CN1157986C - Telecommunication system based on group and its node, method for trigger data trselecting route and bynass fault - Google Patents

Telecommunication system based on group and its node, method for trigger data trselecting route and bynass fault Download PDF

Info

Publication number
CN1157986C
CN1157986C CNB971823472A CN97182347A CN1157986C CN 1157986 C CN1157986 C CN 1157986C CN B971823472 A CNB971823472 A CN B971823472A CN 97182347 A CN97182347 A CN 97182347A CN 1157986 C CN1157986 C CN 1157986C
Authority
CN
China
Prior art keywords
node
domain
path
bypass
identifier
Prior art date
Application number
CNB971823472A
Other languages
Chinese (zh)
Other versions
CN1265258A (en
Inventor
K・阿马德
K·阿马德
马丁
Y·叶
D·W·马丁
Original Assignee
北方电讯有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北方电讯有限公司 filed Critical 北方电讯有限公司
Priority to CNB971823472A priority Critical patent/CN1157986C/en
Publication of CN1265258A publication Critical patent/CN1265258A/en
Application granted granted Critical
Publication of CN1157986C publication Critical patent/CN1157986C/en

Links

Abstract

一种诸如ATM的基于分组的电信系统,一条主数据路径和至少一条旁路路径,旁路路径用于旁路一部分数据路径,该部分和其各自的旁路限定一保护域,该系统包括每个域的节点,该节点用于监视各个域和向其它下行节点发送分组形式的告警和表示产生告警的各个域的域标识符。 Packet-based telecommunications system, such as ATM, a main data path and at least one bypass path, a bypass path for bypassing a portion of the data path, the portion and its respective bypass defining a protection domain, the system comprising per domain node, the node for monitoring respective domains and alarm transmission packet forms a domain identifier indicating the respective domain generates alarms to other downstream nodes. 在给定的其中一个节点,检测从给定节点的上行节点发送的告警和相应的标识符。 Wherein a given node, the alarm detection and corresponding identifiers transmitted from the upstream node of a given node. 在给定节点,根据检测的域标识符,确定是否触发数据沿其中一条旁路路径重新选择路由,该旁路路径旁路由给定节点监视的域。 In a given node, in accordance with the detected domain identifier, wherein determining whether the trigger data along a bypass path re-routing, the bypass path bypassing the node monitored by a given domain. 使用该标识符,下行节点可以更容易地确定告警是否由具有另一个上行节点触发的旁路路径的域所引起。 Using the identifier, the downstream node can determine more easily whether the alarm is caused by domains having a bypass upstream path to another node triggered. 因此可以克服不必要触发的问题,不会由于节点必须提取告警、修改告警和发送告警而增加过多的复杂性、费用、和速度的恶化。 It can overcome the problem of unnecessary triggered, the alarm will not be because the node must extract, modify and send alerts and alarms to increase the complexity of the excessive deterioration costs, and speed.

Description

基于分组的电信系统和其节点、 触发数据重新选择路由和旁路故障的方法 And bypass faults rerouting a packet-based telecommunications system and its node, the trigger data method

技术领域 FIELD

本发明涉及在基于分组的电信系统中触发数据重新选择路由的方法、在该系统中旁路故障的方法、该系统和用于该系统的节点、和用于该方法和该节点或系统的软件。 The present invention relates to a method of triggering a data packet based telecommunication system, rerouting, in which system fault bypass method, the system and a node of the system, method, and software for the system and the node or .

背景技术 Background technique

正如在ITU的WP 3/13报告C0M 13-R 7(1997年3月)附录5“ATM网络生命力的结构和原理”所解释的,网络生命力可以分成两个较宽的范畴:保护和恢复。 As reported in the ITU WP 3/13 C0M 13-R 7 (March 1997) APPENDIX 5 "ATM network architecture and principles vitality" explained, the vitality of the network can be divided into two broad categories: protection and restoration. 恢复包括具有分布控制但不使用完全专用的旁路资源的重新配置、集中控制和自愈。 Recovery includes the use of distributed control, but not completely dedicated bypass resources reconfiguration, having a centralized control and self-healing. 本发明涉及保护,对于运行速度来说,保护具有分布式控制结构和专用的旁路路径。 The present invention relates to a protection for the operating speed, the protection structure having a distributed control and dedicated bypass paths.

保护转换涉及最小化数据业务量的中断,代价是昂贵地提供具有自由带宽的专用路径以使数据业务量在必要时立即转换到自由路径。 Protection switching involves minimizing disruption to data traffic, it can be costly to provide a dedicated path to a free bandwidth to enable data traffic when necessary to immediately convert the free path. 当带宽和数据传输可靠性的需求增加时,日益变得重要的一个约束在于例如出现故障时检测需要转换到触发保护的延时。 When increased bandwidth and data transmission reliability requirements, constraints become increasingly important, for example, that required for conversion to delay trigger is detected when failure protection.

另外,保护转换可以出现在网络等级系列的不同层。 In addition, protection switching can occur at different layers of the network level series. 各层之间的协调是必要的。 Coordination between the layers is necessary. 另外,由于连接是通过较长的距离完成的,所以对于增加的速度和资源的有效使用,特别是在网络等级系列的较低层,从目的地的监视器把触发传送到保护转换发生的信源的延时意味着已经使用了分段的保护转换。 Further, since the connecting channel is completed by a longer distance, it is effective for increasing the speed and use of resources, particularly in the lower layer network level series, from the destination to transmit monitor to trigger protection switching occurs the delay means that the source has been used for protection switching segment.

在监视多个分段的情况下,可能有必要发送告警显示信号(AIS)警示下行监视器已经识别到故障,所以作为第一次下行故障传播的结果,下行监视器不需要产生其自己的告警。 In the case of monitoring a plurality of segments may be necessary to send an alarm display signal (AIS) has been identified to monitor downlink warning fault, so as a result of the first fault propagation downlink, do not need to generate its own downlink monitor alarm .

尽管下面的描述将利用ATM网以表示本发明的原理,但很明显本发明的原理例如对帧中继具有较宽的适用性或对诸如IP的无连接网进行适当的修改。 Although the following description will utilize the ATM network to show the principle of the present invention, it is clear that the principles of the present invention have a wide applicability to, for example, frame relay or IP network, such as a connectionless appropriate modifications.

在US 5 461 607(Miyagi等)中表示了当检测到故障时在ATM层AIS信元的插入。 In the US 5 461 607 (Miyagi et) indicates when a fault is detected AIS is inserted in the ATM layer cell. 在US 5 343 462(Sekihata等)中表示了故障标识如何向上通过网络等级系列层从物理层和传输层向上通过ATM层传播到数据终端设备。 In the US 5 343 462 (Sekihata etc.) shows how the fault identifier upwardly through the series of layers from the physical network level and transport layers up through the ATM layer to a data terminal equipment propagated. 处理分组形式的告警而不是较低层数据,和在分组层进行旁路使得在更细化(granular)的层上以连接为基础安排旁路路径成为可能,而不须旁路链路上的所有数据。 Processing the packet in the form of an alarm instead of the lower layer data, and bypassing the packet layer on the layer so that a more refined (Granular) arranged to connect the bypass path based possible, without having to bypass link All data. 这意味着这些路径的提供将更有效和灵活,例如可以区别和分配专用的空闲旁路路径给较高优先权的连接。 This means that these paths will be more efficient and flexible, for example, the difference between the idle and dedicated allocated to a bypass path connecting the higher priority. 而较低优先权的连接或相对不灵敏的连接只得等待直到其它的业务量释放其旁路路径。 Is connected to lower priority connections or only relatively insensitive to wait until other traffic releases its bypass path. 在分组层应当保持引起旁路触发的告警以避免破坏把告警沿等级系列向上传送但从不向复用更多数据的下面传送。 It should be kept in the packet layer caused by the bypass alarm is triggered to prevent damage to the alarm transfer in a graded series of up to but not below the multiplexed transmit more data.

1997年6月16-20日意大利Turino的ITU会议著作Q6/13 D47中描述了沿提供多个受保护分段的ATM VP出现不必要的保护转换的问题。 1997 Turino, Italy 16-20 June meeting of ITU works Q6 / 13 D47 describes a number of issues in providing a protected segment of ATM VP unnecessary protection switching. 表示了在一个以上的信宿检测到AIS信元的例子。 In the above example shows a sink AIS cell is detected. 信宿从AIS中不能确定故障是在其保护分段内,还是在其保护分段之前。 AIS sink can not be determined from the fault is within its protection segment, or before the protective segment. 在触发保护前,如果存在任何消息对话确定该答案,或者如果实行失去同步(hole off)以等待和证实在前一个分段还没由保护路径旁路掉故障,则延时将违反快速保护转换的要求。 Before trigger protection, if there is any message conversations to determine the answer, or if implemented out of sync (hole off) to wait and confirm the previous segment did not pass out from the protection path fails, the delay would violate the fast protection switching requirements.

1997年6月16-20日Turino的ITU会议著作Q6/13 D49中表示了对该问题的一种解决方案。 1997 16-20 June Turino meeting of ITU works Q6 / 13 D49 expressed a solution to this problem. 出故障时,一个AIS信元被插入并被发送到连接的终端。 When a failure, a AIS cell is inserted and sent to the terminal connection. 在出现故障的分段的最后填充信元中的一个比特。 A bit in the final segmentation cell is filled in the failed. 包含故障的域的信宿触发转换到旁路故障的保护。 Sink domain comprises triggering a fault bypass switch to the protection fault. 沿着该连接的其它信宿继续传送AIS信元,但知道如果它们检测到AIS信元中的填充比特时不用触发它们的保护转换。 AIS cells continue to transmit along the other of the sink connection, but know not to trigger their protection switching if they detect the padding bits in the AIS cell.

在上面提到的ITU会议的著作D48中,提供了嵌套式保护方案。 In the book D48 ITU conference mentioned above, it provides nested protection schemes. 信元通过记录其通过多少个信源或信宿来保存嵌套层,以使正确的信宿如愿触发其保护,该信宿或者是嵌套式保护方案最内层的信宿,或者是覆盖故障部分的任何其它的信宿。 Cell which is preserved by the recording by the number of the source or sink nested, so that the correct sink to do so triggers its protection, the sink or nested protection schemes innermost sink, or any covering part of the fault other sink.

从6月16-20日意大利Turino的Q6/13 ITU会议著作D50中得知,在ete AIS信元的信息字段的故障类型标识符字节内修改比特以实现嵌套层状态的记录。 Turino, Italy from that of Q6 / 13 ITU meeting 16-20 June D50 works in bits to modify the state of the recording layer implement nested within the identifier byte information field of the fault type ete AIS cell.

所有这些已知方案的一个问题在于需要每个分段有能力提取、修改和再次插入。 A problem with all of these known solutions is the need to have the ability to extract each segment, modifications, and reinserted. 这导致更高的复杂性和费用,并可能延迟数据业务量的吞吐,尤其是在业务量没被中断时。 This leads to a higher complexity and cost, and may delay the data traffic throughput, especially in the volume of business has not been interrupted.

在US 5,212,475中,表示了一种同步数字网,其中当识别到故障时在物理层产生一种告警禁止信号。 In the US 5,212,475 shows a synchronous digital network, wherein when a fault is detected an alarm to produce a disable signal in the physical layer. 故障的定位返回报告给中心网络管理系统。 Locating faults reported back to the central NMS. 下行发送禁止信号以禁止下行告警发生器。 A downlink transmission disable signal to disable the downlink alert generator. 通过插入故障地址信息修改该信号。 The fault signal is modified by inserting address information. 下行信号分配器识别该地址并利用它来确定是否把故障报告消息送回中心网络管理系统。 Downlink signal distributor recognizes the address and use it to determine whether the fault report message back to the central network management system. 如果地址在前一个分配器之前的分段中,它们不做这些。 If the address of a segment before the previous dispenser, they do not do this. 这意味着告警禁止信号不禁止来自其它下行故障的真正的告警。 This means that the alarm disable signal does not prohibit real alarms from other downstream failures. 但是这种方案不提供对许多应用来说足够快的保护转换。 However, this scheme does not provide for many applications fast enough protection switching. 另外,需要每个分段能提取和修改禁止信号,导致增加的复杂性,特别是对高速系统。 Further, each segment needs to be able to extract and modify the inhibit signal, leads to increased complexity, particularly for high-speed systems. 该文献没有提到在分组层的保护。 The document does not mention the protective layer packet.

发明内容 SUMMARY

本发明的目的是提供改进的方法和装置。 Object of the present invention is to provide an improved method and apparatus.

根据本发明的一个方面,提供一种在基于分组的电信系统中触发数据重新选择路由的方法,该系统包括一条主数据路径和至少一条旁路路径,旁路路径用于旁路一部分数据路径,该部分和其各自的旁路限定一保护域并在上行终端具有共同的信源节点和在下行终端具有共同的信宿节点,该系统包括每个域的节点,该节点用于监视各个域和向其它下行节点发送分组形式的告警和表示产生告警的各个域的域标识符,该方法包括步骤:在信宿节点检测从信宿节点的上行节点发送的告警和相应的域标识符;在信宿节点,根据检测的域标识符,确定是否触发数据沿其中一条旁路路径重新选择路由,该旁路路径旁路由信宿节点监视的域。 According to one aspect of the present invention, there is provided a method of triggering a rerouting of data in a packet-based telecommunications system, the system comprising a main data path and at least one bypass path, a bypass path for bypassing a portion of the data path, and the portion of its respective bypass defining a protection domain and having a common source terminal and a node upstream of the sink node having a common terminal on the downlink, the system includes a node for each domain, the domain of each node and for monitoring the other downstream node sends a packet in the form of an alarm indicating generate a domain identifier for each domain of the alarm, the method comprising the steps of: the alarm and the corresponding domain identifier and destination node detects the transmission from the uplink node sink node; at the sink node, in accordance with detected domain identifier, wherein determining whether the trigger data along a bypass path re-routing, the bypass path bypassing monitored by the sink node domain.

使用标识符的优点在于下行节点可以更容易地确定告警是否由具有另一个上行节点触发的旁路路径的域所引起。 The advantage of using the identifier is that downstream nodes can determine more easily whether the alarm is caused by domains having a bypass upstream path to another node triggered. 因此可以克服上述不必要触发的问题,不会由于节点必须提取告警、修改告警和发送告警而增加过多的复杂性、费用、和速度的恶化。 Therefore, the above problems can be overcome unnecessary triggered, the alarm will not be because the node must extract, modify and send alerts and alarms to increase the complexity of the excessive deterioration costs, and speed. 另外,使用标识符为简单的或嵌套式保护转换提供了统一的解决方案。 In addition, using the identifier provides a unified solution for simple or nested protection switching. 另一个优点在于为了其它目的可以使用更精确的定位信息。 Another advantage is that may be used for other purposes a more accurate positioning information.

有益的是,通过把告警插入到要发射的数据中把告警发送到下行节点。 Advantageously, the alarm is inserted into the data to be transmitted in the alert sent to downstream nodes. 这因为不需要使用专用网可以降低费用和增加到其它节点的传输速度。 This is because no dedicated network can reduce costs and increase the transmission speed of the other nodes.

有益的是,该系统是面向连接的,不需要建立新的连接就能完成重新选择路由。 Advantageously, this system is connection-oriented, no new connections can be done to re-routing. 这使得在较少中断数据的情况下完成重新选择路由,因为存在由建立新连接所涉及的信令引起的大量的延时。 This allows the complete re-routing of data with less interruption, because there are a lot of signaling to establish a new connection by the delay involved due.

有益的是,系统包括嵌套的域,该方法包括确定在嵌套域的内层,主路径和旁路路径出现故障,和确定应当触发外层还未触发的一个域的旁路的步骤。 Advantageously, the system comprises nested domains, the method comprising determining in an inner nested domains, the main path and the bypass path fails, and the step of determining a domain of outer bypass yet triggered should be triggered. 如果使用标识符这会很容易,因为在现有技术修改比特的方案中,外层域的信宿节点无法区分来自内层域的两条路径的告警。 If this identifier will be very easy, because in the prior art modified bit scheme, the sink node can not distinguish between the outer domain alarms from the two paths in the inner domain.

给定的节点最好包括表示域可以由一个以上的旁路路径旁路的优先权的存储数据库,和确定是否根据存储的优先权另外进行触发的步骤。 Preferably given node may include a field indicating a priority of a database stored in one or more bypass bypass path, and the step of determining whether to trigger further stored according to priority. 这使得更有效和自动地处理嵌套或重叠的旁路路径。 This makes the process more efficient and automatic nested or overlapping bypass path. 可以保持触发的速度。 You can maintain the speed trigger. 可以想象,可以对标识符编码以便对标识符执行某种算法以确定是否触发,而不需要参考存储的数据库。 Imagine, an identifier can be encoded in order to perform some kind of algorithm identifiers to determine whether the trigger, without referring to the stored database.

根据本发明的另一个方面,提供一种在基于分组的电信系统中旁路故障的方法,该系统包括一条主数据路径和至少一条旁路路径,旁路路径用于旁路一部分数据路径,该部分和其各自的旁路限定一保护域并在上行终端具有共同的信源节点和在下行终端具有共同的信宿节点,该系统包括每个域的节点,该节点用于监视各个域和向其它下行节点发送分组形式的告警和表示产生告警的各个域的域标识符,该方法包括步骤:在信宿节点检测从信宿节点的上行节点发送的告警和相应的域标识符;在信宿节点,根据检测的域标识符,确定是否触发数据沿其中一条旁路路径重新选择路由,该旁路路径旁路由信宿节点监视的域;和根据该触发数据沿旁路路径重新选择路由。 According to another aspect of the invention, there is provided a packet-based telecommunications system, a method of bypassing a fault, the system comprising a main data path and at least one bypass path, a bypass path for bypassing a portion of the data path, the and each bypass portion defining a protection domain and having a common source terminal and a node upstream of the sink node having a common terminal on the downlink, the system includes a node for each domain, the domain of each node for monitoring and to other downstream node sends a packet in the form of an alarm indicating generate a domain identifier for each domain of the alarm, the method comprising the steps of: the alarm and the corresponding domain identifier and destination node detects the transmission from the uplink node sink node; the sink node according to the detected domain identifier, wherein determining whether to trigger a bypass data path in the rerouting, the bypass path bypassing monitored by the sink node domain; and a rerouting along a bypass path according to the trigger data.

根据本发明的另一个方面,提供一种在计算机可读媒体上的软件,该软件用于实现在基于分组的电信系统中触发数据重新选择路由的方法,该系统包括一条主数据路径和至少一条旁路路径,旁路路径用于旁路一部分数据路径,该部分和其各自的旁路限定一保护域并在上行终端具有共同的信源节点和在下行终端具有共同的信宿节点,该系统包括每个域的节点,该节点用于监视各个域和向其它下行节点发送分组形式的告警和表示产生告警的各个域的域标识符,该方法包括步骤:在信宿节点检测从信宿节点的上行节点发送的告警和相应的域标识符;在信宿节点,根据检测的域标识符,确定是否触发数据沿其中一条旁路路径重新选择路由,该旁路路径旁路由信宿节点监视的域。 According to another aspect of the invention, there is provided a software on a computer readable medium, the software used to implement the method of triggering the data packet based telecommunication system, the re-routing, the system comprising a main data path and at least one a bypass path, a bypass path for bypassing a portion of the data path, the portion and its respective bypass defining a protection domain and having a common source terminal and a node upstream of the sink node having a common terminal on the downlink, the system comprising each domain node, the node for monitoring respective domains and the transmission packet generated in the form of alarms domain identifier indicating the respective domain alarms to other downstream nodes, the method comprising the steps of: detecting the sink node from a node upstream of the sink node alarm and corresponding domain identifier transmitted; at the sink node according to the detected domain identifier, wherein determining whether the trigger data along a bypass path re-routing, the bypass path bypassing monitored by the sink node domain.

根据本发明的另一个方面,提供一种基于分组的电信系统中的节点,该系统包括一条主数据路径和至少一条旁路路径,旁路路径用于旁路一部分数据路径,该部分和其各自的旁路限定一保护域并在上行终端具有共同的信源节点和在下行终端具有共同的信宿节点,该系统包括每个域的节点,该节点用于监视各个域和向其它下行节点发送分组形式的告警和表示产生告警的各个域的域标识符,该节点包括:在信宿节点检测从信宿节点的上行节点发送的告警和相应的域标识符的装置;在信宿节点,根据检测的域标识符,确定是否触发数据沿其中一条旁路路径重新选择路由的装置,该旁路路径旁路由信宿节点监视的域。 According to another aspect of the invention, there is provided a packet-based telecommunications system node, the system comprising a main data path and at least one bypass path, a bypass path for bypassing a portion of the data path, the portion and its respective bypass defining a protection domain and having a common source terminal and a node upstream of the sink node having a common terminal on the downlink, the system includes a node for each domain, the domain of each node for monitoring and sending packets to other nodes downstream in the form of an alarm indicating generation area identifier of each domain alarms, the node comprising: an alarm and corresponding device domain identifier of the destination node detects the transmission from the uplink node sink node; the sink node, the domain identifier according to the detected character, determining whether the trigger data along a bypass path which re-route selection device, the bypass path bypassing monitored by the sink node domain.

根据本发明的另一个方面,提供一种基于分组的电信系统,该系统包括一条主数据路径和至少一条旁路路径,旁路路径用于旁路一部分数据路径,该部分和其各自的旁路限定一保护域并在上行终端具有共同的信源节点和在下行终端具有共同的信宿节点,该系统包括每个域的节点,该节点用于监视各个域和向其它下行节点发送分组形式的告警和表示产生告警的各个域的域标识符,该系统包括:在信宿节点检测从信宿节点的上行节点发送的告警和相应的标识符的装置;在信宿节点,根据检测的域标识符,确定是否触发数据沿其中一条旁路路径重新选择路由的装置,该旁路路径旁路由信宿节点监视的域。 According to another aspect of the invention, there is provided a packet-based telecommunications system, the system comprising a main data path and at least one bypass path, a bypass path for bypassing a portion of the data path, the portion and the respective bypass their defining a protection domain and having a common source terminal and a node upstream of the sink node having a common terminal on the downlink, the system includes a node for each domain, the alarms for monitoring respective domains and a node transmits a downlink packet to other nodes in the form of indicating generate a domain identifier for each domain of the alarm, the system comprising: an alarm and a corresponding device identifier transmitted from the upstream node and destination node in the destination node is detected; at the sink node, based on the domain identifier detected, determining whether wherein the trigger data along a bypass path re-route selection device, the bypass path bypassing monitored by the sink node domain.

对于本领域技术人员来说很明显,可以组合优选的特征,并且可以组合优选的特征和本发明的任一个方面。 The skilled person will be apparent, preferred features may be combined and may be a combination of any of the preferred features and aspects of the invention.

为了通过例子表示如何实现本发明,现在将参照附图更详细地描述实施例。 To show how the invention by way of example, will now be described in more detail with reference to the accompanying examples.

附图说明 BRIEF DESCRIPTION

图1和图2以示意的形式表示了数据传输系统;图3表示了ATM网的网络等级系列的各层; 1 and FIG. 2 shows a data transmission system in schematic form; FIG. 3 shows a series of layers of network level ATM network;

图4以示意的形式表示了本发明节点的实施例;图5以示意的形式表示了图4节点的触发操作;图6以示意的形式表示了节点告警检测/触发功能;图7以示意的形式表示了节点管理功能;和图8以示意的形式表示了现有技术触发产生方案。 Figure 4 shows in schematic form an embodiment of a node of the present invention; FIG. 5 shows a triggering operation of FIG. 4 nodes in schematic form; FIG. 6 shows the node alarm detection in schematic form / trigger functions; FIG. 7 is a schematic of Representation node management functions; and Figure 8 shows a prior art trigger generation scheme in schematic form.

具体实施方式 Detailed ways

图1和图2表示了可以应用本发明的网络。 1 and FIG. 2 shows a network of the present invention can be applied. 在这些实施例中,以传统AIS信元的形式发出告警。 In these embodiments, an alarm in the form of a conventional AIS cell. 为了开始保护转换,故障定位字段用作识别按保护域分组的一个或多个分段的标识符以便能使用在ITU-T建议I610中所描述的现有的AIS原理。 To begin protection switching, fault location field is used as the identification with one or more protection domains segment identifier for packets can be used in a conventional ITU-T Recommendation I610 AIS principles described. 参考该文献,该文献详细描述了AIS信元的格式、如何使用AIS信元、和故障管理、性能管理、和系统管理使用多少种OAM(操作和管理)信元。 Referring to this document, this document describes in detail the format of the AIS cell, how AIS cell, and fault management, performance management, and system management how many OAM (Operations and Management) cell used.

在ATM保护转换中所讨论的一个问题是在触发原理中保护域的识别。 One problem in the ATM protection switching is discussed in the recognition domain of protection in principle trigger. 值得注意的是AIS信元具有已经定义的故障定位标识符字段(目前在I.610中故障定位标识符字段的使用是可选的)。 It is noted that AIS cell has a fault location identifier field already defined (currently used I.610 fault location identifier field is optional).

在正常的AIS信元中使用故障定位字段以便识别保护域的实施例中,当产生AIS信元时,为了检测故障,按照I.610的定义应当在信元中填充相应的定位ID。 Use Fault Location field in a normal AIS cell to identify protection domains in the embodiment, when a AIS cell is generated, in order to detect a failure, as defined by I.610 corresponding positioning should be filled in the cell ID. 在每个保护域终端的信宿节点将检验输入的AIS信元的定位字段以便通过比较定位ID和规定的值确定AIS是否在该域内产生。 AIS cell in each sink node of the protection domain test input terminal location field to determine whether the AIS generation ID and domain locating by a predetermined value comparison.

该触发原理符合I.610定义,并且不改变由AIS信元提供的任何信息。 The trigger consistent with the principles I.610 definitions, and does not change any of the information provided by the AIS cell. 定位消息甚至可用于明确表示修理业务的故障定位。 Positioning messages can even be used to clear the fault location and repair business.

该触发原理需要使每个信宿节点知道其包含节点ID和保护等级系列(对于嵌套式保护)的保护域。 The trigger sink principle requires that each node knows the node ID and comprising a series of protection levels (for nested protection) protection domain. 当建立保护域时,在任何情况下网络管理系统都能得到该信息。 When establishing protection domains, under any circumstances NMS can get the information.

不同于现有技术的原理,通过使用AIS信元的故障定位字段(DLF),以使保护转换触发可以以相同的方式在所有的保护方案中工作。 Unlike the prior art principle, by using AIS cell fault location field (DLF), so that the protective conversion trigger can operate in the same manner in all of the protection scheme.

所涉及的全部步骤如下:步骤1.当电信网络管理器(TNM)配置或重新配置保护域时,TNM使用PDE格式以便在每个节点的本地数据库定义保护域和保护等级系列。 All steps involved are as follows: Step 1. When Telecommunications Network Manager (the TNM) configuration or reconfiguration when the protection domain, TNM using PDE format to define the protection domain and the local database protection level of each node in the series.

步骤2.当产生AIS信元时,按照I.610的定义出现中断期的定位ID填充到AIS的故障定位字段(DLF)中。 Step 2. When the AIS cell is generated, the interrupt location of the fault location ID field is filled into the AIS (DLF) occurred as defined in I.610.

步骤3.当AIS信元到达信宿节点时,AIS信元没有任何改变地传送到下一个下行节点,还检验AIS信元的DLF值是否位于该信宿节点的域中,如果是的话,在哪一层。 Step 3. When the AIS cell arrives sink node, AIS cell without any change transferred to the next downstream node, further testing AIS cell DLF values ​​are located in the destination node domain, and if so, in which Floor.

步骤4.如果DSL检验结论为是,则节点考虑到所引起的延时将触发相应的保护转换而不需要参考TMN。 Step 4. If the DSL testing concluded that, taking into account the delay caused by the node will trigger the corresponding protection switching without reference to the TMN.

步骤5.转换之后,TMN处于待命状态,TMN修改每个节点的PDE改变了的状态字段。 Step 5. After the conversion, TMN standby, TMN PDE modify each node changes the status field.

图1,简单的保护转换方案图1所示的非嵌套保护转换配置叫做简单保护转换。 1, a non-nested protection switch shown in FIG Simple protection switching scheme is called a simple configuration protection switching. 表示了节点A到K,定义节点之间的分段。 It represents a segment between node A to K, defined node.

A、B、C、D、E、F、G包括工作实体;A、H、I、J、K、G包括保护实体;A是工作和保护域的信源点;和G是工作和保护域的信宿点。 A, B, C, D, E, F, G comprises working entity; A, H, I, J, K, G comprises protection entity; A is working and protected domain source point; and G is working and protection domain the sink point.

当TMN配置网络时,TMN应当定义每个保护域。 When the TMN configure the network, it should define each protection domain TMN. TMN最好在每个信宿节点保持一个数据库,在数据库中以保护数据实体(PDE)的形式描述位于相应信宿节点保护域的每个网络单元。 TMN preferably each sink node maintains a database, the database data entities in a protected form (PDE) described in each network element nodes located in the corresponding sink of the protected domain. PDE包含定位ID、域INFO、状态(就绪或中断)、节点分类(信源/信宿/中间)和其它需要的信息。 PDE includes the location ID, Domain INFO, Status (Ready or interrupt), Node Category (Source / sink / intermediate) and other information as needed. 所有涉及的节点的定位、位置(工作/保护)和状态(就绪/中断)分配给信宿点G。 Positioning all nodes involved, position (working / protection) and status (ready / Interrupt) is assigned to the sink point G.

当AIS信元到达信宿点G时,AIS信元没有任何改变地传送到下一个下行节点,还检验AIS信元的DLF值是否相应于标识符B、C、D、E、F的其中一个。 When the AIS cell arrives sink point G, AIS cell without any change transferred to the next downstream node, further checks whether AIS cell DLF values ​​corresponding to the identifier B, where a C, D, E, F's. 如果是的话,将触发从BCDEF到HIJK的保护转换。 If so, it will trigger protection switching from BCDEF to HIJK of.

后面将更详细地讨论信宿节点的结构和操作。 Discussion sink node structure and operation in more detail later.

图2,嵌套式保护转换方案A、B、C、D、E、F、G//A、B、C、D、L、M、E、F、G包括工作实体1;A、H、I、J、K、G包括保护实体1;A是工作和保护域的信源点; 2, the nested protection switching schemes A, B, C, D, E, F, G // A, B, C, D, L, M, E, F, G comprises working entity 1; A, H, I, J, K, G comprises protection entity 1; a is the source point of both working and protection domain;

G是工作和保护域的信宿点;C、D、E包括工作实体2;C、L、M、E包括保护实体2;C是工作和保护域的信源点;E是工作和保护域的信宿点。 G is working and protected domain sink point; C, D, E comprises working entity 2; C, L, M, E comprises protection entity 2; C is working and protected domain source point; E is working and protection domain sink point.

当TMN配置该保护域等级时,所有涉及外层保护转换的节点的定位、位置(工作/保护)、等级(保护层)和状态(就绪/中断)将分配给信宿点G,所有涉及内层保护转换的节点的定位、位置、等级和状态将分配给信宿点E。 When the protective zone class TMN configuration, the positioning of all the nodes involving the outer protection switching, position (working / protection), level (protective layer) and the status (ready / interrupts) will be assigned to sink point G, all directed to the inner positioning a protection switching node, location, and state level to be assigned to sink point E.

当AIS信元到达信宿点E时,AIS信元没有任何改变地传送到下一个下行节点,还检验AIS信元的DLF值是不是其中一个标识符G。 When the AIS cell arrives sink point E, AIS cell is transmitted without any change to the next downstream node, further test values ​​DLF AIS cell wherein an identifier is not G. 如果是的话,将触发从D到LM的保护转换。 If so, it will trigger protection switching from D to the LM.

当AIS信元到达信宿点G时,AIS信元没有任何改变地传送到下一个下行节点,还检验AIS信元的DLF值是否相应于标识符B、C、E、F的其中一个。 When the AIS cell arrives sink point G, AIS cell is transmitted without any change to the next downstream node, and also checks whether the AIS cell DLF values ​​correspond to the identifier B, where a C, E, F's. 如果是的话,将触发从B-...-F到H-...-K的保护转换。 If so, it will trigger from F to B -...- H -...- K of protection switching. 因为节点G具有关于希望的保护等级的信息,所以当定位ID在内层域(D)时,节点G不启动保护转换。 Since Node G has information about the desired level of protection, so the ID when positioned at the inner domain (D), protection switching node G does not start.

作为另一种能力,如果定位值是L、M,则TMN可以检验D的状态,然后确定是否触发外层或内层保护转换。 As another capability, if the location value is L, M, the TMN can verify the status of D, then determine whether to trigger outer or inner protection switch.

图3,数据业务量路径图3以示意的形式说明数据业务量的路径通过网络每个节点中的层等级。 3, the data traffic path Figure 3 illustrates a data traffic path to the network layer level by each node in schematic form. 从第一终端31开始,在经过物理层到达信源节点32之前,数据业务量路径经过各个ARM层。 From the first terminal 31, prior to passing through the physical layer to the source node 32, the data traffic path through various ARM layers. 该路径可能经过与信源节点32一起定义链路的中间节点。 The path may be defined through intermediate nodes 32 together with the source node of the link. 在信源节点,该路径经过ATM层,在ATM层数据流划分成各ATM信元。 At the source node, the path through the ATM layer, the ATM cells into the ATM layer data stream. 这意味着在该点可以监视各连接。 This means that at this point can monitor each connection. 另外,这意味着可以插入信元。 In addition, this means that can be inserted into cells. 图3表示插入了一个AIS信元,作为故障定位的结果。 Figure 3 shows an AIS cell is inserted, as a result of the fault location.

该数据路径以类似的方式继续到信宿节点50。 The data path continues in a similar manner to the sink node 50. 数据路径再次经过ATM层,在ATM层可以访问各信元以及各连接。 Again the data path through the ATM layer, ATM layer can be accessed in each cell and each connection.

旁路路径(图3中未示出)将从信源节点32的ATM层经各自的物理层到达信宿节点61的ATM层。 Bypass path (not shown in FIG. 3) from the source node 32 of the ATM layer via respective physical layer ATM layer 61 reaches the sink node. 如上所述,通过在ATM层或分组层,而不是在物理层提供旁路,旁路路径的提供变得更加容易。 As described above, instead of providing a bypass in a physical layer packet or ATM layer by layer, providing a bypass path becomes easier.

图4,节点功能概述图4以示意的形式表示信宿节点的主要组成。 4, FIG. 4 shows a functional overview node sink node in schematic form the main components. 提供由节点管理功能62控制的告警检测和触发功能61。 Providing control by the node management function 62 and triggering alarm detection function 61. 该管理功能还控制告警插入功能和在连接的基础上转换数据路径的旁路转换功能64。 The management functions also control the alarm insertion functions and data conversion path on the basis of conversion bypass connection 64. 很明显在信源节点中告警插入功能是很必要的,并且信源节点(没有详细说明)将包含等同于旁路转换64的转换。 Obviously alarm at the source node insertion is necessary, and the source node (not described in detail) comprising a bypass switching 64 is equivalent to conversion.

不再详细描述这些转换功能了,因为如何实现这些功能已经为人们所熟知。 These conversion functions not described in detail, because how these features have been well known. 可以想象若干种转换方案。 Imagine several conversion programs. 在一加一转换中,在信源,复制数据,并且所有的数据沿保护域的两个分支传送到信宿节点。 In one plus one conversion, the source data is copied, and all data transferred in the two branches of the protection domain to the sink node. 这里,两条数据路径的其中一条连到剩余一条数据路径,并且域中的其中一条路径被中止不需要使用数据。 Here, where the two data paths is connected to a remaining one data path, and wherein a path without using the domain data is suspended. 这是控制转换的结果。 This is the result of the conversion control. 如果在信宿节点产生触发,则在信宿节点可以更快地进行触发。 If the trigger is generated at the sink node can be triggered from the sink node more quickly. 或者在信源节点转换旁路路径,在这种情况下只使用保护域中的一条路径,由此可以节省传输费用。 Converting the source node or a bypass path, a path protection domain only in this case, whereby the transmission costs can be saved. 这需要触发传送到信源节点。 This is required to trigger the transmission to the source node. 这可以在单相过程中实现,通过沿未使用的部分从信宿发射到信源。 This can be achieved in a single-phase process, transmitted from the sink to the source along the unused portion. 如果信源确认或承认转换命令,则转换变成双相。 If the source confirm or acknowledge command conversion, the conversion becomes biphasic.

将更详细地描述图4所示节点的每项功能。 Each node function shown in FIG. 4 will be described in more detail.

图5,信宿节点触发操作在51,执行表示告警的信元(AIS信元)的检测。 5, the sink node 51 in the trigger operation, performing an alarm indicating the detection cell (AIS cell) is. 在52检验告警信元中的域标识符。 52 checks the domain identifier in the alarm cell. 在53传送信元以避免延迟数据流。 53 carries cells to avoid delaying the data stream. 在54和55,如果,标识符对应于受保护域的地址,则产生触发。 54 and 55, if the identifier corresponds to the address of the protected domain, a trigger is generated. 否则,忽略该标识符。 Otherwise, ignore the identifier.

图6,告警检测触发结构图6以示意的形式表示如何实现这些功能。 6, alarm detection trigger 6 shows a configuration how to achieve these functions in schematic form. 信元检测和复制是一种检测方式的例子。 And detecting cell replication is an example of one embodiment of the detection. 信元检测和复制提取数据、重新构造信元、并检验信元是何种类型。 Cell detecting and copy extracted data, reconstructs cells, and what type of cell tested. 信元检测和复制可能具有直接来自数据路径或来自旁路转换功能64的输入。 And detecting cell replication may have an input directly from the data path 64 or from the bypass of conversion. 检验每个信元以发现其是不是OAS信元。 Each test cell to find it is not the OAS cell. 如果是的话,则在71,检验OAS信元的类型以发现其是不是AIS信元。 If so, then at 71 the type of inspection OAS cell is not found in AIS cell. 如果是的话,则复制整个信元以使其被进一步处理,而没有延迟正在传输的数据。 If so, then copying the entire cell so as to be processed further, without delaying the data being transmitted. 因为需要尽可能快地执行这些功能,所以通常使用一个专用硬件,最好是ASIC的形式。 Because of the need to perform these functions as quickly as possible, so usually we use a dedicated hardware, preferably in the form of ASIC. 详细的设计对于技术人员来说是个问题,这里不需要进一步描述了。 Detailed design for technical personnel is a problem, need not be further described. 应当尽可能快地产生触发,如果比较器72需要比较的地址数不是太大,则在硬件上可以实现快速比较器72。 It should generate the trigger as soon as possible, if the comparator 72 need to compare the address number is not too large, the hardware can achieve fast comparator 72. 通过编码AIF信元中包含的域地址标识符有可能加快这种操作,以这种方式可以执行简单的算法而不需要比较步骤。 Encoding AIF by the domain address identifiers contained in the cell possible to speed up this operation, in this manner a simple algorithm can be performed without a comparison step. 在73,例如如果存在多个嵌套的旁路路径,和因此存在一个以上可能的保护电路,则可以是在触发前进行优先权确定。 73, for example, if the presence of a plurality of nested bypass path, and therefore more than one possible protection circuit is present, the priority determination may be carried out prior to the trigger. 可以参考作为节点管理功能一部分的地址数据库74,地址数据库74可以直接在ASIC上,或者可以在ram中。 Reference may function as a node address database management part 74, the address database can be directly ASIC, an 74 or may be in the ram.

图7,节点管理功能图7表示的节点管理功能包括由TNM更新并至少包含所表示信息的本地数据库93。 7, the node management node management function in FIG 7 include updated by the TNM and containing at least the information represented by local database 93. 节点的类别94表示其是中间节点、信源节点或信宿节点,或一个以上的这些节点。 94 indicates which category node is an intermediate node, the source node or a sink node, or more than one of these nodes. 状态95表示该节点是在正常路径状态下工作,还是在旁路路径状态下工作,并且该信息可用于控制旁路转换功能64,例如开始从旁路路径到正常路径逆转。 State 95 indicates that the node is operating under normal path state, the bypass path or working state, and this information can be used to control the bypass switching function 64, for example, begin to reverse the bypass path to a normal path.

节点ID在96存储,并用于告警通话(session)控制。 In 96 stores the node ID, and alarm call for (session) control. 在97和98,由当前节点控制保护域中的节点标识符,划分成在正常工作路径的节点标识符和在保护路径的节点标识符。 97 and 98, controlled by the protection domain of the current node a node identifier, a node identifier into the work path and the protection path of the node identifier. 这些标识符可能在系统操作过程中,甚至在TNM初始配置之后改变。 These identifiers may even change after TNM initial configuration during system operation. 例如,在嵌套式方案中,外层域的工作路径可能包含部分内层域。 For example, in nested embodiment, the working path of the outer domain may include part of an inner domain. 如果转换内层域,则外层域的工作路径改变了,并且TNM应当相应更新外层域的信宿节点的数据库。 If the inner domain conversion, the working path of the outer domain is changed, and the TNM should update the database corresponding to the sink node of the outer domain.

告警信元中的域标识符没有必要是节点标识符。 Domain identifier in the alarm cell node identifier is not necessary. 例如,可以为给定域的给定路径的所有节点分配路径标识符。 For example, the identifier may be assigned to all paths to a given domain given path node. 在这两种情况下,在信宿节点,或者域ID或者路径ID可用于唯一地识别告警是否在节点自己的域中生成。 In both cases, the destination node, or if the domain ID or the path ID can be used to uniquely identify whether the alarm generated in the node's own domain.

图7示意表示的节点管理功能可以在节点某些其它功能使用的同一ASIC中实现,如果该ASIC中可以实现处理器的话。 Figure 7 a schematic representation of the management node may be the same node with some other functions used in the ASIC implementation, an ASIC may be implemented if the word processor. 通过使用Q3接口和任何诸如以太网或X25的窄带宽广域网可以实现到TNM的连接,因为这些网络管理通信大部分时间上不是很严格。 By using Q3 interface such as Ethernet or any X25 and narrow bandwidth WAN connections can be implemented to TNM, because these network management communications most of the time is not very strict. 详细的实施对于技术人员来说只是常规问题,这里不需要详细描述了。 Detailed embodiments the skilled person merely conventional problems need not be described in detail herein.

触发/转换功能99,使得节点管理功能如果合适的话能屏蔽触发,如果TNM由于任何理由想禁止保护转换的话。 Trigger / conversion function 99, so that the node management function, if appropriate, can shield trigger, if for any reason you want to disable TNM protection switching words. 可以实现逆转或非逆转政策,和可以通过TNM影响转换命令输出来实现与网络其它部分的协调。 Reversal or reversal of policies may be implemented, and may be implemented in coordination with other parts of the network by a command output conversion TNM impact.

在100,表示了告警插入控制,以给节点管理功能62对告警插入的某些控制,例如使得TNM能用告警过滤算法进行告警过滤和更新。 In 100, the alarm insertion control represents to some control to the node management function 62 is inserted alarms, such as alarms that can be filtered TNM alarm filtering and updating algorithm.

从进行参考的ITU建议I731和I732中可以得知告警信元插入的原理,因此这里不需要详细描述了。 From ITU recommendations I731 and reference is I732 principles that may be inserted into the alarm cell, and therefore need not described in detail herein.

在AIS信元中使用故障定位字段是有益的,因为:·故障定位字段有I.610定义并想通常为任何应用(不只是保护ID域)用于明确确定故障定位,并且使用该字段被认为是出于故障定位的目的,·使用定位信息确定保护域将不修改I.610定义的任何现有的原则和原理,·TMN将在保护域的情况下用于协调和提供所有的网络配置信息,本发明并不局限于所描述装置的特定细节,可以预料其它的改进和应用而不超出本发明权利要求所述的范围。 Use fault location field in AIS cell is beneficial because: - Fault location field and want to have I.610 defined generally for any application (not just protect the ID field) to clearly identify fault location, and use the field is considered for the purposes of fault location, • using location information to determine the protection domain will not modify any of the existing principles and principles I.610 defined, · TMN coordination will be used in the case of the protected domain and provide all of the network configuration information the present invention is not limited to the specific details of the described apparatus, it is anticipated that other modifications and applications without departing from the present invention as claimed in the claims scope.

Claims (16)

1.一种在基于分组的电信系统中触发数据重新选择路由的方法,该系统包括一条主数据路径和至少一条旁路路径,旁路路径用于旁路一部分数据路径,该部分和其各自的旁路限定一保护域并在上行终端具有共同的信源节点和在下行终端具有共同的信宿节点,该系统包括每个域的节点,该节点用于监视各个域和向其它下行节点发送分组形式的告警和表示产生告警的各个域的域标识符,该方法包括步骤:在信宿节点检测从信宿节点的上行节点发送的告警和相应的域标识符;在信宿节点,根据检测的域标识符,确定是否触发数据沿其中一条旁路路径重新选择路由,该旁路路径旁路由信宿节点监视的域。 CLAIMS 1. A method of triggering a rerouting of data in a packet-based telecommunications system, the system comprising a main data path and at least one bypass path, a bypass path for bypassing a portion of the data path, the portion and its respective bypass defining a protection domain and having a common source terminal and a node upstream of the sink node having a common terminal on the downlink, the system includes a node for each domain, the domain of each node for monitoring and transmitting downlink packets to other nodes in the form of alarm indicating generate a domain identifier for each domain of the alarm, the method comprising the steps of: the alarm and the corresponding domain identifier and destination node detects the transmission from the uplink node sink node; at the sink node, based on the domain identifier detected, determining whether the trigger data field in which a rerouting path to the bypass, the bypass path bypassing monitored by the sink node.
2.根据权利要求1的方法,其中通过把告警插入到要发射的数据中把告警发送到下行节点。 2. The method according to claim 1, wherein the trap is inserted into the data to be transmitted in the downlink to send an alarm to the node.
3.根据权利要求1或2的方法,其中该系统是面向连接的,不需要建立新的连接就能完成重新选择路由。 3. The method according to claim 1 or claim 2, wherein the system is connection-oriented, without establishing a new connection to complete the re-routing.
4.根据权利要求1或2的方法,其中系统包括嵌套的域,该方法包括确定在嵌套域的内层,主路径和旁路路径出现故障,和确定应当触发外层还未触发的一个域的旁路的步骤。 4. The method as claimed in claim 1 or 2, wherein the system comprises nested domains, the method includes determining a fault occurs in the inner layer, the main path and the bypass path nested domains, and the determination has not been triggered should be triggered outer a bypass step domain.
5.根据权利要求1或2的方法,其中给定的节点包括表示域可以由一个以上的旁路路径旁路的优先权的存储数据库,和确定是否根据存储的优先权另外进行触发的步骤。 The method according to claim 1 or claim 2, wherein a given domain may be represented by a node comprising a database stored in one or more priority bypass bypass path, and the step of determining whether to trigger further stored according to priority.
6.根据权利要求1或2的方法,其中域标识符包括节点标识符。 The method according to claim 1 or claim 2, wherein the domain identifier comprises a node identifier.
7.根据权利要求1或2的方法,其中信宿节点包括信宿节点的域中节点标识符的数据库。 7. The method as claimed in claim 1 or 2, wherein the nodes in the domain database node comprises a sink sink node identifier.
8.根据权利要求7的方法,其中数据库由网络管理系统更新。 8. A method according to claim 7, wherein the database is updated by the network management system.
9.一种在基于分组的电信系统中旁路故障的方法,该系统包括一条主数据路径和至少一条旁路路径,旁路路径用于旁路一部分数据路径,该部分和其各自的旁路限定一保护域并在上行终端具有共同的信源节点和在下行终端具有共同的信宿节点,该系统包括每个域的节点,该节点用于监视各个域和向其它下行节点发送分组形式的告警和表示产生告警的各个域的域标识符,该方法包括步骤:在信宿节点检测从信宿节点的上行节点发送的告警和相应的域标识符;在信宿节点,根据检测的域标识符,确定是否触发数据沿其中一条旁路路径重新选择路由,该旁路路径旁路由信宿节点监视的域;和根据该触发数据沿给定的旁路路径重新选择路由。 A packet-based telecommunications system, a method of bypassing a fault, the system comprising a main data path and at least one bypass path, a bypass path for bypassing a portion of the data path, the portion and the respective bypass their defining a protection domain and having a common source terminal and a node upstream of the sink node having a common terminal on the downlink, the system includes a node for each domain, the alarms for monitoring respective domains and a node transmits a downlink packet to other nodes in the form of indicating generate a domain identifier for each domain of the alarm, the method comprising the steps of: the alarm and the corresponding domain identifier transmitted from the upstream node and destination node in the destination node is detected; at the sink node, based on the domain identifier detected, determining whether wherein the trigger data along a bypass path re-routing, the bypass path bypassing monitored by the sink node domain; and along a given bypass path according to the trigger rerouting data.
10.根据权利要求9的方法,其中信宿节点包括信宿节点的域中节点标识符的数据库。 10. The method of claim 9, wherein the sink node comprises a node in the domain database of the sink node identifier.
11.根据权利要求10的方法,其中数据库由网络管理系统更新。 11. The method according to claim 10, wherein the database is updated by the network management system.
12.根据权利要求9的方法,还包括在连接的基础上使用网络管理系统配置旁路路径的基本步骤。 12. The method of claim 9, further comprising the step of using the basic network management system based on the connection configuration of the bypass path.
13.一种基于分组的电信系统中的节点,该系统包括一条主数据路径和至少一条旁路路径,旁路路径用于旁路一部分数据路径,该部分和其各自的旁路限定一保护域并在上行终端具有共同的信源节点和在下行终端具有共同的信宿节点,该系统包括每个域的节点,该节点用于监视各个域和向其它下行节点发送分组形式的告警和表示产生告警的各个域的域标识符,该节点包括:在信宿节点检测从信宿节点的上行节点发送的告警和相应的域标识符的装置;在信宿节点,根据检测的域标识符,确定是否触发数据沿其中一条旁路路径重新选择路由的装置,该旁路路径旁路由信宿节点监视的域。 A packet-based telecommunications system node, the system comprising a main data path and at least one bypass path, a bypass path for bypassing a portion of the data path, the portion and its respective bypass defining a protection domain and having a common source terminal and a node upstream of the sink node having a common terminal on the downlink, the system includes a node for each domain, the domain of each node for monitoring a packet form and transmitted to other alarm generates an alarm indicating the downlink nodes domain identifier for each domain, the node comprising: an alarm and corresponding device domain identifier of the destination node detects the transmission from the uplink node sink node; at the sink node, based on the domain identifier detected, determining whether the trigger data in wherein a bypass path re-route selection device, the bypass path bypassing monitored by the sink node domain.
14.根据权利要求13的节点,其中信宿节点包括信宿节点的域中节点标识符的数据库。 14. The node according to claim 13, wherein the sink node comprises a node in the domain database of the sink node identifier.
15.根据权利要求14的节点,其中数据库由网络管理系统更新。 15. The node according to claim 14, wherein the database is updated by the network management system.
16.一种基于分组的电信系统,该系统包括一条主数据路径和至少一条旁路路径,旁路路径用于旁路一部分数据路径,该部分和其各自的旁路限定一保护域并在上行终端具有共同的信源节点和在下行终端具有共同的信宿节点,该系统包括每个域的节点,该节点用于监视各个域和向其它下行节点发送分组形式的告警和表示产生告警的各个域的域标识符,该系统包括:在信宿节点检测从信宿节点的上行节点发送的告警和相应的域标识符的装置;在信宿节点,根据检测的域标识符,确定是否触发数据沿其中一条旁路路径重新选择路由的装置,该旁路路径旁路由信宿节点监视的域。 16. A packet-based telecommunications system, the system comprising a main data path and at least one bypass path, a bypass path for bypassing a portion of the data path, the portion and its respective bypass defining a protection domain and an uplink having a common terminal of the source node and the sink node have a common terminal in a downlink, the system includes a node for each domain, the domain of each node for monitoring and transmitting packets to other forms of alerting downstream nodes representing respective fields generated alarms domain identifier, the system comprising: an alarm and corresponding apparatus domain identifier transmitted from the upstream node and destination node in the destination node is detected; at the sink node, based on the domain identifier detected, determining whether to trigger the data along one side wherein circuit path means route reselection, the bypass path bypassing monitored by the sink node domain.
CNB971823472A 1997-08-22 1997-08-22 Telecommunication system based on group and its node, method for trigger data trselecting route and bynass fault CN1157986C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB971823472A CN1157986C (en) 1997-08-22 1997-08-22 Telecommunication system based on group and its node, method for trigger data trselecting route and bynass fault

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB971823472A CN1157986C (en) 1997-08-22 1997-08-22 Telecommunication system based on group and its node, method for trigger data trselecting route and bynass fault

Publications (2)

Publication Number Publication Date
CN1265258A CN1265258A (en) 2000-08-30
CN1157986C true CN1157986C (en) 2004-07-14

Family

ID=5178411

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB971823472A CN1157986C (en) 1997-08-22 1997-08-22 Telecommunication system based on group and its node, method for trigger data trselecting route and bynass fault

Country Status (1)

Country Link
CN (1) CN1157986C (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004336209A (en) * 2003-05-01 2004-11-25 Ntt Docomo Inc Traffic distribution control apparatus, and traffic distribution control method
IL159979A (en) 2004-01-21 2009-08-03 Eci Telecom Ltd Fast rerouting of traffic in a circuit switched mesh network
DE602004005166T2 (en) 2004-06-01 2007-12-13 France Telecom A method and system for handling failures at the router level

Also Published As

Publication number Publication date
CN1265258A (en) 2000-08-30

Similar Documents

Publication Publication Date Title
JP3691532B2 (en) Position identification device in a communication network
US5233600A (en) Method and apparatus for identifying a failed span in a network of span interconnected nodes
CN1117465C (en) Ip group communication system
JP2933021B2 (en) Communications network failure recovery system
CN100429889C (en) System and method for detecting failure and route reconnection in communication network
EP0988600B1 (en) Network access device monitoring
US6616350B1 (en) Method and apparatus for providing a more efficient use of the total bandwidth capacity in a synchronous optical network
RU2390947C2 (en) Accident signal indication and suppression (ais) mechanism in ethernet oam
CA2096504C (en) Self-healing drop and insert communication network
US5583848A (en) Methods for verification of routing table information
US6414940B1 (en) Method and system of managing unidirectional failures in a distributed restoration network
US7167443B1 (en) System and method for packet level restoration of IP traffic using overhead signaling in a fiber optic ring network
JP4760504B2 (en) Network system and communication device
US6011780A (en) Transparant non-disruptable ATM network
US7773877B2 (en) Method for handling channel failures in an automatically switched optical network
US8971189B2 (en) Label switched path OAM wrapper
EP2086175B1 (en) Method and apparatus for protecting ether ring net
US5913036A (en) Raw performance monitoring correlated problem alert signals
US6757306B1 (en) Method and system for intermediate system level 2 transparency using the SONET LDCC
US7333425B2 (en) Failure localization in a transmission network
US6052722A (en) System and method for managing network resources using distributed intelligence and state management
US6222820B1 (en) Method of VCC/VPC redundancy for asynchronous transfer mode networks
KR100462408B1 (en) A Fast Re-route Method Using GMPLS in Optical Transport Networks
US5778184A (en) System method and computer program product for processing faults in a hierarchial network
US20030133417A1 (en) Method and message therefor of monitoring the spare capacity of a dra network

Legal Events

Date Code Title Description
C06 Publication
C10 Entry into substantive examination
C14 Grant of patent or utility model
C19 Lapse of patent right due to non-payment of the annual fee