Protection rotation method for presetting protective ring

A protection switching and protection ring technology, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve the problem of not formally proposing a preset protection ring protection switching method, etc., to achieve less data loss, less bandwidth occupation, transmission The effect of low time delay

Inactive Publication Date: 2009-06-03
SHANGHAI JIAOTONG UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This paper proposes the concept of preset protection circles for stream protection, and compares them with preset protection circles for link protection from the perspective of network resource utilization. Protection Switching Method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection rotation method for presetting protective ring
  • Protection rotation method for presetting protective ring
  • Protection rotation method for presetting protective ring

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] In order to better understand the technical solutions of the present invention, the implementation manners will be described in detail below in conjunction with the accompanying drawings.

[0012] figure 1 —7 shows the application of the foldback protection switching method and the source routing protection switching method in different types of preset protection circles. In the figure, 1 is the working service; 2 is the recovery path using the foldback protection switching method; 3 is using the source routing switching method recovery path. exist figure 1 In —7, it is assumed that work business 1 passes through nodes I, E, B, ( Figure 7 D), F, A, G, O in D). Among them, nodes I, B, A, O and C are nodes on the preset protection circle, Figure 4 —The node F in 5 cannot be a node on the preset protection circle, and Figure 7 The nodes F and D in can be the nodes on the preset protection circle. exist figure 1 In each figure of —7, there are two recovery paths r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention relates to inversion protection method with preset protect loops. When fault appears to a link or a node, the front node and back node deflect the service onto the preset protect loop directly after they find out the fault, the service is transmitted along the proset protect loop between them namely the return protect inversion, or four nodes a source node, front node, a back node and a host node envolve in the protection recovery of the fault when it happens. If the fault happens on the loop, then the service will arrives at the host node along the preset protection loop from the source node, otherwise, the loop provides a recovery path for invalid service, namely a source route protection inversion.

Description

technical field [0001] The invention relates to a protection switching method for a preset protection ring, in particular to a protection switching method applicable to various types of preset protection rings. Used in the field of network communication technology. Background technique [0002] With the continuous development of Internet and network technology, higher and higher requirements are put forward for the survivability and reconfigurability of the network. Many protection and recovery strategies have been proposed based on the ring topology and mesh topology of the network. Fast protection recovery (about 50ms) can be achieved in a ring network (such as BLSR), but at least 100% of backup resources need to be reserved. In a mesh network, a high resource utilization rate (for example, less than 70%) can be achieved by using the method of sharing protection resources, but because complex signaling is required for fault recovery, and the intermediate nodes need to pe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24
Inventor 祝国龙曾庆济许田叶通杨俊杰
Owner SHANGHAI JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products