Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-ring protection configuration method and system for ptn ring network protection

A configuration method and a configuration system technology, applied in transmission systems, digital transmission systems, data exchange networks, etc., can solve problems such as increasing the complexity of early configuration planning and later problem location, affecting large-scale deployment of ring networks, and achieving enhanced ease of use. operational effect

Active Publication Date: 2020-10-09
FENGHUO COMM SCI & TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the simple single-ring and double-ring topologies still have certain limitations in actual networking, which is also one of the bottlenecks affecting the large-scale deployment of ring networks
When the service path is long and the topology of the existing network is complex, a service may pass through three or more rings. At this time, the simple single-ring and dual-ring Splitting the topology into several single-ring and double-ring combinations also increases the complexity of configuration planning in the early stage and problem location in the later stage to a certain extent.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-ring protection configuration method and system for ptn ring network protection
  • Multi-ring protection configuration method and system for ptn ring network protection
  • Multi-ring protection configuration method and system for ptn ring network protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] The LSP path may pass through multiple MPLS-TP shared rings. According to the characteristics of the service path, the LSP is bound to each ring network segment by segment, which can realize the segment-by-segment protection of the LSP path. In order to realize the multi-point fiber cut protection function to the greatest extent, the rings that physically intersect each other can be associated. The rings that may be associated with the same ring include its upstream ring and downstream ring. The embodiment of the present invention mentioned in the draft On the basis of double-ring protection, a multi-ring protection configuration method for PTN ring network protection is provided, including the following steps:

[0054] For each ring of the intersecting ring relationship, add the intersecting ring configuration with corresponding entries. This configuration is a sub-configuration of the overall configuration of the ring. Each configuration includes: intersecting ring KEY...

Embodiment 2

[0057] On the basis of Embodiment 1, after the LSP binds more than three rings, the following steps are also included:

[0058] Perform protection switching on the nodes in the ring. The specific process is as follows:

[0059] At the uplink node of the uplink ring, the LSP enters the uplink at this node, and labels the intersecting ring label corresponding to the "uplink" with the current ring. The switching object is the intersecting ring label group. The switching principle is the single Ring switching principle;

[0060] At the uplink node of the local ring, the LSP pops up the intersecting ring label corresponding to the uplink ring and the local ring at the local node, and after the LSP label exchange, puts the intersecting ring label corresponding to the local ring and the downlink ring; the switching principle is single-ring switching Combination with intersecting ring switching;

[0061] The uplink ring and another intersecting node of the local ring, which is symme...

Embodiment 3

[0066] On the basis of embodiment 2, among the three bound ring KEY values, the local ring KEY value of the LSP with the bound ring relationship is not 0, and the KEY value of the uplink ring and the KEY value of the downlink ring are zero or non-zero according to the actual situation .

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a multi-ring protection configuration method and system for PTN ring network protection, and relates to the field of PTN ring network protection. The method includes the following steps: adding an intersecting ring configuration with a corresponding entry in each ring of the intersecting ring relationship, the configuration is a sub-configuration of the overall configuration of the ring, and each configuration includes: an intersecting ring KEY value, an intersecting node ID, Intersecting ring label group; when an LSP is bound to more than three rings, configure three binding ring KEY values ​​for each LSP binding ring: the KEY value of the uplink ring, the KEY value of the local ring, and the KEY value of the downlink ring. A global index value configured. The uplink is the ring that the LSP passed before entering the local ring, the local ring is the current ring, and the downlink is the ring that the LSP continues to bind to after leaving the local ring. The invention can realize ring network protection in the complicated scene where LSP is bound with more than three rings.

Description

technical field [0001] The invention relates to the field of PTN ring network protection, in particular to a multi-ring protection configuration method and system for PTN ring network protection. Background technique [0002] With the continuous evolution of the Internet era, network coverage is rapidly expanding, and network bandwidth is also increasing. People are increasingly dependent on the network. Network reliability plays an increasingly critical role in improving user experience. [0003] In the early stage when the network structure was single and the traffic volume was not large, the linear protection of the smallest unit could meet the basic requirements of network reliability, and the need to introduce different types of protection at different levels was not so urgent. With the continuous increase of business volume, considering the layered processing of linear protection, the same type of business of the same path is packaged together for protection switching,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/437
CPCH04L12/437
Inventor 张晶
Owner FENGHUO COMM SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products