Unlock instant, AI-driven research and patent intelligence for your innovation.

Packet transmission cross-domain protection method and system

A packet transmission and protection system technology, applied in transmission systems, digital transmission systems, data exchange networks, etc., can solve the problems of violating domain-divided protection of intra-domain links and non-transmission to outside domains, and achieve the effect of coordinated protection switching

Active Publication Date: 2021-12-14
FENGHUO COMM SCI & TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, the existing cross-domain protection method is: after the protection switching (i.e. active-standby switching) occurs in this domain, notify other domains, and other domains will perform corresponding protection switching according to the link after switching in this domain; After protection switching, the AC side is often notified by disconnecting the link of the faulty link, and then the AC side is prompted to perform the corresponding protection switching, which violates the principle of domain-divided protection domain link failure not to be transmitted outside the domain

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Packet transmission cross-domain protection method and system
  • Packet transmission cross-domain protection method and system
  • Packet transmission cross-domain protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] The AC side link status, the network side link status, and the acquisition method of the network side preferred link in the method include: the AC side link status and the network side link status are initially normal, and the network side preferred link status is initially normal. Pre-designated (specified in the same way as prior art).

Embodiment 2

[0039] The method also includes the following steps: when the interconnection node monitors that the AC side link fails, modify the AC side link state of the node to an abnormal state. When the interconnection node detects that the link on the network side is faulty, it changes the link status of the node on the network side to an abnormal state, and correspondingly modifies the preferred link on the network side. Because the link on the network side fails, it means that the previous preferred link on the network side Therefore, the preferred link on the network side needs to be changed to the network side link with the highest priority that can communicate.

Embodiment 3

[0041] In this method, all interconnected nodes of the same MC-LAG elect the protection switching triplet with the highest priority, including the following steps:

[0042] S101: Determine whether at least one of the following two situations occurs:

[0043] Scenario 1: The AC-side link status of all interconnected nodes in the same MC-LAG is abnormal;

[0044] However, the network-side link states of all interconnected nodes of the same MC-LAG (faulty interconnected nodes are excluded) are in an abnormal state;

[0045]If yes, it proves that all links are unable to communicate, at this time, the error reporting ends directly, otherwise, go to S102.

[0046] S102: Among the protection switching triplets of the interconnected nodes whose link status on the AC side and the link status on the network side are both normal, select the protection switching triplet with the highest priority of the preferred link on the network side, and this group is The protection switching triple...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a packet transmission cross-domain protection method and system, and relates to the field of packet transmission network protection. The steps of the method include: on each interconnection node of the MC-LAG, associating the AC side link state, the network side link state, and the network side preferred link of the interconnection node to form a protection switching triplet; The side link status and the network side link status include normal status and abnormal status; after all the interconnected nodes of the same MC‑LAG elect the protection switching triplet with the highest priority, they will switch the triplet according to the protection switching triplet with the highest priority The corresponding interconnection nodes perform protection switching on the AC side and the network side. The present invention can realize the cross-domain protection switching of packet transmission under the principle that link faults in the sub-domain protection domain are not transmitted outside the domain.

Description

technical field [0001] The invention relates to the field of packet transmission network protection, in particular to a method and system for cross-domain protection of packet transmission. Background technique [0002] The packet transmission network adopts layered and domain-based networking to achieve flexible expansion. Different subnets protect their respective services, and the dual-node interconnection protection technology can be used between different subnets to achieve high cross-domain (layered and domain) transmission. Reliability requirements; that is, the two domains on the AC side and the network side are interconnected through two nodes: [0003] MC-LAG (Multi-Chassis LinkAggregation Group, inter-device link aggregation working group) dual-homing protection technology is often used in the Ethernet egress scenario on the AC side (client access side) (that is, two interconnected nodes form a group of link aggregation work Pseudowire redundancy protection can b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24
CPCH04L41/0668
Inventor 汪怀坤
Owner FENGHUO COMM SCI & TECH CO LTD