CN101719834B - Method and system for realizing virtual private multicast service protection - Google Patents

Method and system for realizing virtual private multicast service protection Download PDF

Info

Publication number
CN101719834B
CN101719834B CN2009100861067A CN200910086106A CN101719834B CN 101719834 B CN101719834 B CN 101719834B CN 2009100861067 A CN2009100861067 A CN 2009100861067A CN 200910086106 A CN200910086106 A CN 200910086106A CN 101719834 B CN101719834 B CN 101719834B
Authority
CN
China
Prior art keywords
data message
host apparatus
equipment
stand
transmitting terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2009100861067A
Other languages
Chinese (zh)
Other versions
CN101719834A (en
Inventor
吴波
张新全
陈然
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN2009100861067A priority Critical patent/CN101719834B/en
Publication of CN101719834A publication Critical patent/CN101719834A/en
Application granted granted Critical
Publication of CN101719834B publication Critical patent/CN101719834B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a method for realizing virtual private multicast service (VPMS) protection, comprising the following steps of determining main equipment and standby equipment and establishing a pseudo wire between the main equipment and the standby equipment; receiving data messages from a data message sending end by the main equipment, copying and forwarding the data messages to a data message receiving end; after a link of the main equipment and the data message sending end has a fault, receiving the data messages from the data message sending end by the standby equipment and forwarding the data messages to the main equipment; and then, copying and forwarding the data messages from the standby equipment to the data message receiving end by the main equipment. The invention also discloses a system for realizing VPMS protection, comprising the data message sending end, the main equipment, the standby equipment and the data message receiving end. The invention can save the time for establishing a P2MP pseudo wire between the standby equipment and the data message receiving end, improve the stability and the safety of the VPMS and reduce the fault wait time, thereby improving the user experience.

Description

A kind of implementation method of virtual private multicast service protection and system
Technical field
The present invention relates to the virtual private multicast service technology, relate in particular to a kind of virtual private multicast service (Virtual Private Multicast Service, VPMS) implementation method and the system of protection.
Background technology
Internet engineering duty group Layer 2 virtual private network (The Internet Engineering TaskForce Layer 2 Virtual Private Network; IETF L2VPN) for two layers of point-to-multipoint (P2MP) business; Generally realize at present: virtual private line service (Virtual Private WireService through following three kinds of modes; VPWS), the Virtual Private Network service (Virtual Private LAN Service, VPLS), the VPLS multicast.
Wherein, VPWS provides in essence point-to-point (Point-to-Point, P2P) connection; It is to the professional support of P2MP, and generally (Customer Equipment CE) duplicates the P2MP flow through customer edge; Again by many pseudo-line (Pseudo wire; PW) (Service Provider, SP) network sends to each and receives CE, and is serious thereby bandwidth resources are wasted through the service provider with the P2MP flow that duplicates.
VPLS provides multi-multipoint (Multipoint-to-Multipoint in the SP network; MP2MP) connect, though this MP2MP pattern can be supported P2MP, it is to the professional support of P2MP; Need to rely on provider edge equipment (Provider Equipment; PE) multicast message is duplicated, be sent to each through many pseudo-lines again and receive CE, if the pseudo-line of each bar is through same shared path transmission data; Then on this shared path, many parts of identical multicast messages may occur, thereby waste multicast bandwidth.Especially video traffic, receive CE more in, it is to the consumption of bandwidth even PE can't be born, so VPLS has certain defective for the business transmission of big flow.In addition, functions such as the forwarding of VPLS and address learning are based on all that medium access control (MAC) realizes, for the L2 technology of non-Ethernet, (Asynchronous Transfer Mode, ATM) etc. business does not have universality like asynchronous transfer mode.
The VPLS multicast is to provide P2MP professional through operator's multicast tree; In the VPLS multicast; General Definition comprise tree (Inclusive Tree) and select tree (selective Tree), the input of VPLS multicast is from the access link that links to each other with PE (Attachment Circuit, the IP multicast service data on AC); If operator's multicast tree is the tree that comprises of converging a plurality of VPLS instances, promptly a plurality of business are transmitted through operator's multicast tree.So; For the business that arrives user side is distinguished; Generally need be to wanting VPLS example label of IP multicast packet encapsulation of multicast, again through operator's P2MP multicast tree be delivered to the P2MP of operator multicast tree the leaf LSR (Label Switched Router, LSR).Under the usual condition, all VPLS instances all need transmit flux of multicast through comprising tree, only when some IP flux of multicast is crossed preset threshold, just through selecting tree to transmit.So, VPLS scheme more complicated, and its professional major limitation is of limited application in the IP multicast service of ethernet technology and Ethernet encapsulation.
And VPMS is as a kind of business of L2VPN; Can pass through IP/ multiprotocol label switching (Multi-Protocol Label Switch; MPLS) packet network (Packet Switched Network, PSN), for the P2MP business that is fit to various L2 link layers provides support.
The principle of VPMS is to utilize P2MP label switched path (the LabelSwitched Path of IETF MPLS working group output; LSP); In conjunction with the pseudo wire emulation of IETF edge-to-edge (Pseudo Wire EmulationEdge-to-Edge, PWE3) working group realizes that at the pseudo-line of the P2MP that grinds P2MP is professional; Wherein, P2MP LSP is the P2MP tree that operator provides for the VPMS business.
The common ground of VPMS and VPLS multicast is that the both is based upon on the basis of the P2MP of operator multicast tree; And key difference is: the input of VPMS is the unidirectional customer service from the transmission AC that links to each other with entry PE; Comprise business such as IP, Ethernet, ATM; VPMS carries out customer service to pass through the P2MP of operator multicast tree after the pseudo-line of P2MP (also the being known as PW tree) encapsulation, is delivered to the leaf LSR of the P2MP of operator multicast tree.Here, the pseudo-line of P2MP is the unidirectional point pseudo-line to multiple spot, and a pseudo-line transmission L1/L2 layer service that links to each other with the source arrives one or more recipients (perhaps leaf).The pseudo-line basic function of P2MP comprises: encapsulation arrives protocol Data Unit (the Protocol Data Unit of the specific transactions of inlet AC; PDU); It is delivered to inlet place in circuit (Egress ACs) through the P2MP tunnel, and satisfy the time (timing), simulation requirements such as (order) in proper order.
In VPMS, when the link of entry PE and user's transmitting terminal broke down, whole traffic transport will be failed, so there is the demand of stability and fail safe in VPMS.
In data communication network; Subscriber equipment A is connected with the equipment C of operator with the operator equipment B simultaneously; Connect and compose link between the equipment; The link that forms between subscriber equipment A and the operator's equipment B, and the link that forms between subscriber equipment A and the equipment C of operator backups each other, the network of this topological structure is called dual-home network.Double-attaching technology provides the basic topological structure of redundant link, can improve the stability and the fail safe of system, and double-attaching technology is widely used in the carrier network at present.
VPMS dual-home network structural representation when Fig. 1 is applied to VPMS for existing double-attaching technology; Shown in Figure 1, transmitting terminal customer edge CE1 is dual-homed to provider edge equipment PE1, PE2, and the host apparatus of dual-home network is PE1; Stand-by equipment is PE2; Accordingly, the primary link of dual-home network be CE1 to PE1, reserve link is that CE1 is to PE2.CE1 is sent to the flow of PE1 or PE2, sends other provider edge equipments through pseudo-line of P2MP and forward node, like PE3 and PE4, and then is sent to the receiving terminal customer edge, like CE2 and CE3, thereby realizes P2MP.
Fig. 2 is under the normal condition; Traffic transport path sketch map when existing double-attaching technology shown in Figure 1 is applied to VPMS, as shown in Figure 2, under the normal condition; Only there is PE1 in running order; PE2 is in guard mode, and promptly the flow of CE1 passes to PE1 through active link, and the pseudo-line of the P2MP of this moment is root node with PE1.
Fig. 3 is after active link breaks down, and the traffic transport path sketch map when existing double-attaching technology shown in Figure 1 is applied to VPMS is as shown in Figure 3; When active link CE1 when PE1 breaks down, the flow among the CE1 will switch to reserve link, promptly CE1 is to the link between the PE2; At this moment; Need be that root node rebulids the pseudo-line of P2MP with PE2, the obvious like this problem that has service outage duration than length, thus influence user experience.
Summary of the invention
In view of this, main purpose of the present invention is to provide a kind of implementation method and system of VPMS protection, the stability and the fail safe that can improve VPMS, and shorten the fault interrupting time, improve user experience.
For achieving the above object, technical scheme of the present invention is achieved in that
A kind of implementation method of virtual private multicast service VPMS protection comprises:
Confirm host apparatus and stand-by equipment, and set up the pseudo-line between host apparatus and the stand-by equipment;
Host apparatus receives the data message from the data message transmitting terminal, duplicates and be transmitted to the data message receiving terminal;
After the link of host apparatus and data message transmitting terminal breaks down; Receive data message by stand-by equipment from the data message transmitting terminal; And being transmitted to host apparatus through the pseudo-line of said foundation, host apparatus will duplicate and be transmitted to the data message receiving terminal again from the data message of subsequent use equipment.
Said definite host apparatus and stand-by equipment are: through disposing or electing;
The said pseudo-line of setting up between host apparatus and the stand-by equipment is: host apparatus initiates to join request to stand-by equipment; Host apparatus and stand-by equipment consult to set up the pseudo-line between the two.
Set up after the pseudo-line between host apparatus and the stand-by equipment; This method also comprises: on host apparatus, generate virtual transmitting, the mapping relations between the said virtual port of transmitting expression host apparatus data-oriented message transmitting terminal and host apparatus and the stand-by equipment between pseudo-line and the point to multi-point pseudowire;
Said host apparatus is transmitted data message: inquire about said virtual transmitting, and transmit through corresponding point to multi-point pseudowire.
Whether the link of said host apparatus and data message transmitting terminal breaks down, and is judged by data message transmitting terminal or host apparatus.
Before the link of host apparatus and data message transmitting terminal broke down, the data message transmitting terminal was only to the host apparatus literary composition that sends datagram;
After the link of host apparatus and data message transmitting terminal broke down, the data message transmitting terminal was to the stand-by equipment literary composition that sends datagram, stand-by equipment through and host apparatus between pseudo-line with the data message forwarding of receiving to host apparatus.
Before the link of host apparatus and data message transmitting terminal breaks down; The data message transmitting terminal is simultaneously to host apparatus and the stand-by equipment literary composition that sends datagram; Host apparatus is forwarded to the data message receiving terminal after receiving said data message, and stand-by equipment directly abandons after receiving said data message;
After the link of host apparatus and data message transmitting terminal breaks down, stand-by equipment with the data message forwarding of receiving to host apparatus.
Before the link of host apparatus and data message transmitting terminal breaks down; The data message transmitting terminal is simultaneously to host apparatus and the stand-by equipment literary composition that sends datagram; Stand-by equipment is forwarded to host apparatus after receiving said data message; Host apparatus will be forwarded to the data message receiving terminal behind the data message from the data message transmitting terminal, and will directly abandon from the data message of subsequent use equipment;
After the link of host apparatus and data message transmitting terminal broke down, host apparatus will be from data message forwarding to the data message receiving terminal of subsequent use equipment.
A kind of realization system of VPMS protection comprises: data message transmitting terminal, host apparatus, stand-by equipment and data message receiving terminal; Wherein,
Said data message transmitting terminal is used for to host apparatus and/or the stand-by equipment literary composition that sends datagram;
Said host apparatus, be used to set up and stand-by equipment between pseudo-line; The data message receiving terminal is duplicated and be transmitted to reception from the data message of data message transmitting terminal and/or stand-by equipment;
Said stand-by equipment is used for after the link between data message transmitting terminal and the host apparatus breaks down, and receives from the data message according to message source, and is transmitted to host apparatus through the pseudo-line between said and the host apparatus;
Said data message receiving terminal is used to receive the data message from host apparatus.
This system also comprises and active and standbyly with equipment the unit is set, and is used to be provided with host apparatus and stand-by equipment.
Set up and stand-by equipment between pseudo-line after, said host apparatus also is used to generate between port and the host apparatus and the stand-by equipment of expression host apparatus data-oriented message transmitting terminal between the pseudo-line and point to multi-point pseudowire the virtual of mapping relations and transmits;
When host apparatus is transmitted data message, transmit through inquiring about said virtual transmitting.
Before the link of host apparatus and data message transmitting terminal breaks down,
Said stand-by equipment also is used to abandon the data message from the data message transmitting terminal;
Perhaps, said host apparatus also is used to abandon the data message from stand-by equipment.
Said data message transmitting terminal or host apparatus are used to also judge whether the link of said host apparatus and data message transmitting terminal breaks down.
The implementation method and the system of VPMS of the present invention protection, the stability and the fail safe that improve VPMS through host apparatus and stand-by equipment are after active link breaks down; Data message by stand-by equipment receiving data packets transmitting terminal; And be transmitted to host apparatus, still by host apparatus to the data message receiving terminal literary composition that sends datagram, rather than directly by stand-by equipment to the data message receiving terminal literary composition that sends datagram; Owing to saved the time of setting up the pseudo-line of P2MP between stand-by equipment and the data message receiving terminal; So the implementation method and the system of VPMS protection of the present invention can be in the stability and fail safe that improve VPMS; Reduce the fault stand-by period, thereby improve user experience.
Description of drawings
VPMS dual-home network structural representation when Fig. 1 is applied to VPMS for existing double-attaching technology;
Fig. 2 is under the normal condition, the traffic transport path sketch map when existing double-attaching technology shown in Figure 1 is applied to VPMS;
Fig. 3 is for after active link breaks down, the traffic transport path sketch map when existing double-attaching technology shown in Figure 1 is applied to VPMS;
Fig. 4 is the implementation method flow chart of VPMS protection of the present invention;
Fig. 5 uses the traffic transport path sketch map of VPMS protection of the present invention for after active link breaks down;
Fig. 6 is the realization system construction drawing of VPMS protection of the present invention;
Fig. 7 is the implementation method flow chart of VPMS protection in the embodiment of the invention 1;
Fig. 8 is the implementation method flow chart of VPMS protection in the embodiment of the invention 2;
Fig. 9 is the implementation method flow chart of VPMS protection in the embodiment of the invention 3.
Embodiment
Basic thought of the present invention is: the stability and the fail safe that improve VPMS through host apparatus and stand-by equipment; After active link breaks down; Data message by stand-by equipment receiving data packets transmitting terminal; And be transmitted to host apparatus, still by host apparatus to the data message receiving terminal literary composition that sends datagram, rather than directly by stand-by equipment to the data message receiving terminal literary composition that sends datagram.
Below in conjunction with accompanying drawing the enforcement of technical scheme is done further to describe in detail.
Fig. 4 is for the implementation method flow chart of VPMS protection of the present invention, and is as shown in Figure 4, and the implementation method of VPMS protection of the present invention generally comprises following steps:
Step 41: confirm host apparatus and stand-by equipment.
Here, can confirm host apparatus and stand-by equipment, also can confirm host apparatus and stand-by equipment through certain election mechanism through configuration.
In VPMS, data message transmitting terminal and data message receiving terminal are CE, and host apparatus and stand-by equipment are PE.
Generally; Each data message transmitting terminal CE has an identify label number (ID), is used for a data message source of unique identification CE in a L2VPN, more precisely; What the ID of data message transmitting terminal CE identified is the annexation between data message transmitting terminal CE and the PE; Because a data message source CE possibly receive a plurality of PE, thus each data message transmitting terminal CE corresponding each be connected with an ID, promptly a data message source CE may have a plurality of ID.
But; In the concrete realization of the embodiment of the invention,, be that a data message source CE only distributes an ID according to the linking relationship of data message transmitting terminal CE and PE; Can know that according to this ID data message transmitting terminal CE is dual-homed to which PE; Thereby, can select host apparatus and stand-by equipment through the election mechanism of certain election mechanism between dual-homed PE like Border Gateway Protocol (BGP).
After confirming host apparatus and stand-by equipment, also need be with the corresponding transmitting terminal CE of result notification that confirms.
Step 42: set up the pseudo-line between host apparatus and the stand-by equipment.
Here, specifically initiate to join request to stand-by equipment, thereby host apparatus and stand-by equipment are set up the pseudo-line between the two through consultation by host apparatus.
Host apparatus is after stand-by equipment is set up pseudo-line; Link between data message transmitting terminal and the host apparatus is active link; Link between data message transmitting terminal and the stand-by equipment, the pseudo-line of adding between host apparatus and the stand-by equipment constitutes reserve link jointly.
In addition; After the pseudo-line between host apparatus and the stand-by equipment is set up well; Can generate virtual transmitting on the host apparatus; Be used to represent the mapping relations between the pseudo-line and the pseudo-line of P2MP between port and the host apparatus and the stand-by equipment of host apparatus data-oriented message transmitting terminal, promptly host apparatus specifically should be transmitted through the pseudo-line of which bar P2MP from certain port of data-oriented message transmitting terminal or behind pseudo-line receiving data packets between itself and the stand-by equipment.For example, for dual-home network shown in Figure 1, the pseudo-line between host apparatus PE1 and the stand-by equipment PE2 can generate virtual transmitting as shown in table 1 after setting up well on the host apparatus PE1:
Host apparatus port/pseudo-line The VPMS instance The ID of P2MP tree The label of the pseudo-line of P2MP
P1 VSI-1 P2MP?LSP1 A-1
PW1 VSI-1 P2MP?LSP1 A-1
Table 1
Wherein, port P1 is the port between host apparatus PE1 and the data message transmitting terminal CE1, and PW1 is the pseudo-line between host apparatus PE1 and the stand-by equipment PE2; Can find out from table 1; Port P1 and PW1 are in the P2MP tree of P2MP LSP 1 with ID all, and label is that the pseudo-line of the P2MP of A-1 has mapping relations, when promptly host apparatus is transmitted the data message from port P1 or PW1; All should be in the P2MP tree of P2MP LSP1 through ID, label be that the pseudo-line of the P2MP of A-1 is transmitted.
Generally speaking, physical port of host apparatus such as P1, the pseudo-line of an only corresponding P2MP.
Step 43: host apparatus receives the data message from the data message transmitting terminal, duplicates and be transmitted to the data message receiving terminal.
Here, after host apparatus is received the data message from the data message transmitting terminal, transmit, duplicate and transmit said data message through the pseudo-line of the P2MP of appointment in virtual the transmitting again according to the interface querying of receiving data packets is virtual.
Step 44: after the link of host apparatus and data message transmitting terminal breaks down, receive data message by stand-by equipment, and be transmitted to host apparatus from the data message transmitting terminal.
Before the link of host apparatus and data message transmitting terminal breaks down; Stand-by equipment can receive the data message from the data message transmitting terminal; Also can not receive data message from the data message transmitting terminal, can receive data message from the data message transmitting terminal after, abandon the data message that is received immediately; Also can transmit the data message that receives, abandon said data message by host apparatus to host apparatus.Specifically take which kind of mode, can be provided with according to actual needs.
Judge that the method whether link of host apparatus and data message transmitting terminal breaks down also can have multiple choices; For example; Can by the data message transmitting terminal through checking whether its port that links to each other with host apparatus is judged unusually, also can be by host apparatus through checking whether its port that links to each other with the data message transmitting terminal is judged unusually.Accordingly, the link of host apparatus and data message transmitting terminal breaks down, and needs the reception of notice stand-by equipment and when host apparatus is transmitted data message, can also can notify stand-by equipment by host apparatus by data message transmitting terminal notice stand-by equipment.
Step 45: after host apparatus is received the data message of stand-by equipment forwarding, continue to duplicate and transmit said data message to the data message receiving terminal.
Fig. 5 uses the traffic transport path sketch map of VPMS protection of the present invention for after active link breaks down, and is as shown in Figure 5; After active link breaks down; The data message that the data message transmitting terminal sends is forwarded to host apparatus through stand-by equipment, is still duplicated and be transmitted to the data message receiving terminal by host apparatus; Be after active link breaks down, transmit data message by reserve link.
Fig. 6 is for the realization system construction drawing of VPMS protection of the present invention, and is as shown in Figure 6, and the realization system of VPMS protection of the present invention comprises: data message transmitting terminal 61, host apparatus 62, stand-by equipment 63 and data message receiving terminal 64; Wherein,
Data message transmitting terminal 61 is used for to host apparatus 62 and/or stand-by equipment 63 literary composition that sends datagram;
Host apparatus 62, be used to set up and stand-by equipment 63 between pseudo-line; Data message receiving terminal 64 is duplicated and be transmitted to reception from the data message of data message transmitting terminal 61 and/or stand-by equipment 63;
Stand-by equipment 63 is used for after the link between data message transmitting terminal 61 and the host apparatus 62 breaks down, and receives from the data message according to message source 61, and is transmitted to host apparatus 62 through the pseudo-line between said and the host apparatus 62;
Data message receiving terminal 64 is used to receive the data message from host apparatus 61.
This system also comprises and active and standbyly with equipment unit 65 is set, and is used to be provided with host apparatus and stand-by equipment.
Set up and stand-by equipment between after 63 the pseudo-line, host apparatus 62 also is used to generate between port and the host apparatus 62 and the stand-by equipment 63 of expression host apparatus 62 data-oriented message transmitting terminals 61 between the pseudo-line and point to multi-point pseudowire the virtual of mapping relations and transmits;
When host apparatus 62 is transmitted data message, transmit through inquiring about said virtual transmitting.
Before the link of host apparatus 62 and data message transmitting terminal 61 breaks down
Stand-by equipment 63 also is used to abandon the data message from data message transmitting terminal 61;
Perhaps, host apparatus 62 is also used and the data message that abandons from stand-by equipment 63.
Data message transmitting terminal 61 or host apparatus 62 are used to also judge whether the host apparatus 62 and the link of data message transmitting terminal 61 break down.
Embodiment 1
In the present embodiment; Host apparatus and stand-by equipment are definite according to being provided with, and the data message transmitting terminal is under the normal situation of link between itself and the host apparatus, only to the host apparatus literary composition that sends datagram; And judge whether the link between itself and the host apparatus breaks down; After breaking down at the link between itself and the host apparatus, the data message transmitting terminal is transmitted to host apparatus by stand-by equipment again to the stand-by equipment literary composition that sends datagram.
Fig. 7 is the implementation method flow chart of VPMS protection in the embodiment of the invention 1, and is as shown in Figure 7, and the implementation method of VPMS protection may further comprise the steps among the embodiment 1:
Step 71: host apparatus and stand-by equipment are set.
For example, for dual-home network shown in Figure 1, it is host apparatus that provider edge equipment PE1 is set, and provider edge equipment PE2 is a stand-by equipment.
Step 72: set up the pseudo-line between host apparatus PE1 and the stand-by equipment PE2.
Here, be specially: host apparatus is initiated pseudo-line to stand-by equipment and is set up request, and host apparatus and stand-by equipment consult to set up pseudo-line.
For dual-home network shown in Figure 1; Link between data message transmitting terminal CE1 and the host apparatus PE1 is active link; Link between data message transmitting terminal CE1 and the stand-by equipment PE2, the pseudo-line PW1 that adds between host apparatus PE1 and the stand-by equipment PE2 constitutes reserve link jointly.
And; On host apparatus PE1, generate virtual instance mapping table as shown in table 1; Make port P1 and the pseudo-line PW1 between host apparatus PE1 and the stand-by equipment PE2 between host apparatus and the data message transmitting terminal CE1; Be in the P2MP tree of P2MP LSP 1 with ID all, label is that the pseudo-line of the P2MP of A-1 has mapping relations.
Step 73: only to the host apparatus literary composition that sends datagram, host apparatus duplicates and transmits said data message to the data message transmitting terminal.
After host apparatus is received data message, specifically duplicate and transmit said data message according to virtual the transmitting shown in the table 1.
In the present embodiment, data message transmitting terminal CE1 is through active link (CE1 is to the link of the PE1) literary composition that sends datagram, and at this moment, reserve link (the pseudo-line PW1 that is added the ce1 and ce2 to the link of PE2 by CE1 constitutes jointly) does not have any flow.
Step 74: the data message transmitting terminal passes to host apparatus to data message through reserve link after judging that active link breaks down.
Whether here, the data message transmitting terminal judges whether active link breaks down, can judge unusually through checking its port that links to each other with host apparatus.
In the present embodiment; After active link (CE1 is to the link of PE1) breaks down; CE1 passes to PE1 to data message through reserve link (the pseudo-line PW1 that is added the ce1 and ce2 to the link of PE2 by CE1 constitutes jointly), and the data message forwarding path is as shown in Figure 5.
Step 75: after host apparatus is received the data message of stand-by equipment forwarding, continue to duplicate and transmit said data message to the data message receiving terminal.
Here, host apparatus continues to duplicate and transmit said data message to the data message receiving terminal after receiving the data message that stand-by equipment transmits, promptly the data message transmitting terminal still adopt host apparatus carry out with the data message receiving terminal between communicate by letter.
Embodiment 2
In the present embodiment; Host apparatus and stand-by equipment are confirmed through election; And under the normal situation of the link between data message transmitting terminal and the host apparatus; To host apparatus and the stand-by equipment literary composition that sends datagram, host apparatus duplicates and transmits the data message of receiving to the data message transmitting terminal simultaneously, and stand-by equipment abandons the data message of receiving.Whether the link between data message transmitting terminal and the host apparatus breaks down, and judged by host apparatus, and after breaking down, the notice stand-by equipment is transmitted data message to host apparatus.
Fig. 8 is the implementation method flow chart of VPMS protection in the embodiment of the invention 2, and is as shown in Figure 8, and the implementation method of VPMS protection may further comprise the steps among the embodiment 2:
Step 81: through electing host apparatus and stand-by equipment.
For dual-home network shown in Figure 1, can elect host apparatus and stand-by equipment according to the described election mechanism of step 41, for example, election provider edge equipment PE1 is that host apparatus, provider edge equipment PE2 are stand-by equipment.
Step 82: set up the pseudo-line between host apparatus and the stand-by equipment.
Here, be specially: host apparatus is initiated pseudo-line to stand-by equipment and is set up request, and host apparatus and stand-by equipment consult to set up pseudo-line.
Set up after the pseudo-line between host apparatus and the stand-by equipment; Link between data message transmitting terminal and the host apparatus is active link; Link between data message transmitting terminal and the stand-by equipment, the pseudo-line of adding between host apparatus and the stand-by equipment constitutes reserve link jointly.
And; For dual-home network shown in Figure 1; On host apparatus PE1, can produce virtual instance mapping table as shown in table 1; Making port P1 and the pseudo-line PW1 between host apparatus PE1 and the stand-by equipment PE2 between host apparatus and the data message transmitting terminal CE1, is in the P2MP tree of P2MP LSP 1 with ID all, and label is that the pseudo-line of the P2MP of A-1 has mapping relations.
Step 83: the data message transmitting terminal is simultaneously to host apparatus and the stand-by equipment literary composition that sends datagram.
For dual-home network shown in Figure 1, data message transmitting terminal CE1 is simultaneously to host apparatus PE1 and the stand-by equipment PE2 literary composition that sends datagram.
Step 84: after host apparatus is received data message, duplicate and transmit said data message, after stand-by equipment is received data message, directly abandon.
In the present embodiment, active link just often, host apparatus duplicates and transmits the data message from the data message transmitting terminal, and after stand-by equipment receives the data message from the data message transmitting terminal, directly abandons, and does not carry out and transmits operation.
For example; In dual-home network shown in Figure 1; Data message transmitting terminal CE1 is simultaneously to host apparatus PE1 and the stand-by equipment PE2 literary composition that sends datagram, but only has host apparatus CE1 to duplicate and transmit the data message of receiving, stand-by equipment PE2 then abandons the data message of receiving.
Step 85: after host apparatus judges that active link breaks down, the notice stand-by equipment with the data message forwarding of receiving to host apparatus.
Whether here, host apparatus judges whether active link breaks down, can judge unusually through checking its port that links to each other with the data message transmitting terminal.
In dual-home network shown in Figure 1, after active link (CE1 is to the link of PE1) broke down, PE1 gave PE1 the data message forwarding of receiving through Border Gateway Protocol (BGP) notice stand-by equipment PE2.
Step 86: stand-by equipment to host apparatus, after host apparatus is received the data message of stand-by equipment forwarding, continues the data message forwarding of receiving to duplicate and transmit said data message to the data message receiving terminal.
Here, host apparatus continues to duplicate and transmit said data message to the data message receiving terminal after receiving the data message that stand-by equipment transmits, promptly the data message transmitting terminal still adopt host apparatus carry out with the data message receiving terminal between communicate by letter.
Embodiment 3
In the present embodiment, after dual-homed active link breaks down, control the switching of link by host apparatus.
Fig. 9 is the implementation method flow chart of VPMS protection in the embodiment of the invention 3, and is as shown in Figure 9, and the implementation method of VPMS protection may further comprise the steps among the embodiment 3:
Step 91: through electing host apparatus and stand-by equipment.
For dual-home network shown in Figure 1, can elect host apparatus and stand-by equipment according to the described election mechanism of step 41, for example, provider edge equipment PE1 is a host apparatus, provider edge equipment PE2 is a stand-by equipment.
Step 92: set up the pseudo-line between host apparatus and the stand-by equipment.
Here, be specially: host apparatus is initiated pseudo-line to stand-by equipment and is set up request, and host apparatus and stand-by equipment consult to set up pseudo-line.
In dual-home network shown in Figure 1; Set up after the pseudo-line between host apparatus PE1 and the stand-by equipment PE2; Link between data message transmitting terminal CE1 and the host apparatus PE1 is active link; Link between data message transmitting terminal CE1 and the stand-by equipment PE2, the pseudo-line PW1 that adds between host apparatus PE1 and the stand-by equipment PE2 constitutes reserve link jointly.
And; On host apparatus PE1, can generate virtual instance mapping table as shown in table 1; Make port P1 and the pseudo-line PW1 between host apparatus PE1 and the stand-by equipment PE2 between host apparatus and the data message transmitting terminal CE1; Be in the P2MP tree of P2MP LSP 1 with ID all, label is that the pseudo-line of the P2MP of A-1 has mapping relations.
Step 93: the data message transmitting terminal is simultaneously to host apparatus and the stand-by equipment literary composition that sends datagram.
In the present embodiment, data message transmitting terminal CE1 is simultaneously to host apparatus PE1 and the stand-by equipment PE2 literary composition that sends datagram.
Step 94: to host apparatus, host apparatus only duplicates and transmits the data message from the data message transmitting terminal to the data message receiving terminal to stand-by equipment with the data message forwarding of receiving, and the data message that stand-by equipment is sent abandons.
For example; In dual-home network shown in Figure 1; To host apparatus PE1 and the stand-by equipment PE2 literary composition that sends datagram, stand-by equipment PE2 is forwarded to host apparatus PE1 after receiving data message to data message transmitting terminal CE1 simultaneously, and host apparatus PE1 only duplicates and transmit the data message from data message transmitting terminal CE1; Data message for stand-by equipment PE2 sends then abandons.
Step 95: host apparatus duplicates and transmits the data message from stand-by equipment to the data message receiving terminal after judging that active link breaks down.
Whether here, host apparatus judges whether active link breaks down, can judge unusually through checking its port that links to each other with the data message transmitting terminal.
The above is merely preferred embodiment of the present invention, is not to be used to limit protection scope of the present invention.

Claims (10)

1. the implementation method of virtual private multicast service VPMS protection is characterized in that this method comprises:
Confirm host apparatus and stand-by equipment, and set up the pseudo-line between host apparatus and the stand-by equipment;
Host apparatus receives the data message from the data message transmitting terminal, duplicates and be transmitted to the data message receiving terminal;
After the link of host apparatus and data message transmitting terminal breaks down; Receive data message by stand-by equipment from the data message transmitting terminal; And be transmitted to host apparatus through the pseudo-line of said foundation; Host apparatus will duplicate and be transmitted to the data message receiving terminal again from the data message of subsequent use equipment
Set up after the pseudo-line between host apparatus and the stand-by equipment; This method also comprises: on host apparatus, generate virtual transmitting, the mapping relations between the said virtual port of transmitting expression host apparatus data-oriented message transmitting terminal and host apparatus and the stand-by equipment between pseudo-line and the point to multi-point pseudowire;
Said host apparatus is transmitted data message: inquire about said virtual transmitting, and transmit through corresponding point to multi-point pseudowire.
2. implementation method according to claim 1 is characterized in that, said definite host apparatus and stand-by equipment are: through disposing or electing;
The said pseudo-line of setting up between host apparatus and the stand-by equipment is: host apparatus initiates to join request to stand-by equipment; Host apparatus and stand-by equipment consult to set up the pseudo-line between the two.
3. implementation method according to claim 1 is characterized in that, whether the link of said host apparatus and data message transmitting terminal breaks down, and is judged by data message transmitting terminal or host apparatus.
4. according to each described implementation method of claim 1 to 3, it is characterized in that before the link of host apparatus and data message transmitting terminal broke down, the data message transmitting terminal was only to the host apparatus literary composition that sends datagram;
After the link of host apparatus and data message transmitting terminal broke down, the data message transmitting terminal was to the stand-by equipment literary composition that sends datagram, stand-by equipment through and host apparatus between pseudo-line with the data message forwarding of receiving to host apparatus.
5. according to each described implementation method of claim 1 to 3; It is characterized in that; Before the link of host apparatus and data message transmitting terminal breaks down; To host apparatus and the stand-by equipment literary composition that sends datagram, host apparatus is forwarded to the data message receiving terminal after receiving said data message to the data message transmitting terminal simultaneously, and stand-by equipment directly abandons after receiving said data message;
After the link of host apparatus and data message transmitting terminal breaks down, stand-by equipment with the data message forwarding of receiving to host apparatus.
6. according to each described implementation method of claim 1 to 3; It is characterized in that; Before the link of host apparatus and data message transmitting terminal broke down, to host apparatus and the stand-by equipment literary composition that sends datagram, stand-by equipment was forwarded to host apparatus after receiving said data message to the data message transmitting terminal simultaneously; Host apparatus will be forwarded to the data message receiving terminal behind the data message from the data message transmitting terminal, and will directly abandon from the data message of subsequent use equipment;
After the link of host apparatus and data message transmitting terminal broke down, host apparatus will be from data message forwarding to the data message receiving terminal of subsequent use equipment.
7. the realization system of a VPMS protection is characterized in that this system comprises: data message transmitting terminal, host apparatus, stand-by equipment and data message receiving terminal; Wherein,
Said data message transmitting terminal is used for to host apparatus and/or the stand-by equipment literary composition that sends datagram;
Said host apparatus, be used to set up and stand-by equipment between pseudo-line; The data message receiving terminal is duplicated and be transmitted to reception from the data message of data message transmitting terminal and/or stand-by equipment;
Said stand-by equipment is used for after the link between data message transmitting terminal and the host apparatus breaks down, and receives from the data message according to message source, and is transmitted to host apparatus through the pseudo-line between said and the host apparatus;
Said data message receiving terminal is used to receive the data message from host apparatus,
Set up and stand-by equipment between pseudo-line after, said host apparatus also is used to generate between port and the host apparatus and the stand-by equipment of expression host apparatus data-oriented message transmitting terminal between the pseudo-line and point to multi-point pseudowire the virtual of mapping relations and transmits;
When host apparatus is transmitted data message, transmit through inquiring about said virtual transmitting.
8. realization according to claim 7 system is characterized in that, this system also comprises and active and standbyly with equipment the unit is set, and is used to be provided with host apparatus and stand-by equipment.
9. realization according to claim 7 system is characterized in that, before the link of host apparatus and data message transmitting terminal breaks down,
Said stand-by equipment also is used to abandon the data message from the data message transmitting terminal;
Perhaps, said host apparatus also is used to abandon the data message from stand-by equipment.
10. realization according to claim 7 system is characterized in that said data message transmitting terminal or host apparatus are used to also judge whether the link of said host apparatus and data message transmitting terminal breaks down.
CN2009100861067A 2009-06-02 2009-06-02 Method and system for realizing virtual private multicast service protection Expired - Fee Related CN101719834B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009100861067A CN101719834B (en) 2009-06-02 2009-06-02 Method and system for realizing virtual private multicast service protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009100861067A CN101719834B (en) 2009-06-02 2009-06-02 Method and system for realizing virtual private multicast service protection

Publications (2)

Publication Number Publication Date
CN101719834A CN101719834A (en) 2010-06-02
CN101719834B true CN101719834B (en) 2012-06-13

Family

ID=42434355

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009100861067A Expired - Fee Related CN101719834B (en) 2009-06-02 2009-06-02 Method and system for realizing virtual private multicast service protection

Country Status (1)

Country Link
CN (1) CN101719834B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102223253B (en) * 2011-06-16 2017-09-15 南京中兴软件有限责任公司 Pseudo-line service dual-homing protection processing method, apparatus and system
CN102624559A (en) * 2012-03-09 2012-08-01 北京星网锐捷网络技术有限公司 Method, device and system for realizing out-of-band management
CN106161260B (en) * 2015-04-28 2019-05-24 华为技术有限公司 The selection method and device of multicast traffic stream forwarding tree
CN107592252B (en) * 2016-07-08 2021-06-29 中兴通讯股份有限公司 Service processing method and device
CN109302359A (en) * 2018-11-27 2019-02-01 迈普通信技术股份有限公司 A kind of network equipment, link converting method and device
CN109951371B (en) * 2019-03-29 2021-05-28 新华三技术有限公司 Data forwarding method and device
CN112311649B (en) * 2020-11-03 2022-11-22 优刻得科技股份有限公司 Dynamic disaster recovery method, system, equipment, medium and mixed cloud system of PE equipment
CN114785732B (en) * 2022-05-05 2023-08-11 烽火通信科技股份有限公司 Method and system for P2MP multicast tunnel path protection

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1946040A (en) * 2006-10-13 2007-04-11 华为技术有限公司 Protective method and device for multicast service
CN101227397A (en) * 2008-01-28 2008-07-23 华为技术有限公司 System, equipment and method for protecting link circuit

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1946040A (en) * 2006-10-13 2007-04-11 华为技术有限公司 Protective method and device for multicast service
CN101227397A (en) * 2008-01-28 2008-07-23 华为技术有限公司 System, equipment and method for protecting link circuit

Also Published As

Publication number Publication date
CN101719834A (en) 2010-06-02

Similar Documents

Publication Publication Date Title
CN101719834B (en) Method and system for realizing virtual private multicast service protection
EP3367619B1 (en) Synchronizing multicast state between multi-homed routers in an ethernet virtual private network
CN101330424B (en) Method, system and apparatus for processing service fault of virtual special network
CN101483558B (en) Method, system and apparatus for packet switching network access by network appliance
CN101009569B (en) Data communication device and the method thereof
CN102025541B (en) Method and system for realizing multicast protection
CN101931520B (en) Switching method and system
CN102035729B (en) Multicast data forwarding method
EP2518952B1 (en) Method and system for increasing forwarding efficiency of virtual private lan service network
CN102045178B (en) The method of Virtual Private LAN Service multicast protection and device
CN101127724B (en) Multicast system, device and method based on 802.1ah protocol in MAN Ethernet network
CN101924654B (en) Point-to-multipoint service-based path switching method and system
WO2012003743A1 (en) Method and apparatus for forwarding multicast traffic
CN102282805B (en) Method for service protection and access device
WO2009056034A1 (en) Method, system and equipment to establish bfd detection for lsp tunnel
CN101155076B (en) Method for checking pseudo wire trouble of two-layer special network
EP2661847A1 (en) Pseudo wire switching method and device
CN109218159A (en) Multicast information is signaled to the more host's routers of redundancy for 2 Virtual Private Network of layer
CN102098202B (en) Virtual private topology control method, device and system
CN101321077B (en) Reliable multicast method, provider edge upper layer device and system
JP2023503825A (en) Packet forwarding method, first network device and first device group
WO2014048120A1 (en) Method, network node and system for implementing point-to-miltipoint multicast
CN104753754A (en) Method and apparatus for transmitting messages
CN102238040A (en) Method for monitoring CE (Customer Edge router) and routing device
CN111885630B (en) Data transmission method and communication device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120613

Termination date: 20200602

CF01 Termination of patent right due to non-payment of annual fee