CN101132371B - Pseudo-wire business protection method - Google Patents

Pseudo-wire business protection method Download PDF

Info

Publication number
CN101132371B
CN101132371B CN2007101470076A CN200710147007A CN101132371B CN 101132371 B CN101132371 B CN 101132371B CN 2007101470076 A CN2007101470076 A CN 2007101470076A CN 200710147007 A CN200710147007 A CN 200710147007A CN 101132371 B CN101132371 B CN 101132371B
Authority
CN
China
Prior art keywords
packet network
network tunnel
bandwidth
pseudo
tunnel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2007101470076A
Other languages
Chinese (zh)
Other versions
CN101132371A (en
Inventor
文春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN2007101470076A priority Critical patent/CN101132371B/en
Publication of CN101132371A publication Critical patent/CN101132371A/en
Application granted granted Critical
Publication of CN101132371B publication Critical patent/CN101132371B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

This invention puts forward a protection method for PW service, which sets up a residual bandwidth databse of PSN tunnel and searches for PSN tunnel combination meeting the requirement of the being protected PW service bandwidth in the database to constitute a logic PSN tunnel and turns the PW service to the logic PSN tunnel to protect the PW service when testing that the current multiplex PSN tunnel of the PW service is faulty.

Description

A kind of guard method of pseudo-line service
Technical field
The present invention relates to the communications field, particularly a kind of guard method of pseudo-line service.
Background technology
Pseudo-line (PW; Pseudo Wire) be a kind of at packet switching network (PSN; Packet SwitchNetwork) goes up the mechanism of simulating various point to point service, PTP; The business of being simulated can be time division multiplexing (TDM, Time Division Multiplex and Multiplexer) special line, asynchronous transfer mode (ATMAsynchronous Transfer Model), frame relay (FR, Frame Relay) or Ethernet etc.PW can utilize the tunneling mechanism on the PSN to simulate a kind of necessary attribute of business.PW can encapsulate the protocol Data Unit (PDU, Protocol Data Unit) of special services, and PDU contains necessary data of emulation special services and control information in the inside.The PW emulation mechanisms can be transferred to all transport services the network of a fusion, among multi protocol label exchange (MPLS, Multi Protocol Label Switching) or Internet protocol (IP, Internet protocol).From user's angle, PW can be considered to a kind of link or circuit of special use.
Traditional P W protection passage all is the unidirectional PSN tunnel that utilizes, and the service protection of PW emulation just is subject to a certain PSN tunnel like this, when protecting channel failure on the one hand, makes that professional protected reliability is not high; When two internodal arbitrary PSN tunnel bandwidth of carrying the PW business all can not satisfy the service protection demand, this business just can not be protected on the other hand.
The data transmission method and the system of a patent CN200510009215 multi-protocol label switching network; Mention at label switched path (LSP; Label Switched Path) when breaking down; In time out of order LSP is stopped distributing data, the present invention does not utilize the remaining bandwidth of LSP to realize the think of of the defencive function that PW is professional
Summary of the invention
The present invention proposes a kind of guard method of pseudo-line service, find out and utilize in the network remaining bandwidth of PSN tunnel to realize protection the business of PW emulation.To solve the problems referred to above that prior art exists, improve utilization of network bandwidth, strengthen the reliability of protection.
The guard method that the PW that the present invention proposes is professional utilizes many PSN tunnel remaining bandwidths that the PW business is protected, and it is characterized in that, may further comprise the steps:
A) set up packet network tunnel remaining bandwidth database, record packet network tunnel bandwidth is used information;
B) obtain the bandwidth parameter of the pseudo-line service that needs protection, the packet network tunnel combination of bandwidth demand is satisfied in search in packet network tunnel remaining bandwidth database, forms logic packet network tunnel;
C),, then pseudo-line service is switched to logic packet network tunnel if detect the current multiplexing packet network tunnel fails of pseudo-line service with the protection passage of logic packet network tunnel as pseudo-line service;
D) if there is the new business access need take the remaining bandwidth in the packet network tunnel in the logic packet network tunnel, then utilize the packet network tunnel remaining bandwidth in the packet network tunnel remaining bandwidth database to substitute.
Further, the tunnel bandwidth of packet network described in the step a) uses the information content to comprise source node, destination node, identifier, the remaining bandwidth in packet network tunnel and the bandwidth that is taken by logic packet network tunnel.
Further, in the step d),, then insert new business, abandon protecting passage if can not find new bandwidth combination; Or abandon inserting new business, keep the protection passage.
If the multiplexing former packet network tunnel restoration of pseudo-line service is then returned switching services to former passage, or switching services is not gone back to former tunnel.
The PSN tunnel remaining bandwidth that utilizes that the present invention proposes carries out the method for PW service protection, has made full use of the remaining bandwidth in the network, has increased the flexibility and the reliability of PW service protection, has practiced thrift cost, has increased benefit.
Description of drawings
Fig. 1 utilizes the PSN tunnel remaining bandwidth to carry out PW service protection flow chart;
Fig. 2 be embedded MPLS multi-service transport platform (MSTP: device network topological diagram Multi-Service TransportPlatform):
Fig. 3 is a network PSN tunnel sketch map:
Fig. 4 is remaining bandwidth database data structure figure:
Fig. 5 is the professional figure of PW1:
Fig. 6 is a logic LSP data structure diagram.
Embodiment
To combine accompanying drawing and specific embodiment that the guard method of a kind of pseudo-line service of the present invention is elaborated below.
Fig. 1 utilizes the PSN tunnel remaining bandwidth to carry out PW service protection flow chart.
Fig. 2 is the MSTP device network topological diagram of embedded MPLS, and this network is the network topology structure that is connected to form by the technological MSTP equipment utilization SDH (SDH, Synchronous Digital Hierarchy) of a plurality of embedded MPLS.
Fig. 3 is a network PSN tunnel sketch map.
Describe below in conjunction with Fig. 1,2 and 3 pairs of methods of the present invention, wherein:
Step 101 is set up the PSN tunnel remaining bandwidth database between the A point and G point in the network, the PSN tunnel bandwidth between 2 of the record A, G.PSN tunnel remaining bandwidth data of database structure is as shown in Figure 4, and the PSN tunnel bandwidth information between 2 of the A of record, G is as shown in table 1 below;
Figure G071E7007620070827D000041
Remaining bandwidth data record between table 1 A, G
Step 102, PW1 is the pseudo-line service that needs protection, and obtains the service bandwidth parameter of PW1.Fig. 5 is the pseudo-line service figure of PW1, and its bandwidth is 70M.
Step 103 is found out the PSN tunnel combination of satisfying the PW1 business demand, forms the logical PSN tunnel.The logical PSN tunnel of forming adopts data structure records as shown in Figure 6.Logical PSN tunneling data record after completion is searched is as shown in table 2 below, and the record of remaining bandwidth database is as shown in table 3.
Figure G071E7007620070827D000042
Table 2 satisfies the data record of the professional logic LSP of PW1
Table 3 is found out the remaining bandwidth data record between A behind the logic LSP, G
Step 104, to the protected mode of PW1 employing LSP 1+1, as the professional protection passage of PW1, the datum plane transmitting terminal is professional to protection passage LSP (ID=1) transmission when the passage to the PW1 service integration sends business with LSP (ID=1);
Step 105, receiving terminal judge by the protection passage whether break down.
Step 106 when being broken down by the protection passage, is switched to the PW1 business on the logic LSP (ID=1) from present multiplexing PSN.
Step 107 has a new PW2 professional (bandwidth demand 70M) need be multiplexed into last time of LSP (ID=92), and logic LSP originally (ID=1) can not satisfy the professional bandwidth demand of PW1, and the remaining bandwidth data-base recording is as shown in table 4 below:
Figure G071E7007620070827D000051
Remaining bandwidth data record when table 4 has new business to insert between A, G
Step 108 utilizes best-fit to find out the LSP of new needs once more, forms new logic LSP and replaces.The record that the data structure of new logic LSP is as shown in table 5 below, form the remaining bandwidth database behind the new logic LSP is as shown in table 6 below:
Figure G071E7007620070827D000052
After inserting, table 5 new business satisfies the data record of the professional logic LSP of PW1
Figure G071E7007620070827D000061
Table 6 new business inserts the remaining bandwidth data record between back A, G
Certainly; The present invention also can have other multiple enforcements; Under the situation that does not deviate from spirit of the present invention and essence thereof; Those of ordinary skill in the art work as can make various corresponding changes and distortion according to the present invention, but these corresponding changes and distortion all should belong to the protection range of the appended claim of the present invention.

Claims (3)

1. pseudo-line service guard method utilizes many packet network tunnel remaining bandwidths that pseudo-line service is protected, and it is characterized in that, may further comprise the steps:
A) set up packet network tunnel remaining bandwidth database, record packet network tunnel bandwidth is used information; Said packet network tunnel bandwidth uses the information content to comprise source node, destination node, identifier, the remaining bandwidth in packet network tunnel and the bandwidth that is taken by logic packet network tunnel;
B) obtain the bandwidth parameter of the pseudo-line service that needs protection, the packet network tunnel combination of bandwidth demand is satisfied in search in packet network tunnel remaining bandwidth database, forms logic packet network tunnel;
C),, then pseudo-line service is switched to logic packet network tunnel if detect the current multiplexing packet network tunnel fails of pseudo-line service with the protection passage of logic packet network tunnel as pseudo-line service;
D) if there is the new business access need take the remaining bandwidth in the packet network tunnel in the logic packet network tunnel, then utilize best-fit from packet network tunnel remaining bandwidth database, to find out the alternative occupied packet network tunnel, packet network tunnel that packet network tunnel remaining bandwidth satisfies bandwidth demand.
2. the method for claim 1 is characterized in that: in the step d), if can not find new bandwidth combination, then insert new business, abandon protecting passage; Or abandon inserting new business, keep the protection passage.
3. the method for claim 1 is characterized in that: if the multiplexing former packet network tunnel restoration of pseudo-line service is then gone back to switching services to former tunnel, or switching services do not gone back to former tunnel.
CN2007101470076A 2007-08-11 2007-08-11 Pseudo-wire business protection method Expired - Fee Related CN101132371B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2007101470076A CN101132371B (en) 2007-08-11 2007-08-11 Pseudo-wire business protection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2007101470076A CN101132371B (en) 2007-08-11 2007-08-11 Pseudo-wire business protection method

Publications (2)

Publication Number Publication Date
CN101132371A CN101132371A (en) 2008-02-27
CN101132371B true CN101132371B (en) 2012-07-11

Family

ID=39129499

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2007101470076A Expired - Fee Related CN101132371B (en) 2007-08-11 2007-08-11 Pseudo-wire business protection method

Country Status (1)

Country Link
CN (1) CN101132371B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101656630B (en) * 2009-09-09 2015-09-16 中兴通讯股份有限公司 A kind of service protecting method and system
CN105743817A (en) * 2014-12-08 2016-07-06 中兴通讯股份有限公司 Tunnel bandwidth adjusting method and device
CN106034043B (en) * 2015-03-18 2020-01-07 中兴通讯股份有限公司 Method and device for improving multiplex section switching frequency in packet transport network

Also Published As

Publication number Publication date
CN101132371A (en) 2008-02-27

Similar Documents

Publication Publication Date Title
CN1625176B (en) Realization method of edge to edge pseudo-line simulation protocol
CN107438028B (en) Method and equipment for processing customer service
EP2084866B1 (en) Network availability enhancement technique for packet transport networks
US8667374B2 (en) Video transmission systems and methods over carrier ethernet
US7606886B1 (en) Method and system for providing operations, administration, and maintenance capabilities in packet over optics networks
US8179900B2 (en) Edge node redundant system in label switching network
US8289962B2 (en) Multi-component compatible data architecture
US8190966B1 (en) Systems and methods for implementing end-to-end checksum
CN102724118B (en) Label distribution method and device
US20180176131A1 (en) Apparatus and methods of routing with control vectors in a synchronized adaptive infrastructure (sain) network
EP1766876B1 (en) Technique for transferring data over a packet switched network
CN101286922B (en) Signalling control method, system and apparatus
US20210152898A1 (en) Transmission network system, data switching and transmission method, apparatus and equipment
CN106982161B (en) Method and equipment for keeping and deleting label in ring network protection
CN104038443A (en) Method for establishing hard pipe as well as method and device for transmitting messages in network
CN107277187B (en) The system and method for ARP warm back-up Fast synchronization
CN101577719A (en) Double hot standby method, device and system
CN101247354A (en) Method for fast recovering heavy route aiming at T-MPLS network multicast
US20080219669A1 (en) SDH/SONET Convergent Network
CN102055727A (en) Data encapsulation method, encapsulation equipment and branch unit in multi-service transport network
CN104618150A (en) Business configuration method and system under two layer-to-three layer business scene of PTN
US6973084B1 (en) Hybrid data transport scheme over optical networks
CN101132371B (en) Pseudo-wire business protection method
KR20160137813A (en) Packet transmission apparatus of processing oam packets and protection messages
CN101237403A (en) Service multiplexing method for Ethernet

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120711

Termination date: 20160811

CF01 Termination of patent right due to non-payment of annual fee