CN1265258A - Protection switching trigger generation - Google Patents

Protection switching trigger generation Download PDF

Info

Publication number
CN1265258A
CN1265258A CN 97182347 CN97182347A CN1265258A CN 1265258 A CN1265258 A CN 1265258A CN 97182347 CN97182347 CN 97182347 CN 97182347 A CN97182347 A CN 97182347A CN 1265258 A CN1265258 A CN 1265258A
Authority
CN
China
Prior art keywords
node
bypass
territory
path
alarm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 97182347
Other languages
Chinese (zh)
Other versions
CN1157986C (en
Inventor
K·阿马德
Y·叶
D·W·马丁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NORTHERN ELECTRIC COMMUNICATION CO Ltd
Nortel Networks Ltd
Original Assignee
NORTHERN ELECTRIC COMMUNICATION CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NORTHERN ELECTRIC COMMUNICATION CO Ltd filed Critical NORTHERN ELECTRIC COMMUNICATION CO Ltd
Priority to CNB971823472A priority Critical patent/CN1157986C/en
Publication of CN1265258A publication Critical patent/CN1265258A/en
Application granted granted Critical
Publication of CN1157986C publication Critical patent/CN1157986C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A packet based telecommunication system, such as ATM, comprises a main data path and at least one bypass path, for bypassing a portion of the data path, the portion and the respective bypass defiing a protection domain, the system comprising nodes for each of the domains, for monitoring respective domains and for issueing alarms in the form of packets, to other nodes downstream, with a domain identifier indicating the respective domain in which the alarm originated. At a gien one of the nodes an alarm issued from a node upstream of the given node and a corresponding identifier, are detected. At the given node it is determined whether to trigger a rerouting of the data along one of the bypass paths which bypasses the domain monitored by the given node, on the basis of the detected domain identifier. Using the idntifier, downstream nodes can determine more easily whether the alarm is cased by a domain which has a bypass path triggered by another node upstream. Thus the problem of unnessary triggering, can be overcome without the considerable additional complexity, cost, and speed penalty of having nodes which must extract the alarm, modify it and send it on.

Description

The protection transition trigger produces
Technical field of the present invention
The present invention relates in packet-based telecommunication system trigger data reselect the method for route, in this system the bypass fault method, this system and be used for the node of this system and be used for this method and the software of this node or system.
Technical background of the present invention
Explained that as WP3/13 report COM13-R7 (in March, 1997) appendix 5 " structure of atm network vitality and principle " network survivability can be divided into the category of two broads: protection and recovery at ITU.Recovery comprises having and distributes control but do not use the reconfiguring of bypass resource, centralized control and the self-healing of complete special use.The present invention relates to protection, for the speed of service, protection has distributed control structure and special-purpose bypass path.
The protection conversion relates to the interruption of minimum data traffic amount, and cost is expensively to provide the dedicated path with free bandwidth so that data business volume is transformed into free path where necessary immediately.When the increase in demand of bandwidth and data transmission credibility, when being for example to break down, a constraint that becomes important day by day detects the time-delay that need be transformed into trigger protection.
In addition, the protection conversion can appear at the different layers of network hierarchy series.Coordination between each layer is necessary.In addition; because connection is to finish by long distance; so use for speed that increases and resources effective; particularly at the lower level of network hierarchy series, the time-delay that triggering is sent to the information source that the protection conversion takes place is meaned the protection conversion of having used segmentation from the monitor of destination.
Monitoring under the situation of a plurality of segmentations to have the descending monitor of necessary transmission alarm shows signal (AIS) caution and recognized fault, so as the result of descending fault propagation for the first time, descending monitor does not need to produce its oneself alarm.
Although following description will utilize the ATM net to represent principle of the present invention, principle clearly of the present invention for example has the applicability of broad or the connectionless network such as I.P. is carried out suitable modification frame relay.
In US 5 461 607 (Miyagi etc.), represented when detecting fault insertion at ATM layer ais cell.Represented in US 5 343 462 (Sekihata etc.) how failure identification upwards upwards passes through the ATM Es-region propagations to data terminal equipment by the network hierarchy series layer from physical layer and transport layer.Handle the alarm of block form rather than lower layer data and carry out bypass making to go up to be connected to the basis and arrange bypass path to become possibility at the layer of more refinement (granular) at packet layer, and all data on must bypass link.This means that providing of these paths will be more effective and flexible, for example can distinguish and distribute idle bypass path being connected of special use to higher-priority.Discharge its bypass path and only clamp on up to other traffic carrying capacity than the connection of low priority or insensitive relatively connection.Packet layer should keep causing alarm that bypass triggers with avoid destroying alarm along grade series upwards transmit but never to multiplexing more multidata below transmission.
Among the ITU meeting works Q6/13 D47 of 16-20 day in June, 1997 Italy Turino the problem that occurs the unnecessary protection conversion along the ATM VP that a plurality of protected segmentations are provided has been described.Represented to detect the example of ais cell in the more than one stay of two nights.The stay of two nights can not determine that from AIS fault is in its protection segmentation, still before its protection segmentation.Before trigger protection, if exist any message conversation to determine this answer, lose synchronously that (hole off) also do not bypass fault by the protection path to wait for and to confirm in previous segmentation with if perhaps carry out, then time-delay will be violated and be protected the requirement of changing fast.
In June, 1997 16-20 day Turino ITU meeting works Q6/13 D49 in represented a solution to this problem.When being out of order, an ais cell is inserted into and is sent to the terminal of connection.A bit in the last filler cell of the segmentation of breaking down.The stay of two nights that comprises the territory of fault triggers the protection that is transformed into the bypass fault.Other stay of two nights along this connection continues to transmit ais cell, but knows if they need not trigger their protection conversion when detecting filling bit in the ais cell.
Among the works D48 of the ITU meeting of mentioning, provide the nested type protection scheme in the above.Cell is preserved nesting level by writing down it by what information sources or the stay of two nights, triggers its protection so that the correct stay of two nights is achieved one's goal, the stay of two nights of this stay of two nights or nested type protection scheme innermost layer, or any other the stay of two nights that covers faulty component.
From the Q6/13 ITU meeting works D50 of 16-20 day in June Italy Turino, learn, in the fault type identifier byte of the information field of e-t-e ais cell, revise bit to realize the record of nesting level state.
A problem of all these known arrangement need to be each segmentation to have the ability to extract, revise and insert once more.This causes higher complexity and expense, and may delayed data the handling up of traffic carrying capacity, especially when traffic carrying capacity is not interrupted.
At US 5,212, in 475, represented a kind of synchronous digital network, wherein when recognizing fault, produce a kind of alarm inhibit signal in physical layer.Failure location is returned and is reported to the central site network management system.Descending transmission inhibit signal is to forbid descending alarm generator.Revise this signal by inserting fail address information.The downstream signal distributor is discerned this address and is utilized it to determine whether that a Trouble Report message sends the central site network management system back to.If in the segmentation of address before previous distributor, they do not do these.This means that alarm inhibit signal do not forbid the real alarm from other descending fault.But this scheme does not provide protection conversion enough fast concerning many application.In addition, need each segmentation to extract and revise inhibit signal, cause the complexity that increases, particularly to High Speed System.The document is not mentioned the protection at packet layer.
Technical scheme of the present invention
The purpose of this invention is to provide improved method and apparatus.
According to an aspect of the present invention; provide a kind of in packet-based telecommunication system trigger data reselect the method for route; this system comprises a primary data path and at least one bypass path; bypass path is used for bypass part data path; this part and its bypass separately limit a protected field; this system comprises the node in each territory; this node is used to monitor each territory and sends the alarm of block form and the relam identifier in each territory that the expression generation is alarmed to other descendant node that the method comprising the steps of:
At one of them given node, detect the alarm and the corresponding identifier that send from the upstream node of given node;
At given node,, determine whether that trigger data reselects route, the territory that this bypass path bypass is monitored by given node along bypass path wherein according to the relam identifier that detects.
Use the advantage of identifier to be that descendant node can determine more easily that whether alarm is caused by the territory of the bypass path with another upstream node triggering.Therefore can overcome the problem of above-mentioned unnecessary triggering, can must not extract alarm, revise alarm and send the deterioration that alarm increases too much complexity, expense and speed owing to node.In addition, use identifier to provide unified solution for simple or nested type protection conversion.Another advantage is can use more accurate localization information for other purpose.
Useful is by alarm is inserted in the data that will launch alarm to be sent to descendant node.This is not because need to use private network can reduce expense and the transmission speed that is increased to other node.
Useful is, this system is connection-oriented, does not need to set up new connection and just can finish and reselect route.This makes to finish under less interruption data conditions reselects route, because exist by setting up the new a large amount of time-delay that related signaling causes that connects.
Useful is, system comprises nested territory, and this method comprises the internal layer of determining at nested domain, and main path and bypass path break down and determine to trigger the step of the bypass in an outer territory.This can be easy to if use identifier, because revise in the scheme of bit in prior art, the information destination node in outer territory can't be distinguished the alarm from two paths in internal layer territory.
Given node preferably includes representative domain can and determine whether the step that the priority according to storage triggers in addition by the stored data base of the priority of more than one bypass path bypass.This make more effective with automatically handle nested or overlapping bypass path.Can keep the speed that triggers.Can imagine, can be to identifier coding so that identifier is carried out certain algorithm to be triggered determining whether, and do not need database with reference to storage.
Useful is, given node is the information destination node in the bypass path terminal, and this bypass path can be triggered so that the territory that bypass is monitored by given node by given node.
According to another aspect of the present invention; provide a kind of in packet-based telecommunication system the method for bypass fault; this system comprises a primary data path and at least one bypass path; bypass path is used for bypass part data path; this part and its bypass separately limit a protected field; this system comprises the node in each territory; this node is used to monitor each territory and sends the alarm of block form and the relam identifier in each territory that the expression generation is alarmed to other descendant node that the method comprising the steps of:
At one of them given node, detect the alarm and the corresponding identifier that send from the upstream node of given node;
At given node,, determine whether that trigger data reselects route, the territory that this bypass path bypass is monitored by given node along bypass path wherein according to the relam identifier that detects; With
Reselect route according to this trigger data along given bypass path.
According to another aspect of the present invention; a kind of software on computer-readable media is provided; this software is used for being implemented in the method that packet-based telecommunication system trigger data is reselected route; this system comprises a primary data path and at least one bypass path; bypass path is used for bypass part data path; this part and its bypass separately limit a protected field; this system comprises the node in each territory; this node is used to monitor each territory and sends the alarm of block form and the relam identifier in each territory that the expression generation is alarmed to other descendant node that the method comprising the steps of:
At one of them given node, detect the alarm and the corresponding identifier that send from the upstream node of given node;
At given node,, determine whether that trigger data reselects route, the territory that this bypass path bypass is monitored by given node along bypass path wherein according to the relam identifier that detects.
According to another aspect of the present invention; node in a kind of packet-based telecommunication system is provided; this system comprises a primary data path and at least one bypass path; bypass path is used for bypass part data path; this part and its bypass separately limit a protected field; this system comprises the node in each territory, and this node is used to monitor each territory and sends the alarm of block form and the relam identifier in each territory that the expression generation is alarmed to other descendant node that this node comprises:
At one of them given node, detection is from the alarm of the upstream node transmission of given node and the device of corresponding identifier;
At given node,, determine whether that trigger data reselects the device of route, the territory that this bypass path bypass is monitored by given node along bypass path wherein according to the relam identifier that detects.
According to another aspect of the present invention; a kind of packet-based telecommunication system is provided; this system comprises a primary data path and at least one bypass path; bypass path is used for bypass part data path; this part and its bypass separately limit a protected field; this system comprises the node in each territory, and this node is used to monitor each territory and sends the alarm of block form and the relam identifier in each territory that the expression generation is alarmed to other descendant node that this system comprises:
At one of them given node, detection is from the alarm of the upstream node transmission of given node and the device of corresponding identifier;
At given node,, determine whether that trigger data reselects the device of route, the territory that this bypass path bypass is monitored by given node along bypass path wherein according to the relam identifier that detects.
It will be apparent to those skilled in the art that and to make up preferable feature, and can make up preferable feature and any aspect of the present invention.
In order to represent how to realize the present invention by example, embodiment is described in more detail now with reference to accompanying drawing.
The Short Description of accompanying drawing
Fig. 1 and Fig. 2 have represented data transmission system with the form of signal;
Fig. 3 has represented each layer of the network hierarchy series of ATM net;
Fig. 4 has represented the embodiment of node of the present invention with the form of signal;
Fig. 5 has represented the trigger action of Fig. 4 node with the form of signal;
Fig. 6 has represented node alarm detection/triggering function with the form of signal;
Fig. 7 has represented the node administration function with the form of signal; With
Fig. 8 has represented prior art triggering for generating scheme with the form of signal.
Describe in detail
Fig. 1 and Fig. 2 have represented to use network of the present invention.In these embodiments, send alarm with the form of traditional ais cell.In order to begin protection conversion, the fault location field press the identifier of one or more segmentations of protected field grouping and is advised existing AIS principle described in the I610 so that can use at ITU-T as identification.With reference to the document, the document describe in detail ais cell form, how to use ais cell and fault management, performance management and system management to use how many kinds of OAM (operation and management) cell.
The identification of in ATM protection conversion, being discussed that problem is a protected field in trigger theory.It should be noted that ais cell has the fault location identifier field (use of fault location identifier field is optional in I.610 at present) that has defined.
The operational failure location field when producing ais cell, for detection failure, should be filled corresponding location ID according to definition I.610 so that among the embodiment in identification protecting territory in cell in normal ais cell.To check the location field of the ais cell of importing so that determine by the value of relatively locating ID and regulation whether AIS produces in this territory in the information destination node of each protected field terminal.
This trigger theory meets I.610 definition, and any information that is provided by ais cell is not provided.Localization message even can be used for clearly representing the fault location of maintenance service.
This trigger theory need make each information destination node know that it comprises the protected field of node ID and protection class series (for the nested type protection).When setting up protected field, under any circumstance network management system can both obtain this information.
The principle that is different from prior art is by using the fault location field (DLF) of ais cell, so that the protection transition trigger can be worked in all protection schemes in an identical manner.
Related Overall Steps is as follows:
When step 1. disposed or reconfigures protected field when telecommunication network management device (TNM), TNM used the PDE form so that in the local data base definition protected field and the protection class series of each node.
Step 2. the location ID of interruption occurs according to I.610 definition and is filled in the fault location field (DLF) of AIS when producing ais cell.
When step 3. arrived information destination node when ais cell, ais cell was without any being sent to next descendant node with changing, also checked the DLF value of ais cell whether to be arranged in the territory of this information destination node, if, at which layer.
If step 4. DSL check conclusion is for being, then node considers that caused time-delay will trigger the corresponding protection conversion and do not need with reference to TMN.
After step 5. conversion, TMN is ready, and TMN revises the altered mode field of PDE of each node.
Fig. 1 simply protects conversion plan
Non-nested protection conversion configurations shown in Figure 1 is called the simple protective conversion.Represented node A to K, the segmentation between the defined node.
A, B, C, D, E, F, G comprise work entity;
A, H, I, J, K, G comprise the protection entity;
A is the source point of work and protected field; With
G is the destination point of work and protected field.
When the TMN configuration network, TMN should define each protected field.TMN is preferably in each information destination node and keeps a database, is positioned at each network element of corresponding information destination node protected field in database with the formal description of protected data entity (PDE).PDE comprises the information of location ID, territory INFO, state (ready or interruption), node-classification (information source/stay of two nights/centre) and other needs.The location of the node that all relate to, position (work/protection) and state (ready/as to interrupt) are distributed to destination point G.
When ais cell arrived destination point G, ais cell was without any being sent to next descendant node with changing, and whether the DLF value of also checking ais cell is corresponding to one of them of identifier B, C, D, E, F.If, with the protection conversion that triggers from B-C-D-E-F to H-I-J-K.
The back will discuss the structure and the operation of information destination node in more detail.
Fig. 2, nested type protection conversion plan
A, B, C, D, E, F, G//A, B, C, D, L, M, E, F, G comprise work entity 1;
A, H, I, J, K, G comprise protection entity 1;
A is the source point of work and protected field;
G is the destination point of work and protected field;
C, D, E comprise work entity 2;
C, L, M, E comprise protection entity 2;
C is the source point of work and protected field;
E is the destination point of work and protected field.
When TMN disposes this protected field grade; all relate to location, position (work/protection), grade (protective layer) and the state (ready/as to interrupt) of the node of outer layer protection conversion will distribute to destination point G, and all relate to location, position, grade and the state of the node of internal layer protection conversion will distribute to destination point E.
When ais cell arrived destination point E, ais cell without any being sent to next descendant node with changing, and the DLF value of also checking ais cell is one of them identifier G.If, with the protection conversion that triggers from D to L-M.
When ais cell arrived destination point G, ais cell was without any being sent to next descendant node with changing, and whether the DLF value of also checking ais cell is corresponding to one of them of identifier B, C, E, F.If will trigger from B-...-F is to H-... the protection conversion of-K.Because node G has the information about the protection class of hope, thus when location ID when internal layer territory (D), node G does not start the protection conversion.
As another kind of ability, if locator value is L, M, then TMN can check the state of D, determines whether to trigger skin or internal layer protection conversion then.
Fig. 3, the data business volume path
Fig. 3 with the path of the formal specification data business volume of signal by the layer grade in each node of network.Since first terminal 31, before arriving information source node 32 through physical layer, the data business volume path is through each ARM layer.This path may be through defining the intermediate node of link with information source node 32.In information source node, this path is divided into each ATM cell through the ATM layer at atm-layer traffic.This means at this point and can monitor that each connects.In addition, this means and to insert cell.Fig. 3 represents to have inserted an ais cell, as the result of fault location.
This data path proceeds to information destination node 61 in a similar fashion.Data path passes through the ATM layer once more, can visit each cell and each connection at the ATM layer.
Bypass path (not shown among Fig. 3) will arrive the ATM layer of information destination node 61 from the ATM layer of information source node 32 through physical layer separately.As mentioned above, by at ATM layer or packet layer, rather than provide bypass in physical layer, the providing to become of bypass path is more prone to.
Fig. 4, the nodal function general introduction
Fig. 4 represents the main composition of information destination node with the form of signal.Alarm detection and triggering function 61 by 62 controls of node administration function are provided.This management function controls also that function is inserted in alarm and the bypass translation function 64 in translation data path on connection basis.Clearly alarm insertion function is very necessary in information source node, and information source node (not having to describe in detail) will comprise the conversion that is equal to bypass conversion 64.
These translation functions have been not described in detail, because how to realize that these functions are known by people.Can imagine some kinds of conversion plans.In one-plus-one conversion, in information source, copy data, and all data are sent to information destination node along two branches of protected field.Here, two data paths wherein one link residue one data paths, and the wherein paths in the territory do not need to be ended to use data.This is the result of control transformation.If produce triggering in information destination node, then can trigger quickly in information destination node.Perhaps, only use the paths in the protected field in this case, can save transmission cost thus in information source node translation lookaside path.This need trigger and be sent to information source node.This can realize in single-phase process, by being transmitted into information source along untapped part from the stay of two nights.If conversion command is confirmed or admitted to information source, then conversion becomes two-phase.
To every function of node shown in Figure 4 be described in more detail.
Fig. 5, the information destination node trigger action
51, carry out the detection of the cell (ais cell) of expression alarm.Relam identifier in 52 check alarm cells.Transmit cell to avoid delayed data stream 53.54 and 55, if identifier then produces and triggers corresponding to the address in protected territory.Otherwise, ignore this identifier.
Fig. 6, alarm detection triggers structure
Fig. 6 represents how to realize these functions with the form of signal.Cell detects and duplicates is a kind of example of detection mode.Cell detects and duplicates and extracts data, re-constructs cell and check cell is for which kind of type.Cell detects and duplicates may has directly from data path or from the input of bypass translation function 64.Check each cell to find that it is the OAS cell.If then 71, the type of check OAS cell is to find that it is an ais cell.If, then duplicate whole cell so that it is further processed, and the data that do not have delay transmitting.Because need carry out these functions as quickly as possible, so use a specialized hardware, the preferably form of ASIC usually.Detailed design is a problem for the technical staff, does not need here to have further described.Should produce triggering as quickly as possible, be not too big if comparator 72 needs number of addresses relatively, then can realize quick comparator 72 on hardware.Might accelerate this operation by the domain addresses identifier that comprises in the coding AIF cell, can carry out simple algorithm by this way and do not need comparison step.Therefore 73,, then can be to determine in the triggering row major power of advancing if for example have a plurality of nested bypass paths and have protective circuit possible more than.Can be with reference to address database 74 as a node administration function part, address database 74 can be directly on ASIC, perhaps can be in ram.
Fig. 7, the node administration function
The node administration function that Fig. 7 represents comprises the local data base 93 that is upgraded and comprised at least represented information by TNM.It is intermediate node, information source node or information destination node for classification 94 expressions of node, or more than one these nodes.These nodes of state 95 expression are to work under the normal route state, still work under the bypass path state, and this information can be used for controlling bypass translation function 64, for example begin to reverse from the bypass path to the normal route.
Node ID is stored 96, and is used for alarm conversation (session) control.96 and 97, the node identifier by in the present node control protected field is divided at the node identifier in operate as normal path with at the node identifier of protecting the path.These identifiers may be in the system operation process, even changes after the TNM initial configuration.For example, in the nested type scheme, the operating path in outer territory may comprise part internal layer territory.If conversion internal layer territory, then the operating path in outer territory has changed, and the database of the information destination node that TNM should the outer territory of corresponding renewal.
It is node identifier that relam identifier in the alarm cell there is no need.For example, can be all node dispense path identifiers of the given path in given territory.In both cases, in information destination node, perhaps whether territory ID or path ID can be used for discerning uniquely alarm and generate in the territory of node oneself.
The node administration function that Fig. 7 schematically illustrates can realize in the same ASIC that some other function of node is used, if can realize processor among this ASIC.By using the Q3 interface can be implemented to being connected of TNM, because be not very strict on these network management communication mosts of the time with any narrow bandwidth wide area network such as Ethernet or X25.Detailed enforcement is general issues for the technical staff, does not need here to describe in detail.
Triggering/translation function 99 is if make suitable can the shielding of node administration function trigger, if TNM is because any reason wants to forbid the protection conversion.Can realize reversing or non-reverse policy and can influence conversion command by TNM and export and realize and the coordination of network others part.
100, represented alarm insertion control, to give some control that 62 pairs of alarms are inserted of node administration function, for example make TNM to carry out alarm filter and renewal with the alarm filter algorithm.
Therefore principle from the ITU that carries out reference advises can learning I731 and the I732 insertion of alarm cell does not need to describe in detail here.
The operational failure location field is useful in ais cell, because:
The fault location field has I.610 to define and want to be generally any application (just not protecting the ID territory) and is used for clearly determining fault location, and uses this field to be considered to purpose for fault location,
Use locating information to determine that protected field will not revise any existing principle and the principle of I.610 definition,
TMN will be used to coordinate and provide all network configuration informations under the situation of protected field,
The present invention is not limited to the specific detail of institute's tracing device, can expect other improvement and application and do not exceed the described scope of claim of the present invention.

Claims (14)

  1. One kind in packet-based telecommunication system trigger data reselect the method for route; this system comprises a primary data path and at least one bypass path; bypass path is used for bypass part data path; this part and its bypass separately limit a protected field; this system comprises the node in each territory; this node is used to monitor each territory and sends the alarm of block form and the relam identifier in each territory that the expression generation is alarmed to other descendant node that the method comprising the steps of:
    At one of them given node, detect the alarm and the corresponding identifier that send from the upstream node of given node;
    At given node,, determine whether that trigger data reselects route, the territory that this bypass path bypass is monitored by given node along bypass path wherein according to the relam identifier that detects.
  2. 2. by alarm is inserted in the data that will launch alarm is sent to descendant node according to the process of claim 1 wherein.
  3. 3. according to the method for claim 1 or 2, wherein this system is connection-oriented, does not need to set up new connection and just can finish and reselect route.
  4. 4. according to the method for any one claim of front, wherein system comprises nested territory, and this method comprises the internal layer of determining at nested domain, and main path and bypass path break down and definite step that should trigger the bypass in an outer territory.
  5. 5. according to the method for any one claim of front, wherein given node comprises that representative domain can and determine whether the step that the priority according to storage triggers in addition by the stored data base of the priority of more than one bypass path bypass.
  6. 6. according to the method for any one claim of front, wherein given node is the information destination node in the bypass path terminal, can be by given node triggering so that the territory that bypass is monitored by given node in the terminal of this bypass path.
  7. 7. according to the method for any one claim of front, wherein relam identifier comprises node identifier.
  8. 8. the method for a bypass fault in packet-based telecommunication system; this system comprises a primary data path and at least one bypass path; bypass path is used for bypass part data path; this part and its bypass separately limit a protected field; this system comprises the node in each territory; this node is used to monitor each territory and sends the alarm of block form and the relam identifier in each territory that the expression generation is alarmed to other descendant node that the method comprising the steps of:
    At one of them given node, detect the alarm and the corresponding identifier that send from the upstream node of given node;
    At given node,, determine whether that trigger data reselects route, the territory that this bypass path bypass is monitored by given node along bypass path wherein according to the relam identifier that detects; With
    Reselect route according to this trigger data along given bypass path.
  9. 9. software on computer-readable media; this software is used for being implemented in the method that packet-based telecommunication system trigger data is reselected route; this system comprises a primary data path and at least one bypass path; bypass path is used for bypass part data path; this part and its bypass separately limit a protected field; this system comprises the node in each territory; this node is used to monitor each territory and sends the alarm of block form and the relam identifier in each territory that the expression generation is alarmed to other descendant node that the method comprising the steps of:
    At one of them given node, detect the alarm and the corresponding identifier that send from the upstream node of given node;
    At given node,, determine whether that trigger data reselects route, the territory that this bypass path bypass is monitored by given node along bypass path wherein according to the relam identifier that detects.
  10. 10. the node in the packet-based telecommunication system; this system comprises a primary data path and at least one bypass path; bypass path is used for bypass part data path; this part and its bypass separately limit a protected field; this system comprises the node in each territory; this node is used to monitor each territory and sends the alarm of block form and the relam identifier in each territory that the expression generation is alarmed to other descendant node that this node comprises:
    At one of them given node, detection is from the alarm of the upstream node transmission of given node and the device of corresponding identifier;
    At given node,, determine whether that trigger data reselects the device of route, the territory that this bypass path bypass is monitored by given node along bypass path wherein according to the relam identifier that detects.
  11. 11. packet-based telecommunication system; this system comprises a primary data path and at least one bypass path; bypass path is used for bypass part data path; this part and its bypass separately limit a protected field; this system comprises the node in each territory; this node is used to monitor each territory and sends the alarm of block form and the relam identifier in each territory that the expression generation is alarmed to other descendant node that this system comprises:
    At one of them given node, detection is from the alarm of the upstream node transmission of given node and the device of corresponding identifier;
    At given node,, determine whether that trigger data reselects the device of route, the territory that this bypass path bypass is monitored by given node along bypass path wherein according to the relam identifier that detects.
  12. 12. according to any one method of claim 1 to 10, wherein given node comprises the database of node identifier in the territory of given node.
  13. 13. according to the method for claim 12, wherein database is upgraded by network management system.
  14. 14. method according to Claim 8 also is included in the basic step of using network management system configuration bypass path on the connection basis.
CNB971823472A 1997-08-22 1997-08-22 Protection switching trigger generation Expired - Fee Related CN1157986C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB971823472A CN1157986C (en) 1997-08-22 1997-08-22 Protection switching trigger generation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB971823472A CN1157986C (en) 1997-08-22 1997-08-22 Protection switching trigger generation

Publications (2)

Publication Number Publication Date
CN1265258A true CN1265258A (en) 2000-08-30
CN1157986C CN1157986C (en) 2004-07-14

Family

ID=5178411

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB971823472A Expired - Fee Related CN1157986C (en) 1997-08-22 1997-08-22 Protection switching trigger generation

Country Status (1)

Country Link
CN (1) CN1157986C (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1309222C (en) * 2003-05-01 2007-04-04 株式会社Ntt都科摩 Traffic distribution control apparatus and method
US7460469B2 (en) 2004-01-21 2008-12-02 Eci Telecom Ltd. Fast rerouting of traffic in a circuit switched mesh network
CN1705298B (en) * 2004-06-01 2010-06-09 法国电讯 Method of managing malfunctions at router level, and a router

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1309222C (en) * 2003-05-01 2007-04-04 株式会社Ntt都科摩 Traffic distribution control apparatus and method
US7460469B2 (en) 2004-01-21 2008-12-02 Eci Telecom Ltd. Fast rerouting of traffic in a circuit switched mesh network
CN1645840B (en) * 2004-01-21 2010-09-08 Eci电信公司 Fast rerouting of traffic in a circuit switched mesh network
CN1705298B (en) * 2004-06-01 2010-06-09 法国电讯 Method of managing malfunctions at router level, and a router

Also Published As

Publication number Publication date
CN1157986C (en) 2004-07-14

Similar Documents

Publication Publication Date Title
US6359857B1 (en) Protection switching trigger generation
US7830860B2 (en) Packet data network voice call quality monitoring
CN1268140C (en) Integrating signaling system number 7 (SS7) networks with networks using multi-protocol label switching (MPLS)
CN1097917C (en) Broadband telecommunications system
CN101366243B (en) Communication system, communication method, node, and node program
US8014510B2 (en) Arrangement for controlling congestion in an SS7 signaling node based on packet classification
EP1788757A1 (en) Method and devices for implementing group protection in mpls network
CN108322338B (en) Broadcast suppression method and VTEP device
CN108156014A (en) A kind of loop fault processing method and interchanger
CN1859156A (en) Restoring method for link fault
CN1649444A (en) Optical cross connect apparatus and network
CN101156367A (en) Service trouble recovery method and system
CN102088387B (en) Tunnel protection method and device of ring network
CN109586864A (en) Data transmission method, apparatus and system
CN102185712B (en) The reverse method of VPLS network and ethernet ring network and device
CN1157986C (en) Protection switching trigger generation
CN1801749A (en) Method for protecting data service in metropolitan area transmission network
US11582352B2 (en) Apparatus and method for using an intelligent network for analyzing an event external to a signaling network
CN102740175A (en) Method for protecting and recovering cross-domain end-to-end label switched path
CN106941445A (en) The method and system of the quick stratification pretection switch of MPLS TP
CN1520102A (en) Method of switching routes by setting up and deleting fork marker
CN1592160A (en) Method for obtaining path with protective body in intelligent optical network
CN1245816C (en) Method for collocating user special-purpose connection to transmission web and its equipment
CN101160869A (en) Method and apparatus for security protection of service interruption in switch network
CN1441577A (en) Reverse multiplexer circuit layer protecting and restoring method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C19 Lapse of patent right due to non-payment of the annual fee
CF01 Termination of patent right due to non-payment of annual fee