Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for protecting intermediate nodes of a multicast label switching path

A technology of label switching paths and intermediate nodes, which is applied in the field of intermediate node protection of multicast label switching paths, can solve the problems of inability to receive multicast traffic and the inability of network reliability to carry real-time services, and achieve the effect of reducing traffic loss.

Active Publication Date: 2017-04-12
ZTE CORP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The failure of an intermediate node or the link failure of an intermediate node to its upstream node will cause all tail nodes rooted at the intermediate node to be unable to receive multicast traffic
Due to the limitations of the implementation principle, the recovery of node failure or link failure depends only on the convergence of the IGP (Interior Gateway Protocol) routing protocol, and the time unit is second level. When an abnormality occurs in the network, the reliability of the entire network cannot meet the needs of carrying real-time services. requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for protecting intermediate nodes of a multicast label switching path
  • A method and device for protecting intermediate nodes of a multicast label switching path
  • A method and device for protecting intermediate nodes of a multicast label switching path

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] In this embodiment, the method of avoiding the protected intermediate nodes in the TNP MLSP path building process adopts LFA (Loopless Alternative Algorithm), which considers making LDP (Label Distribution Protocol) only interact with RIB (Routing Information Base) as much as possible , in order to make the implementation and deployment clearer, it is required that the routing protocol deploys LFA in the entire MLDP network.

[0053] Such as figure 1 As shown, P1-P5 are part of the protected MLSP, among which P3 is the protected intermediate node. P6 and P7 are directly connected to the nodes on the MLSP, but not on the protected MLSP.

[0054] figure 2 It is a flow chart of the MLDP intermediate node protection method in this embodiment, and the method for establishing a TNP MLSP in this embodiment includes the following steps:

[0055] Step 201: configure the MLSP (protected MLSP) that needs to be protected by intermediate nodes when passing through this node on P...

Embodiment 2

[0076] In this embodiment, the method of avoiding the protected intermediate nodes in the TNP MLSP path construction process adopts CSPF (Constrained Shortest Path First), which can form a TNP MLSP tail as far as possible according to the TOP (topology) of the MLDP network where it is located. Constrained path from node to first node.

[0077] Such as figure 1 As shown, P1-P5 are part of the protected MLSP, among which P3 is the protected intermediate node. P6 and P7 are directly connected to the nodes on the MLSP, but not on the protected MLSP.

[0078] image 3 It is a flow chart of the MLDP intermediate node protection method in this embodiment, and the method for establishing a TNP MLSP in this embodiment includes the following steps:

[0079] Step 301: configure the MLSP (protected MLSP) that needs to be protected by intermediate nodes when passing through this node on P3;

[0080] Step 302: P3 searches for the upstream node P2 and downstream nodes P4 and P5 for the c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for protecting an intermediate node of a multicast label switching path. The downstream node of the protected intermediate node is a tail node, and the protected intermediate node is not included in the backup path; when the protected intermediate node or the link from the protected intermediate node to the upstream node fails, the The head node of the backup path switches the traffic sent to the protected intermediate node to the downstream node of the protected intermediate node on the backup path. When the TNP MLSP head node detects that the protected intermediate node fails or the link between the intermediate node and the TNP MLSP head node fails, it can switch the traffic flowing to the protected intermediate node to the TNP MLSP, thereby reducing the number of MPLS groups. The broadcast traffic is lost.

Description

technical field [0001] The invention relates to the field of data network communication, in particular to a method and device for protecting an intermediate node of a multicast label switching path. Background technique [0002] Point to Multi-point LSP (P2MP LSP) and Multi-point to Multi-point Label Switching path (Multi-point to Multi-point LSP, MP2MP LSP), already in VPLS multicast (VirtualPrivate LAN Service Multicast), Layer 3 VPN multicast (Layer 3Virtual Private NetworkMulticast) and point to multipoint pseudowire (Point to Multi-point Pseudowire), as Operator network tunnel (PSN Tunnel) has been widely used, and MLDP mainly establishes P2MP LSP by distributing labels. [0003] In the entire MLDP network topology, the path from the tail node to the first node forms an inverted optimal tree, and each intermediate node is the root of a subtree of the tree. A failure of an intermediate node or a link failure from an intermediate node to its upstream node will cause all...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L12/723H04L12/18H04L45/247H04L45/50
CPCH04L43/0811H04L41/0668H04L41/0663H04L45/22H04L45/28H04L45/50H04L45/16
Inventor 段方红蒋维廉金利忠
Owner ZTE CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More