CN1874290A - Method for avoiding message loop - Google Patents

Method for avoiding message loop Download PDF

Info

Publication number
CN1874290A
CN1874290A CNA2005101010779A CN200510101077A CN1874290A CN 1874290 A CN1874290 A CN 1874290A CN A2005101010779 A CNA2005101010779 A CN A2005101010779A CN 200510101077 A CN200510101077 A CN 200510101077A CN 1874290 A CN1874290 A CN 1874290A
Authority
CN
China
Prior art keywords
request message
switching node
label request
message
loop
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2005101010779A
Other languages
Chinese (zh)
Other versions
CN100428730C (en
Inventor
曾南志
胡春哲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB2005101010779A priority Critical patent/CN100428730C/en
Publication of CN1874290A publication Critical patent/CN1874290A/en
Application granted granted Critical
Publication of CN100428730C publication Critical patent/CN100428730C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The method is designed for use in a network with multi multi-jumping pseudo wire switch nodes, and comprises the following steps: each multi-jumping pseudo wire switch node sends a label request message carrying loop detection data to a multi-jumping pseudo wire switch node at next jumping; according to the loop detection data, each multi-jumping switch node decides if a message loop is generated in order to determine the label request message discarded at the time of generating the message loop. The invention can avoid forming loop of label request message between switch nodes caused by improper configuration in multi-jumping condition, when networking of PWE3 network is applied.

Description

A kind of method that prevents message loop
Technical field
The present invention relates to the virtual private network technology of data communication field, more particularly, relate to a kind of method that prevents message loop.
Background technology
Traditional business as telecom operators, lease special line (leased line) can be the communication network that enterprise provides two layers of link, but there is the construction cost height in it, cycle is long, circuit can't be shared, shortcomings such as management difficulty is big, it is many to be not suitable for enterprise customer branch, increase fast characteristics, therefore, along with ATM (asynchronous transfer mode, the abbreviation of Asynchronous Transport Mode) and frame relay (Frame Relay, hereinafter be abbreviated as FR) development of technology, telecom operators begin to adopt virtual circuit (Virtual Circuit) mode that two layers of Connection Service of point-to-point are provided for the client, enterprise sets up the three-layer network of oneself thereon again with the carrying IP (abbreviation of Internet Protocol, Internet protocol), IPX data flow such as (ppp internetwork packet exchange control protocol, the abbreviations of Internet Packet Exchange).Though, the virtual circuit mode is compared with the lease special line, operator provide the time of service short, price is low, but deficiency is arranged also, for example, for VPN (Virtual Private Network Virtual Private Network below is abbreviated as VPN) is provided on different type network (as ATM, FR) professional and Internet business, operator need build, safeguard multiple independently network, and operating cost is still higher; Another shortcoming is that speed is slower, and configuration is complicated, and when increasing a website, the keeper need carry out a large amount of configuration efforts.
At present, because IP network spreads all over the world, utilize existing IP network to be paid close attention to by each big operator gradually for enterprise provides cheaply private network.Therefore, for remedying the deficiency of above technology, a kind of technology of centrex service that provides on IP network is arisen at the historic moment, this technology is multiprotocol label switching (MultipleProtocol Label Switch, below be abbreviated as MPLS) vpn service, IP service and two layers of three-layer VPN service can be provided on same network simultaneously, can set arbitrary velocity easily, and layoutprocedure be simple.Like this, operator just can only manage, move a kind of network, just can provide services such as IP service, three-layer VPN, two-layer VPN, traffic engineering, Differentiated Services simultaneously on this network, thereby greatly reduces the expense of networking, maintenance and operation.
Vpn service based on MPLS has two kinds, is respectively L3 (3, the three layers of Layer) MPLS VPN and L2 (Layer 2, the second layer) MPLS VPN.The very big advantage of L2 MPLS VPN is exactly to avoid getting involved like that to L3VPN user's inside route level, the Maintenance free user's of operator routing iinformation.Along with the continuous development of this technology and application, pseudo wire emulation service (Pseudo wire EmulationEdge-to-Edge hereinafter is abbreviated as PWE3) has end to end been proposed.PWE3 is exactly a kind of L2VPN technology, and it is expanded on the basis of the Martini of original L2VPN technology, has optimized tag distribution protocol (Label DistributionProtocol hereinafter is abbreviated as LDP) signaling and has carried out mutual flow process.The Internet engineering duty group (InternetEngineering Task Force, be abbreviated as IETF) in agreement draft-ietf-pwe3-control-protocol-17.txt, describe new signaling process in detail, mainly be to have increased the Notification message; And in agreement draft-martini-pwe3-segmented-pw-00.txt at original SH-PW (Single-Hop PW, single-hop PW, also claim single-hop pseudo-line) the basis on MH-PW (Multi-hop PW has been proposed, multi-hop PW, also claim multi-hop counterfeit wire) notion, the signaling of pseudo-line exchange and the flow process of forwarding have been described.
Pseudo-line switching technology has solved following three problems: (1) two service provider's edge device can be in different autonomous system (Autonomous System hereinafter is abbreviated as AS) territory; The network type difference of (2) two service provider's edge devices, for example, one is the MPLS network, another is the L2TPv3 network; (3) service provider's edge device performance can't satisfy the demands, and reduces the session number of carrier signaling under the situation of keeping pseudo-line invariable number, allows converging of pseudo-line (Pseudo wire is called for short PW) move.Therefore, pseudo-line service is further expanded, and can stride different AS, can connect MPLS network and L2TPv3 network, to the performance requirement reduction of service provider's edge device.
In the file of draft-ietf-pwe3-segmented-pw-00.txt, mention, when handling the exchange of MPLS control plane, the switching node of multi-hop PW (Switching PE, hereinafter referred is S-PE) be initially in passive state, promptly only at the starting point and the terminal point PE (UltimatePE that receive from the multi-hop PW of an end, hereinafter referred is U-PE) LDP mapping message after, could send LDP mapping message to other end U-PE.This does not have initial LDP mapping information necessary with S-PE and conforms to.
When realizing, S-PE can preserve or not preserve far-end U-PE information.If S-PE preserves far-end U-PE information, S-PE need provide a kind of mechanism, guarantees that these information are from website trusty; Even like this, S-PE also may preserve a large amount of useless far-end U-PE information.If can not solve well, may cause business to be obstructed, system effectiveness is low.
If S-PE itself does not preserve far-end U-PE information, then S-PE must have the ability of transmission label request message (LDP request message), otherwise multi-hop PW can not normally create.For explanation multi-hop counterfeit wire (multi-hop PW) is created the situation of failing, referring to Fig. 1, in Fig. 1, S-PE does not have the ability that sends LDP request message, and the process of creating multi-hop PW is as follows:
1) configuration U-PE1, U-PE1 sends LDP mapping message (message) to S-PE;
2) S-PE receives LDP mapping message, does not find local corresponding data structure, and this message is abandoned;
3) configuration U-PE2, U-PE2 sends LDP mapping message to S-PE;
4) S-PE receives LDP mapping message, does not find local corresponding data structure, and this message is abandoned;
5) configuration S-PE;
6) U-PE1, U-PE2 can initiatively not send LDP mapping message to S-PE again.Multi-hop PW creates failure.
Multi-hop PW does not create the situation of failure when not preserving far-end U-PE information for solving S-PE itself, and solution shown in Figure 2 can be arranged.In Fig. 2, S-PE has the ability that sends LDP request message, and its multi-hop PW constructive process is as follows:
1) configuration U-PE1, U-PE1 sends LDP mapping message to S-PE;
2) S-PE receives LDP mapping message, does not find local corresponding data structure, and this message is abandoned;
3) configuration U-PE2, U-PE2 sends LDP mapping message to S-PE;
4) S-PE receives LDP mapping message, does not find local corresponding data structure, and this message is abandoned;
5) configuration S-PE, S-PE sends LDP request message to U-PE1, U-PE2;
6) U-PE1, U-PE2 respond the LDP request message of receiving, send LDPmapping message to S-PE once more;
7) S-PE with the LDP mapping message of U-PE1 to the U-PE2 transparent transmission, with the LDP mapping message of U-PE2 to the U-PE1 transparent transmission;
8) the PW state up on U-PE1, S-PE, the U-PE2, multi-hop PW creates successfully.
In the superincumbent process, except S-PE can send the LDP request message to U-PE1 and U-PE2, U-PE1 and U-PE2 also must resend LDP mapping message after receiving LDP request message; In like manner, if U-PE does not preserve far-end U-PE information, then U-PE also must have the ability that sends LDP request message.By making U-PE1, S-PE, U-PE2 have the ability that sends LDP request message, can solve in the multi-hop PW constructive process and can not handle the problem that LDP mapping message causes the establishment failure because configuration falls behind.But mis-arrange, above-mentioned constructive process may cause LDP request message and form loop between a plurality of S-PE.Below with reference to Fig. 3, this is illustrated.
In Fig. 3, because S-PE has the ability that sends LDP request message, so, under multi-hop environment, after last S-PE (supposing S-PE3) configuration is finished, LDP request message can be passed through S-PE1, S-PE2 (clockwise direction) successively and be got back to S-PE3, sends to S-PE1 by S-PE3 once more.Like this, LDP request message can be between S-PE1, S-PE2 and S-PE3 Infinite Cyclic.Counterclockwise as the same.As seen, because the mis-arrange in networking is used can produce message loop, thereby cause communication failure.
Summary of the invention
The invention provides a kind of method that prevents message loop, solving when the PWE3 network organizing is used, under multi-hop environment, cause the problem of LDP request message generation loop between S-PE during owing to mis-arrange
In order to solve the problems of the technologies described above, the invention provides following technical scheme: a kind of method that prevents message loop, this method are applied to a network that includes the pseudo-line switching nodes of a plurality of multi-hop lines, may further comprise the steps:
Described each multi-hop counterfeit wire switching node sends and carries the multi-hop counterfeit wire switching node of the label request message of loop detection data to next jumping;
Described arbitrary multi-hop counterfeit wire switching node judges whether to produce message loop according to described loop detection data, when determining to produce message loop, abandons described label request message.
In the above-mentioned method that prevents message loop, described multi-hop counterfeit wire switching node is according to described loop detection data, also comprises step after judging whether to produce message loop: when determining not produce message loop, receive described label request message.
In the above-mentioned method that prevents message loop, described loop detection data are: the IP address of the switching node of label request message process, the switching node number of label request message process or the life span of label request message.
In the above-mentioned method that prevents message loop, when described loop detection data are the IP address of pseudo-line switching node of label request message process, this method specifically comprises: when described each multi-hop counterfeit wire switching node sends label request message, carry this IP addresses of nodes; Described arbitrary multi-hop counterfeit wire switching node checks in the described IP address whether include this IP addresses of nodes, when determining to include this IP addresses of nodes, abandons described label request message.
In the above-mentioned method that prevents message loop, described arbitrary multi-hop counterfeit wire switching node check whether include this IP addresses of nodes in the described IP address after, also comprise step: when determining not comprise this IP addresses of nodes, receive described request message.
In the above-mentioned method that prevents message loop, when switching node number that described loop detection data are the label request message process, this method specifically comprises: when described each multi-hop counterfeit wire switching node sends label request message, described switching node number is added 1; Described arbitrary multi-hop counterfeit wire switching node checks that whether described switching node number surpasses the number that this node allows, and when determining to surpass the number of this node permission, abandons described label request message.
In the above-mentioned method that prevents message loop, after described arbitrary multi-hop counterfeit wire switching node checks whether described switching node number surpasses the number of this node permission, also comprise step: when determining not have to surpass the number of this node permission, receive described label request message.
In the above-mentioned method that prevents message loop, the number that described this node allows is determined when described node configuration.
In the above-mentioned method that prevents message loop, when described loop detection data were the life span of label request message, this method specifically comprised: when described each multi-hop counterfeit wire switching node sends label request message, described life span is subtracted 1; Described arbitrary multi-hop counterfeit wire switching node checks whether described life span is 0, is defined as at 0 o'clock, abandons described label request message.
In the above-mentioned method that prevents message loop, described arbitrary multi-hop counterfeit wire switching node also comprises step after checking whether described life span is 0: determine to be not or not 0 o'clock, receive described label request message.
In the above-mentioned method that prevents message loop, when described label request message is sent for the first time, described life span be set be one greater than 0 numerical value.
In the above-mentioned method that prevents message loop, described loop detection data are pseudo-line switching node type lengths values structured data.
Implement method provided by the invention, can be when the PWE3 network organizing be used, effectively avoid under multi-hop environment, between switching node, forming loop because of mis-arrange causes the tag distribution protocol label request message, by timely detection and effective the processing to loop, thereby clear away the obstacles for PWE3 networking application, improve running efficiency of system.
Description of drawings
Fig. 1 is in the prior art, when S-PE can not preserve far-end U-PE message, the process schematic diagram that multi-hop PW creates failure takes place;
Fig. 2 is in the prior art, and after S-PE transmission LDP request message, multi-hop PW creates successful process schematic diagram;
Fig. 3 is in the prior art of Fig. 2, and the schematic diagram of multi-hop PW request message loop takes place during mis-arrange.
Embodiment
Embodiment 1
Under multi-hop environment, utilize first embodiment of the inventive method, in LDP Request message, comprise the IP address of the S-PE of message process exactly, its IP address is with pseudo-line switching node type lengths values structure (PWswitching point TLV) record.The data structure details of PW switching point TLV is as follows:
0 1 2 3
0?1?2?3?4?5?6?7?8?9?0?1?2?3?4?5?6?7?8?9?0?1?2?3?4?5?6?7?8?9?0?1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|1|0| PW?sw?TLV (0x096B) | PW?sw?TLV?Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Length | Variable?Length?Value |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Variable?Length?Value |
| ″ |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Wherein:
-PW sw TLV Length, whole byte total length of regulation back, PW exchange point TLV territory
-Type is used for explanation coding Value territory and how is explained
-Length is used for the byte length in regulation Value territory
-Value is by the byte serial of the Length byte length of Type territory regulation coded message to be explained
Wherein, Type territory and Values territory are allocated as follows
Type Length Description (description)
0,x00 0 Reserved (reservation)
0,x01 4 PW ID of last PW traversed (PW of Jing Li PW sign at last)
0x02 variable PW Switching Point description string (PW exchange point description string)
0x03 4 IP?address?of?PW?Switching?Point(Optional)
(the IP address (optional) of PW exchange point)
In the present embodiment with the TYPE=0X03 in the above-mentioned data structure, the data field of LENGTH=4 " IP address ", write down the IP address information of the S-PE of this message process, the inspection of the IP address of the S-PE of the process that writes down in the message of utilization to LDP request comes detect-message whether loop takes place.Concrete steps are as follows:
When 1, S-PE sends LDP request message, oneself IP address is joined in the LDP request message with PW switching point TLV form;
When 2, S-PE receives LDP request message, whether there is the IP address of this S-PE in the IP address of the S-PE of this message process that inspection is wherein write down.If exist, illustrate to have produced loop that at this moment, S-PE abandons this LDP request message.If there is no, then continue to handle this message.
In Fig. 3, suppose that S-PE3 is last configuration.So, when after the LDP request message that S-PE3 sends is passed through S-PE1, S-PE2 in a clockwise direction, getting back to S-PE3, in the time of among the Already in current received PW switching point TLV in IP address of S-PE3 discovery oneself, then produced loop, made the processing that abandons this LDP request message for detecting this LDP request message.As the same to anticlockwise processing of LDPrequest message and effect.As seen, use method of the present invention, send the S-PE of LDP request message, the IP address of its S-PE is recorded among the PW switching point TLV that S-PE carries in LDP request message, receive the S-PE of LDP request message, whether the IP address of checking oneself is in PW switching point TLV; If the IP address of oneself is present among the PW switching point TLV, LDP request message is abandoned by this S-PE.So just can effectively avoid because the networking mis-arrange causes message LDP request to form the generation of loop between S-PE.
Embodiment 2
Use method provided by the invention, can increase a kind of definition of new data type for PW switching point TLV, its type coding can be distributed by IANA, is assumed to be 0x04, in order to the S-PE number of record LDP Request message process.。Should newly-increased data structure be defined as follows
Type Length Description
0x04 1 Hop?Count?of?PW?Switching?Point?traversed
The step of the detect-message loop of embodiment 2 is as follows:
1, when S-PE sends LDP request message, the counting among the PW switching point TLV is added 1;
2, when S-PE receives LDP request message, check whether the counting among the PW switching pointTLV wherein reaches the maximum of configuration;
If 3 reach maximum, illustrate to have produced loop that S-PE abandons this LDP request message immediately.Otherwise, continue to handle this message.
Wherein, the peaked setting that allows ring to go through counting relates to concrete realization, for example can determine this maximum in the layoutprocedure on S-PE.
Embodiment 3
Embodiment 3 is by the message of carrying PW switching point TLV, under multi-hop environment, the expection life span is counted down automatically, the result that counts down is kept in the described unit that counts down, the definition of this unit that counts down a kind of new data type TTL (life span) that to be exactly us increase for PW switching point TLV, its type coding can be distributed by IANA, is assumed to be 0x05, length is 1, in order to the life span of record LDPRequest message.Specifically describe as follows:
Type Length Description
0x05 1 TTL(Time?To?Live)field?value
In embodiment 3, detection has or not the step of message loop as follows under multi-hop environment:
1, when LDP request message is issued for the first time, in the described unit that counts down, is provided with one greater than 0 initial value by the S-PE that starts;
2, any one S-PE is receiving LDP request message, judges at first whether the data value of this down counter is 0;
If 3 these down counter numerical value are 0, expression produces message loop, and S-PE abandons this LDP request message; If the value of being somebody's turn to do is non-vanishing, S-PE subtracts 1 with this down counter, continues then to handle.
Allow the peaked setting unification of the S-PE jumping figure of process can not satisfy different multi-hop PW with embodiment 2 and require, embodiment 3 adopts " TTL " method can avoid this point.Multi-hop PW can each comfortable message far-end the maximum of jumping figure is set, the original maximum of down counter promptly is set.
Embodiment 2, embodiment 3 and embodiment 1 different place is, utilizes counting or the method for counting down to detect the loop, under multi-hop environment, and may be with the path of message process is long and erroneous judgement is loop.But the path is long also should be avoided in networking.And the method for the recording messages process node IP address that the embodiment of the invention 1 adopts, for the identification loop, the result is more accurate.

Claims (12)

1, a kind of method that prevents message loop, this method are applied to a network that includes the pseudo-line switching nodes of a plurality of multi-hop lines, it is characterized in that, may further comprise the steps:
Described each multi-hop counterfeit wire switching node sends and carries the multi-hop counterfeit wire switching node of the label request message of loop detection data to next jumping;
Described arbitrary multi-hop counterfeit wire switching node judges whether to produce message loop according to described loop detection data, when determining to produce message loop, abandons described label request message.
2, method according to claim 1, it is characterized in that: described multi-hop counterfeit wire switching node is according to described loop detection data, also comprise step after judging whether to produce message loop: when determining not produce message loop, receive described label request message.
According to the described method of claim 1, it is characterized in that 3, described loop detection data are: the IP address of the switching node of label request message process, the switching node number of label request message process or the life span of label request message.
4, according to the described method of claim 3, it is characterized in that, when described loop detection data were the IP address of pseudo-line switching node of label request message process, this method specifically comprised: when described each multi-hop counterfeit wire switching node sends label request message, carry this IP addresses of nodes; Described arbitrary multi-hop counterfeit wire switching node checks in the described IP address whether include this IP addresses of nodes, when determining to include this IP addresses of nodes, abandons described label request message.
5, according to the described method of claim 4, it is characterized in that, described arbitrary multi-hop counterfeit wire switching node check whether include this IP addresses of nodes in the described IP address after, also comprise step: when determining not comprise this IP addresses of nodes, receive described request message.
6, according to the described method of claim 3, it is characterized in that, when switching node number that described loop detection data are the label request message process, this method specifically comprises: when described each multi-hop counterfeit wire switching node sends label request message, described switching node number is added 1; Described arbitrary multi-hop counterfeit wire switching node checks that whether described switching node number surpasses the number that this node allows, and when determining to surpass the number of this node permission, abandons described label request message.
7, according to the described method of claim 6, it is characterized in that, described arbitrary multi-hop counterfeit wire switching node also comprises step after checking whether described switching node number surpasses the number of this node permission: when determining not have to surpass the number of this node permission, receive described label request message.
According to the described method of claim 7, it is characterized in that 8, the number that described this node allows is determined when described node configuration.
According to the described method of claim 3, it is characterized in that 9, when described loop detection data were the life span of label request message, this method specifically comprised: when described each multi-hop counterfeit wire switching node sends label request message, described life span is subtracted 1; Described arbitrary multi-hop counterfeit wire switching node checks whether described life span is 0, is defined as at 0 o'clock, abandons described label request message.
According to the described method of claim 9, it is characterized in that 10, described arbitrary multi-hop counterfeit wire switching node also comprises step after checking whether described life span is 0: determine to be not or not 0 o'clock, receive described label request message.
11, according to the described method of claim 9, it is characterized in that, when described label request message is sent for the first time, described life span is set is one greater than 0 numerical value.
According to the described method of claim 1, it is characterized in that 12, described loop detection data are pseudo-line switching node type lengths values structured data.
CNB2005101010779A 2005-11-02 2005-11-02 Method for avoiding message loop Active CN100428730C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005101010779A CN100428730C (en) 2005-11-02 2005-11-02 Method for avoiding message loop

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005101010779A CN100428730C (en) 2005-11-02 2005-11-02 Method for avoiding message loop

Publications (2)

Publication Number Publication Date
CN1874290A true CN1874290A (en) 2006-12-06
CN100428730C CN100428730C (en) 2008-10-22

Family

ID=37484563

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005101010779A Active CN100428730C (en) 2005-11-02 2005-11-02 Method for avoiding message loop

Country Status (1)

Country Link
CN (1) CN100428730C (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101335656B (en) * 2007-06-26 2011-08-24 株式会社日立制作所 Node device and obstacle detecting method
CN102595358A (en) * 2011-11-25 2012-07-18 中兴通讯股份有限公司 Processing method and device for preventing short message from circulating
WO2019128612A1 (en) * 2017-12-25 2019-07-04 华为技术有限公司 Method and device for processing routing protocol packet

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5602839A (en) * 1995-11-09 1997-02-11 International Business Machines Corporation Adaptive and dynamic message routing system for multinode wormhole networks
US5889847A (en) * 1996-09-12 1999-03-30 Alcatel Usa Sourcing, L.P. Method for signalling connection control part message loop prevention
CN1145326C (en) * 2001-05-16 2004-04-07 华为技术有限公司 Method for conrolling short message retransmission time
CN1581797A (en) * 2003-08-11 2005-02-16 中兴通讯股份有限公司 Method for solving signaling dead circle caused from whole-code addressing in communication network
US20050147104A1 (en) * 2003-12-29 2005-07-07 Hamid Ould-Brahim Apparatus and method for multihop MPLS/IP/ATM/frame relay/ethernet pseudo-wire

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101335656B (en) * 2007-06-26 2011-08-24 株式会社日立制作所 Node device and obstacle detecting method
CN102595358A (en) * 2011-11-25 2012-07-18 中兴通讯股份有限公司 Processing method and device for preventing short message from circulating
WO2013075451A1 (en) * 2011-11-25 2013-05-30 中兴通讯股份有限公司 Processing method and device for preventing short message loop
WO2019128612A1 (en) * 2017-12-25 2019-07-04 华为技术有限公司 Method and device for processing routing protocol packet

Also Published As

Publication number Publication date
CN100428730C (en) 2008-10-22

Similar Documents

Publication Publication Date Title
CN1913523A (en) Method for implementing layer level virtual private exchange service
CN1848804A (en) Data message transmitting method and node equipment based on MPLS TE tunnel
CN1909501A (en) Method for end to end service rapid convergence and route device
CN1863074A (en) System and method for implementing OAM function of ethernet and multi-protocol tag exchange network
CN101043386A (en) Method for notifying pseudo-lines fault based on bidirectional transmission detecting protocol
CN1866923A (en) Method and system for realizing binding interface edge-to-edge pseudo wire simulation service
CN1705292A (en) Route selection method for implementing cross-domain constraint-based routing
CN101035019A (en) Fast convergence method and device of the end-to-end service
CN1968163A (en) Method for service channel detection and system for providing the same
CN1863069A (en) Method for implementing fast switching of virtual special LAN service
CN1878135A (en) Method for judging pseudo wire connection state in packet-switching network and service apparatus
US11799772B2 (en) Support for multiple virtual networks over an underlay network topology
CN101047636A (en) Method and system for end-to-end pseudo-line simulation virtual leased line access virtual special network
CN101052022A (en) System and method for virtual special net user to access public net
CN1863129A (en) System based on two layer VPN foreign medium communication and method thereof
CN100338928C (en) Method for setting two-way virtual circuit in radio network
CN1750504A (en) Route repeating method in network
CN1863127A (en) Method for core network access to multi-protocol sign exchange virtual special network
CN1874302A (en) Method of phantom lines in multiple hops for building simulation of phantom line from end to end
CN1842034A (en) Multi protocol label exchange performance supervision ability notifying and arranging method
CN1870637A (en) Method for implementing virtual circuit state consistency in virtual special local network service
CN1874290A (en) Method for avoiding message loop
CN1283071C (en) Method for assigning route in network
CN1863148A (en) Method for implementing interaction BPDU message between VLAN apparatus through two layer tunnel network
CN101047625A (en) Strategy route device and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant