CN103312626B - A kind of method and device for sending asynchronous transfer mode inverse multiplexing business - Google Patents
A kind of method and device for sending asynchronous transfer mode inverse multiplexing business Download PDFInfo
- Publication number
- CN103312626B CN103312626B CN201210056425.5A CN201210056425A CN103312626B CN 103312626 B CN103312626 B CN 103312626B CN 201210056425 A CN201210056425 A CN 201210056425A CN 103312626 B CN103312626 B CN 103312626B
- Authority
- CN
- China
- Prior art keywords
- business
- ima
- vpi
- priority value
- priority
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a kind of method and device for sending asynchronous transfer mode inverse multiplexing business, according to the priority value of asynchronous transfer mode (ATM) business setting access control rule corresponding to the connection identifier section of access control rule in accesses control list (ACL);When judging that the connection identifier of IMA business belongs to the connection identifier section of access control rule, priority value corresponding to this connection identifier of the IMA business is arranged to the priority value of this access control rule;According to corresponding to priority value corresponding to the connection identifier of the IMA business determines different connection identifier on connecting path data flow forwarding degree of priority.This programme can be that IMA business sets priority, and row major forwarding is entered according to priority, the convenient priority scheduling for sending equipment and carrying out IMA business, when device resource anxiety, it can ensure that the high IMA business of priority preferentially forwards, can effectively solve congestion condition in data congestion.
Description
Technical field
The present invention relates to communication, network technique field, more particularly to Packet Transport Network (Packet Transport
Network, abbreviation PTN) in send asynchronous transfer mode inverse multiplexing business method and device.
Background technology
For the asynchronous transfer mould of asynchronous transfer mode (Asynchronous Transfer Mode, abbreviation ATM) business
Formula inverse multiplexing (Inverse Multiplexing for ATM, abbreviation IMA) refers to passes through repeating query by ATM cell in connection group
Mode realizes inverse multiplexing and demultiplexing, and the connection of multiple low speed is combined into a high bandwidth logic connection, logic connection
Summation of the speed no better than speed in connection group.
How to determine the priority of IMA business is to need to solve the problems, such as.
The content of the invention
The technical problem to be solved in the present invention is to provide it is a kind of send asynchronous transfer mode inverse multiplexing business method and
Device, solution IMA business are dispatched not intelligent without priority difference.
In order to solve the above-mentioned technical problem, the invention provides one kind to send asynchronous transfer mode inverse multiplexing (IMA) industry
The method of business, wherein,
According to asynchronous transfer mode corresponding to the connection identifier section of access control rule in accesses control list (ACL)
(ATM) business sets the priority value of access control rule;
When judging that the connection identifier of IMA business belongs to the connection identifier section of access control rule, by this of the IMA business
Priority value corresponding to connection identifier is arranged to the priority value of this access control rule;
The connecting path according to corresponding to priority value corresponding to the connection identifier of the IMA business determines different connection identifier
The forwarding degree of priority of upper data flow.
Further, the above method can also have the characteristics that:
The type of the IMA business is that Virtual Channel connects (VPC) type, VPI (VPI) category of the IMA business
In ACL during the VPI scopes of VPC rules, priority value corresponding to VPI in this IMA business is arranged to the excellent of the VPC rules
First level value.
Further, the above method can also have the characteristics that:
The type of the IMA business be virtual channel connect (VCC) type, the VPI (VPI) of the IMA business and
When virtual channel identifier (VCI) belongs to the scope that the VPI scopes of VCC rules and VCI scopes form in ACL, by this IMA business
Priority value corresponding to VPI and VCI is arranged to the priority value of the VCC rules.
Further, the above method can also have the characteristics that:
The type of the IMA business be virtual channel connect (VCC) type, the VPI (VPI) of the IMA business and
Virtual channel identifier (VCI) is not belonging to the VPI scopes of VCC rules and the scope of VCI scopes composition in ACL, judges the IMA business
VPI (VPI) when belonging to the VPI scopes of the rule of VPC in ACL, will be preferential corresponding to VPI and VCI in this IMA business
Level value is arranged to the priority value of the VPC rules.
Further, the above method can also have the characteristics that:
The priority value is carried in pseudo- thread test (EXP) mark of data flow.
In order to solve the above-mentioned technical problem, present invention also offers one kind to send asynchronous transfer mode inverse multiplexing (IMA)
The device of business, wherein, including priority configuration module and sending module;
Priority configuration module, for the connection identifier according to corresponding to access control rule in accesses control list (ACL)
Section sets the priority value of access control rule;It is additionally operable to judge that the connection identifier of IMA business belongs to the company of access control rule
When connecing identification section, priority value corresponding to this connection identifier of the IMA business is arranged to the preferential of this access control rule
Level value;
The sending module, different connections are determined for priority value corresponding to the connection identifier according to the IMA business
Corresponding to mark on connecting path data flow forwarding degree of priority.
Further, said apparatus can also have the characteristics that:
The priority configuration module, it is additionally operable to connect (VPC) type, institute in the type of the IMA business for Virtual Channel
When stating the VPI (VPI) of IMA business and belonging to the VPI scopes of the rule of VPC in ACL, by corresponding to VPI in this IMA business
Priority value is arranged to the priority value of the VPC rules.
Further, said apparatus can also have the characteristics that:
The priority configuration module, the type for being additionally operable to the IMA business connects (VCC) type for virtual channel, described
The VPI (VPI) and virtual channel identifier (VCI) of IMA business belong to the VPI scopes and VCI scope groups of VCC rules in ACL
Into scope when, priority value corresponding to VPI and VCI in this IMA business is arranged to the priority value of VCC rule.
Further, said apparatus can also have the characteristics that:
The priority configuration module, it is additionally operable to connect (VCC) type, institute in the type of the IMA business for virtual channel
State the VPI (VPI) of IMA business and virtual channel identifier (VCI) is not belonging to the VPI scopes and VCI models of VCC rules in ACL
The scope of composition is enclosed, when judging that the VPI (VPI) of the IMA business belongs to the VPI scopes of VPC rules in ACL, by this
Priority value corresponding to VPI and VCI is arranged to the priority value of the VPC rules in IMA business.
Further, said apparatus can also have the characteristics that:
The priority value is carried in pseudo- thread test (EXP) mark of data flow.
This programme can be that IMA business sets priority, and enter row major forwarding according to priority, and the convenient equipment that sends is entered
The priority scheduling of row IMA business, when device resource anxiety, it is ensured that the high IMA business of priority preferentially forwards,
Can effectively solve congestion condition during data congestion.
Brief description of the drawings
Fig. 1 is the method schematic diagram that IMA business is sent in this programme;
Fig. 2 is the schematic device that IMA business is sent in this programme.
Embodiment
As shown in figure 1, sending the method for IMA business includes:
According to asynchronous transfer mode corresponding to the connection identifier section of access control rule in accesses control list (ACL)
(ATM) business sets the priority value of access control rule;Judge that the connection identifier of IMA business belongs to the company of access control rule
When connecing identification section, priority value corresponding to this connection identifier of the IMA business is arranged to the preferential of this access control rule
Level value;According to corresponding to priority value corresponding to the connection identifier of the IMA business determines different connection identifier on connecting path
The forwarding degree of priority of data flow.
, can preferential high IMA business datums of forwarding priority by the above method.
The type of the IMA business is VPC types, and the VPI of the IMA business belongs to the VPI scopes of VPC rules in ACL
When, priority value corresponding to VPI in this IMA business is arranged to the regular priority values of the VPC.
The type of the IMA business is VCC types, and the VPI and VCI of the IMA business belong to the VPI of VCC rules in ACL
When scope and the scope of VCI scopes composition, priority value corresponding to VPI and VCI in this IMA business is arranged to the VCC and advised
Priority value then.The type of the IMA business is VCC types, and the VPI and VCI of the IMA business are not belonging to VCC in ACL and advised
VPI scopes and the scope of VCI scopes composition then, judge that the VPI of the IMA business belongs to the VPI scopes of VPC rules in ACL
When, priority value corresponding to VPI and VCI in this IMA business is arranged to the regular priority values of the VPC.
The priority value is carried in pseudo- thread test (EXPeriment, the EXP) mark of data flow.
ATM provides five kinds of business:CBR, VBR-rt, VBR-nrt, UBR and ABR, and different services is provided according to business
Quality, briefly it is considered that its priority is followed successively by from high to low:CBR > VBR-rt > VBR-nrt > ABR > UBR.Can
Correspond to set EXP 5 kinds of state values to represent corresponding priority corresponding to above-mentioned 5 kinds of ranks, i.e., in this programme not at the same level
Other ATM streams encapsulate different EXP values.Corresponding 3 bits of EXP in standard, thus can support to configure 8 priority, except above-mentioned 5
Can also voluntarily it be set outside kind priority.
As shown in Fig. 2 device corresponding with the above method includes priority configuration module and sending module;
Priority configuration module, for the connection identifier according to corresponding to access control rule in accesses control list (ACL)
Section sets the priority value of access control rule;It is additionally operable to judge that the connection identifier of IMA business belongs to the company of access control rule
When connecing identification section, priority value corresponding to this connection identifier of the IMA business is arranged to the preferential of this access control rule
Level value;
The sending module, different connections are determined for priority value corresponding to the connection identifier according to the IMA business
Corresponding to mark on connecting path data flow forwarding degree of priority.
Above-mentioned priority configuration module may be present in provider edge equipment (PE nodes), and sending module is present in operation
In business's node device (P node).When IMA data flows from PE node device UNI sides enter, can be multiplexed into ATM circuit emulation industry
Business (Circuit Emulation Service, abbreviation CES) message, is transmitted to NNI sides plus Ethernet message format,
The EXP values of pseudo-wire (Pseudo Wire) in ATM CES messages (a two-way virtual link between two PE) can be entered
Row is set, and when this IMA data flow is sent to P node, the priority scheduling of IMA data flows can be realized in P node.
The concrete configuration mode of priority configuration module is identical with described in the above method, and here is omitted.
The following detailed description of IMA service priority collocation methods.
When the type of IMA business is VPC types, IMA service priority methods to set up include:
Step 1, the IMA business of VPC types is configured, can be configured to N:1 VPC or 1:The IMA business of 1VPC types;
Step 2, ACL is configured, some of the access control rule of VPC types can be configured;
Step 3, judge whether each VPC access control rules are associated with the IMA business of the VPC types, will not associate
All it is default value to all vpi values corresponding to the VPC access control rules of the then IMA business;
Step 4, asynchronous transfer mode (ATM) business is set according to corresponding to the connection identifier section of VPC access control rules
The priority value of VPC access control rules, the priority of the VPC access control rules not configured use as default (such as most
Low priority).
For example, the two kinds of ATM business datums included in the IMA business supported in current application system, ATM business
1 belongs to general service (such as priority be 1), and its VPI scope is 1-20, and ATM business 2 belongs to higher level service (such as priority
For 4), for example to delay, chain rupture tolerance than relatively low business, its VPI scope is 20-25.Configuration access controls the excellent of rule
During first level, the priority for the access control rule that VPI scopes are 1-20 is arranged to 1, by the access control that VPI scopes are 20-25
The priority of system rule is arranged to 4.
Step 5, when judging that the VPI of IMA business belongs to the VPI scopes of VPC access control rules, by the IMA business
Priority value corresponding to this VPI is arranged to the priority value of this VPC access control rule, otherwise by the connection mark of this ATM business
EXP is set to default value corresponding to knowledge.
For example, the scope that IMA business includes VPI is 1-10,20-25 and 30-40,1-10 VPI belongs to VPI scopes
For 1-20 access control rule, then EXP corresponding to 1-10 VPI is arranged to 1;It is 20- that 20-25 VPI, which belongs to VPI scopes,
25 access control rule, the then VPI that EXP corresponding to 20-25 VPI is arranged to 4,30-40 do not match access control rule
Then, then EXP corresponding to 30-40 VPI uses as default 0.
When carrying out the forwarding of IMA business data flows, the data flow by preferential forwarding VPI scope for 20-25.
When the type of IMA business is VCC types, IMA service priority methods to set up include:
Step 1, the IMA business of VCC types is configured, can be configured to N:1 VCC or 1:The IMA business of 1VCC types;
Step 2, ACL is configured, some of the access control rule of VPC types and VCC types can be configured;
Step 3, judge whether each VCC access control rules are associated with the IMA business of the VCC types, will not associate
All it is default value to all VPI and VCI values corresponding to the VCC access control rules of the IMA business;
Step 4, asynchronous transfer mode (ATM) business is set according to corresponding to the connection identifier section of VCC access control rules
The priority value of VCC access control rules, the priority of the VCC access control rules not configured use as default (such as most
Low priority).
Step 5, when judging that the VPI+VCI of IMA business belongs to the VPI+VCI scopes of VCC access control rules, by IMA industry
Priority value corresponding to this VPI+VCI of business is arranged to the priority value of this VCC access control rule, judges the VPI of IMA business
The VPI of VPI+VCI scopes and IMA business that+VCI is not belonging to VCC access control rules belongs to VPC access control rules
During VPI scopes, priority value corresponding to this VPI+VCI of IMA business is arranged to the priority of this VPC access control rule
Value.
Step 6, EXP corresponding to the VPI+VCI that will not matched in IMA business is set to default value.
It should be noted that in the case where not conflicting, the feature in embodiment and embodiment in the application can phase
Mutually any combination.
Certainly, the present invention can also have other various embodiments, ripe in the case of without departing substantially from spirit of the invention and its essence
Various corresponding changes and deformation, but these corresponding changes and deformation can be made according to the present invention by knowing those skilled in the art
The protection domain of appended claims of the invention should all be belonged to.
One of ordinary skill in the art will appreciate that all or part of step in the above method can be instructed by program
Related hardware is completed, and described program can be stored in computer-readable recording medium, such as read-only storage, disk or CD
Deng.Alternatively, all or part of step of above-described embodiment can also be realized using one or more integrated circuits.Accordingly
Ground, each module/unit in above-described embodiment can be realized in the form of hardware, can also use the shape of software function module
Formula is realized.The present invention is not restricted to the combination of the hardware and software of any particular form.
Claims (6)
1. a kind of method for sending asynchronous transfer mode inverse multiplexing IMA business, wherein,
Set according to asynchronous transfer mode ATM business corresponding to the connection identifier section of access control rule in access control list ACL
Put the priority value of access control rule;
When judging that the connection identifier of IMA business belongs to the connection identifier section of access control rule, by this connection of the IMA business
Priority value corresponding to mark is arranged to the priority value of this access control rule;The type of the IMA business connects for virtual channel
VCC types are connect, the VPI VPI and virtual channel identifier VCI of the IMA business belong to the VPI scopes of VCC rules in ACL
During the scope formed with VCI scopes, priority value corresponding to VPI and VCI in this IMA business is arranged to the VCC rules
Priority value;The type of the IMA business is that virtual channel connects VCC types, the VPI VPI and void of the IMA business
Channel logo VCI is not belonging to the VPI scopes of VCC rules and the scope of VCI scopes composition in ACL, judges the void of the IMA business
When gap marker VPI belongs to the VPI scopes of Virtual Channel connection VPC rules in ACL, by corresponding to VPI and VCI in this IMA business
Priority value is arranged to the priority value of the VPC rules;
The number on connecting path according to corresponding to priority value corresponding to the connection identifier of the IMA business determines different connection identifier
According to the forwarding degree of priority of stream.
2. the method as described in claim 1, it is characterised in that
The type of the IMA business is that Virtual Channel connects VPC types, and the VPI VPI of the IMA business belongs in ACL
During the VPI scopes of VPC rules, priority value corresponding to VPI in this IMA business is arranged to the priority value of the VPC rules.
3. method as claimed in claim 1 or 2, it is characterised in that
The priority value is carried in the pseudo- thread test EXP marks of data flow.
4. a kind of device for sending asynchronous transfer mode inverse multiplexing IMA business, wherein,
Including priority configuration module and sending module;
Priority configuration module, set for the connection identifier section according to corresponding to access control rule in access control list ACL
The priority value of access control rule;It is additionally operable to judge that the connection identifier of IMA business belongs to the connection identifier of access control rule
Duan Shi, priority value corresponding to this connection identifier of the IMA business is arranged to the priority value of this access control rule;Institute
The type for stating IMA business connects VCC types, the VPI VPI and virtual channel identifier VCI of the IMA business for virtual channel
, will be excellent corresponding to VPI and VCI in this IMA business when belonging to the scope that the VPI scopes of VCC rules and VCI scopes form in ACL
First level value is arranged to the priority value of the VCC rules;The type of the IMA business is that virtual channel connects VCC types, described
The VPI VPI and virtual channel identifier VCI of IMA business are not belonging to the VPI scopes of VCC rules and VCI scopes composition in ACL
Scope, will when judging that the VPI VPI of the IMA business belongs to the VPI scopes of the connection VPC rules of Virtual Channel in ACL
Priority value corresponding to VPI and VCI is arranged to the priority value of the VPC rules in this IMA business;
The sending module, different connection identifier are determined for priority value corresponding to the connection identifier according to the IMA business
The forwarding degree of priority of data flow on corresponding connecting path.
5. device as claimed in claim 4, it is characterised in that
The priority configuration module, it is additionally operable to connect VPC types, the IMA industry in the type of the IMA business for Virtual Channel
When the VPI VPI of business belongs to the VPI scopes of VPC rules in ACL, priority value corresponding to VPI in this IMA business is set
It is set to the priority value of the VPC rules.
6. the device as described in claim 4 or 5, it is characterised in that
The priority value is carried in the pseudo- thread test EXP marks of data flow.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210056425.5A CN103312626B (en) | 2012-03-06 | 2012-03-06 | A kind of method and device for sending asynchronous transfer mode inverse multiplexing business |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210056425.5A CN103312626B (en) | 2012-03-06 | 2012-03-06 | A kind of method and device for sending asynchronous transfer mode inverse multiplexing business |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103312626A CN103312626A (en) | 2013-09-18 |
CN103312626B true CN103312626B (en) | 2018-03-30 |
Family
ID=49137422
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210056425.5A Active CN103312626B (en) | 2012-03-06 | 2012-03-06 | A kind of method and device for sending asynchronous transfer mode inverse multiplexing business |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103312626B (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5390184A (en) * | 1993-09-30 | 1995-02-14 | Northern Telecom Limited | Flexible scheduling mechanism for ATM switches |
CN1553671A (en) * | 2003-06-05 | 2004-12-08 | 深圳市中兴通讯股份有限公司南京分公 | Method for non-block user data transmission in reverse multiplexing process |
CN1630254A (en) * | 2003-12-19 | 2005-06-22 | 埃沃柳姆公司 | A method for improved handling of dynamic bandwidth changes in a transport network using inverse multiplexing |
CN1710903A (en) * | 2004-06-16 | 2005-12-21 | 华为技术有限公司 | Method and apparatus of supporting multi loading to realize signal transformission |
CN1853379A (en) * | 2002-12-31 | 2006-10-25 | 肯奈克斯特公司 | System and method for providing quality of service in asynchronous transfer mode cell transmission |
CN1934837A (en) * | 2004-04-20 | 2007-03-21 | 北电网络有限公司 | Method and system for quality of service support for Ethernet multiservice interworking over multiprotocol label switching |
CN102137008A (en) * | 2011-01-24 | 2011-07-27 | 华为技术有限公司 | Quality of service (QoS) keeping method, device and system |
CN102148758A (en) * | 2011-02-12 | 2011-08-10 | 中兴通讯股份有限公司 | Priority inheritance method and device |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8588061B2 (en) * | 2005-10-07 | 2013-11-19 | Brixham Solutions Ltd. | Application wire |
US7821941B2 (en) * | 2006-11-03 | 2010-10-26 | Cisco Technology, Inc. | Automatically controlling operation of a BRAS device based on encapsulation information |
US7706266B2 (en) * | 2007-03-12 | 2010-04-27 | Citrix Systems, Inc. | Systems and methods of providing proxy-based quality of service |
JP5092920B2 (en) * | 2008-06-18 | 2012-12-05 | 日本電気株式会社 | RADIO COMMUNICATION SYSTEM, RADIO COMMUNICATION DEVICE, AND RADIO COMMUNICATION METHOD USED FOR THEM |
-
2012
- 2012-03-06 CN CN201210056425.5A patent/CN103312626B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5390184A (en) * | 1993-09-30 | 1995-02-14 | Northern Telecom Limited | Flexible scheduling mechanism for ATM switches |
CN1853379A (en) * | 2002-12-31 | 2006-10-25 | 肯奈克斯特公司 | System and method for providing quality of service in asynchronous transfer mode cell transmission |
CN1553671A (en) * | 2003-06-05 | 2004-12-08 | 深圳市中兴通讯股份有限公司南京分公 | Method for non-block user data transmission in reverse multiplexing process |
CN1630254A (en) * | 2003-12-19 | 2005-06-22 | 埃沃柳姆公司 | A method for improved handling of dynamic bandwidth changes in a transport network using inverse multiplexing |
CN1934837A (en) * | 2004-04-20 | 2007-03-21 | 北电网络有限公司 | Method and system for quality of service support for Ethernet multiservice interworking over multiprotocol label switching |
CN1710903A (en) * | 2004-06-16 | 2005-12-21 | 华为技术有限公司 | Method and apparatus of supporting multi loading to realize signal transformission |
CN102137008A (en) * | 2011-01-24 | 2011-07-27 | 华为技术有限公司 | Quality of service (QoS) keeping method, device and system |
CN102148758A (en) * | 2011-02-12 | 2011-08-10 | 中兴通讯股份有限公司 | Priority inheritance method and device |
Non-Patent Citations (2)
Title |
---|
《A study of the inverse multiplexing for ATM (IMA) protocol》;Guy Pujolle等;《ATM forum》;20000630;第519-524页 * |
《IMA技术的原理与应用》;庄炜;《电信技术》;20020531;第70-72页 * |
Also Published As
Publication number | Publication date |
---|---|
CN103312626A (en) | 2013-09-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1955502B1 (en) | System for providing both traditional and traffic engineering enabled services | |
CN106656794B (en) | Message transmission method and device | |
EP2124402B1 (en) | A Node coupled to a SONET add/drop Multiplexer with packet over SONET capability. | |
CN102724118B (en) | Label distribution method and device | |
US7257121B2 (en) | System and method for mapping quality of service levels between MPLS and ATM connections in a network element | |
US8750314B2 (en) | Method and device for link protection in virtual private local area network | |
US7873053B2 (en) | Method and apparatus for reserving network resources for pseudo point-to-point connections | |
CN100525227C (en) | Method for implementing integrated service access of access network | |
CN101764750B (en) | Message packaging method and method, device and network equipment for detecting forwarding loop | |
JPH1155330A (en) | Closed area internet user group | |
US20070153799A1 (en) | Providing services over hybrid networks | |
US9065764B2 (en) | Method, apparatus and system for maintaining quality of service QoS | |
Liu et al. | Design and analysis of a bandwidth management framework for ATM-based broadband ISDN | |
US8582575B2 (en) | Backbone edge switching apparatus and packet processing method of the backbone edge switching apparatus | |
US20090316713A1 (en) | Communication apparatus in label switching network | |
JP3910200B2 (en) | Router, frame forwarding method, and lower layer frame virtual forwarding system | |
US20090245263A1 (en) | Apparatus and method for transmitting packets in a packet switched network | |
CN101494574A (en) | Performance test system and method for double-layer virtual special access backbone network | |
CN101548509A (en) | Aggregation of VCI routing tables | |
CN103312626B (en) | A kind of method and device for sending asynchronous transfer mode inverse multiplexing business | |
US20130279510A1 (en) | Architecture for routing data of a customer network over provider's network in provider backbone bridges | |
CN101132371A (en) | Pseudo-wire business protection method | |
WO2010025509A1 (en) | Method of and apparatus for statistical packet multiplexing | |
CN100428740C (en) | Informing method for attached circuit connection state in packet exchanging network and service device | |
CN104468359B (en) | Message forwarding method and equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |