Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for combining protection tunnels

A technology for protecting tunnels and tunnels, applied in the field of communication, can solve problems such as tunnel vibration, insufficient bandwidth, and occupation, and achieve the effects of reducing CPU load, improving bandwidth utilization, and improving system performance

Active Publication Date: 2021-12-14
FENGHUO COMM SCI & TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, when there is a large-scale main tunnel and a Bypass tunnel is automatically created at the same time, the short-term continuous sending of RSVP (ResourceReservation Protocol) packets will cause CPU (Central Processing Unit / Processor, central processing unit) load and even tunnel vibration. And the repeated creation of Bypasstunnel with the same path will result in the failure to share bandwidth resources
At the same time, because each bypass tunnel occupies a part of the bandwidth, a certain main tunnel may require a large protection bandwidth, and the bypass tunnel cannot be successfully created, or it can only provide protection as much as possible. When the main tunnel is switched to the bypass tunnel, it must be Will lose data due to insufficient bandwidth

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for combining protection tunnels
  • Method and system for combining protection tunnels
  • Method and system for combining protection tunnels

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] see figure 1 As shown, the embodiment of the present invention provides a method for merging protection tunnels, which includes the steps of:

[0041] S1. Obtain the outbound interface index of the local restoration node PLR ​​and the node address of the convergence node MP as the key value of the red-black tree, and create a protection tunnel red-black tree. Wherein, the PLR ​​outbound interface index is the interface index value of the outbound interface address of the PLR.

[0042] S2. Create protection tunnels corresponding to the above key values, and bind the protection tunnels to all primary tunnels that meet the protection conditions and have not been bound to protection tunnels.

[0043] The protected conditions are as follows: the outbound interface of the protection tunnel is different from the outbound interface of the main tunnel in the PLR, the destination address of the protection tunnel is the node address of the main tunnel MP, and the intermediate nod...

Embodiment 2

[0055] On the basis of Embodiment 1, in this embodiment, when a new primary tunnel is created, the outgoing interface index of the new primary tunnel PLR and the node address of the MP are obtained as new key values, and then the red-black tree is traversed. When the above new key value does not exist in the black tree, it is necessary to insert the new key value into the red-black tree, and create a protection tunnel corresponding to the new key value.

[0056] After the protection tunnel corresponding to the new key value is created, actively query all the main tunnels that need to be protected, that is, all the main tunnels that meet the protection conditions and have not been bound to the protection tunnel, and bind them to the protection tunnel. The protected conditions are: the outbound interface of the protection tunnel is different from the outbound interface of the main tunnel in the PLR, the destination address of the protection tunnel is the node address of the main ...

Embodiment 3

[0061] On the basis of Embodiment 1, in this embodiment, the protection tunnel is a link protection tunnel, and the MP is the next-hop NHOP of the PLR, that is, the protection tunnel protects the link between the PLR ​​and the NHOP. When this link In case of failure, traffic can be switched to the protection tunnel.

[0062] see figure 2 As shown, the primary LSP is R1→R2→R3→R4, the PLR ​​is R2, and the protection tunnel R2→R6→R3 can protect the link R2→R3. Obtaining the node address of NHOP node R3 specifically includes:

[0063] First, from the RRO object information of the RESV message, find the first address that does not belong to R2, that is, the interface address or node address of the NHOP node R3; use the interface address or node address of R3 as the destination address, and initiate a path calculation request.

[0064] Then, according to the collected topological structure of the entire network, use the constrained shortest path first algorithm CSPF (Constrained ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and system for merging protection tunnels, which relate to the field of communication technology. The method includes the steps of: acquiring the local repair node PLR ​​outgoing interface index and the node address of the convergence node MP as the key value of the red-black tree, and creating the protection tunnel Red-black tree; create a protection tunnel corresponding to the key value, and bind the protection tunnel to all the main tunnels that meet the protected conditions and have not been bound to the protection tunnel; regularly traverse the red-black tree to find the same path and unused To protect the tunnel, one of the tunnels is reserved, and the key value corresponding to the unreserved tunnel is removed from the red-black tree and the tunnel is deleted, and the reserved tunnel is bound to the main tunnel of the unreserved tunnel. In the method for merging protection tunnels of the present invention, by creating a protection tunnel red-black tree, only one protection tunnel needs to be created to protect multiple main tunnels, and through regular deletion, protection tunnels with the same path can be merged to improve bandwidth utilization, Reduce waste of resources.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method and system for merging protection tunnels. Background technique [0002] In MPLS TE (Multi-Protocol Label Switching Traffic Engineering, Multi-Protocol Label Switching Traffic Engineering) network, if a link or node device passing by an LSP (Label Switch Path, Label Switching Path) fails, Auto TE FRR can be used (Auto Traffic-eng Fast Reroute, traffic engineering automatic fast rerouting) technology for partial protection. When the main LSP needs to be protected, a protection tunnel (Bypass tunnel, also known as a bypass tunnel) can be automatically created to protect the LSP on each node or link that may fail, without manual configuration by personnel, and the LSP can be completed within 50ms Converge quickly within . [0003] However, when there is a large-scale main tunnel and a Bypass tunnel is automatically created at the same time, the short-term continuou...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/703H04L12/723H04L12/733H04L12/751H04L45/28H04L45/02H04L45/122H04L45/50
CPCH04L45/50H04L45/02H04L45/20H04L45/28
Inventor 刘雪黄雷周芬林
Owner FENGHUO COMM SCI & TECH CO LTD