Method for realizing L2TP user access backup and network system

A technology for accessing networks and users, which is applied in the field of data communication, and can solve problems such as complex implementation, not supporting L2TP user access backup, etc.

Active Publication Date: 2014-08-20
ZTE CORP
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The existing technology does not support the access backup of L2TP users, because the management of L2TP users exists on both the LAC and the LNS, and there are L2TP tunnels and L2TP sessions between the LAC and the LNS. If L2TP user backup between devices is to be supported, Factors such as LAC, LNS, L2TP tunnel, and L2TP session must be considered, and the implementation is relatively complicated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing L2TP user access backup and network system
  • Method for realizing L2TP user access backup and network system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0075] The BFD protocol is used to detect the link status between the two LAC devices, and VRRP is used to switch the active and standby status of the LAC device to realize L2TP user backup. This method implements L2TP user access backup. Among them, LAC1 is the active device, and LAC2 is the backup device.

[0076] Step A1, establishing a TCP (Transmission Control Protocol, Transmission Control Protocol) connection between LAC1 and LAC2 as a message channel for backing up online L2TP user information and corresponding L2TP tunnel information and L2TP session information;

[0077] Step B1, running the BFD protocol on the active and standby LAC devices respectively to detect the network connectivity between the active and standby LAC devices, between the LAC1 device and the lower network, and between the LAC2 device and the lower network;

[0078] Step C1, run VRRP between LAC1 and LAC2, and associate with the corresponding downlink state;

[0079] Step D1, configure LAC2 on ...

Embodiment 2

[0086]The BFD protocol is used to detect the link state between two LAC devices, and the LAC device state is switched by VRRP to realize L2TP user backup. The HELLO message of the switched LAC is generated according to the backup Ns and Nr information to realize the L2TP user Access backup. Among them, LAC1 is the active device, and LAC2 is the backup device.

[0087] Step A2, establish a TCP connection between LAC1 and LAC2 as a message channel to back up the information of the online L2TP user and the corresponding L2TP tunnel information, L2TP session information, and the Ns and Ns of the HELLO message sent by each L2TP tunnel LAC1 Nr information;

[0088] Step B2, running the BFD protocol on the active and standby LAC devices respectively to detect the network connectivity between the active and standby LAC devices, between the LAC1 device and the lower network, and between the LAC2 device and the lower network;

[0089] Step C2, run VRRP2 between LAC1 and LAC2, and asso...

Embodiment 3

[0097] Three LAC devices, among which LAC1 and LAC2 are the main devices, and LAC3 is the backup device. The Ethernet OAM protocol mechanism is run between LAC1 and LAC3, and between LAC2 and LAC3 for link status detection. At the same time, VRRP (Virtual Router Redundancy Protocol, Virtual Router Redundancy Protocol) performs LAC device state switching, realizing the function of using one LAC device to back up L2TP users for multiple LAC devices.

[0098] Step A3, establishing a TCP connection between LAC1 and LAC3, and between LAC2 and LAC3 as a message channel for backing up online L2TP user information and corresponding L2TP tunnel information and L2TP session information;

[0099] Step B3, respectively run the Ethernet OAM protocol on the three LAC devices to detect connections between LAC1 and LAC3, between LAC2 and LAC3, between LAC1 and the lower network, between LAC2 and the lower network, and between LAC3 and the lower network network connectivity;

[0100] Step C3,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method and network system for implementing L2TP user access backup provided by the present invention are applied to a system in which users connect to LAC devices through the access network and then connect to LNS devices through L2TP tunnels, including: the main LAC device and the backup A message channel is established between the LAC devices, and the L2TP access information on the active LAC device is backed up to the standby LAC device; when a fault is detected on the active LAC device or the downlink of the active LAC device Perform active-standby switchover with the standby LAC device; the standby LAC device publishes a route carrying the address of the LAC end of the L2TP tunnel to the upper-layer network, and publishes a port switching message to the lower-layer network, forwards the user's uplink traffic to the LNS device through the L2TP tunnel according to the backup information, and Send the user downlink traffic sent by the LNS device through the L2TP tunnel to the lower network. According to the present invention, real-time backup of L2TP users across LAC devices can be realized, and uninterrupted transmission of user services can be realized in the case of failure of LAC nodes or downlinks.

Description

technical field [0001] The invention relates to the field of data communication, in particular to a method and network system for realizing L2TP user access backup. Background technique [0002] As the number of broadband users accessed by SN (Service Node, service node) is increasing, broadband users have higher and higher requirements for broadband reliability. Therefore, operators require more and more access to user backup. higher. [0003] The existing user backup technology is dual-machine hot backup. This technology enables AN (Access Node, access node) to use dual uplinks to access dual SNs. One SN is the active device and the other SN is the backup device. The access port of the SN and the backup port of the backup SN are in one-to-one correspondence, and the primary and backup SNs use VRRP (Virtual Router Redundancy Protocol, virtual router redundancy protocol) and BFD (Bidirectional Forwarding Detection, bidirectional forwarding detection) technology to switch st...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/46H04L12/70H04L12/26H04L12/24H04L45/24
Inventor 袁博范亮
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products