Full-mesh link protection method and device, equipment and storage medium

A full mesh and link technology, applied in data exchange network, digital transmission system, electrical components, etc., can solve problems such as no link available, service interruption, etc., to ensure normal communication, stability and robustness Effect

Active Publication Date: 2019-11-05
北京东土军悦科技有限公司
View PDF2 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the working link cannot be restored, and the protection link fails again at this time, there will be no link available, resulting in service interruption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Full-mesh link protection method and device, equipment and storage medium
  • Full-mesh link protection method and device, equipment and storage medium
  • Full-mesh link protection method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] image 3 It is a flow chart of the full-mesh link protection method provided by Embodiment 1 of the present invention. This embodiment is applicable to the case of full-mesh topology link protection. The method can be implemented by a full-mesh link protection device To execute, the device may be implemented by software and / or hardware, and the device may be integrated into the core device. Specifically, the method may be performed by an ingress node on an LSP in each direction on the tunnel. Such as image 3 As shown, the method specifically includes the following steps:

[0051] S310. Determine one working link and at least two protection links according to networking conditions.

[0052] Among them, the networking situation includes the application scenario of the networking, the number of nodes in the networking, and physical link information. Establish a protection group between two nodes, such as between two PE (Provider Edge, network side edge) devices in the...

Embodiment 2

[0066] On the basis of the above-mentioned embodiments, this embodiment describes several situations of selecting the best link in the full-mesh link protection method.

[0067] (1) At the moment when no link fails or no link recovers from the failure, periodically select the best link from the links in the protection group except the current working link and the current failure link; wherein, the protection The group initially includes one working link and at least two protection links. That is, when no link fails or no link recovers from the failure, the selection of the best link is triggered when the preset period is reached.

[0068] (2) When a link fails, if the current working link fails, switch the service to the current best link so that the current best link is the current working link, and remove the current working link from the protection group The best link is selected from the links other than the failed link and the current failed link.

[0069] (3) When a li...

Embodiment 3

[0082] This embodiment provides a specific example of a full-mesh link protection method on the basis of the foregoing embodiments. by figure 2 The full mesh topology shown in the figure is taken as an example for illustration. The access device 1 communicates with the access device 2, and uses MPLS (Multi-Protocol Label Switching, Multi-Protocol Label Switching, Multi-Protocol Label Switching) OAM between the core devices to detect link connectivity.

[0083] Such as Figure 4 As shown, it is a schematic diagram of a normal communication model of the core network, the ingress node of the LSP is the core device 1, and the egress node is the core device 4. Make sure the working link is core device 1->core device 4, and the four protection links are: core device 1->core device 2->core device 4, core device 1->core device 3->core device 4, core device 1->core device 3->core device 2->core device 4, core device 1->core device 2->core device 3->core device 4. That is, this emb...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a full-mesh link protection method and device, equipment and a storage medium, and the method comprises the steps: periodically selecting an optimal link fromlinks, except a current working link and a current fault link, in a protection group at a moment when no link has a fault or no link is recovered from the fault, wherein the protection group initially comprises a working link and at least two protection links; and at the moment when the link breaks down, if the current working link breaks down, switching the service to the current optimal link toenable the current optimal link to be the current working link, and selecting the optimal link from the links except the current working link and the current faulty link in the protection group. Aiming at the full-mesh network requirement, 1: N linear protection is realized, the maximum redundancy protection between equipment and between links can be ensured, and the stability and robustness of the network are ensured.

Description

technical field [0001] The embodiment of the present invention relates to the link redundancy protection technology of Ethernet multi-label, in particular to a full mesh link protection method, device, equipment and storage medium. Background technique [0002] The existing packet transport network (Packet Transport Network, referred to as PTN) network technical specifications are aimed at link and label switching path (Label Switching Path, referred to as LSP) redundancy protection for the ring network, for the full mesh (full mesh) mesh) does not propose a clear technical solution for the link protection in the network. Network resources are fixed and limited, and failure of any device node or link is fatal. Therefore, for resource network construction, redundancy protection is the top priority of data communication. [0003] figure 1 Is the network topology schematic diagram (ring network) of the PTN technical specification of the prior art, for figure 1 As shown in th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24
CPCH04L41/0668H04L41/12
Inventor 李广鹏李京河程宏翔
Owner 北京东土军悦科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products