Multi-ring protection configuration method and system of PTN ring network protection

A configuration method and technology of a configuration system, applied in transmission systems, digital transmission systems, data exchange networks, etc., can solve problems such as increasing the complexity of configuration planning in the early stage and problem location in the later stage, and affecting the large-scale deployment of ring networks, so as to achieve enhanced ease of use. operational effect

Active Publication Date: 2018-11-06
FENGHUO COMM SCI & TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the simple single-ring and double-ring topologies still have certain limitations in actual networking, which is also one of the bottlenecks affecting the large-scale deployment of ring networks
When the service path is long and the topology of the existing network is complex, a service may

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-ring protection configuration method and system of PTN ring network protection
  • Multi-ring protection configuration method and system of PTN ring network protection
  • Multi-ring protection configuration method and system of PTN ring network protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] The LSP path may pass through multiple MPLS-TP shared rings. According to the characteristics of the service path, the LSP is bound to each ring network segment by segment, which can realize the segment-by-segment protection of the LSP path. In order to realize the multi-point fiber cut protection function to the greatest extent, the rings that physically intersect each other can be associated. The rings that may be associated with the same ring include its upstream ring and downstream ring. The embodiment of the present invention mentioned in the draft On the basis of double-ring protection, a multi-ring protection configuration method for PTN ring network protection is provided, including the following steps:

[0054] For each ring of the intersecting ring relationship, add the intersecting ring configuration with corresponding entries. This configuration is a sub-configuration of the overall configuration of the ring. Each configuration includes: intersecting ring KEY...

Embodiment 2

[0057] On the basis of Embodiment 1, after the LSP binds more than three rings, the following steps are also included:

[0058] Perform protection switching on the nodes in the ring. The specific process is as follows:

[0059] At the uplink node of the uplink ring, the LSP enters the uplink at this node, and labels the intersecting ring label corresponding to the "uplink" with the current ring. The switching object is the intersecting ring label group. The switching principle is the single Ring switching principle;

[0060] At the uplink node of the local ring, the LSP pops up the intersecting ring label corresponding to the uplink ring and the local ring at the local node, and after the LSP label exchange, puts the intersecting ring label corresponding to the local ring and the downlink ring; the switching principle is single-ring switching Combination with intersecting ring switching;

[0061] The uplink ring and another intersecting node of the local ring, which is symme...

Embodiment 3

[0066] On the basis of embodiment 2, among the three bound ring KEY values, the local ring KEY value of the LSP with the bound ring relationship is not 0, and the KEY value of the uplink ring and the KEY value of the downlink ring are zero or non-zero according to the actual situation .

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multi-ring protection configuration method and system of PTN ring network protection, and relates to the field of PTN ring network protection. The method comprises the following steps: newly adding an intersecting ring configuration of a corresponding entry to each ring of an intersecting ring relationship, wherein the configuration is a sub-configuration of an overall configuration of the ring, and each configuration comprises: an intersecting ring KEY value, an intersecting node ID and an intersecting ring label group; and when the LSP is bound with more than threerings, configuring three binding ring KEY values for each LSP binding ring: a previous ring KEY value, a present ring KEY value and a latter ring KEY value, the ring KEY value is a global index valueof the ring configuration, a previous ring is a ring by which the LSP passes before entering the present ring, the present ring is the current ring, and the latter ring is a ring that is bound dafterthe LSP goes out from the present ring. By adoption of the multi-ring protection configuration method and system disclosed by the invention, the ring network protection in a complex environment in which the LSP is bound with more than three rings can be achieved.

Description

technical field [0001] The invention relates to the field of PTN ring network protection, in particular to a multi-ring protection configuration method and system for PTN ring network protection. Background technique [0002] With the continuous evolution of the Internet era, network coverage is rapidly expanding, and network bandwidth is also increasing. People are increasingly dependent on the network. Network reliability plays an increasingly critical role in improving user experience. [0003] In the early stage when the network structure was single and the traffic volume was not large, the linear protection of the smallest unit could meet the basic requirements of network reliability, and the need to introduce different types of protection at different levels was not so urgent. With the continuous increase of business volume, considering the layered processing of linear protection, the same type of business of the same path is packaged together for protection switching,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/437
CPCH04L12/437
Inventor 张晶
Owner FENGHUO COMM SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products