CN102891787B - Looped network tunnel configuration method, business switch method and system based on overlapping trees - Google Patents

Looped network tunnel configuration method, business switch method and system based on overlapping trees Download PDF

Info

Publication number
CN102891787B
CN102891787B CN201110204020.7A CN201110204020A CN102891787B CN 102891787 B CN102891787 B CN 102891787B CN 201110204020 A CN201110204020 A CN 201110204020A CN 102891787 B CN102891787 B CN 102891787B
Authority
CN
China
Prior art keywords
node
business
link
ring
state
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201110204020.7A
Other languages
Chinese (zh)
Other versions
CN102891787A (en
Inventor
刘国满
曲延锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yancheng Jieheng storage Co.,Ltd.
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201110204020.7A priority Critical patent/CN102891787B/en
Priority to PCT/CN2012/077242 priority patent/WO2013010423A1/en
Publication of CN102891787A publication Critical patent/CN102891787A/en
Application granted granted Critical
Publication of CN102891787B publication Critical patent/CN102891787B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/12Setup of transport tunnels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/42Loop networks
    • H04L12/437Ring fault isolation or reconfiguration

Abstract

The invention discloses a kind of looped network tunnel configuration method, business switch method and system based on overlapping trees, the lower link point of business configures the work tunnel protected each other and protection path based on overlapping trees as purpose node using on ring, including:Configure from the adjacent node of this node to the work tunnel of this node, and configured along the opposite direction of work tunnel from another adjacent node of this node to the protection path of this node clockwise or counterclockwise.The present invention utilizes the overlapping trees for the multipoint-to-point (MP2P) set up on ring; carry out multiple nodes on load-carrying ring and enter the business that ring goes out ring to same node; compared with prior art; avoid the complexity of configuration; distribute rationally, use the protection path of certain node up on ring to realize the transmission and protection to looped network business.

Description

Looped network tunnel configuration method, business switch method and system based on overlapping trees
Technical field
The present invention relates to looped network protection technical field, more particularly to a kind of looped network tunnel configuration side based on overlapping trees Method, business switch method and system.
Background technology
Currently in looped network, for Wrapping (loopback) protection scheme in G.8132 standard, because the protection scheme is One closed protective ring of each protected LSP (Label Switching Path, label switched path) correspondence, it configures work Measure too greatly, switching action is relatively more, switches processing time also long.
The content of the invention
Present invention solves the technical problem that being to provide a kind of looped network tunnel configuration method based on overlapping trees, service switching Method and system, optimization looped network configuration, realize the transmission and protection to looped network business.
In order to solve the above technical problems, the invention provides a kind of looped network tunnel configuration method based on overlapping trees, with The lower link point of business is purpose node on ring, configures the work tunnel protected each other and protection path based on overlapping trees, Including:
Configure clockwise or counterclockwise from the adjacent node of this node to the work tunnel of this node, and along described The opposite direction of work tunnel is configured from another adjacent node of this node to the protection path of this node.
Further, the overlapping trees carrying industry of one or more nodes to same destination node from the ring Business.
Further, the overlapping trees of the net loaded multiple multipoint-to-points (MP2P) of a physical rings.
Present invention also offers a kind of looped network business switching method based on overlapping trees, methods described includes:
The lower link point of business is purpose node using on ring, configure the work tunnel protected each other based on overlapping trees and Protection path;
Link State on ring between each nodal test and adjacent node, when detecting Link State change, sends state Notification packet is to other nodes on ring;
The node that the Link State changes or received the state change notification packet is detected, this node is judged On enter ring business transmitting path whether by the Link State change influenceed, if it is, will be by the fault impact Business is switched between the work tunnel and the protection path.
Further, methods described also includes:
Detect state change or receive the node of the state change notification packet, if it is determined that entering on this node The transmitting path of the business of ring is not changed by the Link State to be influenceed, then continues the transmitting path progress according to the business Transmission.
Further, the Link State changes, and specifically includes:Link or node failure, link or node failure disappear;
When nodal test to or according to the state change notification packet that receives learns that the Link State changes During for link or node failure, impacted business is switched in protection path from work at present tunnel and transmitted;
When nodal test to or according to the state change notification packet that receives learns that the Link State changes When being disappeared for link or node failure, then it will be switched to the business that is transmitted in protection path and be restored in work tunnel.
Further, methods described also includes:
When the Link State changes into link or node failure, it be incited somebody to action this by the upper link point of the fault impact business The state change of node is to switch (Switch) state;
When the Link State changes into link or node failure disappearance, by the upper link point of the fault impact business The state of this node is changed into idle (Idle) state by Switch states.
Further, methods described also includes:
Service message is when upper ring is forwarded using press-in (PUSH) looped network tunnel label stacked manner, i.e. under described Link point and the traffic direction of work tunnel are pressed into the tunnel label of (PUSH) overlapping trees, are forwarded along looped network, described Ring under lower link point ejection (POP) tunnel label carry out business.
Further, the work tunnel each other protected and protection path of the configuration based on overlapping trees, including:
Configure clockwise or counterclockwise from the adjacent node of this node to the work tunnel of this node, and along described The opposite direction of work tunnel is configured from another adjacent node of this node to the protection path of this node;
Wherein, overlapping trees carrying from the ring one or more nodes to same destination node business, The overlapping trees of the net loaded multiple multipoint-to-points (MP2P) of one physical rings.
Further, the business of the overlapping trees carrying, including:VPN (VPN) business of single layer label, Label switched path (LSP) business, the IP without label or Ethernet (Eth) business of multilayer labels.
Further, the work tunnel and the protection path support the last two jump to eject (PHP).
Present invention also offers a kind of looped network tunnel configuration system based on overlapping trees, including:Path configuration module,
The path configuration module is used for, and the lower link point of business is configured in such a way as purpose node using on ring The work tunnel protected each other and protection path based on overlapping trees:Configure clockwise or counterclockwise from this node Adjacent node to this node work tunnel, and along the work tunnel opposite direction configuration from this node another is adjacent Protection path of the node to this node.
Present invention also offers a kind of looped network business switching system based on overlapping trees, the system includes:
Path configuration module, the lower link point of business configures the guarantor each other based on overlapping trees as purpose node using on ring The work tunnel and protection path of shield;
State detection module, for detecting the Link State between this node and adjacent node;
State advertisement module, for when the state detection module detects Link State and changed, sending state change Notification packet is to other nodes on ring;
Service switching module, when changing for detecting Link State or receive the state change notification packet, Judging whether the transmitting path for entering the business of ring on this node is changed by the Link State is influenceed, if it is, will be by institute State fault impact business and switched between the work tunnel and the protection path.
Further, the service switching module is additionally operable to, and is detected state change or is received the state change During notification packet, influenceed if it is determined that the transmitting path for entering the business of ring on this node is not changed by the Link State, then Continuation is transmitted according to the transmitting path of the business.
Further, the state detection module is used for, and detects the following change of Link State:Link or node failure, Link or node failure disappear;
The service switching module is used for, when detecting or obtained according to the state change notification packet received When knowing that the Link State changes into link or node failure, impacted business is switched to protection tunnel from work at present tunnel Transmitted on road;When detecting or learn that the Link State is changed into according to the state change notification packet received When link or node failure disappearance, then it will be switched to the business that is transmitted in protection path and be restored in work tunnel.
Further, the service switching module is additionally operable to, when the Link State changes into link or node failure, Influenceed if it is determined that the transmitting path for entering the business of ring on this node is changed by the Link State, then by the state of this node Change into and switch (Switch) state;When the Link State changes into link or node failure disappearance, by the state of this node Idle (Idle) state is changed into by Switch states.
Further, the path configuration module is used for, and the lower link point of business is purpose node using on ring, according to following Mode configures the work tunnel protected each other and protection path based on overlapping trees:Configure clockwise or counterclockwise from The adjacent node of this node to this node work tunnel, and along the work tunnel opposite direction configuration from the another of this node Protection path of one adjacent node to this node;
Wherein, overlapping trees carrying from the ring one or more nodes to same destination node business, The overlapping trees of the net loaded multiple multipoint-to-points (MP2P) of one physical rings.
Using above-mentioned technical proposal of the present invention, that is, the overlapping trees for the multipoint-to-point (MP2P) set up on ring are utilized, come Multiple nodes enter the business that ring goes out ring to same node on load-carrying ring;The technology is compared with prior art, it is to avoid the complexity of configuration Property, distribute rationally, use the protection path of certain node up on ring to realize the transmission and protection to looped network business.
Brief description of the drawings
Accompanying drawing described herein is used for providing a further understanding of the present invention, constitutes the part of the application, this hair Bright schematic description and description is used to explain the present invention, does not constitute inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the loop network topology structure schematic diagram according to prior art;
Fig. 2 is the comprising modules schematic diagram of the Ring protection system of the embodiment of the present invention;
Fig. 3 is the service switching schematic diagram of the malfunction of the embodiment of the present invention;
Fig. 4 is the service switching schematic diagram of the failure vanishes of the embodiment of the present invention;
The schematic flow sheet that Fig. 5 switches for the looped network business of the embodiment of the present invention.
Embodiment
The looped network business switching method that present embodiment is provided, is mainly included the following steps that:
Step one, the lower link point of business is configured based on overlapping trees clockwise and anticlockwise as purpose node using on ring Work tunnel, the two tunnels are protected each other;
Specifically, for each lower link point, first along ring clockwise or counterclockwise from the adjacent of this node Node to this node work tunnel (being equal to path), meanwhile, set up one from this section along the opposite direction of work tunnel Protection path of another adjacent node of point to this node;
Wherein, between described work tunnel and protection path it is mutual protection relation, that is to say, that one in a tunnel Part resource as a direction work tunnel;Another part resource is acted on as the protection path of another opposite direction; It is assumed that being made up of on ring N number of node, then 2N tunnels are at most needed altogether.
Every section of link all startup separators are detected (such as on step 2, ring:CC&CV, BFD etc.), when a certain nodal test on ring State to Link State or peer node changes, then is sent immediately along the direction of the remote failure of ring to other nodes State change notification packet is (such as:R-APS etc.);
Step 3, when other nodes receive the state change notification packet on ring or this node itself detects state hair After changing, judge whether the business that ring is gone up on this node produces influence, if having an impact, carry out the switching of transmitting path; Otherwise, transmitted still according to original transmitting path;
Specifically, when node on the ring detects failure or receives the failure generation that other nodes on ring are sent to this node State change notification packet when, then the node will determine which business for clicking and entering ring from this section is affected, by failure shadow Loud business, correspondence protection path will be switched to from original work tunnel and will be transmitted;It is impregnable enter ring business, then still Transmitted in work tunnel;When failure adjacent node detects or is advertised failure vanishes on ring, then guarantor will be switched to originally Shield transmits business on tunnel, returns in work tunnel and transmits again.
In addition, while above-mentioned steps three, in addition to following process step:When node on the ring detects failure or reception When other nodes are sent to the state change notification packet of this node on to ring, if it is determined that the Link State changes into link Or enter on node failure, and this node ring business transmitting path by the Link State change influenceed, then by this node State switch to Switch from Idle states and (switch) state;And when link or node failure disappear, by the state of this node by Switch states become Idle states.
For the object, technical solutions and advantages of the present invention are more clearly understood, below in conjunction with accompanying drawing to the present invention Embodiment be described in detail.It should be noted that in the case where not conflicting, in the embodiment and embodiment in the application Feature can mutually be combined.
As shown in Fig. 2 the looped network business switching system that the present embodiment is provided mainly includes following four module:Path is configured Module, state detection module, state advertisement module and service switching module.Wherein, the major function of each module is described as follows:
Path configuration module, be mainly used in for each node on ring configure one from adjacent node along the clockwise of ring or Counterclockwise to work tunnel on this node, in addition, in opposite direction adjacent from this node for work tunnel configuration one Another node to the protection path of this node protect the work tunnel.And this work tunnel and protection path Between mutual protection relation, that is to say, that the last part resource in each tunnel is used for work tunnel, and another part resource is used for To another, work tunnel in opposite direction is protected;
State detection module, is mainly used in the failure by link layer between the node of two direct neighbors connections on looped network Detection messages, detect the state of this section of link.
For example, by detecting that (Continuity Check and Connectivity Verification connect CC&CV Continuous property detection and connective confirmation) BFD (Bidirectional Forwarding Detection, two-way converting detection) message Deng to detect Link State.
State advertisement module, the module is mainly used in when state detection module detects Link State and changed, then Produce a state change notification packet, along ring on be sent to node on the ring away from the direction of failure, until under failure Swim node;
Wherein, state change notification packet can be using such as:R-APS(Ring-Automatic Protection Switching, looped network automatic protection switching) message etc..
Service switching module, the shape that other nodes are sended over is changed or receives according to Link State is detected State changes notification packet (such as:R-APS etc.) after, the link or node changed according to generating state judges whether to entering on this node The business of ring produces influence, if having an impact, is operated between tunnel and protection path and switches over;Otherwise, then still exist Transmitted on original tunnel.
Further, state detection module is used for, and detects the following change of Link State:Link or node failure, link Or node failure disappears;
Service switching module is used for, when detecting or learn link shape according to the state change notification packet received When state changes into link or node failure, impacted business is switched in protection path from work at present tunnel and transmitted;When Detect or learn that Link State changes into link or node failure disappears according to the state change notification packet received When, then it will be switched to the business that is transmitted in protection path and be restored in work tunnel.
Further, service switching module is additionally operable to, when Link State changes into link or node failure, if it is determined that Enter the transmitting path of the business of ring on this node is influenceed by Link State change, then by the state change of this node for Change (Switch) state;When Link State changes into link or node failure disappearance, the state of this node is changed by Switch states It is changed into idle (Idle) state.
In addition, a kind of looped network tunnel configuration system based on overlapping trees is additionally provided in the embodiment of the present invention, including road Footpath configuration module, the path configuration module is used for, and the lower link point of business is configured in such a way as purpose node using on ring The work tunnel protected each other and protection path based on overlapping trees:Configure clockwise or counterclockwise from this node Adjacent node to this node work tunnel, and along the work tunnel opposite direction configuration from this node another is adjacent Protection path of the node to this node.
Wherein, overlapping trees carrying from the ring one or more nodes to same destination node business, The overlapping trees of the net loaded multiple multipoint-to-points (MP2P) of one physical rings.
Below by by taking the processing of network shown in Fig. 3 and Fig. 4 as an example, the specific implementation to the looped network business switching of the present invention Journey is described in detail.Wherein, the business carried on looped network can be VPN (the Virtual Private of single layer label Network, VPN) business or multilayer labels LSP service, the even IP without label or Eth (with Too net) business, etc..
For looped network business, it realizes that the main process of looped network business switching is described as follows:
1) for first with D points in the network shown in Fig. 3, if its work tunnel is configured to its counter clockwise direction (C- B-A-F-E-D), the protection path corresponding to it is clockwise direction E-F-A-B-C-D.
Or, work tunnel can also be configured to clockwise (E-F-A-B-C-D), its corresponding protection path is C-B-A-F-E-D。
If 2) by business 1 (LSP service or IP operation or PW business) and business 2 (LSP, IP, PW) business respectively from ring Upper node A and B enters ring, then on ring under non-failure conditions, then business 1 and business 2 are entered row label in A and B points respectively and exchanged Afterwards, such as:Business 1:20- > 30, business 2:After 50- > 60, then C-B-A-F-E-D transmission in same work tunnel is pressed into, its The structure chart of message is as shown in table 1 below after encapsulation.
The message encapsulation format of table 1
Tunnel Label (path)
(service label) LSP Label (IP Header, PW Label)
PDU
Wherein, Tunnel Label:Represent outer layer forward-path label;
LSP Label:Represent on ring is entered, the business is LSP service, then on link point is entered, carry out LSP label friendship Change after (swap), then be pressed into outer layer tunnel Tunnel Label, transmitted in outer layer tunnel;
IP Header:Represent when on link point is entered, it is IP operation to be directly accessed into, then is directly pressed into IP operation Outer layer tunnel Tunnel Label, are transmitted in outer layer tunnel;
PW Label:Represent on link point is entered, access be pseudo wire emulation business (such as:ATM, ETH, TDM etc.), Then after link point progress local service processing (NSP) is originally entered, stamp after corresponding PW Label, then be pressed into outer layer tunnel Tunnel Label, are transmitted in outer layer tunnel;
PDU:Refer to the content of the specific packaged business in the inside.
It only carries out exchange (swap) operation of outer layer tunnel label in node on the ring, and goes out on link point D to eject at it After outer layer label 300, the processing corresponding with the progress of the business of business 2 of business 1 directly to the inside.
For example, for LSP service, then first ejecting (POP) outer layer Tunnel label, then carry out the inside LSP Label goes out ring after exchanging (Swap);If for IP operation, ejecting after (POP) outer layer Tunnel Label, directly according to the inside Information on IP Header packet header, carries out out ring processing;If for PW business, then first ejecting (POP) outer layer Tunnel Label Afterwards, then eject after (POP) PW Label, the processing such as encapsulation of artificial service is carried out according to PW Label, then go out ring operation.
3) as shown in Figure 3, when node on the ring E or F detect link or node failure, the node E of failure is detected Or F, then it will generate state change notification packet (such as:R-APS etc.) other nodes on ring are sent to along the direction of ring, and will be right Enter the service switching by fault impact of ring on this node to transmit to protection path (E-F-A-B-C-D);
4) when other nodes receive the state change notification packet of failure generation on ring, business 1 and business 2 are (in figure By taking LSP service as an example) enter from node A and B on ring, due to being influenceed by E-F link failures, then business 1 and business 2 are distinguished Carried out from A and B node after service label exchange, such as:Business 1:20- > 30, business 2:After 50- > 60, its is pressed directly into right The protection path E-F-A-B-C-D transmission answered;Until reaching its ring egress D, after ejection outer layer protection tunnel label 401, directly Connect and business 1 and the business of business 2 of the inside etc. are handled;
5) when failure vanishes on ring, as shown in figure 4, when link failure disappears between F and E, then node F or E are detected During failure vanishes, then the original business transmitted from protection path on E-F-A-B-C-D on this node is returned into work again Make C-B-A-F-E-D on tunnel to transmit;Meanwhile, the node E or F of state change are detected, the state of a failure vanishes is generated Change notification packet, along the direction of ring, be sent to other nodes on ring.
6), then will be original on respective node when other nodes receive the state change notification packet of the failure vanishes on ring The ring business that enters transmitted from protection path is transmitted on switch operating tunnel again.
7) and for business 1 and business 2, it is pressed into its work tunnel C-B-A-F-E- from A and B points respectively again D gets on, and goes out until being sent to it after link point D, after ejection outer operative tunnel label 300, further according to the business 1 and industry of the inside The different service types of business 2 are handled accordingly.
Wherein, when the business for entering ring is transmitted in work tunnel (or protection path), when being sent to work tunnel in business In road/protection path during the last two jump, outer layer tunnel label can be ejected (PHP), directly send the business transmitted Go out link point to business, continue to transmit.
Fig. 5 shows the handling process of the looped network business switching method of the embodiment of the present invention, as shown in figure 5, the flow bag Include:
Step 101, each egress configuration work tunnel and protection path on ring.
Step 102, fault detect message is periodically sent on every section of link.
Step 103, judge whether to detect Link State change, if it is, performing step 104, otherwise, perform step 105。
Step 104, state change notification packet is immediately generated, other nodes on ring are sent to.
Step 105, state advertisement is periodically sent.
Step 106, node on the ring detects or received other state change notification packets.
Step 107, judge whether to be changed into malfunction from normal condition, if it is, performing step 108, otherwise, perform Step 109.
Step 108, each node sends impacted service switching to protection path, and performs step 110.
Step 109, ring business recovery is entered on each node to work tunnel.
Step 110, go out link point and receive business from work tunnel or protection path.
Wherein, above-mentioned work tunnel and protection path can support PHP.
It these are only that the present invention's is preferable to carry out case, be not intended to limit the invention, the present invention can also have other Various embodiments, in the case of without departing substantially from spirit of the invention and its essence, those skilled in the art can be according to this hair It is bright to make various corresponding changes and deformation, but these corresponding changes and deformation should all belong to appended claims of the invention Protection domain.
Obviously, those skilled in the art should be understood that above-mentioned each module of the invention or each step can be with general Computing device realize that they can be concentrated on single computing device, or be distributed in multiple computing devices and constituted Network on, alternatively, the program code that they can be can perform with computing device be realized, it is thus possible to they are stored Performed in the storage device by computing device, and in some cases, can be shown to be performed different from order herein The step of going out or describe, they are either fabricated to each integrated circuit modules respectively or by multiple modules in them or Step is fabricated to single integrated circuit module to realize.So, the present invention is not restricted to any specific hardware and software combination.

Claims (11)

1. a kind of looped network business switching method based on overlapping trees, it is characterised in that methods described includes:
The lower link point of business configures the work tunnel protected each other based on overlapping trees and protection as purpose node using on ring Tunnel;The work tunnel each other protected and protection path of the configuration based on overlapping trees, including:Along clockwise or counterclockwise Direction configure from the adjacent node of this node to the work tunnel of this node, and along the work tunnel opposite direction configuration from Protection path of another adjacent node of this node to this node;
Link State on ring between each nodal test and adjacent node, when detecting Link State change, sends state advertisement Message is to other nodes on ring;
The node that the Link State changes or received the state change notification packet is detected, judges to enter on this node Whether the transmitting path of the business of ring is changed by the Link State is influenceed, if it is, will be by fault impact business in institute State and switched between work tunnel and the protection path;
Detect state change or receive the node of the state change notification packet, if it is determined that entering ring on this node The transmitting path of business is not changed by the Link State to be influenceed, then continues to be passed according to the transmitting path of the business Send.
2. the method as described in claim 1, it is characterised in that
The Link State changes, and specifically includes:Link or node failure, link or node failure disappear;
When nodal test learns that the Link State changes into chain to or according to the state change notification packet that receives When road or node failure, impacted business is switched in protection path from work at present tunnel and transmitted;
When nodal test learns that the Link State changes into chain to or according to the state change notification packet that receives When road or node failure disappearance, then it will be switched to the business that is transmitted in protection path and be restored in work tunnel.
3. method as claimed in claim 2, it is characterised in that methods described also includes:
When the Link State changes into link or node failure, by the fault impact business upper link point by this node State change to switch (Switch) state;
When the Link State changes into link or node failure disappearance, it be incited somebody to action this by the upper link point of the fault impact business The state of node changes into idle (Idle) state by Switch states.
4. the method as described in claim 1, it is characterised in that methods described also includes:
Service message is when upper ring is forwarded using press-in (PUSH) looped network tunnel label stacked manner, i.e. according to the lower link Point and the traffic direction of work tunnel are pressed into the tunnel label of (PUSH) overlapping trees, are forwarded along looped network, the lower ring Ring under node ejection (POP) tunnel label carry out business.
5. method as claimed in claim 1 or 2, it is characterised in that
Overlapping trees carrying from the ring one or more nodes to the business of same destination node, a physical rings The overlapping trees of net loaded multiple multipoint-to-points (MP2P).
6. method as claimed in claim 5, it is characterised in that
The business of the overlapping trees carrying, including:VPN (VPN) business of single layer label, the mark of multilayer labels Switching path (LSP) business of label, the IP without label or Ethernet (Eth) business.
7. method as claimed in claim 5, it is characterised in that
The work tunnel and the protection path support the last two jump to eject (PHP).
8. a kind of looped network business switching system based on overlapping trees, it is characterised in that the system includes:
Path configuration module, the lower link point of business is purpose node using on ring, configuration protecting each other based on overlapping trees Work tunnel and protection path;
The path configuration module is used for, and the lower link point of business is purpose node using on ring, and configuration in such a way is based on The work tunnel protected each other and protection path of overlapping trees:Configure clockwise or counterclockwise from the adjacent of this node Node to this node work tunnel, and along the opposite direction configuration of the work tunnel from another adjacent node of this node To the protection path of this node;
State detection module, for detecting the Link State between this node and adjacent node;
State advertisement module, for when the state detection module detects Link State and changed, sending state change notice Message is to other nodes on ring;
Service switching module, when changing for detecting Link State or receive the state change notification packet, judges Whether by Link State change influenceed, if it is, will be by failure shadow if entering the transmitting path of the business of ring on this node The business of sound is switched between the work tunnel and the protection path;
The service switching module is additionally operable to, when detecting state change or receiving the state change notification packet, such as Fruit, which judges that the transmitting path for entering the business of ring on this node is not changed by the Link State, to be influenceed, then is continued according to the industry The transmitting path of business is transmitted.
9. system as claimed in claim 8, it is characterised in that
The state detection module is used for, and detects the following change of Link State:Link or node failure, link or node failure Disappear;
The service switching module is used for, when detecting or learn institute according to the state change notification packet received When stating Link State and changing into link or node failure, impacted business is switched in protection path from work at present tunnel Transmission;When detecting or learn that the Link State changes into link according to the state change notification packet received Or during node failure disappearance, then will be switched to the business that is transmitted in protection path and be restored in work tunnel.
10. system as claimed in claim 9, it is characterised in that
The service switching module is additionally operable to, when the Link State changes into link or node failure, if it is determined that this section Enter the transmitting path of the business of ring on point is influenceed by Link State change, then is to switch by the state change of this node (Switch) state;When the Link State changes into link or node failure disappearance, by the state of this node by Switch states Change into idle (Idle) state.
11. system as claimed in claim 8, it is characterised in that
Overlapping trees carrying from the ring one or more nodes to the business of same destination node, a physical rings The overlapping trees of net loaded multiple multipoint-to-points (MP2P).
CN201110204020.7A 2011-07-20 2011-07-20 Looped network tunnel configuration method, business switch method and system based on overlapping trees Active CN102891787B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201110204020.7A CN102891787B (en) 2011-07-20 2011-07-20 Looped network tunnel configuration method, business switch method and system based on overlapping trees
PCT/CN2012/077242 WO2013010423A1 (en) 2011-07-20 2012-06-20 Shared path-based ring network tunnel configuration method, and service switching method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110204020.7A CN102891787B (en) 2011-07-20 2011-07-20 Looped network tunnel configuration method, business switch method and system based on overlapping trees

Publications (2)

Publication Number Publication Date
CN102891787A CN102891787A (en) 2013-01-23
CN102891787B true CN102891787B (en) 2017-10-10

Family

ID=47535162

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110204020.7A Active CN102891787B (en) 2011-07-20 2011-07-20 Looped network tunnel configuration method, business switch method and system based on overlapping trees

Country Status (2)

Country Link
CN (1) CN102891787B (en)
WO (1) WO2013010423A1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105099748A (en) * 2014-05-23 2015-11-25 中兴通讯股份有限公司 Method and system for migrating business tunnel
CN105591898A (en) * 2014-10-21 2016-05-18 中兴通讯股份有限公司 Tunnel protection method and tunnel protection device based on shared tunnels
CN106304202B (en) * 2015-05-18 2019-04-30 中兴通讯股份有限公司 The band width control method and device shared based on tunnel
US10110475B2 (en) 2015-07-16 2018-10-23 Telefonaktiebolaget Lm Ericsson (Publ) Restoration method for an MPLS ring network
CN107528759B (en) * 2016-06-22 2021-10-08 中兴通讯股份有限公司 Service processing method, service ring-out node and ring network
CN107592251A (en) * 2016-07-08 2018-01-16 中兴通讯股份有限公司 The method of shared ring transannular networking structure and transannular Business Stream forwarding
CN110440391B (en) * 2019-08-07 2020-10-27 珠海格力电器股份有限公司 Loop network protection method and air conditioning system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1747439A (en) * 2005-10-14 2006-03-15 杭州华为三康技术有限公司 Fault treating method for phase switching loop of automatic protection system of Ethernet
CN101227370A (en) * 2008-02-05 2008-07-23 中兴通讯股份有限公司 Method for processing fault of transferring multi-protocol label switch sharing protection ring
CN101594191A (en) * 2008-05-27 2009-12-02 华为技术有限公司 The guard method of shared link interlinking ring network, system and interlink node

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008131395A (en) * 2006-11-21 2008-06-05 Nec Corp Rpr network system, rpr node device, its redundant method, program and record medium
CN101483491B (en) * 2008-01-11 2013-01-02 华为技术有限公司 Shared guard ring, multicast source route protection method and node thereof
CN101431459B (en) * 2008-12-17 2011-05-04 烽火通信科技股份有限公司 Looped network protection method for transmitting multiprotocol label switching network
CN101977141B (en) * 2010-09-27 2012-05-23 南京邮电大学 MPLS-TP-based multicast protection method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1747439A (en) * 2005-10-14 2006-03-15 杭州华为三康技术有限公司 Fault treating method for phase switching loop of automatic protection system of Ethernet
CN101227370A (en) * 2008-02-05 2008-07-23 中兴通讯股份有限公司 Method for processing fault of transferring multi-protocol label switch sharing protection ring
CN101594191A (en) * 2008-05-27 2009-12-02 华为技术有限公司 The guard method of shared link interlinking ring network, system and interlink node

Also Published As

Publication number Publication date
CN102891787A (en) 2013-01-23
WO2013010423A1 (en) 2013-01-24

Similar Documents

Publication Publication Date Title
CN102891787B (en) Looped network tunnel configuration method, business switch method and system based on overlapping trees
CN102882780B (en) Looped network tunnel configuration method based on overlapping trees, ring network protection method and system
CN101257441B (en) Method, equipment and system for forwarding message as well as equipment for receiving message
CN102025646B (en) Link switching method and device thereof
CN100454853C (en) Method for service channel detection and system for providing the same
CN100484097C (en) Method for judging pseudo wire connection state in packet-switching network and service apparatus thereof
CN101193052B (en) Method and system for sub-network connection protection in multi-protocol label switching
CN101317388B (en) Apparatus and method for multi-protocol label switching label-switched path protection switching
CN107547371A (en) A kind of message forwarding method and device
CN102377601B (en) LSP (Local Switched Path) fault notification method and LSP fault notification device
CN102006218B (en) Tunnel protection method and device
CN101227399B (en) Message transmission method, system and forwarding node
CN101931586B (en) Method and system for rapidly rerouting MPLS VPN (Multi-Protocol Label Switching Virtual Private Network)
CN103036756B (en) A kind of mixing ring network protection method and system based on sharing channel
CN104253745B (en) A kind of route withdraw method and the network equipment
CN101610535A (en) Multilink direct continuous show scape guarantees the method, system and device of BFD conversation stability down
CN101783743B (en) Business protection method and switching node
CN103368844B (en) Message processing method and LSR in MPLS network
CN103490921B (en) Network protection method, device, lower link point and system
CN103634134B (en) Cross-domain protection intercommunication method and system
CN101789879A (en) Dynamic maintenance method and device for related link circuits
WO2015154603A1 (en) Tunnel protecting method and device based on shared tunnel
CN102065020B (en) Method and device for transmitting L2VPN service by using tunnel group in MPLS network
CN105515816A (en) Processing method and apparatus for detection level information
CN107317691A (en) A kind of Fault Locating Method and equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20201221

Address after: 224000 south side of intelligent terminal Industrial Park, high tech Zone, Yancheng City, Jiangsu Province (d)

Patentee after: Yancheng Jieheng storage Co.,Ltd.

Address before: 518057 Ministry of justice, Zhongxing building, South Science and technology road, Nanshan District hi tech Industrial Park, Shenzhen, Guangdong

Patentee before: ZTE Corp.

TR01 Transfer of patent right