[go: up one dir, main page]

WO2013010399A1 - Tunnel protection configuration method and system in network management system - Google Patents

Tunnel protection configuration method and system in network management system Download PDF

Info

Publication number
WO2013010399A1
WO2013010399A1 PCT/CN2012/075808 CN2012075808W WO2013010399A1 WO 2013010399 A1 WO2013010399 A1 WO 2013010399A1 CN 2012075808 W CN2012075808 W CN 2012075808W WO 2013010399 A1 WO2013010399 A1 WO 2013010399A1
Authority
WO
WIPO (PCT)
Prior art keywords
tunnel
protection
network management
management system
port
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2012/075808
Other languages
French (fr)
Chinese (zh)
Inventor
陈冬平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Publication of WO2013010399A1 publication Critical patent/WO2013010399A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/34Signalling channels for network management communication

Definitions

  • the technical solutions adopted by the present invention include:
  • a protection point generation module which is used to generate a protection point
  • the created tunnel information is stored in a special tunnel information table, and the dedicated tunnel information is The table is stored in the database.
  • FIG. 1 is a schematic flow chart of a tunnel protection configuration method in a network management system according to the present invention. The method of the present invention will be described in detail below with reference to FIG. 1 and the difference between the method of the present invention and the conventional technical solution.
  • the server receives the created tunnel command and the packet sent by the client, and transmits the packet to the adapter.
  • the adapter creates the work and protects the two tunnels, sends the packet to the device, and waits for the device to answer.
  • Equipment at After the correct response within the specified time the adapter sends a notification to the synchronization module (the synchronization module is used for data synchronization between the network management system and the device), performs the warehousing operation, and completes the entire tunnel creation process.
  • the TP table in the database needs to be searched to obtain the tunnel information that has been created. Because the TP table not only stores the tunnel information, but also stores all the information about the board, PTP (physical terminal point) information, CTP (connection terminal point) information, FTP (floating terminal point) information, and so on, so that the TP table The number of records is very large. In order to be able to find tunnel information from the TP table, it has to use an iterative query algorithm (need to create a series of operations such as iterators, iterative queries, and delete iterators).
  • the tunnel on which the protection point depends is only displayed in a very simple manner by the tunnel number, and the working tunnel and the protection tunnel are no longer fixedly attached to the ports of the specific board.
  • the client sends a general configuration packet to create a tunnel protection.
  • the common configuration packet is a general-purpose packet that is applicable to all devices managed by the NMS.
  • the common configuration packet includes: protection type, various protection parameters, and protection relationship. And other information.
  • the server converts it to a F-port packet, and then transmits the converted F-port packet to the adapter.
  • the adapter then converts the F-port packet to a Qx packet and sends it to the device. After the device responds normally, the server puts the F-port packet into the database and completes the entire tunnel protection creation process.
  • the server receives the created tunnel command and the packet sent by the client, and transmits the packet to the adapter.
  • the adapter creates the work and protects the two tunnels, and sends the packet to the device and waits for the device to answer. After the device responds correctly within the specified time, the adapter sends a notification to the synchronization module to perform the inbound operation and complete the entire tunnel creation process.
  • the server When the server receives the PTN linear 1+1 path protection command from the client, it invokes the common configuration framework and starts the process of dynamically generating the protection point. In the process of dynamically generating protection points, all the already created ones can be obtained by looking up the special tunnel information table in the database. Tunnel information.
  • the user can choose the protection type, here select PTN linear 1+1 path protection.
  • the user can configure various protection parameters, such as: return mode, recovery waiting time and other parameters.
  • the client collects all the configurations selected by the user, including the protection type, various protection parameters, and protection relationships, and constructs a complete common configuration packet and sends it to the server. .
  • the server converts it to a F-port packet, and then transmits the converted F-port packet to the adapter.
  • the adapter then converts the F-port packet to a Qx packet and sends it to the device.
  • the server enters the F-port packet and completes the entire tunnel protection creation process. Finally, the PTN linear 1+1 path protection is successfully created.
  • the tunnel protection configuration system in the network management system of the present invention includes a tunnel creation module 201, a protection point generation module 202, a tunnel protection creation module 203, and a database 204. .
  • the tunnel creation module 201 is configured to create a tunnel, and the created tunnel includes a working tunnel and a protection tunnel. The created tunnel is not fixed under the port of the board.
  • the protection point generation module 202 is configured to generate a protection point.
  • the tunnel protection creation module 203 is used to create tunnel protection.
  • the tunnel to which the tunnel protection depends is no longer fixedly attached to the port of the specific board, first, it conforms to the TMF standard organization, and secondly, it can adapt to the port migration and extraction of the project.
  • the board operation requirements do not need to change the tunnel protection service that was created after a series of complicated operations, which greatly improves the ease of use and maintainability of the network management.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Disclosed is a tunnel protection configuration method in a network management system, comprising: creating a tunnel, the tunnel being not fixedly affiliated to a port of a board; generating a protection point; and creating tunnel protection. Configuration of tunnel protection services by using the method in the present invention not only conforms to regulations of the TMF organization, but also caters for the engineering requirements on operations of port migration and board unplugging. The created tunnel protection service does not need to be changed, thereby significantly improving the usability and maintainability of the network management. The present invention also provides a tunnel protection configuration system in a network management system, comprising a tunnel creation module, a protection point generation module, a tunnel protection creation module, and a database.

Description

一种网管系统中隧道保护配置方法及系统 技术领域  Tunnel protection configuration method and system in network management system

本发明属于隧道保护技术, 尤其涉及一种网管系统中隧道保护配置方 法及系统。 背景技术  The invention belongs to a tunnel protection technology, and in particular relates to a tunnel protection configuration method and system in a network management system. Background technique

在网管系统隧道保护业务配置过程中, 对于使用传统技术的隧道保护 业务配置, 当配置保护关系需要选择相关隧道时, 由于它依赖的隧道都是 固定挂靠在具体单板的端口之下, 当工程需求上遇到需要进行端口迁移(如 增删端口、 修改端口属性等)或拔板操作时, 相关端口和单板属性都进行 了变更, 相应地, 固定挂靠在具体单板端口之下的隧道以及相关隧道保护 业务都必须随之变更。 由于配置隧道保护业务比较复杂, 一般工程应用中, 用户一旦配置好该业务后, 不希望该业务经常变更, 更不希望由于其他变 更引起该隧道保护业务的关联变更。  In the tunnel protection service configuration process of the NMS, for the tunnel protection service configuration using the traditional technology, when the protection relationship needs to be selected, the tunnel that it depends on is fixedly attached to the port of the specific board. When you need to perform port migration (such as adding or deleting ports, modifying port attributes, and so on) or the board is removed, the related ports and boards are changed. The tunnels that are connected to the specific board ports are fixed. The related tunnel protection business must be changed accordingly. Because the tunnel protection service is complex, in a general engineering application, once the user configures the service, the user does not want to change the service frequently, and does not want to change the association of the tunnel protection service due to other changes.

另外, 在 TMF ( TeleManagement Forum )组织对分组传送网 (PTN, Packet Transport Network )描述中, 段层保护、 隧道保护和伪线保护等保护 类型和单板端口的关系都是松散的绑定关系, 这和 MSTP ( Multi-Service Transfer Platform,也即基于 SDH 的多业务传送平台)中通道和端口之间的 固定嵌套关系完全不同。  In addition, in the description of the Packet Transport Network (PTN) of the TMF (Telecom Management Forum), the relationship between the protection type of the layer protection, the tunnel protection, and the pseudowire protection and the board port are loosely bound. This is completely different from the fixed nesting relationship between channels and ports in MSTP (Multi-Service Transfer Platform, also known as SDH-based multi-service transport platform).

综上所述, 传统技术的隧道保护业务配置局限性显而易见: 它既不符 合 TMF组织规定, 又无法适应工程上的端口迁移和拔板操作。 因此, 必须 要对传统技术方案进行优化, 以解决该问题。 发明内容 In summary, the limitations of the traditional technology of tunnel protection service configuration are obvious: it does not meet the TMF organization rules, and can not adapt to port migration and board operations on the project. Therefore, traditional technical solutions must be optimized to solve this problem. Summary of the invention

本发明要解决的技术问题是提供一种网管系统中隧道保护配置方法及 系统, 利用本发明方案来配置隧道保护业务, 既符合 TMF组织规定, 又适 应了工程上的端口迁移和拔板操作需求。  The technical problem to be solved by the present invention is to provide a tunnel protection configuration method and system in a network management system, and use the solution of the present invention to configure a tunnel protection service, which not only meets the TMF organization regulations, but also adapts to the port migration and drawing operation requirements of the project. .

为解决上述技术问题, 本发明所釆用的技术方案包括:  In order to solve the above technical problems, the technical solutions adopted by the present invention include:

一种网管系统中隧道保护配置方法, 包括:  A tunnel protection configuration method in a network management system includes:

创建隧道, 所述隧道不固定挂靠在单板的端口之下;  A tunnel is created, and the tunnel is not fixed under the port of the board;

生成保护点;  Generate a protection point;

创建隧道保护。  Create tunnel protection.

其中, 所述隧道包括工作隧道和保护隧道。  The tunnel includes a working tunnel and a protection tunnel.

其中, 所述创建隧道时, 客户端界面下发的创建隧道报文是符合多协 议标签交换 ( MPLS , Multi-Protocol Label Switching ) 中的标签交换路径 ( LSP, Label Switching Path )规范的一种报文, 该报文携带的隧道号码不 固定挂靠在具体单板的端口之下。  The tunneling packet sent by the client interface is a type of packet conforming to the label switching path (LSP) specification in the multi-protocol label switching (MPLS). The tunnel number carried in the packet is not fixed on the port of the specific board.

其中, 已创建的隧道信息存放于专门的隧道信息表中;  The created tunnel information is stored in a special tunnel information table.

所述生成保护点时, 通过查找所述专门的隧道信息表获得已创建的隧 道信息。  When the protection point is generated, the created tunnel information is obtained by searching the special tunnel information table.

一种网管系统中隧道保护配置系统, 包括:  A tunnel protection configuration system in a network management system includes:

隧道创建模块, 该模块用于创建隧道, 所述隧道不固定挂靠在单板的 端口之下;  a tunnel creation module, where the module is used to create a tunnel, and the tunnel is not fixed under the port of the board;

保护点生成模块, 该模块用于生成保护点;  a protection point generation module, which is used to generate a protection point;

隧道保护创建模块, 该模块用于创建隧道保护。  The tunnel protection creates a module that is used to create tunnel protection.

其中, 所述隧道包括工作隧道和保护隧道。  The tunnel includes a working tunnel and a protection tunnel.

其中, 本发明网管系统中隧道保护配置系统还包括数据库;  The tunnel protection configuration system in the network management system of the present invention further includes a database;

已创建的隧道信息存放于专门的隧道信息表中, 所述专门的隧道信息 表存放于所述数据库中。 The created tunnel information is stored in a special tunnel information table, and the dedicated tunnel information is The table is stored in the database.

本发明的有益效果为:  The beneficial effects of the invention are:

使用本发明技术方案来配置隧道保护业务, 由于隧道保护所依赖的隧 道不再固定挂靠在具体单板的端口之下, 所以, 首先, 它符合 TMF标准组 织的规定, 其次, 能适应工程上的端口迁移和拔板操作需求, 不用改变原 来经过一系列复杂操作后创建好的隧道保护业务, 极大地提高了网管的易 用性和可维护性。  The tunnel protection service is configured by using the technical solution of the present invention. The tunnel that the tunnel protection depends on is no longer fixedly attached to the port of the specific board. Therefore, first, it conforms to the TMF standard organization, and secondly, it can adapt to the engineering. The port migration and disk-drawing operation requirements do not need to change the tunnel protection service that was created after a series of complicated operations, which greatly improves the ease of use and maintainability of the network management.

另外, 釆用本发明技术方案, 在动态生成保护点过程中, 不需要查找 数据库中十分庞大的 TP (终端点)表, 而只需要简单查找专门的隧道信息 表就可以获取已经创建好的隧道信息。 由于专门的隧道信息表只存储了隧 道信息, 所以隧道信息表的记录数比较小; 而且在查库时, 不需要使用迭 代查询算法进行查找, 也不需要使用层速率等信息, 只需要根据网元信息 进行简单过滤即可; 因此查找效率得到了很大提升。 附图说明  In addition, by using the technical solution of the present invention, in the process of dynamically generating a protection point, it is not necessary to look up a very large TP (Terminal Point) table in the database, and only need to simply find a special tunnel information table to obtain the already created tunnel. information. Since the special tunnel information table only stores the tunnel information, the number of records in the tunnel information table is relatively small; and when the database is checked, it is not necessary to use the iterative query algorithm for searching, and the layer rate and other information are not needed, only according to the network. The meta-information can be simply filtered; therefore, the search efficiency is greatly improved. DRAWINGS

图 1为本发明网管系统中隧道保护配置方法的流程示意图;  1 is a schematic flowchart of a tunnel protection configuration method in a network management system according to the present invention;

图 2为本发明网管系统中隧道保护配置系统的结构示意图。 具体实施方式  2 is a schematic structural diagram of a tunnel protection configuration system in a network management system according to the present invention. detailed description

下面结合附图和具体实施方式对本发明作进一步详细说明。  The present invention will be further described in detail below in conjunction with the drawings and specific embodiments.

图 1为本发明网管系统中隧道保护配置方法流程示意图,下面结合图 1 以及本发明方法与传统技术方案的差别来详细描述本发明方法。  1 is a schematic flow chart of a tunnel protection configuration method in a network management system according to the present invention. The method of the present invention will be described in detail below with reference to FIG. 1 and the difference between the method of the present invention and the conventional technical solution.

如图所示, 本发明网管系统中隧道保护配置方法包括如下步骤: 1 : 创建隧道  As shown in the figure, the tunnel protection configuration method in the network management system of the present invention includes the following steps: 1 : Creating a tunnel

服务器端接收客户端下发的创建隧道命令和报文, 透传给适配器, 适 配器创建工作和保护两条隧道, 下发报文给设备并等待设备应答。 设备在 规定时间内正确应答后, 适配器发送通知给同步模块(同步模块用于网管 系统和设备之间的数据同步), 进行入库操作, 完成整个隧道创建过程。 The server receives the created tunnel command and the packet sent by the client, and transmits the packet to the adapter. The adapter creates the work and protects the two tunnels, sends the packet to the device, and waits for the device to answer. Equipment at After the correct response within the specified time, the adapter sends a notification to the synchronization module (the synchronization module is used for data synchronization between the network management system and the device), performs the warehousing operation, and completes the entire tunnel creation process.

在传统技术方案中, 创建隧道时, 客户端界面下发创建隧道报文携带 的隧道号码固定挂靠在具体单板的端口之下。  In the traditional solution, when a tunnel is created, the tunnel number carried in the tunnel is sent to the port of the specific board.

根据本发明方法, 创建隧道时, 客户端界面下发的创建隧道报文是符 合多协议标签交换(MPLS , Multi-Protocol Label Switching ) 中的标签交换 路径(LSP, Label Switching Path )规范的一种报文, 该报文携带的隧道号 码不再固定挂靠在具体单板的端口之下。 釆用本发明方法, 创建的隧道不 再固定挂靠在具体单板的端口之下, 隧道和单板端口的关系是松散的绑定 关系。  According to the method of the present invention, when a tunnel is created, the tunneling packet sent by the client interface is in accordance with the label switching path (LSP) specification in the Multi-Protocol Label Switching (MPLS). The tunnel number of the packet is no longer fixed under the port of the specific board. The tunnel created by the method of the present invention is not fixedly connected to the port of the specific board. The relationship between the tunnel and the board port is loose.

2: 生成保护点  2: Generate a protection point

服务器端接收到客户端下发的创建隧道保护命令时, 调用通用配置框 架, 开始启动动态生成保护点过程。 在动态生成保护点过程中, 需要查找 数据库, 以便获取创建隧道保护所必须的、 并且已经创建好的隧道信息。  When the server receives the Create Tunnel Protection command from the client, it invokes the common configuration frame and starts the process of dynamically generating the protection point. In the process of dynamically generating a protection point, you need to find the database to obtain the tunnel information that is necessary for creating tunnel protection and has been created.

根据传统技术方案, 在动态生成保护点过程中, 需要查找数据库中 TP 表, 以获取已经创建好的隧道信息。 由于 TP表不但存储了隧道信息, 还存 储了所有单板信息、 PTP (物理终端点)信息、 CTP (连接终端点)信息、 FTP (浮动终端点)信息等等许多信息记录,使得 TP表的记录数非常庞大。 为了能够从 TP表查找出隧道信息, 不得不使用迭代查询算法(需要进行创 建迭代器、 迭代查询、 删除迭代器等一系列操作)进行查找。 而且, 在迭 代查询过程中, 必须将网元和层速率等信息结合起来一起作为过滤条件进 行查询。 显然, 使用这种迭代查询算法比较复杂, 而且, 迭代查询算法本 身也经常暴露出各种问题。 当数据量很大时, 使用这种迭代查询算法效率 也不高。  According to the conventional technical solution, in the process of dynamically generating a protection point, the TP table in the database needs to be searched to obtain the tunnel information that has been created. Because the TP table not only stores the tunnel information, but also stores all the information about the board, PTP (physical terminal point) information, CTP (connection terminal point) information, FTP (floating terminal point) information, and so on, so that the TP table The number of records is very large. In order to be able to find tunnel information from the TP table, it has to use an iterative query algorithm (need to create a series of operations such as iterators, iterative queries, and delete iterators). Moreover, in the iterative query process, information such as network elements and layer rates must be combined together as a filter condition for querying. Obviously, the use of this iterative query algorithm is more complicated, and the iterative query algorithm itself often exposes various problems. When the amount of data is large, the use of this iterative query algorithm is not efficient.

釆用本发明方法, 使用专门的隧道信息表来存放已经创建好的隧道信 息, 在动态生成保护点过程中, 不再需要查找数据库中 TP表, 而只需要查 找专门的隧道信息表就可以获取已经创建好的隧道信息。 由于专门的隧道 信息表只存储了隧道信息, 所以隧道信息表的记录数不大, 不需要使用迭 代查询算法进行查找; 而且, 也不需要层速率等信息, 只需要根据网元信 息进行过滤即可。 显然, 这样查找起来既简单又高效。 Using the method of the present invention, a dedicated tunnel information table is used to store the tunnel letter that has been created. In the process of dynamically generating a protection point, it is no longer necessary to look up the TP table in the database, but only need to find a special tunnel information table to obtain the already created tunnel information. Since the tunnel information table only stores the tunnel information, the number of records in the tunnel information table is not large, and it is not necessary to use an iterative query algorithm for searching. Moreover, information such as the layer rate is not required, and only filtering according to the network element information is required. can. Obviously, this is simple and efficient to find.

釆用本发明方法, 保护点所依赖的隧道只是非常简洁地以隧道号展现 出来, 工作隧道和保护隧道不再固定挂靠在具体单板的端口之下。  With the method of the present invention, the tunnel on which the protection point depends is only displayed in a very simple manner by the tunnel number, and the working tunnel and the protection tunnel are no longer fixedly attached to the ports of the specific board.

3: 创建隧道保护  3: Create tunnel protection

客户端下发创建隧道保护通用配置报文, 通用配置报文是对网管系统 管理的所有设备都适用的一种通用报文, 该通用配置报文包括: 保护类型、 各种保护参数以及保护关系等信息。 服务器端接收到该通用配置报文后, 将其转换为 F口报文,然后将转换后的 F口报文传给适配器。适配器再将 F 口报文转换为 Qx报文下发给设备。等到设备正常应答后,服务器端将 F口 报文入库并完成整个隧道保护创建过程。  The client sends a general configuration packet to create a tunnel protection. The common configuration packet is a general-purpose packet that is applicable to all devices managed by the NMS. The common configuration packet includes: protection type, various protection parameters, and protection relationship. And other information. After receiving the general configuration packet, the server converts it to a F-port packet, and then transmits the converted F-port packet to the adapter. The adapter then converts the F-port packet to a Qx packet and sends it to the device. After the device responds normally, the server puts the F-port packet into the database and completes the entire tunnel protection creation process.

下面再以配置 PTN线性 1+1路径保护整个流程为具体实例对本发明方 法做进一步详细描述:  The following describes the method of the present invention in further detail by configuring the entire process of PTN linear 1+1 path protection as a specific example:

1 : 创建隧道  1 : Create a tunnel

服务器端接收客户端下发的创建隧道命令和报文, 透传给适配器, 适 配器创建工作和保护两条隧道, 下发报文给设备并等待设备应答。 设备在 规定时间内正确应答后, 适配器发送通知给同步模块, 进行入库操作, 完 成整个隧道创建过程。  The server receives the created tunnel command and the packet sent by the client, and transmits the packet to the adapter. The adapter creates the work and protects the two tunnels, and sends the packet to the device and waits for the device to answer. After the device responds correctly within the specified time, the adapter sends a notification to the synchronization module to perform the inbound operation and complete the entire tunnel creation process.

2: 生成保护点  2: Generate a protection point

服务器端接收到客户端下发的创建 PTN线性 1+1路径保护命令时, 调用通用配置框架, 开始启动动态生成保护点过程。 在动态生成保护点过 程中, 通过查找数据库中专门的隧道信息表就可以获取已经创建好的所有 隧道信息。 When the server receives the PTN linear 1+1 path protection command from the client, it invokes the common configuration framework and starts the process of dynamically generating the protection point. In the process of dynamically generating protection points, all the already created ones can be obtained by looking up the special tunnel information table in the database. Tunnel information.

3: 创建隧道保护  3: Create tunnel protection

首先, 进入新建保护关系组界面, 用户可以选择保护类型, 这里选择 PTN线性 1+1路径保护。  First, enter the new protection relationship group interface, the user can choose the protection type, here select PTN linear 1+1 path protection.

接着, 进入保护参数界面, 用户可以配置各种保护参数, 如: 返回方 式、 恢复等待时间等一系列参数。  Then, enter the protection parameter interface, the user can configure various protection parameters, such as: return mode, recovery waiting time and other parameters.

然后, 进入保护关系界面。 用户可以在保护点中选择工作和保护隧道。 最后, 用户点击 "完成" 按钮, 此时, 客户端收集以上用户选择的所 有配置, 包括保护类型、 各种保护参数以及保护关系等信息, 构造成一条 完整的通用配置报文, 下发给服务器。 服务器端接收到该通用配置报文后, 将其转换为 F口报文,然后将转换后的 F口报文传给适配器。适配器再将 F 口报文转换为 Qx报文下发给设备。等到设备正常应答后,服务器端将 F口 报文入库并完成整个隧道保护创建过程, 最终成功创建好 PTN线性 1+1路 径保护。  Then, enter the protection relationship interface. Users can select work and protection tunnels in the protection point. Finally, the user clicks the "Complete" button. At this time, the client collects all the configurations selected by the user, including the protection type, various protection parameters, and protection relationships, and constructs a complete common configuration packet and sends it to the server. . After receiving the general configuration packet, the server converts it to a F-port packet, and then transmits the converted F-port packet to the adapter. The adapter then converts the F-port packet to a Qx packet and sends it to the device. After the device responds normally, the server enters the F-port packet and completes the entire tunnel protection creation process. Finally, the PTN linear 1+1 path protection is successfully created.

图 2为本发明网管系统中隧道保护配置系统结构示意图, 如图所示, 本发明网管系统中隧道保护配置系统, 包括隧道创建模块 201、保护点生成 模块 202、 隧道保护创建模块 203和数据库 204。  2 is a schematic structural diagram of a tunnel protection configuration system in the network management system of the present invention. As shown in the figure, the tunnel protection configuration system in the network management system of the present invention includes a tunnel creation module 201, a protection point generation module 202, a tunnel protection creation module 203, and a database 204. .

其中, 隧道创建模块 201 用于创建隧道, 创建的隧道包括工作隧道和 保护隧道, 创建的隧道不固定挂靠在单板的端口之下。  The tunnel creation module 201 is configured to create a tunnel, and the created tunnel includes a working tunnel and a protection tunnel. The created tunnel is not fixed under the port of the board.

保护点生成模块 202用于生成保护点。  The protection point generation module 202 is configured to generate a protection point.

隧道保护创建模块 203用于创建隧道保护。  The tunnel protection creation module 203 is used to create tunnel protection.

数据库 204用于存放专门的隧道信息表, 该隧道信息表中存放已创建 的隧道信息。  The database 204 is configured to store a special tunnel information table, where the created tunnel information is stored in the tunnel information table.

本发明网管系统中隧道保护配置系统的具体实施方案可参见以上对本 发明网管系统中隧道保护配置方法的描述, 此处不再赘述。 以上所述的具体实施例, 对本发明的目的、 技术方案和有益效果进行 了进一步详细说明, 所应注意的是, 以上所述仅为本发明的具体实施例而 已, 本领域的技术人员可以对本发明进行各种改动和变型而不脱离本发明 的精神和范围。 这样, 倘若本发明的这些修改和变型属于本发明权利要求 记载的技术方案及其等同技术的范围之内, 则本发明也意图包含这些改动 和变型在内。 For a specific implementation of the tunnel protection configuration system in the network management system of the present invention, refer to the foregoing description of the tunnel protection configuration method in the network management system of the present invention, and details are not described herein again. The specific embodiments of the present invention have been described in detail with reference to the embodiments of the present invention. It should be noted that the foregoing description is only specific embodiments of the present invention, and those skilled in the art may Various changes and modifications of the invention are possible without departing from the spirit and scope of the invention. Therefore, it is intended that the present invention cover the modifications and variations of the present invention, and the modifications and variations of the invention are intended to be included within the scope of the invention.

工业实用性  Industrial applicability

通过本发明的技术方案, 由于隧道保护所依赖的隧道不再固定挂靠在 具体单板的端口之下, 所以, 首先, 它符合 TMF标准组织的规定, 其次, 能适应工程上的端口迁移和拔板操作需求, 不用改变原来经过一系列复杂 操作后创建好的隧道保护业务, 极大地提高了网管的易用性和可维护性。  With the technical solution of the present invention, since the tunnel to which the tunnel protection depends is no longer fixedly attached to the port of the specific board, first, it conforms to the TMF standard organization, and secondly, it can adapt to the port migration and extraction of the project. The board operation requirements do not need to change the tunnel protection service that was created after a series of complicated operations, which greatly improves the ease of use and maintainability of the network management.

Claims

权利要求书 Claim 1、 一种网管系统中隧道保护配置方法, 其中, 所述方法包括: 创建隧道, 所述隧道不固定挂靠在单板的端口之下;  A method for configuring a tunnel protection in a network management system, where the method includes: creating a tunnel, where the tunnel is not fixed under the port of the board; 生成保护点;  Generate a protection point; 创建隧道保护。  Create tunnel protection. 2、 根据权利要求 1所述的网管系统中隧道保护配置方法, 其中, 所述 隧道包括工作隧道和保护隧道。  The tunnel protection configuration method in the network management system according to claim 1, wherein the tunnel includes a working tunnel and a protection tunnel. 3、 根据权利要求 1或 2所述的网管系统中隧道保护配置方法, 其中, 所述创建隧道时, 客户端界面下发的创建隧道报文是符合多协议标签交换 MPLS中的标签交换路径 LSP规范的一种报文, 该报文携带的隧道号码不 固定挂靠在具体单板的端口之下。  The tunnel protection configuration method in the network management system according to claim 1 or 2, wherein, when the tunnel is created, the tunneling packet sent by the client interface is in accordance with the label switching path LSP in the multi-protocol label switching MPLS. A packet of the specified type. The tunnel number carried in the packet is not fixed on the port of the specific board. 4、 根据权利要求 1或 2所述的网管系统中隧道保护配置方法, 其中, 已创建的隧道信息存放于专门的隧道信息表中;  The tunnel protection configuration method in the network management system according to claim 1 or 2, wherein the created tunnel information is stored in a special tunnel information table; 所述生成保护点时, 通过查找所述专门的隧道信息表获得已创建的隧 道信息。  When the protection point is generated, the created tunnel information is obtained by searching the special tunnel information table. 5、 一种网管系统中隧道保护配置系统, 其中, 包括:  5. A tunnel protection configuration system in a network management system, wherein: 隧道创建模块, 用于创建隧道, 所述隧道不固定挂靠在单板的端口之 下;  a tunnel creation module, configured to create a tunnel, where the tunnel is not fixed under the port of the board; 保护点生成模块, 用于生成保护点;  a protection point generating module, configured to generate a protection point; 隧道保护创建模块, 用于创建隧道保护。  A tunnel protection creation module is used to create tunnel protection. 6、 根据权利要求 5所述的网管系统中隧道保护配置系统, 其中, 所述 隧道包括工作隧道和保护隧道。  6. The tunnel protection configuration system in a network management system according to claim 5, wherein the tunnel comprises a working tunnel and a protection tunnel. 7、 根据权利要求 5或 6所述的网管系统中隧道保护配置系统, 其中, 还包括数据库;  The tunnel protection configuration system in the network management system according to claim 5 or 6, further comprising a database; 已创建的隧道信息存放于专门的隧道信息表中, 所述专门的隧道信息 表存放于所述数据库中 The created tunnel information is stored in a special tunnel information table, and the dedicated tunnel information is The table is stored in the database
PCT/CN2012/075808 2011-07-19 2012-05-21 Tunnel protection configuration method and system in network management system Ceased WO2013010399A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201110201942.2A CN102891760B (en) 2011-07-19 2011-07-19 Tunnel protection configuration method and system in a kind of network management system
CN201110201942.2 2011-07-19

Publications (1)

Publication Number Publication Date
WO2013010399A1 true WO2013010399A1 (en) 2013-01-24

Family

ID=47535136

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2012/075808 Ceased WO2013010399A1 (en) 2011-07-19 2012-05-21 Tunnel protection configuration method and system in network management system

Country Status (2)

Country Link
CN (1) CN102891760B (en)
WO (1) WO2013010399A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105099748A (en) * 2014-05-23 2015-11-25 中兴通讯股份有限公司 Method and system for migrating business tunnel
CN105634856B (en) * 2014-11-21 2020-03-31 中兴通讯股份有限公司 Method and device for determining service performance parameters
CN106301869B (en) * 2015-06-24 2020-02-04 中兴通讯股份有限公司 Method and device for establishing PTN service cutover plan

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1622555A (en) * 2003-11-27 2005-06-01 上海贝尔阿尔卡特股份有限公司 Port dynamic binding module for media gateway and dynamic binding method thereof
CN101984591A (en) * 2010-10-13 2011-03-09 中兴通讯股份有限公司 Service convergence method and system in transport-multiprotocol label switching network

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101394260B (en) * 2007-09-17 2011-06-08 华为技术有限公司 Method and apparatus for realizing main standby inverting and load sharing
CN101404613B (en) * 2008-11-20 2011-04-20 华为技术有限公司 Data protection method and device
CN101605083B (en) * 2009-07-15 2012-01-25 中兴通讯股份有限公司 Method and device for discovering protective sub-network of looped network
CN102035712B (en) * 2009-09-29 2013-12-18 华为技术有限公司 Multiprotocol label exchanged ring network protection method, device and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1622555A (en) * 2003-11-27 2005-06-01 上海贝尔阿尔卡特股份有限公司 Port dynamic binding module for media gateway and dynamic binding method thereof
CN101984591A (en) * 2010-10-13 2011-03-09 中兴通讯股份有限公司 Service convergence method and system in transport-multiprotocol label switching network

Also Published As

Publication number Publication date
CN102891760A (en) 2013-01-23
CN102891760B (en) 2017-11-10

Similar Documents

Publication Publication Date Title
CN103763129B (en) A kind of PCIe equipment management method and device
WO2011011951A1 (en) Method and system for printing dealing voucher
CN101876984A (en) Data management system and data relation query method and device thereof
CN110138579B (en) Configuration method and related device of user side equipment
CN107710196A (en) A kind of method and system for managing resource object
WO2009056039A1 (en) A METHOD AND DEVICE FOR REALIZING AUTOMATICAL DISTRIBUTION OF QinQ BUSINESS LABEL TERMINAL TO TERMINAL
WO2018010555A1 (en) Northbound interface lte service automatic configuration method, northbound interface apparatus, and storage medium
WO2019223178A1 (en) Cross-platform task scheduling method and system, computer device, and storage medium
CN104378240A (en) Method for flexibly customizing topology view for monitoring
CN102131205B (en) Network management method and system used for multimode system
CN113709250B (en) Cross-domain user data synchronization method based on subscription transmission mode
WO2013010399A1 (en) Tunnel protection configuration method and system in network management system
CN101848110B (en) TR069 network management method and equipment
CN103368764B (en) The implementation method and Network Management System of a kind of virtual network
CN103368969A (en) Method and system for transmission management of EML-NML total configuration synchronization
CN103036715A (en) Method and device of equipment management and corresponding network management system
WO2016091013A1 (en) Method and device for service processing
CN102752158A (en) Business flow monitoring method and device
US20150236918A1 (en) Method and system for creating single snmp table for multiple openflow tables
US20080109540A1 (en) Method and System for Distributing Software Components
CN103200029A (en) Label distribution and management method of PTN/IPRan equipment through network management
CN112468600A (en) Application message notification method, system and storage medium based on network matrix
CN106612207B (en) Method and device for managing and controlling RSTP information of Ethernet equipment
CN102014034B (en) Layering virtual network based on tree virtual local area network (VLAN) and configuration method thereof
CN100401684C (en) A method for the network management layer to implement information management through the network element management layer

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12815039

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12815039

Country of ref document: EP

Kind code of ref document: A1