CN101888323B - Ethernet ring network-based PBB-TE protection method - Google Patents
Ethernet ring network-based PBB-TE protection method Download PDFInfo
- Publication number
- CN101888323B CN101888323B CN2010102304624A CN201010230462A CN101888323B CN 101888323 B CN101888323 B CN 101888323B CN 2010102304624 A CN2010102304624 A CN 2010102304624A CN 201010230462 A CN201010230462 A CN 201010230462A CN 101888323 B CN101888323 B CN 101888323B
- Authority
- CN
- China
- Prior art keywords
- node
- ring
- data message
- loopback
- port
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Small-Scale Networks (AREA)
Abstract
The invention discloses an Ethernet ring network-based PBB-TE protection method, which comprises the following steps of: quickly recovering communication by utilizing wrap data messages; and triggering the switching of main and backup links by utilizing the wrap data messages. The method solves the problem of expandability of the application of the PBB-TE technology on the ring network, reduces network resources occupied by the CCM messages, and simultaneously avoids momentary interruption of the communication during switching the chains.
Description
Technical field
The present invention relates to network communications technology field, relate in particular to a kind of PBB-TE guard method based on ethernet ring network.
Background technology
Along with CE (Carrier Ethernet; The carrier class Ethernet) proposition of notion; Satisfy the communication network demand, connection-oriented ethernet technology---PBT (Provider Backbone Transport, operator backbone transmits) also emerges in October, 2005.After this, all there is operator to adopt the networking of PBT technology both at home and abroad, for the development of PBT technology in metropolitan area network provides the good beginning.
The basis of PBT technology is PBB (the Provider Backbone Bridge of IEEE 802.1ah definition; The operator backbone bridge joint) technology; IEEE calls PBB-TE (Provider Backbone Bridge Traffic Engineering, the operator backbone bridging technology of support traffic engineering) to the PBT technology.The PBB-TE technology is based on the PBB technology; Its core is that the PBB technology is improved; The source device of CE inserts B-DA (Backbone Destination MAC Address, backbone network target MAC (Media Access Control) address), B-SA (Backbone Destination MAC Address, the source MAC of backbone network), B-VLAN (Backbone VLAN at the head of message; The backbone network VLAN) and I-TAG (Service Instance TAG, Service Instance mark).The source device of CE and the forward-path between the destination device are static configuration in advance, and middle CE equipment can be transmitted Frame based on the B-DA in transmitting and B-VID, the forward efficiency height.
In order to make Ethernet reach telecommunications rank standard, PBB-TE adopts resist technology usually.Shown in Figure 1 is the sketch map of the end-to-end linear protection in Ethernet tunnel in the prior art, wherein, the end-to-end main tunnel of certain traffic engineering Service Instance be TN1:PE1 ← → P1 ← → P2 ← → P3 ← → PE2, PE1 and PE2 are the end of this tunnel example.TN2:PE1 ← → P5 ← → P6 ← → PE2 is the end-to-end backup tunnel of this traffic engineering Service Instance, in order to distinguish above-mentioned main tunnel TN1 and backup tunnel TN2, is that main tunnel TN1 specifies B-VLAN1 when pre-configured, over run tunnel TN2 specifies B-VLAN2.When end-to-end main tunnel TN1 breaks down, can data flow be switched on the backup tunnel TN2.
PBB-TE adopts CFM (Connectivity Fault Management, the connectivity fault management) mechanism among the IEEE 802.1ag to come the tunnel state in the monitoring network constantly.When leading, can transfer to business automatically on the backup path of setting up in advance, realize the protecting tunnel technology with tunnel failure.
In the prior art, detect the connectedness in tunnel through in the tunnel, sending CCM (Continuity Check Message, the connectivity check messages that defines among the IEEE 802.1ag).As shown in Figure 2, send CCM mutually along main tunnel TN1 and backup tunnel TN2 respectively between endpoint of a tunnel PE1 and the PE2, the CCM of main tunnel and backup tunnel encapsulates B-VLAN1 and B-VLAN2 respectively.This method has realized the complete trails protection in tunnel.
Though conventional method can realize excellent protection to tunnel path, there is the bad shortcoming of autgmentability, particularly when a ring was shared in a large amount of tunnels, it is more serious that problem can become.Main problem has two aspects, is respectively: 1) two of active/standby tunnel end points will send corresponding C CM message respectively on principal piece and backup segment, and these CCM streams overlap each other, have taken a large amount of Internet resources.2) communication disruption of moment can take place in link when switching.As shown in Figure 3: the link on the ring < A, F>is the ring protection link, and node A is a Control Node.Each Ethernet switching node has connected 10000 sub-net on the ring; For the data flow to any two sub-net is carried out segment protect; Need between any two nodes on the ring to send the CCM message each other, the path of these CCM messages overlaps each other, causes Internet resources by a large amount of wastes.
In order to set forth the utilization of the present invention on looped network, we at first introduce the transmission of data flow on looped network of PBB-TE.On looped network, each ring is gone up node and the PBB-TE data message of on ring, transmitting is not carried out static configuration is transmitted, only to last ring and down the PBB-TE data message of ring be configured forwarding entry.When the last node of ring is received the data message of PBB-TE; Use B-DA and B-VID (ID of B-VLAN number) in the said message to table look-up; If in transmitting, do not find relevant forwarding entry; This node is transmitted (that is, this data message being forwarded from another ring port) with said data message with the multicast mode, otherwise the PBB-TE data message is forwarded from the port that is found.
As shown in Figure 4, Node B receives that B0 behind the data message p that subnet D0 sends, utilizes < B; VLAN4, D>data message P encapsulated (data message after the encapsulation will be designated < B, VLAN4; D>the tunnel on transmit); Utilize < VLAN4, D>to search addresses forwarding table then and obtain outbound port b1, Node B forwards PBB-TE data message P from outbound port b1; After node C receives data message P from the c2 port, utilize < VLAN4, D>to search addresses forwarding table, owing to do not find relative transferring item, node C directly forwards data message P from the c1 port; After node D receives data message P from the d2 port; The B-DA that finds PBB-TE data message P head is the MAC Address of node itself; Node D peels off the head of PBB-TE data message P in the encapsulation of last ring place; Restore data message p utilizes prior art that data message p is forwarded from following central port d3 then.
Summary of the invention
The present invention seeks to provides a kind of PBB-TE guard method based on ethernet ring network to the defective that prior art exists.
The present invention adopts following technical scheme for realizing above-mentioned purpose:
A kind of PBB-TE guard method based on ethernet ring network of the present invention is characterized in that comprising the steps:
1) at first utilizes the quick restoring communication of data message of loopback;
2) utilize loopback (wrap) data message to trigger switching of main/slave link, specific as follows:
When the ring port blocking data message of node is transmitted constantly, it is unactivated state that the node forwarding entry that this port blocked is related transfers stand-by state to, activates the forwarding entry with their pairings simultaneously, and the forwarding entry that is about to pairing transfers operating state to;
Go up node when ring and receive that the data message of common PBB-TE is that the value of the loopback label L P among the I-SID in the message is 0; If outer B-DA is the MAC Address of this node; Node descends the ring operation to this message on the ring; Otherwise utilize the B-DA of said data message head and B-VID in transmitting, to table look-up, be divided into following three kinds of situation and handle:
(a) if the forwarding entry of finding changes stand-by state into, described data message will be changed to 1 by the loopback label L P among the I-SID of the data message of loopback by loopback;
(b) if this node does not find relative transferring item in transmitting, so described data message will be changed to 1 by the loopback label L P among the I-SID of the data message of loopback by loopback;
(c) if the outbound port of finding is the ring port of unblock, this node is not done any processing to transmitting;
When ring is gone up the ring port cause clogging of node; If this node is received the data message (value of the loopback label L P among the I-SID in the message is 1) of the PBB-TE of loopback; If outer B-DA is the MAC Address of this node, node descends ring operation (adopt prior art-802.1Qay, the present invention does not do narration) to this message; Otherwise utilize the B-DA of said data message head and B-VID in transmitting, to table look-up, be divided into following two kinds of situation and handle:
(A) in transmitting, do not find the outbound port of message, this node abandons the data message of described loopback;
(B) if the forwarding entry of finding changes stand-by state into, this node abandons the data message of described loopback;
When ring is gone up node and is received the data message of PBB-TE of loopback, directly this message is forwarded from another ring port, copy is a simultaneously supplies node analysis.Then; Node is at first analyzed B-DA; If outer B-DA is the MAC Address of this node, node descends ring operation (adopt prior art-802.1Qay, the present invention does not do narration) to this message; Otherwise utilize the B-DA of said data message head and B-VID in transmitting, to table look-up, be divided into following three kinds of situation and handle:
(1) if the outbound port of finding is the ring port that receives this message, it is unactivated state that node transfers this forwarding entry to stand-by state, activates the forwarding entry with its pairing simultaneously.
(2) if the outbound port of finding is another ring port, this node is not done any processing to transmitting.
(3) if do not find relative transferring item, this node is not done any processing to transmitting.
The related definition explanation:
The pairing forwarding entry: the pairing forwarding entry mainly is used for selecting active/standby tunnel by node on the ring at PBB-TE tunnel portal place.It contains 2 forwarding entrys, wherein has only one to be in operating state (perhaps claiming state of activation).Upward outbound port is all inequality with ring for the B-VID of two forwarding entrys of pairing.
Preferably, when ring was gone up node and received the data message of common PBB-TE, this ring was gone up node and is contained upward port blocked of ring.
Preferably, when ring was gone up node and received the data message of PBB-TE of loopback, this ring was gone up the ring port that node not have obstruction.
Preferably; Said pairing forwarding entry is used for selecting active/standby tunnel by node on the ring at PBB-TE tunnel portal place; Contain 2 forwarding entrys, wherein have only one to be in operating state or to claim state of activation, upward outbound port is all inequality with ring for the B-VID of two forwarding entrys of pairing.
Beneficial effect:
Core content of the present invention is to utilize loopback (wrap) data message to trigger switching of main/slave link; Solved the Application Expansion property of PBB-TE technology on looped network; The Internet resources that the CCM message takies have been reduced, the instantaneous interruption that communication occurs when also having avoided link switchover simultaneously.
Description of drawings
Fig. 1 and Fig. 2 are PBB-TE protecting tunnel schematic diagrams end to end;
Fig. 3 is the sketch map that the user inserts looped network;
Fig. 4 is the sketch map that the PBB-TE data are transmitted on looped network;
Fig. 5 and Fig. 6 are workflow diagrams of the present invention;
Fig. 7 and Fig. 8 are example schematic of the present invention.
Embodiment
Core content of the present invention is: the quick restoring communication of data message of 1) at first utilizing loopback.2) utilize loopback (wrap) data message to trigger switching of main/slave link.For realizing this thought, this invention must realize following function:
Transmit constantly when the ring port blocking data message of node, node transfers the forwarding entry of this port blocked association to stand-by state (unactivated state), activates the forwarding entry (that is, the forwarding entry with pairing transfers operating state to) with their pairings simultaneously.
When node (contain ring go up port blocked) is received the data message (value of the loopback label L P among the I-SID in the message is 0) of common PBB-TE; If outer B-DA is the MAC Address of this node; Node descends the ring operation (to adopt prior art-802.1Qay to this message; The present invention does not do narration), otherwise utilize the B-DA of said data message head and B-VID in transmitting, to table look-up.Divide 3 kinds of situation to handle:
● if the forwarding entry of finding changes stand-by state into, and described data message will be changed to 1 by the loopback label L P among the I-SID of the data message of loopback by loopback.
● if this node does not find relative transferring item in transmitting, so described data message will be changed to 1 by the loopback label L P among the I-SID of the data message of loopback by loopback.
● if the outbound port of finding is the ring port of unblock, and this node is not done any processing to transmitting.When ring is gone up the ring port cause clogging of node; If this node is received the data message (value of the loopback label L P among the I-SID in the message is 1) of the PBB-TE of loopback; If outer B-DA is the MAC Address of this node; Node descends ring operation (adopt prior art-802.1Qay, the present invention does not do narration) to this message, otherwise utilizes the B-DA of said data message head and B-VID in transmitting, to table look-up.Divide 2 kinds of situation to handle:
● in transmitting, do not find the outbound port of message, this node abandons the data message of described loopback.
● if the forwarding entry of finding changes stand-by state into, and this node abandons the data message of described loopback.
When ring is gone up node (not have block ring port) and received the data message of PBB-TE of loopback, directly this message is forwarded the node analysis of a confession of copy simultaneously from another ring port.Then; Node is at first analyzed B-DA, if outer B-DA is the MAC Address of this node, node descends the ring operation (to adopt prior art-802.1Qay to this message; The present invention does not do narration), otherwise utilize the B-DA of said data message head and B-VID in transmitting, to table look-up.Divide 3 kinds of situation to handle::
● if the outbound port of finding is the ring port that receives this message, and node transfers this forwarding entry to stand-by state (unactivated state), activates the forwarding entry with its pairing simultaneously.
● if the outbound port of finding is another ring port, and this node is not done any processing to transmitting.
● if do not find relative transferring item, this node is not done any processing to transmitting.
The related definition explanation:
The pairing forwarding entry: the pairing forwarding entry mainly is used for selecting active/standby tunnel by node on the ring at PBB-TE tunnel portal place.It contains 2 forwarding entrys, wherein has only one to be in operating state (perhaps claiming state of activation).Upward outbound port is all inequality with ring for the B-VID of two forwarding entrys of pairing.
In order to further specify scheme of the present invention, step of the present invention is set forth as follows, and Fig. 5 contains the flow chart of data processing figure that ring is gone up the node of port blocked.Fig. 6 does not comprise the flow chart of data processing figure that ring is gone up the node of port blocked.What need particularly point out is; For outstanding description to the present invention program, the present invention operates (being descapsulated into common Ethernet data message) with ring down and does not do narration the ring operation (being packaged into the PBB-TE data message) of going up that the common Ethernet data message of complicacy carries out.
The flow chart description of Fig. 5 is following:
Whether step 501, predicate node contain ring is gone up port blocked.Go up port blocked if contain ring, change step 502 over to.
Step 508 abandons described data message.
Step 509 abandons described data message.
The flow chart description of Fig. 6 is following:
Whether step 601, predicate node contain ring is gone up port blocked.Do not go up port blocked if do not comprise ring, change step 602 over to.
Step 604 judges whether it is the PBB-TE data message (that is, whether the LP field of I-SID is 1) of loopback.If change step 605 over to, otherwise change step 610 over to.
Step 605, this node directly forward said loopback message from another ring port, the said node analysis of a confession of copy simultaneously.Then, node utilizes the B-DA of said data message head and B-VID in transmitting, to table look-up.
Whether step 611, judging has relative transferring item in transmitting.If have, change step 612 over to, otherwise change step 613 over to.
Embodiment one
As shown in Figure 9, the node that looped network comprises has A, B, C, D, E and F, and the link that comprises has < A, B >, < B, C >, < C, D >, < D, E >, < E, F>and < F, A>link.Node A is a Control Node, with its a2 direct port connection link < F, A>be the ring protection link, the a2 port of node A blocking data message forwarding under the looped network normal condition.Node A, B and D have been connected node on the 10000 sub-net rings respectively, are that example explain of the present invention practical implementation process through the tunnel on the looped network to the subnet D0 literary composition that sends datagram with subnet B0 below
Under the looped network non-failure conditions, Control Node A blocks the data message forwarding function of its a2 port.Node B receives that B0 behind the data message p that subnet D0 sends, utilizes < B, VLAN4; D>data message P encapsulated (data message after the encapsulation will be designated < B; VLAN4, D>the tunnel on transmit), utilize < VLAN4 then; D>to search addresses forwarding table and obtain outbound port b1, Node B forwards PBB-TE data message P from outbound port b1; After node C receives data message P from the c2 port, utilize < VLAN4, D>to search addresses forwarding table, owing to do not find relative transferring item, node C directly forwards data message P from the c1 port; After node D receives data message P from the d2 port; The B-DA that finds PBB-TE data message P head is the MAC Address of node itself; Node D peels off the head of PBB-TE data message P in the encapsulation of last ring place; Restore data message p utilizes prior art that data message p is forwarded from following central port d3 then.Therefore, subnet B0 to the send datagram path of civilian p of subnet D0 is:
B0→B→C→D→D0
(wherein, B → C → D is < B, VLAN4, D>tunnel)
When fault has taken place < C, D>link, node C blocks the forwarding capability of the data message of c1 port, and outwards periodically sends SF message (fault warning message) along the c2 port; Node D blocks the forwarding capability of the data message of d1 port; And outwards periodically send the SF message along the d2 port; The forwarding entry of the d2 port association that node D also will block transfers stand-by state (unactivated state) to; Activate forwarding entry (that is, the forwarding entry with pairing transfers operating state to) simultaneously with their pairings.
After Control Node A receives the SF message, open the data message forwarding function of a2 port.
When node C received PBB-TE data message P on VLAN4, node C utilized the VLAN4 of P head and MAC Address D to table look-up, and did not have to find relevant forwarding entry, and node C is with P data message loopback, and the LP with the I-SID in the message puts 1 simultaneously.
When Node B was received from the data message P of node C loopback, discovery was looping back data message (LP=1), with the multicast mode this message another ring port from it was forwarded the node analysis of a confession of copy simultaneously.Node B is tabled look-up with the VLAN4 and the MAC Address D of P head, finds that outbound port b1 is identical with the port that receives the P data message, and Node B is with forwarding entry [D; VLAN4, b1] transfer stand-by state (unactivated state) to, simultaneously with the forwarding entry [D of correspondence; VLAN5, b2] transfer state of activation to.
When node A received data message P, discovery was looping back data message (LP=1), with the multicast mode this message another ring port from it was forwarded the node analysis of a confession of copy simultaneously.Node A tables look-up with the VLAN4 and the MAC Address D of P head, finds that outbound port a1 is identical with the port that receives the P data message, and node A is with forwarding entry [D; VLAN4, a1] transfer stand-by state (unactivated state) to, simultaneously with the forwarding entry [D of correspondence; VLAN5, a2] transfer state of activation to.
When node F (E) received the data message P1 of loopback, discovery was the data message (LP=1) of loopback, with the multicast mode this message another ring port from them was forwarded the node analysis of a confession of copy simultaneously.Node B (A) is tabled look-up with P head VLAN4 and MAC Address D, does not find relative transferring item, and Node B (A) is left intact to forwarding entry corresponding in transmitting.
After node D receives data message P from the d1 port; The B-DA that finds PBB-TE data message P head is the MAC Address of node itself; Node D peels off the head of PBB-TE data message P in the encapsulation of last ring place; Restore data message p utilizes prior art that data message p is forwarded from following central port d3 then.
Therefore, subsequently subnet B0 to subnet D0 send datagram the literary composition the path be:
B0→B→A→F→E→D→D0
(wherein, B → A → F → E → D is < B, VLAN5, D>tunnel)
Through top analysis, the present invention has solved the difficulty that runs into when traditional segment protect scheme is used well on looped network, has greatly improved the performance of PBB-TE looped network
Certainly; The present invention also can have other various embodiments; Under the situation that does not deviate from spirit of the present invention and essence thereof; Those of ordinary skill in the art can make various corresponding changes and distortion according to the present invention, but these corresponding changes and distortion all should belong to the protection range of the appended claim of the present invention.
Claims (3)
1. the PBB-TE guard method based on ethernet ring network is characterized in that comprising the steps:
1) at first utilizes the quick restoring communication of data message of loopback;
2) utilize loopback (wrap) data message to trigger switching of main/slave link, specific as follows:
When the ring port blocking data message of node was transmitted, it was unactivated state that the node forwarding entry that this port blocked is related transfers stand-by state to, activates the forwarding entry that matches with them simultaneously, and the forwarding entry that is about to pairing transfers operating state to;
When ring is gone up the ring port cause clogging of node; Go up node when ring and receive that the data message of common PBB-TE is that the value of the loopback label L P among the I-SID in the message is 0; If outer B-DA is the MAC Address of this node; Node descends the ring operation to this message on the ring, otherwise utilizes the B-DA of said data message head and B-VID in transmitting, to table look-up, and is divided into following three kinds of situation and handles:
(a) if the forwarding entry of finding changes stand-by state into, described data message will be changed to 1 by the loopback label L P among the I-SID of the data message of loopback by loopback;
(b) if this node does not find relative transferring item in transmitting, so described data message will be changed to 1 by the loopback label L P among the I-SID of the data message of loopback by loopback;
(c) if the outbound port of finding is the ring port of unblock, this node is not done any processing to transmitting;
If this node is received the data message of the PBB-TE of loopback; The value of loopback label L P among the I-SID in the message is 1; If outer B-DA is the MAC Address of this node, node descends the ring operation to this message, adopts prior art-802.1Qay; Otherwise utilize the B-DA of said data message head and B-VID in transmitting, to table look-up, be divided into following two kinds of situation and handle:
(A) in transmitting, do not find the outbound port of message, this node abandons the data message of described loopback;
(B) if the forwarding entry of finding changes stand-by state into, this node abandons the data message of described loopback;
Go up node when ring and do not comprise ring and go up port blocked, when ring is gone up node and received the data message of PBB-TE of loopback, directly this message is forwarded from another ring port, copy is a simultaneously supplies node analysis; Then, node is at first analyzed B-DA, if outer B-DA is the MAC Address of this node; Node descends the ring operation to this message; Adopt prior art-802.1Qay, otherwise utilize the B-DA of said data message head and B-VID in transmitting, to table look-up, be divided into following three kinds of situation and handle:
(1) if the outbound port of finding is the ring port that receives this message, it is unactivated state that node transfers this forwarding entry to stand-by state, activates the forwarding entry with its pairing simultaneously;
(2) if the outbound port of finding is another ring port, this node is not done any processing to transmitting;
(3) if do not find relative transferring item, this node is not done any processing to transmitting.
2. a kind of PBB-TE guard method based on ethernet ring network according to claim 1 is characterized in that this ring is gone up node and contained upward port blocked of ring when ring is gone up node and received the data message of common PBB-TE.
3. a kind of PBB-TE guard method according to claim 1 based on ethernet ring network; It is characterized in that said pairing forwarding entry is used for selecting active/standby tunnel by node on the ring at PBB-TE tunnel portal place; Contain 2 forwarding entrys; Wherein have only one to be in operating state or to claim state of activation, upward outbound port is all inequality with ring for the B-VID of two forwarding entrys of pairing.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010102304624A CN101888323B (en) | 2010-07-19 | 2010-07-19 | Ethernet ring network-based PBB-TE protection method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010102304624A CN101888323B (en) | 2010-07-19 | 2010-07-19 | Ethernet ring network-based PBB-TE protection method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101888323A CN101888323A (en) | 2010-11-17 |
CN101888323B true CN101888323B (en) | 2012-04-11 |
Family
ID=43074056
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2010102304624A Expired - Fee Related CN101888323B (en) | 2010-07-19 | 2010-07-19 | Ethernet ring network-based PBB-TE protection method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101888323B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102045230A (en) * | 2010-12-07 | 2011-05-04 | 中兴通讯股份有限公司 | Ethernet link protection switching method and device |
EP3029893B1 (en) * | 2013-09-03 | 2018-05-23 | Huawei Technologies Co., Ltd. | Method, controller, device and system for protecting service path |
CN103546383B (en) * | 2013-11-08 | 2015-08-05 | 南车株洲电力机车研究所有限公司 | Redundant transmission method, equipment and system on a kind of looped network |
CN103795570B (en) * | 2014-01-23 | 2018-05-08 | 新华三技术有限公司 | The unicast message restoration methods and device of the stacked switchboard system of ring topology |
CN104579785B (en) * | 2015-01-19 | 2018-07-31 | 新华三技术有限公司 | A kind of looped network protecting method and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101425953A (en) * | 2008-12-09 | 2009-05-06 | 中兴通讯股份有限公司 | Address updating method for Ether ring network and network node |
CN101662421A (en) * | 2008-08-28 | 2010-03-03 | 中兴通讯股份有限公司 | Method and device for transmitting control message based on ethernet multi-ring network |
CN101741673A (en) * | 2008-11-25 | 2010-06-16 | 中兴通讯股份有限公司 | Address refreshing method of Ethernet ring |
-
2010
- 2010-07-19 CN CN2010102304624A patent/CN101888323B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101662421A (en) * | 2008-08-28 | 2010-03-03 | 中兴通讯股份有限公司 | Method and device for transmitting control message based on ethernet multi-ring network |
CN101741673A (en) * | 2008-11-25 | 2010-06-16 | 中兴通讯股份有限公司 | Address refreshing method of Ethernet ring |
CN101425953A (en) * | 2008-12-09 | 2009-05-06 | 中兴通讯股份有限公司 | Address updating method for Ether ring network and network node |
Also Published As
Publication number | Publication date |
---|---|
CN101888323A (en) | 2010-11-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8018841B2 (en) | Interworking an ethernet ring network and an ethernet network with traffic engineered trunks | |
CN102104520B (en) | Ring network protection method and device based on topology information | |
CN102571426B (en) | Double-homing protection method and device | |
US20080002570A1 (en) | Network redundancy method, and middle apparatus and upper apparatus for the network redundancy method | |
CN101127724B (en) | Multicast system, device and method based on 802.1ah protocol in MAN Ethernet network | |
CN101997713A (en) | Method for realizing Ethernet path protection switching | |
CN101227399B (en) | Message transmission method, system and forwarding node | |
CN101888323B (en) | Ethernet ring network-based PBB-TE protection method | |
CN101908983B (en) | Joint detection method and system for Ethernet local segment protection | |
CN101989944B (en) | Method for local protection of Ethernet tunnel and shared node of protection domain working segment | |
CN101697525B (en) | Looped network based configuration and data transmission method and system of address forwarding table | |
CN102104519A (en) | Ring network restoring method and device based on topology information | |
CN101977141B (en) | MPLS-TP-based multicast protection method | |
CN101789903A (en) | Method, device and system for protecting semi-ring network | |
CN101997728B (en) | A kind of checkout gear of Ethernet localised protection and method | |
CN102104523A (en) | Data stream transmission method based on PBB-TE sectional tunnel, and node | |
WO2011020339A1 (en) | Method and system for switching in segment protection | |
CN101854265B (en) | Method and system for detecting local protection of Ethernet tunnel | |
CN102025585A (en) | Method and device for protecting Ethernet tunnel | |
CN101888339B (en) | MPLS-TP-based looped network steering protection method | |
CN102064998B (en) | Ethernet path protection switching method and system | |
CN101854266B (en) | Method and system for realizing detection based on MAC (Media Access Control) address and finish condition | |
CN102195794A (en) | Quick switching method and device for path protection of Ethernet | |
CN101945001A (en) | Network protection method and network protection framework | |
CN101883040B (en) | Network protection method and network protection architecture |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20120411 Termination date: 20140719 |
|
EXPY | Termination of patent right or utility model |