Discovery method and system of loop network protection information
A technology for protecting information and discovering methods, applied in the network field, can solve the problems of ring network topology not equal to ring network protection, high network resource consumption, slow topology discovery speed, etc. less effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0039] Such as figure 1 As shown, the discovery method of the ring network protection information of an embodiment of the present invention comprises the following steps:
[0040] Step 101, configuring node ring network protection information on each node of the protection ring;
[0041] Node ring network protection information refers to the ring network protection information related to a node, which includes: protection ring identification, ring node identification, message type, node eastbound and westbound node identification, protection type of protection ring, protection status, working Protection pair configuration, protection parameters, etc.
[0042] Among them, the protection ring identifier is used to identify different protection rings, and the absence of the protection ring identifier indicates that the protection ring does not exist in the existing protection ring network; the ring node identifier is used to distinguish different nodes on the protection ring; th...
Embodiment 2
[0063] Such as figure 2 As shown, in a protection ring network composed of two protection rings, ring 1 and ring 2, when the node ring network protection information of node NE1 changes, the method for discovering the ring network protection information includes the following steps:
[0064] Step 201, when the protection state on the node NE1 changes, send the node ring network protection information of NE1 to other nodes. The specific format of the node ring network protection information is determined according to the bearer protocol. In this embodiment, it is represented by Table 1.
[0065] Table 1:
[0066]
[0067]
[0068] The protection parameters in Table 1 include waiting for reply time WTR, delay time HoldOffTime, in the case of Ethernet ring network protection, it also includes blocking ports, etc., and other parameters can also be included. Users can define other parameters by themselves to meet different needs of users. .
[0069] Step 202, the node NE2 ...
Embodiment 3
[0076] Such as image 3 As shown, in a protection ring network composed of ring 1 and ring 2, the node NE8 on ring 2 is deleted, and the method for discovering the protection information of the ring network includes the following steps:
[0077] Step 301, delete the node NE8, and the node NE8 sends the ring network protection information of the node whose message type is deleted to other nodes;
[0078] Step 302, node NE2 receives the node ring network protection information sent by node NE8, judges that the message type is delete, and the ring ID is ring 2, that is, if a node NE8 is deleted in the existing ring 2, then the entire network or In the intra-domain ring network protection information, delete the node ring network protection information corresponding to node NE8, that is, delete the row of node NE8 in ring 2 in Table 2, and update the east-west connection relationship between node NE5 and node NE7.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 