Virtual-private-network-based multi-instance Ethernet ring protection switching method

A technology of virtual private network and protection switching, which is applied in the directions of network interconnection, data exchange network, and data exchange through path configuration. Problems such as logical port protection and inability to provide VPN service group protection

Inactive Publication Date: 2012-01-04
杭州依赛通信有限公司
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 3. Single instance - a physical port can only be on one ring instance
[0007] 1. For the physical topology, it cannot provide the protection of the logical topology of the virtual private network service;
[000

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual-private-network-based multi-instance Ethernet ring protection switching method
  • Virtual-private-network-based multi-instance Ethernet ring protection switching method
  • Virtual-private-network-based multi-instance Ethernet ring protection switching method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] Method of the present invention, concrete steps are as follows:

[0049] (1) The specific steps for creating an Ethernet ring network protection instance based on a virtual private network:

[0050] (1.1) Create an Ethernet ring network protection instance 1 on each node on the ring. This instance includes 2 ring ports, wherein instance 1 of a certain node is designated as the RPL owner node, and a certain ring port is an RPL link;

[0051] (1.2) Create an Ethernet ring network protection instance 2 on each node on the ring. This instance contains 2 ring ports, which are the same as the ring ports of instance 1. Instance 2 of a certain node is designated as the RPL owner node. A ring port is an RPL link;

[0052] (2) Specific steps of mapping from a virtual private network service group to an Ethernet ring network protection instance:

[0053] (2.1) Map virtual private network service group 1 (this service group includes 1-100 altogether 100 virtual private network se...

example 2

[0054] (2.2) mapping virtual private network service group 2 (this service group includes 100 virtual private network services of 101-200) to instance 2;

[0055] (3) Concrete steps for controlling the mapping of virtual private network services to Ethernet ring network instances:

[0056] (3.1) Create and control virtual private network service 1, and then map the service to instance 1;

[0057] (3.2) Create a control virtual private network service 2, and then map the service to instance 2.

[0058] like figure 1 , figure 2 , image 3 , Figure 4 As shown, the basic idea of ​​the standard Ethernet ring protection protocol is to use a specific link to protect the entire ring. We call this link a Ring Protection Link (RPL). like figure 1 As shown in the case of Ethernet ring network protection under normal conditions, if other links on the ring are not faulty, this link is responsible for blocking the service flow to prevent the occurrence of loops. The special networ...

Embodiment 2

[0066] For shared virtual private network services of logical tangent rings, such as Image 6 As shown, this embodiment provides a solution. At the tangent node, the virtual private network service is mapped to multiple ring instances, and different logical ports of the virtual private network service are on different logical rings, and are affected by different ring instances control.

[0067] This embodiment includes the following steps:

[0068] (1) Create instance 1 on nodes 1, 2, and 3, including ring ports ge-bs / 1 and ge-bs / 2;

[0069] (2) Map virtual private network service group 1 (including 1-100, a total of 100 services) to instance 1;

[0070] (3) Create control virtual private network service 1 on nodes 1, 2, and 3 and map it to instance 1;

[0071] (4) Create instance 2 on nodes 3, 4, and 5, where nodes 4, 5 contain ring ports ge-bs / 1 and ge-bs / 2, and node 3 contains ring ports ge-bs / 3, ge- bs / 4;

[0072] (5) Map virtual private network group 1 (including 1-1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a virtual-private-network-based multi-instance Ethernet ring protection switching method, which comprises the following steps of: (1) creating virtual-private-network-based Ethernet ring protection instances; (2) mapping virtual private network service groups to the Ethernet ring protection instances; and (3) mapping control virtual private network services to the Ethernet ring protection instances. The method has the advantages of: 1, the basis of a virtual private network, namely independent protection switching control is performed on logical rings formed by different virtual private network services; 2, a plurality of instances, namely a plurality of ring instances can be created according to different virtual private network service groups at an identical physical port; 3, the virtual private network service groups, namely the virtual private network services with the same logical topology form a group, and the virtual private network service groups can be mapped into one or more ring instances; and 4, the control virtual private network services, namely private Ethernet ring protection switching control channels are provided the protection switching control over the ring instances.

Description

technical field [0001] The present invention relates to a protection switching method of an Ethernet ring network, and more specifically relates to a protection switching method of a multi-instance Ethernet ring network based on a virtual private network. Background technique [0002] The existing Ethernet ring network protection switching method has the following characteristics: [0003] 1. Based on physical topology - protection switching for physical ring topology; [0004] 2. Based on the physical port - perform protection switching on the physical port; [0005] 3. Single instance—one physical port can only be on one ring instance. [0006] There is following shortcoming in the method of present technology: [0007] 1. For the physical topology, it cannot provide the protection of the logical topology of the virtual private network service; [0008] 2. For physical ports, it cannot provide protection for logical ports in virtual private network services; [0009] ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/437H04L12/46H04L12/24
Inventor 廉峰峰丁洪金恩江朱娟萍
Owner 杭州依赛通信有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products