Multi-protection stacking protection group realization method and device

A technology of multiple protection and implementation methods, applied in the field of communication, to achieve the effect of timely service switching

Active Publication Date: 2011-08-03
ZTE CORP
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a protection group implementation method and device for multiple protection superposition, which can better solve the problem of protection group switching logic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-protection stacking protection group realization method and device
  • Multi-protection stacking protection group realization method and device
  • Multi-protection stacking protection group realization method and device

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0081] In the initial state, the leaf nodes are Tunnel 1, Tunnel 3, Tunnel 2, and Tunnel 4 from left to right. Up; for protection group 1, the status of tunnel 1 and tunnel 3 of all the leaf nodes on the first side is normal, so the status of protection group 1 is master.

[0082] From the root node protection group 1 downwards, for protection group 1, the state is on the master, then select the route to go to the first side to reach protection group 2; for protection group 2, the state is on the master, continue to select the route and go to the first side, Arrives at leaf node Tunnel 1; so network traffic is on Tunnel 1.

example 2

[0084] When it is detected that tunnel 1 is invalid and tunnel 3, tunnel 2, and tunnel 4 are normal, for protection group 2, the state of tunnel 1 of the first-side leaf node is invalid, and the state of tunnel 3 of the second-side leaf node is normal, so the state of protection group 2 is Standby; for protection group 1, the first side includes leaf node tunnel 1 and tunnel 3, and the status of tunnel 3 is normal, so the status of protection group 1 is on the active side.

[0085] From the root node protection group 1 downwards, for protection group 1, the state is on the master, then choose the route to go to the first side to reach protection group 2; for protection group 2, the state is on the standby, then continue to choose the route to go to the second side , reaches the leaf node tunnel 3; so the network traffic is on tunnel 3.

example 3

[0087] When both tunnel 1 and tunnel 3 are invalid, and tunnel 2 and tunnel 4 are normal, for protection group 2, the state of tunnel 1 of the leaf node on the first side and tunnel 3 of the leaf node on the second side are both invalid, so the current state of protection group 2 is invalid; For protection group 1, the status of all leaf node tunnels 1 and 3 on the first side is invalid, and the status of leaf node tunnel 2 on the second side is normal, so protection group 1 is switched to the standby server; for protection group 3, the status of the leaf node tunnels on the first side 2 is normal, and the second-side leaf node tunnel 4 is normal, then the protection group 3 is switched to the backup.

[0088] From the root node downwards, for protection group 1, the state is on standby, then choose the route to go to the first side, to reach protection group 3, for protection group 3, the state is on the master, then continue to choose the first side, to reach the leaf node T...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multi-protection stacking protection group realization method and a multi-protection stacking protection group realization device. The protection group realization method comprises the following steps of: constructing M binary trees by using a plurality of protection groups of which each comprises a master tunnel and a standby tunnel in a network according to categories, wherein each binary tree has a unique master tunnel, a first side node of the binary tree comprises the master tunnel positioned at the bottom layer and each protection group of the binary tree, and second side nodes are the standby tunnels of the protection groups of the binary tree; traversing the M binary trees to sequentially find two binary trees with the same master tunnel and the same standby tunnel, and performing binary tree regulation for M-1 times to realize multi-protection stacking protection groups; and in the binary tree regulation of each time, replacing the standby tunnels of a certain binary tree by using root nodes of another binary tree in which the master tunnel is. By the method and the device, the switching of the protection groups is realized conveniently and rapidly in a multi-protection stacking scene so as to achieve multi-protection effects.

Description

technical field [0001] The present invention relates to the communication field, in particular to a protection group realization method and device for multi-protection overlay of multi-protocol label switching (MPLS Transport Profile, MPLS-TP) tunnel protection. Background technique [0002] MPLS-TP is a connection-oriented packet transmission technology based on Multiprotocol Label Switching (MPLS) defined by the International Telecommunication Union (ITU-T). The data forwarding plane of MPLS-TP is a subset of MPLS. Data is forwarded based on MPLS-TP labels. MPLS-TP is the application of MPLS in the transport network. It simplifies some complex functions of the MPLS data forwarding plane, and adds functions such as connection-oriented OAM (operation, management, maintenance) and protection restoration. [0003] The protection recovery function is mainly to bind the standby tunnel to the primary tunnel. Usually, one primary tunnel can correspond to one secondary tunnel. Fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/56H04L12/24H04L45/128H04L45/24H04L45/28H04L45/50
CPCH04L45/50H04L45/128H04L45/48H04L45/28H04L45/24
Inventor 操超鹏
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products