Method and system for reducing packet loss in a service protection scheme

09769091 ยท 2017-09-19

Assignee

Inventors

Cpc classification

International classification

Abstract

A method for reducing packet loss includes: performing automatic and real-time adjustment to cost values of a first route and a second route, so that the cost value of the corresponding route of the primary pseudo wire (PW) is lower than that of the corresponding route of the secondary PW. A corresponding system is also provided. Automatic and real-time adjustment to cost values of the first route and the second route, enable the cost value of the corresponding route of the primary PW to be lower than that of the corresponding route of the secondary PW, and therefore enable the downlink traffic not passing through the PW that just recovers from a failure, thereby reducing packet loss when the downlink traffic passes through the PW while the primary PW just recovers from a failure.

Claims

1. A method for reducing packet loss in a service protection scheme, comprising: communicating, by a first network device, with a user access device by using a first pseudo wire (PW) through a first Layer 2 virtual Ethernet (L2VE) interface, wherein the first network device communicates with a target network device by using a first route through a first Layer 3 virtual Ethernet (L3VE) interface, and the first L2VE interface and the first L3VE interface belong to a first virtual Ethernet interface group (VE Group); communicating, by a second network device, with the user access device by using a second PW through a second L2VE interface, wherein the second network device communicates with the target network device by using a second route through a second L3VE interface, and the second L2VE interface and the second L3VE interface belong to a second VE Group; in an initial state of normal operation of the first PW and the second PW: setting the first PW to be primary; setting the second PW to be secondary; setting, by the first network device, a first cost value of the first route to a first value which is preset; and setting, by the second network device, a second cost value of the second route to a second value which is preset; upon determining the first PW is in a failure state: changing the first PW to be secondary; changing the second PW to be primary; setting, by the first network device, the first cost value to the second value; and setting, by the second network device, the second cost value to the first value; and upon determining that the first PW recovers from the failure state: waiting until a scheduled switch-back time while the first PW is secondary, the second PW is primary, the first cost value is the second value, and the second cost value is the first value; changing the first PW to be primary; changing the second PW to be secondary; setting, by the first network device, the first cost value to the first value; and setting, by the second network device, the second cost value to the second value, wherein: the first value and the second value are both non-negative values, the first value is smaller than the second value, and a traffic in a downlink direction from the target network device to the user access device passes through the first route when the first cost value is lower than the second cost value, and passes through the second route when the second cost value is lower than the first cost value.

2. The method of claim 1, further comprising: receiving, by the first network device, a command line, wherein the first value and the second value are pre-configured on the first network device by using the command line; and receiving, by the second network device, the command line, wherein the first value and the second value are pre-configured on the second network device by using the command line.

3. A system for reducing packet loss in a service protection scheme, comprising: a first network device; and a second network device; wherein: the first network device comprises a first Layer 2 virtual Ethernet (L2VE) interface, a first Layer 3 virtual Ethernet (L3VE) interface, a first transceiver, and a first processor; the second network device comprises a second L2VE interface, a second L3VE interface, a second transceiver, and a second processor; wherein: the first transceiver is configured to communicate with a user access device by using a first pseudo wire (PW) through the first L2VE interface and communicate with a target network device by using a first route through the first L3VE interface, the first L2VE interface and the first L3VE interface belonging to a first virtual Ethernet interface group (VE Group), the second transceiver is configured to communicate with the user access device by using a second PW through the second L2VE interface and communicate with the target network device by using a second route through the first L3VE interface, the second L2VE interface and the second L3VE interface belonging to a second VE Group, in an initial state of normal operation of the first PW and the second PW: the first processor is configured to set a first cost value to a first value, the first value being preset, the first PW is set to primary, the second processor is configured to set a second cost value to a second value, the second value being preset, the second PW is set to a corresponding secondary PW of the first PW, upon determining the first PW is in a failure state: the first processor is further configured to set the first cost value to the second value, the first PW is set to secondary, and the second processor is further configured to set the second cost value to the first value, the second PW is set to a corresponding primary PW of the first PW, upon determining the first PW is in a failure state: the first processor is further configured to set the first cost value to the second value, the first PW is set to secondary, and the second processor is further configured to set the second cost value to the first value, the second PW is set to a corresponding primary PW of the first PW, upon determining that the first PW recovers from the failure state: waiting until a scheduled switch-back time while the first PW is set to secondary, the second PW is set to the corresponding primary PW of the first PW, the first cost value is the second value, and the second cost value is the first value, the first processor is further configured to set the first cost value to the first value, the first PW is set to primary, the second processor is further configured to set the second cost value to the second value, the second PW is set to the corresponding secondary PW of the first PW, and, the first value and the second value are both non-negative values, the first value is smaller than the second value, and a traffic in a downlink direction from the target network device to the user access device passes through the first route when the first cost value is lower than the second cost value, and passes through the second route when the second cost value is lower than the first cost value.

4. A system for reducing packet loss in a service protection scheme, comprising: a first network device; and a second network device; wherein: the first network device comprises a first Layer 2 virtual Ethernet (L2VE) interface, a first Layer 3 virtual Ethernet (L3VE) interface, a first transceiver, and a first processor; the second network device comprises a second L2VE interface, a second L3VE interface, a second transceiver, and a second processor; wherein: the first transceiver is configured to communicate with a user access device by using a first pseudo wire (PW) through the first L2VE interface and communicate with a target network device by using a first route through the first L3VE interface, the first L2VE interface and the first L3VE interface belonging to a first virtual Ethernet interface group (VE Group), the second transceiver is configured to communicate with the user access device by using a second PW through the second L2VE interface and communicate with the target network device by using a second route through the first L3VE interface, the second L2VE interface and the second L3VE interface belonging to a second VE Group, in an initial state of normal operation of the first PW and the second PW: the first processor is configured to set a cost value of the first route to a first value, the first value being preset, the first PW is set to primary, the second processor is configured to set a cost value of the second route to a second value, the second value being preset, the second PW is set to a corresponding secondary PW of the first PW, upon determining the first PW is in a failure state: the first processor is further configured to set the cost value of the first route to the second value, the first PW is set to secondary, and the second processor is further configured to set the cost value of the second route to the first value, the second PW is set to a corresponding primary PW of the first PW upon determining that the first PW recovers from the failure state: waiting until a scheduled switch-back time while the first PW is set to secondary, the second PW is set to the corresponding primary PW of the first PW, the cost value of the first route is the second value, and the cost value of the second route is the first value, the first processor is further configured to set the cost value of the first route to the first value, the first PW is set to primary, the second processor is further configured to set the cost value of the second route to the second value, the second PW is set to the corresponding secondary PW of the first PW, and, the first value and the second value are both non-negative values, the first value is smaller than the second value, and a traffic in a downlink direction from the target network device to the user access device passes through the first route when the cost value of the first route is lower than the cost value of the second route, and passes through the second route when the cost value of the second route is lower than the cost value of the first route.

5. The system of claim 4, wherein, the first processor is configured to receive a command line, wherein the first value and the second value are pre-configured on the first network device by using the command line; and the second processor is configured to receive the command line, wherein the first value and the second value are pre-configured on the second network device by using the command line.

6. The system of claim 4, wherein, the first value is a cost default value; and the first processor is configured to receive a command line, wherein the second value is pre-configured on the first network device by using the command line; and the second processor is configured to receive the command line, wherein the second value is pre-configured on the second network device by using the command line.

Description

BRIEF DESCRIPTION OF DRAWINGS

(1) FIG. 1 is a networking schematic diagram under the scenario of the Internet protocol backhaul network;

(2) FIG. 2 is a flowchart for a method for reducing packet loss in a service protection scheme provided in the embodiment of the present invention;

(3) FIG. 3 is a schematic diagram for a system for reducing packet loss in a service protection scheme provided in the embodiment of the present invention;

(4) FIG. 4 is another schematic diagram for a system for reducing packet loss in a service protection scheme provided in the embodiment of the present invention.

DESCRIPTION OF EMBODIMENTS

(5) The following describes the technical solution of the present invention in combination with the accompanying drawings and embodiments.

(6) As shown in FIG. 2, embodiment of the present invention provides a method for reducing packet loss in a service protection scheme, including:

(7) 201. A first network device communicates with a user access device by using a first pseudo wire PW through a first L2VE interface, and the first network device communicates with a target network device by using a first route through a first L3VE interface, where the first L2VE interface and the first L3VE interface belong to a first virtual Ethernet interface group VE Group.

(8) 202. A second network device communicates with the user access device by using a second PW through a second L2VE interface, and the second network device communicates with the target network device by using a second route through a second L3VE interface, where the second L2VE interface and the second L3VE interface belong to a second VE Group.

(9) The first network device and the second network device communicate with other devices by using a PW through the L2VE interface, communicate with other devices by using a route through the L3VE interface, and may bind the L2VE interface to the L3VE interface by using VE Group. It may be, for example, a router from its shape.

(10) The user access device may establish PW function with other devices, for example, it may be a router, or may be a device in the packet transport network (Packet Transport Network, PTN).

(11) The target network device may communicate with other devices by using the routing protocol or the L3VPN, for example, it may be a router.

(12) The first route and the second route refer to routes in the IP routing protocol. Certainly, in another example, the first network device may further communicate with the target network device by using L3VPN through the first L3VE interface, and the second network device may further communicate with the target network device by using the L3VPN through the second L3VE interface, because the L3VPN is dependent on the route in the IP routing protocol.

(13) The first PW and the second PW are both served as a secondary PW to each other.

(14) To facilitate understanding, referring to FIG. 1, networking under the scenario of the IP backhaul is illustrated. The first network device is an RSG1 (103), the second network device is an RSG2 (104), the user access device is a CSG (102), and the target network device is an RNC (105).

(15) The RSG1 (103) communicates with the CSG (102) by using a PW (106), where the PW (106) is a primary PW under normal circumstances, and the RSG1 (103) communicates with the RNC (105) by using an L3VPN (112). The RSG1 (103) is configured with an L2VE interface (108) and an L3VE interface (109), and a VE Group is established on the RSG1 to bind the L2VE interface (108) to the L3VE interface (109). The L2VE interface (108) is connected to the primary PW (106), and the L3VE interface (109) is connected to the L3VPN (112);

(16) The RSG2 (104) communicates with the CSG (102) by using a PW (107), where the PW (107) is a secondary PW under normal circumstances; the RSG2 (104) is configured with an L2VE interface (110) and an L3VE interface (111), and a VE Group is established on the RSG2 to bind the L2VE interface (110) to the L3VE interface (111). The L2VE interface (110) is connected to a secondary PW (107), and the L3VE interface (111) is connected to an L3VPN (113).

(17) The uplink traffic refers to the traffic from the BTS (101) to the RNC (105), and the downlink traffic refers to the traffic from the RNC (105) to the BTS (101).

(18) 203. When the first PW is primary, the second PW changes to be secondary, the first network device sets a cost value of the first route to a preset first value, and the second network device sets a cost value of the second route to a preset second value, where the first value and the second value are both non-negative values, and the first value is smaller than the second value.

(19) 204. When the first PW is secondary, the second PW changes to be primary, the first network device sets the cost value of the first route to the second value, and the second network device sets the cost value of the second route to the first value.

(20) For example, the command line is input on the RGS1 (103) and the RSG2 (104) each after the RSG1 (103) and the RSG2 (104) are started, the first value is configured to, for example, 5, and the second value is configured to, for example, 100, by using the command line. Here, the first value and the second value are values used for route cost.

(21) For another example, the first value is a cost default value. Persons skilled in the art may understand that the cost default value is 0. In this case, the second value, greater than 0, for example, 100, needs only to be pre-configured on the RSG1 (103) and the RSG (104).

(22) Certainly, the first value and the second value may also be pre-configured on the RSG1 (103) and the RSG2 (104) through a network management system.

(23) Referring to FIG. 1, the following provides the description in several situations, assuming that the first value is 5, and the second value is 100.

(24) (1) Initial normal state: the PW (106) is the primary PW in the up state, while the PW (107) is the secondary PW in the up state.

(25) In this case, the RSG1 (103) sets the cost value of the first route, that is, the route depended by the L3VPN (112), to 5; the RSG2 (104) sets the cost value of the second route, that is, the route depended by the L3VPN (113), to 100. The RNC (105) has two routes in the downlink direction, where the cost value of the route to the RSG1 (103) is 5, the cost value of the route to the RSG2 (104) is 100, and the RNC (105) selects a route whose cost value is 5, the downlink traffic passing through the RSG1 (103).

(26) (2) Failure state of the PW (106): The PW (106) is the secondary PW in the down state, whereas the PW (107) is the primary PW in the up state.

(27) In this case, the RSG1 (103) sets the cost value of the first route to 100; the RSG2 (104) sets the cost value of the second route to 5. Because the PW (106) fails and therefore the L3VE interface (109) is triggered to be in the down state, the route to the RSG1 (103) is correspondingly deleted from the RNC (105), only leaving the route to the RSG2 (104) whose cost value is 5. The downlink traffic passes through the RSG2 (104).

(28) (3) The PW (106) recovers from a failure, but has still not come to the scheduled switch-back time: The PW (106) is the secondary PW in the up state, and the PW (107) is the primary PW in the up state.

(29) In this case, the cost value of the first route is 100, and the cost value of the second route is 5. Because the PW (106) recovers from the failure and the L3VE interface (109) again is triggered to be in the up state, the RNC (105) re-learns the route to the RSG1 (103). The RNC (105) has two routes in the downlink direction, where the cost value of the route to the RSG1 (103) is 100, the cost value of the route to the RSG2 (104) is 5, and the RNC (105) selects a route whose cost value of 5. The downlink traffic passes through the RSG2 (104).

(30) (4) When the switch-back time arrives, the PW (106) changes to be the primary PW in the up state again, and the PW (107) changes to be the secondary PW in the up state.

(31) This state is the same as that in item (1), and is not repeated any further.

(32) From the foregoing, it may be seen that, by enabling automatic and real-time interaction between the PW state and the cost of corresponding route, the downlink traffic may always pass through a path corresponding to the primary PW, therefore, for situations stated in the foregoing item (3), packet loss as in prior art no longer occurs.

(33) Embodiments of the present invention provide a method for reducing packet loss in a service protection scheme, which, by performing automatic and real-time adjustment to cost values of the first route and the second route, enables the cost value of corresponding route of the primary PW to be lower than that of corresponding route of the secondary PW, and therefore enable the downlink traffic not to pass through the PW that just recovers from a failure, thereby reducing packet loss when the downlink traffic passes through the PW while the primary PW just recovers from a failure.

(34) Referring to FIG. 3, an embodiment of the present invention provides a system for reducing packet loss in a service protection scheme, including: a first network device (301) and a second network device (302).

(35) The first network device (301) includes a first L2VE interface (311), a first L3VE interface (312), a first communication unit (313), and a first processing unit (314).

(36) The second network device (302) includes a second L2VE interface (321), a second L3VE interface (322), a second communication unit (323), and a second processing unit (324).

(37) The first communication unit (313) is configured to communicate with a user access device (370) by using a first PW (330) through the first L2VE interface (311) and communicate with a target network device (380) by using a first route (331) through the first L3VE interface (312), where the first L2VE (311) interface and the first L3VE interface (312) belong to a first virtual Ethernet interface group VE Group.

(38) The second communication unit (323) is configured to communicate with the user access device (370) by using a second PW (340) through the second L2VE interface (321) and communicate with the target network device (380) by using a second route (341) through the second L3VE interface (322), where the second L2VE interface (321) and the second L3VE interface (322) belong to a second VE Group.

(39) The first processing unit (314) is configured to set a cost value of the first route (331) to a preset first value when the first PW (330) is primary; accordingly, the second processing unit (324) is configured to set a cost value of the second route (341) to a preset second value when the second PW (340) is a corresponding secondary PW of the first PW (330), where the first value and the second value are both non-negative values, and the first value is smaller than the second value.

(40) The first processing unit (314) is further configured to set the cost value of the first route (331) to the second value when the first PW (330) is secondary; accordingly, the second processing unit (324) is further configured to set the cost value of the second route (341) to the first value when the second PW (340) is a corresponding primary PW of the first PW (330).

(41) For example, as shown in FIG. 4, the first network device (301) further includes: a first configuration unit (315), configured to receive a command line, where the first value and the second value are pre-configured on the first network device by using the command line; the second network device (302) further includes: a second configuration unit (325), configured to receive the command line, where the first value and the second value are pre-configured on the second network device by using the command line.

(42) For example, the first value is a cost default value. The first network device (301) further includes: a first configuration unit, configured to receive a command line, where the second value is pre-configured on the first network device by using the command line.

(43) The second network device (302) further includes: a second configuration unit, configured to receive the command line, where the second value is pre-configured on the second network device by using the command line.

(44) Embodiments of the present invention provide a system for reducing packet loss in a service protection scheme, which, by performing automatic and real-time adjustment to cost values of the first route and the second route, enables the cost value of corresponding route of the primary PW to be lower than that of corresponding route of the secondary PW, and therefore enable the downlink traffic not passing through the PW that just recovers from a failure, thereby reducing packet loss when the downlink traffic passes through the PW while the primary PW just recovers from a failure.

(45) For example, units in embodiments shown in FIG. 3 and FIG. 4 may be combined into one or more units.

(46) For another example, the unit or sub-unit may be realized by hardware. Persons of ordinary skill in the art may understand that all or part of the steps in a variety of methods of the foregoing embodiments may be implemented by a program instructing relevant hardware, the program may be stored in a computer readable storage medium, for example, the storage medium may include: a read only memory, a random access memory, a magnetic disk or an optical disk.

(47) The foregoing describes in detail for the method and the system for reducing packet loss in a service protection scheme provided by embodiments of the present invention, but the foregoing embodiments are merely intended for describing the method and core ideas of the present invention other than limiting the present invention. Changes or replacements that readily occur to persons skilled in the art within the technical scope disclosed by the present invention should fall within the scope of protection of the present invention.