CN107995008B - Service alarm processing method, device and system - Google Patents

Service alarm processing method, device and system Download PDF

Info

Publication number
CN107995008B
CN107995008B CN201610957783.1A CN201610957783A CN107995008B CN 107995008 B CN107995008 B CN 107995008B CN 201610957783 A CN201610957783 A CN 201610957783A CN 107995008 B CN107995008 B CN 107995008B
Authority
CN
China
Prior art keywords
network
interface
tunnel
setting
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610957783.1A
Other languages
Chinese (zh)
Other versions
CN107995008A (en
Inventor
耿丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201610957783.1A priority Critical patent/CN107995008B/en
Priority to PCT/CN2017/107154 priority patent/WO2018077124A1/en
Publication of CN107995008A publication Critical patent/CN107995008A/en
Application granted granted Critical
Publication of CN107995008B publication Critical patent/CN107995008B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4604LAN interconnection over a backbone network, e.g. Internet, Frame Relay
    • H04L2012/4629LAN interconnection over a backbone network, e.g. Internet, Frame Relay using multilayer switching, e.g. layer 3 switching

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a service alarm processing method, which comprises the following steps: setting a source object and a destination object of multicast service of a three-layer virtual private network (L3 VPN) configured on a network element, wherein the network element is bridged between a first network and the L3VPN network, and the source object and the destination object are respectively connected with the first network and the L3VPN network; establishing an alarm mapping relation between the source object and the sink object; and sending the alarm mapping relation to equipment corresponding to the network element. By the method, once the network connection fails and transmission link switching is required, and the connection between the main and standby network elements fails, so that the other side network cannot know the failure, the failure message can be transmitted from the network at the side where the failure occurs to the other side network through the establishment of the source-host object mapping relation, so as to realize the operations of switching the main and standby transmission links and the like. In addition, the invention also provides a device and a system for processing the service alarm.

Description

Service alarm processing method, device and system
Technical Field
The present invention relates to the field of communications, and in particular, to a method, an apparatus, and a system for processing a service alarm.
Background
In a Long Term Evolution (LTE) networking scenario, a three-layer Virtual Private Network (L3 Virtual Private Network, L3VPN) multicast service has been gradually deployed in an existing Network.
In general, a network is provided with two main transmission links and a standby transmission link, and when a main transmission link fails, the standby transmission link takes over the main transmission link to perform subsequent data transmission. When one main transmission network element in a main transmission link is exactly bridged between two different networks, and a network on one side of the network element has a link fault and needs to switch transmission links, if the connection between the network element and a corresponding standby network element on one side of the link fault network also has a fault at the same time, the network on the other side cannot acquire the fault information, so that the switching between the main and standby links cannot be realized, and finally the transmission of services is influenced.
The prior art cannot realize the situation, and the fault information is transmitted from the network at the side where the fault occurs to the network at the other side.
Disclosure of Invention
The invention provides a service alarm processing method, a device and a system, which are used for solving the problem that in the prior art, when a network fails to influence service progress, the failure cannot be transmitted from one side network to the other side network.
In order to solve the above problems, the technical solution of the embodiment of the present invention is implemented as follows:
a service alarm processing method comprises the following steps:
setting a source object and a destination object of multicast service of a three-layer virtual private network (L3 VPN) configured on a network element, wherein the network element is bridged between a first network and the L3VPN network, and the source object and the destination object are respectively connected with the first network and the L3VPN network;
establishing an alarm mapping relation between the source object and the sink object;
and sending the alarm mapping relation to equipment corresponding to the network element.
Further, setting the source object and the destination object of the multicast service of the L3VPN configured on the network element includes:
setting a virtual private network route forwarding VRF as a multicast VRF, and inquiring an access port of the multicast service according to the multicast VRF;
setting the node type of the network element according to the access port;
and setting the source object and the destination object according to the node type.
Further, setting the node type of the network element according to the access port includes:
when the access port does not comprise a virtual Ethernet type interface, setting the node type of the network element as a three-layer core ground node;
and when the access port comprises a virtual Ethernet type interface, setting the node type of the network element as a bridging node.
Further, setting the source object and the sink object according to the node type includes:
when the node type is the three-layer core landing node, acquiring an access interface of static multicast configuration information of the multicast service according to the multicast VRF, and setting the source object as the access interface; acquiring an output interface of the static multicast configuration information according to the multicast VRF, and setting the host object as the output interface;
when the node type is the bridge node, acquiring an output interface of multicast routing configuration information of the multicast service according to the multicast VRF, and setting the source object as the output interface; and acquiring the pseudo wire of the L2VPN according to the access port of the multicast service and the service association relation between the L3VPN and the L2VPN, and setting the destination object as the pseudo wire.
Further, establishing the alarm mapping relationship between the source object and the sink object comprises:
acquiring a detection session of the source object, and generating a source tracking detection group according to the detection session;
adding the source object into the source tracking detection group, and binding the host object and the source tracking detection group to generate a corresponding binding relationship;
judging whether the tunnel of the source object and the tunnel or the pseudo wire of the destination object have the configuration of multi-protocol label switching transmission application operation, management and maintenance MPLS-TP-OAM;
and under the condition that the configuration exists, establishing the alarm mapping relation between the source object and the destination object according to the binding relation.
Further, obtaining the detection session of the source object comprises:
when the node type is the three-layer core ground node, setting a three-layer Ethernet interface or a three-layer aggregation port according to the access interface; acquiring a detection session of the source object according to the three-layer Ethernet interface or the three-layer aggregation port, wherein the detection session is an interface type detection session;
when the node type is the bridge node, acquiring tunnel information of the network element according to the output interface; and acquiring the detection session of the source object according to the tunnel information, wherein the detection session is a multicast tunnel type detection session.
Further, setting the three-layer ethernet interface or the three-layer aggregation port according to the ingress interface includes:
when the input interface comprises an Ethernet interface or an aggregation port, maintaining the Ethernet interface or the aggregation port unchanged;
and when the input interface comprises an Ethernet sub-interface or an aggregation sub-port, converting the Ethernet sub-interface or the aggregation sub-port into a corresponding Ethernet interface or an aggregation port.
Further, determining whether the MPLS-TP-OAM configuration exists between the tunnel of the source object and the tunnel or the pseudo wire of the destination object includes:
when the node type is the three-layer core landing node, judging whether the tunnel of the host object has the configuration of the MPLS-TP-OAM;
and when the node type is the bridge node, judging whether the MPLS-TP-OAM configuration exists in the tunnel of the source object and the pseudo wire of the destination object.
Further, before determining whether the MPLS-TP-OAM configuration exists in the tunnel of the source object, the tunnel of the destination object, and the pseudowire, the method further includes:
when the node type is the three-layer core ground node, acquiring configuration information of the tunnel corresponding to the host object;
when the node type is the bridge node, acquiring configuration information of the tunnel corresponding to the source object; and acquiring the configuration information of the pseudo wire according to the host object.
Further, after sending the alarm mapping relationship to the device corresponding to the network element, the method further includes:
and under the condition that the detection session of the source object fails, setting the continuity and connectivity detection message which is configured by the host object and stops being sent in the MPLS-TP-OAM as enabled, and transmitting fault messages according to the alarm mapping relation.
Further, when the node type is the three-layer core landing node, the ingress interface includes an ethernet interface, an ethernet sub-interface, an aggregation port, an aggregation sub-port, or a tunnel interface, the egress interface is the tunnel interface, and the first network is a third-party network; when the node type is the bridge node, the egress interface is the tunnel interface; the first network is the L2VPN network.
The embodiment of the present invention further provides a service alarm processing apparatus, which specifically includes:
a setting module, configured to set a source object and a destination object of a multicast service of a three-layer virtual private network L3VPN configured on a network element, where the network element is bridged over a first network and the L3VPN network, and the source object and the destination object are connected to the first network and the L3VPN network, respectively;
the establishing module is used for establishing an alarm mapping relation between the source object and the destination object;
and the sending module is used for sending the alarm mapping relation to the equipment corresponding to the network element.
Further, the setting module includes:
the query submodule is used for setting a virtual private network routing forwarding VRF as a multicast VRF and querying an access port of the multicast service according to the multicast VRF;
the first setting submodule is used for setting the node type of the network element according to the access port;
and the second setting submodule is used for setting the source object and the destination object according to the node type.
Further, the first setting sub-module includes:
a first setting unit, configured to set a node type of the network element as a three-layer core ground node when the access port does not include a virtual ethernet type interface;
and the second setting unit is used for setting the node type of the network element as a bridging node when the access port comprises a virtual Ethernet type interface.
Further, the first obtaining sub-module includes:
the second setting submodule includes:
a third setting unit, configured to, when the node type is the three-layer core ground node, obtain an ingress interface of static multicast configuration information of the multicast service according to the multicast VRF, and set the source object as the ingress interface; acquiring an output interface of the static multicast configuration information according to the multicast VRF, and setting the host object as the output interface;
a fourth setting unit, configured to, when the node type is the bridge node, obtain an egress interface of multicast routing configuration information of the multicast service according to the multicast VRF, and set the source object as the egress interface; and acquiring the pseudo wire of the L2VPN according to the access port of the multicast service and the service association relation between the L3VPN and the L2VPN, and setting the destination object as the pseudo wire.
Further, the establishing module comprises:
the acquisition submodule is used for acquiring the detection session of the source object and generating a source tracking detection group according to the detection session;
the binding submodule is used for adding the source object into the source tracking detection group, binding the host object with the source tracking detection group and generating a corresponding binding relationship;
the judging submodule is used for judging whether the tunnel of the source object and the tunnel and the pseudo wire of the destination object have the configuration of multi-protocol label switching transmission application operation, management and maintenance MPLS-TP-OAM;
and the establishing submodule is used for establishing the alarm mapping relation between the source object and the destination object according to the binding relation under the condition that the configuration exists.
Further, the obtaining sub-module is specifically configured to: when the node type is the three-layer core ground node, setting a three-layer Ethernet interface or a three-layer aggregation port according to the access interface; acquiring a detection session of the source object according to the three-layer Ethernet interface or the three-layer aggregation port, wherein the detection session is an interface type detection session;
when the node type is the bridge node, acquiring tunnel information of the network element according to the output interface; and acquiring the detection session of the source object according to the tunnel information, wherein the detection session is a multicast tunnel type detection session.
Further, the judgment sub-module is specifically configured to:
when the node type is the three-layer core landing node, judging whether the tunnel of the host object has the configuration of the MPLS-TP-OAM;
and when the node type is the bridge node, judging whether the MPLS-TP-OAM configuration exists in the tunnel of the source object and the pseudo wire of the destination object.
Further, the apparatus further comprises:
an obtaining module, configured to obtain configuration information of the tunnel corresponding to the host object when the node type is the three-layer core ground node;
when the node type is the bridge node, acquiring configuration information of the tunnel corresponding to the source object; and acquiring the configuration information of the pseudo wire according to the host object.
Further, the apparatus further comprises:
and the enabling module is used for setting the sending stopping continuity and connectivity detection messages of the host object as enabling under the condition that the detection session of the source object fails, and transmitting fault messages according to the alarm mapping relation.
Further, the device is arranged in a network manager.
The embodiment of the invention also provides a service alarm processing system, which comprises a network manager and equipment:
the network manager is configured to set a source object and a destination object of a multicast service of a three-layer virtual private network L3VPN configured on a network element, where the network element is bridged between a first network and the L3VPN network, and the source object and the destination object are connected to the first network and the L3VPN network, respectively; establishing an alarm mapping relation between the source object and the sink object; and sending the alarm mapping relation to equipment corresponding to the network element.
The device is configured to receive the alarm mapping relationship sent by the network manager, and establish the alarm mapping between the source object and the sink object.
By acquiring a source object and a destination object of an L3VPN multicast service configured on a network element and establishing a corresponding relation between the source object and the destination object, once a network connection fails and transmission link switching is required, and a connection failure occurs between a main network element and a standby network element, so that when the other side network cannot know the failure, a failure message can be transmitted from the network at the side where the failure occurs to the other side network through the establishment of a source-destination object mapping relation, so as to realize subsequent operations such as switching of the main transmission link and the standby transmission link.
Drawings
Fig. 1 is a flowchart of a service alarm processing method according to a first embodiment of the present invention;
fig. 2 is a block diagram of a first service alarm processing apparatus according to a second embodiment of the present invention;
fig. 3 is a block diagram of a second service alarm processing apparatus according to a second embodiment of the present invention;
fig. 4 is a block diagram of a service alarm processing apparatus according to a second embodiment of the present invention;
fig. 5 is a block diagram of a service alarm processing apparatus according to a second embodiment of the present invention;
fig. 6 is a block diagram of a service alarm processing apparatus according to a second embodiment of the present invention;
fig. 7 is a block diagram six of a service alarm processing apparatus according to a second embodiment of the present invention;
fig. 7 is a block diagram six of a service alarm processing apparatus according to a second embodiment of the present invention;
fig. 8 is a block diagram of a service alarm processing apparatus according to the second embodiment of the present invention;
fig. 9 is a block diagram of a service alarm processing system according to a third embodiment of the present invention;
fig. 10 is a flowchart of a service alarm processing method according to a fourth embodiment of the present invention;
fig. 11 is a schematic diagram of a service alarm according to a fourth embodiment of the present invention;
fig. 12 is a flowchart of a service alarm processing method according to a fifth embodiment of the present invention;
fig. 13 is a schematic diagram of a service alarm according to a fifth embodiment of the present invention.
Detailed Description
The invention will be described in detail with reference to the following drawings and examples, it being understood that the preferred examples are set forth to illustrate and explain the invention, and are not to be construed as limiting the invention.
Example one
Fig. 1 is a flowchart of a service alarm processing method according to an embodiment of the present invention, and as shown in fig. 1, the method includes the following steps:
step S102, setting a source object and a destination object of multicast service of a three-layer virtual private network L3VPN configured on a network element, wherein the network element is bridged over a first network and the L3VPN network, and the source object and the destination object are respectively connected with the first network and the L3VPN network;
step S104, establishing an alarm mapping relation between the source object and the destination object;
step S106, the alarm mapping relation is sent to the equipment corresponding to the network element.
The steps S102 and S104 are configuration operations on the network manager, and the step S106 is to use the device corresponding to the configured information issued on the network manager for establishing the actual mapping relationship.
Under the condition that the first network is a third-party network, the source object is an input interface on a network element and is connected with the third-party network, and the destination object is an output interface on the network element and is connected with the L3VPN network; and under the condition that the first network is the L2VPN network, the source object is an output interface on the network element and is connected with the L3VPN network, and the destination object is a pseudo wire on the network element and is connected with the L3VPN network and the L2VPN network.
By the method, once the network connection fails and transmission link switching is required, and the connection between the main and standby network elements fails, so that the network on the other side cannot know the failure, the failure message can be transmitted to the network on the other side by establishing the mapping relation of the source and destination objects, so as to realize subsequent operations of switching the main and standby transmission links and the like.
Further, setting the source object and the destination object of the multicast service of the L3VPN configured on the network element includes: setting a virtual private network route forwarding VRF as a multicast VRF, and inquiring an access port of the multicast service according to the multicast VRF; setting the node type of the network element according to the access port; and setting the source object and the sink object according to the node type.
Further, setting the node type of the network element according to the access port includes: when the access port does not comprise a virtual Ethernet type interface, setting the node type of the network element as a three-layer core ground node; and when the access port comprises the interface of the virtual Ethernet type, setting the node type of the network element as a bridging node.
Further, setting the source object and the sink object according to the node type includes: when the node type is the three-layer core ground node, acquiring an input interface of static multicast configuration information of the multicast service according to the multicast VRF, and setting the source object as the input interface; acquiring an output interface of the static multicast configuration information according to the multicast VRF, and setting the host object as the output interface;
when the node type is the bridge node, acquiring an output interface of multicast routing configuration information of the multicast service according to the multicast VRF, and setting the source object as the output interface; and acquiring the pseudo wire of the L2VPN according to the access port of the multicast service and the service association relationship between the L3VPN and the L2VPN, and setting the host object as the pseudo wire.
Further, establishing the alarm mapping relationship between the source object and the sink object includes:
acquiring a detection session of the source object, and generating a source tracking detection group according to the detection session; adding the source object into the source tracking detection group, and binding the host object and the source tracking detection group to generate a corresponding binding relationship; judging whether the tunnel of the source object and the tunnel or the pseudo wire of the destination object have the configuration of multi-protocol label switching transmission application operation, management and maintenance (MPLS-TP-OAM); and under the condition that the configuration exists, establishing the alarm mapping relation between the source object and the destination object according to the binding relation.
Further, obtaining the detection session of the source object includes: when the node type is the three-layer core ground node, setting a three-layer Ethernet interface or a three-layer aggregation port according to the access interface; acquiring a detection session of the source object according to the three-layer Ethernet interface or the three-layer aggregation port, wherein the detection session is an interface type detection session; when the node type is the bridge node, acquiring the tunnel information of the network element according to the output interface; and acquiring the detection session of the source object according to the tunnel information, wherein the detection session is a multicast tunnel type detection session.
The detection session is a detection means, and whether the source object can normally communicate or not and whether the sink object can normally communicate or not can be judged by acquiring information of the detection session.
The detection session of the source object carries the information of the source object, and adding the source object into the source tracking detection group is represented as adding the detection session of the source object into the source tracking detection group in the actual operation. The binding of the host object and the source tracking detection group is indirectly the binding of the host object and the source object. The binding strategy can be that after all source objects in the source tracking detection group are invalid, the bound host object starts working; or the bound host object starts working after the source tracking detects that part of the source objects in the group fail.
All source objects can be set to be added into the source tracking detection group, and all the destination objects are bound with the source tracking detection group; or selecting a part of source objects to be added into the source tracking detection group, and binding a part of host objects with the source tracking detection group. The tracking detection group may be an existing detection group in the queried network element, or a detection group set and generated by the network manager.
Further, obtaining the detection session of the source object includes: when the node type is the three-layer core ground node, setting a three-layer Ethernet interface or a three-layer aggregation port according to the access interface; acquiring a detection session of the source object according to the three-layer Ethernet interface or the three-layer aggregation port, wherein the detection session is an interface type detection session; when the node type is the bridge node, acquiring the tunnel information of the network element according to the output interface; and acquiring the detection session of the source object according to the tunnel information, wherein the detection session is a multicast tunnel type detection session.
Further, setting the three-layer ethernet interface or the three-layer aggregation port according to the ingress interface includes:
when the input interface comprises an Ethernet interface or an aggregation port, maintaining the Ethernet interface or the aggregation port unchanged; when the incoming interface includes an ethernet subinterface or an aggregation subport, the ethernet subinterface or the aggregation subport is converted into a corresponding ethernet interface or an aggregation port.
Through the operation, the same incoming interface can be filtered, and the same incoming interface is prevented from creating the same detection session, so that the detection session is redundant.
Further, determining whether the MPLS-TP-OAM configuration exists between the tunnel of the source object and the tunnel or the pseudo wire of the destination object includes: when the node type is the three-layer core landing node, judging whether the tunnel of the host object has the configuration of the MPLS-TP-OAM; and when the node type is the bridge node, judging whether the MPLS-TP-OAM configuration exists between the tunnel of the source object and the pseudo wire of the destination object.
When the node type is the three-layer core ground node, if the source object, that is, the ingress interface of the network element further includes a tunnel interface, it needs to determine whether the tunnel corresponding to the source object has the configuration of the MPLS-TP-OAM.
Further, before determining whether the MPLS-TP-OAM configuration exists between the tunnel of the source object and the tunnel and the pseudowire of the destination object, the method further includes: when the node type is the three-layer core ground node, acquiring the configuration information of the tunnel corresponding to the host object; when the node type is the bridge node, acquiring the configuration information of the tunnel corresponding to the source object; and acquiring the configuration information of the pseudo wire according to the host object.
Wherein the tunnel is a point-to-multipoint P2MP tunnel.
Further, after sending the alarm mapping relationship to the device corresponding to the network element, the method further includes:
and under the condition that the detection session of the source object fails, setting the continuity and connectivity detection message which is configured in the MPLS-TP-OAM of the host object and stops sending as enabled, and transmitting fault messages according to the alarm mapping relation.
Through the steps, once the network fails and the connection between the main network element and the standby network element fails, the opposite end network connected with the host object knows that the network connected with the source object fails and needs to carry out service switching by setting the host object
Further, when the node type is the three-layer core landing node, the ingress interface of the network element includes an ethernet interface, an ethernet subinterface, an aggregation port or an aggregation subinterface, or a P2MP tunnel interface, the egress interface is a P2MP tunnel interface, and the first network is a third-party network; when the node type is the bridge node, the outgoing interface of the network element is the P2MP tunnel interface, and the first network is an L2VPN network.
Example two
A second embodiment of the present invention further provides a service alarm processing apparatus, and fig. 2 is a first block diagram of the service alarm processing apparatus according to the second embodiment of the present invention, as shown in fig. 2, the apparatus includes:
a setting module 22, configured to set a source object and a destination object of a multicast service of a three-layer virtual private network L3VPN configured on a network element, where the network element is bridged between a first network and the L3VPN network, and the source object and the destination object are respectively connected to the first network and the L3VPN network;
an establishing module 24, configured to establish an alarm mapping relationship between the source object and the sink object;
a sending module 26, configured to send the alarm mapping relationship to a device corresponding to the network element.
Fig. 3 is a block diagram of a second service alarm processing apparatus according to a second embodiment of the present invention, and as shown in fig. 3, the setting module 22 includes:
the query submodule 32 is configured to set a virtual private network routing forwarding VRF as a multicast VRF, and query an access port of the multicast service according to the multicast VRF;
a first setting sub-module 34, configured to set a node type of the network element according to the access port;
the second setting submodule 36 is configured to set the source object and the sink object according to the node type.
Fig. 4 is a block diagram of a third service alarm processing apparatus according to a second embodiment of the present invention, and as shown in fig. 4, the first setting sub-module 34 includes:
a first setting unit 42, configured to set the node type of the network element as a three-layer core ground node when the access port does not include a virtual ethernet type interface;
a second setting unit 44, configured to set the node type of the network element as a bridging node when the access port includes a virtual ethernet type interface.
Fig. 5 is a fourth block diagram of a service alarm processing apparatus according to a second embodiment of the present invention, and as shown in fig. 5, the second setting submodule 36 includes:
a third setting unit 52, configured to, when the node type is the three-layer core ground node, obtain an ingress interface of static multicast configuration information of the multicast service according to the multicast VRF, and set the source object as the ingress interface; acquiring an output interface of the static multicast configuration information according to the multicast VRF, and setting the host object as the output interface;
a fourth setting unit 54, configured to, when the node type is the bridge node, obtain an outgoing interface of the multicast routing configuration information of the multicast service according to the multicast VRF, and set the source object as the outgoing interface; and acquiring the pseudo wire of the L2VPN according to the access port of the multicast service and the service association relationship between the L3VPN and the L2VPN, and setting the host object as the pseudo wire.
Fig. 6 is a block diagram of a service alarm processing apparatus according to a second embodiment of the present invention, and as shown in fig. 6, the establishing module 24 includes:
an obtaining submodule 62, configured to obtain a detection session of the source object, and generate a source tracking detection group according to the detection session;
a binding submodule 64, configured to add the source object into the source tracking detection group, and bind the destination object and the source tracking detection group to generate a corresponding binding relationship;
a determining submodule 66, configured to determine whether the tunnel of the source object and the tunnel and the pseudo wire of the sink object have the configuration of MPLS-TP-OAM;
the establishing submodule 68 is configured to establish the alarm mapping relationship between the source object and the sink object according to the binding relationship in the case that the configuration exists.
Further, the obtaining sub-module 62 is specifically configured to:
when the node type is the three-layer core ground node, setting a three-layer Ethernet interface or a three-layer aggregation port according to the access interface; acquiring a detection session of the source object according to the three-layer Ethernet interface or the three-layer aggregation port, wherein the detection session is an interface type detection session;
when the node type is the bridge node, acquiring the tunnel information of the network element according to the output interface; and acquiring the detection session of the source object according to the tunnel information, wherein the detection session is a multicast tunnel type detection session.
Further, the determination sub-module 66 includes: when the node type is the three-layer core landing node, judging whether the tunnel of the host object has the configuration of the MPLS-TP-OAM;
and when the node type is the bridge node, judging whether the MPLS-TP-OAM configuration exists between the tunnel of the source object and the pseudo wire of the destination object.
Fig. 7 is a block diagram six of a service alarm processing apparatus according to a second embodiment of the present invention, and as shown in fig. 7, the apparatus further includes:
an obtaining module 72, configured to obtain configuration information of the tunnel corresponding to the host object when the node type is the three-layer core ground node; when the node type is the bridge node, acquiring the configuration information of the tunnel corresponding to the source object; and acquiring the configuration information of the pseudo wire according to the host object. Further, the device is arranged in a network manager.
Fig. 8 is a block diagram of a service alarm processing apparatus according to a second embodiment of the present invention, and as shown in fig. 8, the apparatus further includes:
an enabling module 82, configured to set the continuity check message and the connectivity check message that are stopped from being sent by the sink object as enabled when the detection session of the source object fails, and transmit a fault message according to the alarm mapping relationship.
EXAMPLE III
Fig. 9 is a block diagram of a service alarm processing system according to a third embodiment of the present invention, and as shown in fig. 9, the system includes a network manager 92 and a device 94:
the network manager 92 is configured to set a source object and a destination object of a multicast service of a three-layer virtual private network L3VPN configured on a network element, where the network element is bridged between a first network and the L3VPN network, and the source object and the destination object are respectively connected to the first network and the L3VPN network; establishing an alarm mapping relation between the source object and the destination object; and sending the alarm mapping relation to the equipment corresponding to the network element.
The device 94 is configured to receive the alarm mapping relationship sent by the network manager, and establish the alarm mapping between the source object and the sink object.
Example four
In the fourth embodiment, the node type is a three-layer L3 core landing node, and when all fibers are broken at the ingress interface connected between the L3 core landing node network element and the third-party network device, a service alarm map is configured at this time, and a fault is notified to the L3VPN side network, so that protection switching of the L3VPN side network can be realized, and normal transmission of the service is ensured. Fig. 10 is a flowchart of a service alarm processing method according to a fourth embodiment of the present invention, and as shown in fig. 10, the specific implementation steps thereof are described as follows:
step S1001: setting Virtual Routing Forwarding (VRF) as multicast VRF.
Step S1002: analyzing and calculating source object information:
and inquiring and analyzing an input interface of the static multicast configuration information of the multicast service configured by the network element according to the multicast VRF.
The following steps are carried out on the basic information of the service:
step 1: and setting the type of the input interface according to the input interface of the acquired static multicast configuration information, and performing interface conversion calculation. The port types include ethernet interfaces, ethernet subinterfaces, aggregation ports, aggregation subports, point-to-multipoint (P2 multiple point, P2MP) tunnel interfaces. For the child port, converting the name of the child port into a three-layer port corresponding to the parent port, such as an ethernet child interface, which needs to be converted into a corresponding ethernet three-layer port; the aggregation sub-port needs to be converted into a corresponding aggregation port three-layer port, and the same object is filtered;
step 2: a detection session of the incoming interface is calculated. And when the input INTERFACE is a three-layer Ethernet port/a three-layer aggregation port, calculating and outputting the detection session of the INTERFACE type according to the binding relationship between the input INTERFACE and the detection session.
And step 3: calculating the tracking detection group information of each detection session according to the binding relationship between the detection session and the tracking detection group;
and 4, step 4: if the ingress port analyzed in step 1 is a P2MP tunnel interface, performing tunnel information conversion according to the tunnel interface information, and calculating a tunnel carrying the multicast service and service information of the tunnel.
In the fourth embodiment, the source object is an input interface on a network element, and is connected to a third-party network.
Step S1003: analyzing and calculating the information of the host object:
and according to the VRF of the service, inquiring and analyzing the static multicast configuration information of the multicast service configured by the network element, wherein the outgoing interface can only be a P2MP tunnel interface.
The following steps are carried out on the basic information of the service:
step 1: calculating the name of a P2MP tunnel according to the name conversion of a multicast routing output port (P2MP tunnel interface), and calculating MEG information according to the MEG association binding relationship between the tunnel name and MPLS-TP-OAM;
step 2: calculating and generating a detection session message of the MPLS-TP-OAM type according to the binding association relation between the MEG and the detection session;
and step 3: and converting the tunnel information according to the tunnel interface information, and calculating the tunnel bearing the multicast service and the service information of the tunnel.
In the fourth embodiment, the destination object is an outgoing interface on a network element, and is connected to the L3VPN network.
Step S1004: adding the source objects into a source tracking detection group, wherein all objects can be selected, and a part of objects can be selected; binding the host object with the source tracking detection group can select all objects and can select a part of objects.
Step S1005: and verifying the MPLS-TP-OAM configuration of the tunnel of the source object and the tunnel of the destination object, wherein the information of the source object can show whether the MPLS-TP-OAM has the configuration.
Step S1006: and generating an alarm mapping relation between the source object and the destination object according to the binding relation between the destination object and the source tracking detection group, and sending the alarm mapping relation to equipment corresponding to the network element for establishing the mapping relation.
Fig. 11 is a schematic diagram of a service alarm according to a fourth embodiment of the present invention, where a network connected to an L3VPN network is a third-party network. Subsequently, if the detection session managed by the source trace detection group fails, the sink object sets the "Continuity and Connectivity Check (CC) message" of the MPLS-TP-OAM of the tunnel to "enable", and at this time, the third party network connected to the sink object knows that the network connected to the source object fails and needs to perform service switching.
EXAMPLE five
In the fifth embodiment, the node type is a bridge node. When the fiber break occurs at the interface in the incoming direction of the two-layer and three-layer bridge nodes, the service alarm mapping is configured at the moment, the fault is notified to the L2VPN side network, and the L2VPN side network can carry out protection switching to ensure the normal transmission of the service. Fig. 12 is a flowchart of a service alarm processing method according to a fifth embodiment of the present invention, and as shown in fig. 12, the specific implementation steps thereof are described as follows:
step S1101: setting Virtual Routing Forwarding (VRF) as multicast VRF.
Step S1102: analyzing and calculating source object information:
and inquiring and analyzing the multicast routing configuration information of the multicast service configured by the network element according to the multicast VRF.
Step 1: and according to the multicast routing information, calculating next hop configuration information and further calculating a corresponding outgoing interface. Here the egress interface may only be a P2MP tunnel interface.
Step 2: and (2) calculating the name of the P2MP TUNNEL according to the calculated P2MP TUNNEL interface conversion in the step (1), inquiring the TUNNEL information on the network element according to the name, and setting a detection session according to the binding relationship between the TUNNEL and the detection session, wherein the type of the detection session is MTE-TUNNEL type.
And step 3: and calculating and generating the tracking detection group of each detection session according to the binding relationship between the detection session and the detection group.
And 4, step 4: if the P2MP tunnel interface information analyzed in step 1 is converted into tunnel information, the service information of the tunnel bearing the multicast service and the end-to-end tunnel belonging to the tunnel is calculated.
In the fifth embodiment, the source object is an outgoing interface on a network element, and is connected to the L3VPN network.
Step S1103: analyzing and calculating the information of the host object:
step 1: and calculating and generating pseudo wire information of the L2VPN according to the virtual Ethernet port information in the multicast VRF access interface and the business association relation between the L3VPN and the L2 VPN.
Step 2, generating MEG information according to the pseudowire calculated in the step 1 and the MEG association binding relationship of MPLS-TP-OAM;
and step 3: and calculating and generating the MPLS-TP-OAM type detection session according to the MEG information calculated in the step 2 and the binding association relation of the detection session.
And 4, step 4: and (3) analyzing the pseudowire loaded on the network element according to the pseudowire name calculated in the step (1) and generating the end-to-end pseudowire information to which the calculation belongs.
In the fifth embodiment, the source object is a pseudo wire on a network element, and connects the L3VPN network and the L2VPN network.
Step S1104: adding the source objects into a source tracking detection group, wherein all objects can be selected, and a part of objects can be selected; binding the host object with the source tracking detection group can select all objects and can select a part of objects.
Step S1105: and checking the MPLS-TP-OAM configuration of the tunnel of the source object and the pseudo wire of the destination object, wherein whether the MPLS-TP-OAM has the configuration or not can be displayed in the information of the source object and the destination object.
Step S1106: and generating an alarm mapping relation between the source object and the destination object according to the binding relation between the object and the source tracking detection group, and sending the alarm mapping relation to equipment corresponding to the network element for establishing the mapping relation.
Fig. 13 is a schematic view of a service alarm according to a fifth embodiment of the present invention, where a network connected to an L3VPN network is an L2VPN network. Subsequently, if the detection session managed by the source trace detection group fails, the destination object will set the "Continuity and Connectivity Check (CC) message" of the MPLS-TP-OAM of the pseudo wire to "enable", and at this time, the peer network connected to the destination object knows that the L2VPN network connected to the source object fails and needs to perform service switching.
EXAMPLE six
The sixth embodiment of the invention also provides a storage medium. Optionally, in the sixth embodiment, the storage medium may be configured to store program codes for performing the following steps:
s1, setting a source object and a destination object of multicast service of a three-layer virtual private network L3VPN configured on a network element, wherein the network element is bridged between a first network and the L3VPN network, and the source object and the destination object are respectively connected with the first network and the L3VPN network;
s2, establishing the alarm mapping relation between the source object and the host object;
and S3, sending the alarm mapping relation to the equipment corresponding to the network element.
Optionally, in this embodiment, the storage medium may include, but is not limited to: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Alternatively, in the present embodiment, the processor performs the above steps S1, S2, and S3 according to program codes already stored in the storage medium.
Optionally, the specific examples in this embodiment may refer to the examples described in the above embodiments and optional implementation manners, and this embodiment is not described herein again.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and alternatively, they may be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, and in some cases, the steps shown or described may be performed in an order different than that described herein, or they may be separately fabricated into individual integrated circuit modules, or multiple ones of them may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.

Claims (18)

1. A service alarm processing method is characterized by comprising the following steps:
setting a source object and a destination object of multicast service of a three-layer virtual private network (L3 VPN) configured on a network element, wherein the network element is bridged between a first network and the L3VPN network, and the source object and the destination object are respectively connected with the first network and the L3VPN network;
acquiring a detection session of the source object, and generating a source tracking detection group according to the detection session;
adding the source object into the source tracking detection group, and binding the host object and the source tracking detection group to generate a corresponding binding relationship;
judging whether the tunnel of the source object and the tunnel or the pseudo wire of the destination object have the configuration of multi-protocol label switching transmission application operation, management and maintenance MPLS-TP-OAM;
under the condition that the configuration exists, establishing the alarm mapping relation between the source object and the destination object according to the binding relation;
sending the alarm mapping relation to equipment corresponding to the network element;
and under the condition that the detection session of the source object fails, setting the continuity and connectivity detection message which is configured by the host object and stops being sent in the MPLS-TP-OAM as enabled, and transmitting fault messages according to the alarm mapping relation.
2. The method of claim 1, wherein setting the source object and the destination object of the multicast traffic of the L3VPN configured on the network element comprises:
setting a virtual private network route forwarding VRF as a multicast VRF, and inquiring an access port of the multicast service according to the multicast VRF;
setting the node type of the network element according to the access port;
and setting the source object and the destination object according to the node type.
3. The method of claim 2, wherein setting the node type of the network element according to the access port comprises:
when the access port does not comprise a virtual Ethernet type interface, setting the node type of the network element as a three-layer core ground node;
and when the access port comprises a virtual Ethernet type interface, setting the node type of the network element as a bridging node.
4. The method of claim 3, wherein setting the source object and the sink object as a function of the node type comprises:
when the node type is the three-layer core landing node, acquiring an access interface of static multicast configuration information of the multicast service according to the multicast VRF, and setting the source object as the access interface; acquiring an output interface of the static multicast configuration information according to the multicast VRF, and setting the host object as the output interface;
when the node type is the bridge node, acquiring an output interface of multicast routing configuration information of the multicast service according to the multicast VRF, and setting the source object as the output interface; and acquiring the pseudo wire of the L2VPN according to the access port of the multicast service and the service association relation between the L3VPN and the L2VPN, and setting the destination object as the pseudo wire.
5. The method of claim 4, wherein obtaining the detection session for the source object comprises:
when the node type is the three-layer core ground node, setting a three-layer Ethernet interface or a three-layer aggregation port according to the access interface; acquiring a detection session of the source object according to the three-layer Ethernet interface or the three-layer aggregation port, wherein the detection session is an interface type detection session;
when the node type is the bridge node, acquiring tunnel information of the network element according to the output interface; and acquiring the detection session of the source object according to the tunnel information, wherein the detection session is a multicast tunnel type detection session.
6. The method of claim 5, wherein setting the three-tier Ethernet interface or the three-tier aggregation port as a function of the ingress interface comprises:
when the input interface comprises an Ethernet interface or an aggregation port, maintaining the Ethernet interface or the aggregation port unchanged;
and when the input interface comprises an Ethernet sub-interface or an aggregation sub-port, converting the Ethernet sub-interface or the aggregation sub-port into a corresponding Ethernet interface or an aggregation port.
7. The method of claim 4, wherein determining whether the configuration of the MPLS-TP-OAM exists for the tunnel of the source object and the tunnel or pseudowire of the sink object comprises:
when the node type is the three-layer core landing node, judging whether the tunnel of the host object has the configuration of the MPLS-TP-OAM;
and when the node type is the bridge node, judging whether the MPLS-TP-OAM configuration exists in the tunnel of the source object and the pseudo wire of the destination object.
8. The method of any of claims 4-7, wherein prior to determining whether the configuration of the MPLS-TP-OAM exists for the tunnel of the source object and the tunnel and pseudowire of the sink object, the method further comprises:
when the node type is the three-layer core ground node, acquiring configuration information of the tunnel corresponding to the host object;
when the node type is the bridge node, acquiring configuration information of the tunnel corresponding to the source object; and acquiring the configuration information of the pseudo wire according to the host object.
9. The method according to any of claims 4-7, wherein when the node type is the three-layer core ground node, the ingress interface comprises an ethernet interface, an ethernet subinterface, an aggregation port, an aggregation subport, or a tunnel interface, the egress interface is the tunnel interface, and the first network is a third-party network; when the node type is the bridge node, the egress interface is the tunnel interface, and the first network is the L2VPN network.
10. A traffic alarm processing apparatus, comprising:
a setting module, configured to set a source object and a destination object of a multicast service of a three-layer virtual private network L3VPN configured on a network element, where the network element is bridged over a first network and the L3VPN network, and the source object and the destination object are connected to the first network and the L3VPN network, respectively;
the establishing module comprises an obtaining submodule, a binding submodule, a judging submodule and an establishing submodule;
the acquisition submodule is used for acquiring the detection session of the source object and generating a source tracking detection group according to the detection session;
the binding submodule is used for adding the source object into the source tracking detection group, binding the host object with the source tracking detection group and generating a corresponding binding relationship;
the judging submodule is used for judging whether the tunnel of the source object and the tunnel and the pseudo wire of the destination object have the configuration of multi-protocol label switching transmission application operation, management and maintenance MPLS-TP-OAM;
the establishing submodule is used for establishing the alarm mapping relation between the source object and the destination object according to the binding relation under the condition that the configuration exists;
a sending module, configured to send the alarm mapping relationship to a device corresponding to the network element;
and the enabling module is used for setting the sending stopping continuity and connectivity detection messages of the host object as enabling under the condition that the detection session of the source object fails, and transmitting fault messages according to the alarm mapping relation.
11. The apparatus of claim 10, wherein the setup module comprises:
the query submodule is used for setting a virtual private network routing forwarding VRF as a multicast VRF and querying an access port of the multicast service according to the multicast VRF;
the first setting submodule is used for setting the node type of the network element according to the access port;
and the second setting submodule is used for setting the source object and the destination object according to the node type.
12. The apparatus of claim 11, wherein the first setup submodule comprises:
a first setting unit, configured to set a node type of the network element as a three-layer core ground node when the access port does not include a virtual ethernet type interface;
and the second setting unit is used for setting the node type of the network element as a bridging node when the access port comprises a virtual Ethernet type interface.
13. The apparatus of claim 12, wherein the second setup submodule comprises:
a third setting unit, configured to, when the node type is the three-layer core ground node, obtain an ingress interface of static multicast configuration information of the multicast service according to the multicast VRF, and set the source object as the ingress interface; acquiring an output interface of the static multicast configuration information according to the multicast VRF, and setting the host object as the output interface;
a fourth setting unit, configured to, when the node type is the bridge node, obtain an egress interface of multicast routing configuration information of the multicast service according to the multicast VRF, and set the source object as the egress interface; and acquiring the pseudo wire of the L2VPN according to the access port of the multicast service and the service association relation between the L3VPN and the L2VPN, and setting the destination object as the pseudo wire.
14. The apparatus of claim 13, wherein the acquisition submodule is specifically configured to: when the node type is the three-layer core ground node, setting a three-layer Ethernet interface or a three-layer aggregation port according to the access interface; acquiring a detection session of the source object according to the three-layer Ethernet interface or the three-layer aggregation port, wherein the detection session is an interface type detection session;
when the node type is the bridge node, acquiring tunnel information of the network element according to the output interface; and acquiring the detection session of the source object according to the tunnel information, wherein the detection session is a multicast tunnel type detection session.
15. The apparatus of claim 13, the determination submodule specifically configured to:
when the node type is the three-layer core landing node, judging whether the tunnel of the host object has the configuration of the MPLS-TP-OAM;
and when the node type is the bridge node, judging whether the MPLS-TP-OAM configuration exists in the tunnel of the source object and the pseudo wire of the destination object.
16. The apparatus of any of claims 13-15, wherein the apparatus further comprises:
an obtaining module, configured to obtain configuration information of the tunnel corresponding to the host object when the node type is the three-layer core ground node;
when the node type is the bridge node, acquiring configuration information of the tunnel corresponding to the source object; and acquiring the configuration information of the pseudo wire according to the host object.
17. The device according to any of claims 11-15, wherein the device is arranged in a network manager.
18. A service alarm processing system is characterized by comprising a network manager and a device:
the network manager is configured to set a source object and a destination object of a multicast service of a three-layer virtual private network L3VPN configured on a network element, where the network element is bridged between a first network and the L3VPN network, and the source object and the destination object are connected to the first network and the L3VPN network, respectively; acquiring a detection session of the source object, and generating a source tracking detection group according to the detection session; adding the source object into the source tracking detection group, and binding the host object and the source tracking detection group to generate a corresponding binding relationship; judging whether the tunnel of the source object and the tunnel or the pseudo wire of the destination object have the configuration of multi-protocol label switching transmission application operation, management and maintenance MPLS-TP-OAM; under the condition that the configuration exists, establishing the alarm mapping relation between the source object and the destination object according to the binding relation; sending the alarm mapping relation to equipment corresponding to the network element; under the condition that the detection session of the source object is invalid, setting the continuity and connectivity detection message which is configured by the host object and stops being sent in the MPLS-TP-OAM as enabled, and transmitting fault messages according to the alarm mapping relation;
the device is configured to receive the alarm mapping relationship sent by the network manager, and establish the alarm mapping between the source object and the sink object.
CN201610957783.1A 2016-10-27 2016-10-27 Service alarm processing method, device and system Active CN107995008B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610957783.1A CN107995008B (en) 2016-10-27 2016-10-27 Service alarm processing method, device and system
PCT/CN2017/107154 WO2018077124A1 (en) 2016-10-27 2017-10-20 Method, device, and system for service alarm processing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610957783.1A CN107995008B (en) 2016-10-27 2016-10-27 Service alarm processing method, device and system

Publications (2)

Publication Number Publication Date
CN107995008A CN107995008A (en) 2018-05-04
CN107995008B true CN107995008B (en) 2021-07-06

Family

ID=62024336

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610957783.1A Active CN107995008B (en) 2016-10-27 2016-10-27 Service alarm processing method, device and system

Country Status (2)

Country Link
CN (1) CN107995008B (en)
WO (1) WO2018077124A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112887108A (en) * 2019-11-29 2021-06-01 中兴通讯股份有限公司 Fault positioning method, device, equipment and storage medium
CN111124840B (en) * 2019-12-02 2022-02-08 北京天元创新科技有限公司 Method and device for predicting alarm in business operation and maintenance and electronic equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1756182A (en) * 2004-09-30 2006-04-05 华为技术有限公司 Protection switching method in multiprotocol label switching system
CN1812367A (en) * 2005-01-29 2006-08-02 华为技术有限公司 Data transmitting method and system for multi-protocol label exchange network
CN101789879A (en) * 2009-12-30 2010-07-28 中兴通讯股份有限公司 Dynamic maintenance method and device for related link circuits
CN102035681A (en) * 2010-12-17 2011-04-27 中兴通讯股份有限公司 Link protection method and system for virtual private network
CN102611618A (en) * 2012-02-23 2012-07-25 中兴通讯股份有限公司 Route protection converting method and device
CN104468237A (en) * 2014-12-25 2015-03-25 瑞斯康达科技发展股份有限公司 SDH and PTN network alarm linkage method and system applying same
CN105871613A (en) * 2016-03-31 2016-08-17 国网山西省电力公司信息通信分公司 E1 service protection method and system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9118502B2 (en) * 2009-06-16 2015-08-25 Alcatel Lucent Auto VPN troubleshooting
CN102571492B (en) * 2012-01-06 2015-06-03 华为技术有限公司 Method and device for detecting failure of routing equipment
CN102820990B (en) * 2012-02-29 2015-05-13 中兴通讯股份有限公司 Method and device for switching service protection
US8837302B2 (en) * 2012-04-27 2014-09-16 Motorola Mobility Llc Mapping a network fault

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1756182A (en) * 2004-09-30 2006-04-05 华为技术有限公司 Protection switching method in multiprotocol label switching system
CN1812367A (en) * 2005-01-29 2006-08-02 华为技术有限公司 Data transmitting method and system for multi-protocol label exchange network
CN101789879A (en) * 2009-12-30 2010-07-28 中兴通讯股份有限公司 Dynamic maintenance method and device for related link circuits
CN102035681A (en) * 2010-12-17 2011-04-27 中兴通讯股份有限公司 Link protection method and system for virtual private network
CN102611618A (en) * 2012-02-23 2012-07-25 中兴通讯股份有限公司 Route protection converting method and device
CN104468237A (en) * 2014-12-25 2015-03-25 瑞斯康达科技发展股份有限公司 SDH and PTN network alarm linkage method and system applying same
CN105871613A (en) * 2016-03-31 2016-08-17 国网山西省电力公司信息通信分公司 E1 service protection method and system

Also Published As

Publication number Publication date
WO2018077124A1 (en) 2018-05-03
CN107995008A (en) 2018-05-04

Similar Documents

Publication Publication Date Title
CN107819677B (en) Message forwarding method and device
US8406143B2 (en) Method and system for transmitting connectivity fault management messages in ethernet, and a node device
CN102724117B (en) Multi-protocol label switching traffic engineering tunnel establishing method and equipment
US8098649B2 (en) Using network transport tunnels to provide service-based data transport
CN102349277B (en) The intrusion detection of virtual two layers of service
CN104767680B (en) It route the method and apparatus being switched fast
CN107547340B (en) Message forwarding method and device
CN106559280A (en) Bidirectional forwarding detection (BFD) method and device
CN104270309A (en) Method for achieving multi-hop BFD under IP RAN equipment
CN109788018B (en) Cross-domain service intercommunication method, network equipment and storage medium
CN103209125B (en) A kind of transmission method of label information and equipment
WO2016197950A1 (en) Route detection method, router device and system
CN105634935A (en) Device and method for detecting service layer signal failure
CN110661643B (en) Method, network device and medium for network management
CN107995008B (en) Service alarm processing method, device and system
EP2858302A1 (en) Connectivity check method of service stream link, related apparatus and system
CN114553707B (en) Method and device for generating topology information of network and delimiting network faults
CN102404180A (en) Method and system for realizing Operation and Maintenance (OAM) based on Packet Based Networks (PBN) network
CN107659436A (en) A kind of method and device for preventing service disconnection
US20190158638A1 (en) Transmission device and transmission method
CN104219073A (en) Message forwarding method and device in SPBM network
CN114070746B (en) Circuit concatenation method and system for multi-type transmission network
US9647893B2 (en) Method for identifying logical loops in ethernet networks
CN108616908B (en) Network system and data transmission method based on network system
CN106878113B (en) Link connectivity detection method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant