[go: up one dir, main page]

WO2012079375A1 - Method and system for link protection in a virtual private network - Google Patents

Method and system for link protection in a virtual private network Download PDF

Info

Publication number
WO2012079375A1
WO2012079375A1 PCT/CN2011/077802 CN2011077802W WO2012079375A1 WO 2012079375 A1 WO2012079375 A1 WO 2012079375A1 CN 2011077802 W CN2011077802 W CN 2011077802W WO 2012079375 A1 WO2012079375 A1 WO 2012079375A1
Authority
WO
WIPO (PCT)
Prior art keywords
node
standby
pseudowire
tunnel
forwarding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2011/077802
Other languages
French (fr)
Chinese (zh)
Inventor
吴世华
陈世猛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Publication of WO2012079375A1 publication Critical patent/WO2012079375A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • H04L41/0663Performing the actions predefined by failover planning, e.g. switching to standby network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/50Routing or path finding of packets in data switching networks using label swapping, e.g. multi-protocol label switch [MPLS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/40Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/22Alternate routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/28Routing or path finding of packets in data switching networks using route fault recovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/68Pseudowire emulation, e.g. IETF WG PWE3

Definitions

  • the present invention relates to a link protection technology for a virtual private network, and more particularly to a link protection method and system for a virtual private network.
  • MPLS TE Multiprotocol Label Switching Traffic Engineering
  • FRR Fast Reroute
  • the MPLS TE FRR technology is a technology for implementing network local protection.
  • the LSP configured with fast reroute protection can automatically switch data to the protection chain. Go on the road.
  • MPLS TE FRR establishes a local backup path in advance, protecting the LSP from link/node failure.
  • the device detecting the link/node failure can quickly switch the service from the faulty link to the backup path.
  • the head node of the LSP tries to find a new path to re-establish the LSP and switch the data to the new path. Before the new LSP is established successfully, the service data is always forwarded through the protection path.
  • the virtual private network FRR (Virtual Private Network FRR) utilizes a VPN-based private network route fast handover technology, and sets the primary PE and the standby PE in the remote PE in advance.
  • the primary and secondary forwarding entries combined with the rapid detection of PE faults, are designed to solve the problem that the end-to-end service convergence time caused by PE node failure is longer in the MPLS VPN network where the user edge device (CE, Customer Edge) is dual-homed to the PE.
  • CE Customer Edge
  • the problem of s) and the problem that the PE node failure recovery time is related to the number of private network routes it carries. In the case of a PE node failure, the end-to-end service convergence time is less than ls.
  • Virtual Private Line Service (VPWS, Virtual Private Wire Service) is built on MPLS
  • VPWS Virtual Private Wire Service
  • Layer 2 transparent transmission is provided between a pair of ports on both routers.
  • the main components of VPWS include: PE router, Label Distribution Protocol (LDP), and MPLS Label Switching Tunnel (LSP Tunnel). Interface devices that join the VPWS service support broadcast, forward, and filter Ethernet frames.
  • the PEs are connected to each other by pseudowires (PW, Pseudo Wire) to form a simulated LAN for the client.
  • PW pseudowires
  • Each PE not only learns the Media Access Control (MAC) address of the Ethernet packet from the PW, but also learns the MAC address from the CE it is connected to.
  • the PW usually uses an MPLS tunnel to transparently transmit data between the PEs.
  • the tunnel can be a Label Distribution Protocol (LDP), and the Resource ReSerVation Protocol-Traffic Engineering (RSVP-TE) Wait.
  • LDP Label Distribution Protocol
  • RSVP-TE Resource ReSerVation Protocol-Traffic Engineering
  • a PE is usually an MPLS edge router and can establish tunnels to other PEs.
  • the present invention provides a link protection method and system for a virtual private network, which can shorten the time of service interruption when the link is interrupted, compared with the prior art.
  • the present invention provides the following technical solutions:
  • a link protection method for a virtual private network where a sending node and a receiving node in the virtual private network are connected to an active forwarding node and a standby forwarding node by using a pseudowire to form the sending node and the primary forwarding node. And a path between the receiving node and the transmitting node, the standby forwarding node, and the receiving node, the method includes:
  • the method further includes: if the path between the sending node, the primary forwarding node, and the receiving node is disconnected due to a fault, the sending node switches the path of the service to the sending node, and the standby forwarding A path between a node and the receiving node.
  • the path between the sending node, the primary forwarding node, and the receiving node Forming a pseudowire or a backup tunnel between the transmitting node and the primary forwarding node, and a pseudowire or a standby tunnel between the primary forwarding node and the receiving node;
  • the step of switching the service carried by the failed pseudowire to the standby tunnel includes: if the backup tunnel does not pass through the routing node in the virtual private network, the forwarding label according to the pre-acquired standby tunnel will be faulty. The traffic carried by the pseudowire is switched to the standby tunnel.
  • the step of switching the service carried by the failed pseudowire to the standby tunnel includes: if the standby tunnel passes through at least one routing node in the virtual private network, and performs service switching according to a pre-failed pseudowire To the alternate tunnel.
  • a link protection system for a virtual private network where a sending node and a receiving node in the virtual private network are connected to an active forwarding node and a standby forwarding node by using a pseudowire to form the sending node and the primary forwarding node. And a path between the receiving node and the transmitting node, the standby forwarding node, and the receiving node, the system includes a setting module and a first switching module, where:
  • the setting module is configured to: set a standby tunnel for at least one pseudowire in the pseudowire; the first switching module is configured to: when a pseudowire fault of the standby tunnel is set, the faulty pseudowire is carried The service switches to the standby tunnel.
  • the system also includes a second switching module
  • the second switching module is configured to: when the path between the sending node, the primary forwarding node, and the receiving node is disconnected due to a fault, switch the path of the service to the sending node, and the standby Transmitting a path between the node and the receiving node;
  • the second switching module is deployed on the sending node.
  • the first switching module is configured to switch the service carried by the failed pseudowire to the standby tunnel in the following manner:
  • the service carried by the failed pseudowire is switched to the standby tunnel according to the forwarding label of the pre-acquired standby tunnel.
  • the first switching module is configured to switch the service carried by the failed pseudowire to the standby tunnel in the following manner:
  • the service carried according to the pre-failed pseudowire switches to the standby tunnel.
  • the technical solution provided by the present invention by setting a backup tunnel for a pseudowire, to switch to the standby tunnel when the pseudowire fails, and implementing local protection for the transmission link, and directly performing the active/standby forwarding node in the prior art.
  • the service processing content required for the handover is reduced, thereby improving the switching speed, achieving the purpose of rapid handover, and shortening the time of service interruption.
  • FIG. 1 is a schematic structural diagram of an embodiment of a link protection system of a virtual private network according to an embodiment of the present invention
  • FIG. 2 is a schematic diagram of networking of an embodiment of the present invention.
  • FIG. 1 is a schematic structural diagram of an embodiment of a link protection system of a virtual private network according to an embodiment of the present invention.
  • the transmitting node and the receiving node in the virtual private network in the system embodiment shown in FIG. 1 are connected to the primary forwarding node and the standby forwarding node by using a pseudowire.
  • the system includes: a setting module, a first switching module, and a second switching. Module, where:
  • the setting module is configured to: set a standby tunnel for at least one of the pseudowires; the first switching module is configured to: when a pseudowire fault of the standby tunnel is set, switch the service carried by the failed pseudowire to the Said alternate tunnel.
  • the setting module and the first switching module are deployed on a node, including at least one of a sending node, an active forwarding node, and an alternate forwarding node.
  • the system further includes a second switching module, wherein the second switching module is configured to: switch the service path when the path between the sending node, the active forwarding node, and the receiving node is disconnected due to a fault And a path between the sending node, the standby forwarding node, and the receiving node.
  • the second switching module is deployed on the sending node.
  • the tunnel set for the pseudowire may be a tunnel directly connected between the nodes at both ends of the pseudowire, or may be formed by at least two tunnels between at least one routing node and nodes at both ends of the pseudowire, for example, sending
  • the pseudowire between the node and the active forwarding node is provided with a standby tunnel, which may be a tunnel that directly connects the sending node and the primary forwarding node, or may be forwarded by the routing node A through the routing node A.
  • the multi-segment tunnel connected by the node that is, the tunnel between the sending node and the routing node A is M, and the tunnel between the routing node A and the active forwarding node is N, then the combination of the tunnel M and the tunnel N constitutes the transmitting node and the primary node.
  • the first switching module is further configured to: when the standby tunnel does not pass through the routing node in the virtual private network, switch the service carried by the failed pseudowire to the standby tunnel according to the forwarding label of the standby tunnel.
  • the forwarding label of the standby tunnel includes information of the downstream node of the failed pseudowire, so the service can be routed to the downstream node of the failed pseudowire.
  • the first switching module is further configured to: when the standby tunnel passes through at least one routing node in the virtual private network, a forwarding label according to the failed pseudowire and a forwarding label allocated by the routing node will occur The service carried by the failed pseudowire is switched to the standby tunnel.
  • the forwarding label of the standby tunnel includes information of the downstream node of the failed pseudowire, so the service may be routed to the downstream node of the failed pseudowire;
  • the standby tunnel passes through the routing node, and the routing node performs routing according to the forwarding label of the failed pseudowire, and routes the service to the downstream node of the failed pseudowire according to the forwarding label allocated by the next hop routing node.
  • the system provided by the present invention provides a backup tunnel for a pseudowire, and when the pseudowire fails, the switch is switched to the standby tunnel to implement local protection on the transmission link, and the active/standby forwarding node is directly implemented in the prior art. Compared with the switching, the business processing content required for the switching is reduced, thereby improving the switching speed, achieving the purpose of rapid switching, and shortening the time of service interruption.
  • the link between the sending node, the active forwarding node, and the receiving node is called the primary path.
  • the link between the sending node, the standby forwarding node, and the receiving node is called the alternate path. These two paths are called the global link. protection.
  • the priority order of the path selection is a global protection primary path, a primary path, a local protection tunnel, a global protection alternate path, and an alternate path, a local protection tunnel.
  • the VPWS network is taken as an example for description, but is not limited thereto.
  • the proposed Layer 2 virtual private network is also applicable, and will not be described here:
  • a tunnel is also arranged between the nodes at both ends of each pseudowire to implement switching between the pseudowire and the tunnel to achieve local protection of the primary path.
  • the link protection device creates a VPWS service forwarding, a global protection forwarding table, and a local protection forwarding table according to the structure of the network;
  • the VPWS service forwarding table includes a global protection index, and is used to find a global protection table. See Table 1 in which the VC label in the VPWS table is the VC label of the primary label and the forwarding label.
  • the global protection forwarding table records the primary path and the alternate path of the global protection, as shown in Table 2. Specifically, the forwarding label of the PW in the active path (that is, the pseudo-line forwarding label allocated by the primary forwarding node to the sending node) and the virtual circuit (VC) label (ie, the receiving node is allocated to the sending node to pass the primary use) Forwarding the virtual label of the node; the same as the forwarding label and VC label of the PW in the alternate path;
  • the global protection forwarding table further includes a local protection flag bit and a local protection index, where: when the pseudo line of the main path fails, if the local protection flag is invalid, the data service packet is performed according to the global protection active/standby path. For protection switching, the forwarding label and VC label in the alternate path need to be used for transmission. When the local protection flag is valid, the data is forwarded according to the local protection table. At this time, the VC label is obtained from the global protection table, and the forwarding label is obtained from the local protection table. Obtained, the data service packet is protected and switched according to the locally protected tunnel.
  • the local protection forwarding table is generally used when a backup tunnel has multiple tunnels. See Table 3 for recording the active/standby relationship of the pseudowire and its corresponding tunnel in the local protection, the respective outbound port index, and the tunnel access. Tag information, where the egress port index is used to find the next bounce port table.
  • PE1 and PE2 are source nodes and target nodes, respectively, where P1 is the primary node and P2 is the standby node, and PE1 and PE2 can communicate through PW1 and PW2, where PW1 includes PW11 and PW12, where PW11 (PE1-P1) and PW12 (P1-PE2), PW2 include PW21 (PE1-P2) and PW22 (P2-PE2). among them:
  • the MPLS TE protection tunnels of PW11 are Tl ( PE1-P3 ) and T2 ( P3-P1 ) ;
  • the MPLS TE protection tunnels of the PW12 are T3 (P1-P4) and T4 (P4-PE2).
  • the MPLS TE protection tunnels of the PW21 are T5 ( PE1-P5 ) and T6 ( P5-P2 ) ;
  • the MPLS TE protection tunnels of the PW22 are T7 (P2-P6) and T8 (P2-PE2).
  • the starting point of the MPLS TE protection tunnel is the same as the starting point of each pseudo line.
  • the PE1 device is used as an example.
  • the VPWS forwarding table has a global protection index.
  • the global protection table in the VPWS forwarding table is used to query the global protection table.
  • the information about PW1 and PW2 can be obtained.
  • the PW1 information includes the forwarding label assigned by P1 to PE1.
  • PE2 is assigned to the VC label of PW1 of PE1;
  • the information of PW2 includes the forwarding label assigned by P2 to PE1 and the VC label of PW2 allocated by PE2 to PE1.
  • PW1 and PW2 both establish a protection relationship for local protection.
  • Take PW11 as an example.
  • a new tunnel consisting of tunnels T1 and T2 protects PW11.
  • the local protection table is queried according to the local protection index in the global protection table.
  • the PE1 device is used as an example.
  • the local protection entry includes the primary tunnel forwarding label, the standby tunnel forwarding label, the next hop port information of the primary tunnel, and the next hop port information of the standby tunnel.
  • the tunnel T1 and ⁇ 2 protect the PW11 segment.
  • the index of the local protection is Index1; the tunnels T3 and T4 protect the PW of the PW12, and the index of the local protection is Index2.
  • the Index1 entry includes the primary tunnel forwarding label, which is the label that P1 assigns to PE1.
  • the standby tunnel forwarding label is the label that P3 assigns to PE1.
  • the next-hop outgoing port information of the primary tunnel is the outgoing port information of PE1 to P1.
  • the port information is the outbound port information of PE1 to P3.
  • the index 2 entry includes the label of the primary tunnel forwarding label that is assigned to P1 by PE2.
  • the label of the standby tunnel is the label that P4 assigns to P1.
  • the information of the next outbound port of the primary tunnel is P1.
  • the outgoing port information of PE2, and the information of the next outgoing port of the standby tunnel is the outbound port information of P1 to P4.
  • the forwarding label in the local protection table is the forwarding label assigned by P1 to PE1, and the next hop is directed to P1.
  • the packet encapsulates the Layer 2 label for forwarding, and the outer forwarding label is localized.
  • the protection table is obtained, the inner VC tag is obtained from the global protection table; if there is local protection switching, the forwarding label in the local protection table is the label assigned by P3 to PE1, and the inner label of the local protection protection is the label assigned by P1 to PE1.
  • the time packet encapsulates the Layer 3 label for forwarding, and the outer layer 2 label is obtained from the local protection table, which is the label assigned by P3 to PE1, the inner label of the local protection protection is the label assigned by P1 to PE1, and the inner layer is the VC of PW1.
  • the label is obtained from the global protection table, and the next hop is directed to P3 forwarding, thereby achieving local protection.
  • PE1 When PW11 fails but PW12 is working normally, PE1 is faulty due to PW11 failure. The data is switched to the PW11 protection tunnel for transmission. After the P1 receives the data, the PW12 is still working, and the PW12 is still used for transmission. Therefore, the path of communication between PE1 and PE2 is T1-T2-PW12.
  • PE1 When both PW11 and PW12 are faulty, PE1 will switch data to the PW11 protection tunnel for transmission. After P1 receives the data, P1 will switch the data to the PW12 protection tunnel after the PW12 fails. Transmission, so the path of communication between PE1 and PE2 is T1 - T2 - T3 - T4;
  • the standby node needs to be used for transmission, that is, the transmission between the PE and PE2 and the P2 is performed, so PE1 and PE2 The path of communication between them is PW21-PW22.
  • the method of transmitting data is as follows:
  • Step 201 After determining that the received network packet is a VPWS network packet according to the access mode of the network packet, PE1 searches for a corresponding VPWS forwarding entry, where the VPWS forwarding table includes a global protection index, a PW VC label, and a forwarding. Label, ;
  • Step 202 The PE1 searches for the global protection forwarding entry from the VPWS forwarding entry according to the global protection index that is found.
  • Step 203 PE1 determines whether the local protection flag in the global protection forwarding is set, if yes, proceeds to step 204, otherwise proceeds to step 203;
  • Step 204 The PE1 processes the received network packet in the manner that the global VPWS service global protection protection is configured, that is, the P1 network is transmitted from the PW11 to the P1, and the process ends.
  • Step 205 The PE1 searches for the partial protection according to the local protection index in the global protection forwarding table that is found.
  • the guard entry, the local protection entry contains the next hop information to obtain the information of the TE primary tunnel and the standby tunnel (such as the outgoing port of the pseudowire and the outgoing port of the standby tunnel);
  • Step 206 The PE1 encapsulates and forwards the VPWS service packet, which includes: obtaining the VC label of the VPWS service from the global protection table, the VC label is a label allocated by the LDP protocol, and the forwarding label of the VPWS service is a local protection entry. The label is obtained, and the label of the local protection entry is a label allocated by the RSVP protocol. The process ends.
  • P1 can refer to the processing flow of steps 201-206 to transfer data to PE2. If P1 cannot transmit data to PE2, P1 notifies PE1 that transmission cannot be performed, and PE1 passes between P2 and P2. The pseudowire transmits data to PE2.
  • FIG. 3 is a schematic structural diagram of an embodiment of a link protection method for a virtual private network according to the present invention.
  • the transmitting node and the receiving node in the virtual private network in the method embodiment shown in FIG. 3 are connected to the primary forwarding node and the standby forwarding node through a pseudowire to form the transmitting node.
  • Step 301 Set a standby tunnel for at least one pseudowire in the pseudowire.
  • Step 302 When a pseudowire fault with the standby tunnel is set, the service carried by the failed pseudowire is switched to the standby tunnel.
  • the method further includes:
  • the sending node switches the path of the service to the sending node, the standby forwarding node, and the receiving The path between nodes.
  • the path in the method embodiment is specifically described as follows: the path between the sending node, the active forwarding node and the receiving node, and the pseudo between the sending node and the active forwarding node a line or backup tunnel, comprising a pseudowire or a standby tunnel between the primary forwarding node and the receiving node;
  • the step of switching the service carried by the failed pseudowire to the standby tunnel includes: if the backup tunnel does not pass through the routing node in the virtual private network, the forwarding label according to the pre-acquired standby tunnel will be faulty.
  • the service carried by the pseudowire is switched to the standby tunnel; if the standby tunnel passes through at least one routing node in the virtual private network, the service carried according to the pre-failed pseudowire switches to the standby tunnel.
  • the method of the present invention provides a backup tunnel for a pseudowire, and when the pseudowire fails, the switch is switched to the standby tunnel to implement local protection on the transmission link, and the active/standby forwarding node is directly implemented in the prior art. Compared with the switching, the business processing content required for the switching is reduced, thereby improving the switching speed, achieving the purpose of rapid switching, and shortening the time of service interruption.
  • all or part of the steps of the foregoing embodiments may also be implemented by using an integrated circuit. These steps may be separately fabricated into individual integrated circuit modules, or multiple modules or steps may be fabricated into a single integrated circuit module. achieve.
  • the invention is not limited to any particular combination of hardware and software.
  • the various devices/function modules/functional units in the above embodiments may be implemented using a general-purpose computing device, which may be centralized on a single computing device or distributed over a network of multiple computing devices.
  • Each device/function module/functional unit in the above embodiments can be stored in a computer readable storage medium when implemented in the form of a software function module and sold or used as a standalone product.
  • the above mentioned computer readable storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
  • the technical solution provided by the present invention by setting a backup tunnel for a pseudowire, to switch to the standby tunnel when the pseudowire fails, and implementing local protection for the transmission link, and directly performing the active/standby forwarding node in the prior art.
  • the business processing content required for the switching is reduced, thereby improving the switching speed, achieving the purpose of rapid switching, shortening the time of service interruption, and having strong industrial applicability.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Disclosed in the present invention are a method and system for link protection in a virtual private network. Transmission nodes and reception nodes in the virtual private network are all connected with a main forwarding node and a standby transmitting node via pseudo wires, the method comprises the following steps: a standby channel is set for at least one of the pseudo wires(301); when the pseudo wire with a standby channel fails, services carried on the pseudo wire is switched to the standby channel(302). The technical solution provided by the present invention can be applied to the management of layer 2 link protection in a virtual private network.

Description

虚拟专用网络的链路保护方法和系统 技术领域  Link protection method and system for virtual private network

本发明涉及虚拟专用网络的链路保护技术, 尤其涉及一种虚拟专用网络 的链路保护方法和系统。  The present invention relates to a link protection technology for a virtual private network, and more particularly to a link protection method and system for a virtual private network.

背景技术 Background technique

多协议标签交换流量工程 ( MPLS TE , Multiprotocol Label Switching Traffic Engineering )快速重路由(FRR, Fast Reroute )是现有的解决故障快速 切换的最常用的技术之一, 它的基本思路是在两个运营商边缘设备(PE , Provider Edge )设备之间建立端到端的流量工程( TE, Traffic Engineering )隧 道, 并且为需要保护的主用标签交换路径(LSP, Label Switched Path )事先 建立好备用 LSP,当设备检测到主用 LSP不可用时(节点故障或者链路故障 ), 将流量倒换到备用 LSP上, 从而实现业务的快速切换。  MPLS TE (Multiprotocol Label Switching Traffic Engineering) Fast Reroute (FRR) is one of the most commonly used techniques for fast fault recovery. Its basic idea is to operate in two operations. An end-to-end traffic engineering (TE, Traffic Engineering) tunnel is established between the device (PE, Provider Edge), and a backup LSP is established in advance for the primary label switching path (LSP, Label Switched Path) to be protected. When the device detects that the primary LSP is unavailable (node failure or link failure), the device switches the traffic to the backup LSP to implement fast service switching.

MPLS TE FRR技术是一项实现网络局部保护的技术,在应用了 MPLS TE 的网络中, 当某处出现链路或节点失效时, 配置有快速重路由保护的 LSP可 以自动将数据切换到保护链路上去。 MPLS TE FRR 由事先建立本地备份路 径, 保护 LSP不会受到链路 /节点故障的影响, 当故障发生时,检测到链路 /节 点故障的设备就可以快速将业务从故障链路切换到备份路径上; 同时, LSP 的头节点会尝试寻找新的路径来重新建立 LSP, 并将数据切换到新路径上, 在新的 LSP建立成功之前, 业务数据会一直通过保护路径转发。  The MPLS TE FRR technology is a technology for implementing network local protection. In a network where MPLS TE is applied, when a link or node fails, the LSP configured with fast reroute protection can automatically switch data to the protection chain. Go on the road. MPLS TE FRR establishes a local backup path in advance, protecting the LSP from link/node failure. When a fault occurs, the device detecting the link/node failure can quickly switch the service from the faulty link to the backup path. At the same time, the head node of the LSP tries to find a new path to re-establish the LSP and switch the data to the new path. Before the new LSP is established successfully, the service data is always forwarded through the protection path.

另外现有技术中还提供一种虚拟私有网快速重路由 (VPN FRR, Virtual Private Network FRR )利用基于 VPN的私网路由快速切换技术, 通过预先在 远端 PE中设置指向主用 PE和备用 PE的主备用转发表项,并结合 PE故障快 速检测, 旨在解决用户边缘设备 ( CE, Customer Edge )双归 PE的 MPLS VPN 网络中, PE节点故障导致的端到端业务收敛时间长(大于 I s )的问题, 同时 解决 PE节点故障恢复时间与其承载的私网路由的数量相关的问题, 在 PE节 点故障下, 端到端业务收敛时间小于 l s。  In addition, the virtual private network FRR (Virtual Private Network FRR) utilizes a VPN-based private network route fast handover technology, and sets the primary PE and the standby PE in the remote PE in advance. The primary and secondary forwarding entries, combined with the rapid detection of PE faults, are designed to solve the problem that the end-to-end service convergence time caused by PE node failure is longer in the MPLS VPN network where the user edge device (CE, Customer Edge) is dual-homed to the PE. The problem of s), and the problem that the PE node failure recovery time is related to the number of private network routes it carries. In the case of a PE node failure, the end-to-end service convergence time is less than ls.

虚拟专用线路服务 ( VPWS , Virtual Private Wire Service )建设在 MPLS 网络的基础设施之上, 在两个路由器的一对端口之间提供高速的二层透传。 Virtual Private Line Service (VPWS, Virtual Private Wire Service) is built on MPLS On top of the network infrastructure, high-speed Layer 2 transparent transmission is provided between a pair of ports on both routers.

VPWS主要组成部分包括: PE路由器、 标记分发协议( LDP )和 MPLS标记 交换隧道(LSP Tunnel ) , 加入 VPWS业务的接口设备支持广播, 转发和过 滤以太网帧。 PE之间通过伪线(PW, Pseudo Wire )互相连接, 对客户形成 一个仿真 LAN。 每个 PE不但要学习来自 PW的以太网报文的介质访问控制 ( MAC, Media Access Control )地址, 也要学习来自它所连接 CE的 MAC 地址。 PW通常使用 MPLS 隧道, 完成 PE之间的数据透传, 隧道可以是标 签分发协议(LDP, Label Distribution Protocol ) ,基于流量工程扩展的资源预 留协议 ( RSVP-TE, Resource ReSerVation Protocol-Traffic Engineering )等。  The main components of VPWS include: PE router, Label Distribution Protocol (LDP), and MPLS Label Switching Tunnel (LSP Tunnel). Interface devices that join the VPWS service support broadcast, forward, and filter Ethernet frames. The PEs are connected to each other by pseudowires (PW, Pseudo Wire) to form a simulated LAN for the client. Each PE not only learns the Media Access Control (MAC) address of the Ethernet packet from the PW, but also learns the MAC address from the CE it is connected to. The PW usually uses an MPLS tunnel to transparently transmit data between the PEs. The tunnel can be a Label Distribution Protocol (LDP), and the Resource ReSerVation Protocol-Traffic Engineering (RSVP-TE) Wait.

PE通常是 MPLS边缘路由器, 并能够建立到其他 PE的隧道。 A PE is usually an MPLS edge router and can establish tunnels to other PEs.

对于 VPWS这样的二层 VPN网络, 如何保护链路断开切换时的流量是 需要解决的问题。 发明内容  For a Layer 2 VPN network such as VPWS, how to protect the traffic when the link is disconnected is a problem that needs to be solved. Summary of the invention

本发明提供一种虚拟专用网络的链路保护方法和系统,与现有技术相比, 能够使链路在中断时缩短业务中断的时间。  The present invention provides a link protection method and system for a virtual private network, which can shorten the time of service interruption when the link is interrupted, compared with the prior art.

为解决上述技术问题, 本发明提供了如下技术方案:  In order to solve the above technical problem, the present invention provides the following technical solutions:

一种虚拟专用网络的链路保护方法, 所述虚拟专用网络中的发送节点和 接收节点均通过伪线与主用转发节点和备用转发节点相连, 形成所述发送节 点、 所述主用转发节点与所述接收节点之间的通路及所述发送节点、 所述备 用转发节点与所述接收节点之间的通路, 该方法包括:  A link protection method for a virtual private network, where a sending node and a receiving node in the virtual private network are connected to an active forwarding node and a standby forwarding node by using a pseudowire to form the sending node and the primary forwarding node. And a path between the receiving node and the transmitting node, the standby forwarding node, and the receiving node, the method includes:

为所述伪线中的至少一条伪线设置备用隧道;  Setting a standby tunnel for at least one of the pseudowires;

当设置有备用隧道的伪线故障时, 将发生故障的伪线承载的业务切换到 所述备用隧道。  When a pseudowire failure of the standby tunnel is set, the service carried by the failed pseudowire is switched to the standby tunnel.

该方法还包括: 如果所述发送节点、 所述主用转发节点与所述接收节点 之间的通路因故障断开, 所述发送节点将业务的通路切换为所述发送节点、 所述备用转发节点与所述接收节点之间的通路。 其中: 所述发送节点、 所述主用转发节点与所述接收节点之间的通路, 由所述发送节点与所述主用转发节点之间的伪线或备用隧道, 与所述主用转 发节点与所述接收节点之间的伪线或备用隧道组成; The method further includes: if the path between the sending node, the primary forwarding node, and the receiving node is disconnected due to a fault, the sending node switches the path of the service to the sending node, and the standby forwarding A path between a node and the receiving node. Wherein: the path between the sending node, the primary forwarding node, and the receiving node, Forming a pseudowire or a backup tunnel between the transmitting node and the primary forwarding node, and a pseudowire or a standby tunnel between the primary forwarding node and the receiving node;

所述发送节点、 所述备用转发节点与所述接收节点之间的通路, 由所述 发送节点与所述备用转发节点之间的伪线或备用隧道, 与所述主用转发节点 与所述接收节点之间的伪线或备用隧道组成。  a path between the sending node, the standby forwarding node, and the receiving node, a pseudowire or a standby tunnel between the sending node and the standby forwarding node, and the primary forwarding node and the A pseudowire or alternate tunnel consisting of receiving nodes.

其中, 将发生故障的伪线承载的业务切换到所述备用隧道的步骤包括: 如果所述备用隧道未经过所述虚拟专用网中的路由节点, 根据预先获取 的备用隧道的转发标签将发生故障的伪线承载的业务切换到所述备用隧道。  The step of switching the service carried by the failed pseudowire to the standby tunnel includes: if the backup tunnel does not pass through the routing node in the virtual private network, the forwarding label according to the pre-acquired standby tunnel will be faulty. The traffic carried by the pseudowire is switched to the standby tunnel.

其中, 将发生故障的伪线承载的业务切换到所述备用隧道的步骤包括: 如果所述备用隧道经过至少一个所述虚拟专用网中的路由节点, 根据预 发生故障的伪线承载的业务切换到所述备用隧道。  The step of switching the service carried by the failed pseudowire to the standby tunnel includes: if the standby tunnel passes through at least one routing node in the virtual private network, and performs service switching according to a pre-failed pseudowire To the alternate tunnel.

一种虚拟专用网络的链路保护系统, 所述虚拟专用网络中的发送节点和 接收节点均通过伪线与主用转发节点和备用转发节点相连, 形成所述发送节 点、 所述主用转发节点与所述接收节点之间的通路及所述发送节点、 所述备 用转发节点与所述接收节点之间的通路, 该系统包括设置模块和第一切换模 块, 其中:  A link protection system for a virtual private network, where a sending node and a receiving node in the virtual private network are connected to an active forwarding node and a standby forwarding node by using a pseudowire to form the sending node and the primary forwarding node. And a path between the receiving node and the transmitting node, the standby forwarding node, and the receiving node, the system includes a setting module and a first switching module, where:

所述设置模块设置成: 为所述伪线中的至少一条伪线设置备用隧道; 所述第一切换模块设置成: 当设置有备用隧道的伪线故障时, 将发生故 障的伪线承载的业务切换到所述备用隧道。  The setting module is configured to: set a standby tunnel for at least one pseudowire in the pseudowire; the first switching module is configured to: when a pseudowire fault of the standby tunnel is set, the faulty pseudowire is carried The service switches to the standby tunnel.

该系统还包括第二切换模块,  The system also includes a second switching module,

所述第二切换模块设置成: 在所述发送节点、 所述主用转发节点与所述 接收节点之间的通路因故障断开时, 将业务的通路切换为所述发送节点、 所 述备用转发节点与所述接收节点之间的通路;  The second switching module is configured to: when the path between the sending node, the primary forwarding node, and the receiving node is disconnected due to a fault, switch the path of the service to the sending node, and the standby Transmitting a path between the node and the receiving node;

所述第二切换模块部署在所述发送节点上。  The second switching module is deployed on the sending node.

其中: 所述发送节点、 所述主用转发节点与所述接收节点之间的通路, 由所述发送节点与所述主用转发节点之间的伪线或备用隧道, 与所述主用转 发节点与所述接收节点之间的伪线或备用隧道组成; 所述发送节点、 所述备用转发节点与所述接收节点之间的通路, 由所述 发送节点与所述备用转发节点之间的伪线或备用隧道, 与所述主用转发节点 与所述接收节点之间的伪线或备用隧道组成。 Wherein: the path between the sending node, the primary forwarding node and the receiving node, and a pseudowire or a standby tunnel between the sending node and the primary forwarding node, and the primary forwarding a pseudowire or an alternate tunnel between the node and the receiving node; a path between the sending node, the standby forwarding node, and the receiving node, a pseudowire or a standby tunnel between the sending node and the standby forwarding node, and the primary forwarding node and the A pseudowire or alternate tunnel consisting of receiving nodes.

其中: 所述第一切换模块设置成按照以下方式将发生故障的伪线承载的 业务切换到所述备用隧道:  The first switching module is configured to switch the service carried by the failed pseudowire to the standby tunnel in the following manner:

在所述备用隧道未经过所述虚拟专用网中的路由节点时, 根据预先获取 的备用隧道的转发标签将发生故障的伪线承载的业务切换到所述备用隧道。  When the standby tunnel does not pass through the routing node in the virtual private network, the service carried by the failed pseudowire is switched to the standby tunnel according to the forwarding label of the pre-acquired standby tunnel.

其中: 所述第一切换模块设置成按照以下方式将发生故障的伪线承载的 业务切换到所述备用隧道:  The first switching module is configured to switch the service carried by the failed pseudowire to the standby tunnel in the following manner:

在所述备用隧道经过至少一个所述虚拟专用网中的路由节点时, 根据预 发生故障的伪线承载的业务切换到所述备用隧道。  When the standby tunnel passes through at least one routing node in the virtual private network, the service carried according to the pre-failed pseudowire switches to the standby tunnel.

本发明提供的技术方案, 通过为伪线设置备用隧道, 在伪线出现故障时, 切换到该备用的隧道, 实现对传输链路的局部保护, 与现有技术中直接进行 主备转发节点的切换相比, 切换所需的业务处理内容变少了, 从而提高了切 换的速度, 达到迅速切换的目的, 缩短了业务中断的时间。 附图概述 The technical solution provided by the present invention, by setting a backup tunnel for a pseudowire, to switch to the standby tunnel when the pseudowire fails, and implementing local protection for the transmission link, and directly performing the active/standby forwarding node in the prior art. Compared with the handover, the service processing content required for the handover is reduced, thereby improving the switching speed, achieving the purpose of rapid handover, and shortening the time of service interruption. BRIEF abstract

图 1为本发明实施例的虚拟专用网络的链路保护系统实施例的结构示意 图;  1 is a schematic structural diagram of an embodiment of a link protection system of a virtual private network according to an embodiment of the present invention;

图 2为本发明实施例的组网示意图; 图  2 is a schematic diagram of networking of an embodiment of the present invention;

本发明的较佳实施方式 Preferred embodiment of the invention

为使本发明的目的、 技术方案和优点更加清楚, 下面将结合附图及具体 实施例对本发明作进一步的详细描述。 需要说明的是, 在不冲突的情况下, 本申请中的实施例及实施例中的特征可以相互任意组合。 The present invention will be further described in detail below with reference to the drawings and specific embodiments. It should be noted that, in the absence of conflict, The features in the embodiments and the examples in the application can be arbitrarily combined with each other.

图 1为本发明实施例的虚拟专用网络的链路保护系统实施例的结构示意 图。 图 1所示系统实施例中所述虚拟专用网络中的发送节点和接收节点均通 过伪线与主用转发节点和备用转发节点相连, 该系统包括: 设置模块、 第一 切换模块及第二切换模块, 其中:  FIG. 1 is a schematic structural diagram of an embodiment of a link protection system of a virtual private network according to an embodiment of the present invention. The transmitting node and the receiving node in the virtual private network in the system embodiment shown in FIG. 1 are connected to the primary forwarding node and the standby forwarding node by using a pseudowire. The system includes: a setting module, a first switching module, and a second switching. Module, where:

所述设置模块设置成: 为所述伪线中的至少一条设置备用隧道; 第一切换模块设置成: 当设置有备用隧道的伪线故障时, 将发生故障的 伪线承载的业务切换到所述备用隧道。  The setting module is configured to: set a standby tunnel for at least one of the pseudowires; the first switching module is configured to: when a pseudowire fault of the standby tunnel is set, switch the service carried by the failed pseudowire to the Said alternate tunnel.

其中, 所述设置模块和所述第一切换模块部署在如下节点, 包括发送节 点、 主用转发节点和备用转发节点中至少一个。  The setting module and the first switching module are deployed on a node, including at least one of a sending node, an active forwarding node, and an alternate forwarding node.

该系统还包括第二切换模块, 其中该第二切换模块设置成: 在所述发送 节点、 所述主用转发节点与所述接收节点之间的通路因故障断开时, 将业务 的通路切换为所述发送节点、所述备用转发节点与所述接收节点之间的通路。 所述第二切换模块部署在所述发送节点上。  The system further includes a second switching module, wherein the second switching module is configured to: switch the service path when the path between the sending node, the active forwarding node, and the receiving node is disconnected due to a fault And a path between the sending node, the standby forwarding node, and the receiving node. The second switching module is deployed on the sending node.

所述发送节点、 所述主用转发节点与所述接收节点之间的通路, 由所述 发送节点与所述主用转发节点之间的伪线或备用隧道, 与所述主用转发节点 与所述接收节点之间的伪线或备用隧道组成;  a path between the sending node, the primary forwarding node, and the receiving node, a pseudowire or a standby tunnel between the sending node and the primary forwarding node, and the primary forwarding node a pseudowire or an alternate tunnel between the receiving nodes;

所述发送节点、 所述备用转发节点与所述接收节点之间的通路, 由所述 发送节点与所述备用转发节点之间的伪线或备用隧道, 与所述主用转发节点 与所述接收节点之间的伪线或备用隧道组成。  a path between the sending node, the standby forwarding node, and the receiving node, a pseudowire or a standby tunnel between the sending node and the standby forwarding node, and the primary forwarding node and the A pseudowire or alternate tunnel consisting of receiving nodes.

其中为伪线设置的隧道可以是伪线的两端的节点间直接相连的一段隧 道, 也可以通过至少一个路由节点与伪线的两端的节点之间的至少两条隧道 构成, 举例来说, 发送节点和主用转发节点之间的伪线设置有备用的隧道, 该隧道可以是使发送节点和主用转发节点直接相连的一段隧道, 也可以通过 一个路由节点 A才使发送节点和主用转发节点相连的多段隧道, 即发送节点 与路由节点 A之间的隧道为 M,路由节点 A与主用转发节点之间的隧道为 N, 则隧道 M和隧道 N的组合才构成发送节点和主用转发节点之间伪线的备用隧 道。 所述第一切换模块还设置成: 在所述备用隧道未经过所述虚拟专用网中 的路由节点时, 根据备用隧道的转发标签将发生故障的伪线承载的业务切换 到所述备用隧道。 The tunnel set for the pseudowire may be a tunnel directly connected between the nodes at both ends of the pseudowire, or may be formed by at least two tunnels between at least one routing node and nodes at both ends of the pseudowire, for example, sending The pseudowire between the node and the active forwarding node is provided with a standby tunnel, which may be a tunnel that directly connects the sending node and the primary forwarding node, or may be forwarded by the routing node A through the routing node A. The multi-segment tunnel connected by the node, that is, the tunnel between the sending node and the routing node A is M, and the tunnel between the routing node A and the active forwarding node is N, then the combination of the tunnel M and the tunnel N constitutes the transmitting node and the primary node. An alternate tunnel that forwards pseudowires between nodes. The first switching module is further configured to: when the standby tunnel does not pass through the routing node in the virtual private network, switch the service carried by the failed pseudowire to the standby tunnel according to the forwarding label of the standby tunnel.

由于该备用隧道不经过任何路由节点, 该备用隧道的转发标签中包括该 发生故障的伪线的下游节点的信息, 所以该业务可以路由到该发生故障的伪 线的下游节点。  Since the standby tunnel does not pass through any routing node, the forwarding label of the standby tunnel includes information of the downstream node of the failed pseudowire, so the service can be routed to the downstream node of the failed pseudowire.

所述第一切换模块还设置成: 在所述备用隧道经过至少一个所述虚拟专 用网中的路由节点时, 根据该发生故障的伪线的转发标签以及所述路由节点 分配的转发标签将发生故障的伪线承载的业务切换到所述备用隧道。  The first switching module is further configured to: when the standby tunnel passes through at least one routing node in the virtual private network, a forwarding label according to the failed pseudowire and a forwarding label allocated by the routing node will occur The service carried by the failed pseudowire is switched to the standby tunnel.

在该备用隧道不经过任何路由节点时, 该备用隧道的转发标签中包括该 发生故障的伪线的下游节点的信息, 所以该业务可以路由到该发生故障的伪 线的下游节点; 而当该备用隧道经过路由节点, 路由节点根据该发生故障的 伪线的转发标签进行路由选择, 并根据下一跳路由节点分配的转发标签, 将 业务路由该发生故障的伪线的下游节点。  When the standby tunnel does not pass through any routing node, the forwarding label of the standby tunnel includes information of the downstream node of the failed pseudowire, so the service may be routed to the downstream node of the failed pseudowire; The standby tunnel passes through the routing node, and the routing node performs routing according to the forwarding label of the failed pseudowire, and routes the service to the downstream node of the failed pseudowire according to the forwarding label allocated by the next hop routing node.

本发明提供的系统实施例, 通过为伪线设置备用隧道, 在伪线出现故障 时, 切换到该备用的隧道, 实现对传输链路的局部保护, 与现有技术中直接 进行主备转发节点的切换相比, 切换所需的业务处理内容变少了, 从而提高 了切换的速度, 达到迅速切换的目的, 缩短了业务中断的时间。  The system provided by the present invention provides a backup tunnel for a pseudowire, and when the pseudowire fails, the switch is switched to the standby tunnel to implement local protection on the transmission link, and the active/standby forwarding node is directly implemented in the prior art. Compared with the switching, the business processing content required for the switching is reduced, thereby improving the switching speed, achieving the purpose of rapid switching, and shortening the time of service interruption.

下面对本发明提供的系统进行进一步详细的说明:  The system provided by the present invention is further described in detail below:

在此之前, 为了便于描述, 下面将上述链路的关系进行一下简单的命名: 伪线以及该伪线两端之间的备用的隧道称为链路的局部保护;  Before this, for the convenience of description, the relationship between the above links is simply named: the pseudowire and the alternate tunnel between the two ends of the pseudowire are called local protection of the link;

发送节点、 主用转发节点以及接收节点之间的链路称为主用路径, 发送 节点、 备用转发节点以及接收节点之间的链路称为备用路径, 这两个路径称 为链路的全局保护。  The link between the sending node, the active forwarding node, and the receiving node is called the primary path. The link between the sending node, the standby forwarding node, and the receiving node is called the alternate path. These two paths are called the global link. protection.

在数据传输过程中, 路径选择的优先级顺序依次为全局保护的主用路 径一主用路径的用于局部保护的隧道一全局保护的备用路径一备用路径的用 于局部保护的隧道。 此处以 VPWS网络为例进行说明, 但不限于此, 对于其他基于 MPLS协 议的二层虚拟专用网同样适用, 此处不再赘述: In the data transmission process, the priority order of the path selection is a global protection primary path, a primary path, a local protection tunnel, a global protection alternate path, and an alternate path, a local protection tunnel. Here, the VPWS network is taken as an example for description, but is not limited thereto. For other MPLS-based protocols. The proposed Layer 2 virtual private network is also applicable, and will not be described here:

在组网过程中, 为保护发送节点和接收节点之间的链路, 配置了主备两 个转发节点, 且配置该主备转发节点通过伪线分别与发送节点和接收节点相 保护; 进一步的, 还为每条伪线的两端节点间配置有隧道, 实现对伪线与隧 道的切换, 实现对主用路径的局部保护。  In the networking process, in order to protect the link between the sending node and the receiving node, two forwarding nodes are configured, and the active/standby forwarding node is configured to be protected by the sending node and the receiving node respectively through the pseudowire; A tunnel is also arranged between the nodes at both ends of each pseudowire to implement switching between the pseudowire and the tunnel to achieve local protection of the primary path.

在上述组网结构中, 链路保护设备根据网络的结构, 创建 VPWS业务转 发表、 全局保护转发表以及局部保护转发表; 其中:  In the above network structure, the link protection device creates a VPWS service forwarding, a global protection forwarding table, and a local protection forwarding table according to the structure of the network;

所述 VPWS业务转发表包括全局保护的索引, 用以查找全局保护表, 参 见表 1 , 其中该 VPWS表中的 VC标签为和转发标签为主用路径的 VC标签 为和转发标签。  The VPWS service forwarding table includes a global protection index, and is used to find a global protection table. See Table 1 in which the VC label in the VPWS table is the VC label of the primary label and the forwarding label.

表 1 VPWS 转发表  Table 1 VPWS forwarding table

Figure imgf000009_0001
Figure imgf000009_0001

所述全局保护转发表记录全局保护的主用路径和备用路径, 参见表 2。 具体包括主用路径中 PW的转发标签(即主用转发节点分配给发送节点的伪 线转发标签)和虚拟电路( VC, virtual circuit )标签(即接收节点分配给发送 节点在通过所述主用转发节点传输时的虚拟标签) ; 同理该备用路径中 PW 的转发标签和 VC标签;  The global protection forwarding table records the primary path and the alternate path of the global protection, as shown in Table 2. Specifically, the forwarding label of the PW in the active path (that is, the pseudo-line forwarding label allocated by the primary forwarding node to the sending node) and the virtual circuit (VC) label (ie, the receiving node is allocated to the sending node to pass the primary use) Forwarding the virtual label of the node; the same as the forwarding label and VC label of the PW in the alternate path;

其中该全局保护转发表还包括局部保护标志位和局部保护索引, 其中: 在主用路径的伪线出现故障时, 如果局部保护标志位无效, 数据业务报文是 按照全局保护的主备路径进行保护切换, 需要使用备用路径中的转发标签和 VC标签进行传输; 当局部保护标志位有效时,数据是按照局部保护表进行转 发, 此时 VC标签从全局保护表获得, 转发标签从局部保护表获得, 数据业 务报文是按照局部保护的隧道进行保护切换。  The global protection forwarding table further includes a local protection flag bit and a local protection index, where: when the pseudo line of the main path fails, if the local protection flag is invalid, the data service packet is performed according to the global protection active/standby path. For protection switching, the forwarding label and VC label in the alternate path need to be used for transmission. When the local protection flag is valid, the data is forwarded according to the local protection table. At this time, the VC label is obtained from the global protection table, and the forwarding label is obtained from the local protection table. Obtained, the data service packet is protected and switched according to the locally protected tunnel.

表 2 全局保护转发表 KEY Result Table 2 Global Protection Forwarding Table KEY Result

VPNID 全局保护 Index 局部保护 局部保护 主 PW VC 主 PW 转 备 PW VC 备 PW 转 标记 索引 标签 发标签 标签 发标签  VPNID Global Protection Index Local Protection Local Protection Primary PW VC Primary PW Transfer PW VC Standby PW Transfer Mark Index Label Label Label Label

所述局部保护转发表通常用于在备用隧道有多段隧道组成的情况, 参见 表 3; 用于记录局部保护中伪线及其对应的隧道的主备关系、 各自的出端口 索引以及隧道的出入标签信息,其中该出端口索引用以查找下一跳出端口表。 The local protection forwarding table is generally used when a backup tunnel has multiple tunnels. See Table 3 for recording the active/standby relationship of the pseudowire and its corresponding tunnel in the local protection, the respective outbound port index, and the tunnel access. Tag information, where the egress port index is used to find the next bounce port table.

局部保护表项 Local protection entry

Figure imgf000010_0001
Figure imgf000010_0001

下面结合以一应用实例对上述表格每个项目的内容进行说明  The following describes the contents of each item in the above table in combination with an application example.

图 2为本发明提供的组网示意图, 其中 PE1与 PE2分别为源节点和目标 节点, 其中 P1为主用节点, P2为备用节点, 其中 PE1与 PE2可以通过 PW1 和 PW2来通信, 其中 PW1 包括 PW11和 PW12, 其中 PW11 ( PE1-P1 )和 PW12 ( P1-PE2 ) , PW2包括 PW21 ( PE1-P2 )和 PW22 ( P2-PE2 ) 。 其中: 2 is a schematic diagram of the networking provided by the present invention, where PE1 and PE2 are source nodes and target nodes, respectively, where P1 is the primary node and P2 is the standby node, and PE1 and PE2 can communicate through PW1 and PW2, where PW1 includes PW11 and PW12, where PW11 (PE1-P1) and PW12 (P1-PE2), PW2 include PW21 (PE1-P2) and PW22 (P2-PE2). among them:

PW11的 MPLS TE保护隧道为 Tl ( PE1-P3 )和 T2 ( P3-P1 ) ; The MPLS TE protection tunnels of PW11 are Tl ( PE1-P3 ) and T2 ( P3-P1 ) ;

PW12的 MPLS TE保护隧道为 T3 ( P1-P4 )和 T4 ( P4-PE2 ) 。  The MPLS TE protection tunnels of the PW12 are T3 (P1-P4) and T4 (P4-PE2).

其中可选的, 还可以预先为 PW21和 PW22设置对应的 MPLS TE保护 隧道, 参照图中所示:  Optionally, you can set the corresponding MPLS TE protection tunnel for PW21 and PW22 in advance, as shown in the following figure:

PW21的 MPLS TE保护隧道为 T5 ( PE1-P5 )和 T6 ( P5-P2 ) ;  The MPLS TE protection tunnels of the PW21 are T5 ( PE1-P5 ) and T6 ( P5-P2 ) ;

PW22的 MPLS TE保护隧道为 T7 ( P2-P6 )和 T8 ( P2-PE2 ) 。  The MPLS TE protection tunnels of the PW22 are T7 (P2-P6) and T8 (P2-PE2).

由上可以看出, MPLS TE保护隧道的起始点与每条伪线的起始点相同。 以 PE1设备为例, VPWS转发表里面有全局保护 index, 根据 VPWS转 发表中的全局保护 index查询全局保护表, 可以得到 PW1和 PW2的信息, 其中 PW1的信息包括 P1分配给 PE1的转发标签以及 PE2分配给 PE1的 PW1 的 VC标签; PW2的信息包括 P2分配给 PE1的转发标签以及 PE2分配给 PE1 的 PW2的 VC标签。其中 PW1和 PW2均建立局部保护的保护关系,以 PW11 为例, 隧道 T1和 T2组成的新隧道对 PW11进行保护, 根据全局保护表里的 局部保护 index来查询局部保护表, 它包括用于主用的伪线 PW11以及用于 备用的隧道 Tl。 It can be seen that the starting point of the MPLS TE protection tunnel is the same as the starting point of each pseudo line. The PE1 device is used as an example. The VPWS forwarding table has a global protection index. The global protection table in the VPWS forwarding table is used to query the global protection table. The information about PW1 and PW2 can be obtained. The PW1 information includes the forwarding label assigned by P1 to PE1. PE2 is assigned to the VC label of PW1 of PE1; the information of PW2 includes the forwarding label assigned by P2 to PE1 and the VC label of PW2 allocated by PE2 to PE1. PW1 and PW2 both establish a protection relationship for local protection. Take PW11 as an example. A new tunnel consisting of tunnels T1 and T2 protects PW11. The local protection table is queried according to the local protection index in the global protection table. The pseudowire PW11 used and the tunnel T1 for standby.

对于表 3 , 以 PE1设备为例, 局部保护表项包括主隧道转发标签、 备隧 道转发标签、 主隧道下一跳出端口信息、 备隧道下一跳出端口信息, 隧道 T1 和 Τ2保护 PW11这一段 PW, 局部保护的索引为 Indexl; 隧道 T3和 T4保护 PW12这一段 PW, 局部保护的索引为 Index2。 Indexl表项中包括主隧道转发 标签是 P1分给 PE1的标签, 备隧道转发标签是 P3分给 PE1的标签, 主隧道 下一跳出端口信息是 PE1到 P1 的出端口信息, 备隧道下一跳出端口信息是 PE1到 P3的出端口信息; Index2表项中包括主隧道转发标签是 PE2分给 P1 的标签, 备隧道转发标签是 P4分给 P1的标签, 主隧道下一跳出端口信息是 P1到 PE2的出端口信息,备隧道下一跳出端口信息是 P1到 P4的出端口信息。  For Table 3, the PE1 device is used as an example. The local protection entry includes the primary tunnel forwarding label, the standby tunnel forwarding label, the next hop port information of the primary tunnel, and the next hop port information of the standby tunnel. The tunnel T1 and Τ2 protect the PW11 segment. The index of the local protection is Index1; the tunnels T3 and T4 protect the PW of the PW12, and the index of the local protection is Index2. The Index1 entry includes the primary tunnel forwarding label, which is the label that P1 assigns to PE1. The standby tunnel forwarding label is the label that P3 assigns to PE1. The next-hop outgoing port information of the primary tunnel is the outgoing port information of PE1 to P1. The port information is the outbound port information of PE1 to P3. The index 2 entry includes the label of the primary tunnel forwarding label that is assigned to P1 by PE2. The label of the standby tunnel is the label that P4 assigns to P1. The information of the next outbound port of the primary tunnel is P1. The outgoing port information of PE2, and the information of the next outgoing port of the standby tunnel is the outbound port information of P1 to P4.

在没有全局保护时, 如果没有局部保护, 其中局部保护表里的转发标签 是 P1分配给 PE1的转发标签, 下一跳指向 P1 , 此时报文封装 2层标签进行 转发, 外层转发标签从局部保护表获得, 内层 VC标签从全局保护表获得; 如果有局部保护切换,局部保护表里面转发标签是 P3分配给 PE1的标签,局 部保护保护的内层标签是 P1分配给 PE1的标签,此时报文封装 3层标签进行 转发, 外层 2层标签从局部保护表获得, 分别是 P3分配给 PE1的标签、局部 保护保护的内层标签是 P1分配给 PE1的标签, 内层是 PW1的 VC标签, 从 全局保护表获得, 下一跳指向 P3转发, 从而实现局部保护。  If there is no global protection, if there is no local protection, the forwarding label in the local protection table is the forwarding label assigned by P1 to PE1, and the next hop is directed to P1. At this time, the packet encapsulates the Layer 2 label for forwarding, and the outer forwarding label is localized. The protection table is obtained, the inner VC tag is obtained from the global protection table; if there is local protection switching, the forwarding label in the local protection table is the label assigned by P3 to PE1, and the inner label of the local protection protection is the label assigned by P1 to PE1. The time packet encapsulates the Layer 3 label for forwarding, and the outer layer 2 label is obtained from the local protection table, which is the label assigned by P3 to PE1, the inner label of the local protection protection is the label assigned by P1 to PE1, and the inner layer is the VC of PW1. The label is obtained from the global protection table, and the next hop is directed to P3 forwarding, thereby achieving local protection.

下面分情况进行说明链路的切换方式, :  The following describes the link switching mode:

1 )在 PW11和 PW12均工作正常时, 无需进行链路切换, PE1与 PE2之 间通信的路径为 PW11— PW12;  1) When both PW11 and PW12 are working normally, no link switching is required, and the path of communication between PE1 and PE2 is PW11-PW12;

2 )在 PW11出现故障但 PW12工作正常时, 由于 PW11出现故障, PE1 将数据切换到 PW11的保护隧道进行传输, 在 P1接收到数据后, 由于 PW12 工作正常,仍然釆用 PW12进行传输,所以 PE1与 PE2之间通信的路径为 T1一 T2— PW12; 2) When PW11 fails but PW12 is working normally, PE1 is faulty due to PW11 failure. The data is switched to the PW11 protection tunnel for transmission. After the P1 receives the data, the PW12 is still working, and the PW12 is still used for transmission. Therefore, the path of communication between PE1 and PE2 is T1-T2-PW12.

3)在 PW11工作正常但 PW12出现故障时, 由于 PW11工作正常, 仍然 釆用 PW11进行传输, 在 P1接收到数据后, P1将数据切换到 PW11的保护 隧道进行传输, 由于 PW12出现故障, P1将数据切换到 PW12的保护隧道进 行传输, 所以 PE1与 PE2之间通信的路径为 PW11—T3—T4;  3) When the PW11 is working normally but the PW12 is faulty, the PW11 is still working. The PW11 is still used for transmission. After the P1 receives the data, P1 switches the data to the PW11 protection tunnel for transmission. Because the PW12 fails, P1 will The data is switched to the protection tunnel of PW12 for transmission, so the path of communication between PE1 and PE2 is PW11-T3-T4;

4)在 PW11和 PW12都出现故障时, 由于 PW11出现故障, PE1将数据切 换到 PW11的保护隧道进行传输,在 P1接收到数据后,由于 PW12出现故障, P1将数据切换到 PW12的保护隧道进行传输,所以 PE1与 PE2之间通信的路 径为 T1— T2— T3— T4;  4) When both PW11 and PW12 are faulty, PE1 will switch data to the PW11 protection tunnel for transmission. After P1 receives the data, P1 will switch the data to the PW12 protection tunnel after the PW12 fails. Transmission, so the path of communication between PE1 and PE2 is T1 - T2 - T3 - T4;

5)当 PW11和 PW12中至少一个出现故障且对应的 MPLS TE保护隧道也 出现故障时, 需要使用备用节点来传输, 即通过 PE、 PE2分别与 P2之间的 伪线进行传输, 所以 PE1与 PE2之间通信的路径为 PW21— PW22。  5) When at least one of the PW11 and the PW12 fails and the corresponding MPLS TE protection tunnel also fails, the standby node needs to be used for transmission, that is, the transmission between the PE and PE2 and the P2 is performed, so PE1 and PE2 The path of communication between them is PW21-PW22.

当然, 如果 PW21和 PW22中的至少一个配置有 MPLS TE保护链路, 在 Of course, if at least one of PW21 and PW22 is configured with an MPLS TE protection link,

PW21和 PW22中至少一个出现故障时,可以参照上述情况中的 2至 4进行处 理。 When at least one of PW21 and PW22 fails, it can be handled by referring to 2 to 4 of the above cases.

在本应用实例所示的网络中, 传输数据的方法具体如下:  In the network shown in this application example, the method of transmitting data is as follows:

步骤 201、 在根据网络报文的接入方式判断所收到的网络报文是 VPWS 网络报文后, PE1查找对应的 VPWS转发表项, 其中 VPWS转发表包括全局 保护索引、 PW VC标签和转发标签, ;  Step 201: After determining that the received network packet is a VPWS network packet according to the access mode of the network packet, PE1 searches for a corresponding VPWS forwarding entry, where the VPWS forwarding table includes a global protection index, a PW VC label, and a forwarding. Label, ;

步骤 202、 PE1从该 VPWS转发表项根据所查到的全局保护索引查找全 局保护转发表项;  Step 202: The PE1 searches for the global protection forwarding entry from the VPWS forwarding entry according to the global protection index that is found.

步骤 203、 PE1判断所查到的全局保护转发中局部保护标志位是否置位, 如果是, 进入步骤 204, 否则进入步骤 203;  Step 203, PE1 determines whether the local protection flag in the global protection forwarding is set, if yes, proceeds to step 204, otherwise proceeds to step 203;

步骤 204、 PE1按照只配置有普通 VPWS业务全局保护保护处理的方式 处理所收到的网络报文, 即从伪线 PW11传输到 P1 , 流程结束。  Step 204: The PE1 processes the received network packet in the manner that the global VPWS service global protection protection is configured, that is, the P1 network is transmitted from the PW11 to the P1, and the process ends.

步骤 205、PE1根据所查到的全局保护转发表中局部保护索引查找局部保 护表项,局部保护表项包含下一跳出信息, 以获得 TE主隧道和备用隧道的信 息 (如伪线的出端口和备用隧道的出端口) ; Step 205: The PE1 searches for the partial protection according to the local protection index in the global protection forwarding table that is found. The guard entry, the local protection entry contains the next hop information to obtain the information of the TE primary tunnel and the standby tunnel (such as the outgoing port of the pseudowire and the outgoing port of the standby tunnel);

步骤 206、 PE1对 VPWS业务报文进行封装及转发, 具体包括: 从全局 保护表中获得 VPWS业务的 VC标签, VC标签是通过 LDP协议分配的标签, VPWS业务的转发标签是从局部保护表项中获得标签, 局部保护表项的标签 是通过 RSVP协议分配的标签。 流程结束。  Step 206: The PE1 encapsulates and forwards the VPWS service packet, which includes: obtaining the VC label of the VPWS service from the global protection table, the VC label is a label allocated by the LDP protocol, and the forwarding label of the VPWS service is a local protection entry. The label is obtained, and the label of the local protection entry is a label allocated by the RSVP protocol. The process ends.

同理, P1收到上述内容后可参照上述步骤 201~206的处理流程处理将数 据传输到 PE2, 如果 P1将数据无法传输到 PE2, 则 P1通知 PE1无法传输, 并由 PE1通过与 P2之间的伪线将数据传输到 PE2。  Similarly, after receiving the above content, P1 can refer to the processing flow of steps 201-206 to transfer data to PE2. If P1 cannot transmit data to PE2, P1 notifies PE1 that transmission cannot be performed, and PE1 passes between P2 and P2. The pseudowire transmits data to PE2.

图 3为本发明提供一种虚拟专用网络的链路保护方法实施例的结构示意 图。 结合图 1和 2所示的系统, 图 3所示方法实施例中所述虚拟专用网络中 的发送节点和接收节点均通过伪线与主用转发节点和备用转发节点相连, 形 成所述发送节点、 所述主用转发节点与所述接收节点之间的通路及所述发送 节点、 所述备用转发节点与所述接收节点之间的通路, 该方法包括: FIG. 3 is a schematic structural diagram of an embodiment of a link protection method for a virtual private network according to the present invention. With reference to the systems shown in FIG. 1 and 2, the transmitting node and the receiving node in the virtual private network in the method embodiment shown in FIG. 3 are connected to the primary forwarding node and the standby forwarding node through a pseudowire to form the transmitting node. And a path between the primary forwarding node and the receiving node, and a path between the sending node, the standby forwarding node, and the receiving node, where the method includes:

步骤 301、 为所述伪线中的至少一条伪线设置备用隧道;  Step 301: Set a standby tunnel for at least one pseudowire in the pseudowire.

步骤 302、 当设置有备用隧道的伪线故障时, 将发生故障的伪线承载的 业务切换到所述备用隧道。  Step 302: When a pseudowire fault with the standby tunnel is set, the service carried by the failed pseudowire is switched to the standby tunnel.

其中, 所述方法还包括:  The method further includes:

如果所述发送节点、 所述主用转发节点与所述接收节点之间的通路因故 障断开, 所述发送节点将业务的通路切换为所述发送节点、 所述备用转发节 点与所述接收节点之间的通路。 其中, 本方法实施例中的通路具体介绍如下: 所述发送节点、 所述主用转发节点与所述接收节点之间的通路, 由所述 发送节点与所述主用转发节点之间的伪线或备用隧道, 与所述主用转发节点 与所述接收节点之间的伪线或备用隧道组成;  And if the path between the sending node, the primary forwarding node, and the receiving node is disconnected due to a fault, the sending node switches the path of the service to the sending node, the standby forwarding node, and the receiving The path between nodes. The path in the method embodiment is specifically described as follows: the path between the sending node, the active forwarding node and the receiving node, and the pseudo between the sending node and the active forwarding node a line or backup tunnel, comprising a pseudowire or a standby tunnel between the primary forwarding node and the receiving node;

所述发送节点、 所述备用转发节点与所述接收节点之间的通路, 由所述 发送节点与所述备用转发节点之间的伪线或备用隧道, 与所述主用转发节点 与所述接收节点之间的伪线或备用隧道组成。 a path between the sending node, the standby forwarding node, and the receiving node, a pseudowire or a standby tunnel between the sending node and the standby forwarding node, and the primary forwarding node It consists of a pseudowire or an alternate tunnel between the receiving nodes.

其中, 将发生故障的伪线承载的业务切换到所述备用隧道的步骤包括: 如果所述备用隧道未经过所述虚拟专用网中的路由节点, 根据预先获取 的备用隧道的转发标签将发生故障的伪线承载的业务切换到所述备用隧道; 如果所述备用隧道经过至少一个所述虚拟专用网中的路由节点, 根据预 发生故障的伪线承载的业务切换到所述备用隧道。  The step of switching the service carried by the failed pseudowire to the standby tunnel includes: if the backup tunnel does not pass through the routing node in the virtual private network, the forwarding label according to the pre-acquired standby tunnel will be faulty. The service carried by the pseudowire is switched to the standby tunnel; if the standby tunnel passes through at least one routing node in the virtual private network, the service carried according to the pre-failed pseudowire switches to the standby tunnel.

本发明提供的方法实施例, 通过为伪线设置备用隧道, 在伪线出现故障 时, 切换到该备用的隧道, 实现对传输链路的局部保护, 与现有技术中直接 进行主备转发节点的切换相比, 切换所需的业务处理内容变少了, 从而提高 了切换的速度, 达到迅速切换的目的, 缩短了业务中断的时间。  The method of the present invention provides a backup tunnel for a pseudowire, and when the pseudowire fails, the switch is switched to the standby tunnel to implement local protection on the transmission link, and the active/standby forwarding node is directly implemented in the prior art. Compared with the switching, the business processing content required for the switching is reduced, thereby improving the switching speed, achieving the purpose of rapid switching, and shortening the time of service interruption.

本领域普通技术人员可以理解上述实施例的全部或部分步骤可以使用计 算机程序流程来实现,所述计算机程序可以存储于一计算机可读存储介质中, 所述计算机程序在相应的硬件平台上(如系统、 设备、 装置、 器件等)执行, 在执行时, 包括方法实施例的步骤之一或其组合。 It will be understood by those skilled in the art that all or part of the steps of the above embodiments may be implemented using a computer program flow, which may be stored in a computer readable storage medium, such as on a corresponding hardware platform (eg, The system, device, device, device, etc. are executed, and when executed, include one or a combination of the steps of the method embodiments.

可选地, 上述实施例的全部或部分步骤也可以使用集成电路来实现, 这 些步骤可以被分别制作成一个个集成电路模块, 或者将它们中的多个模块或 步骤制作成单个集成电路模块来实现。 这样, 本发明不限制于任何特定的硬 件和软件结合。  Optionally, all or part of the steps of the foregoing embodiments may also be implemented by using an integrated circuit. These steps may be separately fabricated into individual integrated circuit modules, or multiple modules or steps may be fabricated into a single integrated circuit module. achieve. Thus, the invention is not limited to any particular combination of hardware and software.

上述实施例中的各装置 /功能模块 /功能单元可以釆用通用的计算装置来 实现, 它们可以集中在单个的计算装置上, 也可以分布在多个计算装置所组 成的网络上。  The various devices/function modules/functional units in the above embodiments may be implemented using a general-purpose computing device, which may be centralized on a single computing device or distributed over a network of multiple computing devices.

上述实施例中的各装置 /功能模块 /功能单元以软件功能模块的形式实现 并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。 上述提到的计算机可读取存储介质可以是只读存储器, 磁盘或光盘等。  Each device/function module/functional unit in the above embodiments can be stored in a computer readable storage medium when implemented in the form of a software function module and sold or used as a standalone product. The above mentioned computer readable storage medium may be a read only memory, a magnetic disk or an optical disk or the like.

以上所述, 仅为本发明的具体实施方式, 但本发明的保护范围并不局限 于此, 任何熟悉本技术领域的技术人员在本发明揭露的技术范围内, 可轻易 想到变化或替换, 都应涵盖在本发明的保护范围之内。 因此, 本发明的保护 范围应以权利要求所述的保护范围为准。 The above is only a specific embodiment of the present invention, but the scope of protection of the present invention is not limited thereto, and any person skilled in the art can easily within the technical scope disclosed by the present invention. Any changes or substitutions are contemplated as being within the scope of the invention. Therefore, the scope of the invention should be determined by the scope of the claims.

工业实用性 Industrial applicability

本发明提供的技术方案, 通过为伪线设置备用隧道, 在伪线出现故障时, 切换到该备用的隧道, 实现对传输链路的局部保护, 与现有技术中直接进行 主备转发节点的切换相比, 切换所需的业务处理内容变少了, 从而提高了切 换的速度, 达到迅速切换的目的, 缩短了业务中断的时间, 具有^ L强的工业 实用性。  The technical solution provided by the present invention, by setting a backup tunnel for a pseudowire, to switch to the standby tunnel when the pseudowire fails, and implementing local protection for the transmission link, and directly performing the active/standby forwarding node in the prior art. Compared with the switching, the business processing content required for the switching is reduced, thereby improving the switching speed, achieving the purpose of rapid switching, shortening the time of service interruption, and having strong industrial applicability.

Claims

权 利 要 求 书 Claim 1、 一种虚拟专用网络的链路保护方法, 所述虚拟专用网络中的发送节点 和接收节点均通过伪线与主用转发节点和备用转发节点相连, 形成所述发送 节点、 所述主用转发节点与所述接收节点之间的通路及所述发送节点、 所述 备用转发节点与所述接收节点之间的通路, 该方法包括: A link protection method for a virtual private network, where a sending node and a receiving node in the virtual private network are connected to an active forwarding node and a standby forwarding node by using a pseudowire to form the sending node and the primary node. a path between the forwarding node and the receiving node, and a path between the sending node, the standby forwarding node, and the receiving node, where the method includes: 为所述伪线中的至少一条伪线设置备用隧道;  Setting a standby tunnel for at least one of the pseudowires; 当设置有备用隧道的伪线故障时, 将发生故障的伪线承载的业务切换到 所述备用隧道。  When a pseudowire failure of the standby tunnel is set, the service carried by the failed pseudowire is switched to the standby tunnel. 2、 根据权利要求 1所述的链路保护方法, 该方法还包括: 2. The link protection method according to claim 1, further comprising: 如果所述发送节点、 所述主用转发节点与所述接收节点之间的通路因故 障断开, 所述发送节点将业务的通路切换为所述发送节点、 所述备用转发节 点与所述接收节点之间的通路。  And if the path between the sending node, the primary forwarding node, and the receiving node is disconnected due to a fault, the sending node switches the path of the service to the sending node, the standby forwarding node, and the receiving The path between nodes. 3、 根据权利要求 2所述的链路保护方法, 其中: 3. The link protection method according to claim 2, wherein: 所述发送节点、 所述主用转发节点与所述接收节点之间的通路, 由所述 发送节点与所述主用转发节点之间的伪线或备用隧道, 与所述主用转发节点 与所述接收节点之间的伪线或备用隧道组成;  a path between the sending node, the primary forwarding node, and the receiving node, a pseudowire or a standby tunnel between the sending node and the primary forwarding node, and the primary forwarding node a pseudowire or an alternate tunnel between the receiving nodes; 所述发送节点、 所述备用转发节点与所述接收节点之间的通路, 由所述 发送节点与所述备用转发节点之间的伪线或备用隧道, 与所述主用转发节点 与所述接收节点之间的伪线或备用隧道组成。  a path between the sending node, the standby forwarding node, and the receiving node, a pseudowire or a standby tunnel between the sending node and the standby forwarding node, and the primary forwarding node and the A pseudowire or alternate tunnel consisting of receiving nodes. 4、 根据权利要求 1至 3任一所述的链路保护方法, 其中, 将发生故障的 伪线承载的业务切换到所述备用隧道的步骤包括: The link protection method according to any one of claims 1 to 3, wherein the step of switching the service carried by the failed pseudowire to the standby tunnel comprises: 如果所述备用隧道未经过所述虚拟专用网中的路由节点, 根据预先获取 的备用隧道的转发标签将发生故障的伪线承载的业务切换到所述备用隧道。  If the standby tunnel does not pass through the routing node in the virtual private network, the service carried by the failed pseudowire is switched to the standby tunnel according to the forwarding label of the pre-acquired standby tunnel. 5、 根据权利要求 1至 3任一所述的链路保护方法, 其中, 将发生故障的 伪线承载的业务切换到所述备用隧道的步骤包括: The link protection method according to any one of claims 1 to 3, wherein the step of switching the service carried by the failed pseudowire to the standby tunnel comprises: 如果所述备用隧道经过至少一个所述虚拟专用网中的路由节点, 根据预 发生故障的伪线承载的业务切换到所述备用隧道。 If the standby tunnel passes through at least one routing node in the virtual private network, according to the pre- The service carried by the failed pseudowire switches to the standby tunnel. 6、 一种虚拟专用网络的链路保护系统, 所述虚拟专用网络中的发送节点 和接收节点均通过伪线与主用转发节点和备用转发节点相连, 形成所述发送 节点、 所述主用转发节点与所述接收节点之间的通路及所述发送节点、 所述 备用转发节点与所述接收节点之间的通路, 该系统包括设置模块和第一切换 模块, 其中: A link protection system for a virtual private network, wherein the sending node and the receiving node in the virtual private network are connected to the primary forwarding node and the standby forwarding node by using a pseudowire to form the sending node and the primary node. a path between the forwarding node and the receiving node and a path between the sending node, the standby forwarding node, and the receiving node, the system comprising a setting module and a first switching module, where: 所述设置模块设置成: 为所述伪线中的至少一条伪线设置备用隧道; 所述第一切换模块设置成: 当设置有备用隧道的伪线故障时, 将发生故 障的伪线承载的业务切换到所述备用隧道。  The setting module is configured to: set a standby tunnel for at least one pseudowire in the pseudowire; the first switching module is configured to: when a pseudowire fault of the standby tunnel is set, the faulty pseudowire is carried The service switches to the standby tunnel. 7、 根据权利要求 6所述的链路保护系统, 该系统还包括第二切换模块, 所述第二切换模块设置成: 在所述发送节点、 所述主用转发节点与所述 接收节点之间的通路因故障断开时, 将业务的通路切换为所述发送节点、 所 述备用转发节点与所述接收节点之间的通路; 7. The link protection system according to claim 6, further comprising a second switching module, wherein the second switching module is configured to: at the transmitting node, the primary forwarding node, and the receiving node When the path between the two is disconnected due to a fault, the path of the service is switched to the path between the sending node, the standby forwarding node, and the receiving node; 所述第二切换模块部署在所述发送节点上。  The second switching module is deployed on the sending node. 8、 根据权利要求 7所述的链路保护系统, 其中: 8. The link protection system according to claim 7, wherein: 所述发送节点、 所述主用转发节点与所述接收节点之间的通路, 由所述 发送节点与所述主用转发节点之间的伪线或备用隧道, 与所述主用转发节点 与所述接收节点之间的伪线或备用隧道组成;  a path between the sending node, the primary forwarding node, and the receiving node, a pseudowire or a standby tunnel between the sending node and the primary forwarding node, and the primary forwarding node a pseudowire or an alternate tunnel between the receiving nodes; 所述发送节点、 所述备用转发节点与所述接收节点之间的通路, 由所述 发送节点与所述备用转发节点之间的伪线或备用隧道, 与所述主用转发节点 与所述接收节点之间的伪线或备用隧道组成。  a path between the sending node, the standby forwarding node, and the receiving node, a pseudowire or a standby tunnel between the sending node and the standby forwarding node, and the primary forwarding node and the A pseudowire or alternate tunnel consisting of receiving nodes. 9、 根据权利要求 6至 8任一项所述的链路保护系统, 其中: 所述第一切 换模块设置成按照以下方式将发生故障的伪线承载的业务切换到所述备用隧 道: 在所述备用隧道未经过所述虚拟专用网中的路由节点时, 根据预先获取 的备用隧道的转发标签将发生故障的伪线承载的业务切换到所述备用隧道。 The link protection system according to any one of claims 6 to 8, wherein: the first switching module is configured to switch the service carried by the failed pseudowire to the standby tunnel in the following manner: When the standby tunnel does not pass through the routing node in the virtual private network, according to the pre-acquisition The forwarding label of the standby tunnel switches the service carried by the failed pseudowire to the standby tunnel. 10、 根据权利要求 6至 8任一所述的链路保护系统, 其中: 所述第一切 换模块设置成按照以下方式将发生故障的伪线承载的业务切换到所述备用隧 道: 在所述备用隧道经过至少一个所述虚拟专用网中的路由节点时, 根据预 发生故障的伪线承载的业务切换到所述备用隧道。 10. The link protection system according to any one of claims 6 to 8, wherein: the first switching module is configured to switch the service carried by the failed pseudowire to the standby tunnel in the following manner: When the standby tunnel passes through at least one routing node in the virtual private network, the service carried according to the pre-failed pseudowire switches to the standby tunnel.
PCT/CN2011/077802 2010-12-17 2011-07-29 Method and system for link protection in a virtual private network Ceased WO2012079375A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010594648.8A CN102035681B (en) 2010-12-17 2010-12-17 Link protection method and system for virtual private network
CN201010594648.8 2010-12-17

Publications (1)

Publication Number Publication Date
WO2012079375A1 true WO2012079375A1 (en) 2012-06-21

Family

ID=43888048

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/077802 Ceased WO2012079375A1 (en) 2010-12-17 2011-07-29 Method and system for link protection in a virtual private network

Country Status (2)

Country Link
CN (1) CN102035681B (en)
WO (1) WO2012079375A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019056922A1 (en) * 2017-09-22 2019-03-28 烽火通信科技股份有限公司 Fast rerouting-based vpws bypass protection switching method and system
CN115801552A (en) * 2021-09-10 2023-03-14 华为技术有限公司 Protection switching method and network equipment

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102035681B (en) * 2010-12-17 2015-07-22 中兴通讯股份有限公司 Link protection method and system for virtual private network
CN102282805B (en) * 2011-05-26 2014-04-02 华为技术有限公司 A service protection method and access device
CN102255759B (en) * 2011-08-16 2015-05-20 杭州华三通信技术有限公司 Method and device for transmitting data message based on PW (Packet Writing) redundant backup
CN102572905A (en) * 2012-01-09 2012-07-11 中兴通讯股份有限公司 Dual-homing protection switching method and system
CN102769561B (en) * 2012-06-28 2015-05-27 华为技术有限公司 Method and system for reducing packet loss in service protection scheme
CN104348719A (en) * 2013-07-29 2015-02-11 中兴通讯股份有限公司 Method for data forwarding processing and device
CN105791072A (en) * 2014-12-22 2016-07-20 华为数字技术(苏州)有限公司 Access method and device of Ethernet virtual network
CN104753722B (en) * 2015-04-08 2018-01-02 烽火通信科技股份有限公司 A kind of DNI PW realization method and systems quickly switched
CN104796331B (en) * 2015-04-29 2018-02-16 烽火通信科技股份有限公司 A kind of method that single-swap system realizes LSP and VC layered protections
CN107995008B (en) * 2016-10-27 2021-07-06 中兴通讯股份有限公司 A service alarm processing method, device and system
CN109698781B (en) * 2018-12-20 2021-10-29 新华三技术有限公司 Management method of message forwarding path and PE (provider edge) equipment
CN109768925B (en) * 2019-03-27 2021-05-25 新华三技术有限公司 Method and device for switching active/standby pseudo wires
CN112995026A (en) * 2019-12-13 2021-06-18 中兴通讯股份有限公司 Link protection method, device, entry node and storage medium
CN112532515A (en) * 2020-12-21 2021-03-19 安徽皖通邮电股份有限公司 E1-based service line switching method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101137974A (en) * 2003-10-07 2008-03-05 思科技术公司 Enhanced handover for MPLS fast reroute
CN101316225A (en) * 2007-05-30 2008-12-03 华为技术有限公司 A fault detection method, communication system and label switching router
CN101834773A (en) * 2010-03-30 2010-09-15 中兴通讯股份有限公司 Protection method and system of virtual private LAN (Local Area Network) service (VPLS)
CN102035681A (en) * 2010-12-17 2011-04-27 中兴通讯股份有限公司 Link protection method and system for virtual private network

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101645836B (en) * 2009-08-25 2012-04-18 杭州华三通信技术有限公司 Packet transmission method and device in multi-protocol label switching network
CN101667970B (en) * 2009-10-23 2012-09-26 杭州华三通信技术有限公司 Protection switching method and equipment thereof
CN101902396A (en) * 2010-06-18 2010-12-01 中兴通讯股份有限公司 A method and system for tunnel protection in multi-protocol label switching traffic engineering

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101137974A (en) * 2003-10-07 2008-03-05 思科技术公司 Enhanced handover for MPLS fast reroute
CN101316225A (en) * 2007-05-30 2008-12-03 华为技术有限公司 A fault detection method, communication system and label switching router
CN101834773A (en) * 2010-03-30 2010-09-15 中兴通讯股份有限公司 Protection method and system of virtual private LAN (Local Area Network) service (VPLS)
CN102035681A (en) * 2010-12-17 2011-04-27 中兴通讯股份有限公司 Link protection method and system for virtual private network

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019056922A1 (en) * 2017-09-22 2019-03-28 烽火通信科技股份有限公司 Fast rerouting-based vpws bypass protection switching method and system
CN115801552A (en) * 2021-09-10 2023-03-14 华为技术有限公司 Protection switching method and network equipment

Also Published As

Publication number Publication date
CN102035681B (en) 2015-07-22
CN102035681A (en) 2011-04-27

Similar Documents

Publication Publication Date Title
WO2012079375A1 (en) Method and system for link protection in a virtual private network
JP4729119B2 (en) Communication device in label switching network
CN102664788B (en) CE dual-homed link protection method in MPLS L3VPN and system thereof
CN104426763B (en) Tunnel switching method, device and interchanger
CN103368843B (en) The OAM label switched path of the quick heavy-route of protected label switched path
CN100518135C (en) Method for renewing route in multi protocol label exchanging network
WO2011060667A1 (en) Method and device for link protection in virtual private local area network
US20130272114A1 (en) Pseudo wire switching method and device
US20120236730A1 (en) Method, device and system for processing service traffic based on pseudo wires
CN101217470B (en) Method and device for forwarding message
WO2012028029A1 (en) Switching method and system
WO2007016834A1 (en) A fast convergence method of point to point services and the provider edge device thereof
WO2008083590A1 (en) Method and apparatus of rapid convergence of point-to-point service
CN101753464A (en) Routing convergence method, provider edge devices and virtual private network system
CN101364927A (en) Method, device and system for realizing fault recovery of virtual private network VPN
CN102315967B (en) Intermediate node protection method for multicast label switched path and device
CN101355486A (en) Method, device and system for routing switching
WO2011076029A1 (en) Method and apparatus for implementing fast reroute
CN101159690A (en) Multi-protocol label switching forwarding method, device and label switching path management module
WO2012016458A1 (en) Method and apparatus for data transmission in layer 2 virtual private network
CN102143060B (en) Method and device for building primary pseudowire and spare pseudowire
CN100527683C (en) Failure protecting method and system
CN100531136C (en) Method and system for transmitting message in virtual special network link fault
WO2011140923A1 (en) Method and apparatus for establishing label switch path
CN101848159B (en) Three-layer VPN route resetting method and device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11848518

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11848518

Country of ref document: EP

Kind code of ref document: A1