MAD method and device in VCF network
A technology of equipment and network, applied in the field of MAD method and equipment, can solve problems such as limited networking and inflexible networking, and achieve the effect of flexible networking
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0032] The MAD method in the VCF network according to Embodiment 1 of the present application is applied to splitting the CB system into at least two CB systems, and after the execution of the attribution detection process is completed, the specific attribution detection process can be referred to later, and will not be repeated here. The MAD method is an internal MAD method of a VCF network, which may be referred to as iMAD (inside MAD, internal MAD). The specific process of this method is as image 3 shown, including the following steps:
[0033] Step S302, after the CB system is split into at least two CB systems, the CB device receives the first detection message from the master CB device in other CB systems forwarded by the directly connected specific PE device, wherein the first detection message carry the total number of CB devices in the CB system where the master CB device that sent the first detection message is located and the device identifier of the master CB dev...
Embodiment 2
[0069] In the first embodiment, the attribution detection process and the iMAD process are implemented separately, and the attribution detection process is executed first, and the iMAD process is executed after the attribution detection process is completed. In the second embodiment, the ownership detection process is integrated with the iMAD process, so as to achieve the problem of the ownership selection of the PE equipment after the CB system is split into multiple CB systems, and which CB system continues to work and which CB system stops working. MAD problem.
[0070] The specific process after fusion is as follows:
[0071] Steps S602-S606 are the same as the above-mentioned steps S502-S506, and will not be repeated here;
[0072] Step S608, the CB device receives the third detection message or the fourth detection message sent by the directly connected PE device. If the third detection message is received, the CB device connects the CB device to the The VCF physical i...
Embodiment 3
[0077] by Figure 6 The VCF network shown is taken as an example, and the iMAD method in the first embodiment is described in detail.
[0078] exist Figure 6 In the shown VCF network, CB devices CB1-CB3 form a CB system through IRF technology, PE device PE1 is connected to CB1 and CB2, and PE device PE2 is connected to CB1-CB3. When the link between CB1 and CB2 is interrupted, the CB system splits into two CB systems: one is the CB system composed of CB1, and the main CB device of the CB system is CB1; the other is the CB composed of CB2 and CB3 system, the main CB device in the CB system is CB2, and CB3 is the backup CB device. On CB1-CB3, configure the iMAD-enabled command line for the virtual slot number group to which the VCF physical interface connected to PE2 belongs.
[0079] The specific implementation process of iMAD includes:
[0080] CB1 sends a first detection message to PE2. The first detection message carries the total number of CB devices in the CB system w...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
