WO2008119275A1 - Failure monitoring method and device for virtual leased line - Google Patents

Failure monitoring method and device for virtual leased line Download PDF

Info

Publication number
WO2008119275A1
WO2008119275A1 PCT/CN2008/070349 CN2008070349W WO2008119275A1 WO 2008119275 A1 WO2008119275 A1 WO 2008119275A1 CN 2008070349 W CN2008070349 W CN 2008070349W WO 2008119275 A1 WO2008119275 A1 WO 2008119275A1
Authority
WO
WIPO (PCT)
Prior art keywords
packet
fault
link
leased line
link protocol
Prior art date
Application number
PCT/CN2008/070349
Other languages
French (fr)
Chinese (zh)
Inventor
Changbao Liu
Kang Zi
Original Assignee
Huawei Technologies Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co., Ltd. filed Critical Huawei Technologies Co., Ltd.
Publication of WO2008119275A1 publication Critical patent/WO2008119275A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/102Gateways
    • H04L65/1043Gateway controllers, e.g. media gateway control protocol [MGCP] controllers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/305Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/10Digital recording or reproducing
    • G11B20/10009Improvement or modification of read or write signals
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/10Digital recording or reproducing
    • G11B20/10009Improvement or modification of read or write signals
    • G11B20/10305Improvement or modification of read or write signals signal quality assessment
    • G11B20/10398Improvement or modification of read or write signals signal quality assessment jitter, timing deviations or phase and frequency errors
    • G11B20/10425Improvement or modification of read or write signals signal quality assessment jitter, timing deviations or phase and frequency errors by counting out-of-lock events of a PLL
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03LAUTOMATIC CONTROL, STARTING, SYNCHRONISATION OR STABILISATION OF GENERATORS OF ELECTRONIC OSCILLATIONS OR PULSES
    • H03L7/00Automatic control of frequency or phase; Synchronisation
    • H03L7/06Automatic control of frequency or phase; Synchronisation using a reference signal applied to a frequency- or phase-locked loop
    • H03L7/08Details of the phase-locked loop
    • H03L7/085Details of the phase-locked loop concerning mainly the frequency- or phase-detection arrangement including the filtering or amplification of its output signal
    • H03L7/091Details of the phase-locked loop concerning mainly the frequency- or phase-detection arrangement including the filtering or amplification of its output signal the phase or frequency detector using a sampling device
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/03Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words
    • H03M13/23Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using convolutional codes, e.g. unit memory codes
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/29Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes combining two or more codes or code structures, e.g. product codes, generalised product codes, concatenated codes, inner and outer codes
    • H03M13/2903Methods and arrangements specifically for encoding, e.g. parallel encoding of a plurality of constituent codes
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/29Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes combining two or more codes or code structures, e.g. product codes, generalised product codes, concatenated codes, inner and outer codes
    • H03M13/2957Turbo codes and decoding
    • H03M13/2993Implementing the return to a predetermined state, i.e. trellis termination
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/63Joint error correction and other techniques
    • H03M13/635Error control coding in combination with rate matching
    • H03M13/6356Error control coding in combination with rate matching by repetition or insertion of dummy data, i.e. rate reduction
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/63Joint error correction and other techniques
    • H03M13/635Error control coding in combination with rate matching
    • H03M13/6362Error control coding in combination with rate matching by puncturing
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M7/00Conversion of a code where information is represented by a given sequence or number of digits to a code where the same, similar or subset of information is represented by a different sequence or number of digits
    • H03M7/30Compression; Expansion; Suppression of unnecessary data, e.g. redundancy reduction
    • H03M7/40Conversion to or from variable length codes, e.g. Shannon-Fano code, Huffman code, Morse code
    • H03M7/4006Conversion to or from arithmetic code
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/25Arrangements specific to fibre transmission
    • H04B10/2575Radio-over-fibre, e.g. radio frequency signal modulated onto an optical carrier
    • H04B10/25752Optical arrangements for wireless networks
    • H04B10/25753Distribution optical network, e.g. between a base station and a plurality of remote units
    • H04B10/25754Star network topology
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/24Radio transmission systems, i.e. using radiation field for communication between two or more posts
    • H04B7/26Radio transmission systems, i.e. using radiation field for communication between two or more posts at least one of which is mobile
    • H04B7/2628Radio transmission systems, i.e. using radiation field for communication between two or more posts at least one of which is mobile using code-division multiple access [CDMA] or spread spectrum multiple access [SSMA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J13/00Code division multiplex systems
    • H04J13/0077Multicode, e.g. multiple codes assigned to one user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J13/00Code division multiplex systems
    • H04J13/16Code allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0064Concatenated codes
    • H04L1/0066Parallel concatenated codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0067Rate matching
    • H04L1/0068Rate matching by puncturing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/03Shaping networks in transmitter or receiver, e.g. adaptive shaping networks
    • H04L25/03006Arrangements for removing intersymbol interference
    • H04L25/03012Arrangements for removing intersymbol interference operating in the time domain
    • H04L25/03019Arrangements for removing intersymbol interference operating in the time domain adaptive, i.e. capable of adjustment during data reception
    • H04L25/03038Arrangements for removing intersymbol interference operating in the time domain adaptive, i.e. capable of adjustment during data reception with a non-recursive structure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/38Synchronous or start-stop systems, e.g. for Baudot code
    • H04L25/40Transmitting circuits; Receiving circuits
    • H04L25/49Transmitting circuits; Receiving circuits using code conversion at the transmitter; using predistortion; using insertion of idle bits for obtaining a desired frequency spectrum; using three or more amplitude levels ; Baseband coding techniques specific to data transmission systems
    • H04L25/497Transmitting circuits; Receiving circuits using code conversion at the transmitter; using predistortion; using insertion of idle bits for obtaining a desired frequency spectrum; using three or more amplitude levels ; Baseband coding techniques specific to data transmission systems by correlative coding, e.g. partial response coding or echo modulation coding transmitters and receivers for partial response systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/48Message addressing, e.g. address format or anonymous messages, aliases
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/58Message adaptation for wireless communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1101Session protocols
    • H04L65/1104Session initiation protocol [SIP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/304Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy based on error correction codes, e.g. McEliece
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72415User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories for remote control of appliances
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M7/00Arrangements for interconnection between switching centres
    • H04M7/12Arrangements for interconnection between switching centres for working between exchanges having different types of switching equipment, e.g. power-driven and step by step or decimal and non-decimal
    • H04M7/1205Arrangements for interconnection between switching centres for working between exchanges having different types of switching equipment, e.g. power-driven and step by step or decimal and non-decimal where the types of switching equipement comprises PSTN/ISDN equipment and switching equipment of networks other than PSTN/ISDN, e.g. Internet Protocol networks
    • H04M7/1295Details of dual tone multiple frequency signalling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/10Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
    • H04N19/102Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the element, parameter or selection affected or controlled by the adaptive coding
    • H04N19/103Selection of coding mode or of prediction mode
    • H04N19/109Selection of coding mode or of prediction mode among a plurality of temporal predictive coding modes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/10Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
    • H04N19/134Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the element, parameter or criterion affecting or controlling the adaptive coding
    • H04N19/136Incoming video signal characteristics or properties
    • H04N19/137Motion inside a coding unit, e.g. average field, frame or block difference
    • H04N19/139Analysis of motion vectors, e.g. their magnitude, direction, variance or reliability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/60Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using transform coding
    • H04N19/625Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using transform coding using discrete cosine transform [DCT]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/90Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using coding techniques not provided for in groups H04N19/10-H04N19/85, e.g. fractals
    • H04N19/91Entropy coding, e.g. variable length coding [VLC] or arithmetic coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC
    • H04W52/30TPC using constraints in the total amount of available transmission power
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/12Setup of transport tunnels
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2115Third party
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/22Signal processing not specific to the method of recording or reproducing; Circuits therefor for reducing distortions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/34Signalling channels for network management communication
    • H04L41/342Signalling channels for network management communication between virtual entities, e.g. orchestrators, SDN or NFV entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/40Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0823Errors, e.g. transmission errors
    • H04L43/0829Packet loss
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/20Arrangements for monitoring or testing data switching networks the monitoring system or the monitored elements being virtualised, abstracted or software-defined entities, e.g. SDN or NFV
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/1016IP multimedia subsystem [IMS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42221Conversation recording systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • H04W72/23Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data
    • H04W8/245Transfer of terminal data from a network towards a terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/26Network addressing or numbering for mobility support
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices
    • H04W88/085Access point devices with remote components
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S370/00Multiplex communications
    • Y10S370/901Wide area network
    • Y10S370/902Packet switching
    • Y10S370/903Osi compliant network
    • Y10S370/906Fiber data distribution interface, FDDI
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S370/00Multiplex communications
    • Y10S370/901Wide area network
    • Y10S370/902Packet switching
    • Y10S370/903Osi compliant network
    • Y10S370/907Synchronous optical network, SONET

Definitions

  • the present invention relates to the field of information technology, and in particular, to a fault monitoring method for a virtual leased line and
  • VLL Virtual Leased Line
  • the VLL service is a point-to-point connection. If any fault occurs in the network, the VLL service is interrupted, which reduces the reliability of the VLL service. Sex.
  • the prior art proposes a VLL-based Fast Reroute (FRR) method.
  • FRR Fast Reroute
  • a primary PW (Pseudo wire) is established between the other party and the local provider.
  • a backup PW is established between the other party and the local backup server to protect the primary PW.
  • AC Attachment circuit
  • BFD bidirectional forwarding detection
  • Ethernet can use 802.1ag or 802.1ah, asynchronous transmission ATM (Asynchronous Transfer Mode)
  • the network can use ATM operation and maintenance ( ATM OAM, ATM Operation and Maintenance) cells, etc.
  • the ground supply terminal informs the other party's supply terminal through PW signaling or other means, and the other party's supply end receives After the remote fault occurs, the switch is switched from the primary PW to the backup PW, and the data is also switched from the PW to the backup PW. After the BFD detects that the primary PW is faulty, the other end of the supply switches the VLL service to the backup PW.
  • different AC fault detection modes can be used for different networks, 802.1ag or 802.1a for Ethernet, ATM OAM for ATM, such as Remote Defect Indication (RDI) and ⁇ 1 AIS (Alarm Indication Signal).
  • RTI Remote Defect Indication
  • ⁇ 1 AIS Alarm Indication Signal
  • the link is divided into two cases: One case is the heterogeneous medium interconnection (for example, the other party and the other party, the local provider and the local client, the local backup provider and the local client are independent) Negotiate the link state. At this time, the AC can use the mechanism of the link protocol itself to detect the fault. In another case, the same medium is interconnected. In this case, the link between the peer user and the local user needs to be connected through the PW. Negotiation, and the link negotiation packet is transparently transmitted on the other party's supply end.
  • PPP Point-to-Point Protocol
  • FR Frame Relay
  • HDLC Advanced Data Link Control
  • the embodiment of the invention provides a fault monitoring method and device for a virtual leased line, and the method can also detect the fault of the AC link in the case that the device is interconnected in the same medium.
  • An embodiment of the present invention provides a fault monitoring method for a virtual leased line, where the method includes: receiving, from a virtual leased line, a text sent by a local client to a client of the other party;
  • the embodiment of the present invention further provides a fault monitoring device for a virtual leased line, where the device includes: a receiving unit, configured to receive a message from a virtual leased line;
  • the monitoring unit is configured to determine whether the packet received by the receiving unit is a link protocol packet, and when the packet is a link protocol packet, determine whether the link protocol packet is a fault packet.
  • the received packet is a chain.
  • the received packet is a link protocol packet
  • the VLL service is in the same medium, the VLL service can be quickly rerouted according to the detected fault according to the link fault.
  • the reliability of the VLL service can be effectively protected.
  • FIG. 1 is a schematic diagram of a VLL networking in the prior art
  • FIG. 2 is a flowchart of an implementation manner of a fault monitoring method for a virtual leased line according to the present invention
  • FIG. 3 is a schematic diagram of an embodiment of a fault monitoring device for a virtual leased line of the present invention. detailed description
  • An embodiment of the present invention provides a method and a device for detecting a fault of a virtual leased line.
  • the method first receives a packet sent by a local user end to a client end from a virtual leased line, and determines whether the received packet is a link protocol packet. If the packet is a link protocol packet, it is determined whether the link protocol packet is a fault packet.
  • FIG. 2 is a flowchart of an embodiment of a method according to the present invention. The following describes the embodiment in detail with reference to FIG. 1 and FIG. 2. It is assumed that the local supply end of FIG. 1 is PE2a, and the local user end is CE2, local backup supply. The end is PE2b, the other end is the PE1, and the other end is the CE1.
  • the implementation includes:
  • the local provider receives the interception identifier of the link protocol, and uses the interception identifier to trigger a link protocol monitoring function on the interface between the local user end and the supply end, wherein the interception identifier is a flag that needs to be monitored, and the local supply
  • the link protocol listening function of the interface can be triggered only after receiving the interception identifier.
  • the packet sent by the local client to the client is received, for example, the interface sent by CE2 to CE1 is received through the interface of the PE2a and the CE2.
  • the link protocol packet is used to forward the AC link (for example, the AC link is normal or faulty) to the other party's provider.
  • the link protocol packet is defined by the protocol itself.
  • the VLL forwards the link protocol text to the other client, and copies the link protocol message, and then sends the link protocol message to the local processing unit (CPU).
  • CPU central processing unit
  • the local provider determines, according to the data content of the received packet, whether the link protocol packet is a fault message, and if yes, performs 206, otherwise, the process ends.
  • the data content of the packet includes a packet identifier, and the identifier can distinguish whether the packet is a fault packet or a normal packet.
  • the local provider drives the local link protocol state machine according to the received link protocol packet to ensure that the state can be migrated normally.
  • the link protocol state machine of the local interface includes two states, UP state and DOWN state.
  • the UP state indicates that it is available, and the DOWN state indicates that it is unavailable.
  • the link protocol packets are classified into normal packets and fault packets.
  • the current state of the state machine is DOWN. If the link protocol packet is a fault packet, the state is The machine is still in the DOWN state. If the link protocol packet is a normal packet, the state machine is migrated from the DOWN state to the UP state.
  • the state machine transitions from the UP state to the DOWN state. If the link protocol packet is a normal packet, the state machine is still in the UP state.
  • the other party's supply end determines whether there is a backup PW on the virtual leased line. If yes, execute 208, otherwise the process ends.
  • the other party's supply end switches from the primary PW to the backup PW.
  • the link protocol packet is a fault recovery packet according to the data content of the received packet
  • the result of the determination is also notified to the other party by using other methods such as VLL signaling or BFD, and the other party supplies the Switch from the backup PW to the primary PW.
  • the primary PW is the link between PE1 and PE2a
  • the backup PW is the link between PE1 and PE2b.
  • the switch from the primary PW to the backup PW is switched from the link between PE1 and PE2a.
  • the local provider of FIG. 1 is PE2a
  • the local client is CE2
  • the local backup provider is PE2b
  • the other party is PE1
  • the other client is CE1.
  • the link protocol monitoring function is enabled on the interface between PE2a and CE2.
  • CE2 sends a packet to CE1 through the interface between PE2a and CE2
  • PE2a determines that the packet is a link protocol packet and uses VLL signaling.
  • the packet is forwarded to the CE2 for processing.
  • the packet is copied and sent to the local CPU.
  • the PE2a drives the local link protocol state machine according to the received link protocol packet to ensure that the state can be migrated normally. .
  • PE2a When PE2a detects that the link protocol packet sent from CE2 to CE1 is a faulty packet, PE2a notifies PE1 to switch from the primary PW to the backup PW through VLL signaling or BFD. For example, PE2a listens to the report sent by CE2 to CE1. When the link is a Link Control Protocol Terminal packet, the PE1 is advertised by the VLL signaling or other means to switch the PE1 from the primary PW to the backup PW. When PE2a detects that the link protocol packet sent from CE2 to CE1 is a fault recovery packet, the device detects that the link fault of the PE1 link has been restored through VLL signaling or other means. PE1 normally switches back from the backup PW to the primary PW.
  • PE2a Based on the received link protocol packet, PE2a drives the local link protocol state machine, for example, from the UP state to the DOWN state or from the DOWN state to the UP state. This ensures that the state can be migrated normally.
  • PE2a needs to listen to the packets sent from CE1 to CE2. If the packet is a link protocol packet, the packet needs to be forwarded to CE2. If the packet is detected by PE2a, the packet is faulty. It is not necessary to notify PE1 to switch from the primary PW to the backup PW, but the packet needs to be sent to the CPU of the other client to drive the link protocol state machine of the local interface to ensure normal migration between the states.
  • the embodiment of the present invention also provides a fault monitoring device for a virtual leased line.
  • the device includes a trigger unit 301, a receiving unit 302, a listening unit 303, and a switching unit 306.
  • the triggering unit 301 is configured to receive a listening identifier of the link protocol, and trigger a link protocol monitoring function according to the intercepting identifier.
  • the receiving unit 302 is configured to receive, after triggering the link protocol monitoring function, the information sent by the local client to the other client from the virtual leased line.
  • the listening unit 303 includes:
  • the first determining unit 304 is configured to determine, according to the packet type flag of the received packet header, whether the receiving unit 302 is the link protocol text, and when the text is a link protocol text, the fourth determining unit is configured to: The text is copied and sent to the central processing unit of the local client;
  • the second judging unit 305 is configured to determine, according to the data content of the received packet, whether the packet is a fault packet or a fault recovery packet, and determine the packet when the first judging unit 304 obtains the link protocol packet The result is sent to the switching unit 306.
  • the switching unit 306 is configured to determine whether there is a backup pseudo link on the virtual leased line, and the backup pseudo link exists on the virtual leased line, and the second judging unit 305 obtains the result of the fault message from the main pseudo chain.
  • the road switches to the backup pseudo link and switches from the backup pseudo link to the primary pseudo link when the second judging unit 305 obtains that the message is the result of the failure recovery text.
  • the embodiment of the present invention first determines whether the received packet is a link protocol packet, and determines whether the packet is a fault packet when the received packet is a link protocol packet, and the existing packet is The technology compares the link protocol packets to the transparent transmission.
  • the VLL service when the VLL service is in the same medium, the AC link can be faulty at any position according to the link protocol packet, thereby In the embodiment of the present invention, the VLL service can be quickly rerouted according to the detected fault, thereby effectively protecting the reliability of the VLL service.
  • the packet when the packet is a link protocol packet, the packet needs to be sent to the CPU of the local user end, so that the local link protocol state machine can be driven, thereby ensuring each state of the state machine.
  • the migration can be performed normally.
  • the embodiment of the present invention switches from the primary PW to the backup PW when the packet is a faulty packet, and the packet is switched from the backup PW to the primary when the packet is a fault recovery packet.
  • the VLL service is not interrupted when the AC link fails, thereby improving the reliability of the VLL service.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Probability & Statistics with Applications (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Discrete Mathematics (AREA)
  • Bioethics (AREA)
  • Mathematical Physics (AREA)
  • Spectroscopy & Molecular Physics (AREA)
  • General Business, Economics & Management (AREA)
  • Power Engineering (AREA)
  • Health & Medical Sciences (AREA)
  • Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Computing Systems (AREA)
  • Electromagnetism (AREA)
  • Maintenance And Management Of Digital Transmission (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A failure monitoring method for a virtual leased line is provided, and the method includes: receiving a message sent by a local user end to an opposite user end from the virtual leased line; judging whether the received message is a link protocol message; and when the message is a link protocol message, judging whether the link protocol message is a failure message. In addition, a failure monitoring device for a virtual leased line is provided, and the device can monitor the failure occurring in any position of the link when the same media are interconnected, and can fast reroute the virtual leased line service according to the monitored failure.

Description

虛拟租用线路的故障监听方法与装置  Fault monitoring method and device for virtual leased line
本申请要求于 2007 年 4 月 2 日提交中国专利局、 申请号为 200710090773.3、 发明名称为"虚拟租用线路的故障监听方法与装置"的中国专 利申请的优先权, 其全部内容通过引用结合在本申请中。 技术领域  This application claims priority to Chinese Patent Application No. 200710090773.3, entitled "Fault Monitoring Method and Device for Virtual Leased Lines", filed on April 2, 2007, the entire contents of which are incorporated herein by reference. In the application. Technical field
本发明涉及信息技术领域,尤其涉及一种虚拟租用线路的故障监听方法与  The present invention relates to the field of information technology, and in particular, to a fault monitoring method for a virtual leased line and
背景技术 Background technique
虚拟租用线路 ( VLL, Virtual Leased Line )是一种网络互连业务, VLL 业务是点到点的连接, 如果网络中的任何一点出现故障, 就会导致 VLL业务 中断, 从而降低了 VLL业务的可靠性。  Virtual Leased Line (VLL) is a network interconnection service. The VLL service is a point-to-point connection. If any fault occurs in the network, the VLL service is interrupted, which reduces the reliability of the VLL service. Sex.
为了提高 VLL业务的可靠性,现有技术提出一种基于 VLL的快速重路由 ( FRR, Fast Reroute )方法, 下面结合图 1对该现有技术进行描述, 如图 1所 示,该组网图包括用户端( CE, Customer Edge )和供应端( PE, Provider Edge ) , 具体是这样实现的:  In order to improve the reliability of the VLL service, the prior art proposes a VLL-based Fast Reroute (FRR) method. The following describes the prior art in conjunction with FIG. 1, as shown in FIG. Including the client (CE, Customer Edge) and the provider (PE, Provider Edge), which is specifically implemented like this:
在对方供应端和本地供应端之间建立一条主伪链路(PW, Pseudo wire ) , 并在对方供应端和本地备份供应端之间再建立一条备份 PW,用来保护主 PW。 在对方供应端上主 PW和备份 PW共用一个连接链路( AC , Attachment circuit ), 也就是对方用户端和对方供应端之间的链路; 为了快速检测 PW本身的故障, 可以使用双向转发检测 (BFD, bidirectional forwarding detection )方式, 同时 AC链路之间 (例如, 对方用户端和对方供应端、 本地供应端和本地用户端、 式, 例如, 以太网可以使用 802.1ag或者 802.1ah, 异步传输模式(ATM , Asynchronous Transfer Mode ) 网络可以使用 ATM操作和维护 ( ATM OAM, ATM Operation and Maintenance )信元等。 地供应端通过 PW信令或者其他方式将故障告知对方供应端, 对方供应端收到 远端故障事件后就从主 PW切换到备份 PW上 , 数据也从 PW切换到备份 PW上; 当 BFD检测到主 PW发生故障后, 对方供应端将 VLL业务切换到备份 PW上。 这 样对方供应端、本地供应端和本地用户端之间任何一点出现故障, VLL业务都 能得到有效保护。 同时对不同的网络可采用不同的 AC故障检测方式, 对以太 网使用 802.1ag或者 802.1a , 对 ATM可以使用 ATM OAM, 例如远端缺陷指示 ( RDI, Remote Defect Indication )和^ 1艮警才旨示信号 ( AIS , Alarm Indication Signal ) 。 A primary PW (Pseudo wire) is established between the other party and the local provider. A backup PW is established between the other party and the local backup server to protect the primary PW. On the other end of the supply side, the primary PW and the backup PW share a link (AC, Attachment circuit), that is, the link between the other party's client and the other party's supply end. To quickly detect the fault of the PW itself, you can use two-way forwarding detection. (BFD, bidirectional forwarding detection) mode, at the same time between AC links (for example, the opposite client and the other party, the local provider and the local client, for example, Ethernet can use 802.1ag or 802.1ah, asynchronous transmission ATM (Asynchronous Transfer Mode) The network can use ATM operation and maintenance ( ATM OAM, ATM Operation and Maintenance) cells, etc. The ground supply terminal informs the other party's supply terminal through PW signaling or other means, and the other party's supply end receives After the remote fault occurs, the switch is switched from the primary PW to the backup PW, and the data is also switched from the PW to the backup PW. After the BFD detects that the primary PW is faulty, the other end of the supply switches the VLL service to the backup PW. In this way, any point between the other party's supply end, the local supply end and the local user end fails, and the VLL service can be effectively protected. At the same time, different AC fault detection modes can be used for different networks, 802.1ag or 802.1a for Ethernet, ATM OAM for ATM, such as Remote Defect Indication (RDI) and ^ 1 AIS (Alarm Indication Signal).
但是,发明人发现上述现有技术在 AC是点到点协议(PPP, Point-to-Point Protocol )、帧中继( FR, Frame Relay )和高级数据链路控制( HDLC, High Level Data Link Control )链路时就分为两种情况: 一种情况是异种介质互连(例如, 对方用户端和对方供应端、本地供应端和本地用户端、本地备份供应端和本地 用户端之间是独立协商链路状态), 此时 AC可分别使用链路协议本身的机制 来检测故障; 另一种情况是同种介质互连,此时对方用户端和本地用户端之间 需要通过 PW进行链路协商,而链路协商报文在对方供应端上是透传的,因此, 同种介质互连时, 对方供应端不能检测到 AC链路的故障, 进一步, 在对方供 应端上无法实现从主 PW切换到备份 PW, 也就无法实现 VLL业务的保护。 发明内容  However, the inventors have found that the above-mentioned prior art in the AC is Point-to-Point Protocol (PPP), Frame Relay (FR), and Advanced Data Link Control (HDLC). The link is divided into two cases: One case is the heterogeneous medium interconnection (for example, the other party and the other party, the local provider and the local client, the local backup provider and the local client are independent) Negotiate the link state. At this time, the AC can use the mechanism of the link protocol itself to detect the fault. In another case, the same medium is interconnected. In this case, the link between the peer user and the local user needs to be connected through the PW. Negotiation, and the link negotiation packet is transparently transmitted on the other party's supply end. Therefore, when the same medium is interconnected, the other party's supply end cannot detect the fault of the AC link. Further, the slave provider cannot implement the slave link. If the PW is switched to the backup PW, the protection of the VLL service cannot be implemented. Summary of the invention
本发明实施例提供一种虚拟租用线路的故障监听方法与装置,该方法与装 置在同种介质互连的情况也能监听到 AC链路的故障。  The embodiment of the invention provides a fault monitoring method and device for a virtual leased line, and the method can also detect the fault of the AC link in the case that the device is interconnected in the same medium.
本发明实施例提供一种虚拟租用线路的故障监听方法, 所述方法包括: 从虚拟租用线路上接收本地用户端发送给对方用户端的 文;  An embodiment of the present invention provides a fault monitoring method for a virtual leased line, where the method includes: receiving, from a virtual leased line, a text sent by a local client to a client of the other party;
判断所述 文是否为链路协议报文;  Determining whether the text is a link protocol packet;
在所述报文是链路协议报文时 , 判断所述链路协议报文是否为故障报文。 本发明实施例还提供一种虚拟租用线路的故障监听装置, 所述装置包括: 接收单元, 用于从虚拟租用线路上接收报文;  When the packet is a link protocol packet, it is determined whether the link protocol packet is a fault packet. The embodiment of the present invention further provides a fault monitoring device for a virtual leased line, where the device includes: a receiving unit, configured to receive a message from a virtual leased line;
监听单元,用于判断所述接收单元接收的报文是否为链路协议报文, 以及 在所述报文是链路协议报文时 , 判断所述链路协议报文是否为故障报文。  The monitoring unit is configured to determine whether the packet received by the receiving unit is a link protocol packet, and when the packet is a link protocol packet, determine whether the link protocol packet is a fault packet.
以上技术方案可以看出,由于本发明实施例首先判断收到的报文是否为链 路协议报文, 并在收到的报文为链路协议报文时, 判断报文是否为故障报文, 与现有技术将链路协议报文进行透传相比较, 本发明实施例在 VLL业务处于 同种介质互连时,也能够根据链路协议报文得知 AC链路在任何位置发生的故 障 ,从而使得本发明实施例可根据监测到的故障对 VLL业务进行快速重路由 , 进而能够有效地保护 VLL业务的可靠性。 附图说明 The foregoing technical solution can be seen that, according to the embodiment of the present invention, it is first determined whether the received packet is a chain. When the received packet is a link protocol packet, it is determined whether the packet is a faulty packet, and is compared with the prior art to transparently transmit the link protocol packet. When the VLL service is in the same medium, the VLL service can be quickly rerouted according to the detected fault according to the link fault. In addition, the reliability of the VLL service can be effectively protected. DRAWINGS
图 1是现有技术的 VLL组网示意图;  1 is a schematic diagram of a VLL networking in the prior art;
图 2是本发明虚拟租用线路的故障监听方法实施方式的流程图;  2 is a flowchart of an implementation manner of a fault monitoring method for a virtual leased line according to the present invention;
图 3是本发明虚拟租用线路的故障监听装置实施方式的示意图。 具体实施方式  3 is a schematic diagram of an embodiment of a fault monitoring device for a virtual leased line of the present invention. detailed description
本发明实施例提供一种虚拟租用线路的故障监听方法与装置,该方法首先 从虚拟租用线路上接收本地用户端发送给对方用户端的报文;判断收到的报文 是否为链路协议报文, 并在所述报文是链路协议报文时, 判断所述链路协议报 文是否为故障报文。  An embodiment of the present invention provides a method and a device for detecting a fault of a virtual leased line. The method first receives a packet sent by a local user end to a client end from a virtual leased line, and determines whether the received packet is a link protocol packet. If the packet is a link protocol packet, it is determined whether the link protocol packet is a fault packet.
参照图 2, 图 2是本发明方法实施方式的流程图, 下面结合图 1和图 2对 该实施方式进行详细说明,假设图 1的本地供应端是 PE2a,本地用户端是 CE2, 本地备份供应端是 PE2b, 对方供应端是 PE1, 对方用户端是 CE1, 该实施方 式包括:  Referring to FIG. 2, FIG. 2 is a flowchart of an embodiment of a method according to the present invention. The following describes the embodiment in detail with reference to FIG. 1 and FIG. 2. It is assumed that the local supply end of FIG. 1 is PE2a, and the local user end is CE2, local backup supply. The end is PE2b, the other end is the PE1, and the other end is the CE1. The implementation includes:
201、 本地供应端接收链路协议的监听标识, 利用该监听标识在本地的用 户端和供应端之间的接口触发链路协议监听功能,其中,监听标识就是一个需 要进行监听的标志,本地供应端只有收到该监听标识后才可以触发接口的链路 协议监听功能。 上接收本地用户端发送给对方用户端的报文, 例如, 通过 PE2a和 CE2的接口 接收 CE2发送给 CE1的报文。 通常采用链路协议报文将 AC链路的情况(例 如 AC链路正常或故障 )转发给对方供应端, 该链路协议报文都是协议自身定 义的。 203、 根据收到报文头部的报文类型标志位判断该报文是否为链路协议报 文, 如果是, 执行 204, 否则结束流程。 201. The local provider receives the interception identifier of the link protocol, and uses the interception identifier to trigger a link protocol monitoring function on the interface between the local user end and the supply end, wherein the interception identifier is a flag that needs to be monitored, and the local supply The link protocol listening function of the interface can be triggered only after receiving the interception identifier. The packet sent by the local client to the client is received, for example, the interface sent by CE2 to CE1 is received through the interface of the PE2a and the CE2. The link protocol packet is used to forward the AC link (for example, the AC link is normal or faulty) to the other party's provider. The link protocol packet is defined by the protocol itself. 203. Determine, according to the packet type flag of the received packet header, whether the packet is a link protocol packet, and if yes, execute 204, otherwise, the process ends.
204、通过 VLL转发链路协议 文给对方用户端, 同时将该链路协议报文 进行复制, 然后发送给本地用户端的中央处理单元(CPU, Central processing unit )。  204. The VLL forwards the link protocol text to the other client, and copies the link protocol message, and then sends the link protocol message to the local processing unit (CPU).
205、 本地供应端根据收到报文的数据内容判断该链路协议报文是否为故 障报文, 如果是, 执行 206, 否则结束流程。  205. The local provider determines, according to the data content of the received packet, whether the link protocol packet is a fault message, and if yes, performs 206, otherwise, the process ends.
其中,报文的数据内容包括报文标识,该标识可以区分报文是故障报文还 是正常报文等。  The data content of the packet includes a packet identifier, and the identifier can distinguish whether the packet is a fault packet or a normal packet.
同时本地供应端根据收到的链路协议报文来驱动本地链路协议状态机,以 保证状态之间能够正常进行迁移。 At the same time, the local provider drives the local link protocol state machine according to the received link protocol packet to ensure that the state can be migrated normally.
g殳本地接口的链路协议状态机包括 UP状态和 DOWN状态两个状态, g殳 The link protocol state machine of the local interface includes two states, UP state and DOWN state.
UP状态表示可用, DOWN状态表示不可用, 链路协议报文分为正常报文和故 障报文两种, 假设状态机的当前状态为 DOWN状态, 如果链路协议报文是故 障报文, 状态机仍为 DOWN状态; 如果链路协议报文是正常报文, 状态机则 从 DOWN状态迁移至 UP状态。 The UP state indicates that it is available, and the DOWN state indicates that it is unavailable. The link protocol packets are classified into normal packets and fault packets. The current state of the state machine is DOWN. If the link protocol packet is a fault packet, the state is The machine is still in the DOWN state. If the link protocol packet is a normal packet, the state machine is migrated from the DOWN state to the UP state.
如果状态机的当前状态为 UP状态, 如果链路协议报文是故障报文, 状态 机从 UP状态迁移至 DOWN状态; 如果链路协议报文是正常报文, 状态机仍 为 UP状态。  If the current state of the state machine is UP, if the link protocol packet is a fault packet, the state machine transitions from the UP state to the DOWN state. If the link protocol packet is a normal packet, the state machine is still in the UP state.
206、 通过 VLL信令或者 BFD等其他方式将报文是否为故障报文的结果 通知对方供应端。  206. Notify the other party of the result of whether the packet is a fault packet by using other methods such as VLL signaling or BFD.
207、 对方供应端判断虚拟租用线路上是否存在备份 PW, 如果是, 执行 208, 否则结束流程。  207. The other party's supply end determines whether there is a backup PW on the virtual leased line. If yes, execute 208, otherwise the process ends.
208、 对方供应端从主 PW切换到备份 PW。  208. The other party's supply end switches from the primary PW to the backup PW.
可选地,根据收到报文的数据内容判断得到该链路协议报文是故障恢复报 文时,也需要通过 VLL信令或者 BFD等其他方式将判断结果通知对方供应端, 对方供应端再从备份 PW切换到主 PW。  Optionally, when it is determined that the link protocol packet is a fault recovery packet according to the data content of the received packet, the result of the determination is also notified to the other party by using other methods such as VLL signaling or BFD, and the other party supplies the Switch from the backup PW to the primary PW.
由图 1可知,主 PW是 PE1和 PE2a之间的链路,备份 PW是 PE1和 PE2b 之间的链路, 从主 PW切换到备份 PW就是从 PE1和 PE2a之间的链路切换到 PE1和 PE2b之间的链路。 As shown in Figure 1, the primary PW is the link between PE1 and PE2a, and the backup PW is the link between PE1 and PE2b. The switch from the primary PW to the backup PW is switched from the link between PE1 and PE2a. The link between PE1 and PE2b.
下面结合图 1对本发明方法实施方式进行举例说明, ϋ殳图 1的本地供应 端是 PE2a,本地用户端是 CE2,本地备份供应端是 PE2b,对方供应端是 PE1, 对方用户端是 CE1。 首先启动 PE2a和 CE2之间接口的链路协议监听功能, 当 CE2通过 PE2a和 CE2之间的接口向 CE1发送报文时, PE2a判断该报文是链 路协议报文时, 通过 VLL信令将该报文转发给 CE2处理, 同时将该报文进行 复制再发送给本地的 CPU, PE2a根据收到的链路协议报文来驱动本地链路协 议状态机, 以保证状态之间能够正常进行迁移。  The method of the method of the present invention is described below with reference to FIG. 1. The local provider of FIG. 1 is PE2a, the local client is CE2, the local backup provider is PE2b, the other party is PE1, and the other client is CE1. First, the link protocol monitoring function is enabled on the interface between PE2a and CE2. When CE2 sends a packet to CE1 through the interface between PE2a and CE2, PE2a determines that the packet is a link protocol packet and uses VLL signaling. The packet is forwarded to the CE2 for processing. The packet is copied and sent to the local CPU. The PE2a drives the local link protocol state machine according to the received link protocol packet to ensure that the state can be migrated normally. .
PE2a在监听到 CE2发送给 CE1的链路协议报文为故障报文时,通过 VLL 信令或者 BFD等其他方式通知 PE1从主 PW切换到备份 PW, 例如, PE2a监 听到 CE2发送给 CE1 的报文是链路控制协议终结 (Link Control protocol Terminal )报文时 , 通过 VLL信令或者其他方式通告 PE1 , 让 PE1从主 PW切 换到备份 PW。 当 PE2a监听到 CE2发送给 CE1的链路协议报文为故障恢复报 文时, 通过 VLL信令或者其他方式通知 PE1连接链路故障已恢复, PE1从备 份 PW正常回切到主 PW。  When PE2a detects that the link protocol packet sent from CE2 to CE1 is a faulty packet, PE2a notifies PE1 to switch from the primary PW to the backup PW through VLL signaling or BFD. For example, PE2a listens to the report sent by CE2 to CE1. When the link is a Link Control Protocol Terminal packet, the PE1 is advertised by the VLL signaling or other means to switch the PE1 from the primary PW to the backup PW. When PE2a detects that the link protocol packet sent from CE2 to CE1 is a fault recovery packet, the device detects that the link fault of the PE1 link has been restored through VLL signaling or other means. PE1 normally switches back from the backup PW to the primary PW.
PE2a根据收到的链路协议报文驱动本地的链路协议状态机, 例如, 从 UP 状态到 DOWN状态或者从 DOWN状态到 UP状态等,这样可以保证状态之间 能够正常进行迁移。  Based on the received link protocol packet, PE2a drives the local link protocol state machine, for example, from the UP state to the DOWN state or from the DOWN state to the UP state. This ensures that the state can be migrated normally.
同样地, PE2a对 CE1发送给 CE2的报文也需要监听, 如果该报文是链路 协议报文需将报文原封不动的转发给 CE2处理,如果 PE2a监听到该报文是故 障报文时不需要通知 PE1从主 PW切换到备份 PW,但需要将该报文发送给对 方用户端的 CPU, 以便驱动本地接口的链路协议状态机, 保证状态之间能够 正常进行迁移。  Similarly, PE2a needs to listen to the packets sent from CE1 to CE2. If the packet is a link protocol packet, the packet needs to be forwarded to CE2. If the packet is detected by PE2a, the packet is faulty. It is not necessary to notify PE1 to switch from the primary PW to the backup PW, but the packet needs to be sent to the CPU of the other client to drive the link protocol state machine of the local interface to ensure normal migration between the states.
本发明实施例也提供了一种虚拟租用线路的故障监听装置, 由图 3可知, 该装置包括触发单元 301、 接收单元 302、 监听单元 303以及切换单元 306。  The embodiment of the present invention also provides a fault monitoring device for a virtual leased line. As shown in FIG. 3, the device includes a trigger unit 301, a receiving unit 302, a listening unit 303, and a switching unit 306.
其中,触发单元 301用于接收链路协议的监听标识, 以及根据该监听标识 触发链路协议监听功能。  The triggering unit 301 is configured to receive a listening identifier of the link protocol, and trigger a link protocol monitoring function according to the intercepting identifier.
其中,接收单元 302用于在触发链路协议监听功能之后从虚拟租用线路上 接收本地用户端向对方用户端发送的^艮文。 其中, 监听单元 303包括: The receiving unit 302 is configured to receive, after triggering the link protocol monitoring function, the information sent by the local client to the other client from the virtual leased line. The listening unit 303 includes:
第一判断单元 304, 用于根据收到报文头部的报文类型标志位判断接收单 元 302该4艮文是否为链路协议 文, 以及在 文是链路协议 文时,将该 4艮文 进行复制再发送给本地用户端的中央处理单元;  The first determining unit 304 is configured to determine, according to the packet type flag of the received packet header, whether the receiving unit 302 is the link protocol text, and when the text is a link protocol text, the fourth determining unit is configured to: The text is copied and sent to the central processing unit of the local client;
第二判断单元 305 ,用于在第一判断单元 304得到报文是链路协议报文时, 根据收到报文的数据内容判断报文是否为故障报文或故障恢复报文,并将判断 结果发送给切换单元 306。  The second judging unit 305 is configured to determine, according to the data content of the received packet, whether the packet is a fault packet or a fault recovery packet, and determine the packet when the first judging unit 304 obtains the link protocol packet The result is sent to the switching unit 306.
其中,切换单元 306用于判断虚拟租用线路上是否存在备份伪链路,并在 虚拟租用线路上存在备份伪链路和第二判断单元 305 得到报文是故障报文的 结果时从主伪链路切换到备份伪链路,以及在第二判断单元 305得到报文是故 障恢复 文的结果时从备份伪链路切换到主伪链路。  The switching unit 306 is configured to determine whether there is a backup pseudo link on the virtual leased line, and the backup pseudo link exists on the virtual leased line, and the second judging unit 305 obtains the result of the fault message from the main pseudo chain. The road switches to the backup pseudo link and switches from the backup pseudo link to the primary pseudo link when the second judging unit 305 obtains that the message is the result of the failure recovery text.
由上述可知,本发明实施例首先判断收到的报文是否为链路协议报文, 并 在收到的报文为链路协议报文时, 判断报文是否为故障报文, 与现有技术将链 路协议报文进行透传相比较,本发明实施例在 VLL业务处于同种介质互连时, 也能够根据链路协议报文得知 AC链路在任何位置发生的故障,从而使得本发 明实施例可根据监测到的故障对 VLL业务进行快速重路由, 进而能够有效地 保护 VLL业务的可靠性。  It can be seen from the foregoing that the embodiment of the present invention first determines whether the received packet is a link protocol packet, and determines whether the packet is a fault packet when the received packet is a link protocol packet, and the existing packet is The technology compares the link protocol packets to the transparent transmission. In the embodiment of the present invention, when the VLL service is in the same medium, the AC link can be faulty at any position according to the link protocol packet, thereby In the embodiment of the present invention, the VLL service can be quickly rerouted according to the detected fault, thereby effectively protecting the reliability of the VLL service.
另夕卜,本发明实施例在报文为链路协议报文时,需要将该报文发送给本地 用户端的 CPU, 这样可以驱动本地的链路协议状态机, 从而保证状态机的各 个状态之间能够正常进行迁移。  In addition, in the embodiment of the present invention, when the packet is a link protocol packet, the packet needs to be sent to the CPU of the local user end, so that the local link protocol state machine can be driven, thereby ensuring each state of the state machine. The migration can be performed normally.
最后, 当本地用户端向对方用户端发送报文时,本发明实施例监听到报文 是故障报文时从主 PW切换到备份 PW, 报文是故障恢复报文时从备份 PW切 换到主 PW, 这样使得本发明实施例在 AC链路出现故障时, 都不会中断 VLL 业务, 从而提高了 VLL业务的可靠性。  Finally, when the local user sends a packet to the other client, the embodiment of the present invention switches from the primary PW to the backup PW when the packet is a faulty packet, and the packet is switched from the backup PW to the primary when the packet is a fault recovery packet. In the embodiment of the present invention, the VLL service is not interrupted when the AC link fails, thereby improving the reliability of the VLL service.
以上对本发明实施例所提供的一种虚拟租用线路的故障监听方法与装置 述, 以上实施例的说明只是用于帮助理解本发明的方法及其核心思想; 同时, 对于本领域的一般技术人员,依据本发明的思想,在具体实施方式及应用范围 上均会有改变之处, 综上所述, 本说明书内容不应理解为对本发明的限制。  The foregoing description of the method and apparatus for fault monitoring of a virtual leased line provided by the embodiment of the present invention is merely for assisting in understanding the method and core idea of the present invention. Meanwhile, for those skilled in the art, The present invention is not limited by the scope of the present invention.

Claims

权 利 要 求 Rights request
1、 一种虚拟租用线路的故障监听方法, 其特征在于, 所述方法包括: 从虚拟租用线路上接收本地用户端发送给对方用户端的 文;  A fault monitoring method for a virtual leased line, the method comprising: receiving, from a virtual leased line, a text sent by a local client to a client of the other party;
判断所述 文是否为链路协议报文;  Determining whether the text is a link protocol packet;
在所述报文是链路协议报文时, 判断所述链路协议报文是否为故障报文。 When the packet is a link protocol packet, it is determined whether the link protocol packet is a fault packet.
2、 如权利要求 1所述的虚拟租用线路的故障监听方法, 其特征在于, 根 据收到报文头部的报文类型标志位判断所述报文是否为链路协议报文。 The method for detecting a fault of a virtual leased line according to claim 1, wherein the packet is determined to be a link protocol packet according to a packet type flag of the received packet header.
3、 如权利要求 1所述的虚拟租用线路的故障监听方法, 其特征在于, 根 据收到报文的数据内容判断所述链路协议报文是否为故障报文。  The method for detecting a fault of a virtual leased line according to claim 1, wherein the link protocol message is determined to be a fault message according to the data content of the received message.
4、 如权利要求 1所述的虚拟租用线路的故障监听方法, 其特征在于, 在 所述判断所述链路协议报文是否为故障报文之后进一步包括:  The method for detecting a fault of a virtual leased line according to claim 1, wherein after the determining whether the link protocol packet is a fault message, the method further includes:
当虚拟租用线路上存在备份伪链路以及所述报文是故障报文时,对方供应 端从主伪链路切换到所述备份伪链路。  When there is a backup pseudo link on the virtual leased line and the message is a fault message, the other party's provider switches from the primary pseudo link to the backup pseudo link.
5、 如权利要求 1所述的虚拟租用线路的故障监听方法, 其特征在于, 当 所述报文是链路协议报文时, 所述方法进一步包括:  The method of claim 1, wherein the method further comprises:
将所述链路协议报文进行复制;  Copying the link protocol packet;
将复制后的链路协议报文发送给所述本地用户端的中央处理单元。  Sending the copied link protocol packet to the central processing unit of the local client.
6、 如权利要求 1所述的虚拟租用线路的故障监听方法, 其特征在于, 在 所述从虚拟租用线路上接收本地用户端发送给对方用户端的 文之前进一步 包括:  The method for detecting a fault of a virtual leased line according to claim 1, wherein before receiving the text sent by the local client to the other party from the virtual leased line, the method further includes:
接收链路协议的监听标识;  Receiving the interception identifier of the link protocol;
利用所述监听标识触发链路协议的监听功能。  The interception function of the link protocol is triggered by the interception identifier.
7、 如权利要求 1至 6任一项所述的虚拟租用线路的故障监听方法, 其特 征在于, 所述方法进一步包括:  The method for detecting a fault of a virtual leased line according to any one of claims 1 to 6, wherein the method further comprises:
在所述报文是链路协议报文时,根据收到报文的数据内容,判断所述报文 是否为故障恢复报文;  When the packet is a link protocol packet, determining whether the packet is a fault recovery packet according to the data content of the received packet;
当所述报文是故障恢复报文时 , 从备份伪链路切换到主伪链路。  When the message is a failure recovery message, the backup pseudo link is switched to the primary pseudo link.
8、 一种虚拟租用线路的故障监听装置, 其特征在于, 所述装置包括: 接收单元, 用于从虚拟租用线路上接收报文; 监听单元,用于判断所述接收单元接收的报文是否为链路协议报文, 以及 在所述报文是链路协议报文时 , 判断所述链路协议报文是否为故障报文。 A fault monitoring device for a virtual leased line, the device comprising: a receiving unit, configured to receive a message from a virtual leased line; The monitoring unit is configured to determine whether the packet received by the receiving unit is a link protocol packet, and when the packet is a link protocol packet, determine whether the link protocol packet is a fault packet.
9、 如权利要求 8所述的虚拟租用线路的故障监听装置, 其特征在于, 所 述监听单元包括:  The fault monitoring device of the virtual leased line according to claim 8, wherein the monitoring unit comprises:
第一判断单元,用于根据所述接收单元接收的报文头部的报文类型标志位 判断所述报文是否为链路协议报文, 并在所述报文是链路协议报文时,将所述 报文进行复制再发送给本地用户端的中央处理单元;  The first determining unit is configured to determine, according to the packet type flag of the packet header received by the receiving unit, whether the packet is a link protocol packet, and when the packet is a link protocol packet, Copying the message to the central processing unit of the local user end;
第二判断单元,用于当所述第一判断单元判断所述接收单元接收的报文为 文是否为故障 文, 以及提供判断结果。  The second determining unit is configured to: when the first determining unit determines whether the message received by the receiving unit is a text, and provides a determination result.
10、如权利要求 9所述的虚拟租用线路的故障监听装置, 其特征在于, 所 路协议报文是否为故障恢复报文 , 以及提供判断结果。  The fault monitoring device of the virtual leased line according to claim 9, wherein the route protocol message is a fault recovery message, and the judgment result is provided.
11、 如权利要求 9或 10任一项所述的虚拟租用线路的故障监听装置, 其 特征在于, 所述装置还进一步包括:  The fault monitoring device of the virtual leased line according to any one of claims 9 or 10, wherein the device further comprises:
切换单元,用于判断虚拟租用线路上是否存在备份伪链路, 并在所述虚拟 租用线路上存在所述备份伪链路和所述第二判断单元得到所述报文是故障报 文的结果时从主伪链路切换到所述备份伪链路。  a switching unit, configured to determine whether a backup pseudo link exists on the virtual leased line, and the backup pseudo link exists on the virtual leased line, and the second determining unit obtains that the packet is a fault message Switching from the primary pseudo link to the backup pseudo link.
12、 如权利要求 11所述的虚拟租用线路的故障监听装置, 其特征在于, 所述切换单元,还用于在所述第二判断单元得到所述报文是故障恢复报文的结 果时从所述备份伪链路切换到所述主伪链路。  The fault monitoring device of the virtual leased line according to claim 11, wherein the switching unit is further configured to: when the second determining unit obtains the result that the packet is a fault recovery message, The backup pseudo link is switched to the primary pseudo link.
13、如权利要求 8所述的虚拟租用线路的故障监听装置, 其特征在于, 所 述装置还进一步包括:  The device of claim 8 , wherein the device further comprises:
触发单元, 用于接收链路协议的监听标识, 以及利用所述监听标识触发所 述监听单元的链路协议的监听功能。  And a triggering unit, configured to receive a listening identifier of the link protocol, and use the monitoring identifier to trigger a listening function of a link protocol of the listening unit.
PCT/CN2008/070349 2007-04-02 2008-02-22 Failure monitoring method and device for virtual leased line WO2008119275A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CNB2007100907733A CN100466564C (en) 2007-04-02 2007-04-02 Failure monitoring method and device of the virtual rented line
CN200710090773.3 2007-04-02

Publications (1)

Publication Number Publication Date
WO2008119275A1 true WO2008119275A1 (en) 2008-10-09

Family

ID=38731351

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2008/070349 WO2008119275A1 (en) 2007-04-02 2008-02-22 Failure monitoring method and device for virtual leased line

Country Status (2)

Country Link
CN (1) CN100466564C (en)
WO (1) WO2008119275A1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100466564C (en) * 2007-04-02 2009-03-04 华为技术有限公司 Failure monitoring method and device of the virtual rented line
CN101820368A (en) * 2010-04-08 2010-09-01 华为技术有限公司 Ethernet link failure detection method and device
CN101916484A (en) * 2010-07-12 2010-12-15 北京德信易税网络技术有限公司 Tax fund monitoring system and method for large-scale supermarket and marketplace
CN102420828B (en) * 2011-12-15 2014-11-05 华为技术有限公司 Method, device and system for setting protocol management status
US9025439B2 (en) * 2012-06-26 2015-05-05 Telefonaktiebolaget L M Ericsson (Publ) Method and system to enable re-routing for home networks upon connectivity failure
CN104394056B (en) * 2014-11-24 2018-04-24 中国联合网络通信集团有限公司 The guard method of Layer 2 Tunneling Protocol L2TP networks and device
CN114070707A (en) * 2020-11-10 2022-02-18 北京市天元网络技术股份有限公司 Internet performance monitoring method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5193086A (en) * 1988-08-26 1993-03-09 Hitachi, Ltd. Network system having a line switching function
CN1302139A (en) * 1999-12-30 2001-07-04 美国电报电话公司 IP leased line
CN1556617A (en) * 2003-12-30 2004-12-22 港湾网络有限公司 Transfer method of virtual special line business transfer load network cut in chain circuit failure information
CN101035032A (en) * 2007-04-02 2007-09-12 华为技术有限公司 Failure monitoring method and device of the virtual rented line

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ATE503317T1 (en) * 2003-08-06 2011-04-15 Zte Corp METHOD FOR AUTOMATIC PROTECTION SWITCHING
US7876694B2 (en) * 2004-07-02 2011-01-25 Hewlett-Packard Development Company, L.P. Identifying VPN faults based on virtual routing address and edge interface relationship information
US8175078B2 (en) * 2005-07-11 2012-05-08 Cisco Technology, Inc. Redundant pseudowires between Ethernet access domains
CN100446476C (en) * 2006-08-02 2008-12-24 华为技术有限公司 Method and apparatus for communicating network trouble dtecting result

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5193086A (en) * 1988-08-26 1993-03-09 Hitachi, Ltd. Network system having a line switching function
CN1302139A (en) * 1999-12-30 2001-07-04 美国电报电话公司 IP leased line
CN1556617A (en) * 2003-12-30 2004-12-22 港湾网络有限公司 Transfer method of virtual special line business transfer load network cut in chain circuit failure information
CN101035032A (en) * 2007-04-02 2007-09-12 华为技术有限公司 Failure monitoring method and device of the virtual rented line

Also Published As

Publication number Publication date
CN101035032A (en) 2007-09-12
CN100466564C (en) 2009-03-04

Similar Documents

Publication Publication Date Title
US8804534B2 (en) Interworking between MPLS/IP and Ethernet OAM mechanisms
US8886831B2 (en) System and methodology for fast link failover based on remote upstream failures
US8117337B2 (en) Method and device for implementing link pass through in point-to-multipoint network
CN101257441B (en) Method, equipment and system for forwarding message as well as equipment for receiving message
CN100459531C (en) Method for notifying pseudo-lines fault based on bidirectional transmission detecting protocol
WO2008119275A1 (en) Failure monitoring method and device for virtual leased line
US20100202297A1 (en) Method, device, and system for traffic switching in multi-protocol label switching traffic engineering
WO2009046644A1 (en) A method and device for traffic flow switching
US11146484B2 (en) Method, device, and system for deferring switchback
WO2012028029A1 (en) Switching method and system
CN101217457A (en) A method to realize fast reroute and router
WO2008089633A1 (en) Method and apparatus for protecting ether ring net
EP2807797A1 (en) Redundant network connections
WO2011088686A1 (en) Dual-attached protection switching method based on vpls and system thereof
CN102820990B (en) Method and device for switching service protection
CN101610535A (en) Multilink direct continuous show scape guarantees the method, system and device of BFD conversation stability down
US20090185495A1 (en) Method, system of fault detection for pseudo wires and service provider edge router thereof
CN101917290A (en) method, device and network equipment for processing label transmitting path fault as well as network equipment
WO2011026319A1 (en) Ring network protection method based on local fault detection and system thereof
WO2012016458A1 (en) Method and apparatus for data transmission in layer 2 virtual private network
WO2013178098A1 (en) Method and device for sending inter-domain fault information
CN102238067B (en) Switching method and device on Rapid Ring Protection Protocol (RRPP) ring
EP2613477B1 (en) Method for triggering route switching and service provider-end provider edge device
WO2012171164A1 (en) Network security protection method, device and system
CN103916270B (en) The system for realizing Link State Pass Through function based on PTN, method and device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08715086

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 08715086

Country of ref document: EP

Kind code of ref document: A1