CN116192244A - OSU-oriented protected service protection switching method - Google Patents

OSU-oriented protected service protection switching method Download PDF

Info

Publication number
CN116192244A
CN116192244A CN202211567248.7A CN202211567248A CN116192244A CN 116192244 A CN116192244 A CN 116192244A CN 202211567248 A CN202211567248 A CN 202211567248A CN 116192244 A CN116192244 A CN 116192244A
Authority
CN
China
Prior art keywords
bandwidth
service
protected
protected service
link
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211567248.7A
Other languages
Chinese (zh)
Inventor
赵永利
李卓桐
杨鸿珍
贺家乐
李疆生
张蒙晰
金广祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Economic And Technological Research Institute Co LtdB412 State Grid Office
Beijing University of Posts and Telecommunications
Information and Telecommunication Branch of State Grid Zhejiang Electric Power Co Ltd
Original Assignee
State Grid Economic And Technological Research Institute Co LtdB412 State Grid Office
Beijing University of Posts and Telecommunications
Information and Telecommunication Branch of State Grid Zhejiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Economic And Technological Research Institute Co LtdB412 State Grid Office, Beijing University of Posts and Telecommunications, Information and Telecommunication Branch of State Grid Zhejiang Electric Power Co Ltd filed Critical State Grid Economic And Technological Research Institute Co LtdB412 State Grid Office
Priority to CN202211567248.7A priority Critical patent/CN116192244A/en
Publication of CN116192244A publication Critical patent/CN116192244A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/03Arrangements for fault recovery
    • H04B10/032Arrangements for fault recovery using working and protection systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q11/00Selecting arrangements for multiplex systems
    • H04Q11/0001Selecting arrangements for multiplex systems using optical switching
    • H04Q11/0062Network aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q11/00Selecting arrangements for multiplex systems
    • H04Q11/0001Selecting arrangements for multiplex systems using optical switching
    • H04Q11/0062Network aspects
    • H04Q2011/0079Operation or maintenance aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q11/00Selecting arrangements for multiplex systems
    • H04Q11/0001Selecting arrangements for multiplex systems using optical switching
    • H04Q11/0062Network aspects
    • H04Q2011/0079Operation or maintenance aspects
    • H04Q2011/0081Fault tolerance; Redundancy; Recovery; Reconfigurability

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The embodiment of the application provides a protection switching method of protected business facing an OSU, which comprises the following steps: counting all affected protection services and corresponding protection paths in a network; for the statistical protection paths, determining overlapping paths and independent paths; for the links with insufficient residual bandwidth in the overlapped paths, determining to interrupt the non-protected service with large bandwidth preferentially so as to meet the bandwidth requirement of the protection switching of the protected service in the overlapped paths; for the link with insufficient residual bandwidth in the independent path, the non-protected service with large bandwidth is decided to be interrupted preferentially so as to meet the bandwidth requirement of the protection switching of the protected service in the independent path. The embodiment of the application can provide a solution for properly interrupting or reconstructing other services on the protected service working path when the protected service working path is switched to the protected path.

Description

OSU-oriented protected service protection switching method
Technical Field
The embodiment of the application relates to the technical field of computers, in particular to a protection switching method of protected business oriented to an OSU.
Background
Optical transport networks (Optical Transport Network, OTN) have been used to carry a variety of services, including high quality private line and video/VR services, extending from the backbone network to the metropolitan area network. To overcome the large and inflexible granularity of the bearers of conventional optical data units (Optical Data Unit, ODU), optical service units (Optical Service Unit, OSU) are proposed for metropolitan area networks. The OSU can support the minimum bandwidth transmission rate of 2Mbps, can more flexibly bear any granularity service of 2Mbps-100Gbps, and can be widely applied to the new generation OTN network equipment. The occurrence of OSU enables the sub-network connection protection (Subnetwork Connection Protection, SNCP) based on OSU to save redundant resources by prefabricating a backup pipe of 2Mbps, and to quickly adjust the protection path pipe bandwidth to the service required bandwidth when the service needs protection switching, thereby maximizing the network resource utilization. But at the same time, when the service is switched, the bandwidth adjusting process of the protection path can affect other services, and no solution for properly interrupting or reconstructing other services on the path exists in the process of switching the working path of the protected service to the protection path.
Disclosure of Invention
The objective of the embodiments of the present application is to provide a protection switching method for an OSU-oriented protected service, which provides a solution for how to properly interrupt or reconstruct other services on a protected service working path when the path is switched to the protected path.
An aspect of an embodiment of the present application provides a protection switching method for an OSU-oriented protected service, including:
counting all affected protection services and corresponding protection paths in a network;
for the statistical protection paths, determining overlapping paths and independent paths;
for the links with insufficient residual bandwidth in the overlapped paths, determining to interrupt the non-protected service with large bandwidth preferentially so as to meet the bandwidth requirement of the protection switching of the protected service in the overlapped paths;
for the link with insufficient residual bandwidth in the independent path, the non-protected service with large bandwidth is decided to be interrupted preferentially so as to meet the bandwidth requirement of the protection switching of the protected service in the independent path.
Preferably, the determining to interrupt the non-protected service with large bandwidth preferentially for the link with insufficient residual bandwidth in the overlapping path, so as to meet the bandwidth requirement of protection switching of the protected service in the overlapping path, specifically includes:
judging whether the residual bandwidth in the link can meet the bandwidth requirement of the protection switching of the protected service or not according to the current traversed link in the overlapped path;
if not, counting the condition that the unprotected traffic on the link occupies the bandwidth, and sorting according to the descending order of the occupied bandwidth;
and judging whether the non-protected service on the link is interrupted or not in sequence according to the sequencing result:
after deciding to interrupt the non-protected service for the currently judged non-protected service, if the residual bandwidth in the link can meet the bandwidth requirement of the protection switching of the protected service, recovering the non-protected service, and judging the next non-protected service after m=m+1;
if the residual bandwidth in the link can not meet the bandwidth requirement of the protection switching of the protected service, judging whether the identifier m is 0, and if m=0, judging the next non-protected service; if m is not equal to 0, restoring the non-protected service, and determining to interrupt the last non-protected service;
wherein the initial value of m is 0.
Preferably, the determining to interrupt the non-protected service with large bandwidth preferentially for the link with insufficient residual bandwidth in the independent path, so as to meet the bandwidth requirement of protection switching of the protected service in the independent path, specifically includes:
judging whether the residual bandwidth in the link can meet the bandwidth requirement of the protection switching of the protected service or not according to the current traversed link in the independent path;
if not, counting the condition that the unprotected traffic on the link occupies the bandwidth, and sorting according to the descending order of the occupied bandwidth;
and judging whether the non-protected service on the link is interrupted or not in sequence according to the sequencing result:
after deciding to interrupt the non-protected service for the currently judged non-protected service, if the residual bandwidth in the link can meet the bandwidth requirement of the protection switching of the protected service, recovering the non-protected service, and judging the next non-protected service after m=m+1;
if the residual bandwidth in the link can not meet the bandwidth requirement of the protection switching of the protected service, judging whether the identifier m is 0, and if m=0, judging the next non-protected service; if m is not equal to 0, restoring the non-protected service, and determining to interrupt the last non-protected service;
wherein the initial value of m is 0.
A further aspect of the embodiments of the present application provides a protection switching method for an OSU-oriented protected service, including:
after receiving a protection switching request sent by an end node of a fault link, a source node of a protected service sends a notification for reducing the bandwidth of the service to be interrupted to an opposite end sink node along a path of the service to be interrupted if the source node determines that the service to be interrupted exists;
the source node sends a notice of increasing the bandwidth of the protected service to each node along the protection path of the protected service;
after receiving the notification of increasing the bandwidth of the protected service, the intermediate node in the protection path sends a notification of reducing the bandwidth of the service to be interrupted to the opposite terminal destination node along the path of the service to be interrupted if the node is determined to have the service to be interrupted;
after receiving the notification of increasing the bandwidth of the protected service, the sink node in the protection path increases the bandwidth of the protected service and returns a response of increasing the bandwidth of the protected service;
after receiving the response of the bandwidth increase of the protection service, and if the node has the service to be interrupted, executing the interruption of the service to be interrupted and the bandwidth increase of the protection service after receiving the response of the bandwidth decrease of the service to be interrupted returned by the opposite end sink node of the path of the service to be interrupted.
A further aspect of the embodiments of the present application provides a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor is configured to implement the steps of the OSU-oriented protected traffic protection switching method according to any one of claims 1 to 8 when the computer program is executed by the processor.
A further aspect of the embodiments of the present application provides a computer readable storage medium, where the computer readable storage medium has stored therein a computer program, the computer program being executable by at least one processor to cause the at least one processor to perform the steps of the OSU-oriented protected traffic protection switching method according to any one of claims 1 to 8.
In the technical scheme provided by the embodiment of the application, all affected protection services and corresponding protection paths in the network are counted; for the statistical protection paths, determining overlapping paths and independent paths; for the links with insufficient residual bandwidth in the overlapped paths, determining to interrupt the non-protected service with large bandwidth preferentially so as to meet the bandwidth requirement of the protection switching of the protected service in the overlapped paths; for the link with insufficient residual bandwidth in the independent path, the non-protected service with large bandwidth is decided to be interrupted preferentially so as to meet the bandwidth requirement of the protection switching of the protected service in the independent path. Therefore, when the working path of the protected service is switched, a solution is provided for properly interrupting or reconstructing other services on the path in the process of switching to the protection path; in the solution, the situation that the same service passes through multiple protection paths repeatedly and repeatedly is effectively reduced by traversing the overlapped paths of the multiple protection service protection paths preferentially and then traversing the independent paths; and for the link with insufficient residual bandwidth, the unprotected service with large bandwidth is decided to be interrupted preferentially, so that the successful switching of the protected service can be ensured, and the minimum quantity of the unprotected service which needs to be interrupted/influenced can be ensured.
Drawings
Fig. 1 schematically illustrates a flowchart of a protection switching method for OSU-oriented protected traffic according to an embodiment of the present application;
fig. 2 schematically illustrates a flowchart of a bandwidth preemption method for an OSUSNCP-oriented overlapping protection path according to an embodiment one of the present application;
fig. 3 schematically illustrates a flowchart of a bandwidth preemption method for an OSUSNCP-oriented independent protection path according to an embodiment one of the present application;
fig. 4 schematically illustrates a flowchart of a method for implementing protection switching of OSU-oriented protected traffic by a network according to a second embodiment of the present application;
fig. 5 schematically illustrates an exemplary diagram of a network implementing OSU-oriented protection switching of protected traffic according to a second embodiment of the present application;
fig. 6 schematically illustrates a hardware architecture diagram of a computer device adapted to implement a protection switching method for OSU-oriented protected traffic according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
It should be noted that the descriptions of "first," "second," etc. in the embodiments of the present application are for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature. In addition, the technical solutions of the embodiments may be combined with each other, but it is necessary to base that the technical solutions can be realized by those skilled in the art, and when the technical solutions are contradictory or cannot be realized, the combination of the technical solutions should be regarded as not exist and not within the protection scope of the present application.
In the description of the present application, it should be understood that the numerical references before the steps do not identify the order of performing the steps, but are only used for convenience in describing the present application and distinguishing each step, and thus should not be construed as limiting the present application.
The invention aims at solving the problem of properly interrupting or reconstructing other services on a protected service working path when the protected service working path is switched to the protected path aiming at the end-to-end OSUSNCP scene, and reduces the number of other affected services as much as possible while ensuring the successful switching of the protected service. The invention is preset in an OSU-OTN network based on SDN or a distributed control plane, and can enable each node in the network to acquire global resource occupation condition and service deployment condition through the centralized reporting of network resource information or continuous flooding process.
The following describes the technical scheme of the embodiment of the present invention in detail with reference to the accompanying drawings.
Example 1
The embodiment of the invention provides a protection switching method of an OSU-oriented protected service, and the specific flow is shown in fig. 1, and the method comprises the following steps:
step S101: and triggering the OSU subnetwork connection protection of a plurality of protected services on the path after single-point faults occur in the network, and counting all the affected protection services and the corresponding protection paths in the network.
Specifically, through the centralized reporting or continuous flooding process of the network resource information, each node in the OSU-oriented network can acquire the global resource occupation condition and the service deployment condition, so that each node in the network can count all affected protection services s according to the global view of the network p E S, where S is the affected set of protection services. Statistics of each protected service s p Is recorded as Path backup
Step S102: determining whether an overlapping path exists for the counted protection paths; if yes, the following step S103 is executed; if not, the following step S104 is executed.
Step S103: aiming at the counted protection paths, determining a set of overlapped paths, and executing a bandwidth preemption strategy for the OSU SNCP-oriented overlapped protection paths;
in this step, for the statistical protection paths, overlapping paths are determined, and the set of overlapping paths is denoted as L overlap The method comprises the steps of carrying out a first treatment on the surface of the Furthermore, aiming at the links with insufficient residual bandwidth in the overlapped paths, determining to interrupt the non-protected service with large bandwidth preferentially so as to meet the bandwidth requirement of the protection switching of the protected service in the overlapped paths; specifically, each link in the overlapping path is traversed, for the ith link l in the overlapping path i The method according to the flow of fig. 2 satisfies the bandwidth requirement of protection switching of the protected traffic in the overlapping paths, and comprises the following sub-steps:
substep S201: judging link l i Whether the residual bandwidth of the protected service can be subjected to the bandwidth requirement of the protection switching of the protected service;if yes, finish link l i And processing the next link; otherwise, the following substep S202 is performed;
in this substep, the remaining bandwidth in the link is determined
Figure BDA0003986552600000071
Whether all affected protection services can meet the requirement of adjusting the protection bandwidth pipeline of 2Mbps to the bandwidth required by the respective service; if yes, finish link l i And processing the next link; otherwise, the following substep S202 is performed.
Sub-step S202: counting the condition of the non-protected service on the link occupying the bandwidth, and sorting according to the descending order of the occupied bandwidth;
in this substep, link l is counted i The non-protected service on the network occupies the bandwidth and is ordered according to the descending order of the occupied bandwidth, and is recorded as
Figure BDA0003986552600000081
And initializes a sequence number k=0.
Substep S203: the initialization identifier m is 0, let k=k+1.
Substep S204: judging the kth unprotected service according to the sequencing result;
in this substep, for the kth unprotected service currently judged, it is necessary to interrupt the unprotected service;
further, after judging that the non-protected service is interrupted, the residual bandwidth in the link can meet the bandwidth requirement of the protection switching of the protected service; if yes, restoring the non-protected service, and after m=m+1, executing the sub-step S203 to judge the next non-protected service;
otherwise, judging whether the identifier m is 0, if m=0, executing the substep S203 to judge the next unprotected class service; if m is not equal to 0, the kth unprotected class service is recovered, and the last kth-1 unprotected class service is decided to be interrupted.
The method can search and interrupt other services with larger occupied bandwidth on the overlapped links in the protection path for the traversal of a plurality of protected services, and interrupt the number of the affected services as little as possible.
Step S104: aiming at the counted protection paths, determining a set of independent paths, and executing a bandwidth preemption strategy of the OSU SNCP-oriented independent protection paths;
in the step, aiming at the statistical protection path, taking the path without overlapped part as an independent path; that is, in the statistical protection paths, overlapping paths are removed, and the rest paths are independent paths;
furthermore, aiming at the link with insufficient residual bandwidth in the independent path, determining to interrupt the non-protected service with large bandwidth preferentially so as to meet the bandwidth requirement of the protection switching of the protected service in the independent path; specifically, each link in the independent path is traversed, for the jth link in the independent path j The method according to the flow of the method shown in fig. 3 meets the bandwidth requirement of protection switching of the protected service in the independent path, and comprises the following sub-steps:
substep S301: judging link l j Whether the residual bandwidth of the protected service can be subjected to the bandwidth requirement of the protection switching of the protected service; if yes, finish link l j And processing the next link; otherwise, the following substep S302 is performed;
in this substep, the remaining bandwidth in the link is determined
Figure BDA0003986552600000091
Whether all affected protection services can meet the requirement of adjusting the protection bandwidth pipeline of 2Mbps to the bandwidth required by the respective service; if yes, finish link l j And processing the next link; otherwise, the following substep S302 is performed.
Substep S302: counting the condition of the non-protected service on the link occupying the bandwidth, and sorting according to the descending order of the occupied bandwidth;
in this substep, link l is counted j The non-protected service occupies bandwidth and is carried out according to the descending order of occupied bandwidthOrdering, recorded as
Figure BDA0003986552600000092
And initializes a sequence number k=0.
Substep S303: the initialization identifier m is 0, let k=k+1.
Substep S304: judging the kth unprotected service according to the sequencing result;
in this substep, for the kth unprotected service currently judged, it is necessary to interrupt the unprotected service;
further, after judging that the non-protected service is interrupted, the residual bandwidth in the link can meet the bandwidth requirement of the protection switching of the protected service; if yes, restoring the non-protected service, and after m=m+1, executing the sub-step S303 to judge the next non-protected service;
otherwise, judging whether the identifier m is 0, if m=0, executing the substep S303 to judge the next unprotected class service; if m is not equal to 0, the kth unprotected class of service is restored
Figure BDA0003986552600000093
Deciding to interrupt the last kth-1 unprotected class traffic +.>
Figure BDA0003986552600000094
The method can search and interrupt other services occupying larger bandwidth in the protection path for single protected service traversal on the independent path, and interrupt the number of the affected services as little as possible.
In the first embodiment of the present invention, all affected protection services and corresponding protection paths in the network are counted; for the statistical protection paths, determining overlapping paths and independent paths; for the links with insufficient residual bandwidth in the overlapped paths, determining to interrupt the non-protected service with large bandwidth preferentially so as to meet the bandwidth requirement of the protection switching of the protected service in the overlapped paths; for the link with insufficient residual bandwidth in the independent path, the non-protected service with large bandwidth is decided to be interrupted preferentially so as to meet the bandwidth requirement of the protection switching of the protected service in the independent path. Therefore, when the working path of the protected service is switched, a solution is provided for properly interrupting or reconstructing other services on the path in the process of switching to the protection path; in the solution, the situation that the same service passes through multiple protection paths repeatedly and repeatedly is effectively reduced by traversing the overlapped paths of the multiple protection service protection paths preferentially and then traversing the independent paths; and for the link with insufficient residual bandwidth, the unprotected service with large bandwidth is decided to be interrupted preferentially, so that the successful switching of the protected service can be ensured, and the minimum quantity of the unprotected service which needs to be interrupted/influenced can be ensured.
Example two
The second embodiment of the present invention provides a protocol flow of a protection switching method for implementing an OSU-oriented protected service by a network, specifically as shown in fig. 4, including the following steps:
step S401: the source node of the protected service receives a protection switching request sent by the end node of the fault link;
step S402: the source node of the protected service determines whether the node has a service needing to be interrupted; if yes, the following step S403 is executed; otherwise, step S404 is directly performed.
In this step, the source node of the protected service may determine the interrupted service from the network according to the method of the flow shown in fig. 1; and further determining whether the node has the service needing to be interrupted or not from the service which is determined to be interrupted.
Step S403: the source node of the protected service sends a notification for reducing the bandwidth of the service needing to be interrupted to the opposite end sink node along the path of the service needing to be interrupted;
in this step, if the source node of the protected service determines that the source node has a service that needs to be interrupted, a notification for reducing the bandwidth of the service that needs to be interrupted is sent to the destination node along the path of the service that needs to be interrupted.
Specifically, the source node of the protected traffic transmits an operation, administration and maintenance frame (OAM frame) with a bandwidth reduction request (bw_dec_req) to the corresponding sink node along the path of the traffic requiring interruption to transmit a notification to reduce the bandwidth of the traffic requiring interruption.
Step S404: the source node of the protected service sends a notice of increasing the bandwidth of the protected service to the sink node along the protection path of the protected service every set period;
specifically, the source node of the protected traffic may send an OAM frame with an automatic protection switching overhead (APS OH) and a bandwidth increase request (bw_inc_req) to the sink node along the protection path every 20ms to send a notification to increase the bandwidth of the protected traffic for protection switching protocol communication and backup pipe bandwidth adjustment of 2 Mbps.
Step S405: after receiving the notification of increasing the bandwidth of the protected service, the intermediate node of the protection path determines whether the node has a service needing to be interrupted; if yes, the following steps S406 to S407 are executed; otherwise, step S406 is not performed.
Specifically, after the intermediate node of the protection path receives the OAM frame with APS OH and bw_inc_req, the interrupted service may be determined from the network according to the method of the flow shown in fig. 1; and further determining whether the node has the service needing to be interrupted or not from the service which is determined to be interrupted.
Step S406: the intermediate node of the protected service sends a notification for reducing the bandwidth of the service needing to be interrupted to the opposite end sink node along the path of the service needing to be interrupted;
in this step, if the intermediate node of the protected service determines that the node has a service that needs to be interrupted, a notification for reducing the bandwidth of the service that needs to be interrupted is sent to the opposite end sink node along the path of the service that needs to be interrupted.
Specifically, the intermediate node of the protected service sends an OAM frame with bw_dec_req to the corresponding sink node along the path of the service to be interrupted, to send a notification to reduce the bandwidth of the service to be interrupted.
Step S407: the intermediate node of the protected service performs bandwidth checking, and if the resources are sufficient, a notification for increasing the bandwidth of the protected service is sent to the downstream node of the protection path;
specifically, the intermediate node of the protected service performs bandwidth checking, and if the bandwidth resource can meet the bandwidth requirement of protection switching of the protected service, a notification for increasing the bandwidth of the protected service is sent to the downstream node of the protection path; otherwise, the notice of increasing the bandwidth of the protected service is terminated and the network management switching failure is reported.
Step S408: after receiving the notification of increasing the bandwidth of the protected service, the sink node in the protection path increases the bandwidth of the protected service and returns a response of increasing the bandwidth of the protected service;
specifically, after receiving the OAM frame of bw_inc_req, the sink node of the protection path first adjusts the bandwidth sent by the client interface, i.e. increases the bandwidth of the protected service, and switches to the protection path, then adjusts the forward link bandwidth, and returns a response for sending bw_inc_ack to the source node, i.e. increasing the bandwidth of the protected service, and at the same time starts the timer of the protected service of the sink.
Step S409: and after receiving the response of the bandwidth increase of the protection service, the intermediate node in the protection path executes the bandwidth increase of the protection service and returns a response BW_INC_ACK of the bandwidth increase of the protection service to the upstream node in the protection path.
Specifically, after receiving the response bw_inc_ack of the bandwidth increase of the protection service, if the node does not need the interrupted service, the intermediate node in the protection path directly executes the bandwidth increase of the protection service;
if the node has the service to be interrupted, after receiving a response BW_DEC_ACK of the bandwidth reduction of the service to be interrupted returned by the opposite end sink node of the path of the service to be interrupted, releasing a timer for interrupting the service and reporting the resource adjustment condition after the network manager interrupts the non-protection service, executing the interruption of the service to be interrupted and increasing the bandwidth of the protection service. If the intermediate node in the protection path does not receive BW_DEC_ACK returned by the opposite end host node after overtime, the switching fails, the BW_INC_ACK is sent to the upstream node in the protection path, and the switching failure is reported to the network manager;
and after the bandwidth of the protection service is increased, the intermediate node in the protection path returns BW_INC_ACK to the upstream node in the protection path.
Step S410: and after receiving the response of the bandwidth increase of the protection service, the source node in the protection path executes the bandwidth increase of the protection service to complete the protection switching of the protection service.
Specifically, after receiving the response bw_inc_ack of the bandwidth increase of the protection service, the source node in the protection path directly executes the bandwidth increase of the protection service if the node has no service that needs to be interrupted;
if the node has the service needing to be interrupted, after receiving the response of the bandwidth reduction of the service needing to be interrupted returned by the opposite end sink node of the path of the service needing to be interrupted, switching to a standby path and performing forward link bandwidth adjustment; and adjusting the bandwidth of the OSU, adjusting the bandwidth of the OTN client, reporting the resource information after network management switching, executing the interruption of the service needing to be interrupted, and increasing the bandwidth of the protection service. If the response of the bandwidth reduction of the service needing to be interrupted returned by the opposite terminal host node is not received after the timeout, the switching fails, and the switching failure is reported to the network manager, and the bandwidth is adjusted to be retracted.
For example, in the network shown in fig. 5, there are two protected services 1 and 2, the working and protection paths of which are shown, and one unprotected class of service 3. In a normal working state, all nodes in the network can acquire the whole resource information of the network in an information collection reporting or flooding mode. And when the corresponding link in the figure fails, triggering the service 1 and the service 2 to perform OSUSNCP switching. Since there is an overlap of protection paths for traffic 1 and traffic 2, i.e. link l 2 And firstly executing an overlapping path bandwidth preemption strategy facing OSUSNCP to ensure that the residual resources of the link are enough for the bandwidth increase of the switching between the service 1 and the service 2. After execution is completed, respectively aiming at link l 1 ,l 3 ,l 4 And executing an independent path bandwidth preemption strategy facing OSUSNCP. For example, if passing throughThe bandwidth preemption strategy facing OSUSNCP obtains the service needing to be interrupted as non-protection service 3, i.e. l exists 3 And under the condition of insufficient link residual bandwidth resources, the source node of the service 1 sends an OAM frame with APSOH and BW_INC_REQ along a protection path according to an OSUSNCP-oriented bandwidth preemption implementation method in the switching process, and bandwidth checking is carried out on links by links. Reach node V 3 When the unprotected traffic 3 needs to be interrupted, an OAM frame with APSOH and bw_dec_req is sent along the path of traffic 3, the bandwidth of the corresponding port and link of traffic 3 is reduced, and then traffic 1 continues to send bw_inc_req along the protection path. When BW_INC_ACK message is returned in forward direction, at node V 3 Before the BW_DEC_ACK message returned by the service 3 is waited, the forward link bandwidth can be increased continuously, otherwise, the switching fails and the network manager is reported.
In the technical scheme of the invention, all affected protection services and corresponding protection paths in the network are counted; for the statistical protection paths, determining overlapping paths and independent paths; for the links with insufficient residual bandwidth in the overlapped paths, determining to interrupt the non-protected service with large bandwidth preferentially so as to meet the bandwidth requirement of the protection switching of the protected service in the overlapped paths; for the link with insufficient residual bandwidth in the independent path, the non-protected service with large bandwidth is decided to be interrupted preferentially so as to meet the bandwidth requirement of the protection switching of the protected service in the independent path. Therefore, when the working path of the protected service is switched, a solution is provided for properly interrupting or reconstructing other services on the path in the process of switching to the protection path; in the solution, the situation that the same service passes through multiple protection paths repeatedly and repeatedly is effectively reduced by traversing the overlapped paths of the multiple protection service protection paths preferentially and then traversing the independent paths; and for the link with insufficient residual bandwidth, the unprotected service with large bandwidth is decided to be interrupted preferentially, so that the successful switching of the protected service can be ensured, and the minimum quantity of the unprotected service which needs to be interrupted/influenced can be ensured.
Fig. 6 schematically illustrates a hardware architecture diagram of a computer device 1300 of a method for protection switching of OSU-oriented protected traffic according to an embodiment of the present application. In this embodiment, the computer apparatus 1300 is an apparatus capable of automatically performing numerical calculation and/or information processing in accordance with an instruction set or stored in advance. For example, it may be a smart phone, a tablet computer, a notebook computer, a desktop computer, a rack server, a blade server, a tower server, or a rack server (including a stand-alone server or a server cluster composed of a plurality of servers), etc. As shown in fig. 6, computer device 1300 includes at least, but is not limited to: memory 1310, processor 1320, and network interface 1330 may be communicatively linked to each other by a system bus. Wherein:
memory 1310 includes at least one type of computer-readable storage medium including flash memory, hard disk, multimedia card, card memory (e.g., SD or DX memory, etc.), random Access Memory (RAM), static Random Access Memory (SRAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), programmable read-only memory (PROM), magnetic memory, magnetic disk, optical disk, etc. In some embodiments, the memory 1310 may be an internal storage module of the computer device 1300, such as a hard disk or memory of the computer device 1300. In other embodiments, the memory 1310 may also be an external storage device of the computer device 1300, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash Card (Flash Card) or the like. Of course, memory 1310 may also include both internal memory modules of computer device 1300 and external memory devices. In this embodiment, the memory 1310 is generally used to store an operating system and various application software installed in the computer device 1300, for example, program codes of an OSU-oriented protection switching method of the protected service. Furthermore, the memory 1310 may also be used to temporarily store various types of data that have been output or are to be output.
Processor 1320 may be a central processing unit (Central Processing Unit, simply CPU), controller, microcontroller, microprocessor, or other data processing chip in some embodiments. The processor 1320 is generally configured to control overall operation of the computer device 1300, such as performing control and processing related to data interaction or communication with the computer device 1300, and the like. In this embodiment, processor 1320 is used to execute program code or process data stored in memory 1310.
The network interface 1330 may include a wireless network interface or a wired network interface, the network interface 1330 typically being used to establish communication links between the computer device 1300 and other computer devices. For example, the network interface 1330 is used to connect the computer device 1300 to an external terminal through a network, establish a data transmission channel and a communication link between the computer device 1300 and the external terminal, and the like. The network may be a wireless or wired network such as an Intranet (Intranet), the Internet (Internet), a global system for mobile communications (Global System of Mobile communication, abbreviated as GSM), wideband code division multiple access (Wideband Code Division Multiple Access, abbreviated as WCDMA), a 4G network, a 5G network, bluetooth (Bluetooth), wi-Fi, etc.
It should be noted that fig. 6 only shows a computer device having components 1310-1330, but it should be understood that not all of the illustrated components are required to be implemented, and that more or fewer components may be implemented instead.
In this embodiment, the protection switching method of the OSU-oriented protected service stored in the memory 1310 may be further divided into one or more program modules and executed by one or more processors (in this embodiment, the processor 1320) to complete the embodiments of the present application.
The embodiments of the present application further provide a computer readable storage medium, where a computer program is stored, where the computer program, when executed by a processor, implements the steps of the OSU-oriented protected service protection switching method in the embodiments.
In this embodiment, the computer-readable storage medium includes a flash memory, a hard disk, a multimedia card, a card memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a read-only memory (ROM), an electrically erasable programmable read-only memory (EEPROM), a programmable read-only memory (PROM), a magnetic memory, a magnetic disk, an optical disk, and the like. In some embodiments, the computer readable storage medium may be an internal storage unit of a computer device, such as a hard disk or a memory of the computer device. In other embodiments, the computer readable storage medium may also be an external storage device of a computer device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash Card (Flash Card), etc. that are provided on the computer device. Of course, the computer-readable storage medium may also include both internal storage units of a computer device and external storage devices. In this embodiment, the computer readable storage medium is typically used to store an operating system and various application software installed on a computer device, for example, a program code of a protection switching method of a protected service facing OSU in the embodiment. Furthermore, the computer-readable storage medium may also be used to temporarily store various types of data that have been output or are to be output.
It will be apparent to those skilled in the art that the modules or steps of the embodiments of the application described above may be implemented in a general purpose computing device, they may be concentrated on a single computing device, or distributed across a network of computing devices, they may alternatively be implemented in program code executable by computing devices, so that they may be stored in a storage device for execution by computing devices, and in some cases, the steps shown or described may be performed in a different order than what is shown or described, or they may be separately fabricated into individual integrated circuit modules, or multiple modules or steps of them may be fabricated into a single integrated circuit module. Thus, embodiments of the present application are not limited to any specific combination of hardware and software.
The foregoing description is only of the preferred embodiments of the present application, and is not intended to limit the scope of the claims, and all equivalent structures or equivalent processes using the descriptions and drawings of the present application, or direct or indirect application in other related technical fields are included in the scope of the claims of the present application.

Claims (10)

1. The protection switching method of the protected service facing the OSU is characterized by comprising the following steps:
counting all affected protection services and corresponding protection paths in a network;
for the statistical protection paths, determining overlapping paths and independent paths;
for the links with insufficient residual bandwidth in the overlapped paths, determining to interrupt the non-protected service with large bandwidth preferentially so as to meet the bandwidth requirement of the protection switching of the protected service in the overlapped paths;
for the link with insufficient residual bandwidth in the independent path, the non-protected service with large bandwidth is decided to be interrupted preferentially so as to meet the bandwidth requirement of the protection switching of the protected service in the independent path.
2. The method according to claim 1, wherein the determining to interrupt the unprotected traffic with a large bandwidth preferentially for the link with insufficient bandwidth remaining in the overlapping path, so as to meet the bandwidth requirement of protection switching of the protected traffic in the overlapping path, specifically includes:
judging whether the residual bandwidth in the link can meet the bandwidth requirement of the protection switching of the protected service or not according to the current traversed link in the overlapped path;
if not, counting the condition that the unprotected traffic on the link occupies the bandwidth, and sorting according to the descending order of the occupied bandwidth;
and judging whether the non-protected service on the link is interrupted or not in sequence according to the sequencing result:
after deciding to interrupt the non-protected service for the currently judged non-protected service, if the residual bandwidth in the link can meet the bandwidth requirement of the protection switching of the protected service, recovering the non-protected service, and judging the next non-protected service after m=m+1;
if the residual bandwidth in the link can not meet the bandwidth requirement of the protection switching of the protected service, judging whether the identifier m is 0, and if m=0, judging the next non-protected service; if m is not equal to 0, restoring the non-protected service, and determining to interrupt the last non-protected service;
wherein the initial value of m is 0.
3. The method according to claim 1, wherein the determining to interrupt the unprotected traffic with a large bandwidth preferentially for the link with insufficient bandwidth remaining in the independent path, so as to meet the bandwidth requirement of protection switching of the protected traffic in the independent path, specifically includes:
judging whether the residual bandwidth in the link can meet the bandwidth requirement of the protection switching of the protected service or not according to the current traversed link in the independent path;
if not, counting the condition that the unprotected traffic on the link occupies the bandwidth, and sorting according to the descending order of the occupied bandwidth;
and judging whether the non-protected service on the link is interrupted or not in sequence according to the sequencing result:
after deciding to interrupt the non-protected service for the currently judged non-protected service, if the residual bandwidth in the link can meet the bandwidth requirement of the protection switching of the protected service, recovering the non-protected service, and judging the next non-protected service after m=m+1;
if the residual bandwidth in the link can not meet the bandwidth requirement of the protection switching of the protected service, judging whether the identifier m is 0, and if m=0, judging the next non-protected service; if m is not equal to 0, restoring the non-protected service, and determining to interrupt the last non-protected service;
wherein the initial value of m is 0.
4. The protection switching method of the protected service facing the OSU is characterized by comprising the following steps:
after receiving a protection switching request sent by an end node of a fault link, a source node of a protected service sends a notification for reducing the bandwidth of the service to be interrupted to an opposite end sink node along a path of the service to be interrupted if the source node determines that the service to be interrupted exists;
the source node sends a notice of increasing the bandwidth of the protected service to each node along the protection path of the protected service;
after receiving the notification of increasing the bandwidth of the protected service, the intermediate node in the protection path sends a notification of reducing the bandwidth of the service to be interrupted to the opposite terminal destination node along the path of the service to be interrupted if the node is determined to have the service to be interrupted;
after receiving the notification of increasing the bandwidth of the protected service, the sink node in the protection path increases the bandwidth of the protected service and returns a response of increasing the bandwidth of the protected service;
after receiving the response of the bandwidth increase of the protection service, and if the node has the service to be interrupted, executing the interruption of the service to be interrupted and the bandwidth increase of the protection service after receiving the response of the bandwidth decrease of the service to be interrupted returned by the opposite end sink node of the path of the service to be interrupted.
5. The method of claim 4, wherein the step of determining the position of the first electrode is performed,
after receiving the response of the bandwidth increase of the protection service, the intermediate node/source node in the protection path directly executes the bandwidth increase of the protection service if the node does not have the service which needs to be interrupted.
6. The method according to claim 4, wherein the determining that the node has a service that needs to be interrupted specifically includes:
counting all affected protection services and corresponding protection paths in a network;
for the statistical protection paths, determining overlapping paths and independent paths;
for the links with insufficient residual bandwidth in the overlapped paths, determining to interrupt the non-protected service with large bandwidth preferentially so as to meet the bandwidth requirement of the protection switching of the protected service in the overlapped paths;
for the link with insufficient residual bandwidth in the independent path, deciding to interrupt the non-protected service with large bandwidth preferentially so as to meet the bandwidth requirement of the protection switching of the protected service in the independent path;
and determining that the node has the service needing to be interrupted from the services which are decided to be interrupted.
7. The method according to claim 6, wherein the determining to interrupt the unprotected traffic with a large bandwidth preferentially for the link with insufficient bandwidth remaining in the overlapping path to meet the bandwidth requirement of protection switching of the protected traffic in the overlapping path specifically includes:
judging whether the residual bandwidth in the link can meet the bandwidth requirement of the protection switching of the protected service or not according to the current traversed link in the overlapped path;
if not, counting the condition that the unprotected traffic on the link occupies the bandwidth, and sorting according to the descending order of the occupied bandwidth;
and judging whether the non-protected service on the link is interrupted or not in sequence according to the sequencing result:
after deciding to interrupt the non-protected service for the currently judged non-protected service, if the residual bandwidth in the link can meet the bandwidth requirement of the protection switching of the protected service, recovering the non-protected service, and judging the next non-protected service after m=m+1;
if the residual bandwidth in the link can not meet the bandwidth requirement of the protection switching of the protected service, judging whether the identifier m is 0, and if m=0, judging the next non-protected service; if m is not equal to 0, restoring the non-protected service, and determining to interrupt the last non-protected service;
wherein the initial value of m is 0.
8. The method of claim 6, wherein the determining to interrupt the unprotected traffic with a large bandwidth preferentially for the link with insufficient bandwidth remaining in the independent path to meet the bandwidth requirement of protection switching of the protected traffic in the independent path specifically comprises:
judging whether the residual bandwidth in the link can meet the bandwidth requirement of the protection switching of the protected service or not according to the current traversed link in the independent path;
if not, counting the condition that the unprotected traffic on the link occupies the bandwidth, and sorting according to the descending order of the occupied bandwidth;
and judging whether the non-protected service on the link is interrupted or not in sequence according to the sequencing result:
after deciding to interrupt the non-protected service for the currently judged non-protected service, if the residual bandwidth in the link can meet the bandwidth requirement of the protection switching of the protected service, recovering the non-protected service, and judging the next non-protected service after m=m+1;
if the residual bandwidth in the link can not meet the bandwidth requirement of the protection switching of the protected service, judging whether the identifier m is 0, and if m=0, judging the next non-protected service; if m is not equal to 0, restoring the non-protected service, and determining to interrupt the last non-protected service;
wherein the initial value of m is 0.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor executes the steps of the method for implementing the OSU-oriented protected switching of protected traffic according to any one of claims 1 to 8.
10. A computer readable storage medium, wherein a computer program is stored in the computer readable storage medium, and the computer program is executable by at least one processor, so that the at least one processor performs the steps of the OSU-oriented protected switching method according to any one of claims 1 to 8.
CN202211567248.7A 2022-12-07 2022-12-07 OSU-oriented protected service protection switching method Pending CN116192244A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211567248.7A CN116192244A (en) 2022-12-07 2022-12-07 OSU-oriented protected service protection switching method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211567248.7A CN116192244A (en) 2022-12-07 2022-12-07 OSU-oriented protected service protection switching method

Publications (1)

Publication Number Publication Date
CN116192244A true CN116192244A (en) 2023-05-30

Family

ID=86443140

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211567248.7A Pending CN116192244A (en) 2022-12-07 2022-12-07 OSU-oriented protected service protection switching method

Country Status (1)

Country Link
CN (1) CN116192244A (en)

Similar Documents

Publication Publication Date Title
EP2159957B1 (en) Method for realizing protection for a shared mesh network
EP2815538B1 (en) Method and apparatus for rapid disaster recovery preparation in a cloud network
CN112491700B (en) Network path adjustment method, system, device, electronic equipment and storage medium
US10911295B2 (en) Server apparatus, cluster system, cluster control method and program
US20080291927A1 (en) Policy Based and Link Utilization Triggered Congestion Control
JP2836552B2 (en) Distributed network failure recovery device
CA2817178A1 (en) Lossless bandwidth adjustment method, device and system
CN112448885A (en) Method and device for transmitting service message
WO2019128670A1 (en) Method and apparatus for enabling self-recovery of management capability in distributed system
CN112822102B (en) Link switching method, device, equipment, system and storage medium
EP2264953A1 (en) Distributed resource management system, distributed resource management method, and distributed resource management program
CN111447101A (en) Link detection method and device, computer equipment and storage medium
CN110858986A (en) Bandwidth adjusting method, device, communication equipment and computer readable storage medium
WO2022078208A1 (en) Bandwidth adjustment method, apparatus and system, electronic device, and readable storage medium
CN112653597B (en) Service grid-based service fusing mechanism adjusting method and system
CN100459585C (en) Method for avoiding route equipment frequent switchover state and one type route equipment
CN112969244B (en) Session recovery method and device
CN106464524B (en) Route calculation method and device of ASON
CN116192244A (en) OSU-oriented protected service protection switching method
EP2953299B1 (en) Protection switching method, system and node
CN112600712B (en) Service quality scheduling method and device
EP1289208B1 (en) A method of controlling data routing on a network
CN107800601B (en) Ring network switching protection method, device and system
RU2802599C1 (en) System and method for providing failure tolerance of network nodes
CN113783791A (en) Transmission control method and device suitable for packet transport network and transmission equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination