Supercharge Your Innovation With Domain-Expert AI Agents!

Implementation method and device of point-to-multipoint pseudowire protective network

An implementation method and network technology, applied in the field of communication, to achieve the effect of improving stability and security

Inactive Publication Date: 2012-12-19
ZTE CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, there is no relevant technology to realize the protection of the egress PE of the P2MP PW

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation method and device of point-to-multipoint pseudowire protective network
  • Implementation method and device of point-to-multipoint pseudowire protective network
  • Implementation method and device of point-to-multipoint pseudowire protective network

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0089] The ingress PE determines the egress PE connected to the same CE, and divides these PEs into the egress PE on the active P2MP PW and the egress PE on the standby P2MP PW, and establishes the active P2MP PW and the standby P2MP PW respectively according to the above grouping.

[0090] Image 6 It is a flow chart of a method for implementing egress PE protection of a P2MP PW in Example 1 according to an embodiment of the present invention, as shown in Image 6 As shown, the method includes the following steps S601 to S607:

[0091] In step S601, the ingress PE is configured with AII; the egress PE connected to the same CE is configured with the same AII.

[0092] for Figure 4 In the protection network shown, PE1 is the ingress PE, and the carrier edge devices PE2, PE3, PE4, and PE5 are egress PEs. AII11 is configured on PE1, AII21 is configured on PE4 and PE2, and AII31 is configured on PE3 and PE5.

[0093] In step S602, AII information is advertised through protocol...

example 2

[0107] After the active and standby P2MP PWs are established, when the active P2MP PW fails, the data flow is switched to the standby P2MP PW.

[0108] Figure 7 It is a flow chart of the realization method of the egress PE protection of the P2MP PW in Example 2 according to the embodiment of the present invention, as shown in Figure 7 As shown, the method includes the following steps S701 to S702:

[0109] In step S701, the ingress PE detects that the egress PE of the active P2MP PW fails.

[0110] Figure 5 is a schematic diagram of failure of the primary P2MP PW egress PE according to an embodiment of the present invention, for Figure 5 In the protection network shown in the figure, PE1 can detect that PE2 or PE3 is faulty through P2MP BFD.

[0111] In step S702, the data flow is switched to the standby P2MP PW, and the active P2MP PW no longer forwards the data flow.

[0112] for Figure 5 In the protection network shown in the figure, when PE1 detects a fault in e...

example 3

[0114] When the failure of the active P2MP PW recovers, the data flow is switched to the original active P2MP PW.

[0115] Figure 8 It is a flow chart of the realization method of the egress PE protection of the P2MP PW in Example 3 according to the embodiment of the present invention, as shown in Figure 8 As shown, the method includes the following steps S801 to S802:

[0116] In step S801, the ingress PE detects that the failure of the egress PE of the active P2MP PW is recovered.

[0117] E.g, Figure 4 The shown P2MP PW egress PE protection network can also be regarded as a schematic diagram after the active P2MP PW egress PE fails and recovers. PE1 can detect the fault recovery of PE2 and PE3 through P2MP BFD.

[0118] In step S802, the data flow is switched back to the original active P2MP PW, and the standby P2MP PW no longer forwards the data flow.

[0119] E.g, Figure 4 The shown P2MP PW egress PE protection network can also be regarded as a schematic diagram...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an implementation method and device of a point-to-multipoint pseudowire (P2MP PW) protective network. The method comprises the following steps: inlet operator peripheral equipment (PE) determines a plurality of outlet PEs connected to the same central equipment (CE) according to a PW routing table; and the inlet PE divides the outlet PEs connected to the same CE into an PEon a primary P2MP PW and outlet PEs on one or a plurality of standby P2MP PWs, and establishes a primary P2MP PW and one or a plurality of standby primary P2MP PWs. The method and device disclosed bythe invention enhance the stability and security of the P2MP PW.

Description

technical field [0001] The present invention relates to the communication field, in particular to a method and device for realizing a point-to-multipoint pseudowire protection network. Background technique [0002] With the development of the Internet Protocol (IP) data network, the IP network itself has strong expandability, upgradeability, compatibility and intercommunication capabilities, while the traditional communication network is limited by the transmission method and the type of business , the flexibility of upgrade, expansion, and intercommunication is relatively poor, and the new network is also poor in commonality, which is not suitable for intercommunication management. Therefore, in the process of upgrading and expanding applications of traditional communication networks, it is worth considering whether to establish duplicate networks or make full use of existing or public resources to upgrade the network and expand applications. How to achieve this goal The p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/56H04L1/22H04L45/28
Inventor 吴波陈然范亮
Owner ZTE CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More