Method for protecting 1+1 single sub-network connection and communication network using the method

一种通信网络、单向的技术,应用在通信网络领域,达到增强可靠性的效果

Inactive Publication Date: 2009-10-28
刘真
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This shortcoming is more prominent when A / B / B', C / C' / D belong to different operators

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting 1+1 single sub-network connection and communication network using the method
  • Method for protecting 1+1 single sub-network connection and communication network using the method
  • Method for protecting 1+1 single sub-network connection and communication network using the method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] figure 2 is the protection framework according to the first embodiment of the present invention. like figure 2 As shown, the bridge at the source node A duplicates the input signal into two copies and sends them to the two downstream nodes respectively. For example, node B' copies the signal from node A and sends it to B and C'. The selector completes the selection of signals. For example, node B needs to select one of the two signals from A and B' and send it downstream. How to select is related to the specific mode, which will be described in detail below.

[0024] It should be noted that the connection between two nodes in the figure can be through an intermediate node, and whether there is an intermediate node does not affect the integrity of the architecture description and the feasibility of implementation. In addition, the source node and sink node in the figure are not the source and sink of services, but the source and sink of subnet connections. That i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a communication network for realizing 1+1 end-to-end unidirectional subnet connection service protection. The communication network includes a source node, a sink node, and first and second paths between the source node and the sink node, and the communication network includes: a first bridge located at the source node, duplicating an input signal into two copies, sending along the first and second paths respectively; the first selector at the sink node; the second selector and the second bridge at the first path; and the third bridge and the third selector at the second path, The third bridge copies the signal into two copies and sends them to the second selector and the third selector respectively; the second selector receives and selects the signal, and sends the selected signal to the second bridge; the second bridge will The received signal is copied into two copies and sent to the third selector and the sink node respectively; the third selector selects the received signal and sends the selected signal to the sink node; the first selector receives and selects the signal.

Description

technical field [0001] The invention relates to a communication network, in particular to a method for realizing 1+1 end-to-end unidirectional subnet connection service protection in the communication network, and a communication network using the method. Background technique [0002] Subnet Connection Protection (SNCP) is an important type of protection in a transport network, and can support cascaded protection subnets. Such a network architecture can recover services in case of multi-point failure (each protected subnet can have one failure point). Refer to Figure 19 in Chapter 11.2 of ITU-T G.808.1. [0003] figure 1 It is an end-to-end 1+1 E2E protection mode in the prior art. like figure 1 As shown, two E2E connections are established from source node A to sink node D. The source node sends signals from two connections, and the sink node selects a signal from a normal connection according to the status of the two connections. [0004] However, this protection met...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L12/46
CPCH04L12/66H04L12/46H04L45/28H04L45/00H04L45/24
Inventor 何健飞
Owner 刘真
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products