Supercharge Your Innovation With Domain-Expert AI Agents!

Network protection method and device, and primary convergence network element in network

A technology for protecting devices and network elements, applied in the field of communications, can solve problems such as service flow interruption and failure to achieve linkage protection in networking, and achieve the effect of avoiding service flow interruption

Inactive Publication Date: 2016-02-03
ZTE CORP
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The main technical problem to be solved by the present invention is to provide a network protection method, device, and convergent active network element in the network, so as to solve the problem of service flow interruption caused by the lack of linkage protection in the existing network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network protection method and device, and primary convergence network element in network
  • Network protection method and device, and primary convergence network element in network
  • Network protection method and device, and primary convergence network element in network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] Please refer to figure 1 As shown, the networking in this embodiment includes a first network layer and a second network layer, a first network element and a second network element respectively located in the first network layer and the second network layer, and a network element located in the first network layer and the second network layer The aggregation main NE and the aggregation standby NE at the convergence point of the second network layer; the link connecting the first NE and the aggregation main NE is the main link of the first network layer; the second NE and the aggregation main NE The link connected by the network element is the active link of the second network layer; the link connecting the first network element and the converged standby network element is the standby link of the first network layer; the second network element and the converged standby network element The connected link is the backup link of the second network layer; the link connecting ...

Embodiment 2

[0066] The networking provided by this embodiment is the same as figure 1 As shown; this embodiment also provides a network protection device, please refer to Figure 4 As shown, including the fault detection module and the first link switching module:

[0067] The failure detection module is used to detect whether the active link of one of the network layers in the two network layers and the aggregation link fail simultaneously, and if so, notify the first link switching module; in this embodiment, the failure detection module includes The message detection submodule is used to detect whether the state detection message sent by the network element in one of the network layers in the two network layers can only be received normally; The link and the aggregated link fail simultaneously.

[0068] The first link switching module is used to trigger a network element in another network layer where the active link has not failed to switch from the active link in the network layer ...

Embodiment 3

[0075] This example provides figure 1 The convergent main network element in the shown network includes a memory and a processor; the memory is used to store instructions; the processor is used to call the instructions to execute the steps shown in the first embodiment. In the following, the first network layer is the three-layer virtual private network layer (L3VPN, LayerThreeVirtualPrivateNetwork), the first network element is the core layer network element; the second network layer is the two-layer virtual private network layer, namely (L2VPN, LayerTwoVirtualPrivateNetwork) networking , and the second NE is an access layer NE as an example. For details, see Figure 5 shown. In this embodiment, link switching is realized by L3VPNFRR (fast rerouting, FastReRoute) in L3VPN, and the corresponding state detection message is a BFD (BidirectionalForwardingDetection, bidirectional forwarding detection) message; The corresponding state detection message is a CCM (Continuity check ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network protection method, a network protection device, and a primary convergence network element in the network. The network comprises a first network layer, a second network layer and a convergence layer positioned between the first and second network layers; when it is detected that both the primary link of one of the two network layers and a convergence link between the primary network element and the secondary network element in the convergence layer are failed, the network element in the other network layer of which the primary link is not failed is triggered to be switched from the primary link to the secondary link of the network layer, and thereby the linkage protection of the network is achieved, and the business flow is prevented from being interrupted.

Description

technical field [0001] The present invention relates to the communication field, in particular to a network protection method and device, and a main convergence network element in the network. Background technique [0002] The current MPLS-TP (based on "Multi-Protocol Label Switching" connection-oriented packet switching network technology, Multi-ProtocolLabelSwitching-TransportProfile) carrying LTE (Long Term Evolution, Long Term Evolution) solution uses L2VPN (Layer Two Virtual Private Network, LayerTwoVirtualPrivateNetwork) + L3VPN ( Three-layer virtual private network (LayerThreeVirtualPrivateNetwork) networking, that is, the Line (linear) networking technology is still used at the network access layer, the Line service at the access layer is terminated at the aggregation layer, and the L2VPN to L3VPN is completed inside the aggregation node. Bridging, entering the L3VPN processing and forwarding to the network core layer. In terms of end-to-end network protection, for ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/46H04L12/26H04L12/24
CPCH04L41/00
Inventor 李瑛瑾
Owner ZTE CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More