Unlock instant, AI-driven research and patent intelligence for your innovation.

Protecting method, device and system of packet network

A packet network and node technology, applied in the field of communications, can solve the problems of slow switching speed, limited protection capability, and difficulty in meeting high-reliability business requirements, and achieve the effect of fast protection action and protection.

Active Publication Date: 2013-06-12
HUAWEI TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] In the process of realizing the present invention, the inventor found that the existing technical solutions have the following problems: the existing protection mechanism can only provide full-range 1:1 protection or 1+1 protection, and its protection capability is limited
image 3 In the "1:1" protection method shown, when AC3 fails, it needs to notify the edge device PE1 at the remote end of the network to perform PW switching. The switching speed is slow, and it is difficult to meet the service requirements of high reliability.
Figure 4 The disadvantage of the "1+1" protection scheme is that each circuit service must be protected by 1+1 from the source to the sink; and the bandwidth occupation of the entire network is twice the actual bandwidth of the service flow, which is a serious waste of network resources; The cost of operating the network is too high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protecting method, device and system of packet network
  • Protecting method, device and system of packet network
  • Protecting method, device and system of packet network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] This embodiment provides a packet network protection method and system. Figure 5 It is a schematic diagram of a packet protection system in this embodiment, and the system adopts a single-ended dual-homing protection form. Figure 6 It is a schematic diagram of another protection system in this embodiment, and the system adopts a double-terminal double-homing protection form. Dual-homing protection means that a CE is dual-homed to two PEs on the MPLS network through two ACs. Single-ended dual-homing means that only CEs at one end of the network are dual-homed to a PE dual-homing node group; dual-ended dual-homing means that CEs at both ends of the network are dual-homed to different PE dual-homing node groups at the same time.

[0040] To implement fast protection switching and isolate faults between different networks, establish at least one direct PW for each service between two PEs in a dual-homing node group, such as Figure 6 D-PW1 and D-PW2 in , are used to pro...

Embodiment 2

[0059] This embodiment provides a method and system for protecting a packet network. The architecture of the packet network can be referred to Figure 6 . The method includes: when a node of the dual-homing node group detects that the working service pseudo-wire connected to it fails, it notifies another node of the dual-homing node group through the direct-connection pseudo-wire; The peer node of the pseudowire sends a protection switching message to switch service data from the working service pseudowire to the protection service pseudowire.

[0060] For two pseudowires with the same source and same destination, this embodiment can extend the APS (Automatic Protection Switching, Automatic Protection Switching) protocol defined by ITU-T to coordinate two PWs to perform 1+1 protection and 1:1 protection. For MPLS network, this kind of APS message can be used as the same channel signaling of pseudowire, encapsulated after PW label or special GAL label and ACH header, and its m...

Embodiment 3

[0068] This embodiment provides a method for implementing a dual-homing node group in a packet network. In this method, the dual-homing node group includes two nodes, and the two nodes are connected through at least one direct path, and each node includes a bridge and a node. Selector. The bridge receives service data through the ingress port, and the selector sends the service data through the egress port.

[0069] The bridge can choose to bridge the service data to the selector of this node, or bridge the service data to another node in the dual-homing node group through a direct connection path, or bridge the service data to the selector of this node and another node at the same time. node, or discard received service data. The selector can choose to receive the service data from the bridge of this node, or receive the service data from another node, or can choose not to receive the service data.

[0070] The packet network in this embodiment may be a multi-protocol label...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a protecting method of a packet network. The packet network comprises client edge equipment and supplier edge equipment, wherein the client edge equipment is connected to first supplier edge equipment through a first connected circuit and connected to second supplier edge equipment through a second connected circuit; and two sets of supplier edge equipmentare connected through a directly-connected path. The method comprises the following steps of: receiving service data by the first supplier edge equipment through the packet network; copying the service data into two parts by the first supplier edge equipment; transmitting the first part of service data to the client edge equipment through the first connected circuit; forwarding the other part of service data to the second supplier edge equipment through the directly-connected path; and transmitting the service data to the client edge equipment through the second connected circuit.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method, device and system for protecting a packet network. Background technique [0002] At present, IP / MPLS (Multi-Protocol Label Switching, Multi-Protocol Label Switching) technology has been widely deployed in the core network. Both traditional fixed network telecommunication services (such as voice) and mobile network services are increasingly transferred to PSN (Packet Switching Network, packet switching network) based on it. [0003] According to PWE3 (Pseudo Wire Emulation Edge-to-Edge, end-to-end pseudowire emulation) technology, whether it is TDM (Time Division Multiplex, time division multiplexing), SDH (Synchronous Digital Hierarchy, synchronous digital system) / SONET (Synchronous Optical Network, optical fiber synchronous network), frame relay and other traditional telecommunication services are still Ethernet services widely used in local area networks, an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/24H04L12/711H04L45/247
Inventor 江元龙刘峰黎锋张海燕
Owner HUAWEI TECH CO LTD