Unlock instant, AI-driven research and patent intelligence for your innovation.

BFD message structure, detection method and device based on mpls-tp linear protection

A linear protection and detection method technology, applied in the field of communication, to achieve the effect of fast path connectivity check

Active Publication Date: 2021-03-02
BEIJING TELIXIN ELECTRONICS TECH
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the difference between this technical standard and MPLS, it is not accepted by IETF and traditional router manufacturers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • BFD message structure, detection method and device based on mpls-tp linear protection
  • BFD message structure, detection method and device based on mpls-tp linear protection
  • BFD message structure, detection method and device based on mpls-tp linear protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] Such as figure 2 As shown, a BFD packet structure based on MPLS-TP linear protection, the authentication method includes: Ethernet packet header; MPLS packet header, whose label value is the primary tunnel label or standby tunnel of the MPLS-TP linear protection group Label; IP packet header, whose source IP address is NODE_ID of the local MEG, and destination IP address 127 / 24; UDP packet header, whose destination port number is the standard BFD port number, marked as a BFD control packet; and , BFD control packet content.

[0029] During specific operations, the length of the Ethernet message header can be 14 bytes; the length of the MPLS message header can be 4 bytes; the length of the IP message header can be 20 bytes, and / or, The UDP message header may be 8 bytes. The BFD message is a standard IP message (not the GAL+ACH+BFD control message format with double labels used by the IETF standard), the BFD control message is carried in UDP, and the destination port n...

Embodiment 2

[0032] Such as image 3 As shown, a BFD detection method based on MPLS-TP linear protection includes:

[0033] First, configure static parameters of BFD on the MEP of the device;

[0034] Secondly, send the BFD configuration parameters to the FPGA, and complete the encapsulation and sending and receiving of the BFD message in the FPGA;

[0035] Then, the encapsulated BFD performs label forwarding along the tunnel path of MPLS-TP;

[0036] Thirdly, according to whether the BFD message is sent and received normally, corresponding detection determines whether the tunnel path of the MPLS-TP is normal or abnormal.

[0037] During specific operations, the static parameters include at least one of the following parameters: a local identifier, a remote identifier, a minimum packet sending interval, a minimum packet receiving interval, and a detection multiple of the BFD session. The minimum packet sending interval is 3.3ms, and / or, the detection multiple is 3. The FPGA is used as th...

Embodiment 3

[0046] Such as Figure 4 As shown, another BFD detection method based on MPLS-TP linear protection includes:

[0047] Step 1: The device supports configuring BFD sessions on MEPs under the ITU-T MPLS-TP standard, and configure static parameters of BFD on the MEPs of the device to support the creation of BFD sessions between MEGs; the static parameters include local identifiers, Remote identification, minimum packet receiving interval, minimum packet sending interval, detection multiple, etc.;

[0048] Step 2: The software checks the BFD configuration parameters and stores the BFD session information at the protocol layer;

[0049] Step 3: Whether the MPLS-TP tunnel that BFD needs to detect is normal, and whether the BFD parameters are reasonable;

[0050] Step 4: The MPLS-TP tunnel is normal and the BFD parameters are reasonable, then the detection and binding relationship between the BFD session and the MPLS-TP tunnel is completed;

[0051] Step 5: Start the encapsulation ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a BFD message structure, detection method and detection device based on MPLS-TP linear protection. The BFD message structure includes: Ethernet message header; MPLS message header, whose label value is MPLS-TP linear protection primary tunnel label or standby tunnel label of the group; IP packet header, whose source IP address is the NODE_ID of the local MEG, destination IP address 127 / 24; UDP packet header, whose destination port number is the standard BFD port number, It is marked as a BFD control message; and, the content of the BFD control message. The implementation of the present invention extends the BFD technology to the MPLS-TP linear protection scenario formulated by ITU-T, and provides fast path connectivity check for the linear protection.

Description

technical field [0001] The present invention relates to the communication field, in particular to a BFD (Bidirectional Forwarding Detection, bidirectional forwarding detection) message structure, detection method and device based on MPLS-TP (Multiprotocol Label Switching transport profile, multi-protocol label switching-transmission application) linear protection. Background technique [0002] MPLS-TP technology is used in packet transport network to provide greater data service capacity for the network. The ITU-T organization released the MPLS-TP technical standard and the linear protection protocol standard (ITU-T G.8131 / Y.1382) with the G series standard, which uses the CCM in ITU-T Y.1731 ( Continuity check message, connectivity detection message) is used as a detection mechanism for linear protection active and standby channel switching. Due to the difference between this technical standard and MPLS, it is not accepted by IETF and traditional router manufacturers. [...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/711H04L12/723H04L12/46H04L45/247H04L45/50
CPCH04L12/4633H04L45/22H04L45/50
Inventor 赵彦奇
Owner BEIJING TELIXIN ELECTRONICS TECH