CN101132371A - Pseudo-wire business protection method - Google Patents

Pseudo-wire business protection method Download PDF

Info

Publication number
CN101132371A
CN101132371A CNA2007101470076A CN200710147007A CN101132371A CN 101132371 A CN101132371 A CN 101132371A CN A2007101470076 A CNA2007101470076 A CN A2007101470076A CN 200710147007 A CN200710147007 A CN 200710147007A CN 101132371 A CN101132371 A CN 101132371A
Authority
CN
China
Prior art keywords
packet network
network tunnel
bandwidth
pseudo
tunnel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2007101470076A
Other languages
Chinese (zh)
Other versions
CN101132371B (en
Inventor
文春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN2007101470076A priority Critical patent/CN101132371B/en
Publication of CN101132371A publication Critical patent/CN101132371A/en
Application granted granted Critical
Publication of CN101132371B publication Critical patent/CN101132371B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

This invention puts forward a protection method for PW service, which sets up a residual bandwidth databse of PSN tunnel and searches for PSN tunnel combination meeting the requirement of the being protected PW service bandwidth in the database to constitute a logic PSN tunnel and turns the PW service to the logic PSN tunnel to protect the PW service when testing that the current multiplex PSN tunnel of the PW service is faulty.

Description

A kind of guard method of pseudo-line service
Technical field
The present invention relates to the communications field, particularly a kind of guard method of pseudo-line service.
Background technology
Pseudo-line (PW, Pseudo Wire) be a kind of at packet switching network (PSN, Packet SwitchNetwork) goes up the mechanism of simulating various point to point service, PTP, the business that simulated can be time division multiplexing (TDM, Time Division Multiplex and Multiplexer) special line, asynchronous transfer mode (ATMAsynchronous Transfer Model), frame relay (FR, Frame Relay) or Ethernet etc.PW can utilize the tunneling mechanism on the PSN to simulate a kind of necessary attribute of business.PW can encapsulate the protocol Data Unit (PDU, Protocol Data Unit) of special services, and PDU contains necessary data of emulation special services and control information in the inside.The PW emulation mechanisms can be transferred to all transport services the network of a fusion, among multi protocol label exchange (MPLS, Multi Protocol Label Switching) or Internet protocol (IP, Internet protocol).From user's angle, PW can be considered to a kind of link or circuit of special use.
Traditional PW protection passage all is the unidirectional PSN tunnel that utilizes, and the service protection of PW emulation just is subject to a certain PSN tunnel like this, when protecting channel failure on the one hand, makes that professional protected reliability is not high; When two internodal arbitrary PSN tunnel bandwidth of carrying PW business all can not satisfy the service protection demand, this business just can not be protected on the other hand.
The data transmission method and the system of a patent CN200510009215 multi-protocol label switching network; mention at label switched path (LSP; Label Switched Path) when breaking down; in time out of order LSP is stopped distributing data, the present invention does not utilize the remaining bandwidth of LSP to realize the think of of the defencive function of PW business
Summary of the invention
The present invention proposes a kind of guard method of pseudo-line service, find out and utilize the remaining bandwidth of PSN tunnel in the network to realize protection the business of PW emulation.To solve the problems referred to above that prior art exists, improve utilization of network bandwidth, strengthen the reliability of protection.
The guard method of the PW business that the present invention proposes utilizes many PSN tunnel remaining bandwidths that the PW business is protected, and it is characterized in that, may further comprise the steps:
A) set up packet network tunnel remaining bandwidth database, record packet network tunnel bandwidth is used information;
B) obtain the bandwidth parameter of the pseudo-line service that needs protection, the packet network tunnel combination of bandwidth demand is satisfied in search in packet network tunnel remaining bandwidth database, forms logic packet network tunnel;
C),, then pseudo-line service is switched to logic packet network tunnel if detect the current multiplexing packet network tunnel fails of pseudo-line service with the protection passage of logic packet network tunnel as pseudo-line service;
D), then utilize the packet network tunnel remaining bandwidth in the packet network tunnel remaining bandwidth database to substitute if there is new business to insert the remaining bandwidth that need take the packet network tunnel in the logic packet network tunnel.
Further, the tunnel bandwidth of packet network described in the step a) uses the information content to comprise source node, destination node, identifier, the remaining bandwidth in packet network tunnel and the bandwidth that is taken by logic packet network tunnel.
Further, in the step d),, then insert new business, abandon protecting passage if can not find new bandwidth combination; Or abandon inserting new business, keep the protection passage.
If the multiplexing former packet network tunnel restoration of pseudo-line service is then returned switching services to former passage, or switching services is not gone back to former tunnel.
The PSN tunnel remaining bandwidth that utilizes that the present invention proposes carries out the method for PW service protection, has made full use of the remaining bandwidth in the network, has increased the flexibility and the reliability of PW service protection, has saved cost, has increased benefit.
Description of drawings
Fig. 1 utilizes the PSN tunnel remaining bandwidth to carry out PW service protection flow chart;
Fig. 2 be embedded MPLS multi-service transport platform (MSTP: device network topological diagram Multi-Service TransportPlatform):
Fig. 3 is a network PSN tunnel schematic diagram:
Fig. 4 is remaining bandwidth database data structure figure:
Fig. 5 is the professional figure of PW1:
Fig. 6 is a logic LSP data structure diagram.
Embodiment
Be elaborated below in conjunction with the guard method of the drawings and specific embodiments to a kind of pseudo-line service of the present invention.
Fig. 1 utilizes the PSN tunnel remaining bandwidth to carry out PW service protection flow chart.
Fig. 2 is the MSTP device network topological diagram of embedded MPLS, and this network is the network topology structure that is connected to form by the MSTP equipment utilization SDH (Synchronous Digital Hierarchy) of a plurality of embedded MPLS technology (SDH, Synchronous Digital Hierarchy).
Fig. 3 is a network PSN tunnel schematic diagram.
Be described below in conjunction with Fig. 1,2 and 3 pairs of methods of the present invention, wherein:
Step 101 is set up the PSN tunnel remaining bandwidth database between the A point and G point in the network, the PSN tunnel bandwidth between 2 of record A, the G.PSN tunnel remaining bandwidth data of database structure as shown in Figure 4, the PSN tunnel bandwidth information between 2 of the A of record, the G is as shown in table 1 below;
Source node Destination node LSP ID The LSP remaining bandwidth By logic LSP occupied bandwidth
A G 48 53M 0
92 18M 0
1002 24M 0
34 64M 0
Remaining bandwidth data record between table 1A, G
Step 102, PW1 is the pseudo-line service that needs protection, and obtains the service bandwidth parameter of PW1.Fig. 5 is the pseudo-line service figure of PW1, and its bandwidth is 70M.
Step 103 is found out the PSN tunnel combination of satisfying the PW1 business demand, forms the logical PSN tunnel.The logical PSN tunnel of forming adopts data structure records as shown in Figure 6.The logical PSN tunneling data record of finishing after searching is as shown in table 2 below, and the record of remaining bandwidth database is as shown in table 3.
Source node Destination node Logic LSPID Logic LSP bandwidth LSP ID Remaining bandwidth
A G
1 70M 34 64M
92 6M
Table 2 satisfies the data record of the logic LSP of PW1 business
Source node Destination node LSP ID The LSP remaining bandwidth By logic LSP occupied bandwidth
A G 48 53M 0
92 18M 6
1002 24M 0
34 64M 64
Table 3 is found out the remaining bandwidth data record between A, G behind the logic LSP
Step 104, to the protected mode of PW1 employing LSP 1+1, with the protection passage of LSP (ID=1) as the PW1 business, the datum plane transmitting terminal sends business to protection passage LSP (ID=1) when the passage to the PW1 service integration sends business;
Step 105, receiving terminal judge whether protected passage breaks down.
Step 106 when protected passage breaks down, is switched to the PW1 business on the logic LSP (ID=1) from present multiplexing PSN.
Step 107, when having a new PW2 business (bandwidth demand 70M) need be multiplexed on the LSP (ID=92), logic LSP originally (ID=1) can not satisfy the bandwidth demand of PW1 business, and the remaining bandwidth data-base recording is as shown in table 4 below:
Source node Destination node LSP ID The LSP remaining bandwidth By logic LSP occupied bandwidth
A G 48 53M 0
92 3M 0
1002 24M 0
34 64M 64
Remaining bandwidth data record when table 4 has new business to insert between A, G
Step 108 utilizes best-fit to find out the LSP of new needs once more, forms new logic LSP and replaces.The record that the data structure of new logic LSP is as shown in table 5 below, form the remaining bandwidth database behind the new logic LSP is as shown in table 6 below:
Source node Destination node Logic LSPID LSP ID Remaining bandwidth
A G
1 34 64M
1002 6M
After inserting, table 5 new business satisfies the data record of the logic LSP of PW1 business
Source node I Purpose LSP ID The LSP remaining bandwidth By logic LSP occupied bandwidth
A G 48 53M 0
92 3M 0
1002 24M 6
34 64M 64
Table 6 new business inserts the remaining bandwidth data record between back A, G
Certainly; the present invention also can have other multiple enforcements; under the situation that does not deviate from spirit of the present invention and essence thereof; those of ordinary skill in the art work as can be according to the present invention; make various corresponding changes and distortion, but these corresponding changes and distortion all should belong to the protection range of the appended claim of the present invention.

Claims (4)

1. pseudo-line service guard method utilizes many packet network tunnel remaining bandwidths that pseudo-line service is protected, and it is characterized in that, may further comprise the steps:
A) set up packet network tunnel remaining bandwidth database, record packet network tunnel bandwidth is used information;
B) obtain the bandwidth parameter of the pseudo-line service that needs protection, the packet network tunnel combination of bandwidth demand is satisfied in search in packet network tunnel remaining bandwidth database, forms logic packet network tunnel;
C),, then pseudo-line service is switched to logic packet network tunnel if detect the current multiplexing packet network tunnel fails of pseudo-line service with the protection passage of logic packet network tunnel as pseudo-line service;
D), then utilize the packet network tunnel remaining bandwidth in the packet network tunnel remaining bandwidth database to substitute if there is new business to insert the remaining bandwidth that need take the packet network tunnel in the logic packet network tunnel.
2. the method for claim 1 is characterized in that: the tunnel bandwidth of packet network described in the step a) uses the information content to comprise source node, destination node, identifier, the remaining bandwidth in packet network tunnel and the bandwidth that is taken by logic packet network tunnel.
3. the method for claim 1 is characterized in that: in the step d), if can not find new bandwidth combination, then insert new business, abandon protecting passage; Or abandon inserting new business, keep the protection passage.
4. the method for claim 1 is characterized in that: if the multiplexing former packet network tunnel restoration of pseudo-line service is then returned switching services to former passage, or switching services do not gone back to former tunnel.
CN2007101470076A 2007-08-11 2007-08-11 Pseudo-wire business protection method Expired - Fee Related CN101132371B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2007101470076A CN101132371B (en) 2007-08-11 2007-08-11 Pseudo-wire business protection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2007101470076A CN101132371B (en) 2007-08-11 2007-08-11 Pseudo-wire business protection method

Publications (2)

Publication Number Publication Date
CN101132371A true CN101132371A (en) 2008-02-27
CN101132371B CN101132371B (en) 2012-07-11

Family

ID=39129499

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2007101470076A Expired - Fee Related CN101132371B (en) 2007-08-11 2007-08-11 Pseudo-wire business protection method

Country Status (1)

Country Link
CN (1) CN101132371B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101656630B (en) * 2009-09-09 2015-09-16 中兴通讯股份有限公司 A kind of service protecting method and system
WO2016090837A1 (en) * 2014-12-08 2016-06-16 中兴通讯股份有限公司 Tunnel bandwidth adjustment method and device
CN106034043A (en) * 2015-03-18 2016-10-19 中兴通讯股份有限公司 Method and apparatus for improving switching efficiency of multiplexing segments in packet transmit network

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101656630B (en) * 2009-09-09 2015-09-16 中兴通讯股份有限公司 A kind of service protecting method and system
WO2016090837A1 (en) * 2014-12-08 2016-06-16 中兴通讯股份有限公司 Tunnel bandwidth adjustment method and device
CN106034043A (en) * 2015-03-18 2016-10-19 中兴通讯股份有限公司 Method and apparatus for improving switching efficiency of multiplexing segments in packet transmit network
CN106034043B (en) * 2015-03-18 2020-01-07 中兴通讯股份有限公司 Method and device for improving multiplex section switching frequency in packet transport network

Also Published As

Publication number Publication date
CN101132371B (en) 2012-07-11

Similar Documents

Publication Publication Date Title
CN107438028B (en) Method and equipment for processing customer service
US9369409B2 (en) End-to-end hitless protection in packet switched networks
CN1625176B (en) Realization method of edge to edge pseudo-line simulation protocol
EP2084866B1 (en) Network availability enhancement technique for packet transport networks
US8179900B2 (en) Edge node redundant system in label switching network
US7606886B1 (en) Method and system for providing operations, administration, and maintenance capabilities in packet over optics networks
US9237032B2 (en) Method, system, and device for forwarding data frames
US7821971B2 (en) Protection providing method and customer edge apparatus
CN102724118B (en) Label distribution method and device
CN101286922B (en) Signalling control method, system and apparatus
CN104135418B (en) It is a kind of to realize two layers of method and device for coordinating to switch with Layer3 Virtual Private Network
CN106982161B (en) Method and equipment for keeping and deleting label in ring network protection
WO2007135666A2 (en) Mac address learning in a distributed bridge
JP2006262169A (en) Inter-ring connection method and device
EP2314022A2 (en) Establishing pseudowires in packet switching networks
JP7168286B2 (en) Communication method and communication device
CN101577719A (en) Double hot standby method, device and system
CN102055727B (en) Data encapsulation method, encapsulation equipment and branch unit in multi-service transport network
CN102088387A (en) Tunnel protection method and device of ring network
CN104869010A (en) Protection switching
KR20160137813A (en) Packet transmission apparatus of processing oam packets and protection messages
CN101132371B (en) Pseudo-wire business protection method
CN101453412A (en) Method and apparatus for automatic topology discovery and resource management in PBB network
CN104618057A (en) Packet transport network non-damage protection switching method and system
CN102546352A (en) Method and system for realizing point-to-multipoint label switching path protection

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120711

Termination date: 20160811

CF01 Termination of patent right due to non-payment of annual fee