WO2012037812A1 - 网状网中实现业务保护共享的方法及装置 - Google Patents

网状网中实现业务保护共享的方法及装置 Download PDF

Info

Publication number
WO2012037812A1
WO2012037812A1 PCT/CN2011/073366 CN2011073366W WO2012037812A1 WO 2012037812 A1 WO2012037812 A1 WO 2012037812A1 CN 2011073366 W CN2011073366 W CN 2011073366W WO 2012037812 A1 WO2012037812 A1 WO 2012037812A1
Authority
WO
WIPO (PCT)
Prior art keywords
protection
service
status
state
path
Prior art date
Application number
PCT/CN2011/073366
Other languages
English (en)
French (fr)
Inventor
张媛媛
富森
付占亮
董均
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Priority to EP11826339.1A priority Critical patent/EP2621132B1/en
Publication of WO2012037812A1 publication Critical patent/WO2012037812A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/28Routing or path finding of packets in data switching networks using route fault recovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/40Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/34Modification of an existing route

Definitions

  • the present invention relates to a network protection technology, and more particularly to a method and apparatus for implementing service protection sharing in a mesh network. Background technique
  • the intelligent mesh recovery method can realize the protection of the mesh network by using the dynamic calculation of the control plane, the recovery time of one hundred milliseconds cannot meet the requirement of the industry service recovery time of 50 milliseconds. Moreover, since multiple work services share protection resources in the mesh network, when multiple failures occur, protection resource usage conflicts may occur. Summary of the invention
  • the main purpose of the present invention is to provide a method and apparatus for implementing service protection sharing in a mesh network, which can avoid the problem of protecting resource usage conflicts, thereby effectively realizing resource sharing of protection bandwidth.
  • a method for implementing service protection and sharing in a mesh network comprising: generating a suppression relationship according to a working path of each service in the protection domain and a protection path information; and adjusting a protection status of the service according to the suppression relationship when the fault occurs/disappears, according to The protection status of the service performs protection processing.
  • the generating the suppression relationship includes: calculating and generating according to the protection path information stored by each service itself; the suppression relationship includes the protection service identifier, the number of all protection services that can be suppressed by the protection service, and the protection service can be suppressed by the protection service. Other protection business identifiers.
  • the rate of the service link between the mutually suppressed services in which the suppression relationship exists is the same, the protection path topology has two or more consecutive nodes overlapping, and the channel numbers used by the service are the same.
  • the protection status of the service includes a working path protection status and a protection path protection status.
  • the protection status of the service includes the protection service identifier, the status of the protection service, and a protection service identifier for suppressing the protection service.
  • the status of the protection service includes: an idle state indicating that no working service occupies the protection path, a busy state indicating that the protection path is occupied, and a suppressed state indicating that the protection service is suppressed by other protection services.
  • the protection status of the service includes: when the protection service of the service is in an idle state, if the local service fails, the local protection service state enters a busy state; when the failure disappears, the idle state is returned; when the service is protected If the high-priority service preempts the protection resource, the local protection service state enters the suppression state and is marked as local failure; when the high-priority service releases the protection resource, it returns to the busy state; when the protection service of the service is in the busy state If the local service failure occurs, the local protection service status is in the suppressed state, but the local protection is normal. When the local service failure occurs, the local protection service status is in the suppression state and is marked as local failure.
  • the protection service of the service is in the suppressed state and is marked as normal, if the high priority service returns to the working path and the protection resource is released, the local protection service state enters the idle state; the high priority service is switched to the protection path. Occupation insurance The resources are protected, and the local protection service status enters the suppression state and is marked as normal.
  • the performing the protection process according to the protection status of the service according to the suppression relationship, and performing the protection process according to the protection status of the service includes: when the working path of the work service in the protection domain is faulty, check the protection status of the service: If the protection service status is idle In the state, the protection switching is performed to switch the service to the protection path, and according to the suppression relationship, the other protection services that can be suppressed by the protection service are put into a suppressed state, and the state of the suppressed protection service is flooded; If the service is in the suppression state, the current alarm information is recorded.
  • the working service has multiple protection paths, and the protection switching is performed to switch the service to the protection.
  • the protection priority is determined by: suppressing the protection priority of the protection service with a small number of protection services is high; when the number of other protection services is the same, the protection protection of the protection service with a shorter protection path is higher; When the length is the same, the protection service with the smaller protection service ID has higher protection priority.
  • the adjusting the protection status of the service according to the suppression relationship, and performing the protection processing according to the protection status of the service includes: if the protection service is in a busy state, no protection processing is performed.
  • the protection process is performed according to the suppression relationship, and the protection process is performed according to the protection state of the service.
  • the protection service status is checked: If the protection service is in the suppression state, the recorded alarm information is deleted; In a busy state, the work business is returned to the working path, and the suppressed protection service is released, and the flooding is released to suppress the state of the protected business.
  • the method further includes: the released protection service viewing the recorded alarm information, and protecting the fault alarm.
  • a device for implementing service protection in a mesh network comprising at least a suppression relationship generation/synchronization module, a protection service status recording module, a protection processing module, and a flooding module, wherein the suppression relationship generation/synchronization module is used according to each service
  • the working path and the protection path information generate a suppression relationship and synchronize in the protection domain
  • the protection service status recording module is configured to record the protection service status in the protection status of the service, and when the protection service is suppressed, the status is updated to suppress And outputting the status of the suppressed protection service to the flooding module
  • the protection processing module configured to adjust the protection status of the service according to the suppression relationship in the suppression relationship generation/synchronization module when the failure occurs/disappears, according to the service
  • the protection status performs protection processing, and updates the protection service status recorded in the protection service status record module
  • the flooding module when receiving the notification of the protection processing module, protects the updated service status of the protection service status record module in the protection domain Flooding.
  • the protection processing module is specifically configured to: check the protection industry of the protection path of the faulty working path according to the information in the protection service status recording module.
  • the protection switching is performed to switch the service to the protection path, and according to the suppression relationship in the suppression relationship generation/synchronization module, the other protection services that can be suppressed by the protection service are suppressed.
  • the protection service is in a busy state, the service traffic is carried on the protection path and is not protected.
  • the protection processing module is further configured to preferentially switch to a protection service with a high protection priority for a service service that has multiple protection paths.
  • the protection processing module is specifically configured to check the protection service status of the working path in which the failure disappears when the protection service is in a busy state.
  • the work service returns to the working path, and the suppressed protection service is released, and the state of the protection service of the flooding module flooding recovery is notified.
  • the protection processing module is further configured to view the recorded alarm information for the released protection service, and process the recorded fault alarm.
  • the suppression relationship is generated according to the service path and the protection path information in the protection domain.
  • the protection status of the service is adjusted according to the suppression relationship, according to the protection status of the service.
  • 1 is a schematic diagram of service distribution in a preset ring
  • FIG. 2 is a flowchart of a method for implementing service protection sharing in a mesh network according to the present invention
  • FIG. 3 is a schematic diagram of information about synchronous suppression relationship of all nodes in the present invention.
  • FIG. 4 is a schematic structural diagram of a device for implementing service protection sharing in a mesh network according to the present invention
  • FIG. 5 is a schematic diagram of generating a suppression relationship when only a ring service is configured in the present invention
  • 6 is a schematic diagram of generating a suppression relationship when configuring a service on a chord on a ring according to the present invention
  • FIG. 7 is a schematic diagram of generating a suppression relationship when configuring a service on a ring, a string, or a ring chord according to the present invention
  • FIG. 8 is a schematic diagram showing changes in a protection service state according to the present invention.
  • FIG. 9 is a schematic diagram of state transition of the protection service occupation according to the present invention.
  • FIG. 10 is a schematic diagram of a protection process for a fault on a ring service according to the present invention.
  • FIG. 11 is a schematic diagram of protection processing of a fault on a string service according to the present invention.
  • FIG. 12 is a schematic diagram of a protection process for occurrence of a secondary failure according to the present invention. detailed description
  • preset ring protection was first proposed by W. D. Graver and D. Stamatelakis.
  • services on the chord on the ring can share the protection resources on the ring and the resource utilization is high.
  • only two nodes in the preset ring perform real-time switching, which is a protection method that combines the ring network protection switching speed and the mesh network bandwidth utilization rate, and has a wide development prospect especially in the optical transmission network.
  • a protection domain is often configured with multiple service types.
  • a link usually also contains multiple channels.
  • OTN optical transport network
  • the channel can be an optical channel transport unit (OTUk) and an optical channel data unit (ODUk).
  • OTU2 or ODU2 rate link can include eight OTU0 or ODU0 channels.
  • Figure 1 is a schematic diagram of service distribution in a preset ring.
  • the preset ring includes five nodes, namely, A, B, C, D, and E, where W1 indicates that the path is B-C.
  • Service indicates that the path is C-E's on-chord work service
  • W3 indicates that the path is C-A-E's work service across the ring chord (where the cross-section C-A is on the string, and the cross-section A-E is on the ring) on).
  • the protection path of the work service is configured on the ring and shared by the work services W1, W2, and W3.
  • 2 is a flowchart of a method for implementing service protection sharing in a mesh network according to the present invention. As shown in FIG. 2, the method includes:
  • Step 200 Generate a suppression relationship according to the working path of each service in the protection domain and the protection path information.
  • the suppression relationship generated in this step needs to be synchronized within the protection domain.
  • the suppression relationship includes the protection service identifier, the number of all protection services that can be suppressed by the protection service (also referred to as the number of suppression protection services), and other protection service identifiers that can be suppressed by the protection service (also called To suppress the protection of the business logo;).
  • the basic principle of generating the suppression relationship is that the mutually suppressed services are satisfied: the service link has the same rate, the protection path topology has two or more consecutive nodes overlapping, and the channel numbers used by the service are the same.
  • FIG. 3 is a schematic diagram of the synchronization suppression relationship information of all nodes in the present invention. Taking the preset ring shown in FIG. 1 as an example, as shown in FIG. 3, the synchronization process of one node includes: Node A first sends a suppression relationship table to the node B, After receiving the suppression relationship table, the node B updates the local suppression relationship, and sends the updated suppression relationship table to the node C, and so on, until the node A receives the suppression relationship table from the node E, and updates the local suppression relationship. After each of the protection domains is synchronized according to the process shown in Figure 3, a common suppression relationship table is stored in each node in the protection domain.
  • Step 201 When the fault occurs/disappears, the protection state of the service is adjusted according to the suppression relationship, and the protection process is performed according to the protection state of the service.
  • the protection status of the service includes the protection status of the working path and the protection status of the protection path.
  • the protection status of the service is shown in Table 2. It includes the protection service identifier, the status of the protection service, and the protection service identifier (also called the protection service identifier for suppressing the suppression).
  • the protection service status includes three types, indicating that no active service occupies the idle state of the protection path, indicating that the protection path is occupied (the work service is switched to the protection path), and that the protection service is other.
  • Protect the suppressed state suppressed by the business. In the suppressed state, no signal degradation (SD) and/or signal failure (SF) alarms are processed.
  • SD signal degradation
  • SF signal failure
  • the protection service can be suppressed by one or more other protection services having a suppression relationship, and the protection service can be used only when all the protection services that are suppressed are released.
  • check the protection status of the service When the protection service status is idle or suppressed, the service traffic is carried on the working path.
  • the protection switching is performed to switch the service to the protection path, and according to the suppression relationship, the other protection services that can be suppressed by the protection service are put into a suppressed state, and the state of the suppressed protection service is flooded. . Further, for the work service that has multiple protection paths, the service is preferentially switched to the protection service with high protection priority;
  • the protection service If the protection service is in the suppressed state, the alarm information that is not currently processed is recorded. When the protection service is busy, the service traffic is carried on the protection path and is not protected.
  • the protection service is in the suppressed state, that is, only the alarm at the time of the fault is recorded, and no protection switching is triggered, the record of the alarm is deleted directly. If the protection service is busy, the service has been switched to the protection path. , return the work business to the working path, And releasing the suppressed protection service to be put into a suppressed state, the other protection services that can be suppressed by the protection service are restored to the idle state, and the state of the protection service of the flood recovery is restored.
  • the released protection service views the previously recorded alarm information, and processes the recorded untriggered failure alarm in the manner of step 201.
  • the flooding of the present invention is not limited to the scope of the present invention, and is not intended to limit the scope of the present invention.
  • the priority of the work service is determined by the quality of service level specified by the customer. In the scenario where multiple work services share the protection resources, priority is given to achieve high-quality work service priority protection. In a scenario where a working service has multiple protection paths, in order to prevent the switching direction of the upstream and downstream nodes of the service from being inconsistent when the switching is performed, and to reduce the conflict of the protection link in the case of multiple faults, it is necessary to determine the protection priority of the protection service. .
  • the protection priority of the protection service is determined by: suppressing the protection service with a small number of protection services as the protection service with a high protection priority; and protecting the protection of the protection path with a shorter protection path when the number of other protection services is the same If the protection path length (the number of nodes included in the topology) is also the same, the protection service with a smaller protection service ID has a higher protection priority.
  • FIG. 4 is a schematic structural diagram of a device for implementing service protection sharing in a mesh network according to the present invention. As shown in FIG. 4, the method includes at least a suppression relationship generation/synchronization module, a protection service state recording module, a protection processing module, and a flooding module. among them,
  • the suppression relationship generation/synchronization module is configured to generate a suppression relationship according to the working path of each service and the protection path information, and synchronize in the protection domain.
  • the protection service status recording module is configured to record the protection service status in the protection status of the service.
  • the status is updated to the suppression state, and the status of the suppressed protection service is output to the flooding module.
  • the protection processing module is configured to adjust the protection state of the service according to the suppression relationship in the suppression relationship generation/synchronization module when the fault is generated/disappeared, and perform protection processing according to the protection state of the service, And the protection service status recorded in the protection service status record module is updated.
  • the flooding module when receiving the notification of the protection processing module, floods the protected service state of the protected service status record module in the protection domain.
  • the protection processing module is specifically configured to: according to the information in the protection service status recording module, check the protection service status of the protection path of the faulty working path,
  • the protection switching is performed to switch the service to the protection path, and according to the suppression relationship in the suppression relationship generation/synchronization module, the other protection services that can be suppressed by the protection service are put into a suppressed state, and the notification is notified.
  • the pan-red module floods the status of the protected business that is suppressed.
  • the protection processing module is also used to preferentially switch to a high priority protection service for a service service that has multiple protection paths.
  • the protection processing module is specifically configured to: check the protection service status of the working path where the failure disappears,
  • the protection service When the protection service is in a busy state, the work service is returned to the working path, and the other protection services that can be suppressed by the protection service that is to be suppressed in the suppressed protection service are released to the idle state, and the flooding module is flooded. The state of the restored protection business.
  • the protection processing module is further configured to view the previously recorded alarm information for the released protection service, and process the untriggered failure alarm recorded.
  • step 200 the suppression relationship is calculated by the node based on the protection path information stored by itself.
  • the node in the protection domain first calculates the suppression relationship of the local protection service. For each additional protection service, a corresponding suppression relationship entry is added; then, synchronization is performed in the protection domain. To the total suppression relationship information. The generation of the suppression relationship will be described in detail below with reference to FIGS. 5 to 7.
  • FIG. 5 is a schematic diagram of generating a suppression relationship when only the service on the ring is configured in the present invention.
  • the preset ring includes five nodes, namely, A, B, C, D, and E, where W1 indicates that the path is B— C (as indicated by the thick solid line) on the ring working service, the protection route P1 is CDE-A-B (as indicated by the thick solid line).
  • W1 indicates that the path is B— C (as indicated by the thick solid line) on the ring working service
  • the protection route P1 is CDE-A-B (as indicated by the thick solid line).
  • the preset ring protection is equivalent to the traditional ring network protection.
  • FIG. 6 is a schematic diagram of generating a suppression relationship when configuring a service on a chord on a ring according to the present invention.
  • the single-chord work service W2 shown as a thick dotted line
  • the protection service of the W2 is performed.
  • the protection service P1 of W1 and the protection service P2,1 of W2 have overlapping paths CDE, which are mutually suppressed; W1 protection service P1 and W2 protection service P2, 2 have coincident path E-A —B, mutual suppression.
  • the number of protection services suppressed by the protection service P1 is 2, the protection service identifiers are P2, l and P2, 2; the protection services P2, l and the protection services P2, 2 have no overlapping segments, and There is a repressive relationship. Therefore, the number of protection services suppressed by the protection service P2, l is 1, the protection service identifier is P1, the number of protection services suppressed by the protection service P2, 2 is 1, and the protection service identifier is P1.
  • the protection service P2, 1 has the same number of protection services as the protection service P2, 2, but the path of the protection service P2, l is shorter than the protection service P2, 2, and therefore, the protection priority of the protection service P2, l Higher.
  • FIG. 7 is a schematic diagram of generating a suppression relationship when configuring services on a ring, a string, and a ring chord according to the present invention.
  • a work service W3 (such as thick) is added across the ring chord.
  • the topology of the protection service P3 is CDE (as indicated by a thick dotted line), which coincides with the path of the protection service P2, l. Therefore, the protection service P3 and the protection service P1 and the protection service P2 are protected. l Mutual suppression.
  • the number of protection services suppressed by the protection service P1 is 3, including the protection services P2, l, P2, 2, and P3; the number of protection groups suppressed by P2, l is 2, including the protection service P1 and P3;
  • the number of protection groups suppressed by the protection service P2, 2 is 1, which is the protection service P1. Further, since the protection service P2, 2 suppresses the least number of protection groups, its protection priority is the highest.
  • step 201 the protection service status changes according to the protection processing of the fault, which will be described in detail below with reference to Figs. 8 and 9.
  • FIG. 8 is a schematic diagram of changes in a protection service state according to the present invention, as shown in FIG.
  • the protection service When the protection service is in the idle state, if the local service fails, the local protection service state enters a busy state; when the fault disappears, the idle state is returned;
  • the protection service When the protection service is in a busy state, if the high-priority service preempts the protection resource, the local protection service state enters the suppression state and is marked as local failure; when the high-priority service releases the protection resource, it returns to the busy state;
  • the protection service When the protection service is in the as-suppressed state and is marked as normal, if the high-priority service is returned to the working path and the protection resource is released, the local protection service state enters the idle state; the high-priority service is switched to the protection path and the protection resource is occupied. , the local protection service status enters the suppression state and is marked as local normal.
  • FIG. 9 is a schematic diagram of the state transition of the protection service occupation according to the present invention. 4
  • the work service 1 and the work service 2 share the protection resource, and the priority of the work service 2 is higher than the priority of the work service 1.
  • the service 1 is switched first, the shared protection resource is occupied by the service 1.
  • the priority of the work service 2 is higher than the priority of the work service 1, therefore, Service 2 will preempt the protection resources.
  • service 2 fails first, the protection resource will be occupied by service 2. If service 1 fails, the protection resource cannot be preempted. Only after service 2 releases the protection resource and returns to the idle state, service 1 can Occupy.
  • FIG. 10 is a schematic diagram of protection processing of a fault on a ring service according to the present invention, For the protection service division, see Figure 7.
  • the service W1 on the ring is faulty and is switched to the protection path where the protection service P1 is located.
  • the protection service P2, l, protection service P2, 2 Both the protection service P3 and the protection service P3 are suppressed, the protection service status is set to the suppression state, and the updated suppression relationship is flooded. If the work service W2 or W3 fails before the fault of the service W1 is not restored, since the protection service is suppressed, it cannot be switched to the protection path.
  • the alarm generation information will be recorded.
  • the protection service P2, l, the protection service P2, 2 and the protection service P3 are deactivated. At this time, the protection processing of the recorded alarm can be re-triggered.
  • FIG. 11 is a schematic diagram of protection processing of a fault on a service on a string according to the present invention.
  • the service W2 on the string is faulty, and there are two protection paths.
  • the protection service P2, 1 suppresses the two protection services P1 and the protection service P3, and the protection service P2, 2 only suppresses one protection service P1. Therefore, the protection of the protection service P2, 2 is prioritized.
  • the service W2 on the string will be switched to the protection service P2, 2 of the high priority, and the protection service P1 is set to the suppression state, and the relationship is suppressed after the flooding is updated.
  • FIG. 12 is a schematic diagram of the protection process of the secondary fault in the present invention.
  • the fault of the working service W3 occurs.
  • the protection service P3 is in the idle state and can be switched to the protection of the protection service P3. On the path.
  • the protection service P1 is simultaneously suppressed by the protection service P2, l and the protection service P3, and can only be suppressed when the alarms of the work services W2 and W3 disappear. Then, during the suppression, if the work service W1 fails, the alarm can only be recorded first, and the switchover is not triggered. When the suppression is released, the recorded alarm is protected.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本发明提供了一种网状网中实现业务保护共享的方法及装置,包括根据保护域中各业务路径及其保护路径信息生成压制关系;在故障产生/消失时,根据压制关系调整业务的保护状态,根据业务的保护状态执行保护处理。本发明通过保护路由共享压制的方法,避免了保护资源使用冲突的问题,从而有效地实现了保护带宽的资源共享,提高了带宽容量的利用率,增强了系统的抗多次故障能力。

Description

网状网中实现业务保护共享的方法及装置 技术领域
本发明涉及网络保护技术, 尤指一种网状网中实现业务保护共享的方 法及装置。 背景技术
随着业务需求的不断发展, 传送网的网络节点个数越来越多, 拓朴越 来越复杂的网状网将得到更多的应用。 在网状网中, 传统的链型 1+1保护、 1:N保护、 M:N保护方案, 以及环网保护方案均无法直接应用。
目前, 虽然智能网状网恢复方法可以利用控制平面的动态计算实现网 状网的保护, 但是, 其百毫秒的恢复时间无法满足业界业务恢复时间 50毫 秒的要求。 而且, 由于在网状网中, 多个工作业务共享保护资源, 当出现 多个故障时, 会出现保护资源使用冲突问题。 发明内容
有鉴于此, 本发明的主要目的在于提供一种网状网中实现业务保护共 享的方法及装置, 能够避免保护资源使用冲突的问题, 从而有效实现保护 带宽的资源共享。
为达到上述目的, 本发明的技术方案是这样实现的:
一种网状网中实现业务保护共享的方法, 包括: 根据保护域中各业务 的工作路径及其保护路径信息生成压制关系; 在故障产生 /消失时, 根据压 制关系调整业务的保护状态, 根据业务的保护状态执行保护处理。
所述生成压制关系包括: 根据所述各业务自身存储的保护路径信息计 算生成; 所述压制关系包括本保护业务标识, 本保护业务能够压制的所有 保护业务的数目, 以及本保护业务能够压制的其它保护业务标识。 存在所述压制关系的相互压制的业务之间的业务链路的速率相同, 保 护路径拓朴有两个或两个以上连续节点重合, 并且业务所用的通道号一致。
所述业务的保护状态包括工作路径保护状态, 保护路径保护状态; 所 述业务的保护状态包括本保护业务标识, 本保护业务的状态, 以及对本保 护业务实施压制的保护业务标识。
所述本保护业务的状态包括: 表示没有工作业务占用该保护路径的空 闲态, 表示该保护路径被占用的忙碌态, 以及表示该保护业务被其它保护 业务所压制的压制态。
所述调整业务的保护状态包括: 当所述业务的保护业务处于空闲态时, 如果本地业务出现故障, 本地保护业务状态进入忙碌态; 故障消失时, 返 回空闲态; 当所述业务的保护业务处于忙碌态时, 如果高优先级业务抢占 保护资源, 本地保护业务状态进入压制态, 并且标记为本地失效; 在高优 先级业务释放保护资源时, 返回忙碌态; 当所述业务的保护业务处于压制 态, 且标记为本地失效时, 如果本地业务故障消失, 本地保护业务状态处 于压制态, 但标记为本地正常; 在本地业务故障产生时, 本地保护业务状 态处于压制态, 标记为本地失效; 当所述业务的保护业务处于压制态, 且 标记为本地正常时, 如果高优先级工作业务返回工作路径, 释放保护资源, 则本地保护业务状态进入空闲态; 高优先级工作业务倒换到保护路径, 占 用保护资源, 则本地保护业务状态进入压制态, 并标记为本地正常。
所述根据压制关系调整业务的保护状态, 根据业务的保护状态执行保 护处理包括: 当所述保护域中的工作业务所在工作路径发生故障时, 检查 其业务的保护状态: 如果保护业务状态为空闲态, 则进行保护倒换将业务 倒换到保护路径上, 并且, 根据所述压制关系, 将该保护业务所能够压制 的其它保护业务置为压制态, 泛洪被压制的保护业务的状态; 如果保护业 务为压制态, 则记录当前告警信息。
所述工作业务存在多个保护路径, 所述进行保护倒换将业务倒换到保 护路径上为: 将业务倒换到高保护优先级的保护业务所在的保护路径上。 所述保护优先级的确定包括: 压制其它保护业务数目少的保护业务的 保护优先级高; 在压制其它保护业务数目相同时, 保护路径较短的保护业 务的保护优先级较高; 在保护路径长度一致时, 保护业务标识较小的保护 业务的保护优先级较高。
所述根据压制关系调整业务的保护状态, 根据业务的保护状态执行保 护处理包括: 如果保护业务为忙碌态, 不作保护处理。
所述根据压制关系调整业务的保护状态, 根据业务的保护状态执行保 护处理包括: 当工作路径故障消失时, 检查其保护业务状态: 如果保护业 务处于压制态, 删除记录的告警信息; 如果保护业务处于忙碌态, 将工作 业务返回工作路径, 并且释放被压制的保护业务, 泛洪被释放压制的保护 业务的状态。
该方法还包括: 所述被释放的保护业务查看记录的告警信息, 对故障 告警进行保护处理。
一种网状网中实现业务保护的装置,至少包括压制关系生成 /同步模块、 保护业务状态记录模块、 保护处理模块, 以及泛洪模块, 其中, 压制关系 生成 /同步模块, 用于根据各业务的工作路径及其保护路径信息生成压制关 系, 并在保护域内进行同步; 保护业务状态记录模块, 用于记录业务的保 护状态中的保护业务状态, 在保护业务被压制时, 更新其状态为压制态, 并将被压制的保护业务的状态输出给泛洪模块; 保护处理模块, 用于在故 障产生 /消失时, 根据压制关系生成 /同步模块中的压制关系调整业务的保护 状态, 根据业务的保护状态执行保护处理, 并更新保护业务状态记录模块 中记录的保护业务状态; 泛洪模块, 用于接收到保护处理模块的通知时, 将保护业务状态记录模块更新后的保护业务状态在保护域内进行泛洪。
当工作路径发生故障时, 所述保护处理模块, 具体用于: 根据保护业 务状态记录模块中的信息, 检查发生故障的工作路径的保护路径的保护业 务状态, 在保护业务处于空闲态时, 进行保护倒换将业务倒换到保护路径 上, 并且, 根据压制关系生成 /同步模块中的压制关系, 将该保护业务所能 够压制的其它保护业务置为压制态, 通知泛红模块泛洪被压制的保护业务 的状态; 当保护业务处于压制态时, 记录当前告警信息; 当保护业务处于 忙碌态时, 业务流量承载在保护路径上, 不作保护处理。
所述保护处理模块, 还用于对于存在多个保护路径的工作业务, 优先 倒换到高保护优先级的保护业务上。
当工作路径故障消失时, 所述保护处理模块, 具体用于检查故障消失 的工作路径的保护业务状态, 在保护业务处于压制态时, 删除记录的告警 信息; 在保护业务处于忙碌态时, 将工作业务返回工作路径, 并且释放被 压制的保护业务, 通知泛洪模块泛洪恢复的保护业务的状态。
所述保护处理模块, 还用于对被释放的保护业务, 查看记录的告警信 息, 并处理记录下的故障告警。
从上述本发明提供的技术方案可以看出, 包括根据保护域中各业务路 径及其保护路径信息生成压制关系; 在故障产生 /消失时, 根据压制关系调 整业务的保护状态, 根据业务的保护状态执行保护处理。 本发明通过保护 路由共享压制的方法, 避免了保护资源使用冲突的问题, 从而有效地实现 了保护带宽的资源共享, 提高了带宽容量的利用率, 增强了系统的抗多次 故障能力。 附图说明
图 1为预置环中业务分布的示意图;
图 2为本发明网状网中实现业务保护共享的方法的流程图;
图 3为本发明所有节点同步压制关系信息的示意图;
图 4为本发明网状网中实现业务保护共享的装置的组成结构示意图; 图 5为本发明仅配置环上业务时生成压制关系的示意图; 图 6为本发明配置环上和弦上业务时生成压制关系的示意图; 图 7为本发明配置环上、 弦上、 跨越环和弦的业务时生成压制关系的 示意图;
图 8为本发明保护业务状态的变化示意图;
图 9为本发明保护业务占用的状态转化示意图;
图 10为本发明环上业务发生故障的保护处理的示意图;
图 11为本发明弦上业务发生故障的保护处理的示意图;
图 12为本发明发生二次故障的保护处理的示意图。 具体实施方式
预置环保护的概念最早由 W. D. Graver和 D. Stamatelakis提出。在预置 环中, 环上业务和弦上业务能够共享环上保护资源, 资源利用率高。 此外, 预置环中只有两个节点进行实时的倒换, 是一种结合环网保护倒换速度快, 网状网带宽利用率高的保护方法, 尤其在光传输网络中具有广泛的发展前 景。
在网络规划时, 为了满足系统倒换时间和网络生存性要求, 保护域内 节点个数建议不超过 16个。 一个保护域内往往配置多种业务类型, 链路通 常也包含多个通道。 以光传送网络(OTN ) 为例, 通道可以是光通道传送 单元( OTUk )和光通道数据单元( ODUk ) 。 一个 OTU2或者 ODU2速率 的链路可以包括 8个 OTU0或者 ODU0的通道。 为了便于描述, 本文中的 图例均是在业务信号类型相同, 保护路径的通道号也一致的情况下进行说 明的。
图 1为预置环中业务分布的示意图, 如图 1所示, 预置环中包括 5个 节点即 A、 B、 C、 D和 E, 其中, Wl表示路径为 B— C的环上工作业务, W2表示路径为 C— E的弦上工作业务, W3表示路径为 C— A— E的跨越环 和弦的工作业务(其中, 跨段 C一 A在弦上, 跨段 A— E在环上)。 这三个 工作业务的保护路径配置在环上, 被工作业务 Wl、 W2、 W3所共享。 图 2为本发明网状网中实现业务保护共享的方法的流程图, 如图 2所 示, 包括:
步骤 200: 根据保护域中各业务的工作路径及其保护路径信息生成压制 关系。
进一步地, 本步骤中生成的压制关系需要在保护域内进行同步。
如表 1所示, 压制关系包括本保护业务标识, 本保护业务能够压制的所 有保护业务的数目 (也称为压制保护业务的数目), 以及本保护业务能够压 制的其它保护业务标识 (也称为压制保护业务标识;)。
本地保护业务标识 压制保护业务的数目 压制保护业务标识
表 1
本步骤中, 生成压制关系的基本原则是, 互相压制的业务之间满足: 业务链路的速率相同, 保护路径拓朴有两个或两个以上连续节点重合, 并 且业务所用的通道号一致。
同步压制关系是为了保证保护域内所有节点上存储的压制关系表信息 一致。 只有节点之间通过维护一个共同的压制关系表, 才能正确实现当工 作业务发生故障时, 业务对共享的保护路径的占用控制。 图 3为本发明所有 节点同步压制关系信息的示意图, 以图 1所示预置环为例, 如图 3所示, 其 中一个节点的同步过程包括: 节点 A首先向节点 B发送压制关系表, 节点 B 接收到压制关系表后, 更新本地压制关系, 并向节点 C发送更新后的压制关 系表, 以此类推, 直到节点 A收到来自节点 E的压制关系表后, 更新本地压 制关系。 当保护域内的每个都按照图 3所示的过程完成同步后, 保护域中的 各节点中都存储了一张共同的压制关系表。
步骤 201: 在故障产生 /消失时, 根据压制关系调整业务的保护状态, 根 据业务的保护状态执行保护处理。
业务的保护状态包括工作路径的保护状态, 以及保护路径的保护状态。 业务的保护状态如表 2所示, 包括本保护业务标识, 本保护业务的状态, 以 及对本保护业务实施压制的保护业务标识 (也称为实施压制的保护业务标 识;)。
本地保护业务标识 本保护业务状态 实施压制的保护业务标识
表 2
表 2 中, 本保护业务状态包括三种, 表示没有工作业务占用该保护路 径的空闲态, 表示该保护路径被占用 (工作业务倒换到了保护路径上) 的 忙碌态, 以及表示该保护业务被其它保护业务所压制的压制态。 在压制态 下, 对于信号劣化(SD )和 /或信号失效(SF )告警都不进行处理。 需要说 明的是, 根据压制关系, 保护业务可以被一个或多个其它存在压制关系的 保护业务所压制, 只有当所有实施压制的保护业务都释放保护资源时, 该 保护业务才能被使用。 本步骤中, 当工作路径发生故障时, 检查其业务的保护状态: 当保护业务状态为空闲态或压制态时, 业务流量都承载在工作路径上, 此时, 如果保护业务处于空闲态, 即没有其它业务占用保护路径, 则进行 保护倒换将业务倒换到保护路径上, 并且, 根据压制关系, 将该保护业务 所能够压制的其它保护业务置为压制态, 泛洪被压制的保护业务的状态。 进一步地, 对于存在多个保护路径的工作业务, 优先倒换到高保护优先级 的保护业务上;
如果保护业务处于压制态, 则记录当前未被进行处理的告警信息。 当保护业务处于忙碌态时, 业务流量承载在保护路径上, 不作保护处 理。
当工作路径故障消失时, 检查其保护业务状态:
如果保护业务处于压制态, 即此前只记录了故障产生时的告警, 并未 触发任何保护倒换, 则直接删除这条告警的记录; 如果保护业务处于忙碌 态, 即工作业务已经倒换到了保护路径上, 则将工作业务返回工作路径, 并且释放被压制的保护业务即将被置为压制态的该保护业务所能够压制的 其它保护业务恢复为空闲态, 泛洪恢复的保护业务的状态。
进一步地, 被释放的保护业务查看之前记录的告警信息, 并且按照步 骤 201的方式处理记录下的未触发的故障告警。
其中, 泛洪属于本领域技术人员惯用技术手段, 具体实现不再本发明 的保护范围之内, 也不用于限定本发明的保护范围, 这里不再赘述。
其中, 工作业务的优先级由客户指定的服务质量等级确定, 在多条工 作业务共享保护资源的场景中, 通过优先级强占来实现高质量的工作业务 优先保护。 在一个工作业务具有多个保护路径的场景下, 为了防止倒换时, 业务的上、 下路节点倒换方向不一致, 以及减少多故障时保护链路使用冲 突的情况, 需要确定保护业务的保护优先级。 保护业务的保护优先级的确 定方法是: 压制其它保护业务数目少的保护业务作为高保护优先级的保护 业务; 在压制其它保护业务数目相同的情况下, 保护路径较短的保护业务 的保护优先级较高; 如果保护路径长度(拓朴包括的节点个数)也一致, 则保护业务标识较小的保护业务的保护优先级较高。
针对本发明方法, 还提供一种装置, 本发明装置可设置在保护域中的 各节点中。 图 4为本发明网状网中实现业务保护共享的装置的组成结构示 意图, 如图 4所示, 至少包括压制关系生成 /同步模块、 保护业务状态记录 模块、 保护处理模块, 以及泛洪模块, 其中,
压制关系生成 /同步模块, 用于根据各业务的工作路径及其保护路径信 息生成压制关系, 并在保护域内进行同步。
保护业务状态记录模块, 用于记录业务的保护状态中的保护业务状态, 在保护业务被压制时, 更新其状态为压制态, 并将被压制的保护业务的状 态输出给泛洪模块。
保护处理模块, 用于在故障产生 /消失时, 根据压制关系生成 /同步模块 中的压制关系调整业务的保护状态, 根据业务的保护状态执行保护处理, 并更新保护业务状态记录模块中记录的保护业务状态。
泛洪模块, 用于接收到保护处理模块的通知时, 将保护业务状态记录 模块更新后的保护业务状态在保护域内进行泛洪。
其中, 当工作路径发生故障时, 保护处理模块, 具体用于: 根据保护 业务状态记录模块中的信息, 检查发生故障的工作路径的保护路径的保护 业务状态,
在保护业务处于空闲态时, 进行保护倒换将业务倒换到保护路径上, 并且, 根据压制关系生成 /同步模块中的压制关系, 将该保护业务所能够压 制的其它保护业务置为压制态, 通知泛红模块泛洪被压制的保护业务的状 态。 此时, 保护处理模块, 还用于对于存在多个保护路径的工作业务, 优 先倒换到高优先级的保护业务上;
当保护业务处于压制态时, 记录当前未被进行处理的告警信息。
当保护业务处于忙碌态时, 业务流量承载在保护路径上, 不作保护处 理。
当工作路径故障消失时, 保护处理模块, 具体用于: 检查故障消失的 工作路径的保护业务状态,
在保护业务处于压制态时, 直接删除这条告警的记录;
在保护业务处于忙碌态时, 将工作业务返回工作路径, 并且释放被压 制的保护业务即将被置为压制态的该保护业务所能够压制的其它保护业务 恢复为空闲态, 通知泛洪模块泛洪恢复的保护业务的状态。
所述保护处理模块, 还用于对被释放的保护业务, 查看之前记录的告 警信息, 并处理记录下的未触发的故障告警。
下面结合实施例对本发明方法进行详细描述。
在步骤 200 中, 压制关系是由节点根据自身存储的保护路径信息计算 生成的。 保护域中的节点首先计算本地保护业务的压制关系, 每增加一条 保护业务, 相应的增加一个压制关系表项; 然后在保护域内进行同步, 得 到总的压制关系信息。 下面结合图 5~图 7详细描述压制关系的生成。
图 5为本发明仅配置环上业务时生成压制关系的示意图, 如图 5所示, 预置环中包括 5个节点即 A、 B、 C、 D和 E, 其中, Wl表示路径为 B— C (如粗实线所示) 的环上工作业务, 保护路由 P1为 C D E— A—B (如 粗实线所示)。 当仅配置环上业务时, 不存在保护业务的压制关系, 这时的 预置环保护相当于传统的环网保护。
图 6为本发明配置环上和弦上业务时生成压制关系的示意图, 如图 6 所示, 在图 5所示情况下, 继续增加单弦工作业务 W2 (如粗虚线所示), W2的保护业务有两个路由, 一个保护业务是 P2,l , 拓朴为 C D E (如 粗虚线所示), 另一个保护业务是 P2,2, 拓朴为 E— A B—C (如粗虚线所 示)。 如图 6所示, W1的保护业务 P1与 W2的保护业务 P2,l存在重合的 路径 C D E, 互为压制关系; W1的保护业务 P1与 W2的保护业务 P2,2 存在重合的路径 E— A—B, 互为压制关系。 根据上述保护路径信息可知, 保护业务 P1压制的保护业务数目为 2, 保护业务标识为 P2,l和 P2,2; 保护 业务 P2,l与保护业务 P2,2的路径没有重叠的跨段,不存在压制关系,因此, 保护业务 P2,l压制的保护业务数目为 1 ,保护业务标识为 P1 ;保护业务 P2,2 压制的保护业务数目为 1 , 保护业务标识为 Pl。
进一步地,保护业务 P2, 1与保护业务 P2,2所压制的保护业务数目相同, 但是保护业务 P2,l的路径较保护业务 P2,2的短, 因此, 保护业务 P2,l的 保护优先级较高。
图 7为本发明配置环上、 弦上、 跨越环和弦的业务时生成压制关系的 示意图, 如图 7所示, 在图 6所示基础上, 又增加跨越环和弦的工作业务 W3 (如粗点划线所示 ), 其保护业务 P3的拓朴为 C D E (如粗点划线所 示), 与保护业务 P2,l的路径重合, 因此, 保护业务 P3与保护业务 Pl、 保 护业务 P2,l互为压制。 保护业务 P1压制的保护业务数目为 3 , 包括保护业 务 P2,l、 P2,2和 P3; P2,l所压制的保护组数目为 2, 包括保护业务 P1和 P3; 保护业务 P2,2所压制的保护组数目为 1 , 为保护业务 Pl。 进一步地, 由于保护业务 P2,2所压制的保护组数最少, 因此其保护优先级最高。
在步骤 201 中, 保护业务状态会根据故障的保护处理发生变化, 下面 结合图 8和图 9对其进行详细描述。
图 8为本发明保护业务状态的变化示意图, 如图 8所示,
当保护业务处于空闲态时, 如果本地业务出现故障, 则本地保护业务 状态进入忙碌态; 故障消失时, 则返回空闲态;
当保护业务处于忙碌态时, 如果高优先级业务抢占保护资源, 则本地 保护业务状态进入压制态, 并且标记为本地失效; 高优先级业务释放保护 资源时, 则返回忙碌态;
当保护业务处于压制态, 且标记为本地失效时, 如果本地业务故障消 失, 则本地保护业务状态仍处于压制态, 但是标记为本地正常; 本地业务 故障产生时, 状态不变即仍处于压制态, 标记为本地失效;
当保护业务处于压制态时, 且标记为本地正常, 如果高优先级工作业 务返回工作路径, 释放保护资源, 则本地保护业务状态进入空闲态; 高优 先级工作业务倒换到保护路径, 占用保护资源, 则本地保护业务状态进入 压制态, 并标记为本地正常。
图 9为本发明保护业务占用的状态转化示意图, 4叚设工作业务 1与工 作业务 2共享保护资源, 且工作业务 2的优先级高于工作业务 1的优先级。 如图 9所示, 如果业务 1先发生倒换, 则共享的保护资源被业务 1所占用; 接着, 业务 2发生故障时, 因为工作业务 2的优先级高于工作业务 1的优 先级, 因此, 业务 2会抢占保护资源; 如果业务 2先发生故障, 保护资源 会被业务 2所占用, 当业务 1发生故障时, 则无法抢占保护资源, 只有业 务 2释放保护资源返回空闲态后, 业务 1才能占占用。
下面结合图 10~图 12的实施例对本发明的保护处理进行详细描述。 图 10为本发明环上业务发生故障的保护处理的示意图, 工作业务和保 护业务的划分请参见图 7 , 如图 10所示, 4叚设环上业务 W1发生故障, 倒 换到保护业务 P1所在的保护路径上, 此时, 保护业务 P2,l、 保护业务 P2,2 和保护业务 P3都被压制, 将其保护业务状态设置为压制态, 并泛洪更新后 的压制关系。 如果在皇上业务 W1的故障未恢复之前, 工作业务 W2或 W3 发生故障, 由于其保护业务均被压制, 因此是不能倒换到保护路径上的, 但是, 这条告警产生信息会被记录下来, 在工作业务 W1 的故障消失时, 会解除对保护业务 P2,l、 保护业务 P2,2和保护业务 P3的压制, 此时, 可 以重新触发对记录的告警的保护处理。
图 11为本发明弦上业务发生故障的保护处理的示意图, 工作业务和保 护业务的划分请参见图 7, 如图 11所示, 4叚设弦上业务 W2发生故障, 有 两条保护路径可供选择, 且都处于空闲状态, 由于保护业务 P2,l压制两个 保护业务 P1和保护业务 P3 , 而保护业务 P2,2只压制 1个保护业务 P1 , 因 此, 保护业务 P2,2的保护优先较高, 弦上业务 W2将倒换到高优先级的保 护业务 P2,2上, 并将保护业务 P1设置为压制状态, 泛洪更新后压制关系。
图 12为本发明发生二次故障的保护处理的示意图, 在图 11所示的情 况下,接着出现工作业务 W3故障, 此时, 由于保护业务 P3处于空闲状态, 可以倒换到保护业务 P3的保护路径上。
在图 11和图 12所示的保护处理后,保护业务 P1同时被保护业务 P2,l 和保护业务 P3压制, 只有当工作业务 W2和 W3的告警都消失时, 才能被 解压制。 那么, 在被压制期间, 如果工作业务 W1 发生故障, 只能先记录 该告警, 不触发倒换, 在压制被解除时, 再对记录的告警进行保护处理。
以上所述, 仅为本发明的较佳实施例而已, 并非用于限定本发明的保 护范围, 凡在本发明的精神和原则之内所作的任何修改、 等同替换和改进 等, 均应包含在本发明的保护范围之内。

Claims

权利要求书
1、 一种网状网中实现业务保护共享的方法, 其特征在于, 包括: 根据保护域中各业务的工作路径及其保护路径信息生成压制关系; 在故障产生 /消失时, 根据压制关系调整业务的保护状态, 根据业务的 保护状态执行保护处理。
2、根据权利要求 1所述的方法, 其特征在于, 所述生成压制关系包括: 根据所述各业务自身存储的保护路径信息计算生成;
所述压制关系包括本保护业务标识, 本保护业务能够压制的所有保护 业务的数目, 以及本保护业务能够压制的其它保护业务标识。
3、 根据权利要求 2所述的方法, 其特征在于, 存在所述压制关系的相 互压制的业务之间的业务链路的速率相同, 保护路径拓朴有两个或两个以 上连续节点重合, 并且业务所用的通道号一致。
4、 根据权利要求 2所述的方法, 其特征在于, 所述业务的保护状态包 括工作路径保护状态, 保护路径保护状态;
所述业务的保护状态包括本保护业务标识, 本保护业务的状态, 以及 对本保护业务实施压制的保护业务标识。
5、 根据权利要求 4所述的方法, 其特征在于, 所述本保护业务的状态 包括: 表示没有工作业务占用该保护路径的空闲态, 表示该保护路径被占 用的忙碌态, 以及表示该保护业务被其它保护业务所压制的压制态。
6、 根据权利要求 5所述的方法, 其特征在于, 所述调整业务的保护状 态包括:
当所述业务的保护业务处于空闲态时, 如果本地业务出现故障, 本地 保护业务状态进入忙碌态; 故障消失时, 返回空闲态;
当所述业务的保护业务处于忙碌态时, 如果高优先级业务抢占保护资 源, 本地保护业务状态进入压制态, 并且标记为本地失效; 在高优先级业 务释放保护资源时, 返回忙碌态;
当所述业务的保护业务处于压制态, 且标记为本地失效时, 如果本地 业务故障消失, 本地保护业务状态处于压制态, 但标记为本地正常; 在本 地业务故障产生时, 本地保护业务状态处于压制态, 标记为本地失效; 当所述业务的保护业务处于压制态, 且标记为本地正常时, 如果高优 先级工作业务返回工作路径, 释放保护资源, 则本地保护业务状态进入空 闲态; 高优先级工作业务倒换到保护路径, 占用保护资源, 则本地保护业 务状态进入压制态, 并标记为本地正常。
7、 根据权利要求 5所述的方法, 其特征在于, 所述根据压制关系调整 业务的保护状态, 根据业务的保护状态执行保护处理包括:
当所述保护域中的工作业务所在工作路径发生故障时, 检查其业务的 保护状态:
如果保护业务状态为空闲态, 则进行保护倒换将业务倒换到保护路径 上, 并且, 根据所述压制关系, 将该保护业务所能够压制的其它保护业务 置为压制态, 泛洪被压制的保护业务的状态;
如果保护业务为压制态, 则记录当前告警信息。
8、 根据权利要求 7所述的方法, 其特征在于, 所述工作业务存在多个 保护路径, 所述进行保护倒换将业务倒换到保护路径上为: 将业务倒换到 高保护优先级的保护业务所在的保护路径上。
9、 根据权利要求 8所述的方法, 其特征在于, 所述保护优先级的确定 包括: 压制其它保护业务数目少的保护业务的保护优先级高;
在压制其它保护业务数目相同时, 保护路径较短的保护业务的保护优 先级较高;
在保护路径长度一致时, 保护业务标识较小的保护业务的保护优先级 较高。
10、 根据权利要求 5 所述的方法, 其特征在于, 所述根据压制关系调 整业务的保护状态, 根据业务的保护状态执行保护处理包括: 如果保护业 务为忙碌态, 不作保护处理。
11、 根据权利要求 7~10任一项所述的方法, 其特征在于, 所述根据压 制关系调整业务的保护状态, 根据业务的保护状态执行保护处理包括: 当工作路径故障消失时, 检查其保护业务状态:
如果保护业务处于压制态, 删除记录的告警信息;
如果保护业务处于忙碌态, 将工作业务返回工作路径, 并且释放被压 制的保护业务, 泛洪被释放压制的保护业务的状态。
12、 根据权利要求 11所述的方法, 其特征在于, 该方法还包括: 所述 被释放的保护业务查看记录的告警信息, 对故障告警进行保护处理。
13、 一种网状网中实现业务保护的装置, 其特征在于, 至少包括压制 关系生成 /同步模块、 保护业务状态记录模块、 保护处理模块, 以及泛洪模 块, 其中,
压制关系生成 /同步模块, 用于根据各业务的工作路径及其保护路径信 息生成压制关系, 并在保护域内进行同步;
保护业务状态记录模块, 用于记录业务的保护状态中的保护业务状态, 在保护业务被压制时, 更新其状态为压制态, 并将被压制的保护业务的状 态输出给泛洪模块;
保护处理模块, 用于在故障产生 /消失时, 根据压制关系生成 /同步模块 中的压制关系调整业务的保护状态, 根据业务的保护状态执行保护处理, 并更新保护业务状态记录模块中记录的保护业务状态;
泛洪模块, 用于接收到保护处理模块的通知时, 将保护业务状态记录 模块更新后的保护业务状态在保护域内进行泛洪。
14、 根据权利要求 13所述的装置, 其特征在于, 当工作路径发生故障 时, 所述保护处理模块, 具体用于: 根据保护业务状态记录模块中的信息, 检查发生故障的工作路径的保护路径的保护业务状态, 在保护业务处于空闲态时, 进行保护倒换将业务倒换到保护路径上, 并且, 根据压制关系生成 /同步模块中的压制关系, 将该保护业务所能够压 制的其它保护业务置为压制态, 通知泛红模块泛洪被压制的保护业务的状 态;
当保护业务处于压制态时, 记录当前告警信息;
当保护业务处于忙碌态时, 业务流量承载在保护路径上, 不作保护处 理。
15、 根据权利要求 14所述的装置, 其特征在于, 所述保护处理模块, 还用于对于存在多个保护路径的工作业务, 优先倒换到高保护优先级的保 护业务上。
16、 根据权利要求 14或 15所述的装置, 其特征在于, 当工作路径故 障消失时, 所述保护处理模块, 具体用于检查故障消失的工作路径的保护 业务状态,
在保护业务处于压制态时, 删除记录的告警信息;
在保护业务处于忙碌态时, 将工作业务返回工作路径, 并且释放被压 制的保护业务, 通知泛洪模块泛洪恢复的保护业务的状态。
17、 根据权利要求 16所述的装置, 其特征在于, 所述保护处理模块, 还用于对被释放的保护业务, 查看记录的告警信息, 并处理记录下的故障 告警。
PCT/CN2011/073366 2010-09-25 2011-04-27 网状网中实现业务保护共享的方法及装置 WO2012037812A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP11826339.1A EP2621132B1 (en) 2010-09-25 2011-04-27 Method and apparatus for sharing service protection in mesh network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010293284.X 2010-09-25
CN201010293284.XA CN101969382B (zh) 2010-09-25 2010-09-25 网状网中实现业务保护共享的方法及装置

Publications (1)

Publication Number Publication Date
WO2012037812A1 true WO2012037812A1 (zh) 2012-03-29

Family

ID=43548488

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/073366 WO2012037812A1 (zh) 2010-09-25 2011-04-27 网状网中实现业务保护共享的方法及装置

Country Status (3)

Country Link
EP (1) EP2621132B1 (zh)
CN (1) CN101969382B (zh)
WO (1) WO2012037812A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2846502A4 (en) * 2012-06-05 2015-06-24 Zte Corp PROCESS AND KNOTS FOR A SERVICE TO OCCUPY A PROTECTED RESOURCE IN COMMON PROTECTION

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101969382B (zh) * 2010-09-25 2014-07-02 中兴通讯股份有限公司 网状网中实现业务保护共享的方法及装置
CN102857950B (zh) * 2011-06-28 2017-06-27 中兴通讯股份有限公司 一种共享网格保护的通告方法及系统
CN103098416B (zh) * 2011-08-31 2016-08-03 华为技术有限公司 一种保护资源分配方法、装置和系统
CN102801596B (zh) * 2012-06-11 2015-01-21 华为技术有限公司 环网中业务处理方法及网络设备
CN106304202B (zh) * 2015-05-18 2019-04-30 中兴通讯股份有限公司 基于隧道共享的带宽控制方法及装置
CN106452817B (zh) * 2015-08-12 2019-05-31 中国电信股份有限公司 保护配置管理方法和系统
CN109005030B (zh) * 2018-07-13 2021-08-17 北京邮电大学 一种量子网络中密钥业务的保护方法及系统

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030018812A1 (en) * 2001-07-18 2003-01-23 Ganesh Lakshminarayana Method and apparatus for provisioning working paths in shared protection mesh network
CN1694418A (zh) * 2005-05-16 2005-11-09 烽火通信科技股份有限公司 一种复用段保护和格状网恢复结合的方法
CN101321124A (zh) * 2008-01-21 2008-12-10 北京邮电大学 波长可变换光网络双链路故障的分支路由搜索恢复方法
US7715713B1 (en) * 2002-09-30 2010-05-11 Meriton Networks Us Inc. Method and apparatus for providing multiple optical channel protection switching mechanisms in optical rings
CN101969382A (zh) * 2010-09-25 2011-02-09 中兴通讯股份有限公司 网状网中实现业务保护共享的方法及装置

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7652983B1 (en) * 2001-06-25 2010-01-26 At&T Intellectual Property Ii, L.P. Method for restoration and normalization in a mesh network
ITMI20011779A1 (it) * 2001-08-10 2003-02-10 Marconi Comm Spa Protezione di connessioni 'clear channel' stm-n/oc-n
CN101141349A (zh) * 2007-10-10 2008-03-12 中兴通讯股份有限公司 一种传输业务的保护方法
CN101227370B (zh) * 2008-02-05 2011-01-19 中兴通讯股份有限公司 传送多协议标签交换共享保护环故障的处理方法
CN102142976B (zh) * 2010-02-01 2015-04-01 中兴通讯股份有限公司 一种网状网保护域的共享保护方法及系统

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030018812A1 (en) * 2001-07-18 2003-01-23 Ganesh Lakshminarayana Method and apparatus for provisioning working paths in shared protection mesh network
US7715713B1 (en) * 2002-09-30 2010-05-11 Meriton Networks Us Inc. Method and apparatus for providing multiple optical channel protection switching mechanisms in optical rings
CN1694418A (zh) * 2005-05-16 2005-11-09 烽火通信科技股份有限公司 一种复用段保护和格状网恢复结合的方法
CN101321124A (zh) * 2008-01-21 2008-12-10 北京邮电大学 波长可变换光网络双链路故障的分支路由搜索恢复方法
CN101969382A (zh) * 2010-09-25 2011-02-09 中兴通讯股份有限公司 网状网中实现业务保护共享的方法及装置

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2846502A4 (en) * 2012-06-05 2015-06-24 Zte Corp PROCESS AND KNOTS FOR A SERVICE TO OCCUPY A PROTECTED RESOURCE IN COMMON PROTECTION
US9590842B2 (en) 2012-06-05 2017-03-07 Zte Corporation Method and node for service to occupy protected resource in shared protection

Also Published As

Publication number Publication date
CN101969382B (zh) 2014-07-02
EP2621132A1 (en) 2013-07-31
EP2621132B1 (en) 2016-09-14
CN101969382A (zh) 2011-02-09
EP2621132A4 (en) 2015-05-27

Similar Documents

Publication Publication Date Title
US11489588B2 (en) Method for supporting SNCP over packet network
WO2012037812A1 (zh) 网状网中实现业务保护共享的方法及装置
EP2159957B1 (en) Method for realizing protection for a shared mesh network
CN1333554C (zh) 一种复用段保护和格状网恢复结合的方法
EP3208971B1 (en) Method, device and system for reducing centralized protection switching time in potn system
WO2008119294A1 (fr) Procédé et matériel de restauration du commerce en réseau
WO2021109900A1 (zh) 基于FlexE网络的重路由方法及装置、电子设备和可读存储介质
WO2010028560A1 (zh) 在mesh网络中实现永久环网保护的方法
WO2010121459A1 (zh) 一种自动交换光网络中实现保护与恢复的方法及系统
WO2011091627A1 (zh) 一种网状网保护域的共享保护方法及系统
WO2006079286A1 (fr) Procede d'enclenchement d'un reroutage de service
JP2010130267A (ja) 伝送装置
US9893930B2 (en) Method and device for processing data forwarding
JP2005012306A (ja) ノード装置
CN102487327B (zh) 业务切换方法及装置
WO2013064027A1 (zh) 一种跨环业务的保护方法及装置
JP2001237794A (ja) 伝送装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11826339

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

REEP Request for entry into the european phase

Ref document number: 2011826339

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2011826339

Country of ref document: EP