WO2014180448A1 - Procédé et dispositif pour protéger un service réseau rtp - Google Patents

Procédé et dispositif pour protéger un service réseau rtp Download PDF

Info

Publication number
WO2014180448A1
WO2014180448A1 PCT/CN2014/079990 CN2014079990W WO2014180448A1 WO 2014180448 A1 WO2014180448 A1 WO 2014180448A1 CN 2014079990 W CN2014079990 W CN 2014079990W WO 2014180448 A1 WO2014180448 A1 WO 2014180448A1
Authority
WO
WIPO (PCT)
Prior art keywords
protection
service
link
paths
circle
Prior art date
Application number
PCT/CN2014/079990
Other languages
English (en)
Chinese (zh)
Inventor
陈捷
欧雪刚
于洪宾
罗伟
李兴明
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2014180448A1 publication Critical patent/WO2014180448A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/64Hybrid switching systems
    • H04L12/6418Hybrid transport

Definitions

  • the present invention relates to the technical field of combining network planning technology and computer application, and particularly relates to a PTN network service planning technology based on P-cycle protection in communication network planning and design, that is, A planning method and apparatus for improving the network bandwidth utilization by ensuring that the services in the PTN network satisfy the P-cycle protection while minimizing the configured P-cycle demand capacity and providing the greatest protection capability.
  • PTN Packet Transport Network
  • TDM Testing Data Management/Technical Data Management
  • the PTN technology is mainly located in the aggregation access layer of the metropolitan area.
  • the main services carried by the network are: Second/third generation mobile communication technology (2 n d/3rd-gener a tion) Base station service , Group line and Internet major customer business, internal business (DCN: Data Communication Network and IPTV (Internet Protocol Television)) Optical line terminal (OLT: Optical Line Terminal) WLAN (WLAN: Wireless Local Area Networks)
  • DCN Data Communication Network and IPTV (Internet Protocol Television)
  • OLT Optical Line Terminal
  • WLAN Wireless Local Area Networks
  • P-cycle Preconfigured protection cycle, which has the ability to protect both links on the P-ring and across the link.
  • An object of the present invention is to provide a method and a device for protecting a PTN network service, which can solve the problem that the service bandwidth on the link cannot be effectively protected when the link fails, resulting in low network bandwidth utilization. problem.
  • a method for protecting a PTN network service including: Traversing each service in the PTN network service set, establishing a service path for each of the service routes, and obtaining N service paths corresponding to N services; each link in each of the N service paths Configuring a protection circle suitable for multiple services; establishing two protection paths for the configured protection circle of any link through which multiple service paths pass through the N service paths, so that the two protection paths respectively belong to the chain of the protection circle
  • the road business collection provides protection.
  • each link in each of the service paths is sorted in descending order according to the used working bandwidth from large to small, and each link is traversed in sequence; and the preset protection circle database is used to find Outing all the protection rings of each link, and calculating the working bandwidth required for each protection ring and its own redundancy rate; all the protections are performed according to the redundancy ratio from small to large.
  • the circle sequentially determines to obtain the protection ring of each link.
  • the all protection rings are sequentially determined according to the redundancy ratio from small to large, and the protection ring of each link is obtained: the working bandwidth required for each protection ring to be configured And comparing with the remaining bandwidth of the link of the protection ring; if the remaining bandwidth of the link is greater than the working bandwidth required to configure the protection ring, determining that the protection ring is a protection ring of the link.
  • the method further includes: deleting a protection ring including the part of the link if a part of the link of the protection ring exists; reconfiguring the link to be protected in all the protection rings that are deleted , get a protection circle suitable for multiple business.
  • the two protection paths are established, and the two protection paths respectively provide protection for the link service set of the protection circle, including: dividing two independent protection paths from the configured protection circle; The link service set of the protection circle is divided, and two sub-service sets whose service working bandwidths are equal or similar are obtained; The two sub-service sets are separately configured to the two independent protection paths.
  • the working bandwidth required for configuring each protection ring is the maximum value of the sum of service working bandwidths in the two sub-service sets.
  • an apparatus for protecting a PTN network service including: a service path module, configured to traverse each service in a PTN network service set, and establish a service for each service route The path is configured to obtain N service paths corresponding to the N services; the configuration module is configured to configure a protection ring suitable for multiple services for each link in each of the N service paths; the switching configuration module is set to Two protection paths are established for the configured protection ring of any one of the N service paths, and the two protection paths respectively provide protection for the link service collection of the protection circle.
  • the configuration module includes: a traversal sub-module, configured to perform a descending ordering of each link in each of the service paths in descending order of used working bandwidth, and sequentially traverse each of the links a link sub-module, configured to find all the protection rings including each of the links from the preset protection circle database, and calculate the working bandwidth required for configuring each protection ring and its own redundancy
  • the determining sub-module is configured to sequentially determine all the protection rings according to the redundancy ratio from small to large, to obtain the protection ring of each link.
  • the device further includes: a reconfiguration sub-module, configured to delete all protection rings including the partial link if a part of the link of the protection ring has a protection ring, and need to delete all the protection rings
  • the protected link is reconfigured to obtain a protection circle suitable for multiple services.
  • the switching configuration module includes: a protection circle dividing sub-module, configured to divide two independent protection paths from the configured protection circle; and the set dividing sub-module is set as a link service to the protection ring The set is divided into two sub-service sets whose service working bandwidths are equal or similar;
  • the protection protection sub-module is configured to separately configure the two sub-service sets to the two independent protection paths.
  • FIG. 1 is a schematic diagram of a method for protecting a PTN network service according to an embodiment of the present invention
  • FIG. 2 is a device structure of a P-cycle based PTN network service for protecting a PTN network service according to an embodiment of the present invention
  • FIG. 1 is a schematic diagram of a method for protecting a PTN network service according to an embodiment of the present invention
  • FIG. 2 is a device structure of a P-cycle based PTN network service for protecting a PTN network service according to an embodiment of the present invention
  • FIG. 1 is a schematic diagram of a method for protecting a PTN network service according to an embodiment of the present invention
  • FIG. 2 is a device structure of a P-cycle based PTN network service for protecting a PTN network service according to an embodiment of the present invention
  • FIG. 1 is a schematic diagram of a method for protecting a PTN network service according to an embodiment of the present invention
  • FIG. 2 is a device structure of a P-cycle based PTN network service
  • FIG. 3 is a schematic diagram of a P-circle operation and protection switching for protecting a PTN network service according to an embodiment of the present invention
  • FIG. 4 is a flowchart of a method for protecting a PTN network service according to an embodiment of the present invention
  • FIG. 6 is a service information diagram for protecting the PTN network service according to the embodiment of the present invention
  • FIG. 7 is a PTN provided by the embodiment of the present invention.
  • P-cycle plan for network service protection. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS The preferred embodiments of the present invention are described in detail below with reference to the accompanying drawings.
  • the PTN network has the following features: (1)
  • the PTN network topology is known according to actual applications, including the number of nodes and the connectivity of nodes.
  • each network node has the ability to fully allocate wavelengths.
  • the PTN network device has a control plane, so that the service working path is switched to the protection path under the affected condition.
  • the P circle in the network refers to the LSP tunnel protection ring.
  • the specific rules and related parameters of the PTN network service routing involved in the present invention are as follows: (1) Specific rules:
  • the PTN network service is directed, and the uplink and downlink services are not necessarily symmetric.
  • the Dijkstra shortest path algorithm with directed weighted graph is used in routing and establishing working LSP.
  • the network topology can be represented by a directed graph G (N, E). According to the actual application, the topology is known, the links between nodes are known, and the bandwidth is known. The relevant parameters are as follows:
  • M indicates the fiber collection
  • M 2 indicates the fiber collection
  • M 2 indicates the fiber collection
  • T f P-cycle protects the service set that the design fails (including the service that fails to establish a working LSP).
  • T s Configure the P-cycle successful service collection.
  • P s A set of P-circles for routing service configurations in the network.
  • P Li Contains the P circle set of link A.
  • E(i) The redundancy ratio of the circle.
  • FIG. 1 is a schematic diagram of a method for protecting a PTN network service according to an embodiment of the present invention. As shown in FIG. 1 , the specific steps are as follows: Step SI: traverse each service in the PTN network service set, establish a service path for each service route, and obtain N service paths corresponding to N services. Step S2: configuring a protection ring suitable for multiple services for each link in each of the N service paths.
  • step S2 each link in each of the service paths is sorted in descending order according to the used working bandwidth from large to small, and each link is traversed in sequence; from the preset protection circle database Finding all the protection rings including each of the links, and calculating the working bandwidth required for configuring each protection ring and its own redundancy rate; according to the order of the redundancy ratio from small to large All the protection rings are judged in turn to obtain the protection ring of each link. Further, the all protection rings are sequentially determined according to the redundancy ratio from small to large, and the protection ring of each link is obtained: the working bandwidth required for each protection ring is configured.
  • the protection ring comparing with the remaining bandwidth of the link of the protection ring; if the remaining bandwidth of the link is greater than the working bandwidth required to configure the protection ring, determining that the protection ring is a protection ring of the link. Further, if a part of the link of the protection ring has a protection ring, all the protection rings including the part of the link are deleted; and the links to be protected in all the protection rings that are deleted are reconfigured to obtain a service suitable for multiple services. Protection ring. In the step S3, two protection paths are established for the configured protection ring of any one of the multiple service paths in the N service paths, so that the two protection paths respectively provide protection for the link service set of the protection ring.
  • the step of establishing two protection paths, so that the two protection paths respectively provide protection for the link service set of the protection circle includes: dividing two independent protection paths from the configured protection circle And dividing the link service set of the protection circle to obtain two sub-service sets whose service work bandwidths are equal or similar to each other; and configuring the two sub-service sets to the two independent protection paths respectively.
  • the working bandwidth required for configuring each protection circle is the maximum value of the sum of service working bandwidths in the two sub-service sets.
  • 2 is a structural diagram of an apparatus for protecting a PTN network service according to an embodiment of the present invention. As shown in FIG. 2, the method includes: a service path module, a configuration module, and a switching configuration module.
  • the service path module is configured to traverse each service in the PTN network service set, establish a service path for each service route, and obtain N service paths corresponding to N services.
  • the configuration module is configured to configure a protection ring suitable for multiple services for each of each of the N service paths.
  • the traversal sub-module of the configuration module is configured to perform descending ordering on each link in each service path according to the used working bandwidth from large to small, and traverse the each link in sequence.
  • the calculation sub-module of the configuration module is configured to find all the protection rings including the each link from the preset protection circle database, and calculate the working bandwidth required for configuring each protection circle and its own redundancy. The rate.
  • the determining sub-module of the configuration module is configured to sequentially determine all the protection rings according to the redundancy ratio from small to large, to obtain a protection ring of each link.
  • the reconfiguration sub-module of the configuration module is configured to delete all the protection rings that include the part of the link if a part of the link of the protection ring has a protection ring, and re-protect the link that needs to be protected in all the protection rings that are deleted. Configure it to get a protection circle suitable for multiple services.
  • the switching configuration module is configured to establish two protection paths for the configured protection ring of any one of the plurality of service paths in the N service paths, so that the two protection paths respectively link the service to the protection ring Collections provide protection.
  • FIG. 3 is a schematic diagram of a P-circle operation and a protection switching for protecting a PTN network service according to an embodiment of the present invention.
  • a thick line is a configured P-ring uplink link (ABCDEFA).
  • Figure 3 (a) shows the operation of the PTN network service on the P-ring bridging link BE.
  • Figure 3 (b) shows the switching mode of the P-circle to protect the affected PTN network service when the BE link fails.
  • the working capacity unit: Mbps
  • the working bandwidth of the uplink and downlink fibers on the ring is the same.
  • the working bandwidth of the uplink and downlink fibers of the AB link is 5M each.
  • the EB dotted arrow indicates the working traffic on the fiber from the node E to the B direction, and (6, 1) indicates that the traffic consists of services with bandwidths of 1, 6, respectively.
  • the BE dotted arrow indicates the working traffic on the fiber from the Node B to the E direction, and (4, 5, 3) indicates that the traffic consists of services with bandwidths of 3, 4, and 5 respectively.
  • the policy of configuring the P-circle is as follows: The link with the largest working bandwidth is used as the spanning link, and then the service bandwidth set on this link is divided into two sets with the same sum of bandwidths. . When this link fails, the traffic of the two sets can be protected by two paths on the P circle. In Figure 3 (a), the set of service bandwidths carried by the fiber in the BE direction is (3, 4, 5).
  • FIG. 4 is a flowchart of a method for protecting a PTN network service according to an embodiment of the present invention. As shown in FIG.
  • Step 401 According to a network topology, construct a minimum P-circle and a service level by using an algorithm based on K shortest path.
  • the SLA (Service-Level Agreement) algorithm builds a P-circle database (including basic and extended circles). Sort the services in the set T by priority.
  • Step 402 Traverse the services in the set ⁇ in turn, and if all the services have been processed, the algorithm ends.
  • Step 403 Establish a working LSP for the service route. If the service route fails, join the set 7>, and return to step 402. If the route is successful, the working LSP is established, the link through which the LSP passes is added to the set, and then the links are sorted in descending order according to the used working bandwidth.
  • Step 404 Traverse the links of the processing set in sequence, if all the links have been processed, the newly added services; if the P-circle protection can be performed, the set 7 will be added; and the process returns to step 402.
  • Step 405 According to the P-circle database, find all P-circles including the unprocessed link J, and record them as a set ⁇ . Calculate the bandwidth and redundancy required for each P-ring in ⁇ , and then take out the P-ring with the smallest redundancy rate, and the selected P-circle is recorded as. Among them, the bandwidth of the P circle uses the method of calculating the P-circle bandwidth in Figure 3 (b).
  • Step 406 View the remaining bandwidth of the ring fiber.
  • the remaining bandwidth of the optical fiber is smaller than the bandwidth required for configuring the P-circle, another P-circle +1 with a larger redundancy ratio is taken, and then it is determined whether the remaining capacity of the optical fiber in the P-ring is satisfied. Until a circle of capacity is found in the set ⁇ . If such a P circle is not found, the new service of the P circle cannot be configured; adding 7>, restoring the set, and returning to step 402; if there is such a circle S, adding the circle to the set, deleting the circle found by the circle Protected links, updating the remaining bandwidth of all fibers in the circle.
  • the P-ring redundancy rate is defined as the ratio of the network capacity consumed by the configuration circle A to the actual protected working capacity. The redundancy rate is calculated as follows:
  • FIG. 5 is an optical fiber link PTN PTN network traffic to protect a network according to an embodiment of the present invention
  • the topology diagram represents a node in the network topology. There are 8 nodes in total. The link is two opposite fibers, and the fiber bandwidth is 10G.
  • FIG. 6 is a service information diagram for protecting a PTN network service according to an embodiment of the present invention. As shown in FIG. 6, the service information of the P circle needs to be configured in the planning software.
  • the service information includes a source node, a destination node, a protection mode, and a bandwidth of the service.
  • FIG. 6 is a service information diagram for protecting a PTN network service according to an embodiment of the present invention. As shown in FIG. 6, the service information of the P circle needs to be configured in the planning software.
  • the service information includes a source node, a destination node, a protection mode, and a bandwidth of the service.
  • Step 701 Establish a PTN network topology diagram initially shown in FIG. 5, with a ray bandwidth of 10 G, and having known service information of services to be carried by the PTN network in FIG. 6.
  • Step 702 The services in the aggregation group include PW1, PW2, and PW3, and the service PW1 is routed, and the working LSP is established, and the link through which the LSP passes is added to the set.
  • the link that is arranged in descending order of the used working bandwidth is: ⁇ - ⁇ , ⁇ - ⁇ , ⁇ - ⁇ .
  • HGBEFAH can protect the links HA, AB, BE three chains at the same time. Therefore, HGBEFAH is configured as the P circle of the service PW1, and the service PW1 planning ends.
  • the capacity of the HGBEFAH is 300M.
  • Step 704 Add the P circle to the set of ABCDEFA, and delete the links HA, AB, BE protected by the found P circle HGBEFAH in f A , and update the remaining bandwidth of the light of the P circle HGBEFAH.
  • Step 705 Continue to configure the P circle for the service WP2, and obtain the 2 link as the BE.
  • Step 706 The partial links AB and BE of the configuration P circle of the Wp 2 link BE are already in the configured P circle HGBEFAH in the set, and the set of the protected links AB and BE is recorded as . Delete the P-band HGBEFAH of the protected link AB and BE in the set, and update the bandwidth of the deleted P-circle HGBEFAH link.
  • Step 707 Continue to configure the P circle for the service WP3, and obtain the 3 links as GB and BE. According to the order of the used working bandwidth from the largest to the smallest, the P-ring is configured for the 3- link BE, and the 3- link BE is the spanning link, and the P-circle is ABCDEFA. The capacity of the updated P circle ABCDEFA is 600M.
  • Step 708 Configure a P-circle for the 3- link GB, and obtain a P-circle as HGBAH and a capacity of 300M.
  • the business WP3 planning ends, and the P circle is configured as ABCDEFA and HGBAH.
  • the P circle generated by the final plan of the business WP1, WP2 and WP3 and its capacity are P1 circle (ABCDEFA, 600M) and P P2 circle (HGBAH, 300M).
  • the present invention has been proposed in the process of designing a PTN packet transmission network planning software, but it can be applied to other types of network planning processes as long as it is modified.
  • the present invention has the following technical effects: It can utilize the indivisible characteristics of the PTN service traffic and the high efficiency of the P-circle protection, and configure the P-circle protection of the two protection paths for the cross-link, thereby improving the network bandwidth. Utilization rate.
  • the protection method is applicable to the dynamic addition of services at the same time, and the utility of the invention is expanded.
  • the above technical solution provided by the present invention can be applied to the process of protecting a PTN network service, and traversing each service in the PTN network service set, and establishing a service path for each service route, which is obtained corresponding to N service paths of N services; configure a protection ring suitable for multiple services for each link in each of the N service paths; and have passed any link of multiple service paths in the N service paths
  • the configuration of the protection circle, the establishment of two protection paths, and the two protection paths respectively provide protection for the link service set of the protection circle, and the beneficial effects are: for the inseparable characteristics of the PTN service traffic, for the service
  • the working LSP provides P-cycle protection, and the configured P-cycle can provide approximately 2 times more efficient protection for the failed link, effectively improving the utilization of the network bandwidth.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

La présente invention concerne un procédé et un dispositif de protection d'un service réseau RTP et porte, à l'intérieur du domaine de planification et de conception de réseaux de communication, sur une technologie de planification de service réseau RTP sur la base de protection par p-cycles. Le procédé comprend les étapes consistant à : établir une voie dans chaque service à l'intérieur d'un groupement de service réseau RTP, établir un trajet de service pour chaque voie de service, et obtenir N voies de service correspondant à N services; configurer, pour chaque liaison à l'intérieur de chaque trajet de service de chacun des N trajets de services, un anneau de protection approprié pour de multiples services; établir deux trajets de protection pour des anneaux de protection déjà configurés d'une liaison quelconque à travers laquelle passent de multiples trajets de service des N trajets de service, et assurer au moyen de ces deux trajets, respectivement, la protection aux groupements de service de liens desdits anneaux de protection. La présente invention utilise avantageusement les caractéristiques indivisibles d'un flux de services RTP et une protection hautement efficace par un anneau P pour configurer une protection par anneau P à deux trajets de protection pour des liaisons de croisement de protection et augmenter ainsi les taux d'utilisation de bande passante de réseau.
PCT/CN2014/079990 2013-12-20 2014-06-16 Procédé et dispositif pour protéger un service réseau rtp WO2014180448A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310714895.0 2013-12-20
CN201310714895.0A CN104734950B (zh) 2013-12-20 2013-12-20 一种对ptn网络业务进行保护的方法及装置

Publications (1)

Publication Number Publication Date
WO2014180448A1 true WO2014180448A1 (fr) 2014-11-13

Family

ID=51866828

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/079990 WO2014180448A1 (fr) 2013-12-20 2014-06-16 Procédé et dispositif pour protéger un service réseau rtp

Country Status (2)

Country Link
CN (1) CN104734950B (fr)
WO (1) WO2014180448A1 (fr)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016078218A1 (fr) * 2014-11-19 2016-05-26 中兴通讯股份有限公司 Procédé, appareil d'identification automatique de point de détection de réseau en anneau et support de stockage
CN106302149A (zh) * 2016-08-30 2017-01-04 成都科来软件有限公司 一种基于业务逻辑对多通信路径分析的方法及装置
CN111865627A (zh) * 2019-04-25 2020-10-30 ***通信集团河北有限公司 传输组网评估方法、装置、计算设备及计算机存储介质
CN113364619A (zh) * 2021-06-03 2021-09-07 湖北工业大学 一种分组传送网建立方法及***

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104967477B (zh) * 2015-06-26 2018-03-13 南京邮电大学 基于多播业务的光网络智能p圈保护方法
CN106487546B (zh) * 2015-08-26 2020-06-05 中兴通讯股份有限公司 一种dcn功能配置方法及装置
CN106549788B (zh) * 2015-09-21 2020-11-13 中兴通讯股份有限公司 业务保护变迁方法及装置
CN105577435A (zh) * 2015-12-21 2016-05-11 中国联合网络通信集团有限公司 一种p圈的配置方法及设备
CN109831380B (zh) * 2019-02-25 2021-07-20 国网江苏省电力有限公司苏州供电分公司 一种电力通信业务的路径保护方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1588882A (zh) * 2004-09-23 2005-03-02 上海交通大学 预置保护圈的保护倒换方法
EP1921808A1 (fr) * 2006-11-10 2008-05-14 Lucent Technologies Inc. Méthode de protection de services de données par transmission avec préemption
CN102480368A (zh) * 2010-11-22 2012-05-30 中兴通讯股份有限公司 一种聚合链路的保护方法及***
CN102916842A (zh) * 2012-11-06 2013-02-06 烽火通信科技股份有限公司 利用多种保护方式叠加实现ptn设备双归保护的方法

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1330129C (zh) * 2004-09-23 2007-08-01 上海交通大学 基于多容量的预置保护圈网络保护方法
CN101494473B (zh) * 2009-03-04 2013-12-11 北京邮电大学 一种基于资源并考虑保护时间控制的wdm光网络圈保护方法
CN102123003A (zh) * 2010-12-23 2011-07-13 北京邮电大学 一种用于光网络保护的预置圈启发式构造方法
CN103259590B (zh) * 2013-05-27 2015-12-09 重庆邮电大学 一种基于2跳段的光组播静态p圈段保护方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1588882A (zh) * 2004-09-23 2005-03-02 上海交通大学 预置保护圈的保护倒换方法
EP1921808A1 (fr) * 2006-11-10 2008-05-14 Lucent Technologies Inc. Méthode de protection de services de données par transmission avec préemption
CN102480368A (zh) * 2010-11-22 2012-05-30 中兴通讯股份有限公司 一种聚合链路的保护方法及***
CN102916842A (zh) * 2012-11-06 2013-02-06 烽火通信科技股份有限公司 利用多种保护方式叠加实现ptn设备双归保护的方法

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016078218A1 (fr) * 2014-11-19 2016-05-26 中兴通讯股份有限公司 Procédé, appareil d'identification automatique de point de détection de réseau en anneau et support de stockage
CN106302149A (zh) * 2016-08-30 2017-01-04 成都科来软件有限公司 一种基于业务逻辑对多通信路径分析的方法及装置
CN111865627A (zh) * 2019-04-25 2020-10-30 ***通信集团河北有限公司 传输组网评估方法、装置、计算设备及计算机存储介质
CN113364619A (zh) * 2021-06-03 2021-09-07 湖北工业大学 一种分组传送网建立方法及***

Also Published As

Publication number Publication date
CN104734950A (zh) 2015-06-24
CN104734950B (zh) 2019-04-26

Similar Documents

Publication Publication Date Title
WO2014180448A1 (fr) Procédé et dispositif pour protéger un service réseau rtp
Davoli et al. Traffic engineering with segment routing: SDN-based architectural design and open source implementation
EP2911348B1 (fr) Découverte de dispositif de commande dans des réseaux ayant des dispositifs d'acheminement et de commande distincts
Astaneh et al. Optimization of SDN flow operations in multi-failure restoration scenarios
US9602387B2 (en) Network topology optimization
JP4828865B2 (ja) トラフィック・パターン可変性と独立な効率的で堅牢なルーティング
CN104704759B (zh) 基于波分复用(wdm)的光网络的传送功能虚拟化
KR102123035B1 (ko) 802.1aq에 대한 3 스테이지 폴딩된 clos 최적화
US20130308444A1 (en) Method and apparatus for determining paths between source/destination pairs
US9807035B1 (en) Using available bandwidths of an IP fabric to intelligently distribute data
KR20100112144A (ko) 최단 경로 결정시의 타이브레이킹
IL230202A (en) Method and provision for flexible routing control traffic in a distributed architecture system
Muthumanikandan et al. Link failure recovery using shortest path fast rerouting technique in SDN
US20110129222A1 (en) System and method for optical bypass routing and switching
JP5869041B2 (ja) ネットワークトポロジ要求を物理ネットワークにマッピングする方法、コンピュータプログラム製品、モバイル通信システム及びネットワーク構成プラットフォーム
CN101909004B (zh) 基于边缘roadm环结构的多域光网络路由方法
CN113242179A (zh) 一种基于sdn的sr路径计算和标签栈生成的方法及sdn控制器
JP2018037983A (ja) 経路変換制御装置、経路変換制御方法および経路変換制御プログラム
Alexandrovich et al. Proactive backup scheme of routes in distributed computer networks
Bhatia et al. Bandwidth guaranteed routing with fast restoration against link and node failures
Wang et al. Reliability as an interdomain service
CN110300426A (zh) 一种无线自组网中路由选择方法及装置
EP2898626A1 (fr) Procédé et système de prise en charge de gestion dynamique de ressources dans un réseau de raccordement
Zhang et al. Survivable path computation in PCE-based multi-domain networks
Bai et al. A Distributed Congestion Mitigation Mechanism Based on Neighboring Nodes Traffic Steering

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14795498

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14795498

Country of ref document: EP

Kind code of ref document: A1