Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for protecting shared link interlinking ring network and interlinking nodes

A technology for sharing links and interconnecting nodes, which is applied in the field of communication to achieve the effect of easy management and reduced technical complexity

Inactive Publication Date: 2013-01-23
深圳市智通天下科技服务有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the current connection-oriented network technology, there is no scheme for ring network interconnection in the way of intersecting

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for protecting shared link interlinking ring network and interlinking nodes
  • Method and system for protecting shared link interlinking ring network and interlinking nodes
  • Method and system for protecting shared link interlinking ring network and interlinking nodes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] Figure 5 The shown network adopts the unique label of the whole network (including ring 1 and ring 2) to indicate connections, including working connections and protection connections, such as PBT (PBB-TE) network. The path of the working connection Q (set its label as DMAC6+VID1) is 1-5-6. For the protection of Q, two protection paths need to be configured on node 5, and one is the protection path M of the upper port (ring 1) ( Let its label be DMAC6+VID2), and a protection path N for the lower port (ring 2) (set its label as DMAC6+VID3). On the other interconnection node 4, the association relationship between the two protection paths M and N (that is, the association relationship between the label DMAC6+VID2 and the label DMAC6+VID3) needs to be configured. The node 4 may also not be configured, but the node 5 notifies the node 4 of the information of the two protection paths M and N configured by itself through a message. When node 5 fails, node 1 uses the single...

Embodiment 2

[0043] Figure 6 The network shown in uses the unique label of the whole ring to indicate the connection, including the working connection and the protection connection, that is, the connection label is only unique in the same ring, such as the PBT (PBB-TE) network, the working connection Q (set its label in the ring 1 is DMAC5+VID1, in ring 2 it is DMAC6+VID1) and the path is 1-5-6. For the protection of Q, two protection paths need to be configured on node 5, one for the upper port (ring 1) Protection path M (set its label as DMAC5+VID2), a protection path N (set its label as DMAC6+VID3) for the lower port (ring 2), this relationship uses triplet [working connection, protection on ring 1 connection, protected connection on ring 2] representation (eg [DMAC5+VID1, DMAC5+VID2, DMAC6+VID3]). On another interconnection node 4, the association relationship between the two protection paths M and N needs to be configured (that is, the association relationship between the label DMAC...

Embodiment 3

[0047] Figure 7 The network shown in uses non-unique labels for the entire network to indicate connections, including working connections and protection connections, such as the labels used in MPLS technology, and the path of working connection Q (set labels as Q1, Q2, Q3) is 1-5- 6. For the protection of Q, two protection paths need to be configured on node 5, one is the protection path M of the upper port (ring 1) (set its labels as M1, M2, M3, M4, M5), and the other is the lower port (Ring 2) protection path N (set its labels as N1, N2, N3, N4, N5). This relationship can be specifically expressed as Q2 and M5 association, Q3 and N3 association using tags. The association between M3 and N5 needs to be configured on another interconnection node 4. When node 5 fails, node 1 uses the single-ring protection technology to switch the traffic on Q to the protection path M and send it back to node 4. Node 4 obtains the association between M and N, that is, the association between...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method for protecting the cross-ring work connection in a shared link interlinking ring network, comprising a protecting method and characterized in that the protecting method is applied to the shared link interlinking ring network, and the shared link interlinking ring network comprises a first ring and a second ring which are interconnected by a shared link and at least comprises two interlinking nodes which are positioned on the shared link. When the cross-ring part of the cross-ring connection has faults, the method comprises the steps: receiving flux from a first ring route by the interlinking nodes, and switching flux on a second ring route according to the obtained relation of the first ring route and the second ring route. The first ringis firstly passed by the flux, and the second ring is secondly passed by the flux. The embodiment of the invention also discloses a system for protecting a shared link interlinking ring network and interlinking nodes which are applied to the shared link interlinking ring network to protect the cross-ring work connection.

Description

technical field [0001] The invention relates to the communication field, in particular to a shared link interconnection ring network protection method, system and interconnection node. Background technique [0002] The connection-oriented technology is a network connection technology in which the connection has been established before the service is opened. Compared with the traditional Ethernet, the connection-oriented network removes the self-learning, spanning tree, and flooding mechanisms, and uses the management plane or control plane to issue forwarding tables to establish paths. Connection-oriented networks are widely used due to their ability to provide ideal quality of service guarantees. At present, connection-oriented technologies are relatively successful, such as multi-protocol label switching MPLS network, carrier backbone transmission network PBT (PBT-TE), optical fiber synchronous network / synchronous digital network SONET / SDH network, etc. [0003] The spec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04J3/08H04L12/437
Inventor 普云
Owner 深圳市智通天下科技服务有限公司