WO2016165491A1 - Bridging service and bridging network element inspection method and apparatus - Google Patents

Bridging service and bridging network element inspection method and apparatus Download PDF

Info

Publication number
WO2016165491A1
WO2016165491A1 PCT/CN2016/074452 CN2016074452W WO2016165491A1 WO 2016165491 A1 WO2016165491 A1 WO 2016165491A1 CN 2016074452 W CN2016074452 W CN 2016074452W WO 2016165491 A1 WO2016165491 A1 WO 2016165491A1
Authority
WO
WIPO (PCT)
Prior art keywords
service
network element
bridging
l2vpn
bridged
Prior art date
Application number
PCT/CN2016/074452
Other languages
French (fr)
Chinese (zh)
Inventor
郑颖
张磊
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2016165491A1 publication Critical patent/WO2016165491A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0695Management of faults, events, alarms or notifications the faulty arrangement being the maintenance, administration or management system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks

Definitions

  • the present invention relates to the field of patrol technology for bridging services and bridging network elements, and in particular to a bridging service and a patrol inspection method and apparatus for bridging network elements.
  • Ethernet bridging service configuration schemes commonly used in the network include a VSI (Virtual Switch Interface) scheme and a Multi-to-One VLAN (Virtual Local Area Network) convergence scheme.
  • the base station Layer 2 Ethernet services are aggregated to the same bridged network element on the core layer. Therefore, several thousand base stations may be connected under one bridge network element, and there may be several thousand base station services on one bridge network element, and a large number of bridge relationship pairs may be configured on one bridge network element. Due to regional distribution requirements, multiple bridged network elements coexist in the entire network.
  • the bridging service itself has complex configuration and many related configuration items, and based on the high reliability requirements of the service, the bridging network elements are mostly paired with each other, and there is strong data association between the active and standby bridging network elements. .
  • the configuration requirements of the bridging service are also very different.
  • the inspection and bridging service is an important task that needs to be performed frequently.
  • the manual inspection has a very large workload, is very difficult, and has very low efficiency, and it is difficult to ensure the accuracy and completeness of the inspection results.
  • the network management system mainly focuses on the real-time presentation of the current configuration and status of the device.
  • the bridging service is a logical concept. It is necessary to combine multiple association configurations to form a bridging service, and the data association between the active and standby bridging network elements is high. Checking the standardization of bridging services and bridging points requires real-time data based on specific rules. According to the analysis, the judgment can be made, so the network management system cannot meet the requirements. For example, the check tool of the directly connected device can directly send a command to the device to query the device configuration and status.
  • the tool is mainly a point-to-point check device basic configuration. If you want to find the bridge service and bridge the network element, you must traverse the entire network device. , low efficiency.
  • the tool is suitable for presenting the current configuration and status of relatively independent functions on the device, such as checking device temperature and memory usage, but not checking for complex business logic, many configuration items, and high service coupling between devices. Complex business configurations, such as bridging services.
  • the data obtained by the tool from the device is not intuitive, and the professional skill of the user is very high, so the inspection tool of the directly connected device cannot meet the requirements.
  • the object of the present invention is to provide a method and a device for checking the bridging service and the bridging network element, so as to solve the problem that the bridging service inspection in the related art is difficult, and the accuracy and the efficiency are low.
  • a method for inspecting a bridging service and a bridging network element includes the following steps:
  • the bridge service and the bridge network element related to the device in the network are identified by analyzing the configuration of the output service port of the L2VPN service floor network element;
  • the L2VPN service refers to a Layer 2 virtual private network service.
  • the method further includes:
  • the primary bridged network element and the standby bridged network element are identified from the bridged network element by analyzing the pseudowire protection group data.
  • the step of identifying the bridging service related to the device in the network by analyzing the configuration of the output service port of the L2VPN service floor network element includes:
  • the L2VPN service is determined as a bridging service.
  • the step of determining whether the filtered L2VPN service is a bridged L2VPN service includes:
  • the Layer 2 virtual interface of the output service of the L2VPN service network element has a one-to-one binding relationship with the Layer 3 virtual interface, determine that the filtered L2VPN service is a bridged L2VPN service; or
  • the filtered L2VPN service is a bridged L2VPN service.
  • the step of identifying the bridged network element related to the device in the network by analyzing the configuration of the output service port of the L2VPN service floor network element includes:
  • the node where the Layer 2 virtual interface of the output service of the L2VPN service landing network element is located is a bridge network element;
  • the node where the Layer 2 virtual sub-interface of the output service of the L2VPN service landing network element is located is used as the bridge network element.
  • the step of identifying the primary bridged network element and the standby bridged network element from the bridged network element by analyzing the pseudowire protection group data includes:
  • filtering out the bridging service service layer pseudo-line is the first bridging service of the single-issue dual-received pseudo-line dual-homing protection group;
  • the two bridged network elements on the first bridging service are used as the primary bridged network element and the backup bridged network element.
  • the bridging service and the bridging according to the bridging service and the inspection scheme of the bridged network element include:
  • the bridge service and the bridge network element are patrolled according to the configuration parameter and the status data.
  • the ping inspection scheme of the bridging service and the bridging network element includes multiple inspection rules.
  • different inspection rules are invoked for the bridging service of the device to be inspected and the patrol scheme of the bridging network element.
  • a patrol device for bridging services and bridging network elements including a selection module, an L2VPN service module, an identification module, and a patrol module, wherein
  • the selection module is configured to: select a device to be inspected in the network according to the bridging service and the inspection scheme of the bridged network element;
  • the acquiring the L2VPN service module is configured to: obtain an L2VPN service that passes through the device;
  • the identifying module is configured to: identify a bridging service and a bridging network element related to the device in the network by analyzing a configuration of an output service port of the L2VPN service floor network element;
  • the patrol module is configured to perform patrol inspection on the bridging service and the bridging network element according to the bridging service and the patrol inspection scheme of the bridging network element.
  • the device further includes: acquiring a pseudowire protection group data unit,
  • the acquiring the pseudowire protection group data unit is configured to: acquire pseudowire protection group data associated with the device; and identify the primary bridge network element from the bridge network element by analyzing the pseudowire protection group data And alternate bridged network elements.
  • the identifying module is configured to identify the bridging service related to the device in the network by analyzing the configuration of the output service port of the L2VPN service landing network element as follows:
  • the L2VPN service is determined as a bridging service.
  • the identifying module is configured to determine whether the filtered L2VPN service is a bridged L2VPN service according to the following manner:
  • the Layer 2 virtual interface of the output service of the L2VPN service network element has a one-to-one binding relationship with the Layer 3 virtual interface, determine that the filtered L2VPN service is a bridged L2VPN service; or
  • the filtered L2VPN service is a bridged L2VPN service.
  • the identifying module is configured to: by analyzing the configuration of the output service port of the L2VPN service floor network element, to identify the bridged network element related to the device in the network, including:
  • the node where the Layer 2 virtual interface of the output service of the L2VPN service landing network element is located is a bridge network element;
  • the node where the Layer 2 virtual sub-interface of the output service of the L2VPN service landing network element is located is used as the bridge network element.
  • the acquiring the pseudowire protection group data unit is configured to identify the primary bridged network element and the backup bridged network element from the bridged network element by analyzing the pseudowire protection group data as follows:
  • filtering out the bridging service service layer pseudo-line is the first bridging service of the single-issue dual-received pseudo-line dual-homing protection group;
  • the two bridged network elements on the first bridging service are used as the primary bridged network element and the backup bridged network element.
  • the patrol module is configured to perform patrol inspection on the bridging service and the bridging network element according to the bridging service and the patrol inspection scheme of the bridging network element as follows:
  • the bridge service and the bridge network element are patrolled according to the configuration parameter and the status data.
  • the user can customize the inspection scheme and reuse the inspection scheme.
  • the system can identify the L2VPN bridging service and the bridging network element in the entire network, and complete the bridging service and the bridging network element configuration and status check in the entire network.
  • the manual input cost of the bridging service and the bridging network element inspection is greatly reduced, the difficulty of the bridging service and the bridging network element inspection is reduced, the accuracy of the inspection and the efficiency of the inspection are improved, and the labor cost input is greatly reduced.
  • FIG. 1 is a flowchart of a method for inspecting a bridging service and a bridging network element according to an embodiment of the present invention
  • FIG. 2 is a structural diagram of a bridging service and a patrol device for a bridged network element according to an embodiment of the present invention
  • FIG. 3 is a schematic diagram of a bridging service and a patrol system for a bridged network element according to an embodiment of the present invention
  • FIG. 4 is a flowchart of a bridging service and a method for inspecting a bridged network element according to a first embodiment of the present invention
  • FIG. 5 is a flowchart of a bridging service and a method for inspecting a bridged network element according to a second embodiment of the present invention.
  • FIG. 1 is a flowchart of a method for inspecting a bridging service and a bridging network element according to an embodiment of the present invention. As shown in FIG. 1, the method includes the following steps:
  • Step S101 Select a device to be inspected in the network according to the bridging service and the inspection scheme of the bridged network element.
  • Step S102 Acquire an L2VPN service that passes through the device.
  • Step S103 Identifying the bridging service and the bridging network element related to the device in the network by analyzing the configuration of the output service port of the L2VPN service landing network element;
  • Step S104 Perform patrol inspection on the bridging service and the bridging network element according to the bridging service and the patrol inspection scheme of the bridged network element.
  • the L2VPN service refers to a Layer 2 virtual private network service.
  • the embodiment of the present invention further includes: acquiring pseudowire protection group data associated with the device; identifying the primary bridge network element and the backup bridge network element from the bridge network element by analyzing the pseudowire protection group data .
  • the analyzing the configuration of the output service port of the L2VPN service landing network element, and identifying the bridging service related to the device in the network includes: analyzing the configuration of the output service port of the L2VPN service landing network element And filtering out the L2VPN service of the L2VPN service landing network element as the Layer 2 virtual interface or the Layer 2 virtual sub-interface; determining whether the filtered L2VPN service is a bridged L2VPN service; and determining the filtered L2VPN service When the L2VPN service is bridged, the L2VPN service is determined to be a bridge service.
  • the determining whether the filtered L2VPN service is a bridged L2VPN service includes: if the Layer 2 virtual interface of the output service of the L2VPN service landing network element has a one-to-one binding relationship with the Layer 3 virtual interface, The L2VPN service is a bridged L2VPN service; or if the Layer 2 virtual sub-interface of the output service of the L2VPN service landing network element has a one-to-one binding relationship with the Layer 3 virtual sub-interface, it is determined that the filtered L2VPN service is bridged. L2VPN service.
  • the analyzing the configuration of the output service port of the L2VPN service floor network element, and identifying the bridge network element related to the device in the network includes: layer 2 of the output service of the L2VPN service landing network element
  • the node where the virtual interface is located serves as the bridged network element; or the node where the Layer 2 virtual sub-interface of the output service of the L2VPN service landing network element is located as the bridged network element.
  • the patrolling service and the bridging network element are inspected according to the bridging service and the bridging network element inspection scheme, including: bridging the network element and the bridging network corresponding to the bridging service according to the bridging service and the inspection scheme of the bridging network element
  • the configuration parameters and status data of the network element and the alternate bridged network element; and the patrol service and the bridged network element are patrolled according to the configuration parameter and the status data.
  • the ping inspection scheme of the bridging service and the bridging network element includes multiple inspection rules; wherein different inspection rules are invoked for the bridging service of different devices to be inspected and the patrol inspection scheme of the bridging network element.
  • FIG. 2 is a structural diagram of a bridging service and a patrol device for a bridged network element according to an embodiment of the present invention. As shown in FIG. 2, the method includes: a selection module 201, an L2VPN service module 202, an identification module 203, and a patrol module. 204.
  • the selecting module 201 is configured to: select a device to be inspected in the network according to the bridging service and the inspection scheme of the bridged network element;
  • the acquiring the L2VPN service module 202 is configured to: obtain an L2VPN service that passes through the device;
  • the identifying module 203 is configured to: identify the bridging service and the bridging network element related to the device in the network by analyzing the configuration of the output service port of the L2VPN service floor network element;
  • the patrol module 204 is configured to perform patrol inspection on the bridging service and the bridging network element according to the bridging service and the patrol inspection scheme of the bridging network element.
  • the embodiment of the present invention further includes: acquiring a pseudowire protection group data unit, configured to: acquire pseudowire protection group data associated with the device; wherein, by analyzing the pseudowire protection group data, from the bridge network element The primary bridged network element and the standby bridged network element are identified.
  • the identifying module is configured to identify the bridging service related to the device in the network by analyzing the configuration of the output service port of the L2VPN service landing network element as follows:
  • the output service port of the L2VPN service floor network element is filtered as a Layer 2 virtual interface or a Layer 2 virtual sub-interface by analyzing the configuration of the output service port of the L2VPN service floor network element.
  • the L2VPN service is determined as a bridging service.
  • the identifying module is configured to determine whether the filtered L2VPN service is a bridged L2VPN service according to the following manner:
  • the Layer 2 virtual interface of the output service of the L2VPN service network element has a one-to-one binding relationship with the Layer 3 virtual interface, determine that the filtered L2VPN service is a bridged L2VPN service; or
  • the filtered L2VPN service is a bridged L2VPN service.
  • the identifying module is configured to: by analyzing the configuration of the output service port of the L2VPN service floor network element, to identify the bridged network element related to the device in the network, including:
  • the node where the Layer 2 virtual interface of the output service of the L2VPN service landing network element is located is a bridge network element;
  • the node where the Layer 2 virtual sub-interface of the output service of the L2VPN service landing network element is located is used as the bridge network element.
  • the acquiring the pseudowire protection group data unit is configured to identify the primary bridged network element and the backup bridged network element from the bridged network element by analyzing the pseudowire protection group data as follows:
  • filtering out the bridging service service layer pseudo-line is the first bridging service of the single-issue dual-received pseudo-line dual-homing protection group;
  • the two bridged network elements on the first bridging service are used as the primary bridged network element and the backup bridged network element.
  • the patrol module is configured to perform patrol inspection on the bridging service and the bridging network element according to the bridging service and the patrol inspection scheme of the bridging network element as follows:
  • the bridge service and the bridge network element are patrolled according to the configuration parameter and the status data.
  • the ping inspection scheme of the bridging service and the bridging network element includes multiple inspection rules.
  • the patrol module invokes different inspection rules for the bridging service of the device to be inspected and the inspection scheme of the bridging network element. .
  • FIG. 3 is a schematic diagram of a bridging service and a bridging network element inspection system according to an embodiment of the present invention. As shown in FIG. 3, the method includes: a customized inspection scheme module 301, an acquisition data module 302, a recognition bridging service, and a bridge network. The meta module 303, the patrol bridging service, and the bridging network element module 304.
  • the customized inspection plan module 301 selects an inspection rule according to the requirements of the on-site inspection, and customizes the inspection service of the bridge service.
  • multiple inspection rules are supported, and multiple sets of inspection plans are supported, and the inspection plan can be saved.
  • plan templates can be reused.
  • the inspection plan supports checking multiple device types and checking multi-terminal devices.
  • the collection data module 302 collects the base station service in the network according to the customized inspection scheme (mainly refers to the L2VPN service, hereinafter referred to as the L2VPN service, and collects the pseudowire protection group associated with the selected device.
  • the customized inspection scheme mainly refers to the L2VPN service, hereinafter referred to as the L2VPN service
  • the identifying the bridging service and the bridging network element module 303 the system identifies the L2VPN bridging service and the bridging network element from the collected L2VPN service.
  • the system filters out the single-issue double-received pseudo-line dual-homing protection group from the collected pseudo-line protection group.
  • the bridged network element that is mutually active and standby is identified by the correspondence between the L2VPN bridging service and the single-issue and dual-received pseudowire protection group.
  • the system will identify all L2VPN bridging services, bridged NEs, and active and standby bridging NEs in the network.
  • the patrol bridging service and the bridging network element module 304 invoke the inspection rule processing flow in the patrol inspection scheme to check the bridging service and the bridging network element.
  • the data source can be obtained from multiple channels, for example, the configuration and status data of the bridged network element, the primary bridged network element, and the standby bridged network element corresponding to the L2VPN bridging service are obtained from the network management or the device.
  • Check the bridge according to the inspection rules Check whether the service configuration data meets the configuration specifications, check whether the associated data between the primary bridged network element and the standby bridged network element meets the configuration specifications, and check the running status of the bridged service.
  • the system checks to cover all L2VPN bridging services associated with the selected device. If multiple inspection rules are selected in the inspection scheme, the system will invoke multiple inspection rule processing procedures to perform the inspection. The inspection rules are different, the data sources obtained are different, and the processing flow is different.
  • FIG. 4 is a flowchart of a method for inspecting a bridging service and a bridging network element according to a first embodiment of the present invention. As shown in FIG. 4, the method includes the following steps:
  • Step S401 customizing the inspection plan
  • the user selects the inspection rules and customizes the inspection service of the bridging service.
  • multiple inspection rules are supported, and multiple inspection schemes can be customized.
  • the inspection scheme can be saved as a template, and the scheme template can be reused.
  • the inspection plan supports checking multiple device types and checking multi-terminal devices.
  • Step S402 collecting an L2VPN service and a pseudowire protection group
  • the system collects the L2VPN service of the selected device in the network and the pseudowire protection group associated with the selected device according to the customized inspection scheme.
  • Step S403 Identify the bridge service and the bridge network element.
  • the system analyzes the L2VPN service, finds the service floor network element and the output service port of each L2VPN service, and filters out the L2VPN service whose output service port of the service floor network element is a Layer 2 virtual interface or a virtual sub-interface. If the Layer 2 virtual interface has a one-to-one binding relationship with the Layer 3 virtual interface, and the corresponding Layer 2 virtual sub-interface has a corresponding relationship with the Layer 3 virtual sub-interface, the L2VPN service is considered to be a bridged service, that is, a bridge service.
  • the node where the Layer 2 virtual interface of the output service resides is the bridged NE.
  • the system analyzes the data of the pseudo-line protection group and filters out the single-issue double-received pseudo-line dual-return protection group. Then, the L2VPN service whose pseudo-line is a single-issue and dual-received pseudo-line dual-homing protection group is filtered out from the bridged L2VPN service. If there are two bridged NEs on the L2VPN service, the two bridged NEs are bridged NEs that are mutually active and standby. In the current network, a multi-to-one VSI or a multi-to-one VLAN aggregation bridging service configuration scheme is used, that is, multiple services from different base stations are aggregated and bridged to different bridging relationship pairs of the same node.
  • Step S404 Invoking the patrol processing process to check the bridging service and the bridging network element.
  • the system invokes the corresponding inspection rule processing flow according to the inspection plan.
  • the data source can be obtained from multiple ways, for example, the configuration parameters of the bridged network element, the primary bridged network element, and the standby bridged network element corresponding to the L2VPN bridging service are obtained from the network management system or the device.
  • Status data Check whether the bridging service and the bridging NE configuration data meet the configuration specifications, check whether the associated data between the primary bridged network element and the standby bridged NE meets the configuration specifications, and check the running status of the bridging service.
  • the system checks all L2VPN bridging services associated with the selected device. If multiple inspection rules are selected in the inspection scheme, the system will invoke multiple inspection rule processing procedures to perform the inspection. The inspection rules are different, the data sources obtained are different, and the processing flow is different.
  • FIG. 5 is a flowchart of a bridging service and a method for inspecting a bridged network element according to a second embodiment of the present invention.
  • a patrol scheme is first customized, including an inspection rule: checking the bridging service in the network. Whether the gateway configuration conforms to the specification.
  • the bridging service dual gateway refers to two bridging network elements that are mutually active and standby on the bridged L2VPN service.
  • a multi-to-one VLAN aggregation bridging service configuration scheme is adopted. Multiple bridging network elements have multiple L2VPN bridging services, and one bridging network element has multiple pairs of bridging correspondences, and multiple bridging networks in the whole network. yuan. Specifically, the following steps are included:
  • Step S501 The user customizes a patrol scheme and selects a bridging service dual gateway configuration check check rule.
  • Step S502 Save the customized inspection plan as a template, which can be reused.
  • Step S503 According to the inspection scheme, select a device to be inspected in the network, and support multiple device types. This example selects all devices in the network.
  • Step S504 Acquire a pseudowire protection group associated with the selected device according to the selected device set.
  • Step S505 The system acquires the L2VPN service of the selected device according to the selected device set.
  • Step S506 Analyze the L2VPN service, and find the service floor network element and the output service port of each service.
  • the output service port of the service landing network element is the L2VPN service of the Layer 2 virtual interface or the virtual sub-interface. If the output service port of the service network element of the L2VPN service is not a Layer 2 virtual interface, the process ends.
  • Step S508 Check whether the Layer 2 virtual interface of the output service of the service network element of the L2VPN service is bound to the Layer 3 virtual interface one-to-one. If there is no one-to-one binding relationship, the flow ends, and if so, step S509 is performed downward.
  • the L2VPN service has a one-to-one binding relationship between the Layer 2 virtual interface and the Layer 3 virtual interface of the service network element.
  • the L2VPN service is a bridged service, that is, a bridge service.
  • Step S510 The node where the Layer 2 virtual interface of the L2VPN bridging service output service is a bridged network element.
  • Step S511 The system analyzes the pseudowire protection group data, and filters out the single-issue double-received pseudo-line dual-homing protection group.
  • Step S512 Analyze the L2VPN service set with the bridge, and filter out the L2VPN service whose service layer pseudowire is a single-issue dual-received pseudo-line dual-homing protection group. If the L2VPN service is not found, that is, the L2VPN service with dual gateways is not found, the process of this example ends.
  • Step S513 If the service layer pseudowire is a single-issue dual-received pseudo-line dual-homing protection group, the L2VPN service has two bridged network elements, and is an L2VPN bridging service set with dual gateways.
  • Step S514 Each of the L2VPN bridging services with dual gateways has two bridging network elements, and the two bridging network elements are bridging network elements that are mutually active and standby in the current service. The system will identify all active and standby bridge node pairs.
  • Step S515 The system obtains the device type of the bridged network element from the network management according to the requirement of the inspection rule selected in the customized inspection plan.
  • Step S516 Determine the device type of the bridged network element.
  • Step S517 If the bridged network element is the device type 1, the system sends a command to the primary bridged network element and the standby bridged network element to query the configuration state of the virtual router redundancy protocol (VRRP).
  • VRRP virtual router redundancy protocol
  • Step S518 Compare the VRRP status of the primary bridged network element and the standby bridged network element, whether the status is consistent, and whether they are equal to the target value.
  • Step S519 If the VRRP status of the primary bridged network element and the standby bridged network element are the same and are equal to the target value, the dual gateway configuration of the current bridging service is considered to meet the configuration specification.
  • Step S520 If it is not the case of step S519, it is considered that the dual gateway configuration of the current bridging service does not conform to the configuration specification.
  • Step S521 If the bridged network element is not device type 1, the system queries the IP, MAC (Media Access Control) address, and mask address of the Layer 3 virtual sub-interface in the bridge relationship on the primary bridged network element. The system queries the IP, MAC, and mask addresses of the Layer 3 virtual sub-interfaces in the bridge relationship on the alternate bridged NE.
  • IP IP
  • MAC Media Access Control
  • Step S522 Compare whether the IP, MAC, and mask addresses of the primary bridged network element that are queried in step S521 and the IP, MAC, and mask addresses of the alternate bridged network element are equal, that is, whether it is the primary bridged network element.
  • the IP address of the alternate bridged network element is equal to the MAC address of the alternate bridged network element, and the MAC address of the primary bridged network element is equal to the mask address of the alternate bridged network element.
  • Step S523 If the IP, MAC, and mask addresses of the primary bridged network element that are queried in step S522 are equal to the IP, MAC, and mask addresses of the alternate bridged network element, the dual gateway of the current bridging service is considered to be equal.
  • the configuration conforms to the configuration specification.
  • Step S524 If the IP, MAC, and mask addresses of the primary bridged network element that is queried in step S522 are not equal to the IP, MAC, and mask addresses of the alternate bridged network element, the dual gateway of the current bridging service is considered to be the same. The configuration does not meet the configuration specifications.
  • Step S525 Determine whether to check the dual gateway configuration of all the bridging services in the network. If the check is not completed, the process proceeds to step S515, and if the check is completed, the process is terminated.
  • the embodiment of the present invention identifies the bridging service and the bridging network element by analyzing the output service port of the service network element, that is, whether the output service port is a Layer 2 virtual interface or a virtual sub-interface, and the corresponding Layer 2 virtual interface and the third Whether the Layer 1 virtual interface has a one-to-one binding relationship, and whether the corresponding Layer 2 virtual sub-interface has a corresponding relationship with the Layer 3 virtual sub-interface.
  • Multiple processing flows can be selected to check the bridging service, the bridging network element, and multiple configuration items associated with the active and standby bridging network elements.
  • a template can be formed to support the patrol program reuse.
  • the user can customize the inspection scheme and reuse the inspection scheme.
  • the system can identify the L2VPN bridging service and the bridging network element in the network, and complete the bridging service and the bridging network element configuration and status check in the entire network.
  • the manual input cost of the bridging service and the bridging network element inspection is greatly reduced, the difficulty of the bridging service and the bridging network element inspection is reduced, the efficiency of the inspection is improved, and the accuracy of the inspection is improved.
  • the embodiment of the invention further discloses a computer program, comprising program instructions, when the program instruction is executed by a computer, so that the computer can perform any of the above-mentioned bridging services and the inspection method of the bridged network element.
  • the embodiment of the invention also discloses a carrier carrying the computer program.
  • all or part of the steps of the above embodiments may also be implemented by using an integrated circuit. These steps may be separately fabricated into individual integrated circuit modules, or multiple modules or steps may be fabricated into a single integrated circuit module. achieve. Thus, the invention is not limited to any specific combination of hardware and software.
  • the devices/function modules/functional units in the above embodiments may be implemented by a general-purpose computing device, which may be centralized on a single computing device or distributed over a network of multiple computing devices.
  • each device/function module/functional unit in the above embodiment When each device/function module/functional unit in the above embodiment is implemented in the form of a software function module and sold or used as a stand-alone product, it can be stored in a computer readable storage medium.
  • the above mentioned computer readable storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
  • the user can customize the inspection scheme and reuse the inspection scheme.
  • the system can identify the L2VPN bridging service and the bridging network element in the entire network, and complete the bridging service and the bridging network element configuration and status check in the entire network.
  • the manual input cost of the bridging service and the bridging network element inspection is greatly reduced, the difficulty of the bridging service and the bridging network element inspection is reduced, the accuracy of the inspection and the efficiency of the inspection are improved, and the labor cost input is greatly reduced. Therefore, the present invention has strong industrial applicability.

Abstract

A bridging service and bridging network element inspection method and apparatus. The method comprises the following steps: selecting a device to be checked in a network according to an inspection solution of a bridging service and a bridging network element; acquiring an L2VPN service passing through the device; identifying the bridging service and the bridging network element related to the device in the network by analyzing a configuration of an output service port of a trunking network element of the L2VPN service; and inspecting the bridging service and the bridging network element according to the inspection solution of the bridging service and the bridging network element. The technical solution of the present invention greatly reduces the difficulty of the bridging service inspection, improves the inspection accuracy and the inspection efficiency, and greatly reduces the investment in manpower cost.

Description

一种桥接业务和桥接网元的巡检方法及装置Patrol service and bridge network element inspection method and device 技术领域Technical field
本文涉及桥接业务和桥接网元的巡检技术领域,具体地说,涉及一种桥接业务和桥接网元的巡检方法及装置。The present invention relates to the field of patrol technology for bridging services and bridging network elements, and in particular to a bridging service and a patrol inspection method and apparatus for bridging network elements.
背景技术Background technique
随着数据通信与多媒体业务需求的发展,数据通讯网络已经遍布全球,既要利用相关数据通讯网络为用户提供低成本网络通信,又要兼容并适应新增数据通信业务需求,移动网关桥接业务配置方案在数据通信网络中得到广范应用。With the development of data communication and multimedia services, the data communication network has spread all over the world. It is necessary to use the relevant data communication network to provide users with low-cost network communication, and to be compatible and adapt to the needs of new data communication services. Mobile gateway bridging service configuration The solution is widely used in data communication networks.
目前,网络中常用的以太网桥接业务配置方案有多对一VSI(Virtual Switch Interface,虚拟交换接口)方案、多对一VLAN(Virtual Local Area Network,虚拟局域网)汇聚方案等,其共同特点是多个基站二层以太网业务汇聚到核心层上相同的桥接网元。因此,一个桥接网元下可能挂几千个基站,一个桥接网元上可能有几千条基站业务经过,一个桥接网元上可配置大量的桥接关系对。全网中由于区域分布的要求,会有多个桥接网元并存。另外,桥接业务本身配置复杂、关联配置项繁多,而且基于业务的高可靠性的要求,桥接网元多是互为主备成对出现,主备桥接网元之间有很强的数据关联性。再则,在不同的运营商应用场景中,桥接业务的配置要求也有很大的差异。Currently, the Ethernet bridging service configuration schemes commonly used in the network include a VSI (Virtual Switch Interface) scheme and a Multi-to-One VLAN (Virtual Local Area Network) convergence scheme. The base station Layer 2 Ethernet services are aggregated to the same bridged network element on the core layer. Therefore, several thousand base stations may be connected under one bridge network element, and there may be several thousand base station services on one bridge network element, and a large number of bridge relationship pairs may be configured on one bridge network element. Due to regional distribution requirements, multiple bridged network elements coexist in the entire network. In addition, the bridging service itself has complex configuration and many related configuration items, and based on the high reliability requirements of the service, the bridging network elements are mostly paired with each other, and there is strong data association between the active and standby bridging network elements. . In addition, in different carrier application scenarios, the configuration requirements of the bridging service are also very different.
因此网络运维工作中,巡检桥接业务是一项重要并且需要经常执行的工作。但是人工巡检,其工作量非常巨大,难度非常高,效率非常低,而且很难保证检查结果的准确性、完整性。Therefore, in the network operation and maintenance work, the inspection and bridging service is an important task that needs to be performed frequently. However, the manual inspection has a very large workload, is very difficult, and has very low efficiency, and it is difficult to ensure the accuracy and completeness of the inspection results.
目前有一些可借助的工具,如:网络管理系统、或某些直连设备的检查工具,但是这些工具在应用上都有一些局限性。如,网络管理系统主要侧重于设备当前配置及状态的实时呈现。但桥接业务是一个逻辑概念,需要组合多个关联配置才能形成桥接业务,并且主备桥接网元之间的数据关联性很高。检查桥接业务及桥接点的规范性需要实时数据的基础上按照特定规则进行数 据分析才能得出判断,因此网管系统不能满足要求。又如,直连设备的检查工具可以直接向设备下发命令查询设备配置及状态,但这种工具主要是点对点检查设备基础配置,如果想找出桥接业务及桥接网元,必须遍历全网设备,效率较低。另外,这种工具对于呈现设备上相对独立的功能的当前配置及状态比较适用,如检查设备温度、内存使用率等,但无法检查业务逻辑复杂、配置项较多、设备之间业务耦合度高的复杂业务配置,例如桥接业务。再者,这种工具从设备上获取的数据不直观,对用户的专业技能要求很高,因此直连设备的检查工具也不能满足要求。There are currently some tools available, such as network management systems, or inspection tools for some direct-connected devices, but these tools have some limitations in their applications. For example, the network management system mainly focuses on the real-time presentation of the current configuration and status of the device. However, the bridging service is a logical concept. It is necessary to combine multiple association configurations to form a bridging service, and the data association between the active and standby bridging network elements is high. Checking the standardization of bridging services and bridging points requires real-time data based on specific rules. According to the analysis, the judgment can be made, so the network management system cannot meet the requirements. For example, the check tool of the directly connected device can directly send a command to the device to query the device configuration and status. However, the tool is mainly a point-to-point check device basic configuration. If you want to find the bridge service and bridge the network element, you must traverse the entire network device. , low efficiency. In addition, the tool is suitable for presenting the current configuration and status of relatively independent functions on the device, such as checking device temperature and memory usage, but not checking for complex business logic, many configuration items, and high service coupling between devices. Complex business configurations, such as bridging services. Moreover, the data obtained by the tool from the device is not intuitive, and the professional skill of the user is very high, so the inspection tool of the directly connected device cannot meet the requirements.
发明内容Summary of the invention
本发明的目的在于提供桥接业务和桥接网元的巡检方法及装置,以解决相关技术中桥接业务巡检难度大,且准确性和效率低的问题。The object of the present invention is to provide a method and a device for checking the bridging service and the bridging network element, so as to solve the problem that the bridging service inspection in the related art is difficult, and the accuracy and the efficiency are low.
为了解决上述技术问题,采用如下技术方案:In order to solve the above technical problems, the following technical solutions are adopted:
一种桥接业务和桥接网元的巡检方法,包括以下步骤:A method for inspecting a bridging service and a bridging network element includes the following steps:
根据桥接业务和桥接网元的巡检方案,选择网络中待检查的设备;Selecting devices to be inspected in the network according to the bridging service and the inspection scheme of the bridged network element;
获取途经所述设备的L2VPN业务;Obtaining an L2VPN service passing through the device;
通过分析所述L2VPN业务落地网元的输出业务端口的配置,识别出网络中与所述设备相关的桥接业务和桥接网元;The bridge service and the bridge network element related to the device in the network are identified by analyzing the configuration of the output service port of the L2VPN service floor network element;
根据所述桥接业务和桥接网元的巡检方案,对桥接业务和桥接网元进行巡检;Performing inspections on the bridging service and the bridging network element according to the bridging service and the inspection scheme of the bridged network element;
其中,所述L2VPN业务是指二层虚拟专用网络业务。The L2VPN service refers to a Layer 2 virtual private network service.
可选地,该方法还包括:Optionally, the method further includes:
获取与所述设备相关联的伪线保护组数据;Obtaining pseudowire protection group data associated with the device;
通过分析所述伪线保护组数据,从所述桥接网元中识别出主用桥接网元和备用桥接网元。The primary bridged network element and the standby bridged network element are identified from the bridged network element by analyzing the pseudowire protection group data.
可选地,所述通过分析所述L2VPN业务落地网元的输出业务端口的配置,识别出网络中与所述设备相关的桥接业务的步骤包括: Optionally, the step of identifying the bridging service related to the device in the network by analyzing the configuration of the output service port of the L2VPN service floor network element includes:
通过分析所述L2VPN业务落地网元的输出业务端口的配置,过滤出所述L2VPN业务落地网元的输出业务端口为二层虚接口或二层虚子接口的L2VPN业务;By analyzing the configuration of the output service port of the L2VPN service floor network element, filtering out the L2VPN service whose output service port of the L2VPN service floor network element is a Layer 2 virtual interface or a Layer 2 virtual sub-interface;
判断所过滤出的L2VPN业务是否为带桥接L2VPN业务;Determining whether the filtered L2VPN service is a bridged L2VPN service;
当判断所过滤出的L2VPN业务为带桥接L2VPN业务时,则将所述L2VPN业务确定为桥接业务。When it is determined that the filtered L2VPN service is a bridged L2VPN service, the L2VPN service is determined as a bridging service.
可选地,所述判断所过滤出的L2VPN业务是否为带桥接L2VPN业务的步骤包括:Optionally, the step of determining whether the filtered L2VPN service is a bridged L2VPN service includes:
若所述L2VPN业务落地网元的输出业务的二层虚接口与三层虚接口有一对一绑定关系,则判定所过滤出的L2VPN业务为带桥接L2VPN业务;或者If the Layer 2 virtual interface of the output service of the L2VPN service network element has a one-to-one binding relationship with the Layer 3 virtual interface, determine that the filtered L2VPN service is a bridged L2VPN service; or
若所述L2VPN业务落地网元的输出业务的二层虚子接口与三层虚子接口有一对一绑定关系,则判定所过滤出的L2VPN业务为带桥接L2VPN业务。If the Layer 2 virtual sub-interface of the output service of the L2VPN service network element has a one-to-one binding relationship with the Layer 3 virtual sub-interface, it is determined that the filtered L2VPN service is a bridged L2VPN service.
可选地,所述通过分析所述L2VPN业务落地网元的输出业务端口的配置,识别出网络中与所述设备相关的桥接网元的步骤包括:Optionally, the step of identifying the bridged network element related to the device in the network by analyzing the configuration of the output service port of the L2VPN service floor network element includes:
将所述L2VPN业务落地网元的输出业务的二层虚接口所在的节点作为桥接网元;或者The node where the Layer 2 virtual interface of the output service of the L2VPN service landing network element is located is a bridge network element; or
将所述L2VPN业务落地网元的输出业务的二层虚子接口所在的节点作为桥接网元。The node where the Layer 2 virtual sub-interface of the output service of the L2VPN service landing network element is located is used as the bridge network element.
可选地,所述通过分析所述伪线保护组数据,从所述桥接网元中识别出主用桥接网元和备用桥接网元的步骤包括:Optionally, the step of identifying the primary bridged network element and the standby bridged network element from the bridged network element by analyzing the pseudowire protection group data includes:
通过分析所述伪线保护组数据,过滤出单发双收伪线双归保护组;By analyzing the pseudowire protection group data, filtering out the single-issue double-received pseudo-line dual-homing protection group;
根据所述单发双收伪线双归保护组,过滤出所述桥接业务服务层伪线是单发双收伪线双归保护组的第一桥接业务;According to the single-issue dual-received pseudo-line dual-homing protection group, filtering out the bridging service service layer pseudo-line is the first bridging service of the single-issue dual-received pseudo-line dual-homing protection group;
将所述第一桥接业务上的两个桥接网元作为主用桥接网元和备用桥接网元。The two bridged network elements on the first bridging service are used as the primary bridged network element and the backup bridged network element.
可选地,所述根据桥接业务和桥接网元的巡检方案,对桥接业务和桥接 网元进行巡检的步骤包括:Optionally, the bridging service and the bridging according to the bridging service and the inspection scheme of the bridged network element The steps for the network element to perform the inspection include:
根据桥接业务和桥接网元的巡检方案,获取桥接业务对应的桥接网元、主用桥接网元以及备用桥接网元的配置参数及状态数据;Obtaining configuration parameters and status data of the bridged network element, the primary bridged network element, and the standby bridged network element corresponding to the bridging service according to the bridging service and the inspection scheme of the bridged network element;
根据所述配置参数及状态数据对桥接业务和桥接网元进行巡检。The bridge service and the bridge network element are patrolled according to the configuration parameter and the status data.
可选地,所述桥接业务和桥接网元的巡检方案包括多个检查规则;其中,对于不同待检查设备的桥接业务和桥接网元的巡检方案调用不同的检查规则。Optionally, the ping inspection scheme of the bridging service and the bridging network element includes multiple inspection rules. In the following, different inspection rules are invoked for the bridging service of the device to be inspected and the patrol scheme of the bridging network element.
一种桥接业务和桥接网元的巡检装置,包括选择模块、获取L2VPN业务模块、识别模块和巡检模块,其中A patrol device for bridging services and bridging network elements, including a selection module, an L2VPN service module, an identification module, and a patrol module, wherein
所述选择模块设置成:根据桥接业务和桥接网元的巡检方案,选择网络中待检查的设备;The selection module is configured to: select a device to be inspected in the network according to the bridging service and the inspection scheme of the bridged network element;
所述获取L2VPN业务模块设置成:获取途经所述设备的L2VPN业务;The acquiring the L2VPN service module is configured to: obtain an L2VPN service that passes through the device;
所述识别模块设置成:通过分析所述L2VPN业务落地网元的输出业务端口的配置,识别出网络中与所述设备相关的桥接业务和桥接网元;The identifying module is configured to: identify a bridging service and a bridging network element related to the device in the network by analyzing a configuration of an output service port of the L2VPN service floor network element;
所述巡检模块设置成:根据桥接业务和桥接网元的巡检方案,对桥接业务和桥接网元进行巡检。The patrol module is configured to perform patrol inspection on the bridging service and the bridging network element according to the bridging service and the patrol inspection scheme of the bridging network element.
可选地,该装置还包括:获取伪线保护组数据单元,Optionally, the device further includes: acquiring a pseudowire protection group data unit,
所述获取伪线保护组数据单元设置成:获取与所述设备相关联的伪线保护组数据;通过分析所述伪线保护组数据,从所述桥接网元中识别出主用桥接网元和备用桥接网元。The acquiring the pseudowire protection group data unit is configured to: acquire pseudowire protection group data associated with the device; and identify the primary bridge network element from the bridge network element by analyzing the pseudowire protection group data And alternate bridged network elements.
可选地,所述识别模块设置成按照如下方式通过分析所述L2VPN业务落地网元的输出业务端口的配置,识别出网络中与所述设备相关的桥接业务:Optionally, the identifying module is configured to identify the bridging service related to the device in the network by analyzing the configuration of the output service port of the L2VPN service landing network element as follows:
通过分析所述L2VPN业务落地网元的输出业务端口的配置,过滤出所述L2VPN业务落地网元的输出业务端口为二层虚接口或二层虚子接口的L2VPN业务;By analyzing the configuration of the output service port of the L2VPN service floor network element, filtering out the L2VPN service whose output service port of the L2VPN service floor network element is a Layer 2 virtual interface or a Layer 2 virtual sub-interface;
判断所过滤出的L2VPN业务是否为带桥接L2VPN业务; Determining whether the filtered L2VPN service is a bridged L2VPN service;
当判断所过滤出的L2VPN业务为带桥接L2VPN业务时,则将所述L2VPN业务确定为桥接业务。When it is determined that the filtered L2VPN service is a bridged L2VPN service, the L2VPN service is determined as a bridging service.
可选地,所述识别模块设置成按照如下方式判断所过滤出的L2VPN业务是否为带桥接L2VPN业务:Optionally, the identifying module is configured to determine whether the filtered L2VPN service is a bridged L2VPN service according to the following manner:
若所述L2VPN业务落地网元的输出业务的二层虚接口与三层虚接口有一对一绑定关系,则判定所过滤出的L2VPN业务为带桥接L2VPN业务;或者If the Layer 2 virtual interface of the output service of the L2VPN service network element has a one-to-one binding relationship with the Layer 3 virtual interface, determine that the filtered L2VPN service is a bridged L2VPN service; or
若所述L2VPN业务落地网元的输出业务的二层虚子接口与三层虚子接口有一对一绑定关系,则判定所过滤出的L2VPN业务为带桥接L2VPN业务。If the Layer 2 virtual sub-interface of the output service of the L2VPN service network element has a one-to-one binding relationship with the Layer 3 virtual sub-interface, it is determined that the filtered L2VPN service is a bridged L2VPN service.
可选地,所述识别模块设置成按照如下方式通过分析所述L2VPN业务落地网元的输出业务端口的配置,识别出网络中与所述设备相关的桥接网元的步骤包括:Optionally, the identifying module is configured to: by analyzing the configuration of the output service port of the L2VPN service floor network element, to identify the bridged network element related to the device in the network, including:
将所述L2VPN业务落地网元的输出业务的二层虚接口所在的节点作为桥接网元;或者The node where the Layer 2 virtual interface of the output service of the L2VPN service landing network element is located is a bridge network element; or
将所述L2VPN业务落地网元的输出业务的二层虚子接口所在的节点作为桥接网元。The node where the Layer 2 virtual sub-interface of the output service of the L2VPN service landing network element is located is used as the bridge network element.
可选地,所述获取伪线保护组数据单元设置成按照如下方式通过分析所述伪线保护组数据,从所述桥接网元中识别出主用桥接网元和备用桥接网元:Optionally, the acquiring the pseudowire protection group data unit is configured to identify the primary bridged network element and the backup bridged network element from the bridged network element by analyzing the pseudowire protection group data as follows:
通过分析所述伪线保护组数据,过滤出单发双收伪线双归保护组;By analyzing the pseudowire protection group data, filtering out the single-issue double-received pseudo-line dual-homing protection group;
根据所述单发双收伪线双归保护组,过滤出所述桥接业务服务层伪线是单发双收伪线双归保护组的第一桥接业务;According to the single-issue dual-received pseudo-line dual-homing protection group, filtering out the bridging service service layer pseudo-line is the first bridging service of the single-issue dual-received pseudo-line dual-homing protection group;
将所述第一桥接业务上的两个桥接网元作为主用桥接网元和备用桥接网元。The two bridged network elements on the first bridging service are used as the primary bridged network element and the backup bridged network element.
可选地,所述巡检模块设置成按照如下方式根据桥接业务和桥接网元的巡检方案,对桥接业务和桥接网元进行巡检:Optionally, the patrol module is configured to perform patrol inspection on the bridging service and the bridging network element according to the bridging service and the patrol inspection scheme of the bridging network element as follows:
根据桥接业务和桥接网元的巡检方案,获取桥接业务对应的桥接网元、主用桥接网元以及备用桥接网元的配置参数及状态数据; Obtaining configuration parameters and status data of the bridged network element, the primary bridged network element, and the standby bridged network element corresponding to the bridging service according to the bridging service and the inspection scheme of the bridged network element;
根据所述配置参数及状态数据对桥接业务和桥接网元进行巡检。The bridge service and the bridge network element are patrolled according to the configuration parameter and the status data.
与相关技术相比较,本发明的有益效果在于:Compared with the related art, the beneficial effects of the present invention are:
本发明技术方案中,用户可以定制巡检方案并可重用巡检方案,系统可以识别全网络中L2VPN桥接业务及桥接网元,完成全网络中桥接业务和桥接网元配置及状态检查。极大地降低了桥接业务和桥接网元巡检的人工投入成本,降低了桥接业务和桥接网元巡检的难度,提高了巡检的准确性和巡检的效率,大幅缩减了人力成本投入。In the technical solution of the present invention, the user can customize the inspection scheme and reuse the inspection scheme. The system can identify the L2VPN bridging service and the bridging network element in the entire network, and complete the bridging service and the bridging network element configuration and status check in the entire network. The manual input cost of the bridging service and the bridging network element inspection is greatly reduced, the difficulty of the bridging service and the bridging network element inspection is reduced, the accuracy of the inspection and the efficiency of the inspection are improved, and the labor cost input is greatly reduced.
附图概述BRIEF abstract
图1是本发明实施例提供的一种桥接业务和桥接网元的巡检方法流程图;FIG. 1 is a flowchart of a method for inspecting a bridging service and a bridging network element according to an embodiment of the present invention;
图2是本发明实施例提供的一种桥接业务和桥接网元的巡检装置的结构图;2 is a structural diagram of a bridging service and a patrol device for a bridged network element according to an embodiment of the present invention;
图3是本发明实施例提供的桥接业务和桥接网元的巡检系统的框架图;3 is a schematic diagram of a bridging service and a patrol system for a bridged network element according to an embodiment of the present invention;
图4是本发明第一实施例提供的桥接业务和桥接网元的巡检方法的流程图;4 is a flowchart of a bridging service and a method for inspecting a bridged network element according to a first embodiment of the present invention;
图5是本发明第二实施例提供的桥接业务和桥接网元的巡检方法的流程图。FIG. 5 is a flowchart of a bridging service and a method for inspecting a bridged network element according to a second embodiment of the present invention.
本发明的较佳实施方式Preferred embodiment of the invention
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。The following is an overview of the topics detailed in this document. This Summary is not intended to limit the scope of the claims.
以下结合附图对本发明的优选实施例进行详细说明,应当理解,以下所说明的优选实施例仅用于说明和解释本发明,并不用于限定本发明。The preferred embodiments of the present invention are described in detail below with reference to the accompanying drawings.
图1是本发明实施例提供的一种桥接业务和桥接网元的巡检方法流程图,如图1所示,包括以下步骤: 1 is a flowchart of a method for inspecting a bridging service and a bridging network element according to an embodiment of the present invention. As shown in FIG. 1, the method includes the following steps:
步骤S101:根据桥接业务和桥接网元的巡检方案,选择网络中待检查的设备;Step S101: Select a device to be inspected in the network according to the bridging service and the inspection scheme of the bridged network element.
步骤S102:获取途经所述设备的L2VPN业务;Step S102: Acquire an L2VPN service that passes through the device.
步骤S103:通过分析所述L2VPN业务落地网元的输出业务端口的配置,识别出网络中与所述设备相关的桥接业务和桥接网元;Step S103: Identifying the bridging service and the bridging network element related to the device in the network by analyzing the configuration of the output service port of the L2VPN service landing network element;
步骤S104:根据桥接业务和桥接网元的巡检方案,对桥接业务和桥接网元进行巡检;Step S104: Perform patrol inspection on the bridging service and the bridging network element according to the bridging service and the patrol inspection scheme of the bridged network element.
其中,所述L2VPN业务是指二层虚拟专用网络业务。The L2VPN service refers to a Layer 2 virtual private network service.
本发明实施例还包括:获取与所述设备相关联的伪线保护组数据;通过分析所述伪线保护组数据,从所述桥接网元中识别出主用桥接网元和备用桥接网元。The embodiment of the present invention further includes: acquiring pseudowire protection group data associated with the device; identifying the primary bridge network element and the backup bridge network element from the bridge network element by analyzing the pseudowire protection group data .
其中,所述的通过分析所述L2VPN业务落地网元的输出业务端口的配置,识别出网络中与所述设备相关的桥接业务包括:通过分析所述L2VPN业务落地网元的输出业务端口的配置,过滤出所述L2VPN业务落地网元的输出业务端口为二层虚接口或二层虚子接口的L2VPN业务;判断所过滤出的L2VPN业务是否为带桥接L2VPN业务;当判断所过滤出的L2VPN业务为带桥接L2VPN业务时,则将所述L2VPN业务确定为桥接业务。所述的判断所过滤出的L2VPN业务是否为带桥接L2VPN业务包括:若所述L2VPN业务落地网元的输出业务的二层虚接口与三层虚接口有一对一绑定关系,则判断所过滤出的L2VPN业务为带桥接L2VPN业务;或者若所述L2VPN业务落地网元的输出业务的二层虚子接口与三层虚子接口有一对一绑定关系,则判断所过滤出的L2VPN业务为带桥接L2VPN业务。The analyzing the configuration of the output service port of the L2VPN service landing network element, and identifying the bridging service related to the device in the network includes: analyzing the configuration of the output service port of the L2VPN service landing network element And filtering out the L2VPN service of the L2VPN service landing network element as the Layer 2 virtual interface or the Layer 2 virtual sub-interface; determining whether the filtered L2VPN service is a bridged L2VPN service; and determining the filtered L2VPN service When the L2VPN service is bridged, the L2VPN service is determined to be a bridge service. The determining whether the filtered L2VPN service is a bridged L2VPN service includes: if the Layer 2 virtual interface of the output service of the L2VPN service landing network element has a one-to-one binding relationship with the Layer 3 virtual interface, The L2VPN service is a bridged L2VPN service; or if the Layer 2 virtual sub-interface of the output service of the L2VPN service landing network element has a one-to-one binding relationship with the Layer 3 virtual sub-interface, it is determined that the filtered L2VPN service is bridged. L2VPN service.
其中,所述的通过分析所述L2VPN业务落地网元的输出业务端口的配置,识别出网络中与所述设备相关的桥接网元包括:将所述L2VPN业务落地网元的输出业务的二层虚接口所在的节点作为桥接网元;或者将所述L2VPN业务落地网元的输出业务的二层虚子接口所在的节点作为桥接网元。所述的通过分析所述伪线保护组数据,从所述桥接网元中识别出主用桥接网元和备用桥接网元包括:通过分析所述伪线保护组数据,过滤出单发双收伪线双归 保护组;根据所述单发双收伪线双归保护组,过滤出所述桥接业务服务层伪线是单发双收伪线双归保护组的第一桥接业务;将所述第一桥接业务上的两个桥接网元作为主用桥接网元和备用桥接网元。The analyzing the configuration of the output service port of the L2VPN service floor network element, and identifying the bridge network element related to the device in the network includes: layer 2 of the output service of the L2VPN service landing network element The node where the virtual interface is located serves as the bridged network element; or the node where the Layer 2 virtual sub-interface of the output service of the L2VPN service landing network element is located as the bridged network element. The analyzing the pseudowire protection group data, identifying the primary bridge network element and the backup bridge network element from the bridge network element, by filtering the data of the pseudo line protection group, filtering out single-issue and dual-receiving Pseudowire double return a protection group; according to the single-issue double-received pseudo-line dual-homing protection group, filtering out the bridging service service layer pseudowire is a first bridging service of a single-issue dual-received pseudo-line dual-homing protection group; The two bridged network elements on the service serve as the primary bridged network element and the standby bridged network element.
其中,根据桥接业务和桥接网元的巡检方案,对桥接业务和桥接网元进行巡检包括:根据桥接业务和桥接网元的巡检方案,获取桥接业务对应的桥接网元、主用桥接网元以及备用桥接网元的配置参数及状态数据;根据所述配置参数及状态数据对桥接业务和桥接网元进行巡检。具体地说,所述桥接业务和桥接网元的巡检方案包括多个检查规则;其中,对于不同待检查设备的桥接业务和桥接网元的巡检方案调用不同的检查规则。The patrolling service and the bridging network element are inspected according to the bridging service and the bridging network element inspection scheme, including: bridging the network element and the bridging network corresponding to the bridging service according to the bridging service and the inspection scheme of the bridging network element The configuration parameters and status data of the network element and the alternate bridged network element; and the patrol service and the bridged network element are patrolled according to the configuration parameter and the status data. Specifically, the ping inspection scheme of the bridging service and the bridging network element includes multiple inspection rules; wherein different inspection rules are invoked for the bridging service of different devices to be inspected and the patrol inspection scheme of the bridging network element.
图2是本发明实施例提供的一种桥接业务和桥接网元的巡检装置的结构图,如图2所示,包括:选择模块201、获取L2VPN业务模块202、识别模块203以及巡检模块204。2 is a structural diagram of a bridging service and a patrol device for a bridged network element according to an embodiment of the present invention. As shown in FIG. 2, the method includes: a selection module 201, an L2VPN service module 202, an identification module 203, and a patrol module. 204.
所述选择模块201,设置成:根据桥接业务和桥接网元的巡检方案,选择网络中待检查的设备;The selecting module 201 is configured to: select a device to be inspected in the network according to the bridging service and the inspection scheme of the bridged network element;
所述获取L2VPN业务模块202,设置成:获取途经所述设备的L2VPN业务;The acquiring the L2VPN service module 202 is configured to: obtain an L2VPN service that passes through the device;
所述识别模块203,设置成:通过分析所述L2VPN业务落地网元的输出业务端口的配置,识别出网络中与所述设备相关的桥接业务和桥接网元;The identifying module 203 is configured to: identify the bridging service and the bridging network element related to the device in the network by analyzing the configuration of the output service port of the L2VPN service floor network element;
所述巡检模块204,设置成:根据桥接业务和桥接网元的巡检方案,对桥接业务和桥接网元进行巡检。The patrol module 204 is configured to perform patrol inspection on the bridging service and the bridging network element according to the bridging service and the patrol inspection scheme of the bridging network element.
本发明实施例还包括获取伪线保护组数据单元,设置成:获取与所述设备相关联的伪线保护组数据;其中,通过分析所述伪线保护组数据,从所述桥接网元中识别出主用桥接网元和备用桥接网元。The embodiment of the present invention further includes: acquiring a pseudowire protection group data unit, configured to: acquire pseudowire protection group data associated with the device; wherein, by analyzing the pseudowire protection group data, from the bridge network element The primary bridged network element and the standby bridged network element are identified.
可选地,所述识别模块设置成按照如下方式通过分析所述L2VPN业务落地网元的输出业务端口的配置,识别出网络中与所述设备相关的桥接业务:Optionally, the identifying module is configured to identify the bridging service related to the device in the network by analyzing the configuration of the output service port of the L2VPN service landing network element as follows:
通过分析所述L2VPN业务落地网元的输出业务端口的配置,过滤出所述L2VPN业务落地网元的输出业务端口为二层虚接口或二层虚子接口的 L2VPN业务;The output service port of the L2VPN service floor network element is filtered as a Layer 2 virtual interface or a Layer 2 virtual sub-interface by analyzing the configuration of the output service port of the L2VPN service floor network element. L2VPN service;
判断所过滤出的L2VPN业务是否为带桥接L2VPN业务;Determining whether the filtered L2VPN service is a bridged L2VPN service;
当判断所过滤出的L2VPN业务为带桥接L2VPN业务时,则将所述L2VPN业务确定为桥接业务。When it is determined that the filtered L2VPN service is a bridged L2VPN service, the L2VPN service is determined as a bridging service.
可选地,所述识别模块设置成按照如下方式判断所过滤出的L2VPN业务是否为带桥接L2VPN业务:Optionally, the identifying module is configured to determine whether the filtered L2VPN service is a bridged L2VPN service according to the following manner:
若所述L2VPN业务落地网元的输出业务的二层虚接口与三层虚接口有一对一绑定关系,则判定所过滤出的L2VPN业务为带桥接L2VPN业务;或者If the Layer 2 virtual interface of the output service of the L2VPN service network element has a one-to-one binding relationship with the Layer 3 virtual interface, determine that the filtered L2VPN service is a bridged L2VPN service; or
若所述L2VPN业务落地网元的输出业务的二层虚子接口与三层虚子接口有一对一绑定关系,则判定所过滤出的L2VPN业务为带桥接L2VPN业务。If the Layer 2 virtual sub-interface of the output service of the L2VPN service network element has a one-to-one binding relationship with the Layer 3 virtual sub-interface, it is determined that the filtered L2VPN service is a bridged L2VPN service.
可选地,所述识别模块设置成按照如下方式通过分析所述L2VPN业务落地网元的输出业务端口的配置,识别出网络中与所述设备相关的桥接网元的步骤包括:Optionally, the identifying module is configured to: by analyzing the configuration of the output service port of the L2VPN service floor network element, to identify the bridged network element related to the device in the network, including:
将所述L2VPN业务落地网元的输出业务的二层虚接口所在的节点作为桥接网元;或者The node where the Layer 2 virtual interface of the output service of the L2VPN service landing network element is located is a bridge network element; or
将所述L2VPN业务落地网元的输出业务的二层虚子接口所在的节点作为桥接网元。The node where the Layer 2 virtual sub-interface of the output service of the L2VPN service landing network element is located is used as the bridge network element.
可选地,所述获取伪线保护组数据单元设置成按照如下方式通过分析所述伪线保护组数据,从所述桥接网元中识别出主用桥接网元和备用桥接网元:Optionally, the acquiring the pseudowire protection group data unit is configured to identify the primary bridged network element and the backup bridged network element from the bridged network element by analyzing the pseudowire protection group data as follows:
通过分析所述伪线保护组数据,过滤出单发双收伪线双归保护组;By analyzing the pseudowire protection group data, filtering out the single-issue double-received pseudo-line dual-homing protection group;
根据所述单发双收伪线双归保护组,过滤出所述桥接业务服务层伪线是单发双收伪线双归保护组的第一桥接业务;According to the single-issue dual-received pseudo-line dual-homing protection group, filtering out the bridging service service layer pseudo-line is the first bridging service of the single-issue dual-received pseudo-line dual-homing protection group;
将所述第一桥接业务上的两个桥接网元作为主用桥接网元和备用桥接网元。The two bridged network elements on the first bridging service are used as the primary bridged network element and the backup bridged network element.
可选地,所述巡检模块设置成按照如下方式根据桥接业务和桥接网元的巡检方案,对桥接业务和桥接网元进行巡检: Optionally, the patrol module is configured to perform patrol inspection on the bridging service and the bridging network element according to the bridging service and the patrol inspection scheme of the bridging network element as follows:
根据桥接业务和桥接网元的巡检方案,获取桥接业务对应的桥接网元、主用桥接网元以及备用桥接网元的配置参数及状态数据;Obtaining configuration parameters and status data of the bridged network element, the primary bridged network element, and the standby bridged network element corresponding to the bridging service according to the bridging service and the inspection scheme of the bridged network element;
根据所述配置参数及状态数据对桥接业务和桥接网元进行巡检。The bridge service and the bridge network element are patrolled according to the configuration parameter and the status data.
可选地,所述桥接业务和桥接网元的巡检方案包括多个检查规则;其中,所述巡检模块对于不同待检查设备的桥接业务和桥接网元的巡检方案调用不同的检查规则。Optionally, the ping inspection scheme of the bridging service and the bridging network element includes multiple inspection rules. The patrol module invokes different inspection rules for the bridging service of the device to be inspected and the inspection scheme of the bridging network element. .
图3显示了本发明实施例提供的桥接业务和桥接网元的巡检系统的框架图,如图3所示,包括:定制巡检方案模块301,采集数据模块302、识别桥接业务和桥接网元模块303、巡检桥接业务和桥接网元模块304。FIG. 3 is a schematic diagram of a bridging service and a bridging network element inspection system according to an embodiment of the present invention. As shown in FIG. 3, the method includes: a customized inspection scheme module 301, an acquisition data module 302, a recognition bridging service, and a bridge network. The meta module 303, the patrol bridging service, and the bridging network element module 304.
所述定制巡检方案模块301,根据现场巡检的要求,选择检查规则,定制桥接业务巡检方案,一个方案中支持选择多项检查规则,支持定制多套巡检方案,巡检方案可以保存为模板,方案模板可以重用。巡检方案支持检查多种设备类型,检查多端设备。The customized inspection plan module 301 selects an inspection rule according to the requirements of the on-site inspection, and customizes the inspection service of the bridge service. In one solution, multiple inspection rules are supported, and multiple sets of inspection plans are supported, and the inspection plan can be saved. For templates, plan templates can be reused. The inspection plan supports checking multiple device types and checking multi-terminal devices.
所述采集数据模块302,根据定制的巡检方案,采集网络中基站业务(主要指L2VPN业务,下文简称为L2VPN业务,采集与所选设备关联的伪线保护组。The collection data module 302 collects the base station service in the network according to the customized inspection scheme (mainly refers to the L2VPN service, hereinafter referred to as the L2VPN service, and collects the pseudowire protection group associated with the selected device.
所述识别桥接业务和桥接网元模块303,系统从采集的L2VPN业务中,识别出L2VPN桥接业务和桥接网元。系统从采集的伪线保护组中过滤出单发双收伪线双归保护组。通过L2VPN桥接业务与单发双收伪线保护组的对应关系,识别出互为主备的桥接网元。一个桥接网元上有多条L2VPN桥接业务经过,有多对桥接对;并且在全网中,桥接网元会有多个,并且多数互为主备,成对出现。系统会识别出现网中全部与选择设备相关的L2VPN桥接业务、桥接网元、互为主备桥接网元。The identifying the bridging service and the bridging network element module 303, the system identifies the L2VPN bridging service and the bridging network element from the collected L2VPN service. The system filters out the single-issue double-received pseudo-line dual-homing protection group from the collected pseudo-line protection group. The bridged network element that is mutually active and standby is identified by the correspondence between the L2VPN bridging service and the single-issue and dual-received pseudowire protection group. There are multiple L2VPN bridging services on a bridged network element, and there are multiple pairs of bridged pairs. In the whole network, there are multiple bridging NEs, and most of them are active and standby in pairs. The system will identify all L2VPN bridging services, bridged NEs, and active and standby bridging NEs in the network.
所述巡检桥接业务和桥接网元模块304,调用巡检方案中检查规则处理流程,检查桥接业务和桥接网元。根据检查规则的需要可以从多途径获取数据源,例如,从网管上或者设备上获取与L2VPN桥接业务对应的桥接网元、主用桥接网元、备用桥接网元的配置及状态数据。根据检查规则,检查桥接 业务配置数据是否符合配置规范,检查主用桥接网元、备用桥接网元之间关联数据是否符合配置规范,检查桥接业务运行状态。系统会检查覆盖所有与选择设备相关的L2VPN桥接业务。如果巡检方案中选择了多个检查规则,系统会调用多个检查规则处理流程,执行检查。检查规则不同,获取的数据源不同,处理流程也不同。The patrol bridging service and the bridging network element module 304 invoke the inspection rule processing flow in the patrol inspection scheme to check the bridging service and the bridging network element. According to the requirements of the inspection rule, the data source can be obtained from multiple channels, for example, the configuration and status data of the bridged network element, the primary bridged network element, and the standby bridged network element corresponding to the L2VPN bridging service are obtained from the network management or the device. Check the bridge according to the inspection rules Check whether the service configuration data meets the configuration specifications, check whether the associated data between the primary bridged network element and the standby bridged network element meets the configuration specifications, and check the running status of the bridged service. The system checks to cover all L2VPN bridging services associated with the selected device. If multiple inspection rules are selected in the inspection scheme, the system will invoke multiple inspection rule processing procedures to perform the inspection. The inspection rules are different, the data sources obtained are different, and the processing flow is different.
图4显示了本发明第一实施例提供的桥接业务和桥接网元的巡检方法的流程图,如图4所示,包括以下步骤:FIG. 4 is a flowchart of a method for inspecting a bridging service and a bridging network element according to a first embodiment of the present invention. As shown in FIG. 4, the method includes the following steps:
步骤S401:定制巡检方案;Step S401: customizing the inspection plan;
用户根据现场巡检的要求,选择检查规则,定制桥接业务巡检方案,一个方案中支持选择多项检查规则,支持定制多套巡检方案,巡检方案可以保存为模板,方案模板可以重用。巡检方案支持检查多种设备类型,检查多端设备。According to the requirements of the on-site inspection, the user selects the inspection rules and customizes the inspection service of the bridging service. In one scheme, multiple inspection rules are supported, and multiple inspection schemes can be customized. The inspection scheme can be saved as a template, and the scheme template can be reused. The inspection plan supports checking multiple device types and checking multi-terminal devices.
步骤S402:采集L2VPN业务和伪线保护组;Step S402: collecting an L2VPN service and a pseudowire protection group;
系统根据定制的巡检方案,采集网络中途径所选设备的L2VPN业务和与所选设备关联的伪线保护组。The system collects the L2VPN service of the selected device in the network and the pseudowire protection group associated with the selected device according to the customized inspection scheme.
步骤S403:识别桥接业务和桥接网元;Step S403: Identify the bridge service and the bridge network element.
系统分析L2VPN业务,找到每条L2VPN业务的业务落地网元和输出业务端口,过滤出业务落地网元的输出业务端口为二层虚接口或虚子接口的L2VPN业务。如果此二层虚接口与三层虚接口有一对一绑定关系,及相应二层虚子接口与三层虚子接口有对应关系,则认为此类L2VPN业务为带桥接的业务,即,桥接业务。输出业务的二层虚接口所在节点为桥接网元。系统分析伪线保护组数据,过滤出单发双收伪线双归保护组。再从带桥接的L2VPN业务中过滤出其服务层伪线是单发双收的伪线双归保护组的L2VPN业务。如果此类L2VPN业务上有两个桥接网元,则这两个桥接网元为互为主备的桥接网元。目前网络中多使用多对一VSI、或者多对一VLAN汇聚的桥接业务配置方案,即,来自不同基站的多条业务汇聚并桥接到相同节点的不同桥接关系对上。因此,一个桥接网元上会有多条带桥接的L2VPN业务经过,一个桥 接网元上会有多对桥接关系对,在全网中,桥接网元又会有多个,而且多是互为主备的成对出现。系统需要识别出网络中全部与选择设备相关的带桥接的L2VPN业务、桥接网元、互为主备桥接网元。The system analyzes the L2VPN service, finds the service floor network element and the output service port of each L2VPN service, and filters out the L2VPN service whose output service port of the service floor network element is a Layer 2 virtual interface or a virtual sub-interface. If the Layer 2 virtual interface has a one-to-one binding relationship with the Layer 3 virtual interface, and the corresponding Layer 2 virtual sub-interface has a corresponding relationship with the Layer 3 virtual sub-interface, the L2VPN service is considered to be a bridged service, that is, a bridge service. The node where the Layer 2 virtual interface of the output service resides is the bridged NE. The system analyzes the data of the pseudo-line protection group and filters out the single-issue double-received pseudo-line dual-return protection group. Then, the L2VPN service whose pseudo-line is a single-issue and dual-received pseudo-line dual-homing protection group is filtered out from the bridged L2VPN service. If there are two bridged NEs on the L2VPN service, the two bridged NEs are bridged NEs that are mutually active and standby. In the current network, a multi-to-one VSI or a multi-to-one VLAN aggregation bridging service configuration scheme is used, that is, multiple services from different base stations are aggregated and bridged to different bridging relationship pairs of the same node. Therefore, there will be multiple bridged L2VPN services passing through a bridged network element, one bridge There will be multiple pairs of bridged pairs on the connected network element. In the whole network, there will be multiple bridged network elements, and many of them are paired with each other. The system needs to identify all the bridged L2VPN services, the bridged NEs, and the primary and backup bridged NEs in the network.
步骤S404:调用巡检处理流程检查桥接业务和桥接网元。Step S404: Invoking the patrol processing process to check the bridging service and the bridging network element.
系统根据巡检方案,调用相应的检查规则处理流程。根据检查规则的需要可以从多个途径获取数据源,例如,从网管系统上或者设备上获取与L2VPN桥接业务对应的桥接网元、主用桥接网元、备用桥接网元的各项配置参数及状态数据。依据检查规则,检查桥接业务和桥接网元配置数据是否符合配置规范,检查主用桥接网元、备用桥接网元之间关联数据是否符合配置规范,检查桥接业务运行状态。系统会检查所有与选择设备相关的L2VPN桥接业务。如果巡检方案中选择了多个检查规则,系统会调用多个检查规则处理流程,执行检查。检查规则不同,获取的数据源不同,处理流程也不同。The system invokes the corresponding inspection rule processing flow according to the inspection plan. According to the requirements of the inspection rule, the data source can be obtained from multiple ways, for example, the configuration parameters of the bridged network element, the primary bridged network element, and the standby bridged network element corresponding to the L2VPN bridging service are obtained from the network management system or the device. Status data. Check whether the bridging service and the bridging NE configuration data meet the configuration specifications, check whether the associated data between the primary bridged network element and the standby bridged NE meets the configuration specifications, and check the running status of the bridging service. The system checks all L2VPN bridging services associated with the selected device. If multiple inspection rules are selected in the inspection scheme, the system will invoke multiple inspection rule processing procedures to perform the inspection. The inspection rules are different, the data sources obtained are different, and the processing flow is different.
图5显示了本发明第二实施例提供的桥接业务和桥接网元的巡检方法的流程图,如图5所示,首先定制一个巡检方案,包含一个检查规则:检查网络中桥接业务双网关配置是否符合规范。桥接业务双网关,指带桥接的L2VPN业务上的两个互为主备的桥接网元。本例采用多对一VLAN汇聚的桥接业务配置方案,一个桥接网元上有多条L2VPN桥接业务经过,一个桥接网元上会有多对桥接对应关系,并且在全网中有多个桥接网元。具体包括以下步骤:FIG. 5 is a flowchart of a bridging service and a method for inspecting a bridged network element according to a second embodiment of the present invention. As shown in FIG. 5, a patrol scheme is first customized, including an inspection rule: checking the bridging service in the network. Whether the gateway configuration conforms to the specification. The bridging service dual gateway refers to two bridging network elements that are mutually active and standby on the bridged L2VPN service. In this example, a multi-to-one VLAN aggregation bridging service configuration scheme is adopted. Multiple bridging network elements have multiple L2VPN bridging services, and one bridging network element has multiple pairs of bridging correspondences, and multiple bridging networks in the whole network. yuan. Specifically, the following steps are included:
步骤S501:用户定制一个巡检方案,选择桥接业务双网关配置检查检查规则。Step S501: The user customizes a patrol scheme and selects a bridging service dual gateway configuration check check rule.
步骤S502:将定制的巡检方案保存为模板,可以重用。Step S502: Save the customized inspection plan as a template, which can be reused.
步骤S503:根据巡检方案,选择网络中待检查的设备,支持多种设备类型。本实例选择网络中全部的设备。Step S503: According to the inspection scheme, select a device to be inspected in the network, and support multiple device types. This example selects all devices in the network.
步骤S504:根据选择的设备集合,获取与所选设备关联的伪线保护组。Step S504: Acquire a pseudowire protection group associated with the selected device according to the selected device set.
步骤S505:系统根据选择的设备集合,获取途径所选设备的L2VPN业务。 Step S505: The system acquires the L2VPN service of the selected device according to the selected device set.
步骤S506:分析L2VPN业务,查找每条业务的业务落地网元和输出业务端口。Step S506: Analyze the L2VPN service, and find the service floor network element and the output service port of each service.
步骤S507:过滤出业务落地网元的输出业务端口为二层虚接口或虚子接口的L2VPN业务。如果采集的L2VPN业务的业务落地网元的输出业务端口均不是二层虚接口,则流程结束。In the step S507, the output service port of the service landing network element is the L2VPN service of the Layer 2 virtual interface or the virtual sub-interface. If the output service port of the service network element of the L2VPN service is not a Layer 2 virtual interface, the process ends.
步骤S508:检查L2VPN业务的业务落地网元的输出业务的二层虚接口是否与三层虚接口一对一绑定。如果没有一对一绑定关系,则流程结束,如果有则向下执行步骤S509。Step S508: Check whether the Layer 2 virtual interface of the output service of the service network element of the L2VPN service is bound to the Layer 3 virtual interface one-to-one. If there is no one-to-one binding relationship, the flow ends, and if so, step S509 is performed downward.
步骤S509:过滤出业务落地网元的输出业务二层虚接口与三层虚接口有一对一绑定关系的L2VPN业务,此类L2VPN业务为带桥接的业务,即,桥接业务。In the step S509, the L2VPN service has a one-to-one binding relationship between the Layer 2 virtual interface and the Layer 3 virtual interface of the service network element. The L2VPN service is a bridged service, that is, a bridge service.
步骤S510:L2VPN桥接业务输出业务的二层虚接口所在节点为桥接网元。Step S510: The node where the Layer 2 virtual interface of the L2VPN bridging service output service is a bridged network element.
步骤S511:系统分析伪线保护组数据,过滤出单发双收伪线双归保护组。Step S511: The system analyzes the pseudowire protection group data, and filters out the single-issue double-received pseudo-line dual-homing protection group.
步骤S512:分析带桥接的L2VPN业务集合,过滤出其服务层伪线是单发双收伪线双归保护组的L2VPN业务。如果没有找到此类L2VPN业务,即,没有找可能带双网关的L2VPN业务,则本实例流程结束。Step S512: Analyze the L2VPN service set with the bridge, and filter out the L2VPN service whose service layer pseudowire is a single-issue dual-received pseudo-line dual-homing protection group. If the L2VPN service is not found, that is, the L2VPN service with dual gateways is not found, the process of this example ends.
步骤S513:如果其服务层伪线是单发双收伪线双归保护组的L2VPN业务上有两个桥接网元,则是带双网关的L2VPN桥接业务集合。Step S513: If the service layer pseudowire is a single-issue dual-received pseudo-line dual-homing protection group, the L2VPN service has two bridged network elements, and is an L2VPN bridging service set with dual gateways.
步骤S514:每个带双网关的L2VPN桥接业务上有两个桥接网元,这两个桥接网元在当前业务中是互为主备的桥接网元。系统会识别出所有的主备桥接节点对。Step S514: Each of the L2VPN bridging services with dual gateways has two bridging network elements, and the two bridging network elements are bridging network elements that are mutually active and standby in the current service. The system will identify all active and standby bridge node pairs.
步骤S515:根据定制的巡检方案中选择的检查规则的要求,系统从网管上获取桥接网元的设备类型。Step S515: The system obtains the device type of the bridged network element from the network management according to the requirement of the inspection rule selected in the customized inspection plan.
步骤S516:判断桥接网元的设备类型。Step S516: Determine the device type of the bridged network element.
步骤S517:如果桥接网元是设备类型1,则系统分别向主用桥接网元和备用桥接网元下发命令,查询VRRP(Virtual Redundancy Routing Protocol,虚拟路由器冗余协议)配置状态。 Step S517: If the bridged network element is the device type 1, the system sends a command to the primary bridged network element and the standby bridged network element to query the configuration state of the virtual router redundancy protocol (VRRP).
步骤S518:比较主用桥接网元和备用桥接网元的VRRP状态,状态是否一致,是否均等于目标值。Step S518: Compare the VRRP status of the primary bridged network element and the standby bridged network element, whether the status is consistent, and whether they are equal to the target value.
步骤S519:如果主用桥接网元和备用桥接网元的VRRP状态一致并且均等于目标值,则认为当前桥接业务的双网关配置符合配置规范。Step S519: If the VRRP status of the primary bridged network element and the standby bridged network element are the same and are equal to the target value, the dual gateway configuration of the current bridging service is considered to meet the configuration specification.
步骤S520:如果不是步骤S519的情况,则认为当前桥接业务的双网关配置不符合配置规范。Step S520: If it is not the case of step S519, it is considered that the dual gateway configuration of the current bridging service does not conform to the configuration specification.
步骤S521:如果桥接网元是不设备类型1,系统查询主用桥接网元上桥接关系中三层虚子接口的IP、MAC(Media Access Control,媒体访问控制)地址、掩码地址。系统查询备用桥接网元上桥接关系中三层虚子接口的IP、MAC、掩码地址。Step S521: If the bridged network element is not device type 1, the system queries the IP, MAC (Media Access Control) address, and mask address of the Layer 3 virtual sub-interface in the bridge relationship on the primary bridged network element. The system queries the IP, MAC, and mask addresses of the Layer 3 virtual sub-interfaces in the bridge relationship on the alternate bridged NE.
步骤S522:比较步骤S521中查询到的主用桥接网元的IP、MAC、掩码地址与备用桥接网元的IP、MAC、掩码地址,是否对应相等,即,是否是主用桥接网元的IP等于备用桥接网元的IP,、主用桥接网元的MAC等于备用桥接网元的MAC,主用桥接网元的掩码地址等于备用桥接网元的掩码地址。Step S522: Compare whether the IP, MAC, and mask addresses of the primary bridged network element that are queried in step S521 and the IP, MAC, and mask addresses of the alternate bridged network element are equal, that is, whether it is the primary bridged network element. The IP address of the alternate bridged network element is equal to the MAC address of the alternate bridged network element, and the MAC address of the primary bridged network element is equal to the mask address of the alternate bridged network element.
步骤S523:如果步骤S522中查询到的主用桥接网元的IP、MAC、掩码地址与备用桥接网元的IP、MAC、掩码地址,是对应相等的,则认为当前桥接业务的双网关配置符合配置规范。Step S523: If the IP, MAC, and mask addresses of the primary bridged network element that are queried in step S522 are equal to the IP, MAC, and mask addresses of the alternate bridged network element, the dual gateway of the current bridging service is considered to be equal. The configuration conforms to the configuration specification.
步骤S524:如果步骤S522中查询到的主用桥接网元的IP、MAC、掩码地址与备用桥接网元的IP、MAC、掩码地址,不是对应相等的,则认为当前桥接业务的双网关配置不符合配置规范。Step S524: If the IP, MAC, and mask addresses of the primary bridged network element that is queried in step S522 are not equal to the IP, MAC, and mask addresses of the alternate bridged network element, the dual gateway of the current bridging service is considered to be the same. The configuration does not meet the configuration specifications.
步骤S525:判断是否检查完网络中所有的桥接业务的双网关配置。如果没有检查完毕,则进入步骤S515继续执行,如果检查完毕,则结束流程。Step S525: Determine whether to check the dual gateway configuration of all the bridging services in the network. If the check is not completed, the process proceeds to step S515, and if the check is completed, the process is terminated.
综上所述,本发明实施例通过分析业务落地网元的输出业务端口来识别桥接业务和桥接网元,即,输出业务端口是否是二层虚接口或虚子接口,相应二层虚接口与三层虚接口是否有一对一绑定关系,及相应二层虚子接口与三层虚子接口是否有对应关系。可选择多个处理流程检查桥接业务、桥接网元、及主备桥接网元关联的多个配置项。可以定制巡检方案,并且巡检方案 可形成模板支持巡检方案重用。In summary, the embodiment of the present invention identifies the bridging service and the bridging network element by analyzing the output service port of the service network element, that is, whether the output service port is a Layer 2 virtual interface or a virtual sub-interface, and the corresponding Layer 2 virtual interface and the third Whether the Layer 1 virtual interface has a one-to-one binding relationship, and whether the corresponding Layer 2 virtual sub-interface has a corresponding relationship with the Layer 3 virtual sub-interface. Multiple processing flows can be selected to check the bridging service, the bridging network element, and multiple configuration items associated with the active and standby bridging network elements. Can customize the inspection plan, and the inspection plan A template can be formed to support the patrol program reuse.
综上所述,本发明技术方案具有以下技术效果:In summary, the technical solution of the present invention has the following technical effects:
本发明技术方案中,用户可以定制巡检方案并可重用巡检方案,系统可以识别网络中L2VPN桥接业务及桥接网元,完成全网络中桥接业务和桥接网元配置及状态检查。极大地降低了桥接业务和桥接网元巡检的人工投入成本,降低了桥接业务和桥接网元巡检的难度,提高了巡检的效率,提高了巡检的准确性。In the technical solution of the present invention, the user can customize the inspection scheme and reuse the inspection scheme. The system can identify the L2VPN bridging service and the bridging network element in the network, and complete the bridging service and the bridging network element configuration and status check in the entire network. The manual input cost of the bridging service and the bridging network element inspection is greatly reduced, the difficulty of the bridging service and the bridging network element inspection is reduced, the efficiency of the inspection is improved, and the accuracy of the inspection is improved.
本发明实施例还公开了一种计算机程序,包括程序指令,当该程序指令被计算机执行时,使得该计算机可执行上述任意的桥接业务和桥接网元的巡检方法。The embodiment of the invention further discloses a computer program, comprising program instructions, when the program instruction is executed by a computer, so that the computer can perform any of the above-mentioned bridging services and the inspection method of the bridged network element.
本发明实施例还公开了一种载有所述的计算机程序的载体。The embodiment of the invention also discloses a carrier carrying the computer program.
在阅读并理解了附图和详细描述后,可以明白其他方面。Other aspects will be apparent upon reading and understanding the drawings and detailed description.
本领域普通技术人员可以理解上述实施例的全部或部分步骤可以使用计算机程序流程来实现,所述计算机程序可以存储于一计算机可读存储介质中,所述计算机程序在相应的硬件平台上(如系统、设备、装置、器件等)执行,在执行时,包括方法实施例的步骤之一或其组合。One of ordinary skill in the art will appreciate that all or a portion of the steps of the above-described embodiments can be implemented using a computer program flow, which can be stored in a computer readable storage medium, such as on a corresponding hardware platform (eg, The system, device, device, device, etc. are executed, and when executed, include one or a combination of the steps of the method embodiments.
可选地,上述实施例的全部或部分步骤也可以使用集成电路来实现,这些步骤可以被分别制作成一个个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。这样,本发明不限制于任何特定的硬件和软件结合。Alternatively, all or part of the steps of the above embodiments may also be implemented by using an integrated circuit. These steps may be separately fabricated into individual integrated circuit modules, or multiple modules or steps may be fabricated into a single integrated circuit module. achieve. Thus, the invention is not limited to any specific combination of hardware and software.
上述实施例中的各装置/功能模块/功能单元可以采用通用的计算装置来实现,它们可以集中在单个的计算装置上,也可以分布在多个计算装置所组成的网络上。The devices/function modules/functional units in the above embodiments may be implemented by a general-purpose computing device, which may be centralized on a single computing device or distributed over a network of multiple computing devices.
上述实施例中的各装置/功能模块/功能单元以软件功能模块的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。上述提到的计算机可读取存储介质可以是只读存储器,磁盘或光盘等。 When each device/function module/functional unit in the above embodiment is implemented in the form of a software function module and sold or used as a stand-alone product, it can be stored in a computer readable storage medium. The above mentioned computer readable storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应以权利要求所述的保护范围为准。Variations or substitutions are readily conceivable within the scope of the present invention by those skilled in the art and are within the scope of the present invention. Therefore, the scope of the invention should be determined by the scope of the claims.
工业实用性Industrial applicability
本发明技术方案中,用户可以定制巡检方案并可重用巡检方案,系统可以识别全网络中L2VPN桥接业务及桥接网元,完成全网络中桥接业务和桥接网元配置及状态检查。极大地降低了桥接业务和桥接网元巡检的人工投入成本,降低了桥接业务和桥接网元巡检的难度,提高了巡检的准确性和巡检的效率,大幅缩减了人力成本投入。因此本发明具有很强的工业实用性。 In the technical solution of the present invention, the user can customize the inspection scheme and reuse the inspection scheme. The system can identify the L2VPN bridging service and the bridging network element in the entire network, and complete the bridging service and the bridging network element configuration and status check in the entire network. The manual input cost of the bridging service and the bridging network element inspection is greatly reduced, the difficulty of the bridging service and the bridging network element inspection is reduced, the accuracy of the inspection and the efficiency of the inspection are improved, and the labor cost input is greatly reduced. Therefore, the present invention has strong industrial applicability.

Claims (15)

  1. 一种桥接业务和桥接网元的巡检方法,包括以下步骤:A method for inspecting a bridging service and a bridging network element includes the following steps:
    根据桥接业务和桥接网元的巡检方案,选择网络中待检查的设备;Selecting devices to be inspected in the network according to the bridging service and the inspection scheme of the bridged network element;
    获取途经所述设备的L2VPN业务;Obtaining an L2VPN service passing through the device;
    通过分析所述L2VPN业务落地网元的输出业务端口的配置,识别出网络中与所述设备相关的桥接业务和桥接网元;The bridge service and the bridge network element related to the device in the network are identified by analyzing the configuration of the output service port of the L2VPN service floor network element;
    根据所述桥接业务和桥接网元的巡检方案,对桥接业务和桥接网元进行巡检;Performing inspections on the bridging service and the bridging network element according to the bridging service and the inspection scheme of the bridged network element;
    其中,所述L2VPN业务是指二层虚拟专用网络业务。The L2VPN service refers to a Layer 2 virtual private network service.
  2. 根据权利要求1所述的桥接业务和桥接网元的巡检方法,该方法还包括:The method for inspecting the bridging service and the bridging network element according to claim 1, the method further comprising:
    获取与所述设备相关联的伪线保护组数据;Obtaining pseudowire protection group data associated with the device;
    通过分析所述伪线保护组数据,从所述桥接网元中识别出主用桥接网元和备用桥接网元。The primary bridged network element and the standby bridged network element are identified from the bridged network element by analyzing the pseudowire protection group data.
  3. 根据权利要求2所述的桥接业务和桥接网元的巡检方法,其中,所述通过分析所述L2VPN业务落地网元的输出业务端口的配置,识别出网络中与所述设备相关的桥接业务的步骤包括:The method for inspecting the bridging service and the bridging network element according to claim 2, wherein the analyzing the configuration of the output service port of the L2VPN service floor network element to identify the bridging service related to the device in the network The steps include:
    通过分析所述L2VPN业务落地网元的输出业务端口的配置,过滤出所述L2VPN业务落地网元的输出业务端口为二层虚接口或二层虚子接口的L2VPN业务;By analyzing the configuration of the output service port of the L2VPN service floor network element, filtering out the L2VPN service whose output service port of the L2VPN service floor network element is a Layer 2 virtual interface or a Layer 2 virtual sub-interface;
    判断所过滤出的L2VPN业务是否为带桥接L2VPN业务;Determining whether the filtered L2VPN service is a bridged L2VPN service;
    当判断所过滤出的L2VPN业务为带桥接L2VPN业务时,则将所述L2VPN业务确定为桥接业务。When it is determined that the filtered L2VPN service is a bridged L2VPN service, the L2VPN service is determined as a bridging service.
  4. 根据权利要求3所述的桥接业务和桥接网元的巡检方法,其中,所述判断所过滤出的L2VPN业务是否为带桥接L2VPN业务的步骤包括:The method for inspecting the bridging service and the bridging network element according to claim 3, wherein the step of determining whether the filtered L2VPN service is a bridged L2VPN service comprises:
    若所述L2VPN业务落地网元的输出业务的二层虚接口与三层虚接口有一对一绑定关系,则判定所过滤出的L2VPN业务为带桥接L2VPN业务;或 者If the Layer 2 virtual interface of the output service of the L2VPN service network element has a one-to-one binding relationship with the Layer 3 virtual interface, determine that the filtered L2VPN service is a bridged L2VPN service; or By
    若所述L2VPN业务落地网元的输出业务的二层虚子接口与三层虚子接口有一对一绑定关系,则判定所过滤出的L2VPN业务为带桥接L2VPN业务。If the Layer 2 virtual sub-interface of the output service of the L2VPN service network element has a one-to-one binding relationship with the Layer 3 virtual sub-interface, it is determined that the filtered L2VPN service is a bridged L2VPN service.
  5. 根据权利要求3所述的桥接业务和桥接网元的巡检方法,其中,所述通过分析所述L2VPN业务落地网元的输出业务端口的配置,识别出网络中与所述设备相关的桥接网元的步骤包括:The method for inspecting the bridging service and the bridging network element according to claim 3, wherein the analyzing the configuration of the output service port of the L2VPN service floor network element to identify the bridge network associated with the device in the network The steps of the meta include:
    将所述L2VPN业务落地网元的输出业务的二层虚接口所在的节点作为桥接网元;或者The node where the Layer 2 virtual interface of the output service of the L2VPN service landing network element is located is a bridge network element; or
    将所述L2VPN业务落地网元的输出业务的二层虚子接口所在的节点作为桥接网元。The node where the Layer 2 virtual sub-interface of the output service of the L2VPN service landing network element is located is used as the bridge network element.
  6. 根据权利要求5所述的桥接业务和桥接网元的巡检方法,其中,所述通过分析所述伪线保护组数据,从所述桥接网元中识别出主用桥接网元和备用桥接网元的步骤包括:The method for inspecting a bridging service and a bridging network element according to claim 5, wherein the analyzing the pseudowire protection group data, identifying an active bridging network element and a backup bridging network from the bridging network element The steps of the meta include:
    通过分析所述伪线保护组数据,过滤出单发双收伪线双归保护组;By analyzing the pseudowire protection group data, filtering out the single-issue double-received pseudo-line dual-homing protection group;
    根据所述单发双收伪线双归保护组,过滤出所述桥接业务服务层伪线是单发双收伪线双归保护组的第一桥接业务;According to the single-issue dual-received pseudo-line dual-homing protection group, filtering out the bridging service service layer pseudo-line is the first bridging service of the single-issue dual-received pseudo-line dual-homing protection group;
    将所述第一桥接业务上的两个桥接网元作为主用桥接网元和备用桥接网元。The two bridged network elements on the first bridging service are used as the primary bridged network element and the backup bridged network element.
  7. 根据权利要求6所述的桥接业务和桥接网元的巡检方法,其中,所述根据桥接业务和桥接网元的巡检方案,对桥接业务和桥接网元进行巡检的步骤包括:The method of inspecting the bridging service and the bridging network element according to the bridging service and the bridging network element according to claim 6, wherein the step of inspecting the bridging service and the bridging network element according to the bridging service and the inspection scheme of the bridging network element includes:
    根据桥接业务和桥接网元的巡检方案,获取桥接业务对应的桥接网元、主用桥接网元以及备用桥接网元的配置参数及状态数据;Obtaining configuration parameters and status data of the bridged network element, the primary bridged network element, and the standby bridged network element corresponding to the bridging service according to the bridging service and the inspection scheme of the bridged network element;
    根据所述配置参数及状态数据对桥接业务和桥接网元进行巡检。The bridge service and the bridge network element are patrolled according to the configuration parameter and the status data.
  8. 根据权利要求7所述的桥接业务和桥接网元的巡检方法,其中,所述桥接业务和桥接网元的巡检方案包括多个检查规则;其中,对于不同待检查设备的桥接业务和桥接网元的巡检方案调用不同的检查规则。 The method for inspecting a bridging service and a bridging network element according to claim 7, wherein the bridging service and the inspection scheme of the bridging network element comprise a plurality of inspection rules; wherein bridging services and bridging for different equipment to be inspected The inspection plan of the NE invokes different inspection rules.
  9. 一种桥接业务和桥接网元的巡检装置,包括选择模块、获取L2VPN业务模块、识别模块和巡检模块,其中A patrol device for bridging services and bridging network elements, including a selection module, an L2VPN service module, an identification module, and a patrol module, wherein
    所述选择模块设置成:根据桥接业务和桥接网元的巡检方案,选择网络中待检查的设备;The selection module is configured to: select a device to be inspected in the network according to the bridging service and the inspection scheme of the bridged network element;
    所述获取L2VPN业务模块设置成:获取途经所述设备的L2VPN业务;The acquiring the L2VPN service module is configured to: obtain an L2VPN service that passes through the device;
    所述识别模块设置成:通过分析所述L2VPN业务落地网元的输出业务端口的配置,识别出网络中与所述设备相关的桥接业务和桥接网元;The identifying module is configured to: identify a bridging service and a bridging network element related to the device in the network by analyzing a configuration of an output service port of the L2VPN service floor network element;
    所述巡检模块设置成:根据桥接业务和桥接网元的巡检方案,对桥接业务和桥接网元进行巡检。The patrol module is configured to perform patrol inspection on the bridging service and the bridging network element according to the bridging service and the patrol inspection scheme of the bridging network element.
  10. 根据权利要求9所述的桥接业务和桥接网元的巡检装置,该装置还包括:获取伪线保护组数据单元,The patrol device of the bridge service and the bridge network element according to claim 9, the device further comprising: acquiring a pseudowire protection group data unit,
    所述获取伪线保护组数据单元设置成:获取与所述设备相关联的伪线保护组数据;通过分析所述伪线保护组数据,从所述桥接网元中识别出主用桥接网元和备用桥接网元。The acquiring the pseudowire protection group data unit is configured to: acquire pseudowire protection group data associated with the device; and identify the primary bridge network element from the bridge network element by analyzing the pseudowire protection group data And alternate bridged network elements.
  11. 根据权利要求10所述的桥接业务和桥接网元的巡检装置,其中,所述识别模块设置成按照如下方式通过分析所述L2VPN业务落地网元的输出业务端口的配置,识别出网络中与所述设备相关的桥接业务:The patrol device of the bridge service and the bridge network element according to claim 10, wherein the identification module is configured to identify the network and the network by analyzing the configuration of the output service port of the L2VPN service floor network element as follows The device related bridging service:
    通过分析所述L2VPN业务落地网元的输出业务端口的配置,过滤出所述L2VPN业务落地网元的输出业务端口为二层虚接口或二层虚子接口的L2VPN业务;By analyzing the configuration of the output service port of the L2VPN service floor network element, filtering out the L2VPN service whose output service port of the L2VPN service floor network element is a Layer 2 virtual interface or a Layer 2 virtual sub-interface;
    判断所过滤出的L2VPN业务是否为带桥接L2VPN业务;Determining whether the filtered L2VPN service is a bridged L2VPN service;
    当判断所过滤出的L2VPN业务为带桥接L2VPN业务时,则将所述L2VPN业务确定为桥接业务。When it is determined that the filtered L2VPN service is a bridged L2VPN service, the L2VPN service is determined as a bridging service.
  12. 根据权利要求11所述的桥接业务和桥接网元的巡检装置,其中,所述识别模块设置成按照如下方式判断所过滤出的L2VPN业务是否为带桥接L2VPN业务:The patrol device of the bridge service and the bridge network element according to claim 11, wherein the identification module is configured to determine whether the filtered L2VPN service is a bridged L2VPN service according to the following manner:
    若所述L2VPN业务落地网元的输出业务的二层虚接口与三层虚接口有一对一绑定关系,则判定所过滤出的L2VPN业务为带桥接L2VPN业务;或 者If the Layer 2 virtual interface of the output service of the L2VPN service network element has a one-to-one binding relationship with the Layer 3 virtual interface, determine that the filtered L2VPN service is a bridged L2VPN service; or By
    若所述L2VPN业务落地网元的输出业务的二层虚子接口与三层虚子接口有一对一绑定关系,则判定所过滤出的L2VPN业务为带桥接L2VPN业务。If the Layer 2 virtual sub-interface of the output service of the L2VPN service network element has a one-to-one binding relationship with the Layer 3 virtual sub-interface, it is determined that the filtered L2VPN service is a bridged L2VPN service.
  13. 根据权利要求11所述的桥接业务和桥接网元的巡检装置,其中,所述识别模块设置成按照如下方式通过分析所述L2VPN业务落地网元的输出业务端口的配置,识别出网络中与所述设备相关的桥接网元的步骤包括:The patrol device of the bridge service and the bridge network element according to claim 11, wherein the identification module is configured to identify the network and the network by analyzing the configuration of the output service port of the L2VPN service floor network element. The steps of the device-related bridging network element include:
    将所述L2VPN业务落地网元的输出业务的二层虚接口所在的节点作为桥接网元;或者The node where the Layer 2 virtual interface of the output service of the L2VPN service landing network element is located is a bridge network element; or
    将所述L2VPN业务落地网元的输出业务的二层虚子接口所在的节点作为桥接网元。The node where the Layer 2 virtual sub-interface of the output service of the L2VPN service landing network element is located is used as the bridge network element.
  14. 根据权利要求13所述的桥接业务和桥接网元的巡检装置,其中,所述获取伪线保护组数据单元设置成按照如下方式通过分析所述伪线保护组数据,从所述桥接网元中识别出主用桥接网元和备用桥接网元:The patrol device of the bridge service and the bridge network element according to claim 13, wherein the acquisition pseudowire protection group data unit is configured to analyze the pseudowire protection group data from the bridge network element by: The primary bridged network element and the standby bridged network element are identified:
    通过分析所述伪线保护组数据,过滤出单发双收伪线双归保护组;By analyzing the pseudowire protection group data, filtering out the single-issue double-received pseudo-line dual-homing protection group;
    根据所述单发双收伪线双归保护组,过滤出所述桥接业务服务层伪线是单发双收伪线双归保护组的第一桥接业务;According to the single-issue dual-received pseudo-line dual-homing protection group, filtering out the bridging service service layer pseudo-line is the first bridging service of the single-issue dual-received pseudo-line dual-homing protection group;
    将所述第一桥接业务上的两个桥接网元作为主用桥接网元和备用桥接网元。The two bridged network elements on the first bridging service are used as the primary bridged network element and the backup bridged network element.
  15. 根据权利要求14所述的桥接业务和桥接网元的巡检装置,其中,所述巡检模块设置成按照如下方式根据桥接业务和桥接网元的巡检方案,对桥接业务和桥接网元进行巡检:The patrol device of the bridge service and the bridge network element according to claim 14, wherein the patrol module is configured to perform the bridging service and the bridging network element according to the bridging service and the patrol inspection scheme of the bridged network element according to the following manner. Inspection:
    根据桥接业务和桥接网元的巡检方案,获取桥接业务对应的桥接网元、主用桥接网元以及备用桥接网元的配置参数及状态数据;Obtaining configuration parameters and status data of the bridged network element, the primary bridged network element, and the standby bridged network element corresponding to the bridging service according to the bridging service and the inspection scheme of the bridged network element;
    根据所述配置参数及状态数据对桥接业务和桥接网元进行巡检。 The bridge service and the bridge network element are patrolled according to the configuration parameter and the status data.
PCT/CN2016/074452 2015-08-26 2016-02-24 Bridging service and bridging network element inspection method and apparatus WO2016165491A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510530620.0A CN106487544A (en) 2015-08-26 2015-08-26 The method for inspecting of a kind of bridging traffic and bridge joint network element and device
CN201510530620.0 2015-08-26

Publications (1)

Publication Number Publication Date
WO2016165491A1 true WO2016165491A1 (en) 2016-10-20

Family

ID=57127132

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/074452 WO2016165491A1 (en) 2015-08-26 2016-02-24 Bridging service and bridging network element inspection method and apparatus

Country Status (2)

Country Link
CN (1) CN106487544A (en)
WO (1) WO2016165491A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107193286A (en) * 2017-06-02 2017-09-22 同济大学 Bridge outdoor scene digital collection method
CN115131893A (en) * 2022-07-29 2022-09-30 上海圆大鱼科技有限公司 Intelligent construction site mobile inspection method and device based on lightweight low-frequency wireless private network

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060045070A1 (en) * 2004-09-02 2006-03-02 Gryphon Networks System and method for exchanging information with a relationship management system
US7072978B2 (en) * 2001-03-26 2006-07-04 Fujitsu Limited Subscriber terminating apparatus and packet processing method
CN101588379A (en) * 2009-06-26 2009-11-25 迈普通信技术股份有限公司 Multi-point access method for layer two virtual private network
CN101667969A (en) * 2009-09-24 2010-03-10 中兴通讯股份有限公司 Method of accessing IP/L3VPN network of L2VPN network and device thereof
CN102368726A (en) * 2011-09-14 2012-03-07 杭州华三通信技术有限公司 Forwarding method and device applied to L2VPN (layer 2 virtual private network)
CN102404180A (en) * 2011-11-10 2012-04-04 神州数码网络(北京)有限公司 Method and system for realizing Operation and Maintenance (OAM) based on Packet Based Networks (PBN) network

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7072978B2 (en) * 2001-03-26 2006-07-04 Fujitsu Limited Subscriber terminating apparatus and packet processing method
US20060045070A1 (en) * 2004-09-02 2006-03-02 Gryphon Networks System and method for exchanging information with a relationship management system
CN101588379A (en) * 2009-06-26 2009-11-25 迈普通信技术股份有限公司 Multi-point access method for layer two virtual private network
CN101667969A (en) * 2009-09-24 2010-03-10 中兴通讯股份有限公司 Method of accessing IP/L3VPN network of L2VPN network and device thereof
CN102368726A (en) * 2011-09-14 2012-03-07 杭州华三通信技术有限公司 Forwarding method and device applied to L2VPN (layer 2 virtual private network)
CN102404180A (en) * 2011-11-10 2012-04-04 神州数码网络(北京)有限公司 Method and system for realizing Operation and Maintenance (OAM) based on Packet Based Networks (PBN) network

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107193286A (en) * 2017-06-02 2017-09-22 同济大学 Bridge outdoor scene digital collection method
CN107193286B (en) * 2017-06-02 2020-12-08 同济大学 Bridge live-action digital acquisition method
CN115131893A (en) * 2022-07-29 2022-09-30 上海圆大鱼科技有限公司 Intelligent construction site mobile inspection method and device based on lightweight low-frequency wireless private network

Also Published As

Publication number Publication date
CN106487544A (en) 2017-03-08

Similar Documents

Publication Publication Date Title
CN106878459B (en) Self-adaptive Internet of things intelligent gateway implementation method and equipment thereof
CN110708178B (en) Network deployment method and device
CN113169891A (en) Identifying and solving algorithmic problems in a structured network through software-defined operational management and maintenance
CN105847023B (en) Operation system network topology acquisition methods and device
CN102821022A (en) Method and system of frame forwarding with link aggregation in distributed Ethernet bridges
CN102427445B (en) Safe auditing method of IT simulation infrastructure offline compliance
EP3222003B1 (en) Inline packet tracing in data center fabric networks
CN104113448A (en) Method for automatically finding and monitoring devices in local area network
WO2014202026A1 (en) Method and system for virtual network mapping protection and computer storage medium
CN112291075B (en) Network fault positioning method and device, computer equipment and storage medium
CN105790990A (en) Method and system for monitoring and managing power distribution and utilization communication business
CN112956158A (en) Structured data plane monitoring
CN104135740A (en) Distribution automation wireless communication fault locating method
US10091066B2 (en) Integration method and system
WO2013189414A3 (en) Automatic network topology acquisition method and system, and network query and management system
WO2016165491A1 (en) Bridging service and bridging network element inspection method and apparatus
CN103532746A (en) Method and system for generating business topology of industrial system
CN106027396B (en) A kind of route control method, device and system
CN101505241B (en) Method and apparatus for generating test instances
CN103532747A (en) Method and system for generating network topology of industrial system
CN103532742A (en) Collocation method of full layer 2 business in IPRAN (Internet Protocol Radio Access Network) complex scene
CN103746932A (en) Method and apparatus for determining appointed VLAN-x forwarder
WO2016173203A1 (en) Testing method and device for deep network analysis system
CN113518034B (en) Method, device, equipment and storage medium for route detection
CN110391934B (en) Network equipment labeling method and device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16779466

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16779466

Country of ref document: EP

Kind code of ref document: A1