Unlock instant, AI-driven research and patent intelligence for your innovation.

Alarm control method and device for aggregation link in packet switching network

A packet-switching network and aggregated link technology, applied in the field of aggregated link alarm control, can solve problems such as delays and reduce service protection efficiency, and achieve the effect of improving efficiency and flexible service flow protection

Inactive Publication Date: 2012-05-23
ZTE CORP
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, if the service flow is protected in other ways (other than the aggregated link) according to the processing results after the internal processing of the aggregated link is completed, it will definitely delay some time and reduce the efficiency of business protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Alarm control method and device for aggregation link in packet switching network
  • Alarm control method and device for aggregation link in packet switching network
  • Alarm control method and device for aggregation link in packet switching network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0091] Embodiment 1. It is assumed that the service flow carried by each member link of the aggregated link Link1 before the failure is as shown in Table 1, where "service flow 4-R" indicates the reserved protection bandwidth resource of service flow 4.

[0092]

[0093] Table 1

[0094]Wherein, the smaller the value of the priority is, the higher the priority is, so it can be seen that service flow 4 has the highest priority.

[0095] When member link Link1-3 fails:

[0096] First, search for the service flows carried by the member links Link1-3 according to the priority of the service flows, that is, the service flows that need to be protected. Among them, the priority of the service flow 4 is higher than that of the service flow 5, so the service flow 4 is processed first.

[0097] It can be seen from Table 1 that service flow 4 has 5M reserved protection bandwidth resources in member link Link1-2, which is enough to carry service flow 4, so the switching operation is p...

Embodiment 2

[0107] Embodiment 2, following the scenario of Embodiment 1, when the member link Link1-3 fails and after the processing described in Embodiment 1, the service flow carried by each member link of the aggregated link Link1 is as shown in Table 2 Show.

[0108] At this time, the member link Link1-2 also fails:

[0109] First, the service flow carried by the member link Link1-2 is searched according to the priority of the service flow, wherein the priority of the service flow 4 is higher than that of the service flow 3, so the service flow 4 is processed first.

[0110] In the first embodiment, the service flow 4 has already occupied the reserved protection bandwidth resource, and there is no other reserved protection bandwidth resource. Therefore, the idle bandwidth resource is searched in the unfailed member link, that is, Link1-1. At this time , there are no idle bandwidth resources in the aggregated link. Therefore, according to the order of service flow priority from low to...

Embodiment 3

[0118] Embodiment 3. It is assumed that in this embodiment, the service flow carried by each member link of the aggregated link Link1 before the failure is as shown in Table 3:

[0119]

[0120] Table 4

[0121] Wherein, the smaller the value of the priority is, the higher the priority is.

[0122] When member link Link1-3 fails:

[0123] First, search for the service flows carried by the member links Link1-3 according to the priority of the service flows, that is, the service flows that need to be protected. Among them, the priority of the service flow 4 is higher than that of the service flow 5, so the service flow 4 is processed first.

[0124] As can be seen from Table 4, service flow 4 does not reserve protection bandwidth resources, so look for free bandwidth resources in unfailed member links (Link1-1, Link1-2), and there is 5M free bandwidth in member links Link1-1 The resources are enough to bear the service flow 4 and perform the switching process.

[0125] Aft...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an alarm control method and an alarm control device for an aggregated link in a packet switching network. The method comprises the following steps of: when the aggregated link fails, judging whether an available bandwidth resource exists in the aggregated link, if the available bandwidth resource exists in the aggregated link, switching a service stream carried by a failed member link in the aggregated link to the available bandwidth resource, if the available bandwidth resource does not exist in the aggregated link or the switching fails, informing the failure information of the service stream to a corresponding control node. By the method and the device, the service stream can be protected flexibly in the aggregated link, and the service protection efficiency is improved.

Description

technical field [0001] The invention relates to a packet switching network, in particular to a method and a device for controlling an aggregation link alarm in a packet switching network. Background technique [0002] With the growth of data traffic and the improvement of service quality requirements, multi-protocol label switching (MPLS, Multi-Protocol Label Switching), MPLS-TP (MPLS-Transport Profile), and operator Backbone bridging technology (PBB, Provider BackboneBridge), VLAN (Virtual Local Area Network, Virtual Local Area Network) switching and other technologies to achieve traffic engineering. Before transmitting user data, formulate a service-level agreement (SLA, Service-Level Agreement) according to user requirements, pre-configure the data forwarding path through the control protocol, allocate bandwidth resources, and form a service flow with bandwidth and other quality of service guarantees, and in the network When the resource state changes (link failure, netw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/24H04L12/56
CPCH04L43/0811H04L41/5025
Inventor 陈皓
Owner ZTE CORP