Method and system for protecting shared link interlinking ring network and interlinking nodes
A technology for sharing links and interconnecting nodes, which is applied in the field of communication to achieve the effect of easy management and reduced technical complexity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0039] Figure 5 The shown network adopts the unique label of the whole network (including ring 1 and ring 2) to indicate connections, including working connections and protection connections, such as PBT (PBB-TE) network. The path of the working connection Q (set its label as DMAC6+VID1) is 1-5-6. For the protection of Q, two protection paths need to be configured on node 5, and one is the protection path M of the upper port (ring 1) ( Let its label be DMAC6+VID2), and a protection path N for the lower port (ring 2) (set its label as DMAC6+VID3). On the other interconnection node 4, the association relationship between the two protection paths M and N (that is, the association relationship between the label DMAC6+VID2 and the label DMAC6+VID3) needs to be configured. The node 4 may also not be configured, but the node 5 notifies the node 4 of the information of the two protection paths M and N configured by itself through a message. When node 5 fails, node 1 uses the single...
Embodiment 2
[0043] Figure 6 The network shown in uses the unique label of the whole ring to indicate the connection, including the working connection and the protection connection, that is, the connection label is only unique in the same ring, such as the PBT (PBB-TE) network, the working connection Q (set its label in the ring 1 is DMAC5+VID1, in ring 2 it is DMAC6+VID1) and the path is 1-5-6. For the protection of Q, two protection paths need to be configured on node 5, one for the upper port (ring 1) Protection path M (set its label as DMAC5+VID2), a protection path N (set its label as DMAC6+VID3) for the lower port (ring 2), this relationship uses triplet [working connection, protection on ring 1 connection, protected connection on ring 2] representation (eg [DMAC5+VID1, DMAC5+VID2, DMAC6+VID3]). On another interconnection node 4, the association relationship between the two protection paths M and N needs to be configured (that is, the association relationship between the label DMAC...
Embodiment 3
[0047] Figure 7 The network shown in uses non-unique labels for the entire network to indicate connections, including working connections and protection connections, such as the labels used in MPLS technology, and the path of working connection Q (set labels as Q1, Q2, Q3) is 1-5- 6. For the protection of Q, two protection paths need to be configured on node 5, one is the protection path M of the upper port (ring 1) (set its labels as M1, M2, M3, M4, M5), and the other is the lower port (Ring 2) protection path N (set its labels as N1, N2, N3, N4, N5). This relationship can be specifically expressed as Q2 and M5 association, Q3 and N3 association using tags. The association between M3 and N5 needs to be configured on another interconnection node 4. When node 5 fails, node 1 uses the single-ring protection technology to switch the traffic on Q to the protection path M and send it back to node 4. Node 4 obtains the association between M and N, that is, the association between...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 