Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Protection method and device for point-to-multipoint pseudowires (P2MP PW)

A pseudowire and multi-point technology, applied in the field of communication, to achieve the effect of improving stability and security

Active Publication Date: 2011-04-27
ZTE CORP
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] However, there is no related technology to realize the dual-homing protection of the egress PE of the P2MP PW

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection method and device for point-to-multipoint pseudowires (P2MP PW)
  • Protection method and device for point-to-multipoint pseudowires (P2MP PW)
  • Protection method and device for point-to-multipoint pseudowires (P2MP PW)

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0118] In this example, the protection of a single-segment P2MP PW is involved. For a single-segment P2MP PW, the ingress PE node is the switching node and also the upstream PE node of the egress PE.

[0119] Figure 11 It is a flow chart of the implementation method of the egress PE protection of P2MP SS-PW in Example 1 according to the embodiment of the present invention, such as Figure 11 As shown, the method includes the following steps S1101 to S1108:

[0120] Step S1101, the egress node configures AII and Priority.

[0121] The NLRI field in the MP_REACH_NLRI and MP_UNREACH_NLRI attributes in BGP UPDATE messages needs to be extended to carry a two-bit priority. Among them, 00 has the highest priority, and the following are 01, 10, and 11 in sequence; see Table 1 for the extension of the NLRI field.

[0122] Dual-homing egress nodes are configured with the same AII but different priorities.

[0123] for Figure 5 In the shown P2MP SS-PW protection network, PE1 is con...

example 2

[0143] This example involves the protection of multi-segment P2MP MS-PW. The upstream node of the egress PE is the switching node. Figure 7 It is a schematic diagram of P2MP MS-PW egress PE protection in Example 2 according to the embodiment of the present invention.

[0144] Figure 12 It is a flow chart of the implementation method of the egress PE protection of the P2MP MS-PW in Example 2 according to the embodiment of the present invention, such as Figure 12 As shown, the method includes the following steps S1201 to S1209:

[0145] Step S1201, the egress node configures AII and Priority.

[0146] It is necessary to expand the NLRI fields in the MP_REACH_NLRI and MP_UNREACH_NLRI attributes in BGP UPDATE messages to carry two bits of priority. Among them, 00 has the highest priority, and the following are 01, 10, and 11 in sequence; for the extension of the NLRI field, see Table 1 .

[0147] Dual-homing egress nodes are configured with the same AII but different prioriti...

example 3

[0168] In this example, the protection of multi-segment P2MP MS-PW is involved, and its network structure is shown in Figure 9 , Figure 9 It is a schematic diagram of P2MP MS-PW egress PE protection in Example 3 according to the embodiment of the present invention.

[0169] Figure 13 It is a flow chart of the implementation method of the egress PE protection of the P2MP MS-PW in Example 3 according to the embodiment of the present invention, such as Figure 13 As shown, the method includes the following steps S1301 to S1311:

[0170] In step S1301, the egress node configures AII and Priority.

[0171] The NLRI fields in the MP_REACH_NLRI and MP_UNREACH_NLRI attributes in BGP UPDATE messages need to be extended so that they carry a two-bit priority, 00 has the highest priority, and the following are 01, 10, and 11 in sequence; see Table 1 for the extension of the NLRI field.

[0172] Dual-homing egress nodes are configured with the same AII but different priorities.

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a protection method and device for point-to-multipoint pseudowires (P2MP PW). The method comprises the following steps: a switching node in a P2MP PW is determined according to a pseudowire PW routing table, and the switching node sets up a main P2MP PW and a spare P2MP PW; and when the main P2MP PW breaks down, a flow path is switched to the spare P2MP PW through the switching node. By the invention, the concrete realization problem of a P2MP PW protection network in related technologies is solved, and the stability and the safety of the P2MP PW are improved.

Description

technical field [0001] The present invention relates to the communication field, in particular to a point-to-multipoint pseudowire protection method and device. Background technique [0002] With the development of the Internet Protocol (IP) data network, the scalability, upgradeability, and compatibility and intercommunication capabilities of the IP network itself are very strong, while the upgrade, expansion, and intercommunication flexibility of the traditional communication network is relatively low. Poor, limited by the way of transmission and the type of business, and the new network is also poor in commonality, and it is not suitable for intercommunication management. Therefore, in the process of upgrading and expanding the application of the traditional communication network, it is worthwhile to build a duplicate network or make full use of existing or public resources to upgrade the network and expand the application. considerations. Pseudo Wire Emulation Edge-to-...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L12/56H04L45/24H04L45/28
Inventor 范亮陈然吴波
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products