element, search corresponding outlet network element ID and the label that enters the mouth;
The message switching that will transmit or be pressed into identification (RFID) tag;
Encapsulate said message and be pressed among the LSP according to the outlet network element ID; And
The label entering looped network that is pressed among the LSP is transferred to outlet network element ID corresponding net element node.
2. method according to claim 1 is characterized in that: when said network element was protected the start node of LSP, the message of forwarding directly was pressed into the inlet label; When said network element was protected the intermediate node of LSP, the label of the message of forwarding was exchanged into the inlet label.
3. method according to claim 1 is characterized in that: in the mapping table of said LSP and outlet network element, if when said network element is protected the start node of LSP, then identify with the corresponding FEC of network element; Protected the intermediate node of LSP like said network element, then identified with the corresponding label of going into.
4. method according to claim 1 is characterized in that: said protection path is for interrupting/continue transmitting LSP.
5. method according to claim 1 is characterized in that: said message comprises the G-ACH head, comprises source network element ID and purpose network element ID in the G-ACH head.
6. method according to claim 1 is characterized in that: when the port failure of said network element recovered, the transmitted traffic of message returned in the network path of normal condition in the protection path.
7. realize the method for looped network protection among the MPLS-TP; It is characterized in that: in looped network, create the looped network protection group, comprise the protection path LSP of network element in the looped network protection group, in the receiving course of message; When certain port of network element breaks down, the operation of message is comprised:
The packet loss that source network element ID in the message is identical with said network element ID;
The message that purpose network element ID in the message is identical with said network element ID is resolved, and transmits according to vpn label; And
Purpose network element ID in the message and said network element ID message inequality are transmitted along said LSP.
8. method according to claim 7 is characterized in that: said protection path is for interrupting/continue transmitting LSP.
9. method according to claim 7 is characterized in that: said message comprises the G-ACH head, comprises said source network element ID and purpose network element ID in the G-ACH head.
10. method according to claim 7 is characterized in that: when the port failure of said network element recovered, the reception flow of message returned in the network path of normal condition in the protection path.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210293012.9A CN102780587B (en) | 2012-08-17 | 2012-08-17 | The method of looped network protection is realized in MPLS-TP |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210293012.9A CN102780587B (en) | 2012-08-17 | 2012-08-17 | The method of looped network protection is realized in MPLS-TP |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102780587A true CN102780587A (en) | 2012-11-14 |
CN102780587B CN102780587B (en) | 2015-10-21 |
Family
ID=47125353
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210293012.9A Active CN102780587B (en) | 2012-08-17 | 2012-08-17 | The method of looped network protection is realized in MPLS-TP |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102780587B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102970219A (en) * | 2012-11-30 | 2013-03-13 | 华为技术有限公司 | Method and device for binding protection rings |
CN104798349A (en) * | 2013-01-30 | 2015-07-22 | 惠普发展公司,有限责任合伙企业 | Failover in response to failure of a port |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030185217A1 (en) * | 2002-03-28 | 2003-10-02 | Sudhakar Ganti | Label distribution protocol supporting multiple classes of service in a multi protocol label switching (MPLS) network, methods and MPLS network using thereof |
CN101095058A (en) * | 2004-09-16 | 2007-12-26 | 以色列阿尔卡特电信公司 | Efficient protection mechanisms for protecting multicast traffic in a ring topology network utilizing label switching protocols |
CN101895455A (en) * | 2010-07-19 | 2010-11-24 | 南京邮电大学 | Method for fast protecting ring network based on multi-protocol label switching transport profile (MPLS-TP) |
CN102185773A (en) * | 2011-05-09 | 2011-09-14 | 杭州华三通信技术有限公司 | Multi-protocol label switching transport profile ring protection switching method and node |
CN102577260A (en) * | 2009-07-24 | 2012-07-11 | 瑞典爱立信有限公司 | Methods and arrangement in a mpls-tp telecommunications network for oam functions |
-
2012
- 2012-08-17 CN CN201210293012.9A patent/CN102780587B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030185217A1 (en) * | 2002-03-28 | 2003-10-02 | Sudhakar Ganti | Label distribution protocol supporting multiple classes of service in a multi protocol label switching (MPLS) network, methods and MPLS network using thereof |
CN101095058A (en) * | 2004-09-16 | 2007-12-26 | 以色列阿尔卡特电信公司 | Efficient protection mechanisms for protecting multicast traffic in a ring topology network utilizing label switching protocols |
CN102577260A (en) * | 2009-07-24 | 2012-07-11 | 瑞典爱立信有限公司 | Methods and arrangement in a mpls-tp telecommunications network for oam functions |
CN101895455A (en) * | 2010-07-19 | 2010-11-24 | 南京邮电大学 | Method for fast protecting ring network based on multi-protocol label switching transport profile (MPLS-TP) |
CN102185773A (en) * | 2011-05-09 | 2011-09-14 | 杭州华三通信技术有限公司 | Multi-protocol label switching transport profile ring protection switching method and node |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102970219A (en) * | 2012-11-30 | 2013-03-13 | 华为技术有限公司 | Method and device for binding protection rings |
CN102970219B (en) * | 2012-11-30 | 2016-03-30 | 华为技术有限公司 | The method and apparatus of binding guard ring |
CN104798349A (en) * | 2013-01-30 | 2015-07-22 | 惠普发展公司,有限责任合伙企业 | Failover in response to failure of a port |
US9830239B2 (en) | 2013-01-30 | 2017-11-28 | Hewlett Packard Enterprise Development Lp | Failover in response to failure of a port |
Also Published As
Publication number | Publication date |
---|---|
CN102780587B (en) | 2015-10-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101364926B (en) | Method and apparatus for network protection | |
CN100459531C (en) | Method for notifying pseudo-lines fault based on bidirectional transmission detecting protocol | |
CN102264088B (en) | Pseudo-wire pretection switch implementation method and device | |
CN102035712B (en) | Multiprotocol label exchanged ring network protection method, device and system | |
CN101193052B (en) | Method and system for sub-network connection protection in multi-protocol label switching | |
CN102201985B (en) | Ring protection switching method adopting multi-protocol label switching transport profile (MPLS TP) and node | |
CN102025646A (en) | Link switching method and device thereof | |
CN101771610B (en) | Transport multiprotocol label switching network (T-MPLS) system and link protection method | |
CN102006218B (en) | Tunnel protection method and device | |
CN102882780B (en) | Looped network tunnel configuration method based on overlapping trees, ring network protection method and system | |
CN101436976A (en) | Method, system and equipment for forwarding data frame | |
CN101317388A (en) | Apparatus and method for multi-protocol label switching label-switched path protection switching | |
CN102088387B (en) | Tunnel protection method and device of ring network | |
CN102055619A (en) | Method and system for realize fault detection in bidirectional path segment | |
CN102143065B (en) | Fault protection method and equipment | |
CN105656776A (en) | Pseudo-wire dual-homing protection switching system, method and device | |
CN102185773B (en) | Multi-protocol label switching transport profile ring protection switching method and node | |
CN102546352B (en) | A kind of method and system realizing point-to-multipoint label switch paths protection | |
CN101729348B (en) | Method and system for protecting point to multi-point ring | |
CN101997747A (en) | Method and device for announcing fault LSP information | |
CN102571534B (en) | Service transmission method based on ring network protection and node used for service transmission | |
CN102780587B (en) | The method of looped network protection is realized in MPLS-TP | |
CN106161232A (en) | A kind of method and apparatus of protecting tunnel switching | |
CN105553847B (en) | Switching method and device in multi-protocol label switching ring network | |
CN101977141B (en) | MPLS-TP-based multicast protection method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20171124 Address after: Xinghan street Suzhou Industrial Park in Jiangsu province 215000 No. 5 Building No. 6 Room 201 Patentee after: Suzhou Sheng Ke science and Technology Co., Ltd. Address before: Xinghan Street Industrial Park of Suzhou city in Jiangsu province 215021 No. 5 (Tengfei Industrial Square) B building 4 floor 13/16 unit Patentee before: Centec Networks (Suzhou) Inc. |
|
TR01 | Transfer of patent right |