CN117675688A - Optimization method, equipment and medium based on current SRV6 related protection technology - Google Patents
Optimization method, equipment and medium based on current SRV6 related protection technology Download PDFInfo
- Publication number
- CN117675688A CN117675688A CN202311718182.1A CN202311718182A CN117675688A CN 117675688 A CN117675688 A CN 117675688A CN 202311718182 A CN202311718182 A CN 202311718182A CN 117675688 A CN117675688 A CN 117675688A
- Authority
- CN
- China
- Prior art keywords
- paths
- protection
- service
- path
- reverse
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/22—Alternate routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/24—Multipath
- H04L45/247—Multipath using M:N active or standby paths
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/28—Routing or path finding of packets in data switching networks using route fault recovery
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention relates to an optimization method, equipment and medium based on the current SRV6 related protection technology, which comprises the steps that in a complete networking, both a client side and a service side are configured with protection, and links between the service side equipment and the equipment and links between the client side equipment and the service side equipment are protected in a sectionalized manner; the public network paths to different destinations are distinguished by designating color in SRV6 Policy at the service side, hot-standby protection of the paths is introduced, a plurality of paths are initially set for the paths, main and standby paths are selected according to the priority of the paths, the service preferentially passes through the main paths, and when the link failure of the main path occurs, the service is switched into the standby paths, and the service is ensured to be quickly recovered by combining with a detection function; but on the reverse path, if the link fails, the reverse path is set and the setting of path priorities is introduced for the traffic and detection messages, respectively. The invention improves the flexibility of protection, the quick response degree to faults and enhances the safety and stability of the network.
Description
Technical Field
The invention relates to the technical field of SRV6 protection communication, in particular to an optimization method, equipment and storage medium based on the current SRV6 related protection technology.
Background
SRv6 is an SR technique based on an IPv6 forwarding plane, combines the advantages of SR source routing and the characteristics of simplicity and easy expansion of IPv6, and has the unique advantages, while the protection technique is used for ensuring the rapid recovery of service and reducing service damage when a networking link fails.
Current SRV6 protection is generally classified into service side protection, such as Hot-standby protection of SRV6 Policy, and client side protection, such as ESI protection of EVPN, which is further classified into static ESI protection and dynamic ESI protection according to service types. There are other types of protection currently available, which are not described in detail since the present invention proposes technical optimizations only for the above-mentioned several types of protection.
Disclosure of Invention
The invention provides an optimization method, equipment and a storage medium based on the current SRV6 related protection technology, which can at least solve one of the technical problems in the background technology.
In order to achieve the above purpose, the present invention adopts the following technical scheme:
an optimization method based on the current SRV6 related protection technology comprises the following steps:
the optimization based on the current SRV6 related protection technology is the optimization which is respectively carried out for the protection of the client side and the service side, and the optimization scene related by the invention comprises three types of protection such as SRV6 Policy Hot-standby protection, client side static/dynamic ESI protection and the like;
in a complete networking, protection is typically configured on both the client side and the service side, and the links between the service side devices and between the client side devices and the service side devices are protected in segments.
In order to avoid the situation, the invention introduces the Hot-standby protection of the paths, initially sets a plurality of paths, selects the main and standby paths according to the priority of the paths, preferentially passes the main path, cuts the service into the standby paths when the link failure of the main path occurs, and then combines the detection function to ensure the quick recovery of the service. However, on the reverse path, if the link fails, the service and the detection message will select to go to BE routed under the condition that the present invention does not specify, which causes instability of the reverse path, may cause protection oscillation, and adversely affects the switching performance. It is necessary to propose a concept of setting a reverse path and introducing a path priority for a service packet and a detection packet, respectively, comprising the following steps:
1. when a reverse path is not designated, routing BE (broadband access) when a main link failure occurs in all service messages and detection messages on the path;
2. when only a reverse path is designated for the detection path, if a link failure occurs in the main path, the service walks the BE route reversely, when the detection message walks the designated reverse path and the reverse paths are a plurality of, the path with the highest priority is walked preferentially, and when all the reverse paths have the failure, the BE route can BE walked;
3. when only a reverse path is designated for a service path, if a main path has a link fault, a reverse routing BE route is detected, when a service message passes through the designated reverse path and the reverse paths are a plurality of, a path with the highest priority is preferentially passed, and when all the reverse paths have faults, the BE route can BE passed;
4. when reverse paths are designated for detection and service, if a link failure occurs in a main path, when the service and the detection both travel the designated reverse paths and the reverse paths are multiple, the path with the highest priority is preferentially walked, and under the condition that all the reverse paths have failures, the related service and the detection only travel BE routes;
5. when the bandwidth of the main link exceeds the maximum bandwidth of the path, the client is prompted to have insufficient bandwidth, and other paths are selected.
The ESI protection of the client side is currently classified into static ESI protection and dynamic ESI protection according to the service type. The static state is not ideal in the aspect of switching performance at present, and service damage is large. And the dynamic current algorithm for calculating DF and NDF is single. Different optimization strategies are respectively introduced for the two types of protection, and the respective weak places are optimized, and the specific operation steps are as follows:
1. if the client side is static ESI protection, a TRACK mixed mode is carried out on the AC of the service side, LAG BFD is preferably selected to inform OAM-MAPPING to transmit faults to the head node, and if the LAG BFD is invalid or undeployed, a hanging interface chain is started to sense the link faults of the client side. When LAG BFD is deployed, the source-destination IP is only used as an identifier, but not actually exists in the routing table, and the source-destination identifiers at the two ends are identical to each other, so that the same link is detected by both parties, and the LAG fd is valid at this time.
2. If the client side is dynamic ESI protection, a priority algorithm and a modulo algorithm are common at present. The priority algorithm is to set the same priority policy, such as a high priority policy, and set priorities between two service side devices, and the priority policy is mainly the high priority policy. On the contrary, when the strategy is low-priority, the strategy is mainly low-priority. The modulo arithmetic is to take router-IDs of multiple service side devices, discharge sequence numbers from 0 by size, hash traffic to different links for different VLAN election results, extract the number N of the same client side and V represented by different VLAN IDs, calculate the final sequence number i according to i=V mod N, and then determine the main link and the standby link according to the final sequence number sequence. At present, a new hybrid algorithm is provided for the common algorithms, the algorithm also determines the final active and standby links according to serial numbers, but the calculation formula is different from the previous one, the same strategy of the whole network is firstly formulated, V represented by VLAN ID, O represented by origin IP and N represented by multi-element number are extracted by taking the maximum or minimum serial number as a judgment standard, the final serial number X, X=V, N+O is calculated, and in this case, the flow is easier to calculate the active and standby according to the requirement of a client.
In yet another aspect, the invention also discloses a computer readable storage medium storing a computer program which, when executed by a processor, causes the processor to perform the steps of the method as described above.
In yet another aspect, the invention also discloses a computer device comprising a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to perform the steps of the method as above.
According to the technical scheme, the optimization method based on the current SRV6 related protection technology, which is disclosed by the invention, is particularly used for optimizing the protection of the current SRV6, so that the flexibility of the protection is improved, the quick response degree to faults is improved, and the safety and the stability of a network are enhanced.
The invention relates to an SRV6 protection communication technology, in particular to optimization aiming at the protection of the SRV6 commonly used at present, which improves the flexibility of the protection, the quick response degree to faults and enhances the safety and the stability of a network.
Current SRV6 protection is generally classified into service side protection, such as Hot-standby protection of SRV6 Policy, and client side protection, such as ESI protection of EVPN, which is further classified into static ESI protection and dynamic ESI protection according to service types.
The invention aims at the three protections and provides optimization on algorithm, switching performance and path protection.
In summary, the whole network SRV6 protection technology generally appears in a nested manner, and the deployment service is generally public network SRV6 Policy Hot-standby protection and private network side static ESI protection or public network SRV6 Policy Hot-standby protection and private network dynamic ESI protection. In order to ensure the switching performance and switching paths of the whole network, a public network side records a plurality of selectable reverse paths through a chip write table, sets the priority of the reverse paths and ensures that the related detection can find the optimal path during switching; in the protection of static ESI at the private network side, when CE and PE link faults are optimized, protecting and sensing the fault flow, on the basis of directly hanging a hardware interface chain at a physical interface of equipment, correlating the relation between the AC side and the public network side in a mode of issuing AC TRACK LAG BFD+OAM-MAPPING through a software platform, and adding the detection characteristic of BFD per se to realize millisecond-level quick switching; in the protection of the private network side dynamic ESI, the roles of the main PE and the standby PE of the tail node are required to be determined firstly according to election in the initial condition, and another mixed algorithm is provided on the basis of the two main election algorithms at present, so that the election of the main PE and the standby PE is easier to control according to the client requirements compared with the former two algorithms.
Drawings
FIG. 1 is a protected networking diagram of SRV 6;
FIG. 2 is a protection flow diagram for SRV 6;
FIG. 3 is a flow chart of the SRV6 public network side Policy reverse path assignment in the present invention;
FIG. 4 is a flowchart of the optimization of the SRV6 private network side two ESI protections in the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments of the present invention.
The following describes an optimization method based on the current SRV6 protection technology with reference to the accompanying drawings:
first, five test devices are set up, four of which simulate service side devices in the existing network and one of which simulate customer side devices CE, as shown in the protection flow chart of fig. 1. Links are established among three pieces of service side equipment PE2/PE3/PE4 directly connected with the client side equipment, BGP is configured for electing a client side protection role. The remaining service-side equipment PE1 serves as a head node, and in the static ESI environment, it is responsible for selecting the primary and secondary links protected by the client side. The public network of the four service sides is used for deploying SRV6 Policy Hot-standby protection. According to the relevant configuration of the user, two services can be configured between the head node PE and the customer side CE, one is dynamic ESI combined with the public network SRV6 Policy Hot-standby protection service 1, and the other is static ESI combined with the public network SRV6 Policy Hot-standby protection service 2.
(1) When the main link where the PE1 and the PE2 are located has a link failure, as shown in fig. 3, the detection and data service packet will go to the link of PE1-PE3-PE2 by default, but since the detected packet receiving and transmitting directions are inconsistent under the condition that the reverse link is not specified, the BFD of the PE2 cannot guarantee that the DOWN is immediately DOWN, and the switching performance is reduced, we generally need to specify the reverse path to the PE1-PE2, so that the detected packet receiving and transmitting are consistent, and the two ends are quickly switched, in addition, in the aspect of service packet, because after the link of PE1-PE2 is interrupted, the two paths of PE1-PE3-PE2 and PE1-PE4-PE3-PE2 are actually selected, most of the paths will select the path calculation to go to the PE1-PE3-PE2, so that the link load is too great, and other options can be provided when the reverse path selection is needed. For example, the reverse path alternative path has two paths, namely PE1-PE3-PE2 and PE1-PE4-PE3-PE2, some policies can select PE1-PE4-PE3-PE2, the reverse path alternative path can be provided as long as the policies are respectively provided with reverse priority, reverse detection hung on the path is provided, and when the total bandwidth of policies of all main paths is larger than the bandwidth of the path, the user is prompted that the bandwidth is insufficient, and the path needs to be replaced.
(2) When a link fault occurs between PE2/PE3/PE4 and CE, if the link fault is service 1, as shown in fig. 4, calculating the role of DF between PE2/PE3/PE4 through a set mixing algorithm, and when the link between DF and CE is interrupted, continuing to select a new DF between the rest two, wherein the new DF bears the forwarding of service flows, and the following steps are realized, wherein the N=1, VLAN=100 and O=1.1.1.2 of PE2 are known; n=1, vlan=200, o=1.1.1.3 for PE 3; n=1, vlan=100, o=1.1.1.4 for PE4, on the same traffic for the same VLAN, if the low sequence number is set to be dominant, then the X sequence number of the final PE2 is selected to be dominant, PE2 is a DF role device, and a main chain of dynamic ESI protection on the CE side is between PE2 and CE. When the main link is broken, the link between CEs of PE3 becomes the main link, PE3 becomes the DF role device, and so on until only one link remains.
(3) When a link fault occurs between the PE2/PE3/PE4 and the CE, if the link fault is the service 2, as shown in fig. 4, the AC side detection and the OAM-MAPPING are de-associated by the PE2/PE3/PE4, the AC side detection is a detection group, the priority is set, the priority is high, the priority is a main detection strategy, the priority is low, the priority is an alternative, the main strategy is associated with LAG BFD, and the selected associated service AC physical interface. When the primary policy fails, the backup policy is used. When the LAGBFD used by the master strategy is configured, whether the route exists in the current routing table is not checked, the route is only used as an identifier between two end devices, and the source and destination identifiers at the two ends are identified as the same detected link when the source and destination identifiers are on the pair.
So far, based on the protection technology of the current whole network SRV6 deployment, the public network side SRV6 Policy Hot-standby protection, the private network side static ESI protection, the dynamic ESI protection technology respectively provides an optimization method, the public network side static ESI protection provides a linkage detection optimization, the dynamic ESI provides an election algorithm optimization, and finally an optimal path is selected in the fault switching, so that the purpose of lowest whole network switching loss is achieved.
In yet another aspect, the invention also discloses a computer readable storage medium storing a computer program which, when executed by a processor, causes the processor to perform the steps of the method as described above.
In yet another aspect, the invention also discloses a computer device comprising a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to perform the steps of the method as above.
In yet another embodiment provided herein, there is also provided a computer program product containing instructions that, when run on a computer, cause the computer to perform any of the above embodiments of the optimization method based on the current SRV6 related protection technique.
It may be understood that the system provided by the embodiment of the present invention corresponds to the method provided by the embodiment of the present invention, and explanation, examples and beneficial effects of the related content may refer to corresponding parts in the above method.
The embodiment of the application also provides an electronic device, which comprises a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory are communicated with each other through the communication bus,
a memory for storing a computer program;
and the processor is used for realizing the optimization method based on the current SRV6 related protection technology when executing the program stored in the memory.
The communication bus mentioned by the above electronic device may be a peripheral component interconnect standard (english: peripheral Component Interconnect, abbreviated: PCI) bus or an extended industry standard architecture (english: extended Industry Standard Architecture, abbreviated: EISA) bus, or the like. The communication bus may be classified as an address bus, a data bus, a control bus, or the like.
The communication interface is used for communication between the electronic device and other devices.
The Memory may include random access Memory (Random Access Memory, abbreviated as RAM) or nonvolatile Memory (NVM), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the aforementioned processor.
The processor may be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU for short), a network processor (Network Processor, NP for short), etc.; it may also be a digital signal processor (English: digitalSignal Processing; DSP; for short), an application specific integrated circuit (English: application Specific Integrated Circuit; ASIC; for short), a Field programmable gate array (English: field-Programmable Gate Array; FPGA; for short), or other programmable logic device, discrete gate or transistor logic device, discrete hardware components.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the present application, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another, for example, by wired (e.g., coaxial cable, optical fiber, digital Subscriber Line (DSL)), or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), etc.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
In this specification, each embodiment is described in a related manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for system embodiments, since they are substantially similar to method embodiments, the description is relatively simple, as relevant to see a section of the description of method embodiments.
The above embodiments are only for illustrating the technical solution of the present invention, and are not limiting; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention.
Claims (6)
1. The optimization method based on the current SRV6 related protection technology is characterized in that optimization is respectively carried out for protection of a client side and a service side, and related optimization scenes comprise three types of protection such as SRV6 Policy Hot-standby protection, client side static/dynamic ESI protection and the like;
in the complete networking, the client side and the service side are both configured with protection, and the links between the service side equipment and the links between the client side equipment and the service side equipment are protected in a segmented manner;
the public network paths to different destinations are distinguished by designating color in SRV6 Policy at the service side, hot-standby protection of the paths is introduced, a plurality of paths are initially set for the paths, main and standby paths are selected according to the priority of the paths, the service preferentially passes through the main paths, and when the link failure of the main path occurs, the service is switched into the standby paths, and the service is ensured to be quickly recovered by combining with a detection function;
but on the reverse path, if the link fails, the reverse path is set and the setting of path priorities is introduced for the traffic and detection messages, respectively.
2. The optimization method based on the current SRV6 related protection technology according to claim 1, wherein: comprises the steps of,
s11, when a reverse path is designated, routing BE (flow element) when a main link failure occurs in all service messages and detection messages on the path;
s12, when a reverse path is designated for the detection path, if a link failure occurs in the main path, the service reverses to route BE, when the detection message routes the designated reverse path, and the reverse paths are multiple, the path with the highest priority is preferentially routed, and when all the reverse paths have failures, the BE route is routed;
s13, when a reverse path is designated for a service path, if a main path has a link fault, detecting a reverse routing BE route, when a service message passes through the designated reverse path, and the reverse paths are multiple, preferentially passing through the path with the highest priority, and if all the reverse paths have faults, only passing through the BE route;
s14, when reverse paths are designated for detection and business, if a main path has a link failure, when the business and the detection all travel the designated reverse paths and the reverse paths are a plurality of, the path with the highest priority is preferentially traveled, and under the condition that all the reverse paths have the failure, the related business and the detection only travel BE routes;
s15, when the bandwidth of the main link exceeds the maximum bandwidth of the path, prompting that the bandwidth of the client is insufficient, and selecting other paths.
3. The optimization method based on the current SRV6 related protection technology according to claim 2, wherein: the ESI protection of the client side is divided into static ESI protection and dynamic ESI protection according to the service type at present; different optimization strategies are respectively introduced for the two types of protection, and the respective weak places are optimized, and the specific operation steps are as follows:
s21, if the client side is static ESI protection, a TRACK mixed mode is carried out on an AC of the service side, LAG BFD is preferentially selected to inform OAM-MAPPING to transmit faults to the head node, and if the LAG BFD is invalid or undeployed, a link fault of the client side is perceived by starting a link interface chain;
s22, if the client side is in dynamic ESI protection, a priority algorithm and a modulo arithmetic are adopted at present; the priority algorithm is that the same priority strategy is set, and a high priority strategy is adopted, and the priority is respectively set between two service side devices, and the high priority is mainly adopted; otherwise, when the low priority is used as the strategy, the low priority is mainly used for the two strategies;
the modulo arithmetic is to take router-IDs of multiple service side devices, discharge sequence numbers from 0 by size, hash traffic to different links for different VLAN election results, extract the number N of the same client side and V represented by different VLAN IDs, calculate the final sequence number i according to i=V mod N, and then determine the main link and the standby link according to the final sequence number sequence.
4. The optimization method based on the current SRV6 related protection technology according to claim 3, wherein: if the client side is dynamic ESI protection, a new hybrid algorithm is also included, the algorithm determines a final active-standby link according to the sequence number, firstly, the same strategy of the whole network is formulated, V represented by VLAN ID, O represented by Origin IP and N represented by multi-element number are extracted by taking the maximum or minimum sequence number as a judging standard, and the final sequence number X, X=V, n+O is calculated, so that the flow can be calculated to be active-standby according to the requirement of the client more easily.
5. A computer readable storage medium storing a computer program which, when executed by a processor, causes the processor to perform the steps of the method of any one of claims 1 to 4.
6. A computer device comprising a memory and a processor, the memory storing a computer program that, when executed by the processor, causes the processor to perform the steps of the method of any of claims 1 to 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311718182.1A CN117675688A (en) | 2023-12-14 | 2023-12-14 | Optimization method, equipment and medium based on current SRV6 related protection technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311718182.1A CN117675688A (en) | 2023-12-14 | 2023-12-14 | Optimization method, equipment and medium based on current SRV6 related protection technology |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117675688A true CN117675688A (en) | 2024-03-08 |
Family
ID=90082477
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311718182.1A Pending CN117675688A (en) | 2023-12-14 | 2023-12-14 | Optimization method, equipment and medium based on current SRV6 related protection technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117675688A (en) |
-
2023
- 2023-12-14 CN CN202311718182.1A patent/CN117675688A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11336565B2 (en) | Method and node for packet transmission in network | |
US10594512B2 (en) | Access network dual path connectivity | |
Shand et al. | IP fast reroute framework | |
EP3253011B1 (en) | Method and device for shortest path bridging (spb) enhanced resilience with loop mitigation | |
KR101895092B1 (en) | Mpls fast re-route using ldp (ldp-frr) | |
US8804501B2 (en) | Link failure recovery method and apparatus | |
US20120236730A1 (en) | Method, device and system for processing service traffic based on pseudo wires | |
US12034632B2 (en) | Fault protection method, node, and storage medium | |
CN112422307B (en) | Method, equipment and system for EVPN and VPLS coexistence dual-activity | |
CN105453491A (en) | Extended remote LFA fast reroute | |
CN106572012A (en) | VPN FRR implementation method and PE equipment | |
CN113366804A (en) | Method and system for preventing micro-loops during network topology changes | |
CN107682261B (en) | Flow forwarding method and device | |
US9716639B2 (en) | Protection switching method and system | |
WO2016123904A1 (en) | Routing convergence method, device and virtual private network system | |
CN113615132A (en) | Fast flooding topology protection | |
WO2016090815A1 (en) | Switching control method and device in deploying high-capacity service | |
US20240214243A1 (en) | Designated forwarder df election method and device | |
CN117675688A (en) | Optimization method, equipment and medium based on current SRV6 related protection technology | |
CN114567593B (en) | Path switching method and device, network equipment, and computer-readable storage medium | |
Tembo et al. | A new backup topology design method for congestion avoidance in IP fast reroute | |
JP3844235B2 (en) | Route selection method | |
Shand et al. | RFC 5714: IP fast reroute framework | |
KR20230093015A (en) | Information processing method, node and computer readable storage medium | |
CN117459367A (en) | An information processing method, device, equipment and readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |