Unlock instant, AI-driven research and patent intelligence for your innovation.

Pseudo wire protection method, pseudo wire protection device and node

A pseudo-wire and head node technology, applied in digital transmission systems, data exchange networks, electrical components, etc., can solve the problems of occupying additional system resources and long detection time of pseudo-wire switching protection mechanism, reducing detection time and improving resources. The effect of utilization

Inactive Publication Date: 2015-07-29
ZTE CORP
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The main technical problem to be solved by the present invention is to provide a pseudo-wire protection method, device and node to solve the problems that the existing pseudo-wire switching protection mechanism takes a long time to detect and needs to occupy additional resources of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Pseudo wire protection method, pseudo wire protection device and node
  • Pseudo wire protection method, pseudo wire protection device and node
  • Pseudo wire protection method, pseudo wire protection device and node

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] IETF RFC4553 and IETF RFC5086 respectively define methods for encapsulating unstructured and structured time-division multiplexing signals into pseudowire packet-switched networks; and the specification defines the definition of each bit of the control word in detail. Such as figure 1 and figure 2 Shown: figure 1 The unstructured emulation mode control word format is shown, figure 2Shown is the structured emulation mode control word format. Among them, IETF RFC4553 and IETF RFC5086 stipulate that when the access side of the end node of the service path fails, when the end node of the current service path performs pseudowire encapsulation, the payload of the pseudowire message is set to all 1s, and the The head node is sent after the L bit position is 1; when the pseudowire path from the head node to the tail node fails, IETF RFC4553 and IETF RFC5086 stipulate that when the tail node of the current service path is performing pseudowire encapsulation, the R bit posit...

Embodiment 2

[0059] This embodiment provides a pseudowire protection device, please refer to Figure 4 As shown, including detection module and pseudo wire protection switching module:

[0060] The detection module is used to monitor the reception of pseudowire messages by the head node on the main pseudowire path. The main pseudowire path in this embodiment is the current working pseudowire path, that is, the current service path.

[0061] The pseudo-wire protection switching module is used to judge whether to perform the active-standby switching operation of the pseudo-wire according to the monitoring result of the detection module.

[0062] For details, please see Figure 5 and Figure 6 As shown, the detection module in this embodiment includes a pseudowire packet detection submodule; the pseudowire protection switching module includes a judgment submodule and a switching execution submodule; the pseudowire packet detection submodule is used to detect the head node at a preset time ...

Embodiment 3

[0070] This embodiment also provides a node, which is used as a head node, and specifically a dual-homing node, which includes a memory and a processor, the memory is used to store at least a program module, and the processor is used to execute according to at least one of the program modules The following steps:

[0071] Monitoring the reception of pseudowire messages by nodes on the main pseudowire path, where the main pseudowire path is the current working pseudowire path;

[0072] According to the monitoring results, it is judged whether to perform the active-standby switchover operation of the pseudo-wire. This step specifically includes:

[0073] When the monitoring result is that the head node does not receive the pseudowire message within the preset time threshold, the active / standby switching operation of the pseudowire is performed; otherwise, it is judged whether to The active / standby switchover operation of the pseudowire is required. Specifically, when the monit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed are a pseudo wire (PW) protection method, device and node, the method comprising: monitoring a head node receiving PW packets on a master PW path, the master PW path being a current working PW path; and directly determining whether it is necessary to perform a master / slave PW switchover operation according to the monitoring result. The present invention can detect the PW status without being based on OAM and BFD, thus reducing the detection time required for the switchover protection mechanism, and does not require additional use of system resources, thus improving resource utilization.

Description

technical field [0001] The invention relates to a pseudowire protection method, device and node. Background technique [0002] In PTN (Packet Transport Network) network, PW (Pseudo Wire, Pseudo Wire) protection supports PW-level protection of the same source but different sinks or the same source and same sink, and starts the switching action based on the status detection of the working and protecting PWs . The existing methods all need to detect the PW status based on OAM (Operation Administration and Maintenance) or BFD (Bidirectional Forwarding Detection). In order to ensure the detection reliability, according to ITU-T Y The definitions in the .1731 standard and the BFD technical white paper need to be determined after at least 3.5 detection cycles. For the system, additional resources need to be occupied to process OAM or BFD packets, which also affects switching performance. It can be seen that the detection time required by the existing PW guaranteed switching prot...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L12/26
CPCH04L45/68H04L45/28
Inventor 李旭何忠勇
Owner ZTE CORP