CN1371188A - Protection method based on business in optical network - Google Patents

Protection method based on business in optical network Download PDF

Info

Publication number
CN1371188A
CN1371188A CN02107390A CN02107390A CN1371188A CN 1371188 A CN1371188 A CN 1371188A CN 02107390 A CN02107390 A CN 02107390A CN 02107390 A CN02107390 A CN 02107390A CN 1371188 A CN1371188 A CN 1371188A
Authority
CN
China
Prior art keywords
protection
node
business
information
nodes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN02107390A
Other languages
Chinese (zh)
Other versions
CN1149761C (en
Inventor
顾畹仪
王健全
张�杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CNB021073902A priority Critical patent/CN1149761C/en
Publication of CN1371188A publication Critical patent/CN1371188A/en
Application granted granted Critical
Publication of CN1149761C publication Critical patent/CN1149761C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Abstract

This invention belongs to optical fibre communication field especially relates to a protection method in all optical fibre net business containing; 1. triggering protection as the business destination terminal with fault; 2.to examine source nodes and route according to the fault information first, then to find out new route according to ring network information to add these modes to multicast address to ash protection to source nodes to be changed and mask up destination nodes as idle that is to say to be unprotected; 3.when receiving above information the middle nodes will cancel extra business to push the default source protection switch and forward said information at the same time; 4.when receiving said information, source nodes is changed and forward to the destination nodes the signalling RR of requiring negative direction changing with its state information SW; 5.the destination terminal is changed when received said signalling.

Description

In all optical network based on the guard method of business
Affiliated technical field
The invention belongs to technical field of optical fiber communication, particularly a kind of in all optical network based on the guard method of business.
Background technology
Existing guard method in ITU-T suggestion G.782, G.841 and detailed introduction arranged G.842; these protected modes have the 1+1 of link and passage; 1:1 and 1:N protection; the path protection (the path protection mechanism of concurrent excellent receipts) and the looped network path protection (two fine unidirectional rings, 2,000 two-way rings and four-fiber bidirectional ring) that also have two fine unidirectional rings.Also has SNCP in addition.But all these protections all are protections of carrying out at resource, promptly to node, to link with to the protection of passage.The thinking of taking all is based on the method for " resource-sharing and resource reservation ".The protected mode that is 1+1 and 1:1 and 1:N is only at resource, and this guard method generally is used for point-to-point transmission system, and for the network configuration of complexity, this protected mode towards resource is also impracticable.
Summary of the invention
Advise that from ITU-T we know the present guard method; path protection is switched and only is applied in the two fine unidirectional rings; and adopt the end function of bridge joint all the time in source in this mode, but only support multiplex section protection for four-fiber bidirectional and two fibre bidirectional loop l networks.Because the introduction of wavelength-division multiplex system.The appearance of all-optical network; impact has been taken place in this notion; because in the full ring of light shape of wavelength division multiplexing; iff the protected mode that adopts multiplex section; so just mean the protection of only under the situation that multiplex section breaks down, just carrying out looped network; iff being some or certain several passage when breaking down; the protection that does not start looped network is switched; because single pass traffic carrying capacity is just huger; this certainly will cause losing of a large number of services, so for the protection of full ring of light net, not only should support the protected mode of multiplex section; also should carry out the protection of channel section, so that the protection of operating part channel failure.
In addition, the protected mode of multiplex section must make jumping figure increase.As shown in figure 10, so long as the business of process fault section, after the protection of process loop network is switched; its route will be passed through whole one week of looped network at least; opposite extreme situations is the business looped network twice that will detour, and this certainly will increase professional power budget, has limited the scale of loop network.Looped network path protection mode then can address this problem well.
From the MESH network recovery is that the preliminary election routing method that adopts that saves time gains enlightenment; for the protection in the catenet also one by one business carry out; so not only can improve network survivability; and increased flexibility; network manager can decide the business that needs protection according to the actual needs; simultaneously the granularity of protection is attenuated, for new meaning has been given in protection, the present invention comes from this thinking and carries out.The present invention is exactly the protected mode of leading to that proposes at above two kinds of situations, comprises the protected mode and the path protection that is applicable to any loop network of " service-oriented ", and the essence of these two kinds of protections all is service-oriented.Need the support of agreement.
Propose two kinds of protected modes among the present invention: two kinds of protected modes are based on a kind of new thinking " based on the protection to business ".The one, the path protection in the loop network, the 2nd, 1:1 in the arbitrary network and the service protection of 1+1.
1, in two kinds of all optical networks based on the guard method of business, wherein a kind of is channel protection method in the loop network, another is 1+1 in the arbitrary network and the service protection method of 1:1.
The essential characteristic of the path protection method in the loop network is:
1) the protection passage is fixed with the situation of fault effects, promptly under the situation that fault takes place, removes to look into the protection passage by impaired business.
2) protection passage and service aisle just in time form annular.
3) in the network of supporting multiplex section protection exchanging, in fact the protection passage is exactly those passages of reserving for multiplex section protection.
4) the protection passage can carry extra traffic under non-failure conditions.
2, the essential characteristic of the service protection method of 1+1 in the arbitrary network and 1:1 is in advance good according to certain algorithm for its protection passage, and its algorithm is
1) all uncorrelated about node and link with former professional route, this can guarantee to make in the shortest time impaired business to obtain the protection of maximum probability.
2) shortest path by, this is adapted to the optimization and the traffic assignments of whole network.
3) choose same wavelength channel, this can reduce the requirement to system as far as possible.
Description of drawings
Fig. 1 is background technology 1:1 passage or link protection schematic diagram.
Fig. 2 is this background technology 1+1 passage or link protection schematic diagram.
Fig. 3 is background technology 1:N passage or link protection schematic diagram.
Fig. 4 is background technology two fine unidirectional ring path protection schematic diagrames.
Fig. 5 is the schematic diagram of 1:1 of the present invention based on service protection.
Fig. 6 is the schematic diagram of 1+1 of the present invention based on service protection.
Fig. 7 is physical layer of the present invention and atom model corresponding relation schematic diagram.
Fig. 8 is a path protection schematic diagram of the present invention.
Fig. 9 is a looped network path protection flow chart of the present invention.
Figure 10 is a background technology multiplex section protection schematic diagram.
Fig. 5 and Fig. 6 provided respectively 1:1 and 1+1 in the MESH network " service protection " and two examples, wherein explanation is will be to an example that business is protected from node A to node E. The Criterion of Selecting in its service protection path (sorting by priority) is:
1, all uncorrelated about node and link with former professional route.
2, shortest path by.
3, choose same wavelength channel as far as possible.
The purpose of principle 1 utilizes the protection route to guarantee that former business is protected in maximum likelihood ground mainly in the situation about breaking down in the source business. Because the probability that breaks down simultaneously on complete incoherent route is very little, so just can former business be protected.
The purpose of principle 2 mainly is to consider that protected mode should be identical with the optimization aim of traffic assignments in the whole system.
The purpose of principle 3 mainly is because the device that can not need like this to add in addition other just can be realized. If node has the function of wavelength conversion in the system certainly, protection channel can be different from former passage.
Be not difficult to find out and abolished this protected mode in the past 1+1 and 1:1 have realized the protection to client layer, i.e. the protection of terminal-to-terminal service only to the protection of light pass segment OTS, optical multiplexing section OMS and optical channel OCH layer.
Referring to Fig. 8; the triggering of looped network passage service based protection is identical with the 1:1 protected mode; by directly triggering after the destination monitoring; different from the 1:1 protection is; the destination node of 1:1 protection is known in advance; and 1: 1 protection channel is also preset; and the path protection of looped network need not to specify in advance protection channel; because in the loop network that uses multiplex section protection; idle in advance resource is as protection of resources, and these resources that set in advance have been prepared protection channel with regard to being equivalent to for present path protection. So the protection of looped network passage in fact also is the protection of service-oriented, be borrow the special construction of idling-resource and looped network be on the looped network business setting the protection route. Say with the service protection of above-mentioned 1:1 similar from this aspect.
As shown in Figure 8; when fault that professional 1 and professional 2 detect separately; they start respectively the protection mechanism of oneself; switch on the protection route and transmit; be not difficult to find out; the protection route of the business on the looped network and former professional route also are incoherent, and are that former route direction is opposite, combine with former route and have just in time passed through all nodes on the looped network.
Under normal condition, idle protection channel allows to support extra traffic, in order to improve the utilization rate of system resource, but under failure condition, extra traffic is removed immediately.
Specific implementation
Because the randomness of distribution service on the unpredictability of fault and the looped network on the looped network; make and when the path protection of carrying out looped network is switched, can not determine concrete source and destination in advance; and there is a plurality of business road up and down at a node place; institute is so that the source and destination node presents multiplicity when protection; simultaneously in order to improve the utilance of network; do not adopt the method for source end bridge joint; so must adopt signaling protocol supports; and, must comprise simultaneously that in agreement node and business information could the concrete definite switches that need switch because source and destination is difficult to definite and multiplicity in advance.
The concrete form of its signaling is (signaling format of 1:1 service protection is identical therewith):
The destination node sign Service identification Switching request The source node sign The state indication
The above-mentioned indispensable content that has only provided signaling is destination node sign, service identification, switching request, source node sign and state indication, determines according to the network size actual needs as for byte allocation.
Wherein the switching request order comprises: (according to priority ordering) from high to low (consider 1 simultaneously: service protection)
1, clear command CLEAR
Purpose is the webmaster order of removing the relevant protection that issues.In the webmaster order, this command prioritization is the highest, and it will remove the webmaster order of corresponding subnet or operational all relevant protections.
2, mandatory protection order FS
The purpose of this order is that requirement corresponding service execute protection is switched.
3, Signal Fail SF
This order has destination to initiate after the purpose section detects fault.
4, direction request RR
Be to receive that destination address is the acknowledgement command of the node initiation of this node.
5, loopback manoeuvre EXER-R
Purpose is the quality of whole ring signaling channel in the test looped network.The unactual execute protection of this order is switched.(only being used for looped network)
The state indication
Attitude (SW), straight-through attitude (PASS), source state (Id1) are switched in protection.
Referring to Fig. 9 flow chart; flow process for the flow chart of 1:1 service protection and looped network path protection is basic identical; unique difference is exactly second step at flow chart, has known concrete route (being source and intermediate node) in the 1:1 service protection, does not need to go to look into temporarily.
The text description of flow chart:
1) Ye Wu destination detects fault, trigger protection.
2) detect the professional of fault and find source node,, find out the intermediate node of new route process again according to looped network information earlier according to business information.(former route and protection route just in time constitute this loop network) adds multicast address with these nodes then, the request that requires source nodes protection to switch to these node multicasts, and the state that carries destination node is the Id1 attitude, promptly do not protect attitude.
3) intermediate node is received above-mentioned information, cancels extra traffic, and by default protection of resources switch is set.Transmit this information simultaneously.Annotate: default switch is set to straight-through attitude.
4) after source node received this information, execution was switched, and sent the signaling RR that reverse request is switched to destination node, with the state information that goes up oneself, switched attitude SW simultaneously.
5) after the destination node received this signaling, execution was switched, and protection is so far switched and finished.
In the service protection method for 1+1 in arbitrary network and 1:1, step 2 detects the business of fault according to its in advance good protection route, determine the node and the origin node of process on its protection route, add these nodes then and add multicast address, protect the request of switching to these node multicasts requirement source nodes, and the state that carries destination node is the Id1 attitude, promptly do not protect attitude; In the service protection method of 1+1 in arbitrary network and 1:1; the business that detects fault is according to its in advance good protection route; determine the node and the origin node of process on its protection route; add these nodes then and add multicast address; protect the request of switching to these node multicasts requirement source nodes; and the state that carries destination node is the Id1 attitude, promptly do not protect attitude.
Advantage
1, the protection thinking of service based can be applied to any network, any situation.
2 so that the granularity of protection becomes thinner, provides flexibly possibility for network in various needs, various topological sum traffic assignments situation simultaneously.
3, compare with the protected mode of ring network multiplex section, the protected mode of passage not only granularity is thinner, and so that power budget reduce, can be so that the looped network network size increases.
4, looped network path protection mode has avoided the mistake of multiplex section protection in the Multi sectional situation to connect.
5, realize simply, reliable, can solve multiplex section protection exchanging, or the problem that can not solve in the protection of resources situation.
6, owing to be protection to business, so that the user can come permissive provision to own professional protection according to the importance of business, increase the flexibility of operation and management.
7, protection of resources is separated with service protection, for the raising of MESH network survivability provides preferred version. And be convenient to the recovery scheme of loop network service-oriented compatible mutually in management level.

Claims (3)

1, a kind of in all optical network based on the guard method of business, it is characterized in that the process step of guard method is
1) Ye Wu destination detects fault, trigger protection;
2) detect the professional of fault earlier according to business information, find the node of source node and former route process, again according to looped network information, find out the intermediate node of new route process, add these nodes then and add multicast address, the request that requires source nodes protection to switch to these node multicasts, and the state that carries destination node is the Id1 attitude, promptly do not protect attitude;
3) intermediate node is received above-mentioned information, cancels extra traffic, and by default protection of resources switch is set, and transmits this information simultaneously;
4) after source node received this information, execution was switched, and sent the signaling RR that reverse request is switched to destination node, with the state information that goes up oneself, switched attitude SW simultaneously;
5) after the destination node received this signaling, execution was switched, and protection is so far switched and finished.
2, according to claim 1 in all optical network based on the guard method of business, it is characterized in that among the 1+1 and the service protection method of 1:1 of step 2 in arbitrary network, the business that detects fault is according to its in advance good protection route, determine the node and the origin node of process on its protection route, add these nodes then and add multicast address, the request that requires source nodes protection to switch to these node multicasts, and the state that carries destination node is the Id1 attitude, promptly do not protect attitude; In the service protection method of 1+1 in arbitrary network and 1:1; the business that detects fault is according to its in advance good protection route; determine the node and the origin node of process on its protection route; add these nodes then and add multicast address; protect the request of switching to these node multicasts requirement source nodes; and the state that carries destination node is the Id1 attitude, promptly do not protect attitude.
3, according to claim 1 and 2 in all optical network based on the guard method of business, the content that it is characterized in that signaling is destination node sign, service identification, switching request, source node sign and state indication.
CNB021073902A 2002-03-19 2002-03-19 Protection method based on business in optical network Expired - Fee Related CN1149761C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB021073902A CN1149761C (en) 2002-03-19 2002-03-19 Protection method based on business in optical network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB021073902A CN1149761C (en) 2002-03-19 2002-03-19 Protection method based on business in optical network

Publications (2)

Publication Number Publication Date
CN1371188A true CN1371188A (en) 2002-09-25
CN1149761C CN1149761C (en) 2004-05-12

Family

ID=4740271

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB021073902A Expired - Fee Related CN1149761C (en) 2002-03-19 2002-03-19 Protection method based on business in optical network

Country Status (1)

Country Link
CN (1) CN1149761C (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1299459C (en) * 2003-06-17 2007-02-07 中兴通讯股份有限公司 Channel sharing ring protection supported protection switching protocol implementing method
CN100352226C (en) * 2004-12-13 2007-11-28 华为技术有限公司 Method for realizing M:N looped network protection switching operation
CN1848716B (en) * 2005-04-15 2010-10-06 华为技术有限公司 Method for modifying SNCP path
CN101877665A (en) * 2009-04-29 2010-11-03 华为技术有限公司 Ring network protecting method, network node and ring network
CN101321031B (en) * 2008-07-16 2011-12-07 中兴通讯股份有限公司 Sharing protection method and system for wavelength division multiplexing looped network
CN102857316A (en) * 2011-06-29 2013-01-02 中兴通讯股份有限公司 Method and system for realizing source looped network protection

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1299459C (en) * 2003-06-17 2007-02-07 中兴通讯股份有限公司 Channel sharing ring protection supported protection switching protocol implementing method
CN100352226C (en) * 2004-12-13 2007-11-28 华为技术有限公司 Method for realizing M:N looped network protection switching operation
CN1848716B (en) * 2005-04-15 2010-10-06 华为技术有限公司 Method for modifying SNCP path
CN101321031B (en) * 2008-07-16 2011-12-07 中兴通讯股份有限公司 Sharing protection method and system for wavelength division multiplexing looped network
CN101877665A (en) * 2009-04-29 2010-11-03 华为技术有限公司 Ring network protecting method, network node and ring network
WO2010124557A1 (en) * 2009-04-29 2010-11-04 华为技术有限公司 Ring network protection method, network node and ring network
US8830824B2 (en) 2009-04-29 2014-09-09 Huawei Technologies Co., Ltd Ring network protection method, network node and ring network
US9065758B2 (en) 2009-04-29 2015-06-23 Huawei Technologies Co., Ltd. Ring network protection method, network node and ring network
US9137147B2 (en) 2009-04-29 2015-09-15 Huawei Technologies Co., Ltd. Ring network protection method, network node and ring network
CN102857316A (en) * 2011-06-29 2013-01-02 中兴通讯股份有限公司 Method and system for realizing source looped network protection
CN102857316B (en) * 2011-06-29 2016-12-07 中兴通讯股份有限公司 A kind of method and system realizing source looped network protection

Also Published As

Publication number Publication date
CN1149761C (en) 2004-05-12

Similar Documents

Publication Publication Date Title
CN1309216C (en) Method for controlling plane participation protective rotation in ASON network
CN1285241C (en) Method and device for controlling and dispatching data in WDM light switching network
CN1744448A (en) Dual-fiber optical multiplexing section sharing protective ring protecting method and its node device
CN1694418A (en) Method for combining multi-section protection and mesh network recovery
CN1941730A (en) Method for protecting RPR bridge redundancy
CN1747368A (en) Restoring method of grid network service
CN101047440A (en) Method of service route return
CN1645840A (en) Fast rerouting of traffic in a circuit switched mesh network
CN1859431A (en) Method for realizing two-way marked exchange path
CN1556637A (en) Method of proceeding failure recovery using shared spare passage in lattice shape network
CN100352226C (en) Method for realizing M:N looped network protection switching operation
CN1859157A (en) Service protective method
CN1674527A (en) Method for enhancing survivability of automatic exchange optical network
CN1812360A (en) Intelligent optical network business re-routing trigging method
CN1149761C (en) Protection method based on business in optical network
CN1798051A (en) Method of network fault recovery crossing over connections in multiple domains
CN1801749A (en) Method for protecting data service in metropolitan area transmission network
CN1275413C (en) Burst counting and multiplexing method for avoiding optical signal conflict in optical network
CN1753324A (en) Method of implementing M:N protection in communication network and its network node device
CN1558621A (en) Method for recovering route in all-purpose multiple protocol label switched network
CN1780190A (en) Optical network service processing method
CN1162998C (en) Multifnctional light split/insersion multiplexer
CN1753323A (en) Implementation method of protection exchanging in circular network
CN1738213A (en) Method for preventing error connection
CN1299459C (en) Channel sharing ring protection supported protection switching protocol implementing method

Legal Events

Date Code Title Description
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C19 Lapse of patent right due to non-payment of the annual fee
CF01 Termination of patent right due to non-payment of annual fee