WO2015032356A1 - 网络保护方法、装置、下环节点及系统 - Google Patents
网络保护方法、装置、下环节点及系统 Download PDFInfo
- Publication number
- WO2015032356A1 WO2015032356A1 PCT/CN2014/086097 CN2014086097W WO2015032356A1 WO 2015032356 A1 WO2015032356 A1 WO 2015032356A1 CN 2014086097 W CN2014086097 W CN 2014086097W WO 2015032356 A1 WO2015032356 A1 WO 2015032356A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- lower ring
- node
- ring node
- service data
- another
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/42—Loop networks
- H04L12/437—Ring fault isolation or reconfiguration
Definitions
- the present invention relates to the field of communications, and in particular, to a network protection method, apparatus, lower ring node, and system.
- the service data usually starts from the source node and is transmitted to the sink node through a number of network elements and links between adjacent network elements.
- the ring network protection and/or dual-homing protection is usually used for network protection.
- FIG. 1 shows a schematic structural diagram of a transmission network that uses both ring network protection and dual-homing protection.
- the transmission network includes a base station 102, an access network element A, a transmission network element B, a transmission network element C, a lower ring node D, a lower ring node E, and an RNC (Radio Network Controller) 104.
- the base station 102 and the access network element A are connected by the access link 1; the access network element A and the transport network element B are connected by the transmission link 2, and the access network element A and the transmission network element C are connected.
- the transmission network element B and the transmission network element C are connected by transmission links 4 and 5, and the transmission network element B and the lower ring node D are connected by the transmission link 6; the transmission network element C
- the lower ring node D and the lower ring node E pass through the transmission link 8; the lower ring node D and the RNC 104 pass the AC (Attachment circuit) chain.
- the path 9 is connected, and the lower ring node E and the RNC 104 are connected by an AC link 10.
- the access network element, the transport network element, the transmission link, and the lower ring node belong to the network side, and the network side may be a MPLS (Multi-Protocol Label Switching) network; the AC link and the RNC belong to the AC side.
- MPLS Multi-Protocol Label Switching
- Access network element A, transmission link 2, transmission network element B, transmission link 5, transmission network element C and transmission link 3 constitute the first ring network; transmission network element B, transmission link 4, transmission network Element C, transmission link 7, lower ring node E, transmission link 8, lower ring node D and transmission link 6 form a second ring network.
- the clockwise direction is the normal working direction and the counterclockwise direction is the working direction. That is, in the normal working state, the transmission path of the service data is “base station->A->B->D->RNC”, but when one transmission network element or transmission link on the ring network fails, the ring The working direction of the network will be reversed.
- the two ring networks will be switched.
- the transmission path of the service data is "Base Station->A->C->E->D ->RNC".
- the ring network protection cannot solve the problem that the lower ring node or the AC link is faulty.
- the lower ring node refers to the service data that does not need to continue to be forwarded on the network side after reaching the node, and needs to jump out from the network side to the AC side. node.
- the RNC 104 is connected to the two lower ring nodes at the same time to form dual-homing protection.
- the dual-homing protection needs to be implemented by the network-side dual-homing technique to which the lower-loop node D and the lower-loop node E belong (indicated by the dotted line in the figure) and the AC-side dual-homing technology to which the AC link belongs.
- the following ring node D is the master node
- the lower ring node E is the standby node as an example.
- a PW (Pseudo Wire) channel is established between the access network element A and the lower ring node D and E, and OAM is provided.
- the transmission path of the service data is “base station->A->B->D->RNC.
- the active/standby switchover occurs.
- the service data is transmitted to the RNC 104 by the lower ring node E and the AC link 10 between the AEs.
- the transmission path of the service data is "base station->A->C->E- >RNC".
- the foregoing transmission network needs to be configured with a holdoff time, which is a manually set delay time for coordinating dual-homing protection and ring network protection.
- a holdoff time which is a manually set delay time for coordinating dual-homing protection and ring network protection.
- the ring protection and dual-homing protection on the network side may be reversed, which may cause the entire transmission network to be unnecessary.
- the disorder causes the dual-homing protection to occur when the fault message is received and the fault has not been eliminated after the delay time.
- the holdoff time is usually greater than 100 ms, it is impossible to meet the requirement that the delay time is less than 50 ms in the telecommunication network;
- dual-homing protection requires two OAMs to detect faults in dual-homed nodes.
- the OAM resources and bandwidth are very expensive. For example, if there are 1000 services, it will cost 2000 channels. OAM resources.
- the embodiment of the present invention provides a network protection method, device, and lower ring node. system.
- the technical solution is as follows:
- a network protection method for setting any one of two lower ring nodes connected to a same access device on a ring network protected by a ring network, the method comprising:
- the policy for determining the service ring includes:
- the current lower ring node performs the lower ring operation on the service data, and/or sends the service data to the another lower ring node to perform a lower ring operation.
- the acquiring service configuration information of another downlink node includes:
- the obtaining, by the another lower ring node, the service configuration information of the another lower ring node including:
- the service configuration information of the another downlink node sent by the another downlink node is received by the extended message of the operation, management, and maintenance of the OAM mechanism on the ring network.
- the policy includes: in a case where the current node performs the downlink operation of the service data, the downlink policy of the service data is determined to include the service data at the current lower ring node Before performing the ring operation, the method further includes:
- the performing the downlink policy for determining the service data includes the step of performing the lower ring operation on the service data by the current lower ring node.
- the method further includes:
- the service data is sent to the another lower ring node to perform a lower ring operation.
- the policy includes: when the service data is sent to the another lower ring node for a lower ring operation, the lower ring policy for determining the service data includes: sending the service data to the another lower ring node Before performing the ring operation, the method further includes:
- performing the decision that the lower ring policy includes the step of sending the service data to the another lower ring node for a lower ring operation.
- the detecting whether the another lower ring node is reachable includes:
- Determining whether the another lower ring node is reachable by detecting whether the predetermined channel is normal, the predetermined channel being a channel established in advance between the current lower ring node and the another lower ring node; or
- Determining whether the another lower ring node is reachable by receiving a message sent by the another lower ring node by using a predetermined channel, where the predetermined channel is established in advance between the current lower ring node and the another lower ring node aisle.
- a network protection apparatus for setting any one of two lower ring nodes connected to a same access device on a ring network protected by a ring network, the device comprising:
- An information obtaining module configured to acquire service configuration information of another lower ring node
- a data detection module configured to: when the service data is received, check whether the service configuration information carried by the service data matches the service configuration information of the another downlink node;
- the policy decision module is configured to: if the detection result is that the service configuration information carried by the service data matches the service configuration information of the another downlink node, the lower ring policy for determining the service data includes:
- the current lower ring node performs the lower ring operation on the service data, and/or sends the service data to the another lower ring node to perform a lower ring operation.
- the information acquiring module includes: a first acquiring unit or a second acquiring unit;
- the first obtaining unit is configured to acquire service configuration information of the another lower ring node from the another lower ring node;
- the second obtaining unit is configured to obtain service configuration information of the another downlink node from the network management system of the ring network.
- the first acquiring unit is configured to:
- the service configuration information of the another downlink node sent by the another downlink node is received by the extended message of the operation, management, and maintenance of the OAM mechanism on the ring network.
- the network protection device further includes: a link detection module;
- the link detection module is further configured to detect whether an access link between the current node and the access device fails;
- the policy decision module is configured to: if the detection result of the link detection module is that the access link does not fail, perform a policy of deciding the service data, and include the service at the current lower ring node. The step of data performing the lower loop operation.
- the policy decision module is further configured to: if the detection result is that the access link is faulty, The service data is sent to the other lower ring node for the lower ring operation.
- the network protection device further includes: a peer detection module;
- the peer detecting module is configured to detect whether the another lower ring node is reachable
- the policy decision module is configured to: if the detection result is that the another downlink node is reachable, performing the decision that the downlink policy includes the step of sending the service data to the another downlink node for performing a lower ring operation.
- the peer detection module is configured to:
- Determining whether the another lower ring node is reachable by detecting whether the predetermined channel is normal, the predetermined channel being a channel established in advance between the current lower ring node and the another lower ring node; or
- Determining whether the another lower ring node is reachable by receiving a message sent by the another lower ring node by using a predetermined channel, where the predetermined channel is established in advance between the current lower ring node and the another lower ring node aisle.
- a lower ring node comprising the network protection device of any of the second aspect and various possible implementations.
- a network system including a ring network provided with ring network protection, and two lower ring nodes connected to the same access device on the ring network;
- the lower ring node is the lower ring node described in the third aspect above.
- the service configuration information carried by the service data is matched with the service configuration information of the other lower ring node. If the detection result is a match, the lower loop policy of the service data is determined; the problem that the long holdoff time and the dual-homing protection need to be configured with more OAM resources are solved when the dual-homing protection and the ring network protection coexist; It is necessary to set the dual-homing protection specifically. Only when the ring network protection is set, the two lower-loop nodes on the ring network can decide the lower-loop strategy when receiving the service data of the lower-end ring node. With double Protects the same protection.
- 1 is a schematic structural diagram of a transmission network using both ring network protection and dual-homing protection
- FIG. 2 is a schematic structural diagram of an implementation environment involved in a network protection method according to an embodiment of the present invention
- FIG. 3 is a flowchart of a method for a network protection method according to an embodiment of the present invention.
- FIG. 4A is a flowchart of a method for a network protection method according to another embodiment of the present invention.
- FIG. 4B is a schematic diagram of an implementation of a network protection method provided by the embodiment shown in FIG. 4A;
- FIG. 5 is a schematic structural diagram of an implementation environment involved in a network protection method according to another embodiment of the present invention.
- 6A is a flowchart of a method for a network protection method according to another embodiment of the present invention.
- FIG. 6B is a schematic diagram of an implementation of a network protection method provided by the embodiment shown in FIG. 6A;
- FIG. 7 is a structural block diagram of a network protection apparatus according to an embodiment of the present invention.
- FIG. 8 is a structural block diagram of a network protection apparatus according to another embodiment of the present invention.
- FIG. 9 is a structural block diagram of a lower ring node according to an embodiment of the present invention.
- FIG. 2 illustrates a network protection method provided by a part of embodiments of the present invention.
- FIG. 2 illustrates a network protection method provided by a part of embodiments of the present invention.
- the implementation environment includes a ring network deployed with ring network protection and without traditional dual-homing protection, and two lower ring nodes D and E connected to the same access device RNC 204 on the ring network.
- the two lower ring nodes D and E are used to implement the traditional dual-homing protection function.
- the implementation environment further includes a base station 202, a network element A, a network element B, and a network element C. among them:
- the base station 202 and the network element A are connected by the access link 21; the network element A and the network element B are connected by the transmission link 22, and the network element A and the network element C are connected by the transmission link 23; B and network element C are connected by transmission links 24 and 25, and network element B and lower ring node D are connected by transmission link 26; network element C and lower ring node E are connected by transmission link 27; The lower ring node D and the lower ring node E are connected by a transmission link 28; the lower ring node D and the RNC 204 are connected by an AC (Attachment Circuit) link 29, and the lower ring node E and the RNC 204 pass through The AC link 20 is connected.
- AC Acttachment Circuit
- the network element A, the network element B, and the network element C, and the links between the three network elements form a ring network, and the ring network protection is deployed; the network element B, the network element C, the lower ring node D, and the lower ring node E and the links between the four network elements constitute the aforementioned ring network, and ring network protection is also deployed but traditional dual-homing protection is not deployed.
- the lower ring node D and the lower ring node E may be device entities or logical entities inside the device.
- FIG. 3 is a flowchart of a method for a network protection method according to an embodiment of the present invention. This embodiment is exemplified by applying the network protection method to any of the two lower ring nodes shown in FIG. 2.
- the network protection method includes:
- Step 301 Obtain service configuration information of another downlink node.
- the current lower ring node needs to obtain the service configuration information of the other lower ring node D.
- the service configuration information includes the transmission information of the service data and the downlink information.
- the service configuration information may be a tunnel label and a PW label.
- the following is the default working node of the ring node D.
- the service data is defaulted on the lower ring node D.
- the network element A establishes a PW channel with the lower ring node D.
- the lower ring node E obtains the service configuration information of the lower ring node D in advance.
- Step 302 When receiving the service data, check whether the service configuration information carried by the service data matches the service configuration information of another downlink node.
- the service data that needs to be ringed under another ring node will be directly transmitted to another The ring node does not pass the current lower ring node. However, if the link on the ring network fails or another ring node fails, the ring network will be switched. The service data of the lower ring node will pass through the current lower ring node. When receiving the service data, the point detects whether the service configuration information carried in the service data matches the service configuration information of another downlink node.
- a service data is required to be downlinked on the lower ring node D by default.
- the path is transmitted from the path A->B->D to the lower ring node D for the lower ring operation.
- the transmission link 26 or the lower ring node D between the network element B and the lower ring node D fails, the network element B, the network element C, the landing node D, and the landing node E, and the four network elements
- the ring link will form a ring network switchover.
- the service data will be transmitted by the path A->B->C->E->D, and the lower ring node E will receive the service data.
- the point E When receiving the service data, the point E detects whether the service configuration information carried by the service data matches the service configuration information of another downlink node. If the detection result is a match, it indicates that the service data is defaulted on the lower ring node D. Business data.
- Step 303 If the detection result is that the service configuration information carried by the service data matches the service configuration information of the other downlink node, the downlink policy of the decision service data includes: performing the lower ring operation on the current downlink node, and/ Or send the service data to another lower ring node for the lower ring operation.
- the lower ring policy of the lower ring node decision service data is:
- the current lower ring node performs the lower ring operation on the service data, and sends the service data to another lower ring node for the lower ring operation.
- the network protection method obtains service configuration information of another lower ring node by using one of the two lower ring nodes, and detects the service carried by the service data when receiving the service data. Whether the configuration information matches the service configuration information of another lower-loop node; if the detection result is a match, the lower-loop policy of the service data is determined; and the long holdoff time and the dual-homing are required to be solved when the dual-homing protection and the ring network protection coexist. Protection requires a lot of OAM resources; it is not necessary to set up dual-homing protection. Only when the ring network protection is set, the two lower ring nodes on the ring network receive the peer lower ring node.
- FIG. 4A is a flowchart of a method for a network protection method according to another embodiment of the present invention. This embodiment is exemplified by applying the network protection method to any of the two lower ring nodes shown in FIG. 2.
- the network protection method includes:
- Step 401 Obtain service configuration information of another downlink node.
- the current downlink node needs to obtain the service configuration information of the other downlink node.
- the service configuration information includes the transmission information of the service data and the downlink information.
- the service configuration information may be a tunnel label and a PW label. That is, the lower ring node D needs to obtain the service configuration information of the lower ring node E, and the lower ring node E needs to obtain the service configuration information of the lower ring node D.
- the following is the default working node of the ring node D.
- the service data is defaulted on the lower ring node D.
- the network element A establishes a PW channel with the lower ring node D.
- the lower ring node E obtains the service configuration information of the lower ring node D in advance.
- this step can be implemented in any of the following two implementation manners:
- the current lower ring node acquires service configuration information of the other lower ring node from another lower ring node;
- the current lower ring node When there is a predetermined channel between the current lower ring node and another lower ring node, the current lower ring node receives the service configuration information of another lower ring node sent by another lower ring node through the predetermined channel, where the predetermined channel is pre-in the current lower ring node.
- a channel established between another lower ring node For example, a predetermined channel is pre-established between the lower ring node D and the lower ring node E.
- the predetermined channel is usually carried on the transmission link 28, and the lower ring node D transmits its own service configuration information to the lower ring node E through the predetermined channel.
- the lower ring node E receives the service configuration information of the lower ring node D through the predetermined channel; the lower ring node E also sends its own service configuration information to the lower ring node D through the predetermined channel, and the lower ring node D receives the lower channel through the predetermined channel. Service configuration information of the ring node E.
- the current lower ring node receives the service configuration information of another lower ring node sent by another lower ring node through the extended message of the OAM mechanism on the ring network.
- the lower ring node D sends its own service configuration information to the lower ring node E through the extended message of the OAM mechanism on the ring network, and the lower ring node E passes the extended report.
- the message receives the service configuration information of the lower ring node D; the lower ring node E sends its own service configuration information to the lower ring node D through the extended message of the OAM mechanism on the ring network, and the lower ring node D receives the extended message through the extended message.
- Service configuration information of the ring node E receives the extended message through the extended message.
- the current lower ring node obtains service configuration information of another lower ring node from the network management system of the ring network.
- the current lower ring node can also obtain another from the network management system of the ring network.
- Service configuration information of the ring node For example, when the network management system in the ring network sends the service configuration information of the lower ring node D to the lower ring node D, the service configuration information of the lower ring node D is also sent to the lower ring node E; the network management system in the ring network When the service configuration information of the lower ring node E is sent by the lower ring node E, the service configuration information of the lower ring node E is also sent to the lower ring node D.
- Step 402 When receiving service data, detecting whether the service configuration information carried in the service data matches the service configuration information of another downlink node;
- the service data that needs to be ringed at another lower ring node is directly transmitted to another lower ring node and does not pass through the current lower ring node.
- the link on the ring network fails or another ring node fails, ring network switching occurs.
- the service data of the ring that needs to be in the ring of another ring node passes through the current lower ring node during transmission.
- the ring node detects whether the service configuration information carried in the service data matches the service configuration information of another downlink node.
- a service data is required to be downlinked on the lower ring node D by default.
- the path is transmitted from the path A->B->D to the lower ring node D for the lower ring operation.
- the transmission link 26 or the lower ring node D between the network element B and the lower ring node D fails, the network element B, the network element C, the landing node D, and the landing node E, and the four network elements
- the ring link will form a ring network switchover.
- the service data will be transmitted by the path A->B->C->E->D, and the lower ring node E will receive the service data.
- the point E When receiving the service data, the point E detects whether the service configuration information carried by the service data matches the service configuration information of another downlink node. If the detection result is a match, it indicates that the service data is defaulted on the lower ring node D. Business data.
- Step 403 Detect whether an access link between the current lower ring node and the access device is faulty, and/or detect whether another downlink node is reachable;
- the current lower ring node detects whether the access link between the current lower ring node and the access device is faulty, and/or the current lower ring node also detects whether another lower ring node is reachable. Another link The unreachable point may be caused by the failure of another lower ring node itself or by a fault between two lower ring nodes.
- the two fault detections can be performed simultaneously or only one test can be performed. Take two fault detections at the same time as an example, namely:
- the lower ring node E detects whether the AC link 20 is faulty, and detects whether the lower ring node D is reachable;
- the lower ring node D If the lower ring node D is the current lower ring node, the lower ring node D detects whether the AC link 29 is faulty and detects whether the lower ring node E is reachable.
- the current lower ring node When the current lower ring node detects whether the access link between the current lower ring node and the access device is faulty, the current lower ring node can detect whether a fault occurs through an AC fault detection mechanism on the access link.
- the current lower ring node detects whether another lower ring node is reachable, it can be implemented in any of the following three ways:
- the current lower ring node detects whether another lower ring node is reachable through the OAM mechanism on the ring network;
- the OAM detection mechanism on the ring network will alarm to another lower ring node when one lower ring node is unreachable.
- the current lower ring node determines whether another lower ring node is reachable by detecting whether the predetermined channel is normal, and the predetermined channel is a channel established in advance between the current lower ring node and another lower ring node;
- the current lower ring node determines whether another lower ring node is reachable by detecting whether the predetermined channel is normal. If the predetermined channel is normal, determining another lower ring node may be If the scheduled channel is abnormal, it is determined that another lower ring node is unreachable. It should be noted that the case that the predetermined channel is abnormal is not all caused by the failure of another lower ring node, or the transmission link carrying the predetermined channel may be faulty, and it is considered that another lower ring node is not available. Da.
- the current lower ring node may also receive a message sent by another lower ring node through the predetermined channel to determine whether another lower ring node is reachable, if another subordinate node is received.
- the normal packet sent by the ring node periodically determines that another downlink node is reachable. If the normal packet sent by another loopback node is not received or the abnormal packet sent by another loopback node is received, it is determined.
- the other lower ring node is unreachable. For example, if the lower ring node D finds that the access link 29 is faulty, the lower ring node E may send an abnormal packet. When receiving the abnormal packet, the lower ring node E determines that the lower ring node D is unreachable.
- Step 404 If the detection result is that the service configuration information carried by the service data matches the service configuration information of another downlink node, the lower ring policy of the service data is directly or according to the fault detection result;
- the lower ring node determines the lower ring policy of the service data, and the service data is the service data that is detected in step 402 and matches the service configuration information carried by the service data with the service configuration information of another downlink node. Since the above step 403 is an optional step, the step may specifically have four implementation manners:
- the current lower ring node directly determines the lower ring policy: the current lower ring node performs the lower ring operation on the service data, and sends the service data to the other lower ring node for the lower ring operation.
- the RNC 204 may receive 2 copies of the same service data, and the RNC 204 may selectively receive one copy, for example, save the service data received first, and then discard it when receiving the same service data.
- the current lower ring node determines the delivery policy of the service data according to the fault detection result of the access link
- the current lower ring node determines the delivery policy of the service data according to the fault detection result of the access link:
- the lower loop policy of the current lower ring node decision service data includes: performing the lower ring operation on the current lower ring node;
- the lower loop policy of the current lower ring node decision service data includes: sending the service data to another lower ring node for performing the lower ring operation.
- the current lower ring node determines the delivery policy of the service data according to the fault detection result of the other lower ring node
- the current lower ring node determines the delivery policy of the service data according to the fault detection result of the other lower ring node:
- the lower ring policy of the current lower ring node deciding the service data includes: performing the lower ring operation on the current lower ring node;
- the lower ring policy of the current lower ring node decision service data includes: sending the service data to another lower ring node for the lower ring operation.
- the current lower ring node determines the delivery strategy of the service data according to the two fault detection results
- the decision-making loop policy includes: sending the service data to another lower ring node for performing the lower ring operation;
- the decision to perform the loopback policy includes: performing the lower loop operation on the current downlink node;
- the decision-making loop policy includes:
- the current lower ring node performs the lower ring operation on the service data, and sends the service data to another lower ring node for the lower ring operation.
- the detection result is that the access link on the current side fails and the other lower ring node is unreachable, the service data cannot be sent.
- the lower ring node performs the service data of the lower ring, and the current lower ring node according to its own service configuration information.
- the service data that is received by the current lower ring node to perform the lower ring is also applicable.
- the lower ring policy determined in this embodiment is also applicable.
- a master may be introduced between the lower ring node D and the lower ring node E. Prepare the relationship. That is:
- step 403 After the fault detection process of step 403, the active/standby relationship between the current lower ring node and another lower ring node is determined according to the fault detection result; then in step 404, the current lower ring node decides according to whether it is the primary node or the standby node.
- the lower ring strategy At this time, the detection process of step 403 and step 401 and step 402 may be independent of each other in the execution order.
- the process of determining the active/standby relationship may include:
- the current lower ring node determines the active/standby relationship between the current lower ring node and another lower ring node according to the default active/standby relationship; for example, the ring network defaults clockwise.
- the default active/standby relationship is the lower ring node D as the primary node, under The ring node E is a standby node.
- the current lower ring node determines that the active/standby relationship is: the current lower ring node is the master node, and the other lower ring node is the standby node; for example, if the lower ring node D is unreachable, the lower ring node E determines The active/standby relationship is as follows: the lower ring node E is the master node, and the lower ring node D is the standby node. For example, if the lower ring node E is unreachable, the lower ring node D determines that the active/standby relationship is: the lower ring node D is the master node. The lower ring node E is a standby node.
- the current lower ring node determines that the active/standby relationship is the current lower ring node as the standby node and the other lower ring node as the primary node.
- the lower ring node D determines that the active/standby relationship is as follows: the lower ring node E is the master node, and the lower ring node D is the standby node; for example, when the AC link 20 fails, the lower link Point E determines that the active/standby relationship is as follows: the lower ring node D is the master node, and the lower ring node E is the standby node.
- the two lower ring nodes switch the active/standby relationship through the predetermined channel.
- the process of the current lower ring node determining the lower ring policy may include:
- the current lower ring node determines the lower ring policy: the current lower ring node performs the lower ring operation on the service data.
- the current lower ring node determines the lower ring policy to send the service data to another lower ring node for the lower ring operation.
- the ring network defaults to the normal working direction.
- the lower ring node D is the master node and the lower ring node E is the standby node.
- the lower ring node D will receive the service data smoothly and send it directly to the RNC. That is, the transmission path of the service data sent by the base station 202 to the RNC 204 at this time is: base station 202->A->B->D->RNC204.
- the network element B detects the fault through the ring network OAM when the service data is sent to the lower ring node D, triggering the ring network to be switched, but the lower ring node and the AC link do not occur. If the fault occurs, the lower ring node D is still the master node, and the lower ring node E is still the standby node. The following ring node E receives the service data, and then the lower ring node E forwards the service data to the lower ring node D, and then The lower ring node D sends the service data to the RNC. At this time, the transmission path of the service data sent by the base station 202 to the RNC 204 is: the base station 202->A->B->C->E->D->RNC204.
- the network element B passes the service data when it sends the service data to the lower ring node D.
- the ring network OAM detects the fault and triggers the ring network to switch.
- the following ring node E receives the service data.
- the lower ring node E detects that the lower ring node D is unreachable through the ring network OAM, triggers the active/standby switchover, and the lower ring node E becomes the master node, and then the lower ring node E sends the service data directly to the RNC according to the lower ring policy.
- the transmission path of the service data sent by the base station 202 to the RNC 204 is: the base station 202->A->B->C->E->RNC204.
- the lower ring node D detects the fault through the fault detection mechanism on the AC link, and triggers the active/standby switchover.
- the lower ring node D becomes the standby node.
- the service data sent by the base station is received by the lower ring node D, and the lower ring node D forwards the service data to the E according to the lower ring policy, and the lower ring node E sends the service data to the RNC.
- the transmission path of the service data sent by the base station 202 to the RNC 204 is: the base station 202->A->B->D->E->RNC204.
- the network protection method obtains service configuration information of another lower ring node by using one of the two lower ring nodes, and detects the service carried by the service data when receiving the service data. Whether the configuration information matches the service configuration information of another lower-loop node; if the detection result is a match, the lower-loop policy of the service data is determined; and the long holdoff time and the dual-homing are required to be solved when the dual-homing protection and the ring network protection coexist.
- step 403 may not be performed, or only one of the fault detections may be performed, or two fault detections may be performed at the same time.
- the more types of fault detection mechanisms are performed the more complicated the network side control logic is, but The more redundant service data that may be sent; the fewer types of fault detection mechanisms are performed, the simpler the control logic on the network side, but the less redundant service data that may be sent.
- different strategies can be adopted according to different implementation environments and computing capabilities on the network side.
- FIG. 5 is a schematic structural diagram of another implementation environment involved in the network protection method according to another embodiment of the present invention.
- the implementation environment includes a ring network deployed with ring network protection and without traditional dual-homing protection, and two lower ring nodes D and E connected to the same access device RNC 204 on the ring network, and the lower ring node D includes a transmission component d and
- the AC side dual-homing component 52, the transmitting component d and the AC-side dual-homing component 52 are logical entities on the device entity to which the lower ring node D belongs;
- the lower ring node E includes a transmitting component e and an AC-side dual-homing component 54, and the transmitting component e
- the AC-side dual-homing component 54 is a logical entity on the device entity to which the lower ring node E belongs.
- the implementation environment further includes a base station 202, a network element A, a network element B, and a network element C. among them:
- the base station 202 and the network element A are connected by the access link 21; the network element A and the network element B are connected by the transmission link 22, and the network element A and the network element C are connected by the transmission link 23; B and network element C are connected by transmission links 24 and 25, and network element B and lower ring node D are connected by transmission link 26; network element C and lower ring node E are connected by transmission link 27; The lower ring node D and the lower ring node E pass through the transmission link 28; the transmission component d in the lower ring node D runs on the ring network on the network side, and the AC side dual-homing component 52 and AC connected to the transmission component d (Attachment)
- the circuit 29 is connected to the RNC 204.
- the transmission component e in the landing node E runs on the ring network on the network side, and the AC side dual-homing component 54 and the AC link 20 connected to the transmission component e are connected to the RNC 204.
- An AC side protocol channel is established between the two AC side dual-homing components, and the AC side protocol channel is usually carried on the transmission link 28.
- the network element A, the network element B, and the network element C, and the links between the three network elements form a ring network, and the ring network protection is deployed; the network element B, the network element C, the lower ring node D, and the lower ring node E and the links between the four network elements constitute the aforementioned ring network, and ring network protection is also deployed but traditional dual-homing protection is not deployed.
- the transmission components in the lower ring node D and the lower ring node E are used to implement the functions of the traditional lower ring node and some logical steps in the network protection method in the embodiment of the present invention.
- the added AC side dual-homing component is used to perform the main logical steps in the network protection method in the embodiment of the present invention.
- FIG. 6A is a flowchart of a method for a network protection method according to another embodiment of the present invention. This embodiment is exemplified by applying the network protection method to any of the two lower ring nodes shown in FIG. 5.
- the network protection method includes:
- Step 601 Acquire, by using a transmission component in the local end, service configuration information of another downlink node.
- the current lower ring node obtains the service configuration information of the other lower ring node through the transmission component of the local end, and the service configuration information includes the transmission information of the service data and the downlink information.
- the service configuration information may be a tunnel label and a PW. label. That is, the transmission component d in the lower ring node D needs to acquire the service configuration information of the transmission component e in the lower ring node E, and the transmission component e in the lower ring node E needs to acquire the service configuration information of the transmission component d in the lower ring node D. .
- the following ring node D is the default working node as an example.
- the service data is in the lower ring of the lower ring node D by default.
- the network element A establishes a PW channel with the transmission component in the lower ring node D, and the transmission component in the lower ring node E is acquired in advance. Service configuration information of the ring node D.
- this step can be implemented in any of the following two implementation manners:
- the transmission component in the current lower ring node receives the service configuration information of another lower ring node sent by the transmission component in the other lower ring node through the predetermined channel
- the reservation A channel is a channel that is established in advance between a current lower ring node and another lower ring node. For example, a predetermined channel is pre-established between the lower ring node D and the lower ring node E.
- the predetermined channel is usually carried on the transmission link 28, and the transmission component d transmits its own service configuration information to the transmission component e through the predetermined channel, and transmits
- the component e receives the service configuration information of the lower ring node D through the predetermined channel; the transmission component e also transmits its own service configuration information to the transmission component d through the predetermined channel, and the transmission component d receives the service configuration information of the lower ring node E through the channel. .
- the transmission component in the current lower ring node receives another link sent by the transmission component in the other lower ring node through the extended message of the OAM mechanism on the ring network.
- Point of business configuration information When there is no predetermined channel between the current lower ring node and another lower ring node, the transmission component in the current lower ring node receives another link sent by the transmission component in the other lower ring node through the extended message of the OAM mechanism on the ring network.
- the transmission component d transmits the service configuration information of the lower ring node D to the transmission component e through the extended message of the OAM mechanism on the ring network, and the transmission component e receives the service configuration information of the lower ring node D through the extended message;
- the e sends the service configuration information of the lower ring node E to the transmission component d through the extended packet of the OAM mechanism on the ring network, and the transmission component d receives the service configuration information of the lower ring node E through the extended packet.
- the transmission component in the current lower ring node may also be from the network management system of the ring network. Get the service configuration information of another lower ring node. For example, when the network management system in the ring network sends the service configuration information of the lower ring node D to the transmission component d in the lower ring node D, the service of the lower ring node D is also delivered to the transmission component e in the lower ring node E.
- Configuration information when the network management system in the ring network sends the service configuration information of the lower ring node E to the transmission component e in the lower ring node E, the lower ring node E is also sent to the transmission component d in the lower ring node D.
- Business configuration information when the network management system in the ring network sends the service configuration information of the lower ring node E to the transmission component e in the lower ring node E, the lower ring node E is also sent to the transmission component d in the lower ring node D.
- Step 602 When receiving the service data, the transmission component in the local end detects whether the service configuration information carried in the service data matches the service configuration information of another downlink node.
- the service data that needs to be ringed at another lower ring node is directly transmitted to another lower ring node and does not pass through the current lower ring node.
- the link on the ring network fails or another ring node fails, ring network switching occurs.
- the service data of the ring that needs to be in the ring of another ring node passes through the current lower ring node during transmission.
- the transmission component in the ring node detects whether the service configuration information carried in the service data matches the service configuration information of another downlink node.
- a service data needs to be looped down at the lower ring node D by default.
- the path A->B->D is transmitted to the lower ring node D for the lower ring operation.
- the transmission link 26 or the lower ring node D between the network element B and the lower ring node D fails, the network element B, the network element C, the landing node D, and the landing node E, and the four network elements
- the ring link will form a ring network switch.
- the service data will be transmitted by the path A->B->C->E->D, and the transmission component e in the lower ring node E will receive the service.
- the transmission component e when the transmission component e receives the service data, it detects whether the service configuration information carried by the service data matches the service configuration information of another downlink node. If the detection result is a match, it indicates that the service data is the default link. Point D the business data of the ring.
- Step 603 detecting, by the AC side dual-homing component in the local end, whether the access link between the current lower ring node and the access device is faulty, and/or detecting whether the AC side dual-homing component in the other lower ring node is Reachable
- the AC-side dual-homing component in the current lower-loop node detects whether the access link between the current lower-loop node and the access device fails, and/or the AC-side dual-homing component in the current lower-loop node detects another Whether the AC-side dual-homing component in the ring node is reachable.
- AC side in another lower ring node The dual-homing component is unreachable, which may be caused by the failure of the AC-side dual-homing component itself, or by the failure of the AC-side protocol channel between the two AC-side dual-homing components.
- the two fault detections can be performed simultaneously or only one test can be performed. Take two fault detections at the same time as an example, namely:
- the AC side dual return component 54 in the lower ring node E detects whether the AC link 20 is faulty, and detects whether the AC side dual return component 52 in the lower ring node D can be Reach
- the AC side dual return component 52 in the lower ring node D detects whether the AC link 29 is faulty, and detects whether the AC side dual return component 54 in the lower ring node E can be Da.
- the AC side dual-homing component in the current lower ring node detects whether the access link between the current lower ring node and the access device fails, the AC side dual-homing component in the current lower ring node can pass the access link.
- the AC fault detection mechanism on the above is used to detect whether a fault has occurred.
- the AC-side dual-homing component in the current lower-loop node detects whether the AC-side dual-homing component in the other lower-loop node is reachable, it can be implemented in any of the following three manners:
- the AC-side dual-homing component in the current lower-loop node detects whether the AC-side dual-homing component in the other lower-loop node is reachable through the OAM mechanism on the ring network;
- the OAM detection mechanism on the ring network may notify the other when the AC-side dual-homing component in one lower ring node is unreachable.
- the AC side dual-homed component in the ring node may notify the other when the AC-side dual-homing component in one lower ring node is unreachable.
- the AC-side dual-homing component in the current lower-loop node determines whether the AC-side dual-homing component in the other lower-loop node is faulty by detecting whether the AC protocol channel is normal.
- the AC protocol channel is an AC in the current lower-loop node. a channel established between the side dual-homing component and the AC-side dual-homing component in another lower ring node;
- the AC-side dual-homing component in the current lower-loop node determines whether the AC-side dual-homing component in the other lower-loop node is determined by detecting whether the AC-side protocol channel is normal. If the AC side protocol channel is normal, the AC side dual-homing component in the other lower ring node is reachable. If the AC side protocol channel is abnormal, the AC side dual-homing component in the other lower ring node is determined to be unavailable. Da. The AC side protocol channel is abnormal. It may be caused by a failure of the AC side dual-homed component in another lower ring node, or the transmission link carrying the AC side protocol channel may be faulty.
- the AC side dual-homing component in the current lower ring node receives another one through the AC side protocol channel.
- a packet sent by the AC-side dual-homing component of the ring node determines whether the AC-side dual-homing component of the other lower-loop node is reachable.
- the AC protocol channel is an AC-side dual-homing component and another lower-loop node in the current lower-loop node. The channel established between the two sides of the AC side in the component.
- the AC-side dual-homing component in the current lower-loop node can also receive the report sent by the AC-side dual-homing component in the other lower-loop node through the AC-side protocol channel. And determining whether the AC-side dual-homing component in the other lower-loop node is reachable. If the normal packet sent by the AC-side dual-homing component in the other lower-loop node is received, the AC side in the other lower-loop node is determined.
- the dual-homing component is reachable; if the normal packet sent by the AC-side dual-homing component in the other lower-loop node is not received, or the abnormal packet sent by the AC-side dual-homing component in the other lower-loop node is received, It is determined that the AC side dual-homing component in another lower ring node is unreachable.
- the AC side dual-homing component 52 in the lower ring node D finds that the access link 29 is faulty, the AC side dual-homing component 54 in the lower ring node E may send an abnormal packet, and the lower ring node E Upon receiving the abnormal message, the AC-side dual-homing component 54 determines that the AC-side dual-homing component 52 in the lower-loop node D is unreachable.
- Step 604 Determine a lower ring policy of the service data by using an AC-side dual-homing component in the local end.
- the AC-side dual-homing component of the current lower-loop node determines the lower-loop policy of the service data, where the service data is the service configuration information carried in the service data of the current lower-loop node in step 602, and the service configuration information carried by the service data and another lower-loop node.
- Business configuration information matches business data.
- the sending policy includes: performing the lower ring operation on the service data by the AC side dual-homing component in the current lower ring node, and/or performing the lower ring operation on the service data through the AC-side dual-homing component in the other lower ring node.
- step 603 is an optional step, the step may specifically have four implementation manners:
- the lower-loop policy of the current-side dual-homing component of the current lower-loop node directly determines the service data is: the service data is downlinked by the AC-side dual-homing component in the current lower-loop node. The operation is performed, and the service data is subjected to a lower loop operation by an AC-side dual-homing component in another lower ring node.
- the RNC may receive 2 copies of the same service data, and the RNC may selectively receive one copy, for example, save the service data received first, and then discard it when receiving the same service data.
- the AC-side dual-homing component in the current lower-loop node determines the delivery policy of the service data according to the fault detection result of the access link;
- the AC-side dual-homing component in the current lower-loop node determines the delivery policy of the service data according to the fault detection result of the access link:
- the lower loop policy of the AC-side dual-homing component decision service data in the current lower ring node includes: performing service data by using the AC-side dual-homing component in the current lower ring node. Lower ring operation;
- the lower loop policy of the AC-side dual-homing component decision service data in the current lower ring node includes: performing the service data by using the AC-side dual-homing component in the other lower ring node. Ring operation.
- the AC-side dual-homing component in the current lower-loop node determines the delivery policy of the service data according to the fault detection result of the AC-side dual-homing component in the other lower-loop node;
- the AC-side dual-homing component in the current lower-loop node determines the service data according to the fault detection result of the other lower-loop node.
- the lower-loop policy of the AC-side dual-homing component decision service data in the current lower-loop node includes: passing the AC side double in the current lower ring node The component returns the business data to the lower ring operation;
- the lower-loop policy of the AC-side dual-homing component decision service data in the current lower-loop node includes: passing the AC side in the other lower-loop node
- the dual-homing component performs the lower-loop operation of the business data.
- the current lower ring node determines the delivery strategy of the service data according to the two fault detection results
- the decision-making loop-down policy includes: performing the service through the AC-side dual-homing component in the other lower-loop node.
- the data is subjected to a lower loop operation;
- the decision-making loop-down policy includes: passing the AC-side dual-homing component in the current lower-loop node.
- Business data is performed in the lower ring operation;
- the decision-making loop policy includes:
- the service data is downlinked by the AC-side dual-homing component in the current lower ring node;
- the service data is subjected to the lower ring operation through the AC-side dual-homing component in another lower ring node;
- the service data is subjected to the lower ring operation by the AC-side dual-homing component in the current lower-loop node, and the service data is subjected to the lower-loop operation by the AC-side dual-homing component in the other lower-loop node.
- the detection result is that the access link on the current side fails and the AC-side dual-homing component in the other lower ring node is not reachable, the service data cannot be sent.
- the service data of the lower ring is performed by the other lower ring node, for the current lower ring node.
- the service component receives the service data of the lower ring at the current lower ring node by default according to the service configuration information of the device, and the lower ring policy determined in this embodiment is also applicable.
- a master may be introduced between the lower ring node D and the lower ring node E. Prepare the relationship. That is:
- step 603 After the fault detection process of step 603, determining a master-slave relationship between the AC-side dual-homing component in the current lower-loop node and the AC-side dual-homing component in the other lower-loop node according to the fault detection result; then, in step 604, The AC-side dual-homing component in the current lower-loop node determines the lower-loop policy according to whether it is a primary component or a standby component.
- the detection process of step 603 and step 601 and step 602 may be independent of each other in the execution order.
- the process of determining the active/standby relationship may include:
- the AC-side dual-homing component in the current lower-loop node determines the relationship between the two AC-side dual-homed components according to the default active/standby relationship.
- the active/standby relationship for example, the default is that the AC side dual-homing component 52 in the lower ring node D is the main component.
- the AC-side dual-homing component in the current lower-loop node determines the active/standby relationship as follows: the AC-side dual-homing component in the current lower-loop node is the main component, and the other is The AC-side dual-homing component in the ring node is a standby component; for example, the AC-side dual-homing component 52 in the lower ring node D is unreachable, and the AC-side dual-homing component 54 in the lower ring node E determines that the active/standby relationship is: The AC side dual return component 54 in the ring node E is the main component, and the AC side dual return component 52 in the lower ring node D is the spare component.
- the access link between the AC-side dual-homing component and the access device in the current lower ring node occurs When the fault occurs, the AC-side dual-homing component in the current lower-loop node determines that the active-standby relationship is as follows: the AC-side dual-homing component in the current lower-loop node is the standby node, and the AC-side dual-homing component in the other lower-loop node is the master node.
- the AC-side dual-homing component 52 in the lower-loop node D determines that the active-standby relationship is: the AC-side dual-homing component 54 in the lower-loop node E is the main component, and the lower-loop node D
- the AC side dual return component 52 is a standby node.
- the AC-side dual-homed components of the two lower-loop nodes switch the active/standby relationship through the AC protocol channel.
- the process of determining the lower ring policy of the AC side dual-homing component in the current lower ring node may include:
- the decision-making loop-down policy is: performing the lower-loop operation of the service data by using the AC-side dual-homing component in the current lower-loop node.
- the decision-making loop-down policy is: performing the lower-loop operation on the service data through the AC-side dual-homing component in the other lower-loop node.
- the ring network defaults to the normal working direction, and the AC-side dual-homed component 52 is the main component.
- the transmission path of the service data sent by the base station 202 to the RNC 204 is: base station 202->A->B- >d->Part 52->RNC204.
- the AC side dual-homing component 52 is the main component, and the transmission path of the service data sent by the base station 202 to the RNC 204 is: base station 202->A->B->C->e->component 54 -> Part 52 -> RNC204.
- the transmission path of the service data sent by the base station 202 to the RNC 204 is: base station 202->A->B->C->e->component 54 -> Part 52 -> RNC204.
- the AC side dual-homing component 52 is a standby component, and the transmission path of the service data sent by the base station to the RNC is: base station 202->A->B->d->component 52->component 54 ->RNC204.
- the network protection method obtains service configuration information of another lower ring node by using one of the two lower ring nodes, and detects the service carried by the service data when receiving the service data. Whether the configuration information matches the service configuration information of another lower ring node; if the detection result is a match, the lower ring policy of the decision service data is solved;
- the ring network protection coexists, you need to configure a long holdoff time and double-homing protection. It requires a lot of OAM resources. You do not need to set up dual-homing protection. You only need to set ring network protection to pass the ring.
- the two lower-loop nodes on the network can achieve the same protection effect as the dual-homing protection by receiving the loopback policy by default when they receive the service data of the lower-loop operation of the lower-end ring node.
- the service data can also be downlinked through the AC-side dual-homing component of the lower ring node. operating.
- FIG. 7 is a structural block diagram of a network protection device according to an embodiment of the present invention.
- the network protection device may be implemented as all or part of the lower ring node by software, hardware or a combination of the two, and the lower ring node may be two lower ring nodes connected to the same access device on the ring network provided with the ring network protection. Any of the lower ring nodes, the device includes:
- the information obtaining module 720 is configured to acquire service configuration information of another downlink node.
- the data detection module 740 is configured to: when the service data is received, check whether the service configuration information carried by the service data matches the service configuration information of the another downlink node;
- the policy decision module 760 is configured to: if the detection result is that the service configuration information carried by the service data matches the service configuration information of the another downlink node, the lower ring policy for determining the service data includes:
- the current lower ring node performs the lower ring operation on the service data, and/or sends the service data to the another lower ring node to perform a lower ring operation.
- the network protection device acquires service configuration information of another lower ring node by using one of the two lower ring nodes, and detects the service carried by the service data when receiving the service data. Whether the configuration information is different from the service configuration information of another lower ring node. If the detection result is matched, the lower loop strategy of the decision service data is solved; the problem that the long holdoff time and the dual-homing protection need to be used for the OAM resources are solved when the dual-homing protection and the ring network protection coexist; It is not necessary to set the dual-homing protection specifically. Only when the ring network protection is set, the two lower ring nodes on the ring network can decide the lower ring strategy when receiving the service data of the lower-end ring node.
- FIG. 8 is a structural block diagram of a network protection device according to another embodiment of the present invention.
- the network protection device may be implemented as all or part of the lower ring node by software, hardware or a combination of the two, and the lower ring node may be two lower ring nodes connected to the same access device on the ring network provided with the ring network protection. Any of the lower ring nodes, the device includes:
- the information obtaining module 720 is configured to acquire service configuration information of another downlink node.
- the data detection module 740 is configured to: when the service data is received, check whether the service configuration information carried by the service data matches the service configuration information of the another downlink node;
- the policy decision module 760 is configured to: if the detection result is that the service configuration information carried by the service data matches the service configuration information of the another downlink node, the lower ring policy for determining the service data includes:
- the current lower ring node performs the lower ring operation on the service data, and/or sends the service data to the another lower ring node to perform a lower ring operation.
- the information acquiring module 720 includes: a first acquiring unit or a second acquiring unit;
- the first obtaining unit is configured to acquire service configuration information of the another lower ring node from the another lower ring node;
- the second obtaining unit is configured to obtain service configuration information of the another downlink node from the network management system of the ring network.
- the first acquiring unit is configured to:
- the service configuration information of the another downlink node sent by the another downlink node is received by the extended message of the operation, management, and maintenance of the OAM mechanism on the ring network.
- the network protection device further includes: a link detection module 752;
- the link detection module 752 is further configured to detect whether an access link between the current lower ring node and the access device fails.
- the policy decision module 760 is configured to: if the detection result of the link detection module 752 is that the access link does not fail, perform a decision on the downlink policy of the service data, where the current lower ring node will The step of performing the lower loop operation of the service data.
- the policy decision module 760 is further configured to: if the detection result of the link detection module 752 is that the access link is faulty, send the service data to the another lower ring node for a lower ring operation.
- the network protection device further includes: a peer detection module 754;
- the peer detection module 754 is configured to detect whether the other lower ring node is reachable
- the policy decision module 760 is configured to: if the detection result of the peer detection module 754 is that the another downlink node is reachable, perform the decision that the downlink policy includes sending the service data to the another link Click the step for the lower ring operation.
- the peer detection module 754 is configured to:
- Determining whether the another lower ring node is reachable by detecting whether the predetermined channel is normal, the predetermined channel being a channel established in advance between the current lower ring node and the another lower ring node; or
- Determining whether the another lower ring node is reachable by receiving a message sent by the another lower ring node by using a predetermined channel, where the predetermined channel is established in advance between the current lower ring node and the another lower ring node aisle.
- the network protection device acquires service configuration information of another lower ring node by using one of the two lower ring nodes, and detects the service carried by the service data when receiving the service data. Whether the configuration information matches the service configuration information of another lower ring node; if the detection result is a match, the lower ring policy of the decision service data is solved;
- the ring network protection coexists, you need to configure a long holdoff time and double-homing protection. It requires a lot of OAM resources. You do not need to set up dual-homing protection. You only need to set ring network protection to pass the ring.
- the two lower-loop nodes on the network can achieve the same protection effect as the dual-homing protection by receiving the loopback policy by default when they receive the service data of the lower-loop operation of the lower-end ring node.
- the link detection module and the peer detection module may have no, only one, or both.
- different strategies can be adopted according to different implementation environments and computing capabilities on the network side.
- FIG. 9 is a schematic structural diagram of a lower ring node according to an embodiment of the present invention.
- the lower ring node is any lower ring node of the two lower ring nodes connected to the same access device on the ring network provided with the ring network protection.
- the lower ring node includes a processor 920, a memory 940, a transmitter 960, and a receiver 980.
- the processor 920 is configured to obtain, by using the receiver 980, service configuration information of another downlink node;
- the processor 920 is further configured to: when the receiver 980 receives the service data, check whether the service configuration information carried by the service data matches the service configuration information of the another downlink node;
- the processor 920 is further configured to: if the detection result is that the service configuration information carried by the service data matches the service configuration information of the another downlink node, the lower ring policy for determining the service data includes:
- the current lower ring node performs the lower ring operation on the service data, and/or sends the service data to the another lower ring node through the transmitter 960 to perform a lower ring operation.
- the lower ring node provided in this embodiment passes through one of two lower ring nodes.
- the lower ring node obtains service configuration information of another lower ring node, and when receiving the service data, detects whether the service configuration information carried in the service data matches the service configuration information of another downlink node; if the detection result is a match, the service data is determined.
- the lower ring strategy solves the problem that the long holdoff time and the dual-homing protection need to be configured with more OAM resources when the dual-homing protection and the ring network protection coexist; the need to specifically set the dual-homing protection is achieved only in When the ring network protection is set, the two lower ring nodes on the ring network can realize the double-homing protection by receiving the service policy of the lower ring ring by default. The same protection effect.
- the processor is further configured to:
- the processor is further configured to: receive, by using a predetermined channel, service configuration information of the another downlink node sent by the another downlink node,
- the predetermined channel is a channel established in advance between the current lower ring node and the another lower ring node;
- the service configuration information of the another downlink node sent by the another downlink node is received by the extended message of the operation, management, and maintenance of the OAM mechanism on the ring network.
- the processor is further configured to: in the lower ring policy of determining the service data, that: the current downlink node performs the service
- the lower loop policy of the service data is determined to include: before the current lower ring node performs the downlink operation on the service data, the method further includes:
- the performing the downlink policy for determining the service data includes the step of performing the lower ring operation on the service data by the current lower ring node.
- the processor is further And if the detection result is that the access link is faulty, the service data is sent to the another lower ring node for performing a lower ring operation.
- the processor is further configured to: send the service data to the lower ring policy in the determining the service data If the lower ring node performs the downlink operation, the method further includes: before the performing the lower ring policy of the service data, including: sending the service data to the another lower ring node for the lower ring operation,
- performing the decision that the lower ring policy includes the step of sending the service data to the another lower ring node for a lower ring operation.
- the processor is further configured to:
- Determining whether the another lower ring node is reachable by detecting whether the predetermined channel is normal, the predetermined channel being a channel established in advance between the current lower ring node and the another lower ring node; or
- Determining whether the another lower ring node is reachable by receiving a message sent by the another lower ring node by using a predetermined channel, where the predetermined channel is established in advance between the current lower ring node and the another lower ring node aisle.
- a network system is further provided, where the network system includes a ring network provided with ring network protection, and two lower ring nodes connected to the same access device on the ring network;
- the lower ring node includes the network protection device provided by the embodiment shown in FIG. 7 and the embodiment shown in FIG.
- the lower ring node is the lower ring node provided by the embodiment shown in FIG. 9 and based on the more preferred embodiment provided by the embodiment of FIG.
- the program may be For storage in a computer readable storage medium, the above mentioned storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Small-Scale Networks (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Claims (16)
- 一种网络保护方法,其特征在于,用于设置有环网保护的环网上与同一接入设备相连的两个下环节点中的任一下环节点,所述方法包括:获取另一下环节点的业务配置信息;在接收到业务数据时,检测所述业务数据携带的业务配置信息是否与所述另一下环节点的业务配置信息匹配;若检测结果为所述业务数据携带的业务配置信息与所述另一下环节点的业务配置信息匹配,则决策所述业务数据的下环策略包括:在当前下环节点将所述业务数据进行下环操作,和/或将所述业务数据发送给所述另一下环节点进行下环操作。
- 根据权利要求1所述的网络保护方法,其特征在于,所述获取另一下环节点的业务配置信息,包括:从所述另一下环节点获取所述另一下环节点的业务配置信息;或,从所述环网的网管系统中获取所述另一下环节点的业务配置信息。
- 根据权利要求2所述的网络保护方法,其特征在于,所述从所述另一下环节点获取所述另一下环节点的业务配置信息,包括:通过预定通道接收所述另一下环节点发送的所述另一下环节点的业务配置信息,所述预定通道是预先在所述当前下环节点和所述另一下环节点之间建立的通道;或者,通过所述环网上的操作、管理和维护OAM机制的扩展报文接收所述另一下环节点发送的所述另一下环节点的业务配置信息。
- 根据权利要求1至3任一所述的网络保护方法,其特征在于,在所述决策所述业务数据的下环策略包括:在当前下环节点将所述业务数据进行下环操作的情况下,在所述决策所述业务数据的下环策略包括在当前下环节点将所述业务数据进行下环操作之前,所述方法还包括:检测所述当前下环节点与所述接入设备之间的接入链路是否发生故 障;若检测结果为所述接入链路未发生故障,则执行决策所述业务数据的下环策略包括在当前下环节点将所述业务数据进行下环操作的步骤。
- 根据权利要求4所述的网络保护方法,其特征在于,所述方法还包括:若检测结果为所述接入链路发生故障,则将所述业务数据发送给所述另一下环节点进行下环操作。
- 根据权利要求1至3任一所述的网络保护方法,其特征在于,在所述决策所述业务数据的下环策略包括:将所述业务数据发送给所述另一下环节点进行下环操作的情况下,在所述决策所述业务数据的下环策略包括将所述业务数据发送给所述另一下环节点进行下环操作之前,所述方法还包括:检测所述另一下环节点是否可达;若检测结果为所述另一下环节点可达,则执行决策所述下环策略包括将所述业务数据发送给所述另一下环节点进行下环操作的步骤。
- 根据权利要求6所述的网络保护方法,其特征在于,所述检测所述另一下环节点是否可达,包括:通过所述环网上的操作、管理和维护OAM机制检测所述另一下环节点是否可达;或,通过检测预定通道是否正常来确定所述另一下环节点是否可达,所述预定通道是预先在所述当前下环节点和所述另一下环节点之间建立的通道;或,通过预定通道接收所述另一下环节点发送的报文来确定所述另一下环节点是否可达,所述预定通道是预先在所述当前下环节点和所述另一下环节点之间建立的通道。
- 一种网络保护装置,其特征在于,用于设置有环网保护的环网上与同一接入设备相连的两个下环节点中的任一下环节点,所述装置包括:信息获取模块,用于获取另一下环节点的业务配置信息;数据检测模块,用于在接收到业务数据时,检测所述业务数据携带的业务配置信息是否与所述另一下环节点的业务配置信息匹配;策略决策模块,用于若检测结果为所述业务数据携带的业务配置信息与所述另一下环节点的业务配置信息匹配,则决策所述业务数据的下环策略包括:在当前下环节点将所述业务数据进行下环操作,和/或将所述业务数据发送给所述另一下环节点进行下环操作。
- 根据权利要求8所述的网络保护装置,其特征在于,所述信息获取模块,包括:第一获取单元或第二获取单元;所述第一获取单元,用于从所述另一下环节点获取所述另一下环节点的业务配置信息;所述第二获取单元,用于从所述环网的网管系统中获取所述另一下环节点的业务配置信息。
- 根据权利要求9所述的网络保护装置,其特征在于,所述第一获取单元,用于:通过预定通道接收所述另一下环节点发送的所述另一下环节点的业务配置信息,所述预定通道是预先在所述当前下环节点和所述另一下环节点之间建立的通道;或者,通过所述环网上的操作、管理和维护OAM机制的扩展报文接收所述另一下环节点发送的所述另一下环节点的业务配置信息。
- 根据权利要求8至10任一所述的网络保护装置,其特征在于,所述网络保护装置,还包括:链路检测模块;所述链路检测模块,还用于检测所述当前下环节点与所述接入设备之间的接入链路是否发生故障;所述策略决策模块,用于若所述链路检测模块的检测结果为所述接入链路未发生故障,则执行决策所述业务数据的下环策略包括在当前下环节 点将所述业务数据进行下环操作的步骤。
- 根据权利要求11所述的网络保护装置,其特征在于,所述策略决策模块还用于若检测结果为所述接入链路发生故障,则将所述业务数据发送给所述另一下环节点进行下环操作。
- 根据权利要求8至10任一所述的网络保护装置,其特征在于,所述网络保护装置,还包括:对端检测模块;所述对端检测模块,用于检测所述另一下环节点是否可达;所述策略决策模块,用于若检测结果为所述另一下环节点可达,则执行决策所述下环策略包括所述业务数据发送给所述另一下环节点进行下环操作的步骤。
- 根据权利要求13所述的网络保护装置,其特征在于,所述对端检测模块,用于:通过所述环网上的操作、管理和维护OAM机制检测所述另一下环节点是否可达;或,通过检测预定通道是否正常来确定所述另一下环节点是否可达,所述预定通道是预先在所述当前下环节点和所述另一下环节点之间建立的通道;或,通过预定通道接收所述另一下环节点发送的报文来确定所述另一下环节点是否可达,所述预定通道是预先在所述当前下环节点和所述另一下环节点之间建立的通道。
- 一种下环节点,其特征在于,包括如权利要求8至14任一所述的网络保护装置。
- 一种网络系统,其特征在于,包括设置有环网保护的环网,以及所述环网上与同一接入设备相连的两个下环节点;所述下环节点为权利要求15所述的下环节点。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2016539412A JP6308534B2 (ja) | 2013-09-09 | 2014-09-09 | ネットワーク保護方法およびネットワーク保護装置、オフリングノード、ならびにシステム |
EP14841528.4A EP3029883B1 (en) | 2013-09-09 | 2014-09-09 | Network protection method and apparatus, next-ring node, and system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310408390.1 | 2013-09-09 | ||
CN201310408390.1A CN103490921B (zh) | 2013-09-09 | 2013-09-09 | 网络保护方法、装置、下环节点及系统 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015032356A1 true WO2015032356A1 (zh) | 2015-03-12 |
Family
ID=49830893
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2014/086097 WO2015032356A1 (zh) | 2013-09-09 | 2014-09-09 | 网络保护方法、装置、下环节点及系统 |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP3029883B1 (zh) |
JP (1) | JP6308534B2 (zh) |
CN (1) | CN103490921B (zh) |
WO (1) | WO2015032356A1 (zh) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103490921B (zh) * | 2013-09-09 | 2017-06-20 | 华为技术有限公司 | 网络保护方法、装置、下环节点及系统 |
CN106302067A (zh) * | 2015-05-15 | 2017-01-04 | 中兴通讯股份有限公司 | 一种报文处理方法及装置 |
CN108023754A (zh) * | 2016-10-31 | 2018-05-11 | 中国移动通信集团广东有限公司 | 一种双归组主备节点协商机制的实现方法及装置 |
CN108023800A (zh) * | 2016-11-03 | 2018-05-11 | 中国移动通信集团广东有限公司 | 一种lte承载网络的保护方法及装置 |
CN108259257B (zh) * | 2016-12-29 | 2021-07-09 | 中国移动通信集团广东有限公司 | 一种基于环双归虚拟节点的环网测试方法及装置 |
CN111294226B (zh) * | 2018-12-10 | 2023-05-09 | 华为技术有限公司 | 通信方法和装置 |
CN113891373B (zh) * | 2021-10-11 | 2024-03-12 | 中盈优创资讯科技有限公司 | 一种基站质量劣化自愈方法及装置 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101364926A (zh) * | 2007-08-08 | 2009-02-11 | 华为技术有限公司 | 一种网络保护的方法和设备 |
CN101702658A (zh) * | 2009-11-24 | 2010-05-05 | 中兴通讯股份有限公司 | 一种环网保护的实现方法及系统 |
CN102355400A (zh) * | 2011-07-27 | 2012-02-15 | 华为技术有限公司 | 处理跨环业务的方法和相交节点 |
CN103490921A (zh) * | 2013-09-09 | 2014-01-01 | 华为技术有限公司 | 网络保护方法、装置、下环节点及系统 |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006099786A1 (fr) * | 2005-03-25 | 2006-09-28 | Hangzhou H3C Technologies Co., Ltd. | Procédé de mise en œuvre d’un processus en anneau, d'un processus hors anneau et de transfert de données dans un réseau annulaire de données en paquets à résilience et dispositif en réseau idoine |
CN1848714B (zh) * | 2005-04-04 | 2010-06-23 | 华为技术有限公司 | 通过网元双归属与环网保护结合实现网络保护的方法 |
JP4790591B2 (ja) * | 2006-12-27 | 2011-10-12 | 富士通株式会社 | リングノード装置 |
CN103023770B (zh) * | 2011-09-21 | 2017-09-26 | 中兴通讯股份有限公司 | 环网的保护方法及装置 |
CN103095478B (zh) * | 2011-11-03 | 2016-12-28 | 中兴通讯股份有限公司 | 一种跨环业务的保护方法及装置 |
CN102571426B (zh) * | 2011-12-29 | 2015-05-20 | 杭州华三通信技术有限公司 | 一种双归保护方法和装置 |
CN102546425B (zh) * | 2012-01-31 | 2014-11-05 | 华为技术有限公司 | 相交环保护方法、设备和系统 |
-
2013
- 2013-09-09 CN CN201310408390.1A patent/CN103490921B/zh active Active
-
2014
- 2014-09-09 WO PCT/CN2014/086097 patent/WO2015032356A1/zh active Application Filing
- 2014-09-09 EP EP14841528.4A patent/EP3029883B1/en active Active
- 2014-09-09 JP JP2016539412A patent/JP6308534B2/ja active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101364926A (zh) * | 2007-08-08 | 2009-02-11 | 华为技术有限公司 | 一种网络保护的方法和设备 |
CN101702658A (zh) * | 2009-11-24 | 2010-05-05 | 中兴通讯股份有限公司 | 一种环网保护的实现方法及系统 |
CN102355400A (zh) * | 2011-07-27 | 2012-02-15 | 华为技术有限公司 | 处理跨环业务的方法和相交节点 |
CN103490921A (zh) * | 2013-09-09 | 2014-01-01 | 华为技术有限公司 | 网络保护方法、装置、下环节点及系统 |
Also Published As
Publication number | Publication date |
---|---|
EP3029883B1 (en) | 2017-09-06 |
CN103490921B (zh) | 2017-06-20 |
EP3029883A1 (en) | 2016-06-08 |
EP3029883A4 (en) | 2016-08-10 |
CN103490921A (zh) | 2014-01-01 |
JP6308534B2 (ja) | 2018-04-11 |
JP2016536906A (ja) | 2016-11-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2015032356A1 (zh) | 网络保护方法、装置、下环节点及系统 | |
EP2243255B1 (en) | Method and system for dynamic link failover management | |
US8208369B2 (en) | Ethernet ring system and a master node and an initialization method thereof | |
US9385944B2 (en) | Communication system, path switching method and communication device | |
US20140211641A1 (en) | Using ethernet ring protection switching with computer networks | |
JP2009005053A (ja) | パケットリングネットワークシステム、パケット転送方法 | |
EP1868322B1 (en) | A method for implementing network protection combining the network element double-adscription and the ringnet protection | |
WO2018113294A1 (zh) | 一种转发报文的方法、设备及系统 | |
US10110475B2 (en) | Restoration method for an MPLS ring network | |
CN108243114B (zh) | 一种转发报文的方法、设备及系统 | |
WO2007057884A2 (en) | Vpls remote failure indication | |
CN111817881A (zh) | 一种故障处理方法和相关装置 | |
US20140050092A1 (en) | Load sharing method and apparatus | |
US9716639B2 (en) | Protection switching method and system | |
US8929200B2 (en) | Communication device, communication system, and communication method | |
CN106161232B (zh) | 一种隧道保护切换的方法和装置 | |
US10033573B2 (en) | Protection switching method, network, and system | |
US20120269056A1 (en) | Method, device, and system for protecting semi-ring network | |
JP4644233B2 (ja) | 伝送路システム、フレーム伝送方法およびフレーム伝送装置 | |
EP2573977A1 (en) | Subnet protection method and device for transport multi-protocol label switching (tmpls) network | |
WO2014079010A1 (zh) | 业务保护方法、设备及系统 | |
CN112637054B (zh) | Ip承载网的组网优化方法、装置、计算设备和存储介质 | |
CN109495286B (zh) | 相交环复用段告警检测方法及装置、计算机可读存储介质 | |
CN107786435B (zh) | 伪线保护方法及装置 | |
CN102487327B (zh) | 业务切换方法及装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14841528 Country of ref document: EP Kind code of ref document: A1 |
|
REEP | Request for entry into the european phase |
Ref document number: 2014841528 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2014841528 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2016539412 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |