Unlock instant, AI-driven research and patent intelligence for your innovation.
Multi-protection stacking protection group realization method and device
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A technology of multiple protection and implementation methods, applied in the field of communication, to achieve the effect of timely service switching
Active Publication Date: 2011-08-03
ZTE CORP
View PDF3 Cites 11 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0005] The purpose of the present invention is to provide a protection group implementation method and device for multiple protection superposition, which can better solve the problem of protection group switching logic
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
example 1
[0081] In the initial state, the leaf nodes are Tunnel 1, Tunnel 3, Tunnel 2, and Tunnel 4 from left to right. Up; for protection group 1, the status of tunnel 1 and tunnel 3 of all the leaf nodes on the first side is normal, so the status of protection group 1 is master.
[0082] From the root node protection group 1 downwards, for protection group 1, the state is on the master, then select the route to go to the first side to reach protection group 2; for protection group 2, the state is on the master, continue to select the route and go to the first side, Arrives at leaf node Tunnel 1; so network traffic is on Tunnel 1.
example 2
[0084] When it is detected that tunnel 1 is invalid and tunnel 3, tunnel 2, and tunnel 4 are normal, for protection group 2, the state of tunnel 1 of the first-side leaf node is invalid, and the state of tunnel 3 of the second-side leaf node is normal, so the state of protection group 2 is Standby; for protection group 1, the first side includes leaf node tunnel 1 and tunnel 3, and the status of tunnel 3 is normal, so the status of protection group 1 is on the active side.
[0085] From the root node protection group 1 downwards, for protection group 1, the state is on the master, then choose the route to go to the first side to reach protection group 2; for protection group 2, the state is on the standby, then continue to choose the route to go to the second side , reaches the leaf node tunnel 3; so the network traffic is on tunnel 3.
example 3
[0087] When both tunnel 1 and tunnel 3 are invalid, and tunnel 2 and tunnel 4 are normal, for protection group 2, the state of tunnel 1 of the leaf node on the first side and tunnel 3 of the leaf node on the second side are both invalid, so the current state of protection group 2 is invalid; For protection group 1, the status of all leaf node tunnels 1 and 3 on the first side is invalid, and the status of leaf node tunnel 2 on the second side is normal, so protection group 1 is switched to the standby server; for protection group 3, the status of the leaf node tunnels on the first side 2 is normal, and the second-side leaf node tunnel 4 is normal, then the protection group 3 is switched to the backup.
[0088] From the root node downwards, for protection group 1, the state is on standby, then choose the route to go to the first side, to reach protection group 3, for protection group 3, the state is on the master, then continue to choose the first side, to reach the leaf node T...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention discloses a multi-protection stacking protection group realization method and a multi-protection stacking protection group realization device. The protection group realization method comprises the following steps of: constructing M binary trees by using a plurality of protection groups of which each comprises a master tunnel and a standby tunnel in a network according to categories, wherein each binary tree has a unique master tunnel, a first side node of the binary tree comprises the master tunnel positioned at the bottom layer and each protection group of the binary tree, and second side nodes are the standby tunnels of the protection groups of the binary tree; traversing the M binary trees to sequentially find two binary trees with the same master tunnel and the same standby tunnel, and performing binary tree regulation for M-1 times to realize multi-protection stacking protection groups; and in the binary tree regulation of each time, replacing the standby tunnels of a certain binary tree by using root nodes of another binary tree in which the master tunnel is. By the method and the device, the switching of the protection groups is realized conveniently and rapidly in a multi-protection stacking scene so as to achieve multi-protection effects.
Description
technical field [0001] The present invention relates to the communication field, in particular to a protection group realization method and device for multi-protection overlay of multi-protocol label switching (MPLS Transport Profile, MPLS-TP) tunnel protection. Background technique [0002] MPLS-TP is a connection-oriented packet transmission technology based on Multiprotocol Label Switching (MPLS) defined by the International Telecommunication Union (ITU-T). The data forwarding plane of MPLS-TP is a subset of MPLS. Data is forwarded based on MPLS-TP labels. MPLS-TP is the application of MPLS in the transport network. It simplifies some complex functions of the MPLS data forwarding plane, and adds functions such as connection-oriented OAM (operation, management, maintenance) and protection restoration. [0003] The protection recovery function is mainly to bind the standby tunnel to the primary tunnel. Usually, one primary tunnel can correspond to one secondary tunnel. Fo...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.