Method and system for combining protection tunnels
A technology for protecting tunnels and tunnels, applied in the field of communication, can solve problems such as tunnel vibration, insufficient bandwidth, and occupation, and achieve the effects of reducing CPU load, improving bandwidth utilization, and improving system performance
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0040] see figure 1 As shown, the embodiment of the present invention provides a method for merging protection tunnels, which includes the steps of:
[0041] S1. Obtain the outbound interface index of the local restoration node PLR and the node address of the convergence node MP as the key value of the red-black tree, and create a protection tunnel red-black tree. Wherein, the PLR outbound interface index is the interface index value of the outbound interface address of the PLR.
[0042] S2. Create protection tunnels corresponding to the above key values, and bind the protection tunnels to all primary tunnels that meet the protection conditions and have not been bound to protection tunnels.
[0043] The protected conditions are as follows: the outbound interface of the protection tunnel is different from the outbound interface of the main tunnel in the PLR, the destination address of the protection tunnel is the node address of the main tunnel MP, and the intermediate nod...
Embodiment 2
[0055] On the basis of Embodiment 1, in this embodiment, when a new primary tunnel is created, the outgoing interface index of the new primary tunnel PLR and the node address of the MP are obtained as new key values, and then the red-black tree is traversed. When the above new key value does not exist in the black tree, it is necessary to insert the new key value into the red-black tree, and create a protection tunnel corresponding to the new key value.
[0056] After the protection tunnel corresponding to the new key value is created, actively query all the main tunnels that need to be protected, that is, all the main tunnels that meet the protection conditions and have not been bound to the protection tunnel, and bind them to the protection tunnel. The protected conditions are: the outbound interface of the protection tunnel is different from the outbound interface of the main tunnel in the PLR, the destination address of the protection tunnel is the node address of the main ...
Embodiment 3
[0061] On the basis of Embodiment 1, in this embodiment, the protection tunnel is a link protection tunnel, and the MP is the next-hop NHOP of the PLR, that is, the protection tunnel protects the link between the PLR and the NHOP. When this link In case of failure, traffic can be switched to the protection tunnel.
[0062] see figure 2 As shown, the primary LSP is R1→R2→R3→R4, the PLR is R2, and the protection tunnel R2→R6→R3 can protect the link R2→R3. Obtaining the node address of NHOP node R3 specifically includes:
[0063] First, from the RRO object information of the RESV message, find the first address that does not belong to R2, that is, the interface address or node address of the NHOP node R3; use the interface address or node address of R3 as the destination address, and initiate a path calculation request.
[0064] Then, according to the collected topological structure of the entire network, use the constrained shortest path first algorithm CSPF (Constrained ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


