Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for realizing source looped network protection

A ring network and link protection technology, applied in the field of data communication, can solve problems such as unfavorable topology changes and heavy configuration workload

Inactive Publication Date: 2013-01-02
ZTE CORP
View PDF8 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this method is to statically configure the entire ring network topology for each device, and the configuration workload is heavy, which is not conducive to topology changes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for realizing source looped network protection
  • Method and system for realizing source looped network protection
  • Method and system for realizing source looped network protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0049] Link failure recovery discovery node detects that the link failure is restored, and periodically sends automatic protection switching messages to adjacent nodes along the east and west ports to match the service table. If the service table is not matched, it means that the node is non-service access node, no other operations are performed. If the service table is matched and the source node and destination node identifiers of the automatic protection switching message are matched, it means that this node is a service access node, and the service table is updated and the wait is started. A recovery (Wait to Restore, WTR for short) timer.

[0050] After the non-link fault recovery discovery node receives the automatic protection switching message sent by other nodes, it judges whether the node is the destination node of the automatic protection switching message. If it is, it does not forward the message; direction forward this message. Further, match the service table. ...

Embodiment 3

[0055] When the link switching is triggered by the protocol switching command, after receiving the protocol switching command, the receiving node of the protocol switching command will periodically send the automatic protection switching message to the adjacent node along the east and west ports to match the service table. The service table indicates that this node is a non-service access node, and no other operations are performed. If the service table is matched and the identification of the source node and the destination node of the automatic protection switching message is matched, it indicates that this node is a service access node. Then update the business table and decide to switch the protection group.

[0056] After receiving the automatic protection switching message sent by other nodes, the receiving node of the non-protocol switching command judges whether the node is the destination node of the automatic protection switching message. Forward this message. Furth...

specific Embodiment 1

[0064] Such as Figure 3b As shown, a fault occurs between the working link node 2 and node 3.

[0065] The processing methods for nodes along the WEST direction of the automatic protection switching message include:

[0066]Link fault discovery After node 2 detects a link fault, it periodically sends APS messages to adjacent nodes along the WEST direction port on the ring. The APS message indicates that the destination node is node 3, and the source node is node 2, node 2, and node 3. The state of the cross-segment between is the failure state (SF), and the source node and the destination node are matched according to the business table, and no other processing is performed if the match is unsuccessful.

[0067] After the non-link fault detection node 1 receives the APS message sent by node 2, it judges whether this node is the destination node of the automatic protection switching message. For node matching, both the source node and the destination node are in the service ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and system for realizing source looped network protection. The method disclosed by the invention comprises the following steps: a service table of a tunnel protection group is set at a service access node, wherein the service table is used for recording nodes contained in an active link of the tunnel protection group along an output direction of a service flow and the state of each section of the active link; a link fault finding node or a node which receives a switching command in the tunnel protection group sends an automatic protection switching message, other non-automatic protection switching message target nodes in the tunnel protection group transfer the automatic protection switching message along a sending direction of the automatic protection switching message, after a service access node in the tunnel protection group receives the automatic protection switching message, the state of a corresponding section in the service table of the maintained tunnel protection group is updated, and the state of the tunnel protection group is determined and whether link switching is executed or not is determined. The method disclosed by the invention can reduce workload of loop graph configuration and can improve intelligent degree when topology along a network processing route is changed.

Description

technical field [0001] The present invention relates to the field of data communication, and more specifically relates to a method and system for realizing ring network protection. Background technique [0002] Multi-protocol Label Switching (MPLS for short) technology is one of the important technologies in the packet transport network. The survivability of the network is one of the important indicators to measure the network quality of the packet transport network. A variety of network protection and recovery methods have been introduced. The protection modes commonly used in the packet transmission network include linear protection and ring network protection. There are two protection mechanisms for ring network protection, which are Wrapping protection mode and Steering protection mode. The Wrapping protection mode is based on the loopback protection switching of the faulty adjacent node, and the Steering protection mode is based on the service end-to-end protection swi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04J3/08
Inventor 郭平史亮
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products