Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Protection method and system for multi-point fiber cut in communication network

A communication network and protection system technology, applied in the protection field of multi-point fiber breakage, can solve the problems of high consumption of main control CPU resources, long service switching time, service interruption, etc., and achieve the effect of saving resources and speeding up service switching time.

Active Publication Date: 2021-05-07
FENGHUO COMM SCI & TECH CO LTD +1
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the optical path between two aggregation devices fails, and the optical path between one of the aggregation devices and a core device also fails, the aggregation device becomes an isolated point in the aggregation ring, but in the access ring, Since the access ring and the convergence ring are in different IGP (Interior Gateway Protocol, Interior Gateway Protocol) domains, the business status of all access devices to the convergence device is still normal, and the base station business will still be sent to the convergence device, but The convergence device has now become an isolated point. During service transmission, all service packets can only be discarded because there is no routing exit, which leads to service interruption and the occurrence of multi-point fiber cut scenarios.
[0003] For the above-mentioned multi-point fiber cut scenario, a common solution for various equipment manufacturers is: the control plane of the isolated convergence equipment combines the BGP (Border Gateway Protocol, Border Gateway Protocol) peer (peer) status with the VC (private network flag) state association, the control plane will take the initiative to set the VC state to down (turn off) after the peer is disconnected, thereby triggering the switchover of the access device, but this solution requires the control plane to intervene, and the calculation of the protocol state needs to be costly A large number of main control CPU resources, and because the software perceives the service status, the service switching takes a long time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection method and system for multi-point fiber cut in communication network
  • Protection method and system for multi-point fiber cut in communication network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Terminology Explanation:

[0030] PW redundancy: It belongs to the business protection method. In the VPWS business model, when the main PW is established, a backup PW is established. When the main PW fails, the service is switched to the backup PW. At the same time, a variety of detection methods can be used to realize fast fault detection.

[0031] BFD: It is the abbreviation of Bidirectional Forwarding Detection. It is a network protocol used to detect failures between two forwarding points. It is described in detail in RFC 5880. BFD is a bidirectional forwarding detection mechanism that can provide millisecond-level detection and fast detection of links. By cooperating with upper-layer routing protocols, BFD can realize fast route convergence and ensure service continuity.

[0032] TP-OAM: MPLS-TP OAM, MPLS-TP (Multi-Protocol Label SwitchingTransport Profile, Multi-Protocol Label Switching Transport Application) performs hierarchical management and control on the o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and system for protecting multi-point fiber cuts in a communication network, and relates to the technical field of backhaul networking. The invention sets a monitoring group and a control group on the main aggregation device, and corresponds to the main aggregation device that needs to be monitored. Each link of the monitoring group is added to the monitoring group, and the link status switch corresponding to each link of the monitoring group is added to the control group; when the main aggregation device detects that all links in the monitoring group generate alarms, it turns off all link switches in the control group; The access device detects that the status of the primary PW link is down, which triggers the switchover of the access device. The technical solution of the present application does not require control plane intervention, saves main control CPU resources, and speeds up service switching time.

Description

technical field [0001] The invention relates to the technical field of backhaul networking, in particular to a method and system for protecting multi-point fiber cuts in a communication network. Background technique [0002] The aggregation device is configured as a base station gateway, the access ring is configured with PW (Pseudo-Wire, pseudo-wire) redundancy protection, and the aggregation ring is configured with VPN FRR protection. Handover technology is based on the dual-homing network model. When the optical path between two aggregation devices fails, and the optical path between one of the aggregation devices and a core device also fails, the aggregation device becomes an isolated point in the aggregation ring, but in the access ring, Since the access ring and the convergence ring are in different IGP (Interior Gateway Protocol, Interior Gateway Protocol) domains, the business status of all access devices to the convergence device is still normal, and the base stati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04B10/038H04B10/075
CPCH04B10/038H04B10/075
Inventor 朱哲
Owner FENGHUO COMM SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products