Packet transport network (PTN) protection method and device
A technology of packet transmission network and protection device, applied in the field of communication, can solve problems such as technical solutions for protection of UNI side and PE nodes without PTN network, and achieve the effect of improving network security and stability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0022] Example 1
[0023] figure 1 It is a preferred flowchart of a method for protecting a packet transport network according to an embodiment of the present invention, which includes the following steps:
[0024] S102: Detect whether the main PW fails through the operation management and maintenance OAM information of the main pseudowire PW currently carrying the service;
[0025] S104: If a failure occurs, switch the service from the primary PW to the backup PW.
[0026] In this preferred embodiment, TMC (T-MPLS Channel) channel layer protection (PW protection) is used to implement dual-homing to the PTN network. PW protection refers to providing a backup PW for a particular PW. When the PW occurs In the event of a failure, the service can be quickly switched to the standby PW. By switching the service on the failed primary pseudo wire (Pseudo Wire, PW) to the backup pseudo wire, the problem that the UNI side and the PE node of the PTN network cannot be protected in the prior art ...
Example Embodiment
[0034] Example 2
[0035] figure 2 It is a schematic diagram of a dual-homing network with PTN with linear protection according to an embodiment of the present invention. Dual-homing (Dual Homing) is a network topology in which a device uses an independent access point (attachment point). ) Is connected to the network. In addition, one access point is the main connection and the other is the backup connection, which is activated in the case of the main connection failure.
[0036] in figure 2 Among them, path 1 is the main PW channel, path 2 is the backup PW channel, and path 3 is the protection path of the main PW. Different PWs can be used to carry services in different situations. For example, you can refer to the following table to select PWs that carry services:
[0037] Table 1 PWs carrying services in different states of active and standby PWs
[0038]
[0039] In this preferred embodiment, a linear protection method is adopted. Specifically, the PTN-based service protectio...
Example Embodiment
[0046] Example 3
[0047] image 3 It is a schematic diagram of dual-homing networking of PTN without linear protection according to an embodiment of the present invention. image 3 Among them, path 1 is the main PW channel, and path 2 is the backup PW channel.
[0048] In this preferred embodiment, a non-linear protection method is adopted. Specifically, the PTN-based service protection method in various situations includes the following steps:
[0049] S1: Establish a two-way PW connection channel between PE node A and PE node D (passing P node B), and take path 1; establish a backup two-way PW connection channel between PE node A and PE node E (passing P node C), take path 2;
[0050] S2: When path 1, path 2, UNI 1, and UNI 2 are all normal, the service takes path 1 inside the PTN;
[0051] S3: When UNI 1 or PE node D fails, or path 1 fails, the primary PW is in SF, and the service is poured onto the backup PW, using paths 2 and UNI 2;
[0052] S4: When UNI 2 fails, PE node E fails,...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap