Virtual leased line network service protection method and operator edge device

A technology for operator edge and service protection, applied in the field of communications, it can solve the problems of asynchrony and inability to know the status of access links, and achieve the effect of improving utilization and ensuring synchronization.

Inactive Publication Date: 2010-02-03
ZTE CORP
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to provide a virtual leased line network service protection method and operator edge equipment to solve the problem of the connection between the operator edge equipment and the user edge equipment at one end in the prior art virtual leased line network services. When the inbound link is abnormal, the remote operator's edge device cannot know the abnormality, resulting in a technical problem that the status of the access link at both ends is out of sync.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual leased line network service protection method and operator edge device
  • Virtual leased line network service protection method and operator edge device
  • Virtual leased line network service protection method and operator edge device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in detail below with reference to the accompanying drawings and specific embodiments.

[0050] figure 2 It is a schematic flowchart of a method for protecting virtual leased line network services according to an embodiment of the present invention. Such as figure 2 , the method of this embodiment comprises the steps:

[0051] Step 201, the local operator edge device PE1 detects that the access link between PE1 and the local user edge device CE1 is interrupted;

[0052] Step 202, PE1 obtains the pseudowire identifier between PE1 and the remote operator's edge device PE2;

[0053] In this step, specifically, according to the preset first interface management table, PE1 determines that among the interfaces between PE1 and CE1, the first interface corresponding to the access link is associated with the end-to-end virtual private netwo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a virtual leased line network service protection method and an operator edge device, and the method comprises the following steps: step A, using a local operator edge device fordetecting the disconnection of an access link between the local operator edge device and a local user edge device; step B, using the local operator edge device for acquiring a pseudo-line mark from the local operator edge device to a remote operator edge device; and step C, using the local operator edge device for generating a signal message of disconnection type of the link and sending the signal message of the disconnection type of the link to the remote operator edge device, wherein, the signal message contains the pseudo-line mark. When the access link between a PE at one end of a VLL network and a CE is disconnected, the disconnection message can be rapidly notified to the PE at the other end.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a method for protecting a virtual leased line network service and an operator edge device. Background technique [0002] Initially, telecom operators provided links to customers in the form of leased lines. However, as the number of customer branches increases, the cost of this method increases significantly, and the difficulty of management also increases. [0003] With the emergence of Asynchronous Transfer Mode (ATM) and Frame Relay (Frame Relay, FR) technologies, telecom operators began to use virtual circuits to provide customers with point-to-point Layer 2 links, and customers then established Its own three-layer network to carry data streams such as IP. However, this technology provides point-to-point Layer 2 connections, and the configuration is relatively complicated. Especially when adding a site, the administrator needs to do a lot of configuration work. [000...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L12/24H04L12/46H04L12/56
Inventor 王新
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products