Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for binding protection ring

A protection ring, the best protection ring technology, applied in the field of communication, can solve the problems of inability to realize the protection tunnel and low protection efficiency

Active Publication Date: 2016-03-30
HUAWEI TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the existing MPLS protection ring binding method, the nodes on the tunnel are divided into access layer, convergence layer and core layer, and the MPLS protection ring of the tunnel is determined respectively at the access layer, convergence layer and core layer. After the binding relationship is established for the determined MPLS protection ring, there are many nodes in the tunnel that have not established a binding relationship with the MPLS protection ring, and the maximum protection of the tunnel cannot be achieved, resulting in low protection efficiency of the MPLS ring network protection scheme.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for binding protection ring
  • Method and device for binding protection ring
  • Method and device for binding protection ring

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The embodiment of the present invention is applicable to the scenario where protection rings are bound to services in networks such as Packet Transport Network (PTN for short), Wavelength Division Multiplexing (WDM for short), and Synchronous Digital Hierarchy (SDH for short) networks. .

[0033] Figure 1A It is a flowchart of a method for binding a protection ring provided by an embodiment of the present invention. Figure 1B for Figure 1AAn application scenario graph. The executor of this embodiment may be a server in a service operation support system (OperationSupportSystems, OSS for short), an element management system (Element ManagementSystems, EMS for short), or a network management system (NetworkManagementSystems, NMS for short). In this embodiment, the node may be a physical network device, and the tunnel is composed of a logical transceiver module of the physical network device.

[0034] Such as Figure 1A As shown, the method provided in this embodiment...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and device for binding a protection ring. The method includes: obtaining each node passed by the tunnel and the nodes passed by each protection ring; determining a bindable ring having at least two intersection points with the tunnel in all protection rings; starting from the head node of the tunnel along the direction of the tunnel Find the first ring-up point on the tunnel, determine the best protection ring where the first ring-up point is located among all bindable rings including the first ring-up point, and find the first ring-down point on the tunnel , and then start from the first down-ring point to find the second up-ring point on the tunnel, determine the best protection ring where the second up-ring point is located among all bindable rings of the second up-ring point, and find The second down-ring point on the tunnel, and so on, until the tail node of the tunnel is found; bind the best protection ring where each up-ring point is located with the tunnel. The number of nodes on the tunnel that are not in the best protection ring is reduced, and the purpose of maximizing the protection of nodes on the tunnel is realized.

Description

technical field [0001] The present invention relates to communication technology, in particular to a method and device for binding protection rings. Background technique [0002] In the transmission network, a Label Switched Path (LSP for short) linear protection scheme is usually adopted to realize service protection. If the working path of the access layer fails, it will cause a switchover of the entire network. If both the working path and the protection path have services, the service will be interrupted. That is, the entire network is switched over in the case of a single-point failure, and the protection fails in the case of a multi-point failure. In addition, every time a tunnel is configured, the corresponding protection channel and protection group need to be configured, which is cumbersome to configure. [0003] Aiming at the problem of linear protection, a multiprotocol label switching (MultiprotocolLabelSwitching, MPLS for short) ring network protection scheme ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/703H04L12/723H04L12/46H04L45/28H04L45/50
Inventor 关欣李莎莎熊凯旭
Owner HUAWEI TECH CO LTD