Harmless information deletion method and system

A deletion method and non-destructive technology, applied in the field of communication, can solve problems such as members cannot be deleted, state deadlock, strong network management dependence, etc., and achieve the effect of solving the problem of sink deletion and non-destructive business

Inactive Publication Date: 2008-03-19
ZTE CORP
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0040] One is to use the network management software to ensure the consistency of the number of VCGs at the source end and the sink end. When the VCG members at the sink end are forcibly deleted, the network management notifies the source end to perform the deletion operation at the same time to ensure that the continuity of the SQ and the number of members are the same. However, this method The dependence on the network management is very strong, and the whole process cannot be successfully co

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Harmless information deletion method and system
  • Harmless information deletion method and system
  • Harmless information deletion method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The specific implementation manners of the present invention will be described in detail below with reference to the accompanying drawings.

[0061] Referring to FIG. 2 , a method for deleting information without damage according to an embodiment of the present invention is illustrated. As shown in Figure 2, the method for deleting information without damage includes the following steps: S202, the sending end sends a control packet to the receiving end, wherein the control packet includes member state information; S204, the receiving end processes according to the control packet, and Modify member state information and add member state additional information in the reserved field in the control packet, and feed back the control packet to the sender; and S206, the sender obtains member state information and member state additional information from the control packet and performs corresponding operations.

[0062] Wherein, the control packet further includes at least one ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a non-damage information deletion method and a system, wherein the non-damage information deletion method includes the steps: S202, a sender delivers control packets to a receiver, wherein the control packets contain the member status information; S204, the receiver processes according to the control packets, fixes the member status information in the reserved field of the control packets and adds the member status additional information, and then returns the control packets back to the sender; and S206, the sender acquires the member status information and the member status additional information from the control packets and implements the corresponding processes. The invention can realize the termination deletion with no service damage and no deadlock, and is compatible with the current standard, thereby resolving the long-term problem of LCAS protocol in the termination deletion.

Description

technical field [0001] The present invention relates to the communication field, and more particularly relates to a method and system for deleting information without damage. Background technique [0002] Synchronous Digital Hierarchy (SDH) equipment, as the mainstream equipment of the current transmission network, has been widely used in the field of communication. Its standard virtual container (Virtual Container, VC for short) VC-12, VC-3, VC- 4 can be used to carry fixed bandwidth TDM services such as E1, E3 / T3, and E4 respectively, so the demand for VC cascading is not strong, but with the rapid development of data services, SDH equipment carrying data services has become a problem that must be solved. [0003] One of the characteristics of data services is the uncertainty of bandwidth. Since it is a packet service, the actual service bandwidth is not necessarily related to the interface used, and the types of SDH equipment VCs are very limited. Those who want to use a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04J3/16H04L12/56H04L29/06H04L12/24
Inventor 冯景斌
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products