WO2012079375A1 - Procédé et système de protection de liaison dans un réseau privé virtuel - Google Patents

Procédé et système de protection de liaison dans un réseau privé virtuel Download PDF

Info

Publication number
WO2012079375A1
WO2012079375A1 PCT/CN2011/077802 CN2011077802W WO2012079375A1 WO 2012079375 A1 WO2012079375 A1 WO 2012079375A1 CN 2011077802 W CN2011077802 W CN 2011077802W WO 2012079375 A1 WO2012079375 A1 WO 2012079375A1
Authority
WO
WIPO (PCT)
Prior art keywords
node
standby
pseudowire
tunnel
forwarding
Prior art date
Application number
PCT/CN2011/077802
Other languages
English (en)
Chinese (zh)
Inventor
吴世华
陈世猛
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2012079375A1 publication Critical patent/WO2012079375A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • H04L41/0663Performing the actions predefined by failover planning, e.g. switching to standby network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/50Routing or path finding of packets in data switching networks using label swapping, e.g. multi-protocol label switch [MPLS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/40Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/22Alternate routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/28Routing or path finding of packets in data switching networks using route fault recovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/68Pseudowire emulation, e.g. IETF WG PWE3

Definitions

  • the present invention relates to a link protection technology for a virtual private network, and more particularly to a link protection method and system for a virtual private network.
  • MPLS TE Multiprotocol Label Switching Traffic Engineering
  • FRR Fast Reroute
  • the MPLS TE FRR technology is a technology for implementing network local protection.
  • the LSP configured with fast reroute protection can automatically switch data to the protection chain. Go on the road.
  • MPLS TE FRR establishes a local backup path in advance, protecting the LSP from link/node failure.
  • the device detecting the link/node failure can quickly switch the service from the faulty link to the backup path.
  • the head node of the LSP tries to find a new path to re-establish the LSP and switch the data to the new path. Before the new LSP is established successfully, the service data is always forwarded through the protection path.
  • the virtual private network FRR (Virtual Private Network FRR) utilizes a VPN-based private network route fast handover technology, and sets the primary PE and the standby PE in the remote PE in advance.
  • the primary and secondary forwarding entries combined with the rapid detection of PE faults, are designed to solve the problem that the end-to-end service convergence time caused by PE node failure is longer in the MPLS VPN network where the user edge device (CE, Customer Edge) is dual-homed to the PE.
  • CE Customer Edge
  • the problem of s) and the problem that the PE node failure recovery time is related to the number of private network routes it carries. In the case of a PE node failure, the end-to-end service convergence time is less than ls.
  • Virtual Private Line Service (VPWS, Virtual Private Wire Service) is built on MPLS
  • VPWS Virtual Private Wire Service
  • Layer 2 transparent transmission is provided between a pair of ports on both routers.
  • the main components of VPWS include: PE router, Label Distribution Protocol (LDP), and MPLS Label Switching Tunnel (LSP Tunnel). Interface devices that join the VPWS service support broadcast, forward, and filter Ethernet frames.
  • the PEs are connected to each other by pseudowires (PW, Pseudo Wire) to form a simulated LAN for the client.
  • PW pseudowires
  • Each PE not only learns the Media Access Control (MAC) address of the Ethernet packet from the PW, but also learns the MAC address from the CE it is connected to.
  • the PW usually uses an MPLS tunnel to transparently transmit data between the PEs.
  • the tunnel can be a Label Distribution Protocol (LDP), and the Resource ReSerVation Protocol-Traffic Engineering (RSVP-TE) Wait.
  • LDP Label Distribution Protocol
  • RSVP-TE Resource ReSerVation Protocol-Traffic Engineering
  • a PE is usually an MPLS edge router and can establish tunnels to other PEs.
  • the present invention provides a link protection method and system for a virtual private network, which can shorten the time of service interruption when the link is interrupted, compared with the prior art.
  • the present invention provides the following technical solutions:
  • a link protection method for a virtual private network where a sending node and a receiving node in the virtual private network are connected to an active forwarding node and a standby forwarding node by using a pseudowire to form the sending node and the primary forwarding node. And a path between the receiving node and the transmitting node, the standby forwarding node, and the receiving node, the method includes:
  • the method further includes: if the path between the sending node, the primary forwarding node, and the receiving node is disconnected due to a fault, the sending node switches the path of the service to the sending node, and the standby forwarding A path between a node and the receiving node.
  • the path between the sending node, the primary forwarding node, and the receiving node Forming a pseudowire or a backup tunnel between the transmitting node and the primary forwarding node, and a pseudowire or a standby tunnel between the primary forwarding node and the receiving node;
  • the step of switching the service carried by the failed pseudowire to the standby tunnel includes: if the backup tunnel does not pass through the routing node in the virtual private network, the forwarding label according to the pre-acquired standby tunnel will be faulty. The traffic carried by the pseudowire is switched to the standby tunnel.
  • the step of switching the service carried by the failed pseudowire to the standby tunnel includes: if the standby tunnel passes through at least one routing node in the virtual private network, and performs service switching according to a pre-failed pseudowire To the alternate tunnel.
  • a link protection system for a virtual private network where a sending node and a receiving node in the virtual private network are connected to an active forwarding node and a standby forwarding node by using a pseudowire to form the sending node and the primary forwarding node. And a path between the receiving node and the transmitting node, the standby forwarding node, and the receiving node, the system includes a setting module and a first switching module, where:
  • the setting module is configured to: set a standby tunnel for at least one pseudowire in the pseudowire; the first switching module is configured to: when a pseudowire fault of the standby tunnel is set, the faulty pseudowire is carried The service switches to the standby tunnel.
  • the system also includes a second switching module
  • the second switching module is configured to: when the path between the sending node, the primary forwarding node, and the receiving node is disconnected due to a fault, switch the path of the service to the sending node, and the standby Transmitting a path between the node and the receiving node;
  • the second switching module is deployed on the sending node.
  • the first switching module is configured to switch the service carried by the failed pseudowire to the standby tunnel in the following manner:
  • the service carried by the failed pseudowire is switched to the standby tunnel according to the forwarding label of the pre-acquired standby tunnel.
  • the first switching module is configured to switch the service carried by the failed pseudowire to the standby tunnel in the following manner:
  • the service carried according to the pre-failed pseudowire switches to the standby tunnel.
  • the technical solution provided by the present invention by setting a backup tunnel for a pseudowire, to switch to the standby tunnel when the pseudowire fails, and implementing local protection for the transmission link, and directly performing the active/standby forwarding node in the prior art.
  • the service processing content required for the handover is reduced, thereby improving the switching speed, achieving the purpose of rapid handover, and shortening the time of service interruption.
  • FIG. 1 is a schematic structural diagram of an embodiment of a link protection system of a virtual private network according to an embodiment of the present invention
  • FIG. 2 is a schematic diagram of networking of an embodiment of the present invention.
  • FIG. 1 is a schematic structural diagram of an embodiment of a link protection system of a virtual private network according to an embodiment of the present invention.
  • the transmitting node and the receiving node in the virtual private network in the system embodiment shown in FIG. 1 are connected to the primary forwarding node and the standby forwarding node by using a pseudowire.
  • the system includes: a setting module, a first switching module, and a second switching. Module, where:
  • the setting module is configured to: set a standby tunnel for at least one of the pseudowires; the first switching module is configured to: when a pseudowire fault of the standby tunnel is set, switch the service carried by the failed pseudowire to the Said alternate tunnel.
  • the setting module and the first switching module are deployed on a node, including at least one of a sending node, an active forwarding node, and an alternate forwarding node.
  • the system further includes a second switching module, wherein the second switching module is configured to: switch the service path when the path between the sending node, the active forwarding node, and the receiving node is disconnected due to a fault And a path between the sending node, the standby forwarding node, and the receiving node.
  • the second switching module is deployed on the sending node.
  • the tunnel set for the pseudowire may be a tunnel directly connected between the nodes at both ends of the pseudowire, or may be formed by at least two tunnels between at least one routing node and nodes at both ends of the pseudowire, for example, sending
  • the pseudowire between the node and the active forwarding node is provided with a standby tunnel, which may be a tunnel that directly connects the sending node and the primary forwarding node, or may be forwarded by the routing node A through the routing node A.
  • the multi-segment tunnel connected by the node that is, the tunnel between the sending node and the routing node A is M, and the tunnel between the routing node A and the active forwarding node is N, then the combination of the tunnel M and the tunnel N constitutes the transmitting node and the primary node.
  • the first switching module is further configured to: when the standby tunnel does not pass through the routing node in the virtual private network, switch the service carried by the failed pseudowire to the standby tunnel according to the forwarding label of the standby tunnel.
  • the forwarding label of the standby tunnel includes information of the downstream node of the failed pseudowire, so the service can be routed to the downstream node of the failed pseudowire.
  • the first switching module is further configured to: when the standby tunnel passes through at least one routing node in the virtual private network, a forwarding label according to the failed pseudowire and a forwarding label allocated by the routing node will occur The service carried by the failed pseudowire is switched to the standby tunnel.
  • the forwarding label of the standby tunnel includes information of the downstream node of the failed pseudowire, so the service may be routed to the downstream node of the failed pseudowire;
  • the standby tunnel passes through the routing node, and the routing node performs routing according to the forwarding label of the failed pseudowire, and routes the service to the downstream node of the failed pseudowire according to the forwarding label allocated by the next hop routing node.
  • the system provided by the present invention provides a backup tunnel for a pseudowire, and when the pseudowire fails, the switch is switched to the standby tunnel to implement local protection on the transmission link, and the active/standby forwarding node is directly implemented in the prior art. Compared with the switching, the business processing content required for the switching is reduced, thereby improving the switching speed, achieving the purpose of rapid switching, and shortening the time of service interruption.
  • the link between the sending node, the active forwarding node, and the receiving node is called the primary path.
  • the link between the sending node, the standby forwarding node, and the receiving node is called the alternate path. These two paths are called the global link. protection.
  • the priority order of the path selection is a global protection primary path, a primary path, a local protection tunnel, a global protection alternate path, and an alternate path, a local protection tunnel.
  • the VPWS network is taken as an example for description, but is not limited thereto.
  • the proposed Layer 2 virtual private network is also applicable, and will not be described here:
  • a tunnel is also arranged between the nodes at both ends of each pseudowire to implement switching between the pseudowire and the tunnel to achieve local protection of the primary path.
  • the link protection device creates a VPWS service forwarding, a global protection forwarding table, and a local protection forwarding table according to the structure of the network;
  • the VPWS service forwarding table includes a global protection index, and is used to find a global protection table. See Table 1 in which the VC label in the VPWS table is the VC label of the primary label and the forwarding label.
  • the global protection forwarding table records the primary path and the alternate path of the global protection, as shown in Table 2. Specifically, the forwarding label of the PW in the active path (that is, the pseudo-line forwarding label allocated by the primary forwarding node to the sending node) and the virtual circuit (VC) label (ie, the receiving node is allocated to the sending node to pass the primary use) Forwarding the virtual label of the node; the same as the forwarding label and VC label of the PW in the alternate path;
  • the global protection forwarding table further includes a local protection flag bit and a local protection index, where: when the pseudo line of the main path fails, if the local protection flag is invalid, the data service packet is performed according to the global protection active/standby path. For protection switching, the forwarding label and VC label in the alternate path need to be used for transmission. When the local protection flag is valid, the data is forwarded according to the local protection table. At this time, the VC label is obtained from the global protection table, and the forwarding label is obtained from the local protection table. Obtained, the data service packet is protected and switched according to the locally protected tunnel.
  • the local protection forwarding table is generally used when a backup tunnel has multiple tunnels. See Table 3 for recording the active/standby relationship of the pseudowire and its corresponding tunnel in the local protection, the respective outbound port index, and the tunnel access. Tag information, where the egress port index is used to find the next bounce port table.
  • PE1 and PE2 are source nodes and target nodes, respectively, where P1 is the primary node and P2 is the standby node, and PE1 and PE2 can communicate through PW1 and PW2, where PW1 includes PW11 and PW12, where PW11 (PE1-P1) and PW12 (P1-PE2), PW2 include PW21 (PE1-P2) and PW22 (P2-PE2). among them:
  • the MPLS TE protection tunnels of PW11 are Tl ( PE1-P3 ) and T2 ( P3-P1 ) ;
  • the MPLS TE protection tunnels of the PW12 are T3 (P1-P4) and T4 (P4-PE2).
  • the MPLS TE protection tunnels of the PW21 are T5 ( PE1-P5 ) and T6 ( P5-P2 ) ;
  • the MPLS TE protection tunnels of the PW22 are T7 (P2-P6) and T8 (P2-PE2).
  • the starting point of the MPLS TE protection tunnel is the same as the starting point of each pseudo line.
  • the PE1 device is used as an example.
  • the VPWS forwarding table has a global protection index.
  • the global protection table in the VPWS forwarding table is used to query the global protection table.
  • the information about PW1 and PW2 can be obtained.
  • the PW1 information includes the forwarding label assigned by P1 to PE1.
  • PE2 is assigned to the VC label of PW1 of PE1;
  • the information of PW2 includes the forwarding label assigned by P2 to PE1 and the VC label of PW2 allocated by PE2 to PE1.
  • PW1 and PW2 both establish a protection relationship for local protection.
  • Take PW11 as an example.
  • a new tunnel consisting of tunnels T1 and T2 protects PW11.
  • the local protection table is queried according to the local protection index in the global protection table.
  • the PE1 device is used as an example.
  • the local protection entry includes the primary tunnel forwarding label, the standby tunnel forwarding label, the next hop port information of the primary tunnel, and the next hop port information of the standby tunnel.
  • the tunnel T1 and ⁇ 2 protect the PW11 segment.
  • the index of the local protection is Index1; the tunnels T3 and T4 protect the PW of the PW12, and the index of the local protection is Index2.
  • the Index1 entry includes the primary tunnel forwarding label, which is the label that P1 assigns to PE1.
  • the standby tunnel forwarding label is the label that P3 assigns to PE1.
  • the next-hop outgoing port information of the primary tunnel is the outgoing port information of PE1 to P1.
  • the port information is the outbound port information of PE1 to P3.
  • the index 2 entry includes the label of the primary tunnel forwarding label that is assigned to P1 by PE2.
  • the label of the standby tunnel is the label that P4 assigns to P1.
  • the information of the next outbound port of the primary tunnel is P1.
  • the outgoing port information of PE2, and the information of the next outgoing port of the standby tunnel is the outbound port information of P1 to P4.
  • the forwarding label in the local protection table is the forwarding label assigned by P1 to PE1, and the next hop is directed to P1.
  • the packet encapsulates the Layer 2 label for forwarding, and the outer forwarding label is localized.
  • the protection table is obtained, the inner VC tag is obtained from the global protection table; if there is local protection switching, the forwarding label in the local protection table is the label assigned by P3 to PE1, and the inner label of the local protection protection is the label assigned by P1 to PE1.
  • the time packet encapsulates the Layer 3 label for forwarding, and the outer layer 2 label is obtained from the local protection table, which is the label assigned by P3 to PE1, the inner label of the local protection protection is the label assigned by P1 to PE1, and the inner layer is the VC of PW1.
  • the label is obtained from the global protection table, and the next hop is directed to P3 forwarding, thereby achieving local protection.
  • PE1 When PW11 fails but PW12 is working normally, PE1 is faulty due to PW11 failure. The data is switched to the PW11 protection tunnel for transmission. After the P1 receives the data, the PW12 is still working, and the PW12 is still used for transmission. Therefore, the path of communication between PE1 and PE2 is T1-T2-PW12.
  • PE1 When both PW11 and PW12 are faulty, PE1 will switch data to the PW11 protection tunnel for transmission. After P1 receives the data, P1 will switch the data to the PW12 protection tunnel after the PW12 fails. Transmission, so the path of communication between PE1 and PE2 is T1 - T2 - T3 - T4;
  • the standby node needs to be used for transmission, that is, the transmission between the PE and PE2 and the P2 is performed, so PE1 and PE2 The path of communication between them is PW21-PW22.
  • the method of transmitting data is as follows:
  • Step 201 After determining that the received network packet is a VPWS network packet according to the access mode of the network packet, PE1 searches for a corresponding VPWS forwarding entry, where the VPWS forwarding table includes a global protection index, a PW VC label, and a forwarding. Label, ;
  • Step 202 The PE1 searches for the global protection forwarding entry from the VPWS forwarding entry according to the global protection index that is found.
  • Step 203 PE1 determines whether the local protection flag in the global protection forwarding is set, if yes, proceeds to step 204, otherwise proceeds to step 203;
  • Step 204 The PE1 processes the received network packet in the manner that the global VPWS service global protection protection is configured, that is, the P1 network is transmitted from the PW11 to the P1, and the process ends.
  • Step 205 The PE1 searches for the partial protection according to the local protection index in the global protection forwarding table that is found.
  • the guard entry, the local protection entry contains the next hop information to obtain the information of the TE primary tunnel and the standby tunnel (such as the outgoing port of the pseudowire and the outgoing port of the standby tunnel);
  • Step 206 The PE1 encapsulates and forwards the VPWS service packet, which includes: obtaining the VC label of the VPWS service from the global protection table, the VC label is a label allocated by the LDP protocol, and the forwarding label of the VPWS service is a local protection entry. The label is obtained, and the label of the local protection entry is a label allocated by the RSVP protocol. The process ends.
  • P1 can refer to the processing flow of steps 201-206 to transfer data to PE2. If P1 cannot transmit data to PE2, P1 notifies PE1 that transmission cannot be performed, and PE1 passes between P2 and P2. The pseudowire transmits data to PE2.
  • FIG. 3 is a schematic structural diagram of an embodiment of a link protection method for a virtual private network according to the present invention.
  • the transmitting node and the receiving node in the virtual private network in the method embodiment shown in FIG. 3 are connected to the primary forwarding node and the standby forwarding node through a pseudowire to form the transmitting node.
  • Step 301 Set a standby tunnel for at least one pseudowire in the pseudowire.
  • Step 302 When a pseudowire fault with the standby tunnel is set, the service carried by the failed pseudowire is switched to the standby tunnel.
  • the method further includes:
  • the sending node switches the path of the service to the sending node, the standby forwarding node, and the receiving The path between nodes.
  • the path in the method embodiment is specifically described as follows: the path between the sending node, the active forwarding node and the receiving node, and the pseudo between the sending node and the active forwarding node a line or backup tunnel, comprising a pseudowire or a standby tunnel between the primary forwarding node and the receiving node;
  • the step of switching the service carried by the failed pseudowire to the standby tunnel includes: if the backup tunnel does not pass through the routing node in the virtual private network, the forwarding label according to the pre-acquired standby tunnel will be faulty.
  • the service carried by the pseudowire is switched to the standby tunnel; if the standby tunnel passes through at least one routing node in the virtual private network, the service carried according to the pre-failed pseudowire switches to the standby tunnel.
  • the method of the present invention provides a backup tunnel for a pseudowire, and when the pseudowire fails, the switch is switched to the standby tunnel to implement local protection on the transmission link, and the active/standby forwarding node is directly implemented in the prior art. Compared with the switching, the business processing content required for the switching is reduced, thereby improving the switching speed, achieving the purpose of rapid switching, and shortening the time of service interruption.
  • all or part of the steps of the foregoing embodiments may also be implemented by using an integrated circuit. These steps may be separately fabricated into individual integrated circuit modules, or multiple modules or steps may be fabricated into a single integrated circuit module. achieve.
  • the invention is not limited to any particular combination of hardware and software.
  • the various devices/function modules/functional units in the above embodiments may be implemented using a general-purpose computing device, which may be centralized on a single computing device or distributed over a network of multiple computing devices.
  • Each device/function module/functional unit in the above embodiments can be stored in a computer readable storage medium when implemented in the form of a software function module and sold or used as a standalone product.
  • the above mentioned computer readable storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
  • the technical solution provided by the present invention by setting a backup tunnel for a pseudowire, to switch to the standby tunnel when the pseudowire fails, and implementing local protection for the transmission link, and directly performing the active/standby forwarding node in the prior art.
  • the business processing content required for the switching is reduced, thereby improving the switching speed, achieving the purpose of rapid switching, shortening the time of service interruption, and having strong industrial applicability.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

La présente invention concerne un procédé et un système destinés à une protection de liaison dans un réseau privé virtuel. Des nœuds de transmission et des nœuds de réception dans le réseau virtuel privé sont tous reliés à un nœud d'envoi principal et à un nœud de transmission d'attente par l'intermédiaire de pseudo-câbles. Le procédé comprend les étapes suivantes : un canal d'attente est réglé pour au moins l'un des pseudo-câbles (301) ; quand le pseudo-câble avec un canal d'attente échoue, les services acheminés sur le pseudo-câble sont commutés au canal d'attente (302). La solution technique de la présente invention peut s'appliquer à la gestion d'une protection de liaison de couche 2 dans un réseau privé virtuel.
PCT/CN2011/077802 2010-12-17 2011-07-29 Procédé et système de protection de liaison dans un réseau privé virtuel WO2012079375A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010594648.8A CN102035681B (zh) 2010-12-17 2010-12-17 虚拟专用网络的链路保护方法和系统
CN201010594648.8 2010-12-17

Publications (1)

Publication Number Publication Date
WO2012079375A1 true WO2012079375A1 (fr) 2012-06-21

Family

ID=43888048

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/077802 WO2012079375A1 (fr) 2010-12-17 2011-07-29 Procédé et système de protection de liaison dans un réseau privé virtuel

Country Status (2)

Country Link
CN (1) CN102035681B (fr)
WO (1) WO2012079375A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019056922A1 (fr) * 2017-09-22 2019-03-28 烽火通信科技股份有限公司 Procédé et système de commutation de protection par dérivation d'un vpws basés sur un réacheminement rapide
CN115801552A (zh) * 2021-09-10 2023-03-14 华为技术有限公司 保护倒换方法及网络设备

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102035681B (zh) * 2010-12-17 2015-07-22 中兴通讯股份有限公司 虚拟专用网络的链路保护方法和系统
CN102282805B (zh) * 2011-05-26 2014-04-02 华为技术有限公司 一种业务保护方法及接入设备
CN102255759B (zh) * 2011-08-16 2015-05-20 杭州华三通信技术有限公司 一种基于pw冗余备份的数据报文传输方法和设备
CN102572905A (zh) * 2012-01-09 2012-07-11 中兴通讯股份有限公司 一种双归保护倒换方法和系统
CN102769561B (zh) 2012-06-28 2015-05-27 华为技术有限公司 在业务保护方案中减少丢包的方法和系统
CN104348719A (zh) * 2013-07-29 2015-02-11 中兴通讯股份有限公司 数据转发处理的方法及设备
CN105791072A (zh) * 2014-12-22 2016-07-20 华为数字技术(苏州)有限公司 以太虚拟网络的接入方法及装置
CN104753722B (zh) * 2015-04-08 2018-01-02 烽火通信科技股份有限公司 一种快速倒换的dni‑pw实现方法及系统
CN104796331B (zh) * 2015-04-29 2018-02-16 烽火通信科技股份有限公司 一种单交换系统实现lsp和vc分层保护的方法
CN107995008B (zh) * 2016-10-27 2021-07-06 中兴通讯股份有限公司 一种业务告警处理方法、装置及系统
CN109698781B (zh) * 2018-12-20 2021-10-29 新华三技术有限公司 报文转发路径的管理方法和pe设备
CN109768925B (zh) * 2019-03-27 2021-05-25 新华三技术有限公司 一种主备伪线切换方法及装置
CN112995026A (zh) * 2019-12-13 2021-06-18 中兴通讯股份有限公司 一种链路保护方法、装置,入口节点及存储介质
CN112532515A (zh) * 2020-12-21 2021-03-19 安徽皖通邮电股份有限公司 一种基于e1业务线路切换的方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101137974A (zh) * 2003-10-07 2008-03-05 思科技术公司 用于mpls快速重路由的增强切换
CN101316225A (zh) * 2007-05-30 2008-12-03 华为技术有限公司 一种故障检测方法、通信系统和标签交换路由器
CN101834773A (zh) * 2010-03-30 2010-09-15 中兴通讯股份有限公司 一种虚拟专用局域网业务的保护方法和系统
CN102035681A (zh) * 2010-12-17 2011-04-27 中兴通讯股份有限公司 虚拟专用网络的链路保护方法和系统

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101645836B (zh) * 2009-08-25 2012-04-18 杭州华三通信技术有限公司 多协议标签交换网络中的分组传输方法和装置
CN101667970B (zh) * 2009-10-23 2012-09-26 杭州华三通信技术有限公司 保护倒换方法和设备
CN101902396A (zh) * 2010-06-18 2010-12-01 中兴通讯股份有限公司 一种多协议标签交换流量工程中隧道保护的方法和系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101137974A (zh) * 2003-10-07 2008-03-05 思科技术公司 用于mpls快速重路由的增强切换
CN101316225A (zh) * 2007-05-30 2008-12-03 华为技术有限公司 一种故障检测方法、通信系统和标签交换路由器
CN101834773A (zh) * 2010-03-30 2010-09-15 中兴通讯股份有限公司 一种虚拟专用局域网业务的保护方法和系统
CN102035681A (zh) * 2010-12-17 2011-04-27 中兴通讯股份有限公司 虚拟专用网络的链路保护方法和系统

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019056922A1 (fr) * 2017-09-22 2019-03-28 烽火通信科技股份有限公司 Procédé et système de commutation de protection par dérivation d'un vpws basés sur un réacheminement rapide
CN115801552A (zh) * 2021-09-10 2023-03-14 华为技术有限公司 保护倒换方法及网络设备

Also Published As

Publication number Publication date
CN102035681A (zh) 2011-04-27
CN102035681B (zh) 2015-07-22

Similar Documents

Publication Publication Date Title
WO2012079375A1 (fr) Procédé et système de protection de liaison dans un réseau privé virtuel
JP4729119B2 (ja) ラベルスイッチングネットワークにおける通信装置
CN102664788B (zh) Mpls l3vpn中ce双归链路保护的方法及系统
EP2498454B1 (fr) Procédé, dispositif et système de traitement de trafic de service sur la base de pseudofils
WO2011060667A1 (fr) Procédé et dispositif de protection de liaison dans un réseau privé virtuel local
US8004964B2 (en) Restoring multi-segment pseudowires following failure of a switching PE device
US20130272114A1 (en) Pseudo wire switching method and device
WO2012028029A1 (fr) Procédé et système de commutation
WO2006017982A1 (fr) Procede de reacheminement dans le reseau multiprotocole a commutateur d'etiquettes
WO2007016834A1 (fr) Procede rapide de convergence de services de point a point et dispositif associe cote fournisseur de services
WO2008083590A1 (fr) Procédé et appareil de convergence rapide d'un service point à point
WO2015024408A1 (fr) Procédé de commutation de tunnels, dispositif et commutateur
KR20140015401A (ko) Ldp를 사용한 mpls 고속 재라우팅(ldp-frr)
EP2057544A2 (fr) Protection de pseudofils à segments multiples
WO2009105974A1 (fr) Procédé et appareil pour un déroutage rapide dans un réseau privé virtuel (vpn) de commutation multiprotocole par étiquette (mpls)
WO2009056034A1 (fr) Procédé, système et équipement pour établir une détection bfd pour un tunnel lsp
WO2011076029A1 (fr) Procédé et dispositif pour mettre en oeuvre un réacheminement rapide
WO2008080312A1 (fr) Procédé de convergence, dispositif, système pour réseau toute connexion ainsi qu'un dispositif domestique double
JP2011528524A (ja) パケット交換網における擬似ワイヤの確立
WO2006079292A1 (fr) Procede pour la creation d'un trajet pour l'etiquette retour dans un systeme de commutation d'etiquettes multiprotocole
WO2012016458A1 (fr) Procédé et appareil de transmission de données dans un réseau privé virtuel de couche 2
WO2013040930A1 (fr) Procédé et dispositif de protection de nœud intermédiaire pour chemin à commutation d'étiquettes de diffusion groupé
WO2012079368A1 (fr) Procédé et système pour le reroutage rapide de réseau privé virtuel de couche trois de commutation d'étiquette multiprotocole
US20090292942A1 (en) Techniques for determining optimized local repair paths
WO2013029438A1 (fr) Procédé de protection d'interface ethernet et dispositif côté réseau

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11848518

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11848518

Country of ref document: EP

Kind code of ref document: A1