Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for protecting point-to-multipoint pseudo-wire

A pseudo-wire, multi-point technology, applied in the field of communication, to achieve the effect of improving stability and security

Inactive Publication Date: 2011-05-11
ZTE CORP
View PDF2 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] However, there is no related technology to realize the dual-homing protection of the egress PE of the P2MP PW

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for protecting point-to-multipoint pseudo-wire
  • Method and device for protecting point-to-multipoint pseudo-wire
  • Method and device for protecting point-to-multipoint pseudo-wire

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0120] In this example, the protection of a single-segment P2MP PW is involved. For a single-segment P2MP PW, the ingress PE node is the switching node and is also the upstream PE node of the egress PE.

[0121] Picture 11 It is a flowchart of the implementation method of P2MP SS-PW export PE protection in Example 1 of the embodiment of the present invention, such as Picture 11 As shown, the method includes the following steps S1101 to S1108:

[0122] Step S1101, the exit node configures AII and Priority.

[0123] The NLRI fields in the MP_REACH_NLRI and MP_UNREACH_NLRI attributes in the BGP UPDATE messages need to be extended to carry the priority of two bits. Among them, 00 has the highest priority, and the following are 01, 10, 11 in sequence; see Table 1 for the extension of the NLRI field.

[0124] The dual-homing egress node is configured with the same AII and different priorities.

[0125] for Figure 5 The shown P2MP SS-PW protects the network, PE1 is configured with AII11, an...

example 2

[0145] This example involves the protection of multi-segment P2MP MS-PW. The upstream node of the egress PE is the switching node. Figure 7 It is a schematic diagram of P2MP MS-PW export PE protection in Example 2 according to the embodiment of the present invention.

[0146] Picture 12 It is a flowchart of the method for implementing egress PE protection of P2MP MS-PW in Example 2 of the embodiment of the present invention, such as Picture 12 As shown, the method includes the following steps S1201 to S1209:

[0147] In step S1201, the exit node configures AII and Priority.

[0148] The NLRI fields in the MP_REACH_NLRI and MP_UNREACH_NLRI attributes in BGP UPDATE messages need to be extended to carry the priority of two bits. Among them, 00 has the highest priority, and the following are 01, 10, 11 in sequence; see Table 1 for the extension of the NLRI field .

[0149] The dual-homing egress node is configured with the same AII and different priorities.

[0150] for Figure 7 The sh...

example 3

[0170] In this example, the protection of multi-segment P2MP MS-PW is involved, and the network structure is shown in Picture 9 , Picture 9 It is a schematic diagram of P2MP MS-PW export PE protection in Example 3 according to the embodiment of the present invention.

[0171] Figure 13 It is a flowchart of the method for implementing egress PE protection of P2MP MS-PW in Example 3 of the embodiment of the present invention, such as Figure 13 As shown, the method includes the following steps S1301 to S1311:

[0172] In step S1301, the exit node configures AII and Priority.

[0173] The NLRI fields in the MP_REACH_NLRI and MP_UNREACH_NLRI attributes in the BGP UPDATE messages need to be extended to carry the priority of two bits. 00 has the highest priority. The following are 01, 10, and 11 in sequence; see Table 1 for the extension of the NLRI field.

[0174] The dual-homing egress node is configured with the same AII and different priorities.

[0175] for Picture 9 In the network s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for protecting a point-to-multipoint pseudo-wire (P2MP PW). The method comprises the following steps of: determining a switching node in the P2MP PW according to a PW routing table, wherein the switching node establishes a main P2MP PW and a standby P2MP PW; and switching a flow to the standby P2MP PW by using the switching node when the main P2MP PW fails. By the method and the device, the problem of specific implementation of a P2MP PW protection network in related technology is solved, and the stability and the safety of the P2MP PW are improved.

Description

Technical field [0001] The present invention relates to the field of communication, and in particular to a point-to-multipoint pseudowire protection method and device. Background technique [0002] With the development of the Internet Protocol (IP) data network, the expandability, upgradeability, and compatibility of the IP network itself are very strong, while the flexibility of the upgrade, expansion, and intercommunication of the traditional communication network is relatively comparative. Poor, limited by the transmission method and the type of service, and the newly-built network has poor commonality, and it is not suitable for intercommunication management. Therefore, in the process of upgrading and expanding applications of traditional communication networks, it is worthwhile to build duplicate networks or make full use of existing or public resources to achieve the purpose of upgrading networks and expanding applications. How can we achieve this goal? Questions to consid...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
Inventor 范亮陈然吴波
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products