Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Non-fullness complete-non-correlation double-tree traversal protection method in mesh network

A non-correlated, tree traversal technology, applied in the field of communication networks, can solve the problems of short failover time, consumption of computing time, waste of resources, etc., and achieve the effects of clear transmission purpose, reduced link congestion, and high transmission efficiency

Inactive Publication Date: 2012-03-28
XI AN JIAOTONG UNIV
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These three failure recovery mechanisms also have their own shortcomings: a. Although the rerouting method has good advantages in terms of resource utilization and failure link or failure node protection rate, it cannot guarantee a shorter failure Switchover time, so rerouting is only used in the recovery process of services that are not sensitive to faults
b. The P-ring method can provide high resource utilization and high protection rate, but it will consume calculation time when switching across regions, and the switching time cannot be guaranteed to be very short
c. The method based on the spanning tree can be summarized as the establishment of the working path (working tree) and the protection path (protection tree). The traditional spanning tree algorithm configures the working path of the network before the network service appears, thus causing The waste of resources is reduced, thereby reducing resource utilization
Moreover, in this protection method, generally there is only one protection tree to provide the protection path, and there will be a problem that 100% protection cannot be achieved when the protection path fails or is occupied.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Non-fullness complete-non-correlation double-tree traversal protection method in mesh network
  • Non-fullness complete-non-correlation double-tree traversal protection method in mesh network
  • Non-fullness complete-non-correlation double-tree traversal protection method in mesh network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the purpose, technical solution, and advantages of the present invention clearer, the present invention will be further elaborated below in conjunction with the accompanying drawings and specific implementation examples.

[0044] figure 1 To establish a flowchart for the "non-full degree and completely irrelevant" protection tree, the present invention first needs to establish two protection trees satisfying the "non-full degree and completely non-correlation" condition, and the algorithm for establishing the protection tree is as follows:

[0045] Step 1: Select the node with the largest node degree as the root node;

[0046] Step 2: Select the adjacent node of the minimum link traversal node with delay;

[0047] Step 3: Whether the degree of the traversed node is full;

[0048] Step 4: If the traversed node is full, the link cannot be selected, and the child node of the traversed node is selected to traverse the adjacent nodes; if the traversed node...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a non-fullness complete-non-correlation double-tree traversal protection method in a mesh network. The method comprises the following steps of: providing network topology conditions which are required for establishment of non-fullness complete-non-correlation double trees; and by selecting a node with the maximum node degree as a root node, using time delay as cost and using a breadth-first generation tree algorithm, calculating two protection trees. In the case of causing of a fault in a link or the node (a non-source node, a destination node and the root node) in an operating path, the fault of the link can be subjected to switching of channel protection and link protection, and the fault of the node can be also subjected to switching of the channel protection and the corresponding node protection, so that shorter protection switching time can be provided, higher resource utilization rate can be provided by using the mesh network, and complicated configuration and switching motions can be avoided.

Description

technical field [0001] The invention belongs to the field of communication networks, and in particular relates to a dual tree traversal protection switching method in a mesh network. Background technique [0002] With the changes of the times and the advancement of science and technology, network technology and information technology have achieved unprecedented development. The application of the network has become more and more popular, and has penetrated into various fields of society, profoundly affecting and changing people's work and life style. At the same time, with the continuous increase of user needs, various new services emerge in an endless stream, making the traditional network topology unable to meet the new needs of users, so the mesh network has gradually gained people's attention by virtue of its own advantages. play an increasing role. Due to some new features of the mesh network itself, it has higher requirements for survivability. Therefore, in order to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W16/00H04W24/00H04L45/28
Inventor 曲桦赵季红马文涛王力
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products