CN1588882A - Protection rotation method for preset protective ring - Google Patents

Protection rotation method for preset protective ring Download PDF

Info

Publication number
CN1588882A
CN1588882A CN 200410066595 CN200410066595A CN1588882A CN 1588882 A CN1588882 A CN 1588882A CN 200410066595 CN200410066595 CN 200410066595 CN 200410066595 A CN200410066595 A CN 200410066595A CN 1588882 A CN1588882 A CN 1588882A
Authority
CN
China
Prior art keywords
node
nodal point
protection
protection ring
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200410066595
Other languages
Chinese (zh)
Other versions
CN100495979C (en
Inventor
祝国龙
曾庆济
许田
叶通
杨俊杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Jiaotong University
Original Assignee
Shanghai Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Jiaotong University filed Critical Shanghai Jiaotong University
Priority to CNB2004100665957A priority Critical patent/CN100495979C/en
Publication of CN1588882A publication Critical patent/CN1588882A/en
Application granted granted Critical
Publication of CN100495979C publication Critical patent/CN100495979C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Small-Scale Networks (AREA)

Abstract

This invention relates to inversion protection method with preset protect loops. When fault appears to a link or a node, the front node and back node deflect the service onto the preset protect loop directly after they find out the fault, the service is transmitted along the proset protect loop between them namely the return protect inversion, or four nodes a source node, front node, a back node and a host node envolve in the protection recovery of the fault when it happens. If the fault happens on the loop, then the service will arrives at the host node along the preset protection loop from the source node, otherwise, the loop provides a recovery path for invalid service, namely a source route protection inversion.

Description

The protection reverse method of preset protection ring
Technical field
The present invention relates to a kind of protection reverse method of preset protection ring, specifically is a kind of protection reverse method that goes for all kinds preset protection ring.Be used for network communications technology field.
Background technology
Along with the continuous development of Internet and network technology, more and more higher requirement has been proposed for the survivability and the reconfigurability of network.Based on network ring topology and mesh network topology have proposed many protection recovery policies.(as BLSR) can realize protecting fast recovery (about 50ms) in ring network, but needs to reserve 100% resource backup at least.In mesh network, can realize very high resource utilization (as being less than 70%) by the method for using the share protect resource; but need complicated signaling during owing to fault recovery; and intermediate node need protect switching in real time, so can't realize that protection fast recovers as ring network.Protection scheme based on preset protection ring has possessed ring network protection and two advantages of the efficient resource utilization of mesh network fast simultaneously, so preset protection ring is a kind of ideal scheme that improves network survivability.Preset protection ring can be applied to diverse network, as IP, and MPLS, SDH, ASON, WDM network.
The preset protection ring that has had several types at present is as link protection preset protection ring, Node Protection preset protection ring, stream protection preset protection ring.When adopting preset protection ring to carry out network protection at present, just finish the protection recovery of fault, do not consider that but various preset protection rings can present different features when breaking down by two end points of faulty link.People such as G.Shen in October, 2003 has been delivered one piece of article on the 21st the 8th phase of volume of the selected topic magazine (i.e. " IEEE JSAC ") of communicating by letter of U.S. electric and Electronic Engineering Association: the preset protection ring that expands to the route segment protection is used for the protection recovery (" Extending the p-cycle concept to path segment protection for span and nodefailure recovery ") of link and node failure.This article has proposed the notion of stream protection preset protection ring, and compares from the angle and the link protection preset protection ring of network resource utilization,, does not still have the formal protection reverse method that proposes to be fit to dissimilar preset protection rings in article.
Summary of the invention
The objective of the invention is deficiency and defective, propose a kind of protection reverse method of preset protection ring, make it go for various types of preset protection rings at existing traditional preset protection ring.
The present invention is achieved by the following technical solutions, the inventive method is: when the link of network or node break down, by two nodes is the protection recovery that front nodal point and posterior nodal point participate in fault, after if front nodal point and posterior nodal point detect network failure, directly business is deflected on the preset protection ring, business will be transmitted along the preset protection ring section between front nodal point and the posterior nodal point, thereby make business avoid network failure, realized quick protection, this method is called the protection of turning back and switches; Perhaps when the link of network or node break down, by four nodes is the protection recovery that source node, front nodal point, posterior nodal point and destination node participate in fault, if detecting network failure occurs on the preset protection ring, then business will directly arrive destination node from source node along preset protection ring, and no longer pass through front nodal point and posterior nodal point; If detect network failure is not to occur on the preset protection ring, and then preset protection ring can provide two restoration paths for failure service.Article one, restoration path is: professional at the source node place, be switched to the direction that deviates from front nodal point, and along the preset protection ring transmission, after at first arriving posterior nodal point or destination node, the professional path transmission that continues before the fault; Another restoration path is: professional at the front nodal point place, be switched to the direction that deviates from source node, and along the preset protection ring transmission, after at first arriving posterior nodal point or destination node, the professional path transmission that continues before the fault.Business is deflected on the preset protection ring to be transmitted, thereby has avoided network failure, has realized quick protection, and this method is known as the source routing protection and switches.
In the present invention, along the direction of Business Stream, first intersection point professional and preset protection ring is defined as source node; And along the opposite direction of Business Stream, first intersection point professional and preset protection ring is defined as destination node.Along the direction of Business Stream, second intersection point of business and preset protection ring then is defined as front nodal point if not destination node, if destination node, then source node and front nodal point are same node.In the same manner, along the opposite direction of Business Stream, second intersection point of business and preset protection ring then is defined as posterior nodal point if not source node, if source node, then destination node and posterior nodal point are same node.Therefore, front nodal point might be exactly a source node, and posterior nodal point then might be exactly a destination node.
Beneficial effect of the present invention: 1) of the present invention turning back protects reverse method and source routing protection reverse method to be applicable to various types of preset protection rings.2) adopt the protection reverse method that turns back of the present invention, protection is short recovery time, and loss of data is few, and is simple to operate.3) adopt source routing protection reverse method of the present invention, bandwidth occupancy is few, and restoration path is short, and end-to-end propagation delay time is little.
Description of drawings
Fig. 1-3 is applied to the schematic diagram of link protection preset protection ring for reverse method of the present invention
Fig. 4-5 is applied to the schematic diagram of Node Protection preset protection ring for reverse method of the present invention
Fig. 6-7 is applied to the schematic diagram of stream protection preset protection ring for reverse method of the present invention
Embodiment
In order to understand technical scheme of the present invention better, execution mode is explained in detail below in conjunction with accompanying drawing.
Fig. 1-7 has shown turn back protection reverse method and the application of source routing protection reverse method in dissimilar preset protection rings, and 1 is Working service among the figure; The 2nd, adopting turns back protects the restoration path of reverse method; The 3rd, the restoration path of employing source routing reverse method.In Fig. 1-7, suppose that Working service 1 order is through node I, E, B, (D among Fig. 7), F, A, G, O.Wherein, node I, B, A, O and C are the nodes on the preset protection ring, the node F among Fig. 4-5 can not be the node on the preset protection ring, and node F among Fig. 7 and D can be the nodes on the preset protection ring.In each figure of Fig. 1-7, adopting turns back protects reverse method and source routing protection reverse method that two restoration paths are respectively arranged respectively, for the purpose of understanding, has all only drawn wherein one.Such as in Fig. 2, adopt source routing protection reverse method that two restoration path: I-A-G-O and I-E-B-C-O are arranged, only drawn last paths in the drawings, then a paths then has been omitted.
In order to prove that protection reverse method of the present invention goes for various types of preset protection rings, hereinafter will set forth every kind of preset protection ring respectively.
1) link protection preset protection ring
Fig. 1-3 is applied to the schematic diagram of link protection preset protection ring for two kinds of reverse methods of the present invention.Wherein, be that inefficacy has taken place the circle link of preset protection ring among Fig. 1, and be that inefficacy has taken place for the string link of preset protection ring among Fig. 2-3.Suppose that Working service 1 order is through node I, E, B, A, G, O.Wherein, node I, B, A, O and C are the nodes on the preset protection ring.
Be that example sets forth that the protection of turning back is switched and two kinds of method application in the link protection preset protection ring of source routing protection below with Fig. 2.
In Fig. 2; if adopt the protection reverse method that turns back; when link A-B breaks down; posterior nodal point A and front nodal point B will at first receive fail message; and immediately failure service is switched on I-E-B-I-A-G-O and two restoration paths of I-E-B-C-O-A-G-O, thereby fault is protected recovery fast.
In Fig. 2, if adopt source routing protection reverse method, when link A-B breaks down, source node I, posterior nodal point A, front nodal point B and destination node O will be switched to failure service on I-A-G-O and two restoration paths of I-E-B-C-O.
In this example, adopt the protection reverse method that turns back, only need 2 nodes to participate in protection and switch, and adopt source routing protection reverse method, need 4 nodes to participate in protection and switch.Therefore, turn back the protection reverse method can realize protecting faster resume speed.And when adopting source routing protection reverse method; loop I-E-B-I and O-A-G-O have been avoided; so reduced the length of restoration path; because restoration path is without circle link I-B and O-A; so reserved resource on them not; thereby reduced the bandwidth that takies, promptly improved utilization rate of network resource.
2) Node Protection preset protection ring
Fig. 4-5 is the schematic diagram of Node Protection preset protection ring protection node failure.Suppose that Working service 1 order is through node I, E, B, F, A, G, O.Wherein, node I, B, A, O and C are the nodes on the preset protection ring, and node F is not the node on the preset protection ring.
Be that example sets forth that the protection of turning back is switched and two kinds of method application in the Node Protection preset protection ring of source routing protection below with Fig. 4.
In Fig. 4; if adopt the protection reverse method that turns back; when node F breaks down; posterior nodal point A and front nodal point B will at first receive fail message; and immediately failure service is switched on I-E-B-I-A-G-O and two restoration paths of I-E-B-C-O-A-G-O, thereby fault is protected recovery fast.
In Fig. 4, if adopt source routing protection reverse method, when node F breaks down, source node I, posterior nodal point A, front nodal point B and destination node O will be switched to failure service on I-A-G-O and two restoration paths of I-E-B-C-O.
Identical with the situation in the link protection preset protection ring, adopt the protection reverse method that turns back, only need 2 nodes to participate in protection and switch, and adopt source routing protection reverse method, need 4 nodes to participate in protection and switch.Therefore, turn back the protection reverse method can realize protecting faster resume speed.And when adopting source routing protection reverse method, can reduce the length of restoration path and improve utilization rate of network resource.
3) stream protection preset protection ring
Fig. 6-7 recovers schematic diagram for the protection of stream protection preset protection ring.In Fig. 6-7, suppose that Working service 1 order is through node I, E, B, D (in Fig. 7), F, A, G, O.Wherein, node I, B, A, O and C are the nodes on the preset protection ring, and node F and D can be the nodes on the preset protection ring, also can not be the nodes on the preset protection ring.
Be that example sets forth that the protection of turning back is switched and the application of two kinds of methods of source routing protection in stream protection preset protection ring below with Fig. 6.
In Fig. 6; if adopt the protection reverse method that turns back; when node F breaks down; posterior nodal point A and front nodal point B will at first receive fail message; and immediately failure service is switched on I-E-B-I-A-G-O and two restoration paths of I-E-B-C-O-A-G-O, thereby fault is protected recovery fast.
In Fig. 6, if adopt source routing protection reverse method, when node F breaks down, source node I, posterior nodal point A, front nodal point B and destination node O will be switched to failure service on I-A-G-O and two restoration paths of I-E-B-C-O.
Identical with previous examples, adopt the protection reverse method that turns back can realize protecting faster resume speed.And when adopting source routing protection reverse method, can reduce the length of restoration path and improve utilization rate of network resource.

Claims (5)

1, a kind of protection reverse method of preset protection ring, it is characterized in that, when the link of network or node break down, the protection that participates in fault by front nodal point and posterior nodal point recovers, after present node and posterior nodal point detect network failure, directly business is deflected on the preset protection ring, business will be along the transmission of the preset protection ring section between front nodal point and the posterior nodal point, and this method is called the protection of turning back and switches;
Perhaps when the link of network or node break down, the protection that participates in fault by source node, front nodal point, posterior nodal point and destination node recovers, if detecting network failure occurs on the preset protection ring, then business will directly arrive destination node from source node along preset protection ring, otherwise preset protection ring provides two restoration paths for failure service, promptly professional at the source node place, be switched to the direction that deviates from front nodal point, transmit along preset protection ring, after at first arriving posterior nodal point or destination node, the professional path transmission that continues before the fault; Perhaps professionally be switched to the direction that deviates from source node at the front nodal point place, along the preset protection ring transmission, after at first arriving posterior nodal point or destination node, the professional path transmission that continues before the fault, this method is called the source routing protection and switches.
2, the protection reverse method of preset protection ring according to claim 1 is characterized in that, described source node is meant, along the direction of Business Stream, and first intersection point of professional and preset protection ring.
3, the protection reverse method of preset protection ring according to claim 1 is characterized in that, described destination node is meant, along the opposite direction of Business Stream, and first intersection point of professional and preset protection ring.
4, the protection reverse method of preset protection ring according to claim 1 is characterized in that, described front nodal point is meant; direction along Business Stream; second intersection point of professional and preset protection ring is if destination node, and then source node and front nodal point are same node, otherwise are front nodal point.
5, the protection reverse method of preset protection ring according to claim 1 is characterized in that, described posterior nodal point is meant; opposite direction along Business Stream; second intersection point of professional and preset protection ring is if source node, and then place source node and posterior nodal point are same node, otherwise are posterior nodal point.
CNB2004100665957A 2004-09-23 2004-09-23 Protection rotation method for presetting protective ring Expired - Fee Related CN100495979C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2004100665957A CN100495979C (en) 2004-09-23 2004-09-23 Protection rotation method for presetting protective ring

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2004100665957A CN100495979C (en) 2004-09-23 2004-09-23 Protection rotation method for presetting protective ring

Publications (2)

Publication Number Publication Date
CN1588882A true CN1588882A (en) 2005-03-02
CN100495979C CN100495979C (en) 2009-06-03

Family

ID=34604051

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004100665957A Expired - Fee Related CN100495979C (en) 2004-09-23 2004-09-23 Protection rotation method for presetting protective ring

Country Status (1)

Country Link
CN (1) CN100495979C (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100403686C (en) * 2005-06-17 2008-07-16 华为技术有限公司 Data service protection reverse triggering process and apparatus
WO2010020146A1 (en) * 2008-08-19 2010-02-25 华为技术有限公司 Correlative protection method, device and system for flux engineering channel
CN101227313B (en) * 2007-01-19 2010-07-28 华为技术有限公司 Business path regulation method and communication system as well as route computing unit
CN101771560B (en) * 2008-12-31 2012-08-08 华为技术有限公司 Link restoring method, node device and network system
WO2014180448A1 (en) * 2013-12-20 2014-11-13 中兴通讯股份有限公司 Method and device for protecting ptn network service
CN107786438A (en) * 2016-08-31 2018-03-09 中兴通讯股份有限公司 Method, apparatus, system and the equipment of P2MP Multicast Tunnel protection

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100403686C (en) * 2005-06-17 2008-07-16 华为技术有限公司 Data service protection reverse triggering process and apparatus
CN101227313B (en) * 2007-01-19 2010-07-28 华为技术有限公司 Business path regulation method and communication system as well as route computing unit
WO2010020146A1 (en) * 2008-08-19 2010-02-25 华为技术有限公司 Correlative protection method, device and system for flux engineering channel
CN101771560B (en) * 2008-12-31 2012-08-08 华为技术有限公司 Link restoring method, node device and network system
WO2014180448A1 (en) * 2013-12-20 2014-11-13 中兴通讯股份有限公司 Method and device for protecting ptn network service
CN107786438A (en) * 2016-08-31 2018-03-09 中兴通讯股份有限公司 Method, apparatus, system and the equipment of P2MP Multicast Tunnel protection
CN107786438B (en) * 2016-08-31 2019-07-19 中兴通讯股份有限公司 Method, apparatus, system and the equipment of P2MP Multicast Tunnel protection

Also Published As

Publication number Publication date
CN100495979C (en) 2009-06-03

Similar Documents

Publication Publication Date Title
US6904018B2 (en) Method for high speed rerouting in multi protocol label switching network
EP2224644B1 (en) A protection method, system and device in the packet transport network
KR100537746B1 (en) Routing Table Configuration for Protection in Optical Mesh Networks
CN100397088C (en) Method and system for providing failure protection in a ring network that utilizes label switching
US7042839B2 (en) Scaleable line-based protection for connection oriented communications protocols
US7961602B2 (en) Method and device using a backup communication path to transmit excess traffic
EP2624590B1 (en) Method, apparatus and system for interconnected ring protection
EP0809384A2 (en) Network failure restoration method with different recovery performances for different signal groups
CN102474446A (en) Recovery mechanism for point-to-multipoint traffic
WO2006030435A2 (en) Efficient protection mechanisms for protecting multicast traffic in a ring topology network utilizing label switching protocols
WO2012065435A1 (en) Path switch-back method and apparatus in transport network
CN102035712A (en) Multiprotocol label exchanged ring network protection method, device and system
WO2012079418A1 (en) Method and system for intersecting or tangent ring network protection
CN102684973A (en) Method and system for protecting looped network
CN1499747A (en) Method for implementing protection and restoration for intelligent optical network
CN101483491B (en) Shared guard ring, multicast source route protection method and node thereof
CN100531092C (en) Intelligent optical network business re-routing trigging method
CN1237842C (en) Rerouting in a multiprotocol Label switching (MPLS) domain
CN100495979C (en) Protection rotation method for presetting protective ring
CN102546352B (en) A kind of method and system realizing point-to-multipoint label switch paths protection
CN1921409A (en) Preset network protection method capable of sharing bandwidth
WO2008040194A1 (en) Method and system for protecting multicast tree
CN101155133B (en) Processing method for information of flux project periodic line
CN1228947C (en) Protection method for group business stream on wideband switching network
US20020122442A1 (en) Communication network, path setting method and node apparatus used therefor

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090603

Termination date: 20110923