Multipoint fiber breaking protection method and system in communication network

A communication network and protection system technology, applied in the protection field of multi-point fiber breakage, can solve the problems of long service switching time, large consumption of main control CPU resources, service interruption, etc., to save main control CPU resources and speed up service switching time. Effect

Active Publication Date: 2020-09-18
FENGHUO COMM SCI & TECH CO LTD +1
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the optical path between two aggregation devices fails, and the optical path between one of the aggregation devices and a core device also fails, the aggregation device becomes an isolated point in the aggregation ring, but in the access ring, Since the access ring and the convergence ring are in different IGP (Interior Gateway Protocol, Interior Gateway Protocol) domains, the business status of all access devices to the convergence device is still normal, and the base station business will still be sent to the convergence device, but The convergence device has now become an isolated point. During service transmission, all service packets can only be discarded because there is no routing exit, which leads to service interruption and the occurrence of multi-point fiber cut scenarios.
[0003] For the above-mentioned multi-point fiber cut scenario, a common solution for various equipment manufacturers is: the control plane of the isolated convergence equipment combines the BGP (Border Gateway Protocol, Border Gateway Protocol) peer (peer) status with the VC (private network flag) state association, the control plane will take the initiative to set the VC state to down (turn off) after the peer is disconnected, thereby triggering the switchover of the access device, but this solution requires the control plane to intervene, and the calculation of the protocol state needs to be costly A large number of main control CPU resources, and because the software perceives the service status, the service switching takes a long time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multipoint fiber breaking protection method and system in communication network
  • Multipoint fiber breaking protection method and system in communication network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Terminology Explanation:

[0030] PW redundancy: It belongs to the business protection method. In the VPWS business model, when the main PW is established, a backup PW is established. When the main PW fails, the service is switched to the backup PW. At the same time, a variety of detection methods can be used to realize fast fault detection.

[0031] BFD: It is the abbreviation of Bidirectional Forwarding Detection. It is a network protocol used to detect failures between two forwarding points. It is described in detail in RFC 5880. BFD is a bidirectional forwarding detection mechanism that can provide millisecond-level detection and fast detection of links. By cooperating with upper-layer routing protocols, BFD can realize fast route convergence and ensure service continuity.

[0032] TP-OAM: MPLS-TP OAM, MPLS-TP (Multi-Protocol Label SwitchingTransport Profile, Multi-Protocol Label Switching Transport Application) performs hierarchical management and control on the o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multipoint fiber breaking protection method and system in a communication network, and relates to the technical field of backhaul networking, and the method comprises the steps: setting a monitoring group and a control group on main convergence equipment, adding all links corresponding to the main convergence equipment needing to be monitored into the monitoring group, and adding link state switches corresponding to all links of the monitoring group into the control group; when the main convergence equipment monitors that all links in the monitoring group give alarms, turning off all link switches in the control group; and triggering the switching of the access equipment when the access equipment monitors that the state of a main PW link is off. According to thetechnical scheme, control plane intervention is not needed, main control CPU resources are saved, and the service switching time is shortened.

Description

technical field [0001] The invention relates to the technical field of backhaul networking, in particular to a method and system for protecting multi-point fiber cuts in a communication network. Background technique [0002] The aggregation device is configured as a base station gateway, the access ring is configured with PW (Pseudo-Wire, pseudo-wire) redundancy protection, and the aggregation ring is configured with VPN FRR protection. Handover technology is based on the dual-homing network model. When the optical path between two aggregation devices fails, and the optical path between one of the aggregation devices and a core device also fails, the aggregation device becomes an isolated point in the aggregation ring, but in the access ring, Since the access ring and the convergence ring are in different IGP (Interior Gateway Protocol, Interior Gateway Protocol) domains, the business status of all access devices to the convergence device is still normal, and the base stati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04B10/038H04B10/075
CPCH04B10/038H04B10/075
Inventor 朱哲
Owner FENGHUO COMM SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products