Alarm control method and device for aggregation link in packet switching network
A packet-switching network and aggregated link technology, applied in the field of aggregated link alarm control, can solve problems such as delays and reduce service protection efficiency, and achieve the effect of improving efficiency and flexible service flow protection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0091] Embodiment 1. It is assumed that the service flow carried by each member link of the aggregated link Link1 before the failure is as shown in Table 1, where "service flow 4-R" indicates the reserved protection bandwidth resource of service flow 4.
[0092]
[0093] Table 1
[0094]Wherein, the smaller the value of the priority is, the higher the priority is, so it can be seen that service flow 4 has the highest priority.
[0095] When member link Link1-3 fails:
[0096] First, search for the service flows carried by the member links Link1-3 according to the priority of the service flows, that is, the service flows that need to be protected. Among them, the priority of the service flow 4 is higher than that of the service flow 5, so the service flow 4 is processed first.
[0097] It can be seen from Table 1 that service flow 4 has 5M reserved protection bandwidth resources in member link Link1-2, which is enough to carry service flow 4, so the switching operation is p...
Embodiment 2
[0107] Embodiment 2, following the scenario of Embodiment 1, when the member link Link1-3 fails and after the processing described in Embodiment 1, the service flow carried by each member link of the aggregated link Link1 is as shown in Table 2 Show.
[0108] At this time, the member link Link1-2 also fails:
[0109] First, the service flow carried by the member link Link1-2 is searched according to the priority of the service flow, wherein the priority of the service flow 4 is higher than that of the service flow 3, so the service flow 4 is processed first.
[0110] In the first embodiment, the service flow 4 has already occupied the reserved protection bandwidth resource, and there is no other reserved protection bandwidth resource. Therefore, the idle bandwidth resource is searched in the unfailed member link, that is, Link1-1. At this time , there are no idle bandwidth resources in the aggregated link. Therefore, according to the order of service flow priority from low to...
Embodiment 3
[0118] Embodiment 3. It is assumed that in this embodiment, the service flow carried by each member link of the aggregated link Link1 before the failure is as shown in Table 3:
[0119]
[0120] Table 4
[0121] Wherein, the smaller the value of the priority is, the higher the priority is.
[0122] When member link Link1-3 fails:
[0123] First, search for the service flows carried by the member links Link1-3 according to the priority of the service flows, that is, the service flows that need to be protected. Among them, the priority of the service flow 4 is higher than that of the service flow 5, so the service flow 4 is processed first.
[0124] As can be seen from Table 4, service flow 4 does not reserve protection bandwidth resources, so look for free bandwidth resources in unfailed member links (Link1-1, Link1-2), and there is 5M free bandwidth in member links Link1-1 The resources are enough to bear the service flow 4 and perform the switching process.
[0125] Aft...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 