Method and device for binding protection ring
A protection ring, the best protection ring technology, applied in the field of communication, can solve the problems of inability to realize the protection tunnel and low protection efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0032] The embodiment of the present invention is applicable to the scenario where protection rings are bound to services in networks such as Packet Transport Network (PTN for short), Wavelength Division Multiplexing (WDM for short), and Synchronous Digital Hierarchy (SDH for short) networks. .
[0033] Figure 1A It is a flowchart of a method for binding a protection ring provided by an embodiment of the present invention. Figure 1B for Figure 1AAn application scenario graph. The executor of this embodiment may be a server in a service operation support system (OperationSupportSystems, OSS for short), an element management system (Element ManagementSystems, EMS for short), or a network management system (NetworkManagementSystems, NMS for short). In this embodiment, the node may be a physical network device, and the tunnel is composed of a logical transceiver module of the physical network device.
[0034] Such as Figure 1A As shown, the method provided in this embodiment...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 