WO2016177186A1 - Bandwidth protection method and device - Google Patents
Bandwidth protection method and device Download PDFInfo
- Publication number
- WO2016177186A1 WO2016177186A1 PCT/CN2016/077575 CN2016077575W WO2016177186A1 WO 2016177186 A1 WO2016177186 A1 WO 2016177186A1 CN 2016077575 W CN2016077575 W CN 2016077575W WO 2016177186 A1 WO2016177186 A1 WO 2016177186A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- tunnel
- bandwidth
- group
- node
- lsp
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
- H04L47/82—Miscellaneous aspects
- H04L47/825—Involving tunnels, e.g. MPLS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0654—Management of faults, events, alarms or notifications using network fault recovery
- H04L41/0668—Management of faults, events, alarms or notifications using network fault recovery by dynamic selection of recovery network elements, e.g. replacement by the most appropriate element after failure
Definitions
- the present invention relates to the field of communications, and in particular to a method and apparatus for bandwidth protection.
- MPLS-TE Multi-Protocol Label Switching-Traffic Engineering
- RSVP-TE Resource ReSerVation Protocol-Traffic Engineering
- the RSVP-TE protocol through the extension of RFC3209, can establish a Label Switching Path (LSP) with bandwidth and QOS guarantee. It is also called a tunnel and is used to carry various upper-layer services.
- LSP Label Switching Path
- the IP network as a multi-service unified bearer must reach the level of the traditional telecommunication network in terms of reliability.
- the TE-FRR Traffic Engineering-Fast Re-Route
- the protection interaction and the protocol interactions at each stage of the handover are clearly stated in RFC4090, and how the tunnel is required to provide bandwidth protection.
- the basic principle of TE fast reroute is to establish a tunnel in advance to protect one or more tunnels.
- the tunnel established in advance is called a backup tunnel.
- the protected tunnel is called the primary tunnel.
- the backup tunnel is used to bypass the failed link or node, so that the service carried by the primary tunnel is not interrupted.
- the primary tunnel needs fast reroute protection, you need to configure the fast reroute attribute, which is specified by fast route (Fast Reroute0 object).
- FIG. 1 is a schematic diagram of link protection and node protection in the related art. As shown in FIG. 1 , two protection modes, link protection and node protection of fast re-routing are defined in the protocol.
- the path through which the primary tunnel Tunnel1 passes is R1-R2-R3-R4, and the route between R1-R2 is the L12-1 link.
- the path through which the backup tunnel Tunnel2 passes is R1-R2, and the L12-2 link is taken.
- the path that the backup tunnel Tunnel3 passes is R2-R4.
- Tunnel 2 is configured to protect the link of the primary tunnel, and protects the L12-1 link of the primary tunnel.
- the backup tunnel Tunnel3 protects the primary tunnel from the node protection.
- the backup bandwidth of the backup tunnel needs to be greater than or equal to the total bandwidth of all the protected primary tunnels. After the primary tunnel is switched to the backup tunnel, the bandwidth requirement of the primary tunnel bearer service can be met.
- a link or a node protected by a backup tunnel usually has multiple primary tunnels. There may be multiple label switched paths (LSPs) in each tunnel. These LSPs all need to form bandwidth protection, and both need to occupy a part of the backup bandwidth from the backup tunnel. A sharing mechanism without backup bandwidth may result in some of the primary tunnels not being protected by bandwidth. Specifically:
- the primary tunnel has two LSPs, the LSP1 path is R1-R2-R3-R4, and the LSP2 path is R1-R2- R4 (where R2 and R4 pass the link L24-1), the required bandwidth is 50M, the path of the backup tunnel Tunnel3 is R2-R4 (where R2 and R4 pass the link L24-2), and the backup bandwidth is 100M.
- the backup tunnel can protect the R3 node of LSP1 of Tunnel1 from failing and the L24-1 link of LSP2 is invalid. The bandwidth is deducted by 50M. The remaining backup bandwidth of the backup tunnel is 0. Other tunnels also pass through the R3 node or L24-1 link. Unable to get bandwidth protection.
- FIG 3 is a schematic diagram of multiple tunnels protected by a backup tunnel in the related art.
- the primary tunnels Tunnel1 and Tunnel2 each have an LSP, and the paths are R1-R2-R3-R4 and R1-R2-R4 (where R2 and R4 passes through link L24-1), and the required bandwidth is 50M.
- the path of the backup tunnel Tunnel3 is R2-R4 (where R2 and R4 pass the link L24-2), and the backup bandwidth is 100M.
- the backup tunnel can protect the R3 node of Tunnel1 from failing and the L24-1 link of Tunnel1 is invalid. The bandwidth is deducted by 50M. The remaining backup bandwidth of the backup tunnel is 0. Other tunnels also pass through the R3 node or L24-1 link. Bandwidth protection.
- the backup bandwidth resource utilization rate is not high, and the tunnel cannot obtain effective bandwidth protection.
- the tunnel cannot obtain effective bandwidth protection.
- the present invention provides a method and an apparatus for bandwidth protection, so as to at least solve the problem that the backup bandwidth resource utilization is not high and the tunnel cannot obtain effective bandwidth protection in the related art.
- a method for bandwidth protection including: a node establishes an active/standby tunnel according to a signaling interaction; and the node sends a tunnel according to a service relationship between the tunnel of the active and standby tunnels and between the tunnels.
- the information is shared to the downstream node, where the service relationship indicates that only one tunnel carries the traffic at the same time, or the service relationship indicates that the LSP bearer service traffic of the multiple label switching path LSPs in the tunnel at the same time;
- the tunnel sharing information includes a tunnel group or an LSP group that shares the backup bandwidth with each other.
- the tunnel sharing information is used to indicate that the downstream node preferentially uses the backup bandwidth that has been used by the tunnel group or the LSP group.
- the signaling includes:
- the resource reservation protocol RSVP-TE based on the traffic engineering extension.
- the tunnel sharing information carries a tunnel group or an LSP group that mutually share the backup bandwidth in the form of a triplet TLV.
- a method for bandwidth protection including:
- the node on the tunnel receives the tunnel sharing information sent by the upstream node, where the service relationship indicates that only one tunnel carries the traffic at the same time, or the service relationship indicates that only one label switching path LSP in the tunnel has only one time at the same time.
- the LSP carries service traffic; wherein the tunnel sharing information includes a tunnel sharing mutual backup bandwidth Road group or LSP group;
- the node preferentially uses the backup bandwidth that the tunnel group or the LSP group has used.
- the node after the node preferentially uses the backup bandwidth that has been used by the tunnel group or the LSP group,
- the backup bandwidth of the backup bandwidth is insufficient.
- the node after the node preferentially uses the backup bandwidth that has been used by the tunnel group or the LSP group,
- the node sends the tunnel sharing information to a downstream node.
- the tunnel sharing information carries a tunnel group or an LSP group that mutually share the backup bandwidth in the form of a triplet TLV.
- a device for bandwidth protection including:
- the first sending module is configured to send the tunnel sharing information to the downstream node according to the service relationship between the tunnel in the active and standby tunnels and the tunnel, where the service relationship indicates that only one tunnel carries the traffic at the same time.
- the service relationship is that the LSP bearer service traffic of the multiple label switching path LSPs in the tunnel is the same time;
- the tunnel sharing information includes a tunnel group or an LSP group that shares the backup bandwidth with each other.
- the shared information is used to indicate that the downstream node preferentially uses the backup bandwidth that the tunnel group or the LSP group has used.
- a device for bandwidth protection including:
- the receiving module is configured to receive, by the node on the tunnel, the tunnel sharing information sent by the upstream node, where the service relationship indicates that only one tunnel carries service traffic at the same time, or the service relationship indicates multiple label switching paths in the tunnel.
- the LSP carries the traffic of the LSP at the same time;
- the tunnel sharing information includes a tunnel group or an LSP group that shares the backup bandwidth with each other;
- the sharing module is configured to preferentially use the backup bandwidth that the node group or the LSP group has used.
- the second sending module is configured to send the tunnel sharing information to the downstream node after the node preferentially uses the backup bandwidth that has been used by the tunnel group or the LSP group.
- the node establishes an active/standby tunnel according to the signaling interaction; the node sends the tunnel sharing information to the downstream node according to the service relationship between the tunnel in the active and standby tunnels and the tunnel, wherein the service relationship indicates the same Only one tunnel carries service traffic at a time, or the service relationship indicates that only one of the LSP bearer service traffic is LSPs at the same time in the tunnel; wherein the tunnel sharing information includes a tunnel group sharing the backup bandwidth with each other. Or the LSP group, the tunnel sharing information is used to indicate that the downstream node preferentially uses the backup bandwidth that has been used by the tunnel group or the LSP group, and solves the problem that the backup bandwidth resource utilization is not high and the tunnel cannot obtain effective bandwidth protection. The maximum utilization of limited backup bandwidth resources is realized, and the tunnel is effectively protected by bandwidth.
- FIG. 1 is a schematic diagram of link protection and node protection in the related art
- FIG. 2 is a schematic diagram of multiple LSPs in a backup tunnel protection tunnel in the related art
- FIG. 3 is a schematic diagram of multiple tunnels protected by a backup tunnel in the related art
- FIG. 4 is a flowchart 1 of a method for bandwidth protection according to an embodiment of the present invention.
- FIG. 5 is a second flowchart of a method for bandwidth protection according to an embodiment of the present invention.
- FIG. 6 is a structural block diagram 1 of a device for bandwidth protection according to an embodiment of the present invention.
- FIG. 7 is a structural block diagram 2 of a device for bandwidth protection according to an embodiment of the present invention.
- FIG. 8 is a first schematic diagram of protection of a shared bandwidth link between tunnels and tunnels according to a preferred embodiment of the present invention.
- FIG. 9 is a second schematic diagram of shared bandwidth link protection between tunnels and tunnels according to a preferred embodiment of the present invention.
- FIG. 10 is a schematic diagram of shared bandwidth protection of a hybrid protection scenario in accordance with a preferred embodiment of the present invention.
- FIG. 4 is a flowchart 1 of a method for bandwidth protection according to an embodiment of the present invention. As shown in FIG. 4, the process includes the following steps:
- Step S402 the node establishes an active/standby tunnel according to the signaling interaction
- Step S404 The node sends the tunnel sharing information to the downstream node according to the service relationship between the tunnel in the active and standby tunnels and the tunnel, where the service relationship indicates that only one tunnel carries the traffic at the same time, or the service relationship is
- the LSPs of the multiple label switching paths in the tunnel indicate that the LSP carries the traffic of the LSP at the same time.
- the tunnel sharing information includes a tunnel group or an LSP group that shares the backup bandwidth. The tunnel sharing information is used to indicate that the downstream node preferentially uses the Backup bandwidth used by the tunnel group or LSP group.
- the node establishes an active/standby tunnel according to the signaling interaction, according to the tunnel in the active and standby tunnels and between the tunnels.
- the node sends the tunnel sharing information to the downstream node, solves the problem that the backup bandwidth resource utilization is not high, and the tunnel cannot obtain the effective bandwidth protection.
- the maximum utilization of the limited backup bandwidth resource is realized, and the tunnel is effectively bandwidth-protected.
- the signaling includes: an instruction of a resource reservation protocol RSVP-TE based on a traffic engineering extension.
- the tunnel sharing information carries a tunnel group or an LSP group that mutually share the backup bandwidth in the form of a triplet TLV.
- FIG. 5 is a second flowchart of a method for bandwidth protection according to an embodiment of the present invention. As shown in FIG. 5, the process includes the following steps:
- Step S502 The node on the tunnel receives the tunnel sharing information sent by the upstream node, where the service relationship indicates that only one tunnel carries the traffic at the same time, or the service relationship indicates that the multiple label switching paths in the tunnel are only at the same time.
- the LSP carries service traffic; where the tunnel sharing information includes a tunnel group or an LSP group that mutually share the backup bandwidth;
- step S504 the node preferentially uses the backup bandwidth that the tunnel group or the LSP group has used.
- the node on the tunnel receives the tunnel sharing information sent by the upstream node.
- the node preferentially uses the backup bandwidth used by the tunnel group or the LSP group, which solves the problem that the backup bandwidth resource utilization is not high and the tunnel cannot obtain effective bandwidth protection.
- the problem is that the maximum utilization of the limited backup bandwidth resources is realized, and the tunnel is effectively protected by bandwidth.
- the backup bandwidth of the backup bandwidth is insufficient.
- the node after the node preferentially uses the backup bandwidth that has been used by the tunnel group or the LSP group, the node sends the tunnel sharing information to the downstream node.
- the tunnel sharing information carries a tunnel group or an LSP group that mutually share the backup bandwidth in the form of a triplet TLV.
- a device for bandwidth protection is also provided, which is used to implement the foregoing embodiments and preferred embodiments, and details are not described herein.
- the term "module” may implement a combination of software and/or hardware of a predetermined function.
- the apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and contemplated.
- FIG. 6 is a structural block diagram of a device for bandwidth protection according to an embodiment of the present invention. As shown in FIG. 6, the device includes:
- the establishing module 62 is configured to establish, by the node, the active/standby tunnel according to the signaling interaction;
- the first sending module 64 is configured to send the tunnel sharing information to the downstream node according to the service relationship between the tunnel in the active and standby tunnels and the tunnel, where the service relationship indicates that only one tunnel carries the traffic at the same time, or
- the service relationship is that the LSPs of the multiple label switching paths in the tunnel have only one LSP bearer service traffic at a time; wherein the tunnel sharing information includes a tunnel group or an LSP group that shares the backup bandwidth with each other. Indicates that the downstream node preferentially uses the backup bandwidth that the tunnel group or LSP group has used.
- the node establishes an active/standby tunnel according to the signaling interaction, and according to the service relationship between the tunnel in the active and standby tunnels and the tunnel, the node sends the tunnel sharing information to the downstream node, thereby solving the problem that the backup bandwidth resource utilization is not high, and the tunnel is solved.
- the problem of effective bandwidth protection is not obtained, and the maximum utilization of limited backup bandwidth resources is realized, and the tunnel is effectively protected by bandwidth.
- FIG. 7 is a structural block diagram 2 of a device for bandwidth protection according to an embodiment of the present invention. As shown in FIG. 7, the device includes:
- the receiving module 72 is configured to receive, by the node on the tunnel, the tunnel sharing information sent by the upstream node, where the service relationship indicates that only one tunnel carries service traffic at the same time, or the service relationship indicates multiple label switching path LSPs in the tunnel. Only one LSP carries service traffic at the same time; the tunnel sharing information includes a tunnel group or an LSP group that shares the backup bandwidth with each other;
- the sharing module 74 is configured to preferentially use the backup bandwidth that the tunnel group or the LSP group has used.
- the node on the tunnel receives the tunnel sharing information sent by the upstream node, and the node preferentially uses the backup bandwidth used by the tunnel group or the LSP group, which solves the problem that the backup bandwidth resource utilization is not high, and the tunnel cannot obtain effective bandwidth protection.
- the problem is that the maximum utilization of the limited backup bandwidth resources is realized, and the tunnel is effectively protected by bandwidth.
- the apparatus further includes a second sending module, configured to send the tunnel sharing information to the downstream node after the node preferentially uses the backup bandwidth that the tunnel group or the LSP group has used.
- the preferred embodiment provides a method and a mechanism for protecting the backup bandwidth of the TE FRR scenario.
- the method can maximize the use of the limited backup bandwidth and prevent the backup bandwidth from being deducted repeatedly, so that other tunnels cannot obtain effective bandwidth protection.
- the business was interrupted.
- a method of sharing bandwidth protection includes the following steps:
- Step 1 Each node completes the establishment of the active and standby tunnels according to the RSVP-TE signaling interaction.
- Step 2 According to the service relationship between the tunnel and the tunnel, the tunnel head node passes the RSVP-TE message to carry the information that can be shared between the tunnels or the tunnel to carry the downstream node.
- Step 3 After receiving the information that the downstream node can share, the downstream node preferentially uses the backup bandwidth that the node can share.
- step 4 the message is sent to the downstream device, and the information that can be shared is included until the end node of the tunnel.
- the RSVP-TE signaling for establishing the active/standby tunnel in step 1 is an extension defined in RFC3209 and RFC4090.
- the path that needs to be established can be manually configured or delivered from the network management.
- step 2 according to the service relationship in the tunnel or between the tunnels, there is a protection relationship between the tunnels. Only one tunnel carries the traffic at the same time.
- the tunnel sharing information in the step 2 refers to a tunnel group or an LSP group that can share the backup bandwidth with each other.
- the RSVP-TE message of step 2 is an extension of the PATH message in RFC4090. Define a new TLV to indicate the tunnel group and LSP group information that can share the backup bandwidth with each other.
- the downstream of the step 2 refers to the next hop device of the tunnel path, and the path of the tunnel is determined by the tunnel head node configuration policy.
- the priority of the step 3 is that the backup bandwidth shared by the node is used.
- the backup bandwidth used in the tunnel group or the LSP group is preferentially used, and the shared bandwidth is insufficient. Then reapply the insufficient backup bandwidth.
- the message of the step 4 that continues to be sent downstream is the same message as the step 2.
- the shared bandwidth protection method proposed by the preferred embodiment can enable the maximum use of the limited backup bandwidth, so that the same service tunnel group or the LSP group share the backup bandwidth, and the backup bandwidth is repeatedly deducted to make other tunnels. Service is interrupted without effective bandwidth protection.
- Scenario 1 Shared bandwidth link protection scenario in the tunnel
- FIG. 8 is a schematic diagram of the protection of the shared bandwidth link between the tunnels and the tunnels according to a preferred embodiment of the present invention.
- Tunnel 1 there are two primary tunnels Tunnel 1 and Tunnel 2 at the R1 node, and Tunnel 1 has two LSPs and one LSP 1 path.
- R1-R2-R3-R4 where the R2--1 link between R2-R3
- the bandwidth to be protected is 50M
- the other LSP2 path is R1-R2-R3-R4 (where R2-R3 is between On the L23-3 link, the bandwidth to be protected is 50 Mbps.
- the LSP 1 is the same as that of Tunnel 1 and the bandwidth to be protected is 50 Mbps.
- the path of the backup tunnel Tunnel3 is R2-R3 (where L2-R3 is between L2-R3) and the backup bandwidth is 100M. From the topology diagram, it can be seen that Tunnel3 can protect the links L23-1 and L23-3 from failure. Link protection, but the backup bandwidth is insufficient to protect the LSPs of LSP1, LSP2, and Tunnel2 of Tunnel1.
- the two LSPs and the LSP2 have only one LSP bearer service at a time.
- the two LSPs can share the backup bandwidth when the FRR protection is formed on the entire path.
- the signaling PATH packet of LSP1 and LSP2 carries the sharing group information, which is the LSP1 and LSP2 information of Tunnel1.
- the R2 node receives the PATH message of LSP1 and checks that there is a shared group information in the packet. However, LSP2 does not form an FRR at this time. Therefore, when LSP1 and Tunnel3 form a protection relationship, you need to apply for a backup bandwidth of 50M to Tunnel3.
- the R2 node receives the PATH information of the LSP2, and checks that the backup bandwidth information can be shared with the LSP1. The backup bandwidth that has been applied for by the LSP1 is used. In this way, LSP1 and LSP2 form a protection relationship with Tunnel3. In total, only 50M backup bandwidth needs to be applied. The remaining 50M backup bandwidth of Tunnel 3 can protect the LSP of Tunnel 2.
- LSP1 and LSP2 of Tunnel1 continue to carry the shared information of both, and the PATH message is along L23-1 and L23-3 respectively.
- the link sends a downstream node R3.
- Tunnel1 (R1-R2-R3-R4, where R2-R3 takes the L23-1 link)
- Tunnel2 (R1-R2-R3-R4, where R2-R3 takes the L23-3 link)
- Tunnel4 Same as the Tunnl1 path, the bandwidth of the three main tunnels needs to be protected at 50M.
- Backup tunnel Tunnel3 path R2-R3 (via L23-2 link), backup bandwidth is 100M.
- Tunnel3 can protect the link L23-1 and L23-3 from being ineffective, and the link protection is insufficient.
- the backup bandwidth is insufficient to protect the LSPs of Tunnel1, Tunnel2, and Tunnel4.
- Tunnel 1 and Tunnel 2 carry the shared group information, which is the tunnel information of Tunnel 1 and Tunnel 2.
- the R2 node receives the PATH message of Tunnel1 and Tunnel2, and checks that the shared group information exists in the packet.
- the two can share the backup bandwidth of 50M.
- the remaining 50M backup bandwidth of Tunnel3 can be used to protect Tunnel4.
- the LSPs of Tunnel1 and Tunnel2 continue to carry the shared information of the two, and send the downstream node R3 along the L23-1 and L23-3 links through the PATH message.
- Scenario 3 Shared bandwidth node protection scenario in the tunnel
- FIG. 9 is a schematic diagram of a shared bandwidth link protection between tunnels and tunnels according to a preferred embodiment of the present invention.
- Tunnel1 there are two primary tunnels Tunnel1 and Tunnel2 at the R1 node, and Tunnel1 has two LSPs and one LSP1 path.
- the bandwidth to be protected is 50M
- the other LSP2 path is R1-R2-R5-R4, and the bandwidth to be protected is also 50M.
- Tunnel 2 has only one LSP, which is the same as the LSP1 path of Tunnel1.
- the protected bandwidth is 50M.
- the path of the tunnel in the backup tunnel is R2-R4 and the backup bandwidth is 100 M.
- the topology diagram shows that the tunnel 3 can protect the node R3 and the node R5 from failing to form node protection. However, the backup bandwidth is insufficient to protect the LSP1, LSP2, and Tunnel2 of the tunnel1. LSP.
- the two LSPs and the LSP2 have only one LSP bearer service at a time, and the two LSPs can share the backup bandwidth when the FRR protection is formed on the entire path.
- the signaling PATH packet of LSP1 and LSP2 carries the sharing group information, which is the LSP1 and LSP2 information of Tunnel1.
- the R2 node receives the PATH message of LSP1 and LSP2, and checks that the shared group information exists in the packet. When the FRR is formed with Tunnel3, the two can share the backup bandwidth of 50M. The remaining 50M backup bandwidth of Tunnel3 can be used to protect Tunnel2.
- LSP1 and LSP2 of Tunnel1 continue to carry the shared information of both, and are sent to R3 and R5 through the PATH message.
- Tunnel1 There are three main tunnels Tunnel1, Tunnel2, and Tunnel4 on the R1 node, each with an LSP.
- the paths are: Tunnl1 (R1-R2-R3-R4), Tunnel2 (R1-R2-R5-R4), and Tunnel4 is the same as Tunnl1.
- the bandwidth of the three primary tunnels to be protected is 50M.
- the backup tunnel Tunnel3 path R2-R4 has a backup bandwidth of 100M.
- Tunnel3 can protect the failure of node R3 and node R5 to form node protection, but the backup bandwidth is insufficient to protect the LSPs of Tunnel1, Tunnel2, and Tunnel4.
- Tunnel 1 and Tunnel 2 carry the shared group information, which is the tunnel information of Tunnel 1 and Tunnel 2.
- the R2 node receives the PATH message of Tunnel1 and Tunnel2, and checks that the shared group information exists in the packet.
- the two can share the backup bandwidth of 50M.
- the remaining 50M backup bandwidth of Tunnel3 can be used to protect Tunnel4.
- the LSPs of Tunnel 1 and Tunnel 2 continue to carry the shared information of the two and are sent to R3 and R5 through the PATH message.
- FIG. 10 is a schematic diagram of shared bandwidth protection of a hybrid protection scenario according to a preferred embodiment of the present invention.
- -R3-R4-R7 (where R4-R7 is the L47-1 link), the bandwidth to be protected is 50M; the other LSP2 path is R1-R2-R5-R4-R7, (where R4-R7 goes) It is the L47-1 link.
- the bandwidth to be protected is also 50M.
- Tunnel 2 has only one LSP, which is the same as the LSP1 path of Tunnel1.
- the bandwidth to be protected is 50M.
- the path of the tunnel in the backup tunnel is R2-R4 and the backup bandwidth is 100 M.
- the topology diagram shows that the tunnel 3 can protect the node R3 and the node R5 from failing to form node protection. However, the backup bandwidth is insufficient to protect the LSP1, LSP2, and Tunnel2 of the tunnel1.
- the path of the backup tunnel Tunnel4 is R4-R7 (where R4-R7 is the L47-2 link) and the backup bandwidth is 100M. As shown in the otherid2ology, Tunnel 4 can protect the link L47-1 from being faulty and form link protection. However, the backup bandwidth is not sufficient to protect the LSPs of LSP1, LSP2, and Tunnel2 of Tunnel1.
- the two LSPs and the LSP2 have only one LSP bearer service at a time, and the two LSPs can share the backup bandwidth when the FRR protection is formed on the entire path.
- the signaling PATH packet of LSP1 and LSP2 carries the sharing group information, which is the LSP1 and LSP2 information of Tunnel1.
- the R2 node receives the PATH message of LSP1 and LSP2, and checks that the shared group information exists in the packet. When the FRR is formed with Tunnel3, the two can share the backup bandwidth of 50M. The remaining 50M backup bandwidth of Tunnel3 can be used to protect Tunnel2.
- LSP1 and LSP2 of Tunnel1 continue to carry the shared information of both, and are sent to R3 and R5 through the PATH message.
- the two LSPs and the LSP2 have only one LSP bearer service at a time, and the two LSPs can share the backup bandwidth when the FRR protection is formed on the entire path.
- the signaling PATH packet of LSP1 and LSP2 carries the sharing group information, which is the LSP1 and LSP2 information of Tunnel1.
- the R2 node receives the PATH message of LSP1 and LSP2, and checks that there is shared group information in the packet. When forming node protection with Tunnel3, the two can share the backup bandwidth of 50M. The remaining 50M backup bandwidth of Tunnel3 can be used to protect Tunnel2.
- LSP1 and LSP2 of Tunnel1 continue to carry the shared information of both, and are sent to R3 and R5 through the PATH message.
- R3 and R5 continue to send the PATH message carrying the shared information to the R4 node.
- Both the LSP1 and the LSP2 of the R4 node can form a link protection relationship with the tunnel 4 and share the 50M backup. Bandwidth, the remaining 50M backup bandwidth is used to protect the LSP of Tunnel 2.
- LSP1 and LSP2 of Tunnel1 continue to send the PATH message carrying the shared information to the tail node R7 at R4.
- the method according to the above embodiment can be implemented by means of software plus a necessary general hardware platform, and of course, by hardware, but in many cases, the former is A better implementation.
- the technical solution of the present invention which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a storage medium (such as ROM/RAM, disk,
- the optical disc includes a number of instructions for causing a terminal device (which may be a cell phone, a computer, a server, or a network device, etc.) to perform the methods described in various embodiments of the present invention.
- Embodiments of the present invention also provide a storage medium.
- the storage medium may be configured to store program code for performing the method steps of the above embodiment:
- the foregoing storage medium may include, but not limited to, a USB flash drive, a Read-Only Memory (ROM), a Random Access Memory (RAM), a mobile hard disk, and a magnetic memory.
- ROM Read-Only Memory
- RAM Random Access Memory
- a mobile hard disk e.g., a hard disk
- magnetic memory e.g., a hard disk
- the processor performs the method steps of the foregoing embodiments according to the stored program code in the storage medium.
- modules or steps of the present invention described above can be implemented by a general-purpose computing device that can be centralized on a single computing device or distributed across a network of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein. Perform the steps shown or described, or separate them into individual integrated circuit modules, or make multiple modules or steps into a single The integrated circuit module is implemented. Thus, the invention is not limited to any specific combination of hardware and software.
- the node establishes an active/standby tunnel according to the signaling interaction; the node sends the tunnel sharing information to the downstream node according to the service relationship between the tunnel in the active and standby tunnels and the tunnel, where
- the service relationship indicates that only one tunnel carries service traffic at the same time, or the service relationship indicates that only one LSP bearer service traffic is LSP at the same time in the multiple label switching path LSPs in the tunnel; wherein the tunnel sharing information includes A tunnel group or an LSP group that shares the backup bandwidth with each other.
- the tunnel sharing information is used to indicate that the downstream node preferentially uses the backup bandwidth that has been used by the tunnel group or the LSP group, and the utilization of the backup bandwidth resource is not high. The problem of effective bandwidth protection is not achieved, and the maximum utilization of limited backup bandwidth resources is realized, and the tunnel is effectively protected by bandwidth.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
本发明涉及通信领域,具体而言,涉及一种带宽保护的方法及装置。The present invention relates to the field of communications, and in particular to a method and apparatus for bandwidth protection.
基于多协议标签交换的流量工程(Multi-Protocol Label Switching-Traffic Engineering,简称为MPLS-TE)是将流量工程与MPLS模型相结合,主要解决传统路由易造成网络拥塞的一种技术。基于流量工程扩展的资源预留协议(Resource ReSerVation Protocol-Traffic Engineering,简称为RSVP-TE)是实现MPLS-TE技术的一种基于流量工程的资源预留扩展协议。Multi-Protocol Label Switching-Traffic Engineering (MPLS-TE) is a technology that combines traffic engineering with MPLS models to solve network congestion caused by traditional routes. Resource ReSerVation Protocol-Traffic Engineering (RSVP-TE) is a traffic-based resource reservation extension protocol for implementing MPLS-TE technology.
RSVP-TE协议,通过RFC3209的扩展,可以建立一条具有带宽、QOS保证的标签交换路径(Label Switching Path,简称为LSP),也称作为隧道,用于承载各种上层业务。The RSVP-TE protocol, through the extension of RFC3209, can establish a Label Switching Path (LSP) with bandwidth and QOS guarantee. It is also called a tunnel and is used to carry various upper-layer services.
随着网络业务的进一步发展,作为多业务统一承载的IP网络在可靠性方面,必须达到传统电信网络的水平。为了保证MPLS TE网络的可靠性,TE-FRR(Traffic Engineering-Fast Re-Route,简称为TE快速重路由)技术扮演了重要的角色,它是实现网络局部保护的技术之一。在RFC4090中明确阐述了保护形成以及切换各个阶段的协议交互,以及如何表明隧道需要带宽保护。TE快速重路由的基本原理是事先建立好一条隧道来保护一条或者多条隧道,事先建立的隧道称为备份隧道,被保护的隧道称为主隧道。当网络中的某个链路或者节点失效时,利用备份隧道绕过失效的链路或者节点,来达到使主隧道承载的业务不中断。具体的,如果主隧道需要快速重路由保护时,需要配置快速重路由属性,即通过快速路由(Fast Reroute0对象来指定。With the further development of network services, the IP network as a multi-service unified bearer must reach the level of the traditional telecommunication network in terms of reliability. To ensure the reliability of the MPLS TE network, the TE-FRR (Traffic Engineering-Fast Re-Route) technology plays an important role. It is one of the technologies for implementing local protection of the network. The protection interaction and the protocol interactions at each stage of the handover are clearly stated in RFC4090, and how the tunnel is required to provide bandwidth protection. The basic principle of TE fast reroute is to establish a tunnel in advance to protect one or more tunnels. The tunnel established in advance is called a backup tunnel. The protected tunnel is called the primary tunnel. When a link or a node in the network fails, the backup tunnel is used to bypass the failed link or node, so that the service carried by the primary tunnel is not interrupted. Specifically, if the primary tunnel needs fast reroute protection, you need to configure the fast reroute attribute, which is specified by fast route (Fast Reroute0 object).
图1是相关技术中链路保护和节点保护示意图,如图1所示,协议中定义了快速重路由的两种保护方式,链路保护和节点保护。主隧道Tunnel1经过的路径为R1-R2-R3-R4,并且R1-R2之间走的是L12-1链路。对应的备份隧道Tunnel2经过的路径为R1-R2,走L12-2链路;备份隧道Tunnel3经过的路径为R2-R4。对于备份隧道Tunnel2对主隧道Tunnel1形成的是链路保护,保护主隧道的L12-1链路失效;备份隧道Tunnel3对主隧道Tunnel1形成的是节点保护,保护主隧道R3节点失效。FIG. 1 is a schematic diagram of link protection and node protection in the related art. As shown in FIG. 1 , two protection modes, link protection and node protection of fast re-routing are defined in the protocol. The path through which the primary tunnel Tunnel1 passes is R1-R2-R3-R4, and the route between R1-R2 is the L12-1 link. The path through which the backup tunnel Tunnel2 passes is R1-R2, and the L12-2 link is taken. The path that the backup tunnel Tunnel3 passes is R2-R4. For the backup tunnel, Tunnel 2 is configured to protect the link of the primary tunnel, and protects the L12-1 link of the primary tunnel. The backup tunnel Tunnel3 protects the primary tunnel from the node protection.
对于主隧道有带宽保护要求的,备份隧道的备份带宽需要大于或等于所有保护的主隧道的带宽总和,以使主隧道切换至备份隧道之后,能够满足主隧道承载业务的带宽要求。If the primary tunnel has the bandwidth protection requirement, the backup bandwidth of the backup tunnel needs to be greater than or equal to the total bandwidth of all the protected primary tunnels. After the primary tunnel is switched to the backup tunnel, the bandwidth requirement of the primary tunnel bearer service can be met.
一条备份隧道保护的一段链路或者一个节点通常有多条主隧道经过,每条隧道内可能存在多个标签交换路径(LSP)。这些LSP都需要形成带宽保护,都需要从备份隧道上占用一部分备份带宽。没有备份带宽的共享机制,可能导致一部分主隧道得不到带宽保护,具体来说:A link or a node protected by a backup tunnel usually has multiple primary tunnels. There may be multiple label switched paths (LSPs) in each tunnel. These LSPs all need to form bandwidth protection, and both need to occupy a part of the backup bandwidth from the backup tunnel. A sharing mechanism without backup bandwidth may result in some of the primary tunnels not being protected by bandwidth. Specifically:
问题一隧道内未共享:
图2是相关技术中备份隧道保护隧道内多条LSP示意图,如图2所示,主隧道Tunnel1有两条LSP,LSP1经过路径为R1-R2-R3-R4,LSP2经过路径为R1-R2-R4(其中R2与R4经过链路L24-1),所需要的带宽均为50M,备份隧道Tunnel3路径为R2-R4(其中R2与R4经过链路L24-2),备份带宽为100M。备份隧道可以保护Tunnel1的LSP1的R3节点失效和LSP2的L24-1链路失效,带宽各扣除50M,备份隧道剩余备份带宽为0,还存在其他隧道也经过R3节点或者L24-1链路,将无法得到带宽保护。2 is a schematic diagram of multiple LSPs in a backup tunnel protection tunnel in the related art. As shown in FIG. 2, the primary tunnel has two LSPs, the LSP1 path is R1-R2-R3-R4, and the LSP2 path is R1-R2- R4 (where R2 and R4 pass the link L24-1), the required bandwidth is 50M, the path of the backup tunnel Tunnel3 is R2-R4 (where R2 and R4 pass the link L24-2), and the backup bandwidth is 100M. The backup tunnel can protect the R3 node of LSP1 of Tunnel1 from failing and the L24-1 link of LSP2 is invalid. The bandwidth is deducted by 50M. The remaining backup bandwidth of the backup tunnel is 0. Other tunnels also pass through the R3 node or L24-1 link. Unable to get bandwidth protection.
问题二:隧道间未共享:Question 2: Unshared between tunnels:
图3是相关技术中备份隧道保护多条隧道示意图,如图3所示,主隧道Tunnel1和Tunnel2各有一条LSP,路径分别为R1-R2-R3-R4,R1-R2-R4(其中R2与R4经过链路L24-1),所需的带宽均为50M,备份隧道Tunnel3路径为R2-R4(其中R2与R4经过链路L24-2),备份带宽为100M。备份隧道可以保护Tunnel1的R3节点失效和Tunnl2的L24-1链路失效,带宽各扣除50M,备份隧道剩余备份带宽为0,还存在其他隧道也经过R3节点或者L24-1链路,将无法得到带宽保护。Figure 3 is a schematic diagram of multiple tunnels protected by a backup tunnel in the related art. As shown in Figure 3, the primary tunnels Tunnel1 and Tunnel2 each have an LSP, and the paths are R1-R2-R3-R4 and R1-R2-R4 (where R2 and R4 passes through link L24-1), and the required bandwidth is 50M. The path of the backup tunnel Tunnel3 is R2-R4 (where R2 and R4 pass the link L24-2), and the backup bandwidth is 100M. The backup tunnel can protect the R3 node of Tunnel1 from failing and the L24-1 link of Tunnel1 is invalid. The bandwidth is deducted by 50M. The remaining backup bandwidth of the backup tunnel is 0. Other tunnels also pass through the R3 node or L24-1 link. Bandwidth protection.
针对相关技术中,备份带宽资源利用率不高,隧道得不到有效带宽保护的问题,目前还没有有效的解决方案。In the related technology, the backup bandwidth resource utilization rate is not high, and the tunnel cannot obtain effective bandwidth protection. Currently, there is no effective solution.
发明内容Summary of the invention
本发明提供了一种带宽保护的方法及装置,以至少解决相关技术中备份带宽资源利用率不高,隧道得不到有效带宽保护的问题。The present invention provides a method and an apparatus for bandwidth protection, so as to at least solve the problem that the backup bandwidth resource utilization is not high and the tunnel cannot obtain effective bandwidth protection in the related art.
根据本发明的一个实施例,提供了一种带宽保护的方法,包括:节点依据信令交互建立主备隧道;依据所述主备隧道的隧道内以及隧道间的业务关系,所述节点发送隧道共享信息给下游节点,其中,所述业务关系是指示同一时刻只有一条隧道承载业务流量,或者,所述业务关系是指示隧道内多条标签交换路径LSP同一时刻只有一条所述LSP承载业务流量;其中,所述隧道共享信息包括相互共享备份带宽的隧道组或者LSP组,所述隧道共享信息用于指示所述下游节点优先使用所述隧道组或者LSP组已经使用的备份带宽。According to an embodiment of the present invention, a method for bandwidth protection is provided, including: a node establishes an active/standby tunnel according to a signaling interaction; and the node sends a tunnel according to a service relationship between the tunnel of the active and standby tunnels and between the tunnels. The information is shared to the downstream node, where the service relationship indicates that only one tunnel carries the traffic at the same time, or the service relationship indicates that the LSP bearer service traffic of the multiple label switching path LSPs in the tunnel at the same time; The tunnel sharing information includes a tunnel group or an LSP group that shares the backup bandwidth with each other. The tunnel sharing information is used to indicate that the downstream node preferentially uses the backup bandwidth that has been used by the tunnel group or the LSP group.
在本发明的实施例中,所述信令包括:In an embodiment of the invention, the signaling includes:
基于流量工程扩展的资源预留协议RSVP-TE的指令。The resource reservation protocol RSVP-TE based on the traffic engineering extension.
在本发明的实施例中,所述隧道共享信息通过三元组TLV的形式携带相互共享备份带宽的隧道组或者LSP组。In the embodiment of the present invention, the tunnel sharing information carries a tunnel group or an LSP group that mutually share the backup bandwidth in the form of a triplet TLV.
根据本发明的另一个实施例,还提供了一种带宽保护的方法,包括:According to another embodiment of the present invention, a method for bandwidth protection is further provided, including:
隧道上的节点接收上游节点发送的隧道共享信息,其中,所述业务关系是指示同一时刻只有一条隧道承载业务流量,或者,所述业务关系是指示隧道内多条标签交换路径LSP同一时刻只有一条所述LSP承载业务流量;其中,所述隧道共享信息包括相互共享备份带宽的隧 道组或者LSP组;The node on the tunnel receives the tunnel sharing information sent by the upstream node, where the service relationship indicates that only one tunnel carries the traffic at the same time, or the service relationship indicates that only one label switching path LSP in the tunnel has only one time at the same time. The LSP carries service traffic; wherein the tunnel sharing information includes a tunnel sharing mutual backup bandwidth Road group or LSP group;
所述节点优先使用所述隧道组或者LSP组已经使用的备份带宽。The node preferentially uses the backup bandwidth that the tunnel group or the LSP group has used.
在本发明的实施例中,所述节点优先使用所述隧道组或者LSP组已经使用的备份带宽之后,包括,In an embodiment of the present invention, after the node preferentially uses the backup bandwidth that has been used by the tunnel group or the LSP group,
在所述备份带宽不足的情况下,申请所述备份带宽不足部分的备份带宽。In the case that the backup bandwidth is insufficient, the backup bandwidth of the backup bandwidth is insufficient.
在本发明的实施例中,所述节点优先使用所述隧道组或者LSP组已经使用的备份带宽之后,包括,In an embodiment of the present invention, after the node preferentially uses the backup bandwidth that has been used by the tunnel group or the LSP group,
所述节点发送所述隧道共享信息给下游节点。The node sends the tunnel sharing information to a downstream node.
在本发明的实施例中,所述隧道共享信息通过三元组TLV的形式携带相互共享备份带宽的隧道组或者LSP组。In the embodiment of the present invention, the tunnel sharing information carries a tunnel group or an LSP group that mutually share the backup bandwidth in the form of a triplet TLV.
根据本发明的另一个实施例,还提供了一种带宽保护的装置,包括:According to another embodiment of the present invention, a device for bandwidth protection is provided, including:
建立模块,设置为节点依据信令交互建立主备隧道;Establish a module, and set the node to establish an active/standby tunnel according to signaling interaction;
第一发送模块,设置为依据所述主备隧道的隧道内以及隧道间的业务关系,所述节点发送隧道共享信息给下游节点,其中,所述业务关系是指示同一时刻只有一条隧道承载业务流量,或者,所述业务关系是指示隧道内多条标签交换路径LSP同一时刻只有一条所述LSP承载业务流量;其中,所述隧道共享信息包括相互共享备份带宽的隧道组或者LSP组,所述隧道共享信息用于指示所述下游节点优先使用所述隧道组或者LSP组已经使用的备份带宽。The first sending module is configured to send the tunnel sharing information to the downstream node according to the service relationship between the tunnel in the active and standby tunnels and the tunnel, where the service relationship indicates that only one tunnel carries the traffic at the same time. Or, the service relationship is that the LSP bearer service traffic of the multiple label switching path LSPs in the tunnel is the same time; the tunnel sharing information includes a tunnel group or an LSP group that shares the backup bandwidth with each other. The shared information is used to indicate that the downstream node preferentially uses the backup bandwidth that the tunnel group or the LSP group has used.
根据本发明的另一个实施例,还提供了一种带宽保护的装置,包括:According to another embodiment of the present invention, a device for bandwidth protection is provided, including:
接收模块,设置为隧道上的节点接收上游节点发送的隧道共享信息,其中,所述业务关系是指示同一时刻只有一条隧道承载业务流量,或者,所述业务关系是指示隧道内多条标签交换路径LSP同一时刻只有一条所述LSP承载业务流量;其中,所述隧道共享信息包括相互共享备份带宽的隧道组或者LSP组;The receiving module is configured to receive, by the node on the tunnel, the tunnel sharing information sent by the upstream node, where the service relationship indicates that only one tunnel carries service traffic at the same time, or the service relationship indicates multiple label switching paths in the tunnel. The LSP carries the traffic of the LSP at the same time; the tunnel sharing information includes a tunnel group or an LSP group that shares the backup bandwidth with each other;
共享模块,设置为所述节点优先使用所述隧道组或者LSP组已经使用的备份带宽。The sharing module is configured to preferentially use the backup bandwidth that the node group or the LSP group has used.
在本发明的实施例中,第二发送模块,设置为所述节点优先使用所述隧道组或者LSP组已经使用的备份带宽之后,所述节点发送所述隧道共享信息给下游节点。In an embodiment of the present invention, the second sending module is configured to send the tunnel sharing information to the downstream node after the node preferentially uses the backup bandwidth that has been used by the tunnel group or the LSP group.
通过本发明,节点依据信令交互建立主备隧道;依据所述主备隧道的隧道内以及隧道间的业务关系,所述节点发送隧道共享信息给下游节点,其中,所述业务关系是指示同一时刻只有一条隧道承载业务流量,或者,所述业务关系是指示隧道内多条标签交换路径LSP同一时刻只有一条所述LSP承载业务流量;其中,所述隧道共享信息包括相互共享备份带宽的隧道组或者LSP组,所述隧道共享信息用于指示所述下游节点优先使用所述隧道组或者LSP组已经使用的备份带宽,解决了备份带宽资源利用率不高,隧道得不到有效带宽保护的问题,实现了有限备份带宽资源的最大利用,隧道得到有效带宽保护。 According to the present invention, the node establishes an active/standby tunnel according to the signaling interaction; the node sends the tunnel sharing information to the downstream node according to the service relationship between the tunnel in the active and standby tunnels and the tunnel, wherein the service relationship indicates the same Only one tunnel carries service traffic at a time, or the service relationship indicates that only one of the LSP bearer service traffic is LSPs at the same time in the tunnel; wherein the tunnel sharing information includes a tunnel group sharing the backup bandwidth with each other. Or the LSP group, the tunnel sharing information is used to indicate that the downstream node preferentially uses the backup bandwidth that has been used by the tunnel group or the LSP group, and solves the problem that the backup bandwidth resource utilization is not high and the tunnel cannot obtain effective bandwidth protection. The maximum utilization of limited backup bandwidth resources is realized, and the tunnel is effectively protected by bandwidth.
此处所说明的附图用来提供对本发明的进一步理解,构成本申请的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:The drawings described herein are intended to provide a further understanding of the invention, and are intended to be a part of the invention. In the drawing:
图1是相关技术中链路保护和节点保护示意图;1 is a schematic diagram of link protection and node protection in the related art;
图2是相关技术中备份隧道保护隧道内多条LSP示意图;2 is a schematic diagram of multiple LSPs in a backup tunnel protection tunnel in the related art;
图3是相关技术中备份隧道保护多条隧道示意图;3 is a schematic diagram of multiple tunnels protected by a backup tunnel in the related art;
图4是根据本发明实施例的一种带宽保护的方法的流程图一;4 is a
图5是根据本发明实施例的一种带宽保护的方法的流程图二;FIG. 5 is a second flowchart of a method for bandwidth protection according to an embodiment of the present invention; FIG.
图6是根据本发明实施例的一种带宽保护的装置的结构框图一;6 is a structural block diagram 1 of a device for bandwidth protection according to an embodiment of the present invention;
图7是根据本发明实施例的一种带宽保护的装置的结构框图二;7 is a structural block diagram 2 of a device for bandwidth protection according to an embodiment of the present invention;
图8是根据本发明优选实施例的隧道间和隧道内共享带宽链路保护示意图一;8 is a first schematic diagram of protection of a shared bandwidth link between tunnels and tunnels according to a preferred embodiment of the present invention;
图9是根据本发明优选实施例的隧道间和隧道内共享带宽链路保护示意图二;9 is a second schematic diagram of shared bandwidth link protection between tunnels and tunnels according to a preferred embodiment of the present invention;
图10是根据本发明优选实施例的混合保护场景的共享带宽保护示意图。10 is a schematic diagram of shared bandwidth protection of a hybrid protection scenario in accordance with a preferred embodiment of the present invention.
下文中将参考附图并结合实施例来详细说明本发明。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。The invention will be described in detail below with reference to the drawings in conjunction with the embodiments. It should be noted that the embodiments in the present application and the features in the embodiments may be combined with each other without conflict.
需要说明的是,本发明的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。It is to be understood that the terms "first", "second" and the like in the specification and claims of the present invention are used to distinguish similar objects, and are not necessarily used to describe a particular order or order.
在本实施例中提供了一种带宽保护的方法,图4是根据本发明实施例的一种带宽保护的方法的流程图一,如图4所示,该流程包括如下步骤:A method for bandwidth protection is provided in this embodiment. FIG. 4 is a
步骤S402,节点依据信令交互建立主备隧道;Step S402, the node establishes an active/standby tunnel according to the signaling interaction;
步骤S404,依据该主备隧道的隧道内以及隧道间的业务关系,该节点发送隧道共享信息给下游节点,其中,该业务关系是指示同一时刻只有一条隧道承载业务流量,或者,该业务关系是指示隧道内多条标签交换路径LSP同一时刻只有一条该LSP承载业务流量;其中,该隧道共享信息包括相互共享备份带宽的隧道组或者LSP组,该隧道共享信息用于指示该下游节点优先使用该隧道组或者LSP组已经使用的备份带宽。Step S404: The node sends the tunnel sharing information to the downstream node according to the service relationship between the tunnel in the active and standby tunnels and the tunnel, where the service relationship indicates that only one tunnel carries the traffic at the same time, or the service relationship is The LSPs of the multiple label switching paths in the tunnel indicate that the LSP carries the traffic of the LSP at the same time. The tunnel sharing information includes a tunnel group or an LSP group that shares the backup bandwidth. The tunnel sharing information is used to indicate that the downstream node preferentially uses the Backup bandwidth used by the tunnel group or LSP group.
通过上述步骤,节点依据信令交互建立主备隧道,依据该主备隧道的隧道内以及隧道间 的业务关系,该节点发送隧道共享信息给下游节点,解决了备份带宽资源利用率不高,隧道得不到有效带宽保护的问题,实现了有限备份带宽资源的最大利用,隧道得到有效带宽保护。Through the above steps, the node establishes an active/standby tunnel according to the signaling interaction, according to the tunnel in the active and standby tunnels and between the tunnels. In the service relationship, the node sends the tunnel sharing information to the downstream node, solves the problem that the backup bandwidth resource utilization is not high, and the tunnel cannot obtain the effective bandwidth protection. The maximum utilization of the limited backup bandwidth resource is realized, and the tunnel is effectively bandwidth-protected.
在本实施例中,该信令包括:基于流量工程扩展的资源预留协议RSVP-TE的指令。In this embodiment, the signaling includes: an instruction of a resource reservation protocol RSVP-TE based on a traffic engineering extension.
在本实施例中,该隧道共享信息通过三元组TLV的形式携带相互共享备份带宽的隧道组或者LSP组。In this embodiment, the tunnel sharing information carries a tunnel group or an LSP group that mutually share the backup bandwidth in the form of a triplet TLV.
在本实施例中还提供了一种带宽保护的方法,图5是根据本发明实施例的一种带宽保护的方法的流程图二,如图5所示,该流程包括如下步骤:A method for bandwidth protection is also provided in this embodiment. FIG. 5 is a second flowchart of a method for bandwidth protection according to an embodiment of the present invention. As shown in FIG. 5, the process includes the following steps:
步骤S502,隧道上的节点接收上游节点发送的隧道共享信息,其中,该业务关系是指示同一时刻只有一条隧道承载业务流量,或者,该业务关系是指示隧道内多条标签交换路径LSP同一时刻只有一条该LSP承载业务流量;其中,该隧道共享信息包括相互共享备份带宽的隧道组或者LSP组;Step S502: The node on the tunnel receives the tunnel sharing information sent by the upstream node, where the service relationship indicates that only one tunnel carries the traffic at the same time, or the service relationship indicates that the multiple label switching paths in the tunnel are only at the same time. The LSP carries service traffic; where the tunnel sharing information includes a tunnel group or an LSP group that mutually share the backup bandwidth;
步骤S504,该节点优先使用该隧道组或者LSP组已经使用的备份带宽。In step S504, the node preferentially uses the backup bandwidth that the tunnel group or the LSP group has used.
通过上述步骤,隧道上的节点接收上游节点发送的隧道共享信息,该节点优先使用该隧道组或者LSP组已经使用的备份带宽,解决了备份带宽资源利用率不高,隧道得不到有效带宽保护的问题,实现了有限备份带宽资源的最大利用,隧道得到有效带宽保护。Through the above steps, the node on the tunnel receives the tunnel sharing information sent by the upstream node. The node preferentially uses the backup bandwidth used by the tunnel group or the LSP group, which solves the problem that the backup bandwidth resource utilization is not high and the tunnel cannot obtain effective bandwidth protection. The problem is that the maximum utilization of the limited backup bandwidth resources is realized, and the tunnel is effectively protected by bandwidth.
在本实施例中,该节点优先使用该隧道组或者LSP组已经使用的备份带宽之后,在该备份带宽不足的情况下,申请该备份带宽不足部分的备份带宽。In this embodiment, after the node preferentially uses the backup bandwidth that has been used by the tunnel group or the LSP group, if the backup bandwidth is insufficient, the backup bandwidth of the backup bandwidth is insufficient.
在本实施例中,该节点优先使用该隧道组或者LSP组已经使用的备份带宽之后,该节点发送该隧道共享信息给下游节点。In this embodiment, after the node preferentially uses the backup bandwidth that has been used by the tunnel group or the LSP group, the node sends the tunnel sharing information to the downstream node.
在本实施例中,该隧道共享信息通过三元组TLV的形式携带相互共享备份带宽的隧道组或者LSP组。In this embodiment, the tunnel sharing information carries a tunnel group or an LSP group that mutually share the backup bandwidth in the form of a triplet TLV.
在本实施例中还提供了一种带宽保护的装置,该装置用于实现上述实施例及优选实施方式,已经进行过说明的不再赘述。如以下所使用的,术语“模块”可以实现预定功能的软件和/或硬件的组合。尽管以下实施例所描述的装置较佳地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。In the embodiment, a device for bandwidth protection is also provided, which is used to implement the foregoing embodiments and preferred embodiments, and details are not described herein. As used below, the term "module" may implement a combination of software and/or hardware of a predetermined function. Although the apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and contemplated.
图6是根据本发明实施例的一种带宽保护的装置的结构框图一,如图6所示,该装置包括:FIG. 6 is a structural block diagram of a device for bandwidth protection according to an embodiment of the present invention. As shown in FIG. 6, the device includes:
建立模块62,设置为节点依据信令交互建立主备隧道;The establishing module 62 is configured to establish, by the node, the active/standby tunnel according to the signaling interaction;
第一发送模块64,设置为依据该主备隧道的隧道内以及隧道间的业务关系,该节点发送隧道共享信息给下游节点,其中,该业务关系是指示同一时刻只有一条隧道承载业务流量,或者,该业务关系是指示隧道内多条标签交换路径LSP同一时刻只有一条该LSP承载业务流量;其中,该隧道共享信息包括相互共享备份带宽的隧道组或者LSP组,该隧道共享信息用 于指示该下游节点优先使用该隧道组或者LSP组已经使用的备份带宽。The first sending module 64 is configured to send the tunnel sharing information to the downstream node according to the service relationship between the tunnel in the active and standby tunnels and the tunnel, where the service relationship indicates that only one tunnel carries the traffic at the same time, or The service relationship is that the LSPs of the multiple label switching paths in the tunnel have only one LSP bearer service traffic at a time; wherein the tunnel sharing information includes a tunnel group or an LSP group that shares the backup bandwidth with each other. Indicates that the downstream node preferentially uses the backup bandwidth that the tunnel group or LSP group has used.
通过上述装置,节点依据信令交互建立主备隧道,依据该主备隧道的隧道内以及隧道间的业务关系,该节点发送隧道共享信息给下游节点,解决了备份带宽资源利用率不高,隧道得不到有效带宽保护的问题,实现了有限备份带宽资源的最大利用,隧道得到有效带宽保护。Through the foregoing device, the node establishes an active/standby tunnel according to the signaling interaction, and according to the service relationship between the tunnel in the active and standby tunnels and the tunnel, the node sends the tunnel sharing information to the downstream node, thereby solving the problem that the backup bandwidth resource utilization is not high, and the tunnel is solved. The problem of effective bandwidth protection is not obtained, and the maximum utilization of limited backup bandwidth resources is realized, and the tunnel is effectively protected by bandwidth.
图7是根据本发明实施例的一种带宽保护的装置的结构框图二,如图7所示,该装置包括:FIG. 7 is a structural block diagram 2 of a device for bandwidth protection according to an embodiment of the present invention. As shown in FIG. 7, the device includes:
接收模块72,设置为隧道上的节点接收上游节点发送的隧道共享信息,其中,该业务关系是指示同一时刻只有一条隧道承载业务流量,或者,该业务关系是指示隧道内多条标签交换路径LSP同一时刻只有一条该LSP承载业务流量;其中,该隧道共享信息包括相互共享备份带宽的隧道组或者LSP组;The receiving module 72 is configured to receive, by the node on the tunnel, the tunnel sharing information sent by the upstream node, where the service relationship indicates that only one tunnel carries service traffic at the same time, or the service relationship indicates multiple label switching path LSPs in the tunnel. Only one LSP carries service traffic at the same time; the tunnel sharing information includes a tunnel group or an LSP group that shares the backup bandwidth with each other;
共享模块74,设置为该节点优先使用该隧道组或者LSP组已经使用的备份带宽。The sharing module 74 is configured to preferentially use the backup bandwidth that the tunnel group or the LSP group has used.
通过上述装置,隧道上的节点接收上游节点发送的隧道共享信息,该节点优先使用该隧道组或者LSP组已经使用的备份带宽,解决了备份带宽资源利用率不高,隧道得不到有效带宽保护的问题,实现了有限备份带宽资源的最大利用,隧道得到有效带宽保护。Through the foregoing device, the node on the tunnel receives the tunnel sharing information sent by the upstream node, and the node preferentially uses the backup bandwidth used by the tunnel group or the LSP group, which solves the problem that the backup bandwidth resource utilization is not high, and the tunnel cannot obtain effective bandwidth protection. The problem is that the maximum utilization of the limited backup bandwidth resources is realized, and the tunnel is effectively protected by bandwidth.
在本实施例中,该装置还包括第二发送模块,设置为该节点优先使用该隧道组或者LSP组已经使用的备份带宽之后,该节点发送该隧道共享信息给下游节点。In this embodiment, the apparatus further includes a second sending module, configured to send the tunnel sharing information to the downstream node after the node preferentially uses the backup bandwidth that the tunnel group or the LSP group has used.
下面结合优选实施例和实施方式对本发明进行详细说明。The invention will now be described in detail in conjunction with the preferred embodiments and embodiments.
本优选实施例提供一种TE FRR场景共享备份带宽保护的方法和机制,通过该方法能够让有限的备份带宽得到最大的利用,防止备份带宽被重复扣除而使其他隧道得不到有效的带宽保护而业务中断。The preferred embodiment provides a method and a mechanism for protecting the backup bandwidth of the TE FRR scenario. The method can maximize the use of the limited backup bandwidth and prevent the backup bandwidth from being deducted repeatedly, so that other tunnels cannot obtain effective bandwidth protection. The business was interrupted.
本优选实施例的技术方案是这样实现的。一种共享带宽保护的方法包括下列步骤:The technical solution of the preferred embodiment is implemented in this way. A method of sharing bandwidth protection includes the following steps:
步骤1,各个节点按照RSVP-TE信令交互完成主备隧道的建立。Step 1: Each node completes the establishment of the active and standby tunnels according to the RSVP-TE signaling interaction.
步骤2,根据隧道内以及隧道间的业务关系,隧道头结点通过RSVP-TE消息,将隧道间或者隧道内可以共享的信息携带个下游节点。Step 2: According to the service relationship between the tunnel and the tunnel, the tunnel head node passes the RSVP-TE message to carry the information that can be shared between the tunnels or the tunnel to carry the downstream node.
步骤3,下游节点接收消息包含可以共享的信息之后,优先使用本节点可以共享的备份带宽。Step 3: After receiving the information that the downstream node can share, the downstream node preferentially uses the backup bandwidth that the node can share.
步骤4,继续向下游设备发送消息,包含可以共享的信息,直至隧道尾节点。In step 4, the message is sent to the downstream device, and the information that can be shared is included until the end node of the tunnel.
所述步骤1建立主备隧道的RSVP-TE信令是RFC3209、RFC4090中定义了扩展。其所需建立的路径可以是手动配置或者从网管下发。The RSVP-TE signaling for establishing the active/standby tunnel in
所述步骤2中根据隧道内或者隧道间的业务关系,指的是隧道间存在保护关系,同一时刻只有一条隧道承载业务流量;隧道内多条LSP同一时刻只有一条LSP承载业务流量。 In the step 2, according to the service relationship in the tunnel or between the tunnels, there is a protection relationship between the tunnels. Only one tunnel carries the traffic at the same time.
所述步骤2中隧道共享信息是指可以相互共享备份带宽的隧道组或者LSP组。The tunnel sharing information in the step 2 refers to a tunnel group or an LSP group that can share the backup bandwidth with each other.
所述步骤2的RSVP-TE消息,是对RFC4090中PATH消息的扩展。定义一种新的TLV用以表明可以相互共享备份带宽的隧道组以及LSP组信息。The RSVP-TE message of step 2 is an extension of the PATH message in RFC4090. Define a new TLV to indicate the tunnel group and LSP group information that can share the backup bandwidth with each other.
所述步骤2的下游,是指隧道路径的下一跳设备,隧道的路径由隧道头结点配置策略决定。The downstream of the step 2 refers to the next hop device of the tunnel path, and the path of the tunnel is determined by the tunnel head node configuration policy.
所述步骤3的优先使用本节点共享的备份带宽,是指主隧道信息中携带了可以共享备份带宽隧道组或者LSP组时,优先使用隧道组或者LSP组中已经使用的备份带宽,共享带宽不足时再重新申请不足部分的备份带宽。The priority of the step 3 is that the backup bandwidth shared by the node is used. When the primary tunnel information carries the backup bandwidth tunnel group or the LSP group, the backup bandwidth used in the tunnel group or the LSP group is preferentially used, and the shared bandwidth is insufficient. Then reapply the insufficient backup bandwidth.
所述步骤4的继续向下游发送的消息,与所述步骤2是同一消息。The message of the step 4 that continues to be sent downstream is the same message as the step 2.
通过本优选实施例提出的一种共享带宽保护的方法,可以能够让有限的备份带宽得到最大的利用,使相同业务隧道组或者LSP组共享使用备份带宽,防止备份带宽被重复扣除而使其他隧道得不到有效的带宽保护而业务中断。The shared bandwidth protection method proposed by the preferred embodiment can enable the maximum use of the limited backup bandwidth, so that the same service tunnel group or the LSP group share the backup bandwidth, and the backup bandwidth is repeatedly deducted to make other tunnels. Service is interrupted without effective bandwidth protection.
场景一:隧道内共享带宽链路保护场景Scenario 1: Shared bandwidth link protection scenario in the tunnel
图8是根据本发明优选实施例的隧道间和隧道内共享带宽链路保护示意图一,如图8所示,在R1节点有两条主隧道Tunnel1和Tunnel2,Tunnel1有两条LSP,一条LSP1路径为R1-R2-R3-R4(其中R2-R3之间走L23-1链路),需要保护的带宽为50M;另一条LSP2路径为R1-R2-R3-R4(其中R2-R3之间走L23-3链路),需要保护的带宽也为50M,Tunnel2只有一条LSP,与Tunnel1的LSP1路径相同,需要保护的带宽为50M。备份隧道Tunnel3路径为R2-R3(其中R2-R3之间走L23-2链路),备份带宽为100M,从拓扑图可以看出Tunnel3可以保护链路L23-1和L23-3的失效,形成链路保护,但是备份带宽不足以同时保护上述Tunnel1的LSP1、LSP2以及Tunnel2的LSP。FIG. 8 is a schematic diagram of the protection of the shared bandwidth link between the tunnels and the tunnels according to a preferred embodiment of the present invention. As shown in FIG. 8 , there are two
根据Tunnel1在头结点的业务导入的特点,两条LSP1和LSP2一个时刻只有一条LSP承载业务,那么这两条LSP在整条路径上形成FRR保护时可以共享备份带宽。在LSP1和LSP2的信令PATH报文中携带共享组信息,该组信息为Tunnel1的LSP1和LSP2信息。According to the characteristics of the service import of the first node of the tunnel, the two LSPs and the LSP2 have only one LSP bearer service at a time. The two LSPs can share the backup bandwidth when the FRR protection is formed on the entire path. The signaling PATH packet of LSP1 and LSP2 carries the sharing group information, which is the LSP1 and LSP2 information of Tunnel1.
R2节点接收到LSP1的PATH消息,检查到报文中存在共享组信息,但是LSP2此时暂未形成FRR,所以,LSP1与Tunnel3形成保护关系时,需要向Tunnel3申请占用50M的备份带宽。R2节点接收到LSP2的PATH信息,检查到报文中存在可以与LSP1共享备份带宽信息,优选使用LSP1已经申请的备份带宽,不需要重新向Tunnel3申请备份带宽。这样LSP1和LSP2与Tunnel3形成保护关系,总共只需要申请50M的备份带宽。Tunnel3的剩余50M备份带宽可以保护Tunnel2的LSP。The R2 node receives the PATH message of LSP1 and checks that there is a shared group information in the packet. However, LSP2 does not form an FRR at this time. Therefore, when LSP1 and Tunnel3 form a protection relationship, you need to apply for a backup bandwidth of 50M to Tunnel3. The R2 node receives the PATH information of the LSP2, and checks that the backup bandwidth information can be shared with the LSP1. The backup bandwidth that has been applied for by the LSP1 is used. In this way, LSP1 and LSP2 form a protection relationship with Tunnel3. In total, only 50M backup bandwidth needs to be applied. The remaining 50M backup bandwidth of Tunnel 3 can protect the LSP of Tunnel 2.
如果不做到Tunnel1的LSP1和LSP2的备份带宽共享,Tunnel3的剩余备份带宽不足以保护Tunnel2的LSP。If the backup bandwidth of LSP1 and LSP2 is not shared, the remaining backup bandwidth of Tunnel 3 is insufficient to protect the LSP of Tunnel 2.
Tunnel1的LSP1和LSP2继续携带两者的共享信息,通过PATH消息分别沿L23-1和L23-3 链路发送个下游节点R3。LSP1 and LSP2 of Tunnel1 continue to carry the shared information of both, and the PATH message is along L23-1 and L23-3 respectively. The link sends a downstream node R3.
场景二:隧道间共享带宽链路保护场景Scenario 2: Shared bandwidth link protection scenario between tunnels
如图8所示,隧道特点发生一些变化。在R1节点有三条主隧道Tunnel1、Tunnel2、Tunnel4,各有一条LSP。其路径分别为:Tunnl1(R1-R2-R3-R4,其中R2-R3走L23-1链路),Tunnel2(R1-R2-R3-R4,其中R2-R3走L23-3链路),Tunnel4与Tunnl1路径相同,三条主隧道需要保护的带宽均为50M。备份隧道Tunnel3路径R2-R3(经过L23-2链路),备份带宽为100M。同样,从拓扑图可以看出Tunnel3可以保护链路L23-1和L23-3的失效,形成链路保护,但是备份带宽不足以同时保护上述Tunnel1、Tunnel2、Tunnel4的LSP。As shown in Figure 8, there are some changes in the characteristics of the tunnel. There are three main tunnels Tunnel1, Tunnel2, and Tunnel4 on the R1 node, each with an LSP. The paths are: Tunnl1 (R1-R2-R3-R4, where R2-R3 takes the L23-1 link), Tunnel2 (R1-R2-R3-R4, where R2-R3 takes the L23-3 link), Tunnel4 Same as the Tunnl1 path, the bandwidth of the three main tunnels needs to be protected at 50M. Backup tunnel Tunnel3 path R2-R3 (via L23-2 link), backup bandwidth is 100M. Similarly, it can be seen from the topology that Tunnel3 can protect the link L23-1 and L23-3 from being ineffective, and the link protection is insufficient. However, the backup bandwidth is insufficient to protect the LSPs of Tunnel1, Tunnel2, and Tunnel4.
根据在头结点的业务导入的特点,如果满足同一时刻业务只可能从Tunnel1或者Tunnel2中经过,那么这两条隧道在形成FRR保护时可以共享备份带宽。在Tunnel1和Tunnel2的信令PATH报文中携带共享组信息,该组信息为Tunnel1和Tunnel2的隧道信息。According to the characteristics of service import at the head node, if the services at the same time can only pass through Tunnel1 or Tunnel2, the two tunnels can share the backup bandwidth when forming FRR protection. The signaling PATH packets of
同理,R2节点接收到Tunnel1和Tunnel2的PATH消息,检查到报文中存在共享组信息,在形成FRR的时候,两者可以共享50M的备份带宽。Tunnel3剩余的50M备份带宽可以用于保护Tunnel4。Similarly, the R2 node receives the PATH message of Tunnel1 and Tunnel2, and checks that the shared group information exists in the packet. When the FRR is formed, the two can share the backup bandwidth of 50M. The remaining 50M backup bandwidth of Tunnel3 can be used to protect Tunnel4.
Tunnel1和Tunnel2的LSP继续携带两者的共享信息,通过PATH消息分别沿L23-1和L23-3链路发送个下游节点R3。The LSPs of Tunnel1 and Tunnel2 continue to carry the shared information of the two, and send the downstream node R3 along the L23-1 and L23-3 links through the PATH message.
场景三:隧道内共享带宽节点保护场景Scenario 3: Shared bandwidth node protection scenario in the tunnel
图9是根据本发明优选实施例的隧道间和隧道内共享带宽链路保护示意图二,如图9所示,在R1节点有两条主隧道Tunnel1和Tunnel2,Tunnel1有两条LSP,一条LSP1路径为R1-R2-R3-R4,需要保护的带宽为50M;另一条LSP2路径为R1-R2-R5-R4,需要保护的带宽也为50M,Tunnel2只有一条LSP,与Tunnel1的LSP1路径相同,需要保护的带宽为50M。备份隧道Tunnel3路径为R2-R4,备份带宽为100M,从拓扑图可以看出Tunnel3可以保护节点R3和节点R5的失效,形成节点保护,但是备份带宽不足以同时保护上述Tunnel1的LSP1、LSP2以及Tunnel2的LSP。FIG. 9 is a schematic diagram of a shared bandwidth link protection between tunnels and tunnels according to a preferred embodiment of the present invention. As shown in FIG. 9, there are two primary tunnels Tunnel1 and Tunnel2 at the R1 node, and Tunnel1 has two LSPs and one LSP1 path. For R1-R2-R3-R4, the bandwidth to be protected is 50M; the other LSP2 path is R1-R2-R5-R4, and the bandwidth to be protected is also 50M. Tunnel 2 has only one LSP, which is the same as the LSP1 path of Tunnel1. The protected bandwidth is 50M. The path of the tunnel in the backup tunnel is R2-R4 and the backup bandwidth is 100 M. The topology diagram shows that the tunnel 3 can protect the node R3 and the node R5 from failing to form node protection. However, the backup bandwidth is insufficient to protect the LSP1, LSP2, and Tunnel2 of the tunnel1. LSP.
同样的,根据Tunnel1的在头结点的业务导入的特点,两条LSP1和LSP2一个时刻只有一条LSP承载业务,那么这两条LSP在整条路径上形成FRR保护时可以共享备份带宽。在LSP1和LSP2的信令PATH报文中携带共享组信息,该组信息为Tunnel1的LSP1和LSP2信息。Similarly, according to the characteristics of the traffic import of the head node of the
R2节点接收到LSP1和LSP2的PATH消息,检查到报文中存在共享组信息,在与Tunnel3形成FRR的时候,两者可以共享50M的备份带宽。Tunnel3剩余的50M备份带宽可以用于保护Tunnel2。The R2 node receives the PATH message of LSP1 and LSP2, and checks that the shared group information exists in the packet. When the FRR is formed with Tunnel3, the two can share the backup bandwidth of 50M. The remaining 50M backup bandwidth of Tunnel3 can be used to protect Tunnel2.
Tunnel1的LSP1和LSP2继续携带两者的共享信息,通过PATH消息分别发送给R3和R5。 LSP1 and LSP2 of Tunnel1 continue to carry the shared information of both, and are sent to R3 and R5 through the PATH message.
场景四:隧道间共享带宽节点保护场景Scenario 4: Shared bandwidth node protection scenario between tunnels
如图9所示,隧道特点发生一些变化。在R1节点有三条主隧道Tunnel1、Tunnel2、Tunnel4,各有一条LSP。其路径分别为:Tunnl1(R1-R2-R3-R4),Tunnel2(R1-R2-R5-R4),Tunnel4与Tunnl1路径相同,三条主隧道需要保护的带宽均为50M。备份隧道Tunnel3路径R2-R4备份带宽为100M。同样,从拓扑图可以看出Tunnel3可以保护节点R3和节点R5的失效,形成节点保护,但是备份带宽不足以同时保护上述Tunnel1、Tunnel2、Tunnel4的LSP。As shown in Figure 9, some changes have taken place in the tunnel characteristics. There are three main tunnels Tunnel1, Tunnel2, and Tunnel4 on the R1 node, each with an LSP. The paths are: Tunnl1 (R1-R2-R3-R4), Tunnel2 (R1-R2-R5-R4), and Tunnel4 is the same as Tunnl1. The bandwidth of the three primary tunnels to be protected is 50M. The backup tunnel Tunnel3 path R2-R4 has a backup bandwidth of 100M. Similarly, it can be seen from the topology diagram that Tunnel3 can protect the failure of node R3 and node R5 to form node protection, but the backup bandwidth is insufficient to protect the LSPs of Tunnel1, Tunnel2, and Tunnel4.
根据在头结点的业务导入的特点,如果满足同一时刻业务只可能从Tunnel1或者Tunnel2中经过,那么这两条隧道在形成FRR保护时可以共享备份带宽。在Tunnel1和Tunnel2的信令PATH报文中携带共享组信息,该组信息为Tunnel1和Tunnel2的隧道信息。According to the characteristics of service import at the head node, if the services at the same time can only pass through Tunnel1 or Tunnel2, the two tunnels can share the backup bandwidth when forming FRR protection. The signaling PATH packets of
同理,R2节点接收到Tunnel1和Tunnel2的PATH消息,检查到报文中存在共享组信息,在形成FRR的时候,两者可以共享50M的备份带宽。Tunnel3剩余的50M备份带宽可以用于保护Tunnel4。Similarly, the R2 node receives the PATH message of Tunnel1 and Tunnel2, and checks that the shared group information exists in the packet. When the FRR is formed, the two can share the backup bandwidth of 50M. The remaining 50M backup bandwidth of Tunnel3 can be used to protect Tunnel4.
Tunnel1和Tunnel2的LSP继续携带两者的共享信息,通过PATH消息分别发送给R3和R5。The LSPs of
场景五:混合型保护带宽共享场景Scenario 5: Hybrid protection bandwidth sharing scenario
图10是根据本发明优选实施例的混合保护场景的共享带宽保护示意图,如图10所示,在R1节点有两条主隧道Tunnel1和Tunnel2,Tunnel1有两条LSP,一条LSP1路径为R1-R2-R3-R4-R7(其中R4-R7走的是L47-1链路),需要保护的带宽为50M;另一条LSP2路径为R1-R2-R5-R4-R7,(其中R4-R7走的是L47-1链路)需要保护的带宽也为50M,Tunnel2只有一条LSP,与Tunnel1的LSP1路径相同,需要保护的带宽为50M。备份隧道Tunnel3路径为R2-R4,备份带宽为100M,从拓扑图可以看出Tunnel3可以保护节点R3和节点R5的失效,形成节点保护,但是备份带宽不足以同时保护上述Tunnel1的LSP1、LSP2以及Tunnel2的LSP。备份隧道Tunnel4路径为R4-R7(其中R4-R7走的是L47-2链路),备份带宽为100M。从拓扑图可以看出,Tunnel4可以保护链路L47-1的失效,形成链路保护,但是备份带宽也不足以同时保护上述Tunnel1的LSP1、LSP2以及Tunnel2的LSP。10 is a schematic diagram of shared bandwidth protection of a hybrid protection scenario according to a preferred embodiment of the present invention. As shown in FIG. 10, there are two primary tunnels Tunnel1 and Tunnel2 at the R1 node, two LSPs in Tunnel1, and one R1 and R2 in LSP1. -R3-R4-R7 (where R4-R7 is the L47-1 link), the bandwidth to be protected is 50M; the other LSP2 path is R1-R2-R5-R4-R7, (where R4-R7 goes) It is the L47-1 link. The bandwidth to be protected is also 50M. Tunnel 2 has only one LSP, which is the same as the LSP1 path of Tunnel1. The bandwidth to be protected is 50M. The path of the tunnel in the backup tunnel is R2-R4 and the backup bandwidth is 100 M. The topology diagram shows that the tunnel 3 can protect the node R3 and the node R5 from failing to form node protection. However, the backup bandwidth is insufficient to protect the LSP1, LSP2, and Tunnel2 of the tunnel1. LSP. The path of the backup tunnel Tunnel4 is R4-R7 (where R4-R7 is the L47-2 link) and the backup bandwidth is 100M. As shown in the otherid2ology, Tunnel 4 can protect the link L47-1 from being faulty and form link protection. However, the backup bandwidth is not sufficient to protect the LSPs of LSP1, LSP2, and Tunnel2 of Tunnel1.
同样的,根据Tunnel1的在头结点的业务导入的特点,两条LSP1和LSP2一个时刻只有一条LSP承载业务,那么这两条LSP在整条路径上形成FRR保护时可以共享备份带宽。在LSP1和LSP2的信令PATH报文中携带共享组信息,该组信息为Tunnel1的LSP1和LSP2信息。Similarly, according to the characteristics of the traffic import of the head node of the
R2节点接收到LSP1和LSP2的PATH消息,检查到报文中存在共享组信息,在与Tunnel3形成FRR的时候,两者可以共享50M的备份带宽。Tunnel3剩余的50M备份带宽可以用于保护Tunnel2。The R2 node receives the PATH message of LSP1 and LSP2, and checks that the shared group information exists in the packet. When the FRR is formed with Tunnel3, the two can share the backup bandwidth of 50M. The remaining 50M backup bandwidth of Tunnel3 can be used to protect Tunnel2.
Tunnel1的LSP1和LSP2继续携带两者的共享信息,通过PATH消息分别发送给R3和R5。 LSP1 and LSP2 of Tunnel1 continue to carry the shared information of both, and are sent to R3 and R5 through the PATH message.
同样的,根据Tunnel1的在头结点的业务导入的特点,两条LSP1和LSP2一个时刻只有一条LSP承载业务,那么这两条LSP在整条路径上形成FRR保护时可以共享备份带宽。在LSP1和LSP2的信令PATH报文中携带共享组信息,该组信息为Tunnel1的LSP1和LSP2信息。Similarly, according to the characteristics of the traffic import of the head node of the
R2节点接收到LSP1和LSP2的PATH消息,检查到报文中存在共享组信息,在与Tunnel3形成节点保护的时候,两者可以共享50M的备份带宽。Tunnel3剩余的50M备份带宽可以用于保护Tunnel2。The R2 node receives the PATH message of LSP1 and LSP2, and checks that there is shared group information in the packet. When forming node protection with Tunnel3, the two can share the backup bandwidth of 50M. The remaining 50M backup bandwidth of Tunnel3 can be used to protect Tunnel2.
Tunnel1的LSP1和LSP2继续携带两者的共享信息,通过PATH消息分别发送给R3和R5。LSP1 and LSP2 of Tunnel1 continue to carry the shared information of both, and are sent to R3 and R5 through the PATH message.
在R3和R5节点上均没有形成保护关系,R3和R5继续将携带了共享信息的PATH消息发送给R4节点,在R4节点LSP1和LSP2均可以与Tunnel4形成链路保护关系,共享其50M的备份带宽,剩余的50M备份带宽用以保护Tunnel2的LSP。No protection relationship is formed on the R3 and R5 nodes. R3 and R5 continue to send the PATH message carrying the shared information to the R4 node. Both the LSP1 and the LSP2 of the R4 node can form a link protection relationship with the tunnel 4 and share the 50M backup. Bandwidth, the remaining 50M backup bandwidth is used to protect the LSP of Tunnel 2.
Tunnel1的LSP1和LSP2在R4继续将携带了共享信息的PATH消息发送给尾节点R7。LSP1 and LSP2 of Tunnel1 continue to send the PATH message carrying the shared information to the tail node R7 at R4.
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到根据上述实施例的方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,或者网络设备等)执行本发明各个实施例所述的方法。Through the description of the above embodiments, those skilled in the art can clearly understand that the method according to the above embodiment can be implemented by means of software plus a necessary general hardware platform, and of course, by hardware, but in many cases, the former is A better implementation. Based on such understanding, the technical solution of the present invention, which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a storage medium (such as ROM/RAM, disk, The optical disc includes a number of instructions for causing a terminal device (which may be a cell phone, a computer, a server, or a network device, etc.) to perform the methods described in various embodiments of the present invention.
本发明的实施例还提供了一种存储介质。可选地,在本实施例中,上述存储介质可以被设置为存储用于执行上述实施例的方法步骤的程序代码:Embodiments of the present invention also provide a storage medium. Optionally, in the embodiment, the storage medium may be configured to store program code for performing the method steps of the above embodiment:
可选地,在本实施例中,上述存储介质可以包括但不限于:U盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。Optionally, in this embodiment, the foregoing storage medium may include, but not limited to, a USB flash drive, a Read-Only Memory (ROM), a Random Access Memory (RAM), a mobile hard disk, and a magnetic memory. A variety of media that can store program code, such as a disc or a disc.
可选地,在本实施例中,处理器根据存储介质中已存储的程序代码执行上述实施例的方法步骤。Optionally, in this embodiment, the processor performs the method steps of the foregoing embodiments according to the stored program code in the storage medium.
可选地,本实施例中的具体示例可以参考上述实施例及可选实施方式中所描述的示例,本实施例在此不再赘述。For example, the specific examples in this embodiment may refer to the examples described in the foregoing embodiments and the optional embodiments, and details are not described herein again.
显然,本领域的技术人员应该明白,上述的本发明的各模块或各步骤可以用通用的计算装置来实现,它们可以集中在单个的计算装置上,或者分布在多个计算装置所组成的网络上,可选地,它们可以用计算装置可执行的程序代码来实现,从而,可以将它们存储在存储装置中由计算装置来执行,并且在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤,或者将它们分别制作成各个集成电路模块,或者将它们中的多个模块或步骤制作成单个 集成电路模块来实现。这样,本发明不限制于任何特定的硬件和软件结合。It will be apparent to those skilled in the art that the various modules or steps of the present invention described above can be implemented by a general-purpose computing device that can be centralized on a single computing device or distributed across a network of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein. Perform the steps shown or described, or separate them into individual integrated circuit modules, or make multiple modules or steps into a single The integrated circuit module is implemented. Thus, the invention is not limited to any specific combination of hardware and software.
以上所述仅为本发明的优选实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有各种更改和变化。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。The above description is only the preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes can be made to the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and scope of the present invention are intended to be included within the scope of the present invention.
基于本发明实施例提供的上述技术方案,节点依据信令交互建立主备隧道;依据所述主备隧道的隧道内以及隧道间的业务关系,所述节点发送隧道共享信息给下游节点,其中,所述业务关系是指示同一时刻只有一条隧道承载业务流量,或者,所述业务关系是指示隧道内多条标签交换路径LSP同一时刻只有一条所述LSP承载业务流量;其中,所述隧道共享信息包括相互共享备份带宽的隧道组或者LSP组,所述隧道共享信息用于指示所述下游节点优先使用所述隧道组或者LSP组已经使用的备份带宽,解决了备份带宽资源利用率不高,隧道得不到有效带宽保护的问题,实现了有限备份带宽资源的最大利用,隧道得到有效带宽保护。 Based on the foregoing technical solution provided by the embodiment of the present invention, the node establishes an active/standby tunnel according to the signaling interaction; the node sends the tunnel sharing information to the downstream node according to the service relationship between the tunnel in the active and standby tunnels and the tunnel, where The service relationship indicates that only one tunnel carries service traffic at the same time, or the service relationship indicates that only one LSP bearer service traffic is LSP at the same time in the multiple label switching path LSPs in the tunnel; wherein the tunnel sharing information includes A tunnel group or an LSP group that shares the backup bandwidth with each other. The tunnel sharing information is used to indicate that the downstream node preferentially uses the backup bandwidth that has been used by the tunnel group or the LSP group, and the utilization of the backup bandwidth resource is not high. The problem of effective bandwidth protection is not achieved, and the maximum utilization of limited backup bandwidth resources is realized, and the tunnel is effectively protected by bandwidth.
Claims (10)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510447574.8A CN106411781B (en) | 2015-07-27 | 2015-07-27 | The method and device of bandwidth protection |
| CN201510447574.8 | 2015-07-27 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2016177186A1 true WO2016177186A1 (en) | 2016-11-10 |
Family
ID=57217390
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2016/077575 Ceased WO2016177186A1 (en) | 2015-07-27 | 2016-03-28 | Bandwidth protection method and device |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN106411781B (en) |
| WO (1) | WO2016177186A1 (en) |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102223299A (en) * | 2011-06-08 | 2011-10-19 | 中兴通讯股份有限公司 | Method and system for managing bandwidth resources between tunnels |
| CN102761480A (en) * | 2012-06-28 | 2012-10-31 | 中兴通讯股份有限公司 | Resource allocation method and device |
-
2015
- 2015-07-27 CN CN201510447574.8A patent/CN106411781B/en active Active
-
2016
- 2016-03-28 WO PCT/CN2016/077575 patent/WO2016177186A1/en not_active Ceased
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102223299A (en) * | 2011-06-08 | 2011-10-19 | 中兴通讯股份有限公司 | Method and system for managing bandwidth resources between tunnels |
| CN102761480A (en) * | 2012-06-28 | 2012-10-31 | 中兴通讯股份有限公司 | Resource allocation method and device |
Also Published As
| Publication number | Publication date |
|---|---|
| CN106411781B (en) | 2019-05-24 |
| CN106411781A (en) | 2017-02-15 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10432514B2 (en) | Multiprotocol label switching traffic engineering tunnel establishing method and device | |
| US10187301B2 (en) | Establishing label switched paths having refresh interval independent fast reroute facility protection | |
| US7602702B1 (en) | Fast reroute of traffic associated with a point to multi-point network tunnel | |
| US9210037B2 (en) | Method, apparatus and system for interconnected ring protection | |
| CN102100039B (en) | Establishing Pseudowires in Packet Switched Networks | |
| WO2019120042A1 (en) | Method and node for transmitting packet in network | |
| CN100461755C (en) | Data message transmission method and node device based on MPLS TE tunnel | |
| US9246838B1 (en) | Label switched path setup using fast reroute bypass tunnel | |
| CN103493443B (en) | Using Subpath Maintenance Element (SPME) for Multiprotocol Label Switching (MPLS) Shared Mesh Protection | |
| US11121975B2 (en) | Framework for temporal label switched path tunnel services | |
| CN101420384A (en) | Method for realizing self-curing protection in ECMP region | |
| EP2648382B1 (en) | Method, device and system for establishing lsp | |
| CN101232453A (en) | A Rerouting Method for Fast Path Finding in T-MPLS Network | |
| CN104618235B (en) | A kind of cross-layer establishes the method and device in Bu Gong roads path | |
| WO2016078363A1 (en) | Methods and apparatuses for sending and receiving tunnel constraint information | |
| CN107347034B (en) | Link information processing method, device and system | |
| CN102904808B (en) | Across the method for building up and system of resource reservation protocol flow engineering label switched path | |
| JP2009519666A (en) | Resource sharing between network and tunnel | |
| WO2017143958A1 (en) | System, method and apparatus for implementing fast reroute (frr) | |
| WO2016177186A1 (en) | Bandwidth protection method and device | |
| US10715420B2 (en) | System, method and apparatus for implementing fast reroute (FRR) | |
| Wu et al. | Recovery from control plane failures in the RSVP-TE signaling protocol | |
| WO2017004747A1 (en) | Network path computation method, device and system | |
| CN119342006A (en) | Point-to-multipoint message transmission method and related device | |
| JP2009194648A (en) | Information transfer method, information transfer system, and node device |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16789180 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 16789180 Country of ref document: EP Kind code of ref document: A1 |