Pseudo-wire (PW) dual-homing protection switching method

A protection switching and pseudo-wire technology, applied in the field of communication, can solve the problems of slow switching speed, consumption of system resources, long switching time, etc., and achieve the effect of reducing protection switching time and avoiding repeated refreshing

Inactive Publication Date: 2020-05-19
NANJING INST OF MECHATRONIC TECH
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in this case, if the protocol default detection packet threshold time is used, the switching speed will be slower
If the packet threshold time is adjusted, a considerable number of pseudowire packets will be generated on the network, consuming a lot of system resources
It can be seen that the existing PW protection mechanism either requires additional configuration and takes up a lot of resources, or the switching time is long

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Pseudo-wire (PW) dual-homing protection switching method
  • Pseudo-wire (PW) dual-homing protection switching method
  • Pseudo-wire (PW) dual-homing protection switching method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Hereinafter, the present invention will be described in detail with reference to the accompanying drawings and examples.

[0022] An embodiment of the present invention provides a protection switching method for a pseudowire PW, see figure 1 As shown in the pseudowire dual-homing network, it usually includes a source node and two next-hop nodes, and the source node and the two next-hop nodes respectively form an LSP.

[0023] see figure 2 In this implementation case, the identification bit is set at the source node to associate with the LSP carrying the pseudowire. When the link fails, the status of the identification bit is changed when the pseudowire is deleted through the LSP to trigger a protection switching operation.

[0024] Specifically, see image 3 :

[0025] When the network is normal, the service module of the source node respectively creates an identification bit for the next hop of the active and standby PWs, associates the identification bit with the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a pseudo-wire (PW) dual-homing protection switching method, and relates to the technical field of communication. In a pseudo-wire double-homing network, a source node and two next-hop nodes are generally included, and the source node and the two next-hop nodes form LSPs respectively. The method is characterized in that an identification site is set at a source node to be associated with an LSPbearing a pseudo wire, the protection switching operation can be realized by changing the state of the identification site when the main pseudo wire is deleted through the LSP, andBFD or OAM is not required to be configured for detection. Moreover, the method can immediately execute the protection switching operation after the LSP is deleted, and threshold time of BFD, OAM orsimilar detection means does not exist, so that the protection switching time can be reduced.

Description

[0001] 1. Technical field [0002] The invention relates to a pseudo wire PW dual-homing protection switching method, which belongs to the technical field of communication. [0003] 2. Technical background [0004] In an MPLS (Multi-Protocal Label Switch, Multi-Protocol Label Switching) network, most low-speed services are carried by a PW (Pseudo wire, pseudowire). For redundant security of services, PW dual-homing protection is usually configured on this PW. Pseudowire dual homing protection such as figure 1 As shown, node A is a source node, nodes B and C are next-hop nodes, and node P is a pass-through node. The connection from node A to B is a working pseudowire, and the connection from node A to C is a protection pseudowire, which are respectively carried on the corresponding next-hop LSP. Usually, this type of protection will also be equipped with corresponding end-to-end detection methods. At present, BFD and OAM are commonly used to quickly detect the on-off status o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/939H04L12/24
CPCH04L41/0659H04L41/0663H04L41/0668H04L49/557
Inventor 刘奇喻志华屈会雪李亚玲卞志勇柳亚婷
Owner NANJING INST OF MECHATRONIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products