Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for migrating business tunnel

A technology for migrating systems and services, applied in the field of communication, can solve problems such as service tunnel service interruption, achieve the effect of improving security and reducing the risk of service interruption

Inactive Publication Date: 2015-11-25
ZTE CORP
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The main technical problem to be solved by the present invention is to provide a service tunnel migration method and system to solve the problem in the prior art that the service tunnel fails to migrate in or out of the shared ring interruption problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for migrating business tunnel
  • Method and system for migrating business tunnel
  • Method and system for migrating business tunnel

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] This embodiment provides a service tunnel migration method, please refer to figure 1 ,include:

[0032] Step S101: Determine whether the service tunnel to be migrated into or out of the shared ring has been configured with a protection tunnel, if not, execute step S102, and if yes, execute step S103.

[0033] Step S102: Configure a protection tunnel for the service tunnel.

[0034] Step S103: Switch the service carried on the service tunnel to the protection tunnel.

[0035] Step S104: Migrate the service tunnel into or out of the shared ring.

[0036] Step S105: Switch the service carried on the protection tunnel to the service tunnel.

Embodiment 2

[0039] This embodiment provides a method for migrating a service tunnel to a shared ring. For details, see figure 2 ,include:

[0040]Step S201: Determine whether the service tunnel to be migrated into the shared ring has been configured with a protection tunnel, if not, execute step S202, and if yes, execute step S203.

[0041] Step S202: Configure a protection tunnel for the service tunnel.

[0042] Step S203: Switch the service carried on the service tunnel to the protection tunnel.

[0043] Step S204: Migrate the service tunnel into the shared ring.

[0044] Step S205: Switch the service carried on the protection tunnel to the service tunnel.

[0045] Before step S201, the method may further include: filtering out service tunnels in the entire network that can be migrated into the shared ring according to the target shared ring, and adding them as service tunnels to be migrated into the queue of service tunnels to be migrated into the shared ring. In this way, batch m...

Embodiment 3

[0051] In order to describe the method for migrating business tunnels to the shared ring in batches mentioned in the second embodiment in more detail, this embodiment provides a method for migrating business tunnels to the shared ring in batches, see image 3 , the method includes the following steps:

[0052] Step S301: start.

[0053] Step S302: Select a target shared ring. The target shared ring is a configured or existing shared ring.

[0054] Step S303: According to the target shared ring, filter out all service tunnels in the entire network that can migrate into the target shared ring.

[0055] Step S304: Select the service tunnels that need to be migrated into the target shared ring according to the engineering application requirements, and add them to the queue of service tunnels to be migrated into the shared ring.

[0056] Step S305: Check the i-th service tunnel in the queue of service tunnels to be migrated into the shared ring. The i starts from 1, indicating ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a service tunnel migration method and system. The service tunnel migration method comprises: determining whether a service tunnel to be migrated into or out of a shared ring is configured with a protection tunnel, and if not, configuring a protection tunnel for the service tunnel; switching a service borne on the service tunnel to the protection tunnel; migrating the service tunnel into or out of the shared ring; and switching the service borne on the protection tunnel to the service tunnel. In the method provided in the present invention, by configuring a protection tunnel for a service tunnel to be migrated into or out of a shared ring, switching a service borne on the service tunnel to the protection tunnel before migrating the service tunnel into or out of the shared ring, and switching the service to the service tunnel again after migrating the service tunnel into or out of the shared ring, it is ensured that the operation of migrating the service tunnel into or out of the shared ring does not affect the service, and the service is not interrupted even if the migration of the service tunnel into or out of the shared ring fails, so that operation security is improved.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a service tunnel migration method and system. Background technique [0002] At present, when deploying ring network protection in the project, two single-ring protection methods, Wrapping (ring same) and steering (source control) of the G.8132 standard, are adopted. Each protected LSP (LabelSwitchingPath, label switching path) All have a closed protection ring, which has the problems of heavy configuration workload, many switching actions, and long switching time, and even cannot meet the requirements of 50ms carrier-class protection switching. Therefore, in practical applications, ring network protection is not really used, and the protection subnet is deployed through linear protection. However, linear protection has certain disadvantages. , may not be protected. [0003] The proposal of the shared environmental protection scheme just solved the above problems....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L12/26
CPCH04L41/34
Inventor 焦向丽杨刚刚喻红杨红霞耿丹
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products