WO2011079688A1 - 一种半环网络的保护方法、设备及系统 - Google Patents

一种半环网络的保护方法、设备及系统 Download PDF

Info

Publication number
WO2011079688A1
WO2011079688A1 PCT/CN2010/079452 CN2010079452W WO2011079688A1 WO 2011079688 A1 WO2011079688 A1 WO 2011079688A1 CN 2010079452 W CN2010079452 W CN 2010079452W WO 2011079688 A1 WO2011079688 A1 WO 2011079688A1
Authority
WO
WIPO (PCT)
Prior art keywords
ring
protection
network
node
port
Prior art date
Application number
PCT/CN2010/079452
Other languages
English (en)
French (fr)
Inventor
普云
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP10840477A priority Critical patent/EP2512070A1/en
Publication of WO2011079688A1 publication Critical patent/WO2011079688A1/zh
Priority to US13/536,697 priority patent/US20120269056A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/42Loop networks
    • H04L12/437Ring fault isolation or reconfiguration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/40Bus networks
    • H04L12/407Bus networks with decentralised control
    • H04L12/413Bus networks with decentralised control with random access, e.g. carrier-sense multiple-access with collision detection [CSMA-CD]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a method, device, and system for protecting a semi-ring network.
  • a special network topology of a ring network provides convenience for implementing a simple and fast network protection capability.
  • the protection of the Ethernet ring network includes the traditional Ethernet Ring Protection (ERP) protocol, the Ethernet Automatic Protection Switching (EAPS) protocol, and the Rapid Ring Protection Protocol (RRPP). ), etc., the three principles are basically the same, can support multiple instances.
  • An EAPS/RRPP/ERP instance can protect the traffic of one or more virtual local area networks (VLANs).
  • VLANs virtual local area networks
  • One or more EAPS/RRPP/ERP instances can exist on an Ethernet ring network.
  • the Ring Protection Link (RPL) is implemented on the specified ring node to perform service traffic on the RPL link. Blocking, traffic of the protected VLAN can be transmitted on all links except the RPL link on the ring; when the Ethernet ring fails, the previously blocked port on the specified ring node will be opened, and the RPL link will be available. Transmit the traffic of the VLAN.
  • RPL Ring Protection Link
  • Embodiments of the present invention provide a method, device, and system for protecting a half-ring network, which can perform ring protection in the case of a half-ring.
  • a method for protecting a half-ring network provided by an embodiment of the present invention includes: operating an Ethernet ring protection protocol on a network port of each non-closed ring node and a closed ring node on a half ring network, and all groups are The network port is added to the virtual local area network corresponding to the protection instance.
  • a pseudo-line PWE3 or a message-based connection is established between the non-closed ring nodes on the half-ring network, and the Ethernet ring protection protocol packet of the protection instance is transmitted.
  • the network device provided by the embodiment of the present invention includes: a protocol running unit, configured to run an Ethernet ring network protection protocol on the networking port, and add the networking port to the virtual local area network corresponding to the protection instance;
  • a pseudowire PWE3 or message mechanism based connection is established with another network device on the half ring network to deliver an Ethernet ring protection protocol message of the protection instance.
  • An embodiment of the present invention provides a protection system for a half-ring network, including a non-closed loop node and a closed loop node, running an Ethernet ring protection protocol on a network port of each non-closed loop node and a closed loop node, and All the network ports are added to the virtual local area network corresponding to the protection instance.
  • a pseudo-line PWE3 or a message-based connection is established between the non-closed ring nodes to transmit the Ethernet ring protection protocol packet of the protection instance.
  • the Ethernet ring protection protocol is run through the networking ports of each of the non-closed ring nodes and the closed ring nodes on the half ring network, and all the networking ports are added to the protection instance.
  • FIG. 1 is a schematic diagram of a method for protecting a half-ring network according to an embodiment of the present invention
  • FIG. 2 is a schematic diagram of a half-ring network according to an embodiment of the present invention
  • FIG. 3 is a schematic diagram of the connection between the aggregation switch 1 and the BRAS in FIG. 2;
  • FIG. 4 is a schematic diagram of the primary node switch 2 in FIG. 3 opening the ring protection link blocking port Port2;
  • FIG. 5 is a schematic diagram of a fault between the switch 1 and the aggregation switch 1 in FIG. 2;
  • FIG. 6 is a functional unit diagram of a network device according to an embodiment of the present invention.
  • FIG. 7 is a schematic structural diagram of a protection system of a semi-ring network according to an embodiment of the present invention.
  • the technical solutions provided by the embodiments of the present invention are further described in detail below with reference to the accompanying drawings and embodiments.
  • a method for protecting a half-ring network includes the following content: 11. Running an Ethernet ring on a network port of each non-closed ring node and a closed ring node on a half ring network. Network protection protocol, and all the networking ports are added to the virtual local area network corresponding to the protection instance;
  • the protection method of the semi-ring network runs the Ethernet ring protection protocol by using the networking ring port of each non-closed ring node and the closed ring node on the half ring network, and joins all the networking ports.
  • Protecting the virtual local area network corresponding to the instance, and establishing a connection based on the pseudowire PWE3 or the message mechanism based on the pseudowire PWE3 or the message mechanism based on the non-closed ring nodes on the half ring network so as to transmit the packet of the Ethernet ring protection protocol of the protection instance, thereby being able to simulate
  • the link is always connected, so that the half-ring network can be regarded as a complete ring network composed of a Layer 2 forwarding network, and the same technology as the Ethernet ring network protection is used to complete the protection of the half-ring network.
  • the primary node blocks the ring protection link RPL directly connected to it in the normal state.
  • the non-closed ring node on the semi-ring network detects the uplink fault or the closed ring node on the semi-ring network
  • the fault message is sent to notify the master node, and after receiving the fault message, the master node opens the port blocked by the RPL;
  • the master node periodically sends a HELLO message from the non-RPL port. If the HELLO message sent by itself is received from the PRL port, the state is migrated back to the normal state and the RPL port is blocked. If the ring protection link RPL that is blocked in the normal state is the most reasonable, you can configure the node farthest from the half-ring network as the master node in the protection instance.
  • the Ethernet ring network protection protocol in the embodiment of the present invention may be any one of the following: a traditional Ethernet ring protection protocol ERP, or an Ethernet ring network automatic protection switching protocol EAPS, or a fast ring network protection protocol RRPP.
  • the following describes an example of protecting a half-ring network provided by the present invention by establishing a connection based on a pseudowire PWE3 between non-closed ring nodes on a half-ring network.
  • Pseudo Wire Emulation Edge-to-Edge is an end-to-end Layer 2 service bearer technology. It is a point-to-point Layer 2 virtual private network (La ye r2 Virtual Private). Network, L2VPN).
  • LDP Label Distribution Protocol
  • RSVP Resource Reservation Protocol
  • tunneling may be a Multi-Protocol Label Switching (MPLS) tunnel, a Generic Routing Encapsulation (GRE) or a Layer 2 Layer 2 tunneling protocol (Layer 2 Tunneling) Protocol, L2TPv3) or other, to simulate various Layer 2 services on the user edge device (Custom Edge, CE), such as various Layer 2 data packets (including Ethernet frames), bitstreams, etc., to enable Layer 2 data on the CE side. Transparent delivery in the PSN network.
  • MPLS Multi-Protocol Label Switching
  • GRE Generic Routing Encapsulation
  • L2TPv3 Layer 2 Layer 2 tunneling protocol
  • the networking ports of each node on the semi-ring network run the EAPS/ERP/RRPP protocol, which includes two networking ports of each switch in Figure 2, and ports connected to the aggregation switch and the switch (
  • the switches 1, 2, and 3 are closed loop nodes on the semi-ring network, and the aggregation switches 1 and 2 are non-closed loop nodes on the semi-ring network.
  • the operations of these ports are fully compliant with the EAPS/ERP/RRPP protocol; These ports need to be added to the virtual LAN VLAN corresponding to the protection instance.
  • the PWE3 pseudowire is established between non-closed ring nodes to simulate the continuous link.
  • the EAPS/ERP/RRPP protocol packet used to deliver the protection instance.
  • the Broadband Remote Access Server (BRAS) establishes two Ethernet PWE3 pseudowires for transmitting EAPS/ERP/RRPP packets of VLANs 10 and 20, and Ethernet of other non-EAPS/ERP/RRPP packets.
  • the frame does not go in the PWE3 package.
  • the network port of the aggregation switch 1 when the network port of the aggregation switch 1 (the port connected to the switch 1) receives the Ethernet frame, it first determines whether the VLA is 20. If it is 20, it further determines whether the message is the EAPS/ERP/RRPP protocol. The packet is encapsulated in the PWE3 and sent to the aggregation switch 2 through the BRAS tunnel. If the packet is in the VLAN 20 but not the EAPS/ERP/RRPP packet, the packet is forwarded according to the normal forwarding process.
  • the VLAN 10 and VLAN 20 protection instances are farthest from the network, that is, the node farthest from the aggregation switch or BRAS is switch 2.
  • the master node blocks its directly connected ring protection link RPL in the normal state.
  • the RPL of the VLAN 10 protection instance in Figure 2 is the link between switch 1 and switch 2, so VLAN 10 will be blocked on Port 1 of switch 2;
  • the RPL of the VLAN 20 protection instance is the link between switch 2 and switch 3, so VLAN 20 will block on Port 2 of Switch 2.
  • a node on the Ethernet ring network detects a direct link fault, it needs to send a fault message to notify other devices on the ring.
  • the non-closed-loop node detects a PW failure, it does not send a failure message to notify other nodes on the ring, because the topology of the half-ring does not change in this case.
  • the detection of the link can be performed by Virtual Circuit Connectivity Verification (VCCV) or by Bidirectional Forwarding Detection (BFD) for Pseudo Wire (PW).
  • the non-closed-loop node on the half-loop When the non-closed-loop node on the half-loop detects its uplink failure, it sends a fault message to inform the closed-loop node on the half-ring.
  • the aggregation switch 1 detects that the connection between the BRAS and the BRAS is interrupted, the aggregation switch 1 will send an EAPS/ERP/RRPP failure message to the switch 1.
  • the connection detection between the aggregation switch 1 and the BRAS can be performed through various Detection means, including the Internet Control Message Protocol (ICMP) ping command, Ethernet Operations and Maintenance (ETH 0AM).
  • ICMP Internet Control Message Protocol
  • ETH 0AM Ethernet Operations and Maintenance
  • the master node switch 2 After the primary node switch 2 of the protection instance VLAN 20 receives the fault message forwarded by the switch 1, according to the EAPS/ERP/RRPP protocol, the master node switch 2 will open the port 2 of the RPL blocked port, so that the service data of the VLAN 20 protection instance will be aggregated. Switch 2 goes up, as shown in Figure 4. The protection instance VLAN 10 has no corresponding fault notification message, so its service data still goes up through the aggregation switch 2.
  • the closed loop node on the half ring detects the link failure on the ring, it can follow the normal EAPS/ERP/RRPP protocol.
  • Negotiation Specifically, in FIG. 5, when the switch 1 and the aggregation switch 1 fail, the switch 1 sends a fault message to the switch 2, and the aggregation switch 1 sends a fault message to the aggregation switch 2 through the pseudowire PWE3 to protect the primary node switch of the instance VLAN 20.
  • the switch 1 After receiving the fault message sent by the switch 1, according to the EAPS/ERP/RRPP protocol, it will open the port 2 of the RPL blocked port, so that the service data of the VLAN 20 protection instance will be uplinked through the aggregation switch 2; The fault notification message, so its business data still goes up through the aggregation switch 2.
  • the switch 1 sends a fault notification message to the aggregation switch 1, and the aggregation switch 1 sends a fault message to the aggregation switch 2 through the pseudowire PWE3.
  • the switch 2 will open the port 2 of the VLAN 20 to protect the instance RPL.
  • the service data of the protection instance VLAN 20 will be uplinked through the aggregation switch 1 and the aggregation switch 2.
  • the primary node of the semi-ring network provided by the present invention also periodically sends a HELLO message from the non-RPL port. If the faulty link on the semi-ring network is completely restored, the master node can be from the RPL port. After receiving the HELLO message sent by itself, the master node first migrates the state back to the normal state, blocks the RPL port and refreshes the Media Access Control (MAC) forwarding table, and then sends a fault recovery message from the non-RPL port. After receiving the fault recovery message, the nodes on the ring refresh their respective forwarding tables. Specifically, in FIG. 5, the primary node switch 2 protected by the VLAN 20 will continuously send a HELLO message to the port 1.
  • MAC Media Access Control
  • the aggregation switch 1 When the fault between the switch 1 and the aggregation switch 1 is restored, the aggregation switch 1 will receive the HELLO message, and the aggregation switch 1 will HELLO.
  • the message is encapsulated into the pseudowire PWE3 and transmitted to the aggregation switch 2 via the BRAS.
  • the aggregation switch 2 sends the message to the switch 2 through the switch 3.
  • the master node switch 2 finds that it can receive the HELLO message sent by itself, and can judge the network. It has returned to normal, blocking its own RPL port Port2 again.
  • the packet for protecting the Ethernet ring protection protocol of the instance is transmitted, so that the continuous link can be simulated, so that
  • the semi-ring network can be regarded as a complete ring network composed of a Layer 2 forwarding network, and the same technology as the Ethernet ring network protection is used to complete the protection of the semi-ring network.
  • the simulated direct link is different from the actual direct link in that: the non-closed ring node on the semi-ring network needs to detect the uplink status and notify other nodes on the ring; The Ethernet ring protection protocol packet is transmitted; and the special processing of not transmitting the fault message when detecting the PW failure of the analog direct link is detected.
  • Establishing a message-based connection between non-closed ring nodes on a semi-ring network is similar to establishing a pseudo-line PWE3-based connection. The difference is that no PWE3 connection is established, but a communication mechanism is communicated between two non-closed-loop nodes.
  • the message includes an extended link layer, a network layer, a transport layer, a general protocol of the application layer, or a proprietary protocol.
  • a user datagram protocol (UDP) or a Transmission Control Protocol (TCP) connection may be established between the aggregation switch 1 and the aggregation switch 2, and the aggregation switch 1 receives the EAPS/ERP/RRPP protocol.
  • UDP user datagram protocol
  • TCP Transmission Control Protocol
  • the embodiment of the present invention provides a network device, including:
  • the protocol running unit 61 is configured to run an Ethernet ring protection protocol on the networking port, and add the networking port to the virtual local area network corresponding to the protection instance;
  • the connecting unit 62 is configured to establish a pseudowire PWE3 or a message mechanism based connection with another network device on the half ring network to transmit an Ethernet ring protection protocol packet of the protection instance.
  • a pseudowire PWE3 is established between network devices or based on The connection of the message mechanism is used to transmit the Ethernet ring protection protocol packet of the protection instance, so that the continuous link can be simulated, so that the half ring network can be regarded as a complete ring network composed of a layer 2 forwarding network.
  • the protection of the semi-ring network is completed by the same technology as the Ethernet ring protection.
  • the master node blocks the ring protection link RPL directly connected to it in the normal state.
  • the non-closed ring node on the half ring detects an uplink failure or the closed ring node on the half ring network detects the ring link failure, it sends a fault message to the master node, and the master node will according to the received fault message. Open the port blocked by the ring protection link RPL.
  • the network device provided by the embodiment may further include:
  • the fault notification unit is configured to: when the uplink fault is detected, send a fault message to notify the master node, so that the master node opens the port blocked by the ring protection link RPL after receiving the fault message.
  • the master node of the semi-ring network also periodically sends HELLO messages from non-RPL ports. If the faulty links on the half-ring network are all restored, the master node can receive itself from the RPL port. The HELLO message, at which point the primary node migrates the state back to a normal state and blocks the RPL port.
  • the network device provided by the embodiment may further include:
  • a message passing unit configured to transmit a HELLO periodically sent by the master node to another network device on the half ring network Message.
  • an embodiment of the present invention provides a protection system for a half-loop network, including non-closed loop nodes 71, 72 and closed loop nodes 70. , 74, 75, running an Ethernet ring protection protocol on each of the non-closed ring nodes and the closed ring node networking port, and adding all the networking ports to the virtual local area network VLAN 10, VLAN 20 corresponding to the protection instance;
  • a connection between the ring nodes 71 and 72 based on the pseudowire PWE3 or the message mechanism is used to transmit the Ethernet ring protection protocol packet of the protection instance.
  • the protection system of the half-ring network in this embodiment further configures the node 70 that is farthest from the half-ring network as the master node in the protection example, and the master node 70 blocks the ring protection link RPL directly connected to it in the normal state;
  • a fault message is sent to notify the master node 70 that the master node receives After the fault message, open the port blocked by the RPL;
  • the master node 70 periodically sends a HELLO message from the non-RPL port. If it receives a HELLO message from itself on the PRL port, it transitions the state back to the normal state and blocks the RPL port.
  • the functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist physically separately, or two or more units may be integrated into one module.
  • the above integrated modules can be implemented in the form of hardware or in the form of software functional modules.
  • the integrated modules, if implemented in the form of software functional modules and sold or used as stand-alone products, may also be stored in a computer readable storage medium.
  • the above-mentioned storage medium may be a read only memory, a magnetic disk or an optical disk or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Small-Scale Networks (AREA)

Description

一种半环网络的保护方法、 设备及系统 本申请要求于 2009年 12月 30日提交中国专利局、 申请号为 200910266045. 2、发 明名称为 "一种半环网络的保护方法、 设备及系统"的中国专利申请的优先权, 其全部 内容通过引用结合在本申请中。
技术领域 本发明涉及通信技术领域, 具体涉及一种半环网络的保护方法、 设备及系统。
背景技术 环网特殊的网络拓扑结构为实现简单、 快速的网络保护能力提供了便利。 以太环 网的保护包括传统的以太网环保护 (Ethernet Ring Protection, ERP) 协议、 以太网 环网自动保护交换 (Ethernet Automatic Protection Switching, EAPS ) 协议、 快速 环网保护协议 (Rapid Ring Protection Protocol , RRPP) 等, 这三者原理基本相同, 都能支持多实例。 一个 EAPS/RRPP/ERP实例可以保护一个或多个虚拟局域网 (Virtual Local Area Network, VLAN) 的业务流量。 一个以太环网上可以存在一个或多个 EAPS/RRPP/ERP实 例。 对一个 EAPS/RRPP/ERP实例来说, 当以太环网处于正常状态时, 一般会在指定的一 个环节点上实现环保护链路 (Ring Protection Link, RPL), 对 RPL链路的业务流量进 行阻塞, 所保护的 VLAN的业务流量可以在环上除 RPL链路外的其他所有链路上传送; 当以太环网出现故障,指定环节点上原先阻塞的端口将打开, RPL链路将可用于传送 VLAN 的业务流量。 在实现本发明的过程中, 发明人研究发现: 以太环网的这几种保护技术都要求整 个网络由二层转发网络组成一个完整的环, 但是在有的情况下是不存在环的。 例如, 在 接入网组网的一些场景, 两个汇聚交换机之间无直连链路, 这样就不存在一个完整的二 层以太网环。 发明内容 本发明的实施例提供了一种半环网络的保护方法、 设备及系统, 能够在半环的情 况下进行环保护。 本发明的实施例提供的一种半环网络的保护方法, 包括: 在半环网络上的每个非闭合环节点和闭合环节点的组网端口运行以太环网保护协 议, 并且将所有的组网端口加入保护实例对应的虚拟局域网; 在半环网络上的非闭合环节点间建立基于伪线 PWE3或基于消息机制的连接,用于 传递保护实例的以太环网保护协议报文。 本发明的实施例提供的一种网络设备, 包括: 协议运行单元, 用于在组网端口运行以太环网保护协议, 并且将该组网端口加入 保护实例对应的虚拟局域网; 连接单元,用于与半环网络上的另一网络设备建立基于伪线 PWE3或基于消息机制 的连接, 以传递保护实例的以太环网保护协议报文。 本发明的实施例提供的一种半环网络的保护系统, 包括非闭合环节点和闭合环节 点, 在每个非闭合环节点和闭合环节点的组网端口运行以太环网保护协议, 并且将所有 的组网端口加入保护实例对应的虚拟局域网;在所述非闭合环节点间建立基于伪线 PWE3 或基于消息机制的连接, 用于传递保护实例的以太环网保护协议报文。 由本发明实施例提供的技术方案可知, 通过在半环网络上的每个非闭合环节点和 闭合环节点的组网端口运行以太环网保护协议, 并且将所有的组网端口加入保护实例对 应的虚拟局域网, 以及通过在半环网络上的非闭合环节点间建立基于伪线 PWE3或基于 消息机制的连接, 用于传递保护实例的以太环网保护协议的报文, 从而可以模拟一直连 链路, 这样便可以将半环网络视为一个由二层转发网络组成的一个完整的环网, 采用与 以太环网保护相同的技术完成半环网络的保护。 附图说明 为了更清楚地说明本发明实施例中的技术方案, 下面将对实施例描述中所需要使 用的附图作一简单地介绍。 图 1为本发明的实施例提供的一种半环网络的保护方法的示意图; 图 2为本发明的实施例提供的一种半环网络构成图;
图 3为图 2中汇聚交换机 1与 BRAS间的连接中断时的示意图;
图 4为图 3中主节点交换机 2打开环保护链路阻塞端口 Port2的示意图;
图 5为图 2中交换机 1和汇聚交换机 1间故障时的示意图;
图 6为本发明的实施例提供的一种网络设备的功能单元图;
图 7为本发明的实施例提供的一种半环网络的保护系统的组成示意图。 具体实肺式 为使本发明的目的、 技术方案、 及优点更加清楚明白, 下面结合附图并举实施例, 对本发明的实施例提供的技术方案进一步详细描述。
参见附图 1, 本发明的实施例提供的一种半环网络的保护方法, 包括如下内容: 11 , 在半环网络上的每个非闭合环节点和闭合环节点的组网端口运行以太环网保 护协议, 并且将所有的组网端口加入保护实例对应的虚拟局域网;
12 , 在半环网络上的非闭合环节点间建立基于伪线 PWE3或基于消息机制的连接, 用于传递保护实例的以太环网保护协议的报文。
本发明的实施例提供的半环网络的保护方法, 通过在半环网络上的每个非闭合环 节点和闭合环节点的组网端口运行以太环网保护协议, 并且将所有的组网端口加入保护 实例对应的虚拟局域网, 以及通过在半环网络上的非闭合环节点间建立基于伪线 PWE3或 基于消息机制的连接, 用于传递保护实例的以太环网保护协议的报文, 从而可以模拟一 直连链路, 这样便可以将半环网络视为一个由二层转发网络组成的一个完整的环网, 采 用与以太环网保护相同的技术完成半环网络的保护。
对本发明实施例提供的半环网络的保护, 进一步包括如下内容:
配置保护实例的主节点, 该主节点在正常状态时阻塞与其直连的环保护链路 RPL; 当半环网络上的非闭合环节点探测到上行链路故障或者半环网络上的闭合环节点 探测到环上链路故障时,发送故障消息通知所述主节点,所述主节点收到该故障消息后, 打开 RPL堵塞的端口;
所述主节点周期性地从非 RPL端口发送 HELLO消息, 如果从 PRL端口收到自己发出的 HELLO消息, 则将状态迁移回正常状态并阻塞 RPL端口。 其中, 在配置保护实例的主节点时, 为使得正常状态时堵塞的环保护链路 RPL最合 理, 可以配置保护实例中最远离半环网络的节点为主节点。
本发明实施例所述的以太环网保护协议可以为如下任一种: 传统的以太网环保护 协议 ERP, 或以太网环网自动保护交换协议 EAPS, 或快速环网保护协议 RRPP等。
下面以在半环网络上的非闭合环节点间建立基于伪线 PWE3的连接为例, 对本发明 提供的半环网络的保护方法进行说明。
伪线 PWE3 (Pseudo Wire Emulation Edge- to- Edge, 边缘到边缘仿真的伪线) 是 一种端到端的 2层业务承载技术, 属于点到点方式的二层虚拟专用网 (Layer2 Virtual Private Network, L2VPN)。 在包交换网络 (Packet Switching Network, PSN) 的两台 运营商边缘设备 ( Provider Edge, PE) 中, 它以标签分发协议 ( Label Distribution Protocol , LDP) 或资源预留装备协议 (Resource Reservation Protocol , RSVP) 作为 信令、通过隧道,例如可能是多协议标记交换(Multi-Protocol Label Switching, MPLS) 隧道、 通用路由封装协议 (Generic Routing Encapsulation , GRE) 或者第 3版的第二 层隧道协议 (Layer2 Tunneling Protocol , L2TPv3 ) 或者其他, 来模拟用户边缘设备 (Custom Edge, CE) 端的各种 2层业务, 如各种 2层数据报文 (包括以太网帧)、 比特流 等, 使 CE端的 2层数据在 PSN网络中透明传递。
参见附图 2, 半环网络上的每个节点的组网端口都运行 EAPS/ERP/RRPP协议, 这包 括图 2中每个交换机的两个组网端口, 以及汇聚交换机和交换机相连的端口 (其中交换 机 1、 2、 3为半环网络上的闭合环节点,汇聚交换机 1和 2为半环网络上的非闭合环节点), 这些端口的动作完全符合 EAPS/ERP/RRPP协议; 根据协议要求, 这些端口都需要加入到 保护实例对应的虚拟局域网 VLAN。
规划 VLAN业务的分布, 把所有 VLAN业务合理规划到相应的保护实例。 例如图 2中把 半环上所有 VLAN业务规划到两个保护实例, 一个 VLAN10保护实例, 一个是 VLAN20保护实 例; 半环网络上的每个节点的组网端口分别加入到 VLAN10和 VLAN20保护实例中。 可以理 解的是, 本发明实施例提供的半环保护方法可以支持多保护实例, 并不限于上述两个保 护实例。
由于在非闭合的两节点间无二层直连链路, 按照 EAPS/ERP/RRPP协议, 其应该为链 路故障, 本实施例通过在非闭合环节点间建立 PWE3伪线来模拟一直连链路, 用于传递保 护实例的 EAPS/ERP/RRPP协议报文。 具体到图 2中, 在汇聚交换机 1和汇聚交换机 2间通过 宽带接入服务器 (Broadband Remote Access Server, BRAS) 建立两条以太网 PWE3伪线, 用于传递 VLAN10和 VLAN20的 EAPS/ERP/RRPP协议报文,其他非 EAPS/ERP/RRPP协议报文的 以太网帧不走 PWE3封装。 例如当汇聚交换机 1的组网端口 (和交换机 1相连的端口)接收 到以太网帧时, 首先判断 VLA 是否为 20, 如果为 20还要通过类型进一步判断报文是否为 EAPS/ERP/RRPP协议报文, 如果是则进行 PWE3的封装, 通过经 BRAS的隧道发送到汇聚交 换机 2; 如果报文是 VLAN20但不是 EAPS/ERP/RRPP协议报文则按正常的转发流程进行转 发。
配置保护实例中最远离网络的节点为主节点, 在图 2中 VLAN10和 VLAN20保护实例中 最远离网络, 即距离汇聚交换机或 BRAS最远的节点都为交换机 2。
根据 EAPS/ERP/RRPP协议, 主节点在正常状态时会阻塞和其直连的环保护链路 RPL。 具体到图 2中 VLAN10保护实例的 RPL为交换机 1和交换机 2间的链路,所以 VLAN10会在交换 机 2的 Port 1上阻塞; VLAN20保护实例的 RPL为交换机 2和交换机 3间的链路, 所以 VLAN20 会在交换机 2的 Port 2上阻塞。
需要说明的是, 根据 EAPS/ERP/RRPP协议, 当以太环网上的节点探测直接链路故障 时, 需要发送故障消息通知环上其他设备。 而在本发明的半环网络中, 当非闭环节点检 测到 PW故障时, 也不发送故障消息通知环上其他节点, 因为这种情况下半环的拓扑没有 改变。 其中, 链路的检测可通过虚拟电路连接性检测 (Virtual Circuit Connectivity Verification , VCCV ) 或通过用于虚链路 ( Pseudo Wire , PW ) 的双向转发检测 (Bidirectional Forwarding Detection, BFD) 来完成。
当半环上的非闭环节点探测到其到上行链路故障时, 则发送故障消息通知半环上 的闭合环节点。 参见附图 3, 当汇聚交换机 1探测到其和 BRAS间的连接中断后, 汇聚交换 机 1将向交换机 1发送 EAPS/ERP/RRPP故障消息; 其中汇聚交换机 1和 BRAS间的连接检测可 以通过各种检测手段,这包括网际控制信息协议(Internet Control Message Protocol , I CMP ) Ping命令、 以太网的操作维护和管理 ( Operations Administration and Maintenance, ETH 0AM) 等。 保护实例 VLAN20的主节点交换机 2接收到经交换机 1转发过 来的故障消息后,根据 EAPS/ERP/RRPP协议,主节点交换机 2会打开 RPL阻塞的端口 Port2, 这样 VLAN20保护实例的业务数据将通过汇聚交换机 2上行, 如附图 4所示。 而保护实例 VLAN10无相应的故障通知消息, 所以其业务数据仍然通过汇聚交换机 2上行。
当半环上的闭合环节点探测到环上链路故障时, 可以按照正常的 EAPS/ERP/RRPP协 议处理。 具体到附图 5中, 当交换机 1和汇聚交换机 1间故障时, 交换机 1将向交换机 2发 送故障消息, 汇聚交换机 1通过伪线 PWE3向汇聚交换机 2发送故障消息, 保护实例 VLAN20 的主节点交换机 2接收到经交换机 1发过来的故障消息后, 根据 EAPS/ERP/RRPP协议, 其 会打开 RPL阻塞的端口 Port2,这样 VLAN20保护实例的业务数据将通过汇聚交换机 2上行; 而保护实例 VLAN10无相应的故障通知消息,所以其业务数据仍然通过汇聚交换机 2上行。 同理, 当故障发生在交换机 1和交换机 2之间时, 根据 EAPS/ERP/RRPP协议, 交换机 1会向 汇聚交换机 1发送故障通知消息, 汇聚交换机 1通过伪线 PWE3向汇聚交换机 2发送故障消 息, 交换机 2会打开 VLAN20保护实例 RPL阻塞的端口 Port2, 此时保护实例 VLAN20的业务 数据将通过汇聚交换机 1和汇聚交换机 2上行。
同于以太环网上的主节点, 本发明提供的半环网的主节点也周期性地从非 RPL端口 发送 HELLO消息, 如果半环网上的故障链路全部恢复后, 主节点将可以从 RPL端口收到自 己发出的 HELLO消息, 此时主节点首先将状态迁移回正常状态, 阻塞 RPL端口并刷新介质 访问控制地址 (Media Access Control , MAC) 转发表, 然后从非 RPL端口发送故障恢复 消息,半环上的节点收到该故障恢复消息后,刷新各自的转发表。具体到附图 5中, VLAN20 保护的主节点交换机 2将不断向 Port l发送 HELLO消息, 当交换机 1和汇聚交换机 1间的故 障恢复后, 汇聚交换机 1将接收到 HELLO消息, 汇聚交换机 1将 HELLO消息封装到伪线 PWE3 中, 经 BRAS传递到汇聚交换机 2, 汇聚交换机 2再把此消息经过交换机 3发送到交换机 2, 主节点交换机 2发现自己能接收到自己发出的 HELLO消息, 即可判断网络已经恢复正常, 再次阻塞自己的 RPL端口 Port2。
综上所述, 通过在半环网络上的非闭合环节点间建立基于伪线 PWE3的连接, 用于 传递保护实例的以太环网保护协议的报文, 从而可以模拟一直连链路, 这样便可以将半 环网络视为一个由二层转发网络组成的一个完整的环网,采用与以太环网保护相同的技 术完成半环网络的保护。
需要说明的是, 该模拟的直连链路与实际的直连链路不同在于: 半环网络上的非 闭合环节点需要对上行链路状态进行检测并通知环上其他节点; 需要通过 PW透传以太环 网保护协议报文; 以及在检测到模拟直连链路的 PW故障不发送故障消息的特殊处理。
在半环网络上的非闭合环节点间建立基于消息机制的连接和建立基于伪线 PWE3的 连接类似, 区别在于不建 PWE3连接, 而是在两个非闭环节点间通过消息机制进行通信。 该消息包括扩展的链路层、 网络层、 传输层、 应用层的通用协议或私有协议。 例如在附 图 2中, 汇聚交换机 1、 汇聚交换机 2间可以建立用户数据报协议 (User Datagram Protocol , UDP ) 或传输控制协议 ( Transmission Control Protocol , TCP ) 连接, 当 汇聚交换机 1接收到 EAPS/ERP/RRPP协议报文时, 其将通过 UDP/TCP协议把报文携带到汇 聚交换机 2, 汇聚交换机 2恢复出相关报文信息后继续向交换机 3发送。
需要说明的是, 在本发明提供的半环保护中, 两非闭环节点间无论是建立基于伪 线 PWE3的连接还是建立基于消息机制的连接,都可以不需要传递故障消息和故障恢复消 息, 而仅传递 HELLO消息。
基于上述本发明提供的半环网络保护的方法实施例, 参见附图 6, 本发明的实施例 提供了一种网络设备, 包括:
协议运行单元 61, 用于在组网端口运行以太环网保护协议, 并且将该组网端口加 入保护实例对应的虚拟局域网;
连接单元 62, 用于与半环网络上的另一网络设备建立基于伪线 PWE3或基于消息机 制的连接, 以传递保护实例的以太环网保护协议报文。
由于半环网络上的两个非闭合环节点间无二层直连链路, 按照以太环网保护协议, 其应该为链路故障,本实施例通过在网络设备间建立基于伪线 PWE3或基于消息机制的连 接, 用于传递保护实例的以太环网保护协议报文, 从而可以模拟一直连链路, 这样便可 以将半环网络视为一个由二层转发网络组成的一个完整的环网,采用与以太环网保护相 同的技术完成半环网络的保护。
根据以太环网保护协议, 主节点在正常状态时会阻塞和其直连的环保护链路 RPL。 当半环上的非闭合环节点探测到上行链路故障或者半环网络上的闭合环节点探测到环 上链路故障时, 将发送故障消息通知主节点, 主节点将根据收到的故障消息打开环保护 链路 RPL堵塞的端口。 为此, 发实施例提供的网络设备还可以包括:
故障通知单元, 用于在探测到上行链路故障时, 发送故障消息通知主节点, 使得 所述主节点收到该故障消息后打开环保护链路 RPL堵塞的端口。
同于以太环网上的主节点, 半环网的主节点也周期性地从非 RPL端口发送 HELLO消 息, 如果半环网上的故障链路全部恢复后, 主节点将可以从 RPL端口收到自己发出的 HELLO消息, 此时主节点将状态迁移回正常状态并阻塞 RPL端口。 为此, 发实施例提供的 网络设备还可以包括:
消息传递单元, 用于向半环网络上的另一网络设备传递主节点周期性发送的 HELLO 消息。
同样基于上述本发明提供的半环网络保护的方法实施例, 参见附图 7, 本发明的实 施例提供了一种半环网络的保护系统, 包括非闭合环节点 71、 72和闭合环节点 70、 74、 75, 在每个非闭合环节点和闭合环节点的组网端口运行以太环网保护协议, 并且将所有 的组网端口加入保护实例对应的虚拟局域网 VLAN10、 VLAN20 ; 在所述非闭合环节点 71、 72间建立基于伪线 PWE3或基于消息机制的连接,用于传递保护实例的以太环网保护协议 报文。
本实施例的半环网络的保护系统, 进一步配置保护实例中最远离半环网络的节点 70为主节点, 该主节点 70在正常状态时阻塞与其直连的环保护链路 RPL;
在所述非闭合环节点 71、 72探测到上行链路故障或者所述闭合环节点 74、 75探测 到环上链路故障时, 发送故障消息通知所述主节点 70, 所述主节点收到该故障消息后, 打开 RPL堵塞的端口;
所述主节点 70周期性地从非 RPL端口发送 HELLO消息, 如果从 PRL端口收到自己发出 的 HELLO消息, 则将状态迁移回正常状态并阻塞 RPL端口。
需要说明的是, 本领域普通技术人员可以理解实现上述实施例方法中的全部或部 分流程, 是可以通过计算机程序来指令相关的硬件来完成, 所述的程序可存储于一计算 机可读取存储介质中, 该程序在执行时, 可包括如上述各方法实施例的流程。
本发明实施例中的各功能单元可以集成在一个处理模块中, 也可以是各个单元单 独物理存在, 也可以两个或两个以上单元集成在一个模块中。 上述集成的模块既可以采 用硬件的形式实现, 也可以采用软件功能模块的形式实现。 所述集成的模块如果以软件 功能模块的形式实现并作为独立的产品销售或使用时, 也可以存储在一个计算机可读取 存储介质中。 上述提到的存储介质可以是只读存储器, 磁盘或光盘等。
上述具体实施例并不用以限制本发明, 对于本技术领域的普通技术人员来说, 凡 在不脱离本发明原理的前提下, 所作的任何修改、 等同替换、 改进等, 均应包含在本发 明的保护范围之内。

Claims

权利要求
1、 一种半环网络的保护方法, 其特征在于, 包括:
在半环网络上的每个非闭合环节点和闭合环节点的组网端口运行以太环网保护协 议, 并且将所有的组网端口加入保护实例对应的虚拟局域网;
在半环网络上的非闭合环节点间建立基于伪线 PWE3或基于消息机制的连接, 用于 传递保护实例的以太环网保护协议报文。
2、 如权利要求 1所述半环网络的保护方法, 其特征在于, 所述方法还包括: 配置保护实例的主节点, 该主节点在正常状态时阻塞与其直连的环保护链路 RPL; 当半环网络上的非闭合环节点探测到上行链路故障或者半环网络上的闭合环节点 探测到环上链路故障时,发送故障消息通知所述主节点,所述主节点收到该故障消息后, 打开 RPL堵塞的端口;
所述主节点周期性地从非 RPL端口发送 HELLO消息, 如果从 PRL端口收到自己发出的 HELLO消息, 则将状态迁移回正常状态并阻塞 RPL端口。
3、 如权利要求 2所述半环网络的保护方法, 其特征在于, 所述配置保护实例的主 节点具体为:
配置保护实例中最远离半环网络的节点为主节点。
4、 如权利要求 1所述半环网络的保护方法, 其特征在于, 所述以太环网保护协议 为如下任一种: 传统的以太网环保护协议 ERP, 或以太网环网自动保护交换协议 EAPS, 或快速环网保护协议 RRPP。
5、 一种网络设备, 其特征在于, 包括:
协议运行单元, 用于在组网端口运行以太环网保护协议, 并且将该组网端口加入 保护实例对应的虚拟局域网;
连接单元, 用于与半环网络上的另一网络设备建立基于伪线 PWE3或基于消息机制 的连接, 以传递保护实例的以太环网保护协议报文。
6、 如权利要求 5所述的网络设备, 其特征在于, 还包括:
故障通知单元, 用于在探测到上行链路故障时, 发送故障消息通知主节点, 使得 所述主节点收到该故障消息后打开环保护链路 RPL堵塞的端口。
7、 如权利要求 5所述的网络设备, 其特征在于, 还包括:
消息传递单元, 用于向半环网络上的所述另一网络设备传递主节点周期性发送的 HELLO消息。
8、 一种半环网络的保护系统, 其特征在于, 包括非闭合环节点和闭合环节点, 在 每个非闭合环节点和闭合环节点的组网端口运行以太环网保护协议, 并且将所有的组网 端口加入保护实例对应的虚拟局域网; 在所述非闭合环节点间建立基于伪线 PWE3或基于 消息机制的连接, 用于传递保护实例的以太环网保护协议报文。
9、 如权利要求 8所述半环网络的保护系统, 其特征在于, 所述保护系统进一步配 置保护实例中最远离半环网络的节点为主节点, 该主节点在正常状态时阻塞与其直连的 环保护链路 RPL;
当所述非闭合环节点探测到上行链路故障或者所述闭合环节点探测到环上链路故 障时, 发送故障消息通知所述主节点, 所述主节点收到该故障消息后, 打开 RPL堵塞的 端口;
所述主节点周期性地从非 RPL端口发送 HELLO消息, 如果从 PRL端口收到自己发出的 HELLO消息, 则将状态迁移回正常状态并阻塞 RPL端口。
PCT/CN2010/079452 2009-12-30 2010-12-06 一种半环网络的保护方法、设备及系统 WO2011079688A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP10840477A EP2512070A1 (en) 2009-12-30 2010-12-06 Protection method, equipment and system for semi-ring network
US13/536,697 US20120269056A1 (en) 2009-12-30 2012-06-28 Method, device, and system for protecting semi-ring network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2009102660452A CN101789903B (zh) 2009-12-30 2009-12-30 一种半环网络的保护方法、设备及系统
CN200910266045.2 2009-12-30

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US13/536,697 Continuation US20120269056A1 (en) 2009-12-30 2012-06-28 Method, device, and system for protecting semi-ring network

Publications (1)

Publication Number Publication Date
WO2011079688A1 true WO2011079688A1 (zh) 2011-07-07

Family

ID=42532965

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/079452 WO2011079688A1 (zh) 2009-12-30 2010-12-06 一种半环网络的保护方法、设备及系统

Country Status (4)

Country Link
US (1) US20120269056A1 (zh)
EP (1) EP2512070A1 (zh)
CN (1) CN101789903B (zh)
WO (1) WO2011079688A1 (zh)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101789903B (zh) * 2009-12-30 2012-05-23 华为技术有限公司 一种半环网络的保护方法、设备及系统
CN102510354A (zh) * 2011-12-15 2012-06-20 盛科网络(苏州)有限公司 基于vpls和g8032的支持双归属的环网方法及系统
CN102857379B (zh) * 2012-09-18 2016-08-03 中兴通讯股份有限公司 保护以太环网节点间连通性的控制方法、装置及第一节点
CN107786435B (zh) * 2016-08-25 2021-06-25 中兴通讯股份有限公司 伪线保护方法及装置
WO2018090210A1 (zh) * 2016-11-15 2018-05-24 华为技术有限公司 业务报文传输方法及节点设备

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1625176A (zh) * 2003-12-03 2005-06-08 华为技术有限公司 边缘到边缘伪线仿真协议的实现方法
WO2008037781A1 (en) * 2006-09-29 2008-04-03 Nokia Siemens Networks Gmbh & Co. Kg Method for protection switching in ring topologies
CN101179469A (zh) * 2006-11-10 2008-05-14 中兴通讯股份有限公司 一种利用多条分组交换网络隧道承载伪线业务的方法
WO2008089633A1 (fr) * 2007-01-23 2008-07-31 Huawei Technologies Co., Ltd. Procédé et appareil pour protéger un anneau éthernet
CN101789903A (zh) * 2009-12-30 2010-07-28 华为技术有限公司 一种半环网络的保护方法、设备及系统

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8050183B2 (en) * 2005-05-06 2011-11-01 Cisco Technology, Inc. System and method for implementing reflector ports within hierarchical networks
CN100521638C (zh) * 2006-08-24 2009-07-29 杭州华三通信技术有限公司 相交以太环网及其自动保护方法、以及环网节点设备
US7990850B2 (en) * 2008-04-11 2011-08-02 Extreme Networks, Inc. Redundant Ethernet automatic protection switching access to virtual private LAN services
CN101534234B (zh) * 2009-04-20 2011-05-11 杭州华三通信技术有限公司 一种相交以太环网保护方法和系统
US20100287405A1 (en) * 2009-05-08 2010-11-11 Tellabs Operations, Inc. Method and apparatus for internetworking networks
US8625410B2 (en) * 2009-05-11 2014-01-07 Ciena Corporation Dual homed E-spring protection for network domain interworking
IL200503A0 (en) * 2009-08-20 2011-08-01 Eci Telecom Ltd Technique for dual homing interconnection between communication networks

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1625176A (zh) * 2003-12-03 2005-06-08 华为技术有限公司 边缘到边缘伪线仿真协议的实现方法
WO2008037781A1 (en) * 2006-09-29 2008-04-03 Nokia Siemens Networks Gmbh & Co. Kg Method for protection switching in ring topologies
CN101179469A (zh) * 2006-11-10 2008-05-14 中兴通讯股份有限公司 一种利用多条分组交换网络隧道承载伪线业务的方法
WO2008089633A1 (fr) * 2007-01-23 2008-07-31 Huawei Technologies Co., Ltd. Procédé et appareil pour protéger un anneau éthernet
CN101789903A (zh) * 2009-12-30 2010-07-28 华为技术有限公司 一种半环网络的保护方法、设备及系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2512070A4 *

Also Published As

Publication number Publication date
CN101789903B (zh) 2012-05-23
CN101789903A (zh) 2010-07-28
EP2512070A4 (en) 2012-10-17
US20120269056A1 (en) 2012-10-25
EP2512070A1 (en) 2012-10-17

Similar Documents

Publication Publication Date Title
US7283465B2 (en) Hierarchical virtual private LAN service protection scheme
US9509591B2 (en) Technique for dual homing interconnection between communication networks
US8854975B2 (en) Scaling OAM for point-to-point trunking
EP2498454B1 (en) Method, device and system for processing service traffic based on pseudo wires
EP2951959B1 (en) Using ethernet ring protection switching with computer networks
EP1974485B1 (en) Vpls failure protection in ring networks
US20090274155A1 (en) Technique for providing interconnection between communication networks
WO2012028029A1 (zh) 一种切换方法及系统
WO2009056034A1 (fr) Procédé, système et équipement pour établir une détection bfd pour un tunnel lsp
WO2008077300A1 (fr) Procédé et système permettant de négocier le discriminateur de session de détection de transmission bidirectionnelle d'un pseudo-fil
US8199637B2 (en) VPLS remote failure indication
WO2012024952A1 (zh) 一种基于点到多点业务的路径切换方法及系统
WO2009092241A1 (zh) 基于环路的报文传送方法、网络系统和节点设备
WO2011144088A2 (zh) 一种业务保护方法及接入设备
Fang et al. The evolution of carrier ethernet services-requirements and deployment case studies [next-generation carrier ethernet]
WO2013010422A1 (zh) 基于共享路径的环网隧道配置方法、环网保护方法及系统
WO2012162946A1 (zh) 一种报文处理方法及系统
CN101345686B (zh) 虚拟专用局域网服务环路的处理方法、装置和系统
WO2011079688A1 (zh) 一种半环网络的保护方法、设备及系统
WO2012092779A1 (zh) 一种pbbh-vpls网络中的业务保护方法
WO2012146097A1 (zh) Vpls网络和以太环网的倒换方法及装置
WO2011113395A2 (zh) 一种负载分担方法和装置
WO2008095360A1 (fr) Méthode et système de commutation rapide en cas de défaillance d'une liaison d'un réseau privé virtuel
WO2013127179A1 (zh) 虚拟专用局域网的故障处理方法、装置及系统
CN102843282B (zh) 一种报文处理方法及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10840477

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2010840477

Country of ref document: EP