Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for generating a shared link risk group

A technology for sharing links and generating devices, which is applied in the field of generating methods and devices for shared link risk groups, and can solve problems such as unacceptable maintenance workload

Active Publication Date: 2020-05-29
ZTE CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the manual configuration of SRLG is still used in the IP+optical synergy scenario, the maintenance workload is unacceptable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for generating a shared link risk group
  • A method and device for generating a shared link risk group
  • A method and device for generating a shared link risk group

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0142] Figure 8 It is the topology diagram of the first embodiment of the method for generating the shared link risk group of the present invention, as shown in Figure 8 As shown, first, calculate the SRLG values ​​of six client layer links, namely Link1(A-C), Link2(A-F), Link3(A-D), Link4(C-F), Link5(D-C), Link6(D-F); assuming that the client layer requires The protection attributes of each link are as follows, Link1 (A-C) is unprotected, Link2 (A-F) is unprotected, Link3 (A-D) is recoverable, Link4 (C-F) is protected, Link5 (D-C) is recoverable, and Link6 (D-F) is recoverable , the protection attribute of the corresponding service layer path is consistent with the protection attribute of the client layer link. In the first embodiment, if Figure 9 As shown, it is assumed that the calculated paths of the service layer corresponding to the client layer are Link1 (A-C): P1 (A-B-C), Link2 (A-F): P2 (A-E-F), Link3 (A-D): P3 (A-D), Link4 (C-F): P4[(C-F),(C-B-A-D-E-F)], Link5(...

no. 2 example

[0159] After implementing the first embodiment above, if Figure 11 As shown in , assuming that C-F, C-E, and B-E links fail at the same time, after these three links fail, the path of P4 will undergo protection switching, and P5 will recover. Assume that the restored path is P5 (D-E-A-B-C), as shown in Figure 12 As shown, it is a topology diagram of the service layer path calculation results in the second embodiment of the method for generating a shared link risk group in the present invention. According to the method for generating the shared risk link group of the present invention, the obtained service layer paths are analyzed, and only one path changes in the SRLG values ​​of the six client layer links, such as Figure 13 as shown, Figure 13 It is a topology diagram of client layer links and their SRLG values ​​in the second embodiment of the method for generating a shared link risk group in the present invention. specifically,

[0160] First, receive a set of new pa...

no. 3 example

[0168] After implementing the second embodiment above, if Figure 14 As shown, assuming that C-F, C-E, B-E failures are repaired, and D-E fails, Figure 14 In the third embodiment, the faults of C-F, C-E, and B-E are repaired, and the topology and path information when D-E fails. After the D-E link fails, the path of P4 will undergo protection switching, and P5 and P6 will recover. Assume that the restored paths are P5 (D-A-B-C) and P6 (D-A-B-E-F), as Figure 15 as shown, Figure 15 It is a topology diagram of the path calculation result of the service layer in the third embodiment of the method for generating the shared link risk group of the present invention.

[0169] According to the generation method of the shared risk link group of the present invention, the obtained service layer path is analyzed, and the SRLG values ​​of the six client layer links only have two links to change, as Figure 16 as shown, Figure 16 It is a topology diagram of client layer links and th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for generating a shared link risk group, including: determining the path information to be analyzed according to the currently calculated first path information of the service layer and the existing second path information, and determining the Initialize the SRLG value of the paths to be analyzed; check whether each path to be analyzed in the path to be analyzed information overlaps, and update the SRLG values ​​of the overlapped paths to be analyzed according to the SRLG values ​​of the overlapped paths to be analyzed. Through the technical scheme provided by the invention, the configuration of the SRLG value is realized automatically and simply. The generation method of the shared link risk group provided by the present invention obtains the virtual SRLG of the client layer after analyzing the link of the service layer path, which reduces the number of client layer SRLGs and the change of the client layer network SRLG to a certain extent; and makes the client The acquisition of layer network topology information is more accurate and stable.

Description

technical field [0001] The present invention relates to but not limited to communication technology, especially a method and device for generating a shared link risk group. Background technique [0002] According to statistical forecasts, the growth rate of IP traffic has tripled in 18 months, which has exceeded the speed of Moore's Law, which is called the "post-Moore era". The increase in traffic is mainly driven by bandwidth services such as video. For example, China Telecom's 163 backbone network needs to expand the network every year due to the rapid growth of traffic. Traditional expansion methods are mainly achieved by adding network nodes and network layers, which will lead to a surge in investment costs (CAPEX) and operating costs (OPEX). In the case of slow revenue growth, operators' profit margins will be increasingly reduced. [0003] In order to obtain a reasonable bandwidth cost, the IP backbone network architecture must evolve towards a flat and fully inter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04B10/032H04L12/703H04L12/707H04L12/751H04L45/02H04L45/24H04L45/28
CPCH04B10/032H04L45/02H04L45/24H04L45/28H04L45/22H04J14/0268H04J14/0269H04L45/123H04L45/42
Inventor 钱佳李宏飚
Owner ZTE CORP