WO2016061992A1 - 业务传输方法及装置 - Google Patents
业务传输方法及装置 Download PDFInfo
- Publication number
- WO2016061992A1 WO2016061992A1 PCT/CN2015/074536 CN2015074536W WO2016061992A1 WO 2016061992 A1 WO2016061992 A1 WO 2016061992A1 CN 2015074536 W CN2015074536 W CN 2015074536W WO 2016061992 A1 WO2016061992 A1 WO 2016061992A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- link
- service
- protection
- sink
- designated service
- Prior art date
Links
Images
Definitions
- the present invention relates to the field of communications, and in particular to a service transmission method and apparatus.
- the Automatic Protection Switching Test (APS) protocol for the linear protection mechanism and the protection switching operation in the Ethernet transmission network define a linear 1+1 and 1:1 protection structure for bidirectional switching.
- the source end and the sink end are connected through a working link in a virtual local area network (VLAN), and are connected through a protection link in the second VLAN.
- the link transmits the protected VLAN service at the same time, and the sink selects the working link to receive the service.
- the sink selects the protection link to receive the service; in the 1:1 protection structure (as shown in Figure 1, 2), the source and the sink
- the first VLAN is connected through the working link, and the second VLAN is connected through the protection link.
- the source selects the working VLAN to transmit the protected VLAN service.
- the sink selects the working link to receive the service.
- the source end Select the protection link to transmit the protected VLAN service
- the sink selects the protection link to receive the service.
- the present invention provides a service transmission method and apparatus, which at least solves the problem that only one link of the working link and the backup link performs service transmission in the prior art, and the other is in an idle state, causing waste of resources.
- a service transmission method including: in a 1:1 protection architecture, a source end sends a first designated service to a sink through a working link, and a second designation through a protection link.
- the service is sent to the sink; wherein the first designated service and the second designated service have different priorities.
- the method further includes: when the working link is faulty, the source end sends the first designated service to the sink end through a protection link; and, the source end And transmitting, by the working link, the second designated service to the sink end.
- the method further includes: when the working link is faulty, the source end sends the first designated service to the sink end through a protection link, and discards the second Designated business.
- the method further includes: after the working link is restored, the source end sends the first designated service to the sink through the working link, and the protection chain is The road sends the second designated service to the sink.
- a service transmission method including: in a 1:1 protection architecture, a sink receives a first designated service at a source end through a working link, and receives the source through a protection link. a second designated service of the terminal; wherein the first designated service has a different priority from the second designated service.
- the method further includes: when the working link fails, the sink receives the first designated service through a protection link, and the sink passes the working link Receiving the second designated service.
- the method further includes: when the working link fails, the sink receives the first designated service through a protection link, and discards the second designated service.
- the method further includes: after the working link is restored, the sink end receives the first designated service through the working link, and receives the second through the protection link. Designated business.
- a service transmission apparatus which is applied to a source end, and includes: a sending module, configured to send a first designated service to a sink end through a working link in a 1:1 protection architecture, The second designated service is sent to the sink by using the protection link; wherein the first designated service and the second designated service have different priorities.
- a service transmission apparatus which is applied to a sink, and includes: a receiving module, configured to receive, by using a working link, a first designated service of a source end, by using a working link
- the protection link receives the second designated service of the source end, where the first designated service and the second designated service have different priorities.
- the source end sends the first designated service to the sink through the working link, and sends the second specified service to the sink through the protection link.
- the service has a different priority than the second specified service.
- only one of the working link and the backup link enters the link. The transmission of the line service, and the other problem of wasting resources in the idle state, thereby improving the link utilization of the 1:1 linear protection.
- FIG. 3 is a flow chart of service transmission according to an embodiment of the present invention.
- FIG. 4 is a structural block diagram of a service transmission apparatus according to an embodiment of the present invention.
- FIG. 5 is a flowchart 1 of a service transmission according to an embodiment of the present invention.
- FIG. 6 is a structural block diagram 1 of a service transmission apparatus according to an embodiment of the present invention.
- FIG. 7 is a schematic diagram of a protected service transmitting on a working link in a case where a link is normal according to an embodiment of the present invention, and transmitting a low priority extra service by using a protection link;
- FIG. 8 is a schematic diagram of a working link failure but still available, a protected service is transmitted on a protection link, and an additional service is transmitted on a working link according to an embodiment of the present invention
- FIG. 9 is a schematic diagram of a work link signal failure, a protected service transmission on a protection link, and an extra service drop according to an embodiment of the present invention.
- FIG. 10 is a flowchart of link switching when a working link fails according to an embodiment of the present invention.
- FIG. 11 is a flowchart of a protection group from a protection state to a normal state after a working link is restored according to an embodiment of the present invention
- FIG. 12 is a flowchart 1 of link switching when a working link fails according to an embodiment of the present invention.
- FIG. 3 is a flowchart of service transmission according to an embodiment of the present invention. As shown in FIG. 3, the process includes the following steps:
- Step S302 the source end determines the first designated service and the second designated service that need to be sent;
- Step S304 in the 1:1 protection architecture, the source end sends the first designated service to the sink through the working link, and sends the second designated service to the sink through the protection link; wherein, the first designated service and the first Second, the priority of the specified service is different.
- the source end sends the services of different priorities to the sink through the working link and the protection link respectively, which solves the problem that the working link and the backup link in the prior art are only One link carries out the transmission of the service, and the other is in an idle state, which causes waste of resources, thereby improving the link utilization of the 1:1 linear protection.
- the source when the working link fails, the source sends the first designated service to the sink through the protection link; and the source sends the second designated service to the sink through the working link. Therefore, in the case that the working link is faulty, the source end can still send the first designated service and the second designated service to the sink end.
- the source when the working link fails, sends the first specified service to the sink through the protection link, and discards the second designated service. In this step, the second designated service with a lower priority is discarded, and the first designated service with a higher priority is sent to the sink by using the protection link that does not have a fault, thereby ensuring smooth follow-up work.
- the source end after the working link is restored, sends the first designated service to the sink through the working link, and sends the second specified service to the sink through the protection link to ensure the service. Efficient execution.
- a service transmission device is also provided, which is used to implement the foregoing embodiments and preferred embodiments, and details are not described herein.
- the term "module” may implement a combination of software and/or hardware of a predetermined function.
- the apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and contemplated.
- FIG. 4 is a structural block diagram of a service transmission apparatus according to an embodiment of the present invention.
- the apparatus is applied to a source end.
- the apparatus includes: a sending module 42 configured to pass through a working chain in a 1:1 protection architecture. Road will be the first
- the specified service is sent to the sink, and the second designated service is sent to the sink through the protection link.
- the first designated service and the second designated service have different priorities.
- FIG. 5 is a flowchart 1 of service transmission according to an embodiment of the present invention. As shown in FIG. 5, the process includes the following steps:
- Step S502 the sink determines the first designated service and the second designated service that need to be received
- Step S504 In the 1:1 protection architecture, the sink receives the first designated service of the source end through the working link, and receives the second designated service of the source end by using the protection link.
- the first designated service and the second designated service are preferentially located. Different levels.
- the sinks receive services of different priorities from the sinks through the working link and the protection link respectively, and the working link and the backup link in the prior art are only available.
- One link carries out the transmission of the service, and the other is in an idle state, which causes waste of resources, thereby improving the link utilization of the 1:1 linear protection.
- the sink when the working link fails, the sink receives the first designated service through the protection link, and the sink receives the second designated service through the working link. Therefore, in the case that the working link is faulty, the sink terminal can still receive the first designated service and the second designated service from the source end.
- the sink when the working link fails, receives the first designated service through the protection link, and discards the second designated service. In this step, the second designated service with a lower priority is discarded, and the first specified service with a higher priority is received from the source with the protection link that does not fail, thereby ensuring smooth follow-up work.
- a service transmission device is also provided, which is used to implement the foregoing embodiments and preferred embodiments, and details are not described herein.
- the term "module” may implement a combination of software and/or hardware of a predetermined function.
- the apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and contemplated.
- FIG. 6 is a structural block diagram 1 of a service transmission apparatus according to an embodiment of the present invention.
- the apparatus is applied to a sink.
- the apparatus includes: a receiving module 62 configured to work in a 1:1 protection architecture.
- the link receives the first specified service of the source end, and receives the second specified service of the source end by using the protection link.
- the priority of the first designated service and the second designated service are different.
- FIG. 7 is a schematic diagram of a protected service transmitting on a working link in a case where a link is normal according to an embodiment of the present invention, and transmitting a low priority extra service by using a protection link.
- VLAN-protected the normal VLAN service with the linear 1:1 protection of the Ethernet network
- VLAN-added the low-priority extra VLAN service that can be transmitted on the protection link
- VLAN-protected In the normal state, VLAN-protected is transmitted on the working link, and VLAN-added is transmitted on the protection link.
- the protection group When the protection group is in the state of being switched, the VLAN-protected is switched to the protection link within 50 ms, and the processing of the transmission, discarding, or even switching of the VLAN-added becomes a technical problem to be solved by the embodiment of the present invention.
- connection fault protection switching method based on a connectivity fault management (CFM)
- the method includes:
- the CFM detects the link detection.
- the CFM detects that the working link is faulty and notifies the linear protection module in time.
- the protection group switches VLAN-protected to the protection link transmission within 50 ms.
- FIG. 8 is a schematic diagram of a working link failure but still available, a protected service is transmitted on a protection link, and an additional service is transmitted on a working link according to an embodiment of the present invention, as shown in FIG. It may be just signal degradation or delay, etc.
- the working link can still be used, so VLAN-added can still be transmitted.
- FIG. 9 is a schematic diagram of a work link signal failure, a protected service transmission on a protection link, and an extra service drop according to an embodiment of the present invention. As shown in FIG. 9, if the working link fails completely, VLAN-added will be discarded.
- VLAN-protected When CFM detects that the protection link is faulty, VLAN-protected is still transmitted on the working link, and VLAN-added will be discarded.
- the protection switching method based on link detection and bandwidth query implements the 1:1 linear protection group to protect the VLAN-protect service to meet the 50 ms protection switching time, and fully utilizes the idle protection link.
- the limit provides a transmission service for the VLAN-added service, which improves the link utilization of 1:1 linear protection.
- FIG. 10 is a flowchart of link switching when the working link is faulty according to an embodiment of the present invention, as shown in FIG. :
- Step S1002 The Ethernet 1:1 linear protection group is in a normal state, and the VLAN-protect is transmitted on the working link, and the VLAN-added is set in the protection link transmission;
- step S1004 when the working link fails, the CFM sends a fault message to notify the APS, and the APS performs the switching action, and the process proceeds to step S1006.
- step S1006 the VLAN-protect is switched to the protection link transmission within 50 ms, and the extra service is switched to the working link transmission.
- the protection group queries the status of the working link in real time. After the working link is restored, the protection group includes the following steps from the protection state to the normal state.
- FIG. 11 is a working link recovery according to an embodiment of the present invention. After that, the flow chart of the protection group from the protection state to the normal state is as shown in FIG.
- Step S1102 The Ethernet 1:1 linear protection group protects the state, the VLAN-protect is transmitted on the protection link, and the VLAN-added is switched to the working link transmission;
- Step S1104 the protection group queries the CFM status of the working link in real time, and after the working link is restored, the process proceeds to step S1106;
- Step S1106 The Ethernet 1:1 linear protection group is in a normal state, VLAN-protect is transmitted on the working link, and VLAN-added is set on the protection link transmission.
- FIG. 12 is a flowchart 1 of the link switching when the working link is faulty according to the embodiment of the present invention, as shown in FIG. Show:
- Step S1202 The Ethernet 1:1 linear protection group is in a normal state, and the VLAN-protect is transmitted on the working link, and the VLAN-added is set in the protection link transmission;
- Step S1204 when the protection link fails, the CFM sends a fault message to notify the APS, the APS does not perform the switching action, only performs state transition, and the process proceeds to step S1206;
- step S1206 the Ethernet 1:1 linear protection group protects the link failure state, and the VLAN-protect is still transmitted on the working link, and the VLAN-added is discarded.
- the protection group queries the status of the protection link in real time. After the protection link is restored, the protection group includes the following steps from the protection link failure state to the normal state:
- Step S1302 The Ethernet 1:1 linear protection group protects the link fault state, and the VLAN-protect is transmitted on the working link, and the VLAN-added is discarded.
- Step S1304 the protection group queries the CFM status of the protection link in real time, and after the protection link is restored, the process proceeds to step S1306.
- Step S1306 the Ethernet 1:1 linear protection group is in a normal state, VLAN-protect is transmitted on the working link, and the VLAN-added is set on the protection link transmission.
- the source end sends the first designated service to the sink through the working link, and sends the second specified service to the sink through the protection link; wherein, the first designated service is The second designated service has different priorities.
- the working link and the backup link transmits traffic, and the other is idle, which causes waste of resources, thereby improving link utilization of 1:1 linear protection.
- modules or steps of the present invention described above can be implemented by a general-purpose computing device that can be centralized on a single computing device or distributed across a network of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein.
- the steps shown or described are performed, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps thereof are fabricated as a single integrated circuit module.
- the invention is not limited to any specific combination of hardware and software.
- the source end sends the first designated service to the sink end through the working link, and sends the second designated service to the sink end through the protection link;
- the priority of the first designated service and the second designated service are different.
- only one of the working link and the backup link transmits traffic, and the other is idle, which causes waste of resources, thereby improving link utilization of 1:1 linear protection.
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
本发明公开了业务传输方法及装置,其中,该方法包括在1:1保护架构中,源端通过工作链路将第一指定业务发送给宿端,通过保护链路将第二指定业务发送给宿端;其中,第一指定业务与第二指定业务的优先级不同。通过本发明解决了现有技术中工作链路和备份链路只有其中一条链路进行业务的传输,另一条处于空闲状态而造成资源浪费的问题,进而提高了1:1线性保护的链路利用率。
Description
本发明涉及通信领域,具体而言,涉及一种业务传输方法及装置。
以太网传输网中用于线性保护机制的自动保护倒换测试(Automatic Protection Switching test,简称APS)协议以及保护倒换操作,规定了双向倒换的线性1+1和1:1保护结构。1+1保护结构中,源端和宿端在第一虚拟局域网(Virtual Local Area Network,简称为VLAN)中通过工作链路相连,在第二VLAN中通过保护链路相连,源端选择两条链路同时传输所保护的VLAN业务,宿端选择工作链路接收业务,发生倒换时宿端选择保护链路接收业务;1:1保护结构中(如图1,2),源端和宿端在第一VLAN中通过工作链路相连,在第二VLAN中通过保护链路相连,源端选择工作链路传输所保护的VLAN业务,宿端选择工作链路接收业务,发生倒换时,源端选择保护链路传输所保护的VLAN业务,宿端选择保护链路接收业务。
在1+1保护工作中,工作和保护两条链路同时传输业务。而在1:1保护工作中,正常的情况下只有工作链路传输业务,保护链路作为备份链路一直处于空闲状态,没有业务传输,造成了资源的浪费。
针对相关技术中,在1:1保护工作中,工作链路和备份链路只有其中一条链路进行业务的传输,另一条处于空闲状态而造成资源浪费的问题,还未提出有效的解决方案。
发明内容
本发明提供了一种业务传输方法及装置,以至少解决现有技术中工作链路和备份链路只有其中一条链路进行业务的传输,另一条处于空闲状态而造成资源浪费的问题。
根据本发明的一个实施例,提供了一种业务传输方法,包括:在1:1保护架构中,源端通过工作链路将第一指定业务发送给宿端,通过保护链路将第二指定业务发送给所述宿端;其中,所述第一指定业务与所述第二指定业务的优先级不同。
在本实施例中,所述方法还包括:在所述工作链路出现故障时,所述源端通过保护链路将所述第一指定业务发送给所述宿端;并且,所述源端通过所述工作链路将所述第二指定业务发送给所述宿端。
在本实施例中,所述方法还包括:在所述工作链路出现故障时,所述源端通过保护链路将所述第一指定业务发送给所述宿端,并丢弃所述第二指定业务。
在本实施例中,所述方法还包括:在所述工作链路恢复后,所述源端通过所述工作链路将所述第一指定业务发送给所述宿端,通过所述保护链路将所述第二指定业务发送给所述宿端。
根据本发明的另一个实施例,还提供了一种业务传输方法,包括:在1:1保护架构中,宿端通过工作链路接收源端的第一指定业务,通过保护链路接收所述源端的第二指定业务;其中,所述第一指定业务与所述第二指定业务的优先级不同。
在本实施例中,所述方法还包括:在所述工作链路出现故障时,所述宿端通过保护链路接收所述第一指定业务,并且,所述宿端通过所述工作链路接收所述第二指定业务。
在本实施例中,所述方法还包括:在所述工作链路出现故障时,所述宿端通过保护链路接收所述第一指定业务,并丢弃所述第二指定业务。
在本实施例中,所述方法还包括:在所述工作链路恢复后,所述宿端通过所述工作链路接收所述第一指定业务,通过所述保护链路接收所述第二指定业务。
根据本发明的一个实施例,提供了一种业务传输装置,应用于源端,包括:发送模块,设置为在1:1保护架构中,通过工作链路将第一指定业务发送给宿端,通过保护链路将第二指定业务发送给所述宿端;其中,所述第一指定业务与所述第二指定业务的优先级不同。
根据本发明的另一个实施例,提供了一种业务传输装置,应用于宿端,包括:接收模块,设置为在1:1保护架构中,通过工作链路接收源端的第一指定业务,通过保护链路接收所述源端的第二指定业务;其中,所述第一指定业务与所述第二指定业务的优先级不同。
通过本发明实施例,采用在1:1保护架构中,源端通过工作链路将第一指定业务发送给宿端,通过保护链路将第二指定业务发送给宿端;其中,第一指定业务与第二指定业务的优先级不同。解决了现有技术中工作链路和备份链路只有其中一条链路进
行业务的传输,另一条处于空闲状态而造成资源浪费的问题,进而提高了1:1线性保护的链路利用率。
此处所说明的附图用来提供对本发明的进一步理解,构成本申请的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:
图1是相关技术中正常状态的1:1保护结构;
图2是相关技术中倒换状态的1:1保护结构;
图3是根据本发明实施例的业务传输的流程图;
图4是根据本发明实施例的业务传输装置的结构框图;
图5是根据本发明实施例的业务传输的流程图一;
图6是根据本发明实施例的业务传输装置的结构框图一;
图7是根据本发明实施例的链路正常的情况下被保护业务在工作链路传输,利用保护链路传输低优先级的额外业务的示意图;
图8是根据本发明实施例的工作链路出现故障但仍然可用,被保护业务在保护链路传输,额外业务在工作链路传输的示意图;
图9是根据本发明实施例的工作链路信号失效,被保护业务在保护链路传输,额外业务丢弃的示意图;
图10是根据本发明实施例的工作链路故障时的链路倒换流程图;
图11是根据本发明实施例的工作链路恢复后,保护组从保护状态到正常状态的流程图;
图12是根据本发明实施例的工作链路故障时的链路倒换流程图一。
下文中将参考附图并结合实施例来详细说明本发明。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。
在本实施例中提供了一种业务传输方法,图3是根据本发明实施例的业务传输的流程图,如图3所示,该流程包括如下步骤:
步骤S302,源端确定需要发送的第一指定业务和第二指定业务;
步骤S304,在1:1保护架构中,源端通过工作链路将第一指定业务发送给宿端,通过保护链路将第二指定业务发送给该宿端;其中,第一指定业务与第二指定业务的优先级不同。
通过上述步骤,在1:1保护架构中,源端将不同优先级的业务分别通过工作链路和保护链路同时发送给宿端,解决了现有技术中工作链路和备份链路只有其中一条链路进行业务的传输,另一条处于空闲状态而造成资源浪费的问题,进而提高了1:1线性保护的链路利用率。
在一个可选实施例中,在工作链路出现故障时,源端通过保护链路将第一指定业务发送给宿端;并且,源端通过工作链路将第二指定业务发送给宿端。从而,在工作链路出现故障的情况下,源端依然可以将第一指定业务和第二指定业务发送给宿端。
在另一个可选实施例中,在工作链路出现故障时,源端通过保护链路将第一指定业务发送给宿端,并丢弃第二指定业务。该步骤中丢弃了优先级较低的第二指定业务,利用没有出现故障的保护链路将优先级较高的第一指定业务发送给了宿端,从而保证了后续工作的顺利进行。
在另一个可选实施例中,在工作链路恢复后,源端依然通过工作链路将第一指定业务发送给宿端,通过保护链路将第二指定业务发送给宿端,以保证业务的高效执行。
在本实施例中还提供了一种业务传输装置,该装置用于实现上述实施例及优选实施方式,已经进行过说明的不再赘述。如以下所使用的,术语“模块”可以实现预定功能的软件和/或硬件的组合。尽管以下实施例所描述的装置较佳地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。
图4是根据本发明实施例的业务传输装置的结构框图,该装置应用于源端,如图4所示,该装置包括:发送模块42,设置为在1:1保护架构中,通过工作链路将第一
指定业务发送给宿端,通过保护链路将第二指定业务发送给该宿端;其中,第一指定业务与第二指定业务的优先级不同。
在本实施例中提供了另一种业务传输方法,图5是根据本发明实施例的业务传输的流程图一,如图5所示,该流程包括如下步骤:
步骤S502,宿端确定需要接收的第一指定业务和第二指定业务;
步骤S504,在1:1保护架构中,宿端通过工作链路接收源端的第一指定业务,通过保护链路接收源端的第二指定业务;其中,第一指定业务与第二指定业务的优先级不同。
通过上述步骤,在1:1保护架构中,宿端分别通过工作链路和保护链路同时从宿端接收将不同优先级的业务,解决了现有技术中工作链路和备份链路只有其中一条链路进行业务的传输,另一条处于空闲状态而造成资源浪费的问题,进而提高了1:1线性保护的链路利用率。
在一个可选实施例中,在工作链路出现故障时,宿端通过保护链路接收第一指定业务,并且,宿端通过该工作链路接收第二指定业务。从而,在工作链路出现故障的情况下,宿端依然可以从源端接收第一指定业务和第二指定业务。
在另一个可选实施例中,在工作链路出现故障时,宿端通过保护链路接收第一指定业务,并丢弃该第二指定业务。该步骤中丢弃了优先级较低的第二指定业务,从源端利用没有出现故障的保护链路接收优先级较高的第一指定业务,从而保证了后续工作的顺利进行。
在本实施例中还提供了一种业务传输装置,该装置用于实现上述实施例及优选实施方式,已经进行过说明的不再赘述。如以下所使用的,术语“模块”可以实现预定功能的软件和/或硬件的组合。尽管以下实施例所描述的装置较佳地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。
图6是根据本发明实施例的业务传输装置的结构框图一,该装置应用于宿端,如图6所示,该装置包括:接收模块62,设置为在1:1保护架构中,通过工作链路接收源端的第一指定业务,通过保护链路接收源端的第二指定业务;其中,第一指定业务与第二指定业务的优先级不同。
针对相关技术中下面结合可选实施例进行说明,在本可选实施例中结合了上述实施例及其可选实施方式。
本可选实施例所要解决的技术问题在于提供一种高利用率的以太网线性保护方法,可对以太网线性1:1保护的保护链路进行配置,传输一些低优先级的额外VLAN业务,提高保护链路的利用率。图7是根据本发明实施例的链路正常的情况下被保护业务在工作链路传输,利用保护链路传输低优先级的额外业务的示意图。为方便描述,将太网线性1:1保护的正常VLAN业务命名为VLAN-protected;将可以在保护链路上传输的低优先级的额外VLAN业务命名为VLAN-added。
在正常状态下VLAN-protected在工作链路上传输,VLAN-added在保护链路上传输。当保护组出现倒换状态时,VLAN-protected会在50ms内倒换到保护链路,对VLAN-added的传输、丢弃甚至倒换的处理,成为了本发明实施例所要解决的技术问题。
为了解决上述技术问题,本可选实施例提出一种基于连通性故障管理(Connectivity Fault Management,简称为CFM)链路检测保护倒换方法,该方法包括:
实时检测工作和保护链路状态。通过CFM实现对链路的检测,CFM检测到工作链路出现故障并及时通知线性保护模块,保护组50ms内将VLAN-protected倒换到保护链路传输;
与此同时保护组将VLAN-added倒换到工作链路上。图8是根据本发明实施例的工作链路出现故障但仍然可用,被保护业务在保护链路传输,额外业务在工作链路传输的示意图,如图8所示,由于工作链路出现的故障有可能只是信号劣化或时延等情况,工作链路仍然可以使用,所以VLAN-added依然可以传输。
图9是根据本发明实施例的工作链路信号失效,被保护业务在保护链路传输,额外业务丢弃的示意图,如图9所示,如果工作链路完全失效,VLAN-added将被丢弃。
当CFM检测到保护链路出现故障时,VLAN-protected仍然在工作链路传输,VLAN-added将被丢弃。
本可选实施例通过基于链路检测和带宽查询的保护倒换方法,在实现1:1线性保护组保护VLAN-protect业务满足50ms保护倒换时间的同时,充分利用了空闲的保护链路,也最大限度的为VLAN-added业务提供了传输服务,提高了1:1线性保护的链路利用率。
以下结合附图和具体实施例对本可选实施例进行详细描述。
在一个可选实施例中,保护组从正常状态到工作链路故障时,包括以下步骤,图10是根据本发明实施例的工作链路故障时的链路倒换流程图,如图10所示:
步骤S1002,以太网1:1线性保护组正常状态,VLAN-protect在工作链路传输,将VLAN-added设置在保护链路传输;
步骤S1004,当工作链路发生故障时,CFM发送故障消息通知APS,APS做倒换动作,跳转到步骤S1006;
步骤S1006,将VLAN-protect在50ms内倒换到保护链路传输,将额外业务倒换到工作链路传输。
在一个可选实施例中,保护组实时查询工作链路状态,工作链路恢复后,保护组从保护状态到正常状态时,包括以下步骤,图11是根据本发明实施例的工作链路恢复后,保护组从保护状态到正常状态的流程图,如图11所示:
步骤S1102,以太网1:1线性保护组保护状态,VLAN-protect在保护链路传输,VLAN-added被倒换到工作链路传输;
步骤S1104,保护组实时查询CFM关于工作链路的状态,得到工作链路恢复后,跳转到步骤S1106;
步骤S1106,以太网1:1线性保护组正常状态,VLAN-protect在工作链路传输,将VLAN-added设置在保护链路传输。
在一个可选实施例中,保护组从正常状态到保护链路故障时,包括以下步骤,图12是根据本发明实施例的工作链路故障时的链路倒换流程图一,如图12所示:
步骤S1202,以太网1:1线性保护组正常状态,VLAN-protect在工作链路传输,将VLAN-added设置在保护链路传输;
步骤S1204,当保护链路发生故障时,CFM发送故障消息通知APS,APS不做倒换动作,只做状态转换,跳转到步骤S1206;
步骤S1206,以太网1:1线性保护组保护链路故障状态,VLAN-protect仍然在工作链路传输,将VLAN-added丢弃。
在一个可选实施例中,保护组实时查询保护链路状态,保护链路恢复后,保护组从保护链路故障状态到正常状态时,包括以下步骤:
步骤S1302,以太网1:1线性保护组保护链路故障状态,VLAN-protect在工作链路传输,VLAN-added被丢弃;
步骤S1304,保护组实时查询CFM关于保护链路的状态,得到保护链路恢复后,跳转到步骤S1306,;
步骤S1306,以太网1:1线性保护组正常状态,VLAN-protect在工作链路传输,将VLAN-added设置在保护链路传输。
综上所述,在1:1保护架构中,源端通过工作链路将第一指定业务发送给宿端,通过保护链路将第二指定业务发送给宿端;其中,第一指定业务与第二指定业务的优先级不同。解决了现有技术中工作链路和备份链路只有其中一条链路进行业务的传输,另一条处于空闲状态而造成资源浪费的问题,进而提高了1:1线性保护的链路利用率。
显然,本领域的技术人员应该明白,上述的本发明的各模块或各步骤可以用通用的计算装置来实现,它们可以集中在单个的计算装置上,或者分布在多个计算装置所组成的网络上,可选地,它们可以用计算装置可执行的程序代码来实现,从而,可以将它们存储在存储装置中由计算装置来执行,并且在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤,或者将它们分别制作成各个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。这样,本发明不限制于任何特定的硬件和软件结合。
以上所述仅为本发明的优选实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有各种更改和变化。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。
工业使用性
基于本发明实施例提供的上述技术方案,采用在1:1保护架构中,源端通过工作链路将第一指定业务发送给宿端,通过保护链路将第二指定业务发送给宿端;其中,第一指定业务与第二指定业务的优先级不同。解决了现有技术中工作链路和备份链路只有其中一条链路进行业务的传输,另一条处于空闲状态而造成资源浪费的问题,进而提高了1:1线性保护的链路利用率。
Claims (10)
- 一种业务传输方法,包括:在1:1保护架构中,源端通过工作链路将第一指定业务发送给宿端,通过保护链路将第二指定业务发送给所述宿端;其中,所述第一指定业务与所述第二指定业务的优先级不同。
- 根据权利要求1所述的方法,其中,所述方法还包括:在所述工作链路出现故障时,所述源端通过保护链路将所述第一指定业务发送给所述宿端;并且,所述源端通过所述工作链路将所述第二指定业务发送给所述宿端。
- 根据权利要求1所述的方法,其中,所述方法还包括:在所述工作链路出现故障时,所述源端通过保护链路将所述第一指定业务发送给所述宿端,并丢弃所述第二指定业务。
- 根据权利要求2或3所述的方法,其中,所述方法还包括:在所述工作链路恢复后,所述源端通过所述工作链路将所述第一指定业务发送给所述宿端,通过所述保护链路将所述第二指定业务发送给所述宿端。
- 一种业务传输方法,包括:在1:1保护架构中,宿端通过工作链路接收源端的第一指定业务,通过保护链路接收所述源端的第二指定业务;其中,所述第一指定业务与所述第二指定业务的优先级不同。
- 根据权利要求5所述的方法,其中,所述方法还包括:在所述工作链路出现故障时,所述宿端通过保护链路接收所述第一指定业务,并且,所述宿端通过所述工作链路接收所述第二指定业务。
- 根据权利要求5所述的方法,其中,所述方法还包括:在所述工作链路出现故障时,所述宿端通过保护链路接收所述第一指定业务,并丢弃所述第二指定业务。
- 根据权利要求6或7所述的方法,其中,所述方法还包括:在所述工作链路恢复后,所述宿端通过所述工作链路接收所述第一指定业务,通过所述保护链路接收所述第二指定业务。
- 一种业务传输装置,应用于源端,包括:发送模块,设置为在1:1保护架构中,通过工作链路将第一指定业务发送给宿端,通过保护链路将第二指定业务发送给所述宿端;其中,所述第一指定业务与所述第二指定业务的优先级不同。
- 一种业务传输装置,应用于宿端,包括:接收模块,设置为在1:1保护架构中,通过工作链路接收源端的第一指定业务,通过保护链路接收所述源端的第二指定业务;其中,所述第一指定业务与所述第二指定业务的优先级不同。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410568373.9A CN105591899A (zh) | 2014-10-22 | 2014-10-22 | 业务传输方法及装置 |
CN201410568373.9 | 2014-10-22 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016061992A1 true WO2016061992A1 (zh) | 2016-04-28 |
Family
ID=55760164
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2015/074536 WO2016061992A1 (zh) | 2014-10-22 | 2015-03-18 | 业务传输方法及装置 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN105591899A (zh) |
WO (1) | WO2016061992A1 (zh) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109587052B (zh) | 2019-01-30 | 2022-03-15 | 展讯通信(上海)有限公司 | 一种多链路数据传输方法及装置 |
CN111343520A (zh) * | 2020-02-27 | 2020-06-26 | 通鼎互联信息股份有限公司 | Pon上行数据传输方法、系统、装置及pon系统 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020004843A1 (en) * | 2000-07-05 | 2002-01-10 | Loa Andersson | System, device, and method for bypassing network changes in a routed communication network |
CN1459160A (zh) * | 2000-07-20 | 2003-11-26 | 北方电讯网络有限公司 | 光通信的保护装置和方法 |
CN101141349A (zh) * | 2007-10-10 | 2008-03-12 | 中兴通讯股份有限公司 | 一种传输业务的保护方法 |
CN101778003A (zh) * | 2002-10-14 | 2010-07-14 | 爱立信股份有限公司 | 防止设备故障影响通信的系统和方法 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102209001A (zh) * | 2011-07-14 | 2011-10-05 | 杭州华三通信技术有限公司 | 以太网线性保护方法和装置 |
-
2014
- 2014-10-22 CN CN201410568373.9A patent/CN105591899A/zh active Pending
-
2015
- 2015-03-18 WO PCT/CN2015/074536 patent/WO2016061992A1/zh active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020004843A1 (en) * | 2000-07-05 | 2002-01-10 | Loa Andersson | System, device, and method for bypassing network changes in a routed communication network |
CN1459160A (zh) * | 2000-07-20 | 2003-11-26 | 北方电讯网络有限公司 | 光通信的保护装置和方法 |
CN101778003A (zh) * | 2002-10-14 | 2010-07-14 | 爱立信股份有限公司 | 防止设备故障影响通信的系统和方法 |
CN101141349A (zh) * | 2007-10-10 | 2008-03-12 | 中兴通讯股份有限公司 | 一种传输业务的保护方法 |
Also Published As
Publication number | Publication date |
---|---|
CN105591899A (zh) | 2016-05-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7961602B2 (en) | Method and device using a backup communication path to transmit excess traffic | |
EP3373519A1 (en) | Active/static path redundancy | |
KR101336691B1 (ko) | 이더넷 선형 보호 스위칭의 상태 전환을 위한 방법 및 수단 | |
US20130194913A1 (en) | Method, apparatus and system for interconnected ring protection | |
WO2006025296A1 (ja) | 障害回復方法およびネットワーク装置ならびにプログラム | |
EP2632081A1 (en) | Path switch-back method and apparatus in transport network | |
US9166868B2 (en) | Distributed control plane for link aggregation | |
EP2658177B1 (en) | Method for detecting tunnel faults and traffic engineering node | |
CN103152251A (zh) | 一种报文处理方法及装置 | |
CN104639437A (zh) | 堆叠系统中广播报文的转发方法及装置 | |
CN102611630A (zh) | 一种报文接收控制方法及系统 | |
WO2017000096A1 (zh) | 一种链路恢复方法和网络设备 | |
WO2014048128A1 (zh) | 环网中点到多点业务的保护方法及环网中的上环节点 | |
WO2015180265A1 (zh) | 多链路保护倒换的方法及装置 | |
EP2797264B1 (en) | Ring network protection realizing method and system | |
CN106161232B (zh) | 一种隧道保护切换的方法和装置 | |
WO2015039456A1 (zh) | 网络数据自环回的控制方法及装置 | |
WO2016061992A1 (zh) | 业务传输方法及装置 | |
CN103840972A (zh) | 包交换网络中链路聚合组间备份的系统及方法 | |
CN103580932A (zh) | 基于以太网线性保护倒换的状态切换方法及系统 | |
CN106161065B (zh) | 路径的保护倒换处理方法、装置、系统及转发设备 | |
EP2953299B1 (en) | Protection switching method, system and node | |
WO2012000329A1 (zh) | 一种传送多协议标签交换网络的子网保护方法及装置 | |
CN102546199B (zh) | 一种聚合链路的保护方法及包交换节点 | |
CN102223302B (zh) | 一种基于psc报文的事件处理方法和设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15852379 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15852379 Country of ref document: EP Kind code of ref document: A1 |