Implementation method and device of point-to-multipoint pseudowire protective network

An implementation method and network technology, applied in the field of communication, to achieve the effect of improving stability and security

Inactive Publication Date: 2011-05-04
ZTE CORP
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, there is no relevant technology to realize the protection of the egress PE of the P2MP PW

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation method and device of point-to-multipoint pseudowire protective network
  • Implementation method and device of point-to-multipoint pseudowire protective network
  • Implementation method and device of point-to-multipoint pseudowire protective network

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0089] The ingress PE determines the egress PEs connected to the same CE, divides these PEs into the egress PE on the active P2MP PW and the egress PE on the standby P2MP PW, and establishes the active P2MP PW and the standby P2MP PW according to the above grouping.

[0090] Image 6 It is a flowchart of the method for implementing the egress PE protection of P2MP PW in Example 1 of the embodiment of the present invention, such as Image 6 As shown, the method includes the following steps S601 to S607:

[0091] Step S601, the ingress PE is configured with AII; the egress PE connected to the same CE is configured with the same AII.

[0092] for Figure 4 In the protection network shown, PE1 is the ingress PE, the operator's edge devices PE2, PE3, PE4, and PE5 are the egress PEs, AII11 is configured on PE1, AII21 is configured on PE4 and PE2, and AII31 is configured on PE3 and PE5.

[0093] In step S602, the AII information is announced through BGP, OSPF and other protocols.

[0094] for ...

example 2

[0107] After the active and standby P2MP PWs are established, when the active P2MP PW fails, the data stream is switched to the standby P2MP PW.

[0108] Figure 7 It is a flow chart of the method for implementing P2MP PW export PE protection in Example 2 of the embodiment of the present invention, such as Figure 7 As shown, the method includes the following steps S701 to S702:

[0109] In step S701, the ingress PE detects that the egress PE of the primary P2MP PW has a failure.

[0110] Figure 5 It is a schematic diagram of the failure of the main P2MP PW egress PE according to the embodiment of the present invention. Figure 5 In the protection network shown, PE1 can detect that PE2 or PE3 is faulty through P2MP BFD.

[0111] In step S702, the data stream is switched to the backup P2MP PW, and the primary P2MP PW no longer forwards the data stream.

[0112] for Figure 5 In the protection network shown, when PE1 detects a failure in either PE2 or PE3, it will switch the data stream ...

example 3

[0114] When the main P2MP PW fails and recovers, the data stream is switched to the original main P2MPPW.

[0115] Figure 8 It is a flowchart of the method for implementing the egress PE protection of P2MP PW in Example 3 of the embodiment of the present invention, such as Figure 8 As shown, the method includes the following steps S801 to S802:

[0116] In step S801, the ingress PE detects that the egress PE of the primary P2MP PW fails to recover.

[0117] E.g, Figure 4 The shown P2MP PW egress PE protection network can also be seen as a schematic diagram after the main P2MP PW egress PE failure is restored. PE1 can detect the fault recovery of PE2 and PE3 through P2MP BFD.

[0118] In step S802, the data flow is switched back to the original primary P2MP PW, and the backup P2MP PW no longer forwards the data flow.

[0119] E.g, Figure 4 The shown P2MP PW egress PE protection network can also be seen as a schematic diagram after the main P2MP PW egress PE failure is restored. Aft...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an implementation method and device of a point-to-multipoint pseudowire (P2MP PW) protective network. The method comprises the following steps: inlet operator peripheral equipment (PE) determines a plurality of outlet PEs connected to the same central equipment (CE) according to a PW routing table; and the inlet PE divides the outlet PEs connected to the same CE into an PEon a primary P2MP PW and outlet PEs on one or a plurality of standby P2MP PWs, and establishes a primary P2MP PW and one or a plurality of standby primary P2MP PWs. The method and device disclosed bythe invention enhance the stability and security of the P2MP PW.

Description

Technical field [0001] The present invention relates to the field of communication, in particular to a method and device for implementing a point-to-multipoint pseudowire protection network. Background technique [0002] With the development of the Internet Protocol (IP) data network, the IP network itself has strong scalability, upgradeability, and compatibility and interoperability, while the traditional communication network is limited by the transmission method and the type of service , The flexibility of upgrading, expansion, and intercommunication is relatively poor, and the commonality of newly-built networks is also poor, which is not suitable for intercommunication management. Therefore, in the process of upgrading and expanding applications of traditional communication networks, it is worth considering whether to build duplicate networks or make full use of existing or public resources to upgrade the network and expand applications. How can this goal be achieved? The p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/56H04L1/22H04L45/28
Inventor 吴波陈然范亮
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products