CN103209085B - The processing method of alarm and linkage support system - Google Patents

The processing method of alarm and linkage support system Download PDF

Info

Publication number
CN103209085B
CN103209085B CN201210011192.7A CN201210011192A CN103209085B CN 103209085 B CN103209085 B CN 103209085B CN 201210011192 A CN201210011192 A CN 201210011192A CN 103209085 B CN103209085 B CN 103209085B
Authority
CN
China
Prior art keywords
alarm
ias
warning information
processing
parameter structure
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210011192.7A
Other languages
Chinese (zh)
Other versions
CN103209085A (en
Inventor
刘银恩
李能禾
邱军辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201210011192.7A priority Critical patent/CN103209085B/en
Publication of CN103209085A publication Critical patent/CN103209085A/en
Application granted granted Critical
Publication of CN103209085B publication Critical patent/CN103209085B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention provides a kind of processing method of alarm and linkage support system, this method includes:Linkage support (IAS) system receives the warning information of input;The warning information is converted to unified alarm parameter structure by the IAS systems according to preset alarm representation method;The IAS systems detect network failure according to the warning information of the alarm parameter structure, trigger network protection.Above-mentioned IAS systems as a bed courses between detection and protection, protection and detection are distinguished completely, reduce coupling between the two.

Description

The processing method of alarm and linkage support system
Technical field
The invention belongs to network communication field more particularly to a kind of processing methods of alarm and linkage support (IAS) system.
Background technology
Packet Transport Network (PTN, Packet Transport Network) is based on packet switch, connection-oriented more industry The unified tranmission techniques of business, can preferably carry carrier ethernet business, meet traffic criteria, high reliability, flexible expansion Property, 5 essential attributes, the wherein OAM such as stringent QoS (QoS) and perfect Operation Administration and Maintenance (OAM) be to reduce network The important means of maintenance cost, OAM(Operation Administration Maintenance) is particularly significant in public telecom network, especially to needing to provide service quality guarantee Network, OAM can simplify network operation, examine network performance and reduce network operation cost.In general, PTN network is mainly wrapped 3 levels are included, are Virtual Channel (Virtual Channel) layer, virtual path (Virtual Path) layer and virtual segment respectively (Virtual Section) layer, the bottom of PTN is physical media layer network, for transmitting MPLS (TMPLS) OAM technologies, PTN VC layers be pseudo-wire layer (TMC), VP layer be tunnel layer (TMP), VS layers as physical segment layer (TMS).The OAM of PTN network Primarily with respect to the OAM defencive functions of network, detection, switching and node reliability including network etc., with edge-to-edge For 3 business of pseudo wire emulation (PWE), network there are different level fault detect and protection, referring to Fig. 1.
As it can be seen that the different levels of PTN network can dispose different detection and protection, such as tunnel level, can dispose The TMP detections of TMPLS OAM can also dispose tunnel (tunnel) two-way converting detection (BFD), different detections and protection hand Duan Yingyong is in different network layers.
The detection technique of different level can be bound mutually, and the linkage detected between switching must be a level , the protection of different level has corresponding handoff technique, can protect the OAM of PTN and be broadly divided into 6 levels, referring to Fig. 2 institutes Show, this 6 levels are respectively:
1) L2 links (LINK) level:It is the protection based on physical port and virtual LAN (VLAN), which is in The bottom is the OAM of link layer, corresponding to have Connectivity Fault Management (CFM) port+VLAN detections, first mile of ether The TMS detections of net (EFM), TMPLS OAM, corresponding handoff technique have multi-link aggregated group (Multi-Chassis Link Aggregation Group, MC-LAG) link aggregation.This layer is that detection to two layers of physical port and IP route nothing It closes;
2) L3LINK levels:It is the protection based on three layers of outgoing interface and next-hop ip address, corresponding detection technique has Link BFD, ping detection etc., for the link BFD of IP realities interface detection, can notify the quick heavy-route (Fast of IP ReRoute, FRR), for the protection of the practical outgoing interface in tunnel, corresponding link BFD can notify traffic engineering (te)) FRR switches over protection;
3) label switched path (Label Switched Path, LSP) level:It is the protection based on LSP links, is divided to two Attribute, first, the LSP that tag distribution protocol (LDP) signaling is established, (forwarding is of equal value for forward error correction (FEC) for link characteristics Class), it is detected as LDP LSP BFD accordingly, protects corresponding LSP links, corresponding handoff technique is LDP FRR;Second is that base In the tunnel LSP that Resource Reservation Protocol (RSVP TE) signaling of Traffic Engineering extensions is established, link characteristics are tunnel number and LSP It identifies (ID), is detected as RSVP TE LSP BFD accordingly, it is corresponding to be switched to TE Hot Spares (hot-standby);
4) tunnel level:It is the protection based on tunnel (tunnel).For tunnel, it can be realized between two tunnels 1: 1 or 1+1 backup protection, corresponding detection technique have the TMP detections of TMPLS OAM and MPLS OAM, corresponding switching is Protecting tunnel group is notified to switch over by automatic protection switching (Automatic Protection Switching, APS);
5) PW levels:It is the protection for entering label based on internal layer VC, corresponding detection technique has PW BFD and TMPLS OAM's TMC layers of detection can be switched with PW FRR protected accordingly;
6) opposite end (Peer) level:It is the protection based on peer addresses, this layer is relatively to be independent, and belongs to point-to-point Protection, can be detected with peer BFD, and corresponding handoff technique is three-layer VPN FRR.
Therefore various detections and the protection technique of PTN network deployment, there is no directly close between detection and protection System, they are got up by entity associated, and for protection, he is only concerned the state of entity, as long as entity fault is just initiated to protect Shield, and be not relevant for entity fault and detected by what means.For example, tunnel is an entity, in this entity On, can disposing TMPLS OAM, either BFD is detected in combination with protecting tunnel group or FRR progress network switching guarantors Shield, for protecting tunnel group or FRR, he is only concerned the state in tunnel, as long as tunnel failure will initiate to switch, and simultaneously The failure for being indifferent to this tunnel is that TMPLS OAM or BFD detected on earth, so should not between detection and protection It is directly linked.
Invention content
An embodiment of the present invention provides a kind of processing method of alarm and IAS systems, to overcome existing detection and protect it Between the problem of being directly linked.
An embodiment of the present invention provides a kind of processing method of alarm, this method includes:
Linkage support (IAS) system receives the warning information of input;
The warning information is converted to unified alarm parameter knot by the IAS systems according to preset alarm representation method Structure;
The IAS systems detect network failure according to the warning information of the alarm parameter structure, trigger network protection.
Preferably, the preset alarm representation method includes alarm source, alarm status, alarm level and alarm object ginseng Number.
Preferably, the IAS systems detect network failure according to the warning information of the alarm parameter structure, trigger network Protection, including:
The IAS systems determine the flag set of IAS cross-lines card broadcast according to the warning information of the alarm parameter structure, The warning information is then subjected to the broadcast of IAS cross-lines card;
The IAS systems determine that alarm source rapid switching function switch makes according to the warning information of the alarm parameter structure Can, then it carries out being switched fast processing;
The IAS systems determine that the quick breeding function switch of alarm source makes according to the warning information of the alarm parameter structure Can, then carry out quick breeding processing;
The IAS systems determine that alarm source fast mapping functional switch makes according to the warning information of the alarm parameter structure Can, then carry out fast mapping processing;Or
The IAS systems determine that the quick binding function switch of alarm source makes according to the warning information of the alarm parameter structure Can, then carry out quick binding processing.
Preferably, the IAS systems, which carry out being switched fast processing, includes:
The IAS systems search protecting tunnel group or quick heavy-route (FRR) handover information according to the alarm level, And carry out corresponding protecting tunnel or FRR hand-off process.
Preferably, the IAS systems progress fast mapping processing includes:
The IAS systems determine access link (AC) side failure, then are mapped to pseudo-wire (PW) side, and trigger PW FRR protections Switching.
Preferably, the quick binding processing of the IAS systems progress includes:
The IAS systems are detected by the OAM that entrance is specified and are made by static Operation Administration and Maintenance (OAM) binding configuration It links for trigger event to trigger the OAM detections that outlet is specified.
An embodiment of the present invention provides a kind of linkage support (IAS) system, which includes:
Receiving module, for receiving the warning information of input;
Conversion module, the warning information for being received the receiving module according to preset alarm representation method turn It is melted into unified alarm parameter structure;
Trigger module is detected, for the warning information of the alarm parameter structure inspection being converted to according to the conversion module Network failure is surveyed, triggers network protection.
Preferably, the preset alarm represents that IAS includes alarm source, alarm status, alarm level and alarm object ginseng Number.
Preferably, the detection trigger module, is specifically used for:
The flag set of IAS cross-lines card broadcast is determined according to the warning information of the alarm parameter structure, then is alerted this Information carries out the broadcast of IAS cross-lines card;
It determines that alarm source rapid switching function switch is enabled according to the warning information of the alarm parameter structure, then carries out fast Fast hand-off process;
It determines that the quick breeding function switch of alarm source is enabled according to the warning information of the alarm parameter structure, then carries out fast Fast breeding processing;
It determines that alarm source fast mapping functional switch enables according to the warning information of the alarm parameter structure, then carries out fast Fast mapping processing;Or
It determines that the quick binding function switch of alarm source is enabled according to the warning information of the alarm parameter structure, then carries out fast Fast binding processing.
Preferably, the detection trigger module carries out being switched fast processing, is specifically used for:
Protecting tunnel group or quick heavy-route (FRR) handover information are searched according to the alarm level, and carried out corresponding Protecting tunnel or FRR hand-off process;Or
The detection trigger module carries out fast mapping processing, is specifically used for:
It determines access link (AC) side failure, is mapped to pseudo-wire (PW) side, and trigger PW FRR protection switchings;Or
The detection trigger module carries out quick binding processing, is specifically used for:
By static Operation Administration and Maintenance (OAM) binding configuration, by the OAM detections that entrance is specified as trigger event Lai The OAM detections that triggering outlet is specified link.
Above-mentioned IAS systems as a bed courses between detection and protection, protection and detection are distinguished completely, reduced Coupling between the two.
Description of the drawings
Fig. 1 detects deployment diagram for existing network different level;
Fig. 2 detects and protects binding schematic diagram for existing network different level;
Fig. 3 is the flow chart of processing method embodiment that the present invention alerts;
Fig. 4 is IAS fast mappings (mapping) application of function schematic diagram of a scenario of the present invention;
Fig. 5 is the quick binding function application scenarios schematic diagrams of IAS of the present invention;
Fig. 6 is the structure diagram of IAS system embodiments of the present invention.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention Embodiment be described in detail.It should be noted that in the absence of conflict, in the embodiment and embodiment in the application Feature mutually can arbitrarily combine.
An embodiment of the present invention provides a kind of processing method of alarm and linkage support (InterAction Support, IAS) system, IAS systems are a bed courses between various detection of connectivity agreements and application services module.The announcement of various detections It is alert, for example, the LOC alarms of TMPLS OAM, session failure (down) alarm of BFD, the distal end loss alarm of CFM etc., input To IAS, these alarms are handled by IAS, each application services module is then forwarded to after processing and is handled, application herein Business has very much, such as the switching of protecting tunnel group, FRR switchings, OAM mappings (mapping), OAM breedings, OAM bindings (binding) linkage etc..
The powerful OAM(Operation Administration Maintenance) of PTN network is exactly to require network that can be quickly detected failure, trigger protection after breaking down It switches, it is desirable that the performance of handoffs of network is less than 50ms, and IAS is even more important other than as the bed course between detection and business The reason is that in the distributed apparatus of PTN network, the IAS alarms that response detection generates at the first time, realization is switched fast, reaches To the purpose of quick protection network, the performance of handoffs of network is made to be less than 50ms, when network disposes a large number of services, switching It can be also not a halfpenny the worse.
The processing method of alarm provided in an embodiment of the present invention includes:
Step 1: linkage support (IAS) system receives the warning information of input;
Step 2: the warning information is converted to unified announcement by the IAS systems according to preset alarm representation method Alert argument structure;
IAS should have a kind of unified alarm representation method as all systems for alerting and being uniformly processed, first IAS, both All features of an alarm can be described, while to the newly-increased of other follow-up alarms and are easy to extend.IAS provides a kind of as a result, Unified alarm representation method come describe one alarm essential characteristic.
The alarm representation method mainly usually describes an alarm using following member:
1) alarm source IAS_SOURCE represents the type or alarm event of detection of connectivity agreement, for example alarm source can It is expressed as:
IAS_SOURCE_TMPLSOAM represents the LOC alarms of TMPLS OAM protocol detections;
IAS_SOURCE_BFD represents the session down alarms of BFD protocol detections;
IAS_SOURCE_CFM represents that alarm is lost in the distal end of CFM protocol detections;
IAS_SOURCE_PHYDOWN represents physical port down alarms;
IAS_SOURCE_CARD_EVENT represents offline of line card event alarm;
Here line card (Line card) represents PTN device, such as the visit of interchanger, router or other network equipments Ask a kind of equipment interface between circuit and access equipment.Number and simulation line card with a variety of rates, may serve to connect Cable or fibre circuit.Digital line card is mainly that data network provides data packet forwarding, ping response and packet fragmentation etc. Function.Heretofore described line card refers mainly to the interface card in PTN distribution switch equipment.
2) alarm status IAS_ALARM_STATE, represents the state of alarm, and alarm status mainly has:
IAS_ALARM_STATE_DOWN:Represent that detection loss of connectivity alarm generates;
IAS_ALARM_STATE_UP:Represent detection loss of connectivity alarm clearance.
3) level is alerted, the detection level of alarm is represented, referring to Fig. 2, alarm level can be divided into:
L2LINK_LEVEL:This layer of main detection object is physical port;
L3LINK_LEVEL:This layer of main detection object is three layers of outgoing interface and next-hop ip address;
LSP_LEVEL:The LSP paths of LSP or RSVP that this layer of main detection object is LDP;
TUNNEL_LEVEL:This layer of main detection object is tunnel;
PW_LEVEL:This layer of main detection object is pseudo-wire;
PEER_LEVEL:This layer of main detection object is peer IP address.
4) alarm object parameter represents the object entity of various detection protocol detections, each level is protected based on front OAM The detection object entity of OAM detections all in PTN network can be summarized as by the description of the basic element of detection:
GlobalPort:Corresponding L2LINK_LEVEL, detects two layers of physical port;
VlanId:Corresponding L2LINK_LEVEL detects the ID marks of VLAN;
OutIndex:Corresponding L3LINK_LEVEL detects the index of three layers of outgoing interface;
NextHop:Corresponding L3LINK_LEVEL, detects next-hop ip address;
LspOutLabel:Corresponding LSP_LEVEL detects the outgoing label of LSP;
LspId:Corresponding LSP_LEVEL detects the ID marks of LSP;
TunnelId:Corresponding TUNNEL_LEVEL detects the ID marks in tunnel;
PwId:Corresponding PW_LEVEL detects the ID marks of pseudo-wire;
PeerAddress:Corresponding PEER_LEVEL detects the IP address of peer equipment.
Alarm the representation method unified IAS, mainly by above-mentioned alarm source, alarm status, alarm level and alarm object 4 part of parameter forms, which can represent alarm or the equipment of all detection of connectivity protocol detection Some alarm events, durability is good, is easy to various alarm extensions.It, will be various by IAS after a variety of different alarms input to IAS Different alarms is converted into the unified alarms of IAS and represents structure, then carries out various processing to alarm;
Step 3: the IAS systems detect network failure according to the warning information of the alarm parameter structure, network is triggered Protection.
The step includes:The IAS systems determine that IAS cross-lines card is broadcasted according to the warning information of the alarm parameter structure Flag set, then the warning information is subjected to the broadcast of IAS cross-lines cards;The IAS systems are according to the alarm parameter structure Warning information determines that alarm source rapid switching function switch is enabled, then carries out being switched fast processing;The IAS systems are according to The warning information of alarm parameter structure determines that the quick breeding function switch of alarm source is enabled, then carries out quick breeding processing;It is described IAS systems determine that alarm source fast mapping functional switch enables according to the warning information of the alarm parameter structure, then carry out fast Fast mapping processing;Alternatively, the IAS systems determine that alarm source quickly binds work(according to the warning information of the alarm parameter structure It can switch and enable, then carry out quick binding processing.
Above-mentioned IAS systems, including being switched fast, quickly breeding, fast m apping, quick binding, alarm cross-line card are broadcasted Etc. functions, main purpose be when network failure, can the various alarms of quick response, trigger network protection, make the switching of network 50ms can be met.Various alarms are all after detection failure generates, just to input to IAS at the first time, then IAS carries out protection switching Processing when network configuration large capacity applied business, is alerted after the quick processing of IAS various performances optimization, performance of handoffs also milli It is in no way inferior, meet the requirement of large capacity carrier ethernet protective value, so IAS is also believed to protect switching treatable System.
As shown in figure 3, for the flow chart of processing method embodiment that the present invention alerts, which includes:
Step 301, alarm input;
Alarm inputs to IAS, and for sender, some essential informations that filling is needed to alert are including alarm source, alarm It is no that IAS is needed to carry out cross-line card broadcast flag and alarm specifying information, if for example, thering are TMPLS OAM alarms to need to input to IAS, alarm source can be expressed as IAS_SOURCE_TMPLSOAM, the specifying information of alarm, for example be that TMP layers of detection can be taken Tunnel ID with detection, meanwhile, the flag set that IAS whether is needed to carry out cross-line card broadcast can will be alerted, represent the alarm IAS is needed to carry out cross-line card broadcast;
Whether alarm here needs IAS to carry out cross-line card broadcast flag, is mainly based upon the spy of PTN distributed apparatus Point consider, for distributed apparatus, the module usually detected, as TMPLS OAM, BFD due to hardware resource limit, detection it is hard Part resource is only distributed on a line card, then, the alarm of detection also only can have the line card of hardware resource (commonly referred to as in this block The source line card of detection) on generate, the protection being usually configured generally has a list item in all line cards, such as protecting tunnel group, tunnel The list item of pipe protection group all has in all line cards, but needs to pay close attention to customer instance port during general test performance Line card where (Customer Instance Port, CIP), because flow walks CIP, if the protection of line card is cut where CIP Change if not coming into force, will occur this flow cutout, so detection source line card generate alarm, need alarm notification to Other line cards, other line cards are also required to trigger protection switching after receiving alarm.Alert broadcast can guarantee certainly to all line cards Line card where CIP also receives warning information and switches over.
In usually realizing, different alarm sources wants trigger protection to switch, and is required for alarm cross-line card broadcast a set of in this way Mechanism, in this case just redundance unavoidably, is also required in addition be further added by mechanism a set of in this way, no when increasing a kind of alarm newly Good extension multiplexing.Because IAS is the system that is uniformly processed of alarm, at the same IAS all alarms be all integrated into one it is unified Alarm represents structure, as long as so IAS realizes alarm cross-line card broadcast mechanism, other have newly-increased alarm that can all answer With.
When alarm inputs to IAS, if the alarm needs IAS to carry out cross-line card broadcast, as long as cross-line card will be alerted Broadcast flag set, if it is not needed, can not set.
After step 302, alarm input to IAS, IAS carries out some simple Effective judgements to alarm first, for example accuses Whether alert state is correct, and whether physical port, tunnel ID of alarm etc. are effective etc., some illegal invalid inputs are carried out Filtering;
After step 303, alarm Effective judgement, IAS is according to the unified representation method alerted, by the various alarms of input The unified alarm parameter structures of IAS are converted to, after being converted into unified alarm parameter structure, in all processing procedures of IAS systems, Unify alarm parameter structure using this and carry out various processing;
Step 304, the Slurry pump based on aforementioned IAS alarm cross-line card broadcast flags, IAS are judged in alarm sender Alarm whether need the mark that IAS cross-lines card is broadcasted, if the flag set, which is subjected to the broadcast of IAS cross-lines cards, If the no set of the mark, IAS does not carry out the alarm cross-line card broadcast, other line cards receive the announcement after the broadcast of cross-line card Police is also required to carry out various hand-off process;
Step 305, alarm input to IAS, and main purpose is exactly trigger protection switching, if alarm source is switched fast work( Can switch it is enabled, then carry out IAS and be switched fast processing, whether alarm source rapid switching function here, which switchs to open to order, matches Put it is specified, according to user need can make the rapid switching function of IAS that can be cut according to alarm source, IAS others functions also have Corresponding order configuration switch, is also based on this consideration;
IAS rapid switching functions, mainly according to the level of alarm, lookup is effectively protected resource information, and notice corresponds to Protection mechanism triggering switching, after IAS will alert unified representation, various protection mechanisms have been indifferent to the detection source of alarm, root According to level (alarm level uniquely corresponds to the detection object entity of alarm) trigger protection switching of alarm, reference can be made to shown in Fig. 2, example Such as, if alarm is tunnel level, for detection, the alarm source of detection can be the TMP layers detection of TMPLS OAM, either Tunnel BFD are detected, and the object entity of two kinds of detection method detections is tunnel, and essence is detection tunnel failure, and for protecting Shield, the failure of tunnel level can be switched over configured tunneling technique protection group, as long as tunnel failure, just trigger protection switches, for Alarm source is without being concerned about.
If the quick breeding function switch of step 306, alarm source is enabled, carrying out IAS, quickly breeding is handled, and IAS is quick It is the alarm of service layer to breed major function, notifies that, to client layer, client layer generates service layer's fault alarm, while client layer Trigger protection switches;
For TMPLS OAM, if TMS layers generate alarm, at TMP layers without configuration detection of connectivity (Continuity And Connectivity Check, CCCV) under conditions of (if TMP layers have configuration detect, do not need to breed, by detecting Carry out trigger protection switching), TMS layers of alarm needs to be advertised to TMP layers, and TMP layers generate service layer's failure (SSF) alarm, simultaneously TMP layers if there is configured tunneling technique protection group, then need to carry out protecting tunnel group switching.TMP layers to TMC layers of breeding function with TMS layers to TMP layers of breeding function is similar, if TMP layers generate alarm, under conditions of TMC layers of no configuration CCCV (if TMC layers have configuration to detect, then do not need to breed, and are switched by detecting come trigger protection), while situation about can not be protected at TMP layers Under (TMP layers do not have protecting tunnel group protect or protecting tunnel group active/standby tunnel fail), need to TMC layer breeding, TMC layers SSF alarms are generated, while TMC layers are protected if there is FRR is configured, then carry out FRR protection switchings, FRR protections here can make The VPN FRR protections of two layers of either three layers of PW FRR protections.
Breeding function so that in the case where client layer does not play detection, if service layer fails, client layer also can be normal Trigger protection switches.
If step 307, alarm source fast m apping functional switches enable, IAS fast m apping processing is carried out, IAS fast m apping functions are mainly that access link (AC) side failure is mapped to PW sides, then trigger PW FRR protections and cut It changes, service traffics is protected not interrupt;
The schematic diagram of IAS fast m apping functions is as shown in figure 4, AC1 failures (down), PE2 perceive AC1down, pass through PW1 sends mapping message to PE1, and PE1 receives mapping message (representing AC1 failures), then triggers PW FRR switchings, stream Amount is switched to from main PW1 on standby PW2.
Notice is sent there are mainly two types of the modes of mapping messages in PE2 equipment, and one kind is that TMPLSOAM sends client's letter Number failure (Client Signal Fault, CSF) message mode, it is a kind of be BFD send diagnostic sampling word set CV messages side Formula.If the mapping modes of TMPLS OAM are configured, when AC sides failure generates, PE2 equipment periodics send CSF message, opposite end PE1 equipment receives CSF message, triggering PW FRR switchings, and during the fault recovery of AC sides, PE2 equipment stops sending CSF message, PE1 Equipment does not receive CSF message in 3 times of sending cycle time intervals of CSF message, then it is assumed that fault recovery, triggering PW FRR are returned It cuts.If what is be configured is the mapping modes of BFD, when AC sides failure generates, PE2 equipment sends the CV messages of diagnostic sampling word set, Wherein for diagnostic sampling word reversely to fail for 8 expression AC sides to failure, diagnostic sampling word before 6 expression AC sides, diagnostic sampling word represents AC sides pair for 14 To failure, opposite end PE1 equipment receives the BFD CV messages of diagnostic sampling word set, triggering PWFRR switchings, when the fault recovery of AC sides When, PE2 equipment sends the CV messages that diagnostic sampling word is 0, and PE1 equipment receives the CV messages that diagnostic sampling word is 0, then it is assumed that failure is extensive It is multiple, trigger PW FRR switchbacks.
If the quick binding function switch of step 308, alarm source is enabled, carrying out IAS, quickly binding is handled, and IAS is quick Binding major function is that, by static OAM binding configuration technologies, the OAM detections specified by entrance (ingress) are as triggering Event links to trigger the OAM detections specified another outlet (egress).The inspection of the ingress and egress of configuration Many kinds can be included by surveying, for example the technology detected can be TMPLS OAM, BFD, CFM, MPLS OAM, port events etc., Different bind commands is configured, can be applicable in different networking scenes, the work that trigger protection is switched during playing network failure With.For example the basic functional principle of bright binding function, Fig. 5 are a kind of networking scenes of binding function application below, and PE2 is set Standby AC sides configuration CFM detections, PW sides configuration TMC detections, while bind command ingress is configured and is detected for CFM, egress is TMC is detected, and when AC sides CFM detects failure, by the bind command being configured, directly linkage to TMC, the detection of TMC is also set to Failure, opposite end PE1 equipment also perceive TMC failures, triggering PW FRR protection switchings at once.
All it is to reflect AC sides failure as binding function plays the role of with mapping functions under this networking scene PW sides are mapped to, triggering PW FRR switch, unlike, mapping functions are the binding functions by way of message interaction notice It is the mode that static configuration directly links, certainly, the application scenarios of binding function are far above this one kind, and the configuration of bind command is very Flexibly, it can be applied to the network failure protection in a variety of network environments.
In conclusion the major function that the processing method of above-mentioned alarm provides includes rapid switching function, quickly breeds work( Energy, fast m apping functions, quick binding function, alarm cross-line card broadcast capability etc., these functions are mainly used in different groups In net scene, after network failure, protection network is played rapidly in the alarm of energy quick response detection, trigger protection switching Purpose.
As shown in fig. 6, the structure diagram for IAS system embodiments of the present invention, the IAS systems include receiving module 61, Conversion module 62 and detection trigger module 63, wherein:
Receiving module, for receiving the warning information of input;
Conversion module, the warning information for being received the receiving module according to preset alarm representation method turn It is melted into unified alarm parameter structure;
Trigger module is detected, for the warning information of the alarm parameter structure inspection being converted to according to the conversion module Network failure is surveyed, triggers network protection.
Wherein, the preset alarm represents that IAS includes alarm source, alarm status, alarm level and alarm object parameter.
Preferably, the detection trigger module, is specifically used for:
The flag set of IAS cross-lines card broadcast is determined according to the warning information of the alarm parameter structure, then is alerted this Information carries out the broadcast of IAS cross-lines card;
It determines that alarm source rapid switching function switch is enabled according to the warning information of the alarm parameter structure, then carries out fast Fast hand-off process;
It determines that the quick breeding function switch of alarm source is enabled according to the warning information of the alarm parameter structure, then carries out fast Fast breeding processing;
It determines that alarm source fast mapping functional switch enables according to the warning information of the alarm parameter structure, then carries out fast Fast mapping processing;Or
It determines that the quick binding function switch of alarm source is enabled according to the warning information of the alarm parameter structure, then carries out fast Fast binding processing.
Further, the detection trigger module carries out being switched fast processing, is specifically used for:It is looked into according to the alarm level Protecting tunnel group is looked for either various FRR handover informations and to carry out corresponding protecting tunnel or FRR hand-off process.The detection Trigger module carries out fast mapping processing, is specifically used for:It determines AC sides failure, is mapped to pseudo-wire (PW) side, and trigger PW FRR Protection switching.The detection trigger module carries out quick binding processing, is specifically used for:Pass through static Operation Administration and Maintenance (OAM) binding configuration, the OAM detections specified by entrance link as trigger event to trigger the OAM detections that outlet is specified.
The process that above-mentioned IAS systems carry out alarming processing can be found in Fig. 3, and details are not described herein again.
Above-mentioned IAS systems as a bed courses between detection and protection, protection and detection are distinguished completely, reduced Coupling between the two.In addition, IAS is uniformly processed as a complete alarm and performance optimization system, the work(provided Energy application scenarios range is wide, and what is more important protects wanting for performance of handoffs after meeting different network environment lower network failures It asks, plays an important role in the protection switching of PTN network, there is good application prospect.
One of ordinary skill in the art will appreciate that all or part of step in the above method can be instructed by program Related hardware is completed, and above procedure can be stored in computer readable storage medium, such as read-only memory, disk or CD Deng.Optionally, all or part of step of above-described embodiment can also be realized using one or more integrated circuits.Accordingly Ground, the form that hardware may be used in each module/unit in above-described embodiment are realized, can also use the shape of software function module Formula is realized.The present invention is not limited to the combinations of the hardware and software of any particular form.
The above embodiments are merely illustrative of the technical solutions of the present invention and it is unrestricted, reference only to preferred embodiment to this hair It is bright to be described in detail.It will be understood by those of ordinary skill in the art that it can modify to technical scheme of the present invention Or equivalent replacement, without departing from the spirit and scope of technical solution of the present invention, the claim model in the present invention should all be covered In enclosing.

Claims (4)

1. a kind of processing method of alarm, which is characterized in that this method includes:
Linkage support IAS systems receive the warning information of input;
The warning information is converted to unified alarm parameter structure by the IAS systems according to preset alarm representation method; The preset alarm representation method includes alarm source, alarm status, alarm level and alarm object parameter;Wherein, alarm pair As parameter, the object entity of various detection protocol detections is represented;
The IAS systems detect network failure according to the warning information of the alarm parameter structure, trigger network protection;
The IAS systems detect network failure according to the warning information of the alarm parameter structure, trigger network protection, including:
The IAS systems determine that alarm source rapid switching function switch is enabled according to the warning information of the alarm parameter structure, It then carries out being switched fast processing;
The IAS systems, which carry out being switched fast processing, to be included:
The IAS systems search protecting tunnel group or quick heavy-route FRR handover informations according to the alarm level, and carry out Corresponding protecting tunnel or FRR hand-off process.
2. according to the method described in claim 1, it is characterized in that:
The IAS systems detect network failure according to the warning information of the alarm parameter structure, trigger network protection, including:
The IAS systems determine the flag set of IAS cross-lines card broadcast according to the warning information of the alarm parameter structure, then will The warning information carries out the broadcast of IAS cross-lines card;
The IAS systems determine that the quick breeding function switch of alarm source is enabled according to the warning information of the alarm parameter structure, Then carry out quick breeding processing;
The IAS systems determine that alarm source fast mapping functional switch enables according to the warning information of the alarm parameter structure, Then carry out fast mapping processing;Or
The IAS systems determine that the quick binding function switch of alarm source is enabled according to the warning information of the alarm parameter structure, Then carry out quick binding processing;
The IAS systems carry out quick breeding processing and include:
The alarm of service layer is notified that, to client layer, client layer generates service layer's fault alarm, while client by the IAS systems Layer trigger protection switching;
The IAS systems carry out fast mapping processing and include:
The IAS systems determine access link AC sides failure, then are mapped to pseudo-wire PW sides, and trigger PW FRR protection switchings;
The IAS systems carry out quick binding processing and include:
The IAS systems are by static Operation Administration and Maintenance OAM binding configurations, and the OAM detections specified by entrance are as triggering Event links to trigger the OAM detections that outlet is specified.
3. a kind of linkage support IAS systems, which is characterized in that the IAS systems include:
Receiving module, for receiving the warning information of input;
Conversion module, for being converted to the warning information that the receiving module receives according to preset alarm representation method Unified alarm parameter structure;The preset alarm represents that IAS includes alarm source, alarm status, alarm level and alarm pair As parameter;Wherein, alarm object parameter represents the object entity of various detection protocol detections;
Trigger module is detected, the warning information of the alarm parameter structure for being converted to according to the conversion module detects net Network failure triggers network protection;
The detection trigger module, is specifically used for:
It determines that alarm source rapid switching function switch is enabled according to the warning information of the alarm parameter structure, is then quickly cut Change processing;
The detection trigger module carries out being switched fast processing, is specifically used for:
Protecting tunnel group or quick heavy-route FRR handover informations are searched, and carry out corresponding tunnel according to the alarm level Protection or FRR hand-off process.
4. IAS systems according to claim 3, it is characterised in that:
The detection trigger module, is specifically used for:
The flag set of IAS cross-lines card broadcast is determined according to the warning information of the alarm parameter structure, then by the warning information Carry out the broadcast of IAS cross-lines card;
It determines that the quick breeding function switch of alarm source is enabled according to the warning information of the alarm parameter structure, then carries out quick numerous Grow processing;
It determines that alarm source fast mapping functional switch enables according to the warning information of the alarm parameter structure, is then quickly reflected Penetrate processing;Or
It determines that the quick binding function switch of alarm source is enabled according to the warning information of the alarm parameter structure, is then quickly tied up Fixed processing;
The detection trigger module carries out quick breeding processing, is specifically used for:
By the alarm of service layer, notify that client layer generates service layer's fault alarm, while client layer trigger protection is cut to client layer It changes;
The detection trigger module carries out fast mapping processing, is specifically used for:
It determines access link AC sides failure, is mapped to pseudo-wire PW sides, and trigger PW FRR protection switchings;Or
The detection trigger module carries out quick binding processing, is specifically used for:
By static Operation Administration and Maintenance OAM binding configurations, the OAM specified by entrance is detected to be triggered out as trigger event The OAM detections that mouth is specified link.
CN201210011192.7A 2012-01-13 2012-01-13 The processing method of alarm and linkage support system Active CN103209085B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210011192.7A CN103209085B (en) 2012-01-13 2012-01-13 The processing method of alarm and linkage support system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210011192.7A CN103209085B (en) 2012-01-13 2012-01-13 The processing method of alarm and linkage support system

Publications (2)

Publication Number Publication Date
CN103209085A CN103209085A (en) 2013-07-17
CN103209085B true CN103209085B (en) 2018-06-12

Family

ID=48756177

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210011192.7A Active CN103209085B (en) 2012-01-13 2012-01-13 The processing method of alarm and linkage support system

Country Status (1)

Country Link
CN (1) CN103209085B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106992873B (en) * 2016-01-21 2020-03-17 中兴通讯股份有限公司 Protection group processing method and device

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1713588A (en) * 2004-06-15 2005-12-28 华为技术有限公司 Alarm data process and its processor in network system
CN101039222A (en) * 2007-04-25 2007-09-19 华为技术有限公司 Warning information transmission method, apparatus and network equipment
CN101631040A (en) * 2009-08-24 2010-01-20 国家计算机网络与信息安全管理中心 Real-time monitoring warning system and method of unified management multi-business system
CN101640619A (en) * 2009-08-24 2010-02-03 中兴通讯股份有限公司 Virtual leased line network service protection method and operator edge device
CN101778112A (en) * 2010-01-29 2010-07-14 中国科学院软件研究所 Network attack detection method
CN101834773A (en) * 2010-03-30 2010-09-15 中兴通讯股份有限公司 Protection method and system of virtual private LAN (Local Area Network) service (VPLS)
CN101908981A (en) * 2010-09-03 2010-12-08 烽火通信科技股份有限公司 Method for shielding and uniformly processing alarm and performance data
CN102136949A (en) * 2011-03-24 2011-07-27 国网电力科学研究院 Method and system for analyzing alarm correlation based on network and time

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007101140A2 (en) * 2006-02-24 2007-09-07 Nortel Networks Ltd. Multi-protocol support over ethernet packet-switched networks

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1713588A (en) * 2004-06-15 2005-12-28 华为技术有限公司 Alarm data process and its processor in network system
CN101039222A (en) * 2007-04-25 2007-09-19 华为技术有限公司 Warning information transmission method, apparatus and network equipment
CN101631040A (en) * 2009-08-24 2010-01-20 国家计算机网络与信息安全管理中心 Real-time monitoring warning system and method of unified management multi-business system
CN101640619A (en) * 2009-08-24 2010-02-03 中兴通讯股份有限公司 Virtual leased line network service protection method and operator edge device
CN101778112A (en) * 2010-01-29 2010-07-14 中国科学院软件研究所 Network attack detection method
CN101834773A (en) * 2010-03-30 2010-09-15 中兴通讯股份有限公司 Protection method and system of virtual private LAN (Local Area Network) service (VPLS)
CN101908981A (en) * 2010-09-03 2010-12-08 烽火通信科技股份有限公司 Method for shielding and uniformly processing alarm and performance data
CN102136949A (en) * 2011-03-24 2011-07-27 国网电力科学研究院 Method and system for analyzing alarm correlation based on network and time

Also Published As

Publication number Publication date
CN103209085A (en) 2013-07-17

Similar Documents

Publication Publication Date Title
US9692637B2 (en) Fault protection method and fault protection apparatus in a multi-domain network
US9237032B2 (en) Method, system, and device for forwarding data frames
CA2568219C (en) Method and devices for implementing group protection in mpls network
CN104539443A (en) Communicating network path and status information in multi-homed networks
CN102349277B (en) The intrusion detection of virtual two layers of service
CN101999224A (en) Redundant Ethernet automatic protection switching access to virtual private lan services
CN101710877A (en) Method, device and system for processing traffic flow based on pseudowire
CN101924654A (en) Point-to-multipoint service-based path switching method and system
CN102820990A (en) Method and device for switching service protection
WO2018095095A1 (en) Method and apparatus for establishing disjoint path
CN105634935A (en) Device and method for detecting service layer signal failure
CN102468977A (en) Packet transport network (PTN) protection method and device
CN104702431B (en) A kind of method and device of Virtual Private Network double break protection
CN111447095A (en) Bidirectional forwarding detection switching method, bidirectional forwarding detection module and edge device
JP5989911B2 (en) Method and apparatus for protecting service traffic
WO2016090815A1 (en) Switching control method and device in deploying high-capacity service
CN110290017A (en) Malfunctioning node localization method and PE equipment
CN103209085B (en) The processing method of alarm and linkage support system
WO2011147298A1 (en) Method and apparatus for resetting layer 3 virtual private network routes
KR101566139B1 (en) Pseudowire extended group messaging in a packet switched network
US9806937B2 (en) Protection method and system for multi-domain network, and node
CN108924046B (en) Method and system for protecting GRE tunnel bearing service
KR20140138816A (en) Pseudowire groups in a packet switched network
Litkowski et al. Operational Management of Loop-Free Alternates
CN103609066B (en) Method and node for querying operation administration maintenance configuration information

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant