CN104135392A - Dual-node ring route OAM data protecting method - Google Patents

Dual-node ring route OAM data protecting method Download PDF

Info

Publication number
CN104135392A
CN104135392A CN201410407789.2A CN201410407789A CN104135392A CN 104135392 A CN104135392 A CN 104135392A CN 201410407789 A CN201410407789 A CN 201410407789A CN 104135392 A CN104135392 A CN 104135392A
Authority
CN
China
Prior art keywords
local domain
logical
key
data
subinterface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410407789.2A
Other languages
Chinese (zh)
Inventor
胡小波
程小鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fiberhome Telecommunication Technologies Co Ltd
Original Assignee
Fiberhome Telecommunication Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fiberhome Telecommunication Technologies Co Ltd filed Critical Fiberhome Telecommunication Technologies Co Ltd
Priority to CN201410407789.2A priority Critical patent/CN104135392A/en
Publication of CN104135392A publication Critical patent/CN104135392A/en
Pending legal-status Critical Current

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to IPRAN and POTS equipment engineering networking application, in particular to a dual-node ring route OAM data protecting method. On the premise that the OSPF protocol stack is not changed and on the basis of a dual-node ring networking mode, a link is added between two backbone sink nodes and is added to a local domain so that an annular structure of the local domain is formed, and when a fault occurs in a station in the local domain, the local domain is still a whole, and all the stations can still normally exchange routing information. According to the dual-node ring route OAM data protecting method, local domain stations can be stably and effectively protected basically without any special configuration in the networking process.

Description

A kind of binode loop is by the guard method of OAM data
Technical field
The present invention relates to IPRAN (Radio Access Network IPization) and POTS (plain old telephone interface) plant engineering networking application, is that a kind of binode loop is by the guard method of OAM data specifically.Relate to a kind of binode loop in equipment network by OAM (operation, management, safeguard) data protection way to solve the problem.
Background technology
In recent years, due to the fast development of data service, in order as early as possible the superiority bandwidth of backbone network to be extended to user, each large operation commercial city is carried out the construction of MAN transmission network one after another.Specific practice be in user's side by access website group looped network, form local domain access ring, then by being suspended to key territory under key aggregation node.Yet, in engineering networking, utilize while hanging local domain access ring under single key aggregation node, once key aggregation node breaks down, will cause its lower all websites of hanging on local domain access ring all to can not enter webmaster, thereby not guarantee the reliability of user's side data business.
In order to address this problem, one of existing improvement technical scheme is: adopt a kind of networking application of hanging same local domain access ring under double-backbone aggregation node, when a key aggregation node breaks down, can also access the website on local domain access ring by another key aggregation node like this.Yet this scheme can only be protected the website on local domain access ring when some key aggregation nodes are out of order, and while having website to break down on local domain access ring, but can not effectively protect.Because now local domain access ring is divided into two or more regions, cause like this can not carrying out Routing Information Exchange between the website on local domain access ring, this hangs on the key aggregation node of local domain access ring the routing iinformation of all websites on local domain access ring not at present, yet the website on other local domain access rings will be visited the website on this local domain access ring, need to gather route by key aggregation node visits, the routing iinformation that does not have concrete website, will occur that so the inaccessible situation of some route occurs, thereby cause like this website on local domain access ring just to can not get protection.
In order effectively to protect all websites on local domain access ring, on PTN (report transport network) and OTN (optical transfer network) equipment, adopted the networking mode of a kind of couple of two IP in territory, as shown in Figure 1 before.The binode ring protection scheme of two IP address, existing pair of territory; substantially can carry out stable protection to local domain website (website on local domain access ring); yet this scheme requires higher to equipment performance; and often because makeing mistakes, configuration cause the function of binode ring normally not move in networking process; once there be website to be out of order, other websites will can not get protection.
Shown in Fig. 1 in technical scheme, two key aggregation node A, B is respectively as the key aggregation node in primary territory and the key aggregation node of backup domain, be configured to respectively in different OSPF (ospf) territory, and all local domain site configuration are primary, standby two IP addresses, belong to respectively two key aggregation node A, in the ospf domain at B place, define a kind of privately owned explore frame simultaneously, local domain website receives the explore frame (referred to as primary node explore frame and secondary node explore frame) of the key aggregation node A in primary territory and the key aggregation node B of backup domain simultaneously, in finding certain hour, do not receive after primary node explore frame, think and need to be switched to standby IP, restart self, preparation is switched to standby IP.After system starts, again attempt receiving primary node explore frame and secondary node explore frame, only receive secondary node explore frame, use standby IP to carry out system initialization.Although this method can be stablized effective protection local domain website; but because needs configure two territories; local domain website also will configure two IP address; this has relatively high expectations to equipment performance; and this configuration is very complicated in networking process; often there is because engineering staff's configuration makes mistakes the situation that causes this function normally not move.Known by above-mentioned analysis: in Fig. 1, the two IP protection schemes in two territories can effectively be protected local domain website; but in project implementing process, need webmaster to do particular arrangement; more complicated; maintenance cost is higher; because needing equipment to continue to send privately owned detection data frame, this scheme judges whether to carry out active and standby IP switching in addition, and relatively high to the performance requirement of equipment.
Summary of the invention
For the defect existing in prior art, the object of the present invention is to provide a kind of binode loop by the guard method of OAM data, in networking process, substantially do not need to carry out any particular arrangement and just can stablize effectively protection to local domain website.
For reaching above object, the technical scheme that the present invention takes is:
A kind of binode loop is by the guard method of OAM data; it is characterized in that: do not changing under the prerequisite of ospf protocol stack; on the basis of binode ring networking mode; between two key aggregation nodes, add a link; and this link is added in local domain, make local domain form a loop configuration, while having website to break down in local domain; local domain or an integral body, normal exchanging routing information still between each website.
On the basis of technique scheme, describedly refer to adding a link between two key aggregation nodes: a virtual logical links again between two key aggregation nodes.
On the basis of technique scheme, describedly refer to adding a link between two key aggregation nodes: while hanging the situation of a local domain under key aggregation node, between two key aggregation nodes, for each local domain, increase a light path.
On the basis of technique scheme, describedly refer to adding a link between two key aggregation nodes: while hanging the situation of a local domain under key aggregation node, two interfaces that two key aggregation nodes are connected are distinguished into different logical subinterface by VLAN simultaneously, each logical subinterface belongs to different ospf territories, make in two light paths between key aggregation node self-assembling formation one or more of by vlan logical subinterface to the logical channel forming, these logical channels are all carried in original physics light path;
The a pair of logical subinterface of a logical channel is wherein configured in local domain, two key aggregation nodes can be realized by this logical channel in local domain direct-connected, make the real Cheng Huan of local domain, and do not change the original networking in key territory.
On the basis of technique scheme, by VLAN, be distinguished into two logical subinterface, form two logical links VLAN1 and VLAN2, wherein VLAN1 belongs to key territory, and VLAN2 belongs to local domain.
On the basis of technique scheme, in order to distinguish the route switching data in local domain and key territory, at legacy data frame, add one deck vlan information, in resolution data, be used for distinguishing the logical subinterface under data, then according to the ospf domain at logical subinterface place, process accordingly.
On the basis of technique scheme; describedly refer to adding a link between two key aggregation nodes: while hanging the situation of a plurality of local domains under key aggregation node; when the mode by establishment logical links realizes the protection of website on a plurality of local domain access rings; because a logical links is to be formed by a pair of logical subinterface; so the twice that adds up to logical links sum of the logical subinterface of all Website Buildings, and the logical links the increasing real independent Cheng Huan of local domain access ring that can make each need protection.
On the basis of technique scheme, do not changing under the prerequisite of ospf protocol stack, by creating the logical subinterface of former port, and when transceiving data bag, by VLAN, distinguish the ospf domain at each logical subinterface place.
On the basis of technique scheme, the corresponding relation between each logical subinterface and ospf domain, issues by webmaster, and protocol stack is resolved then by the two binding after receiving order;
The configuration of port territory issues by webmaster equally, therefore by field, distinguishes former port and logical subinterface, and the territory configuration information form that protocol stack stores in FLASH need not change;
Because former port has been divided into a plurality of logical subinterface, when receiving data, in order to distinguish packet, should be sent to which logical subinterface, the privately owned frame header of data on former line is divided and changed, increase therein one deck vlan information.
Binode loop of the present invention, by the guard method of OAM data, does not substantially need to carry out any particular arrangement and just can stablize effectively protection to local domain website in networking process.The method that the mode of employing logical subinterface is distinguished ospf domain information can realize the protection to local domain website in binode ring networking mode, the two IP implementations in relatively two territories, and this scheme can effectively reduce engineering maintenance cost, realizes also fairly simple.
By the present invention, can in current engineering networking, effectively solve local domain access ring website OAM data protection problem, and simplify engineering construction work, save network operation cost.Estimate that the method is applied in binode ring protection networking, will produce larger economic benefit.
Accompanying drawing explanation
The present invention has following accompanying drawing:
Fig. 1, the two IP protection schemes in two territory,
Fig. 2, interpolation logical subinterface protection scheme,
Under Fig. 3, key aggregation node, hang a plurality of local domain protection schemes,
Fig. 4, data format change schematic diagram.
Embodiment
Below in conjunction with accompanying drawing, the present invention is described in further detail.
At present, it is very important how utilizing the existing characteristic of equipment to realize new protection scheme.The present invention analyzes OSPF layering routing property in the networking of binode ring; proposition is distinguished different sub-interfaces by the interface between two key aggregation nodes by VLAN; in local domain, realize direct-connected; make the real Cheng Huan of local domain, thereby formed a kind of binode ring protection scheme that local domain website is protected.
In the networking of binode ring, according to OSPF layering routing principle, any one website in non-key territory sends data, if in the network of certain node (website) correspondence of destination address in this territory, so just directly by searching routing table, find corresponding route then to send, until packet arrives corresponding node; If destination address is in the non-key territory of another one, so it first by default route by this Packet Generation to key aggregation node, key aggregation node by gather route again by this Packet Generation to another the key aggregation node being directly connected with its destination address corresponding domain, finally by described another key aggregation node, by the routing forwarding strategy in this territory, packet is finally sent on corresponding node again.In this networking mode, once certain local domain website, be out of order, in local domain, other websites can not be intercoursed routing iinformation, key aggregation node may be unreachable by the website in summary route access local domain, because now key aggregation node may not have the route of object website.If can guarantee to have website to break down in local domain, the normal exchanging routing information of the direct still energy of other websites, this problem just can solve.
At present local domain (local domain access ring) by under be suspended on two key aggregation nodes and formed a link structure, while having website to be out of order, local domain is just divided into two parts, and can not exchanging routing information between two parts.Do not changing under the prerequisite of ospf protocol stack; for example, if add again a link (: a more virtual logical links) between two key aggregation nodes on original basis; and this logical links is added in local domain; local domain has just formed a loop configuration like this; when having website to break down; local domain or an integral body, normal exchanging routing information still between each website, has so just realized a kind of protection.
While hanging the situation of a local domain (local domain access ring) under key aggregation node, as a kind of selectable mode of adding a link between two key aggregation nodes, can directly between two key aggregation nodes, increase a light path, and this light path is added in local domain.Although this scheme can realize the protection to website on local domain T-Ring; shortcoming is disabled in actual applications; because PROJECT NETWORKS is unusual bulky complex; probably there are hanging under a key aggregation node a plurality of different local domains; if go to add light path for each local domain, so not only increased cost, also can make network more intricate; can not simplify the work of engineering construction, maintenance difficulties has also strengthened.
While hanging the situation of a local domain under key aggregation node, as the selectable mode of adding a link between two key aggregation nodes of another kind, two interfaces that two key aggregation nodes are connected are distinguished into different logical subinterface by VLAN simultaneously, each logical subinterface belongs to different ospf territories, in light path between such two key aggregation nodes self-assembling formation one or more of by vlan logical subinterface to the logical channel forming, these logical channels are all carried in original physics light path.The a pair of logical subinterface of a logical channel is wherein configured in local domain; such two key aggregation nodes can be realized direct-connected by this logical channel in local domain; make the real Cheng Huan of local domain; and do not change the original networking in key territory, thereby formed a kind of binode ring protection scheme that local domain access ring website is protected.
As shown in Figure 2, create respectively two logical subinterface on device A and B, thereby form two logical links VLAN1 and VLAN2, wherein VLAN1 belongs to key territory, and VLAN2 belongs to local domain.These two logical links are carried in a light path, in order to distinguish the route switching data in local domain and key territory, at legacy data frame, add one deck vlan information, in resolution data, be used for distinguishing the logical subinterface under data, then according to the ospf domain at logical subinterface place, process accordingly.Each website of local domain forms ring structure like this, when there being website to be out of order, can effectively protect.
While hanging the situation of a plurality of (more than two) local domain under key aggregation node, can realize by creating the mode of logical links the protection of website on a plurality of local domain access rings.Because a logical links is to be formed by a pair of logical subinterface, thus the twice that adds up to logical links sum of the logical subinterface of all Website Buildings, and the logical links the increasing real independent Cheng Huan of local domain access ring that can make each need protection.
As shown in Figure 3, under website A and website B, hang local domain 1, under website A and website C, hang local domain 2 simultaneously, now need to make local domain 1 and local domain 2 independent Cheng Huan simultaneously.First configure local domain 1, create two logical links VLAN1 and VLAN2 on A and B, wherein VLAN1 belongs to key territory, and VLAN2 belongs to local domain 1, can make local domain Cheng Huan like this; Then consider local domain 2, because local domain 2 is cross-site being linked on key ring, so must increase a logical links VLAN1 who belongs to key territory on B and C, so key ring can be constant by the logical links VLAN1 networking between A and B, B and C, then between A and B, B and C, increase respectively a logical links (being all VLAN3) that belongs to local domain 2, local domain 2 can pass through these two sections of logical links makeup rings so again.The logical links of establishment adds up to 5 altogether, and A creates 3 sub-interfaces, B creates 5 sub-interfaces, C and creates 2 sub-interfaces, 10 create sub-interface altogether, can in the situation that not changing key ring networking, make local domain 1 and the independent Cheng Huan of local domain 2 simultaneously.When certain website in local domain 1 or local domain 2 is out of order, other website local domain access ring websites can be protected.
One of key of the present invention is: how not change under the prerequisite of ospf protocol stack, by creating the logical subinterface of former port, and when transceiving data bag, by VLAN, distinguishing the ospf domain at each logical subinterface place.
Corresponding relation between each logical subinterface and ospf domain, issues by webmaster, and protocol stack is resolved then by the two binding after receiving order.Owing to being also that this thinking issues port territory configuration before, here only need to distinguish former port and logical subinterface is just passable by field, and the territory configuration information form that protocol stack stores in FLASH also need not change, reduce so to the full extent the change to former code.Because former port has been divided into a plurality of logical subinterface, when receiving data, in order to distinguish packet, should be sent to which logical subinterface, the privately owned frame header of data on former line is divided and changed, increase therein one deck vlan information, as shown in Figure 4.
Fig. 4 has described the change of transmitting data format in new protection scheme, is mainly in order to realize the processing to the mapping relations between ospf domain information, logical subinterface and data frame VLAN mark in the process of transceiving data.Originally at device interior, by data on line are added to a privately owned frame header, wherein with the vlan information shining upon mutually with female end mouth, be used for judging data from which female end mouth receive and send,, owing to having created sub-interface on female end mouth, when judgement sub-interface, need and originally distinguished, so OAM data division has added one deck vlan information on line now, when judgement sub-interface mapping relations, resolve two-layer vlan information, data are dealt into the sub-interface of corresponding ospf domain.This data format is specifically designed in the networking equipment of binode ring route protection, and parsing and assembled data frame are all fairly simple.
Fig. 2 and Fig. 3 create the scheme of logical subinterface and utilize original OSPF route principle of stratification, by sub-interface, key territory and local domain are effectively distinguished, and make local domain Cheng Huan, can effectively protect local domain website.In implementation, do not need to change original ospf protocol, only need under former port or title female end mouth, create logical subinterface, logical subinterface and ospf domain are shone upon, and which logical subinterface this is sent to when receiving data, according to the special marking in data, to distinguish data.This mode does not need webmaster to do particular arrangement in project implementing process, can effectively reduce maintenance cost, and this scheme implementation is fairly simple, and equipment does not need to send again and processes a large amount of privately owned detection data frames, can save equipment performance resource.The in the situation that of hanging a plurality of local domain under a key aggregation node, do not need to add extra physics light path, only need the extra logic subport of adding, by intermediate equipment, forward local domain routing iinformation, just can effectively protect local domain.
The content not being described in detail in this specification belongs to the known prior art of professional and technical personnel in the field.

Claims (9)

1. a binode loop is by the guard method of OAM data; it is characterized in that: do not changing under the prerequisite of ospf protocol stack; on the basis of binode ring networking mode; between two key aggregation nodes, add a link; and this link is added in local domain, make local domain form a loop configuration, while having website to break down in local domain; local domain or an integral body, normal exchanging routing information still between each website.
2. binode loop as claimed in claim 1, by the guard method of OAM data, is characterized in that: describedly refer to adding a link between two key aggregation nodes: a virtual logical links again between two key aggregation nodes.
3. binode loop as claimed in claim 1 is by the guard method of OAM data; it is characterized in that: describedly refer to adding a link between two key aggregation nodes: while hanging the situation of a local domain under key aggregation node, between two key aggregation nodes, for each local domain, increase a light path.
4. binode loop as claimed in claim 1 is by the guard method of OAM data, it is characterized in that: describedly refer to adding a link between two key aggregation nodes: while hanging the situation of a local domain under key aggregation node, two interfaces that two key aggregation nodes are connected are distinguished into different logical subinterface by VLAN simultaneously, each logical subinterface belongs to different ospf territories, make in two light paths between key aggregation node self-assembling formation one or more of by vlan logical subinterface to the logical channel forming, these logical channels are all carried in original physics light path,
The a pair of logical subinterface of a logical channel is wherein configured in local domain, two key aggregation nodes can be realized by this logical channel in local domain direct-connected, make the real Cheng Huan of local domain, and do not change the original networking in key territory.
5. binode loop as claimed in claim 4, by the guard method of OAM data, is characterized in that: by VLAN, be distinguished into two logical subinterface, form two logical links VLAN1 and VLAN2, wherein VLAN1 belongs to key territory, and VLAN2 belongs to local domain.
6. binode loop as claimed in claim 5 is by the guard method of OAM data; it is characterized in that: in order to distinguish the route switching data in local domain and key territory; at legacy data frame, add one deck vlan information; in resolution data, be used for distinguishing the logical subinterface under data, then according to the ospf domain at logical subinterface place, process accordingly.
7. binode loop as claimed in claim 1 is by the guard method of OAM data, it is characterized in that: describedly refer to adding a link between two key aggregation nodes: while hanging the situation of a plurality of local domains under key aggregation node, when the mode by establishment logical links realizes the protection of website on a plurality of local domain access rings, because a logical links is to be formed by a pair of logical subinterface, so twice that adds up to logical links sum of the logical subinterface of all Website Buildings, and the real independent Cheng Huan of the local domain access ring that the logical links increasing can make each need protection.
8. binode loop as claimed in claim 1 is by the guard method of OAM data; it is characterized in that: do not changing under the prerequisite of ospf protocol stack; by creating the logical subinterface of former port, and when transceiving data bag, by VLAN, distinguish the ospf domain at each logical subinterface place.
9. binode loop as claimed in claim 8, by the guard method of OAM data, is characterized in that: the corresponding relation between each logical subinterface and ospf domain, by webmaster, issue, and protocol stack is resolved then by the two binding after receiving order;
The configuration of port territory issues by webmaster equally, therefore by field, distinguishes former port and logical subinterface, and the territory configuration information form that protocol stack stores in FLASH need not change;
Because former port has been divided into a plurality of logical subinterface, when receiving data, in order to distinguish packet, should be sent to which logical subinterface, the privately owned frame header of data on former line is divided and changed, increase therein one deck vlan information.
CN201410407789.2A 2014-08-19 2014-08-19 Dual-node ring route OAM data protecting method Pending CN104135392A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410407789.2A CN104135392A (en) 2014-08-19 2014-08-19 Dual-node ring route OAM data protecting method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410407789.2A CN104135392A (en) 2014-08-19 2014-08-19 Dual-node ring route OAM data protecting method

Publications (1)

Publication Number Publication Date
CN104135392A true CN104135392A (en) 2014-11-05

Family

ID=51807921

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410407789.2A Pending CN104135392A (en) 2014-08-19 2014-08-19 Dual-node ring route OAM data protecting method

Country Status (1)

Country Link
CN (1) CN104135392A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105897541A (en) * 2016-04-11 2016-08-24 烽火通信科技股份有限公司 Method of enabling SUPER VLAN and VLANIF to be compatible in IPRAN system
CN106656634A (en) * 2017-02-14 2017-05-10 国网江苏省电力公司无锡供电公司 Power terminal communicated interface network industrial Ethernet looped network double-node access structure
CN107196798A (en) * 2017-05-26 2017-09-22 烽火通信科技股份有限公司 Network apparatus management system and its method in telecommunication management network
CN109995635A (en) * 2017-12-29 2019-07-09 中国移动通信集团上海有限公司 PTN group-network construction based on 5G bearer network

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7545735B1 (en) * 2003-03-11 2009-06-09 Atrica Israel Ltd. Scalable protection mechanism for hierarchical multicast service in ring based networks
CN101771618A (en) * 2010-03-11 2010-07-07 中兴通讯股份有限公司 Host routing reachable method and system in access ring of packet transport network
CN101815023A (en) * 2009-02-19 2010-08-25 中兴通讯股份有限公司 Method for transmitting sub-loop protocol message in virtual channel
CN101944951A (en) * 2010-08-30 2011-01-12 中兴通讯股份有限公司 Method and device for switching back links between networks
CN102035714A (en) * 2010-12-17 2011-04-27 中兴通讯股份有限公司 Intersected or tangent ring network protection method and system
CN102148733A (en) * 2010-02-04 2011-08-10 华为技术有限公司 Protection method, device and system of intersected ring networks
CN102546425A (en) * 2012-01-31 2012-07-04 华为技术有限公司 Crossed ring network protection method, equipment and system
CN103095478A (en) * 2011-11-03 2013-05-08 中兴通讯股份有限公司 Protective method and device of transannular services

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7545735B1 (en) * 2003-03-11 2009-06-09 Atrica Israel Ltd. Scalable protection mechanism for hierarchical multicast service in ring based networks
CN101815023A (en) * 2009-02-19 2010-08-25 中兴通讯股份有限公司 Method for transmitting sub-loop protocol message in virtual channel
CN102148733A (en) * 2010-02-04 2011-08-10 华为技术有限公司 Protection method, device and system of intersected ring networks
CN101771618A (en) * 2010-03-11 2010-07-07 中兴通讯股份有限公司 Host routing reachable method and system in access ring of packet transport network
CN101944951A (en) * 2010-08-30 2011-01-12 中兴通讯股份有限公司 Method and device for switching back links between networks
CN102035714A (en) * 2010-12-17 2011-04-27 中兴通讯股份有限公司 Intersected or tangent ring network protection method and system
CN103095478A (en) * 2011-11-03 2013-05-08 中兴通讯股份有限公司 Protective method and device of transannular services
CN102546425A (en) * 2012-01-31 2012-07-04 华为技术有限公司 Crossed ring network protection method, equipment and system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105897541A (en) * 2016-04-11 2016-08-24 烽火通信科技股份有限公司 Method of enabling SUPER VLAN and VLANIF to be compatible in IPRAN system
CN105897541B (en) * 2016-04-11 2018-11-06 烽火通信科技股份有限公司 The method of compatible SUPER VLAN and VLANIF in IPRAN systems
CN106656634A (en) * 2017-02-14 2017-05-10 国网江苏省电力公司无锡供电公司 Power terminal communicated interface network industrial Ethernet looped network double-node access structure
CN107196798A (en) * 2017-05-26 2017-09-22 烽火通信科技股份有限公司 Network apparatus management system and its method in telecommunication management network
CN109995635A (en) * 2017-12-29 2019-07-09 中国移动通信集团上海有限公司 PTN group-network construction based on 5G bearer network
CN109995635B (en) * 2017-12-29 2021-08-20 中国移动通信集团上海有限公司 PTN networking system based on 5G carrying network

Similar Documents

Publication Publication Date Title
CA2843628C (en) Utility communication method and system
CN105379197B (en) It establishes the method in tunnel, distribute method, equipment and the network system of label
US9444642B2 (en) LAN multiplexing apparatus
US8179900B2 (en) Edge node redundant system in label switching network
EP2033377B1 (en) Forced medium access control (MAC) learning in bridged ethernet networks
CN102571426B (en) Double-homing protection method and device
CN103326940B (en) Method for forwarding message in network and edge device of operator
KR20100080536A (en) Carrier network connection device and carrier network
CN102413060B (en) User private line communication method and equipment used in VPLS (Virtual Private LAN (Local Area Network) Service) network
CN104767680B (en) It route the method and apparatus being switched fast
CN101815006B (en) aggregation control method of links passing through provider network and system
CN102055647A (en) Three-layer virtual private network (VPN) access method and system
CN104618150B (en) A kind of bis- layers of PTN turns business collocation method and system under three layer service scenes
CN104135392A (en) Dual-node ring route OAM data protecting method
CN102437919B (en) Access router and link reliability protection method
CN103795630A (en) Message transmitting method and device of label switching network
CN102185712B (en) The reverse method of VPLS network and ethernet ring network and device
CN102891903A (en) NAT (Network Address Translation) converting method and equipment
CN102014035A (en) Networking method and device based on Ethernet ring
WO2011011934A1 (en) Method and apparatus for ethernet tunnel segmentation protection
CN101316239B (en) Method for controlling access and forwarding in virtual special LAN service network
JP5089363B2 (en) Communication system and ring node device
Faghani et al. Shortcut switching strategy in metro Ethernet networks
CN103888335A (en) Transformer station information network interconnection method
Iwata et al. Global open Ethernet architecture for a cost-effective scalable VPN solution

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20141105