Loop network protection data configuration method and device
A ring network and data configuration technology, applied in the field of communication, can solve the problem of low data configuration efficiency and achieve the effect of improving data configuration efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] Hereinafter, the present invention will be described in detail with reference to the accompanying drawings and in conjunction with embodiments. It should be noted that the embodiments in the present application and the features of the embodiments may be combined with each other in the case of no conflict.
[0030] It should be noted that the terms "first", "second" and the like in the description and claims of the present invention and the above drawings are used to distinguish similar objects, and are not necessarily used to describe a specific sequence or sequence.
[0031] In this embodiment, a ring network protection data configuration method is provided, figure 1 is a flow chart of the data configuration method for ring network protection according to the first embodiment of the present invention, such as figure 1 As shown, the process includes the following steps:
[0032] In step S102, the first node among the plurality of nodes in the ring network obtains conf...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


