Service protecting method for automatic exchange optical network

A service protection and automatic exchange technology, applied in the field of communication, can solve problems such as defects in the utilization of resources and no technical solutions have been proposed yet.

Inactive Publication Date: 2008-04-09
ZTE CORP
View PDF1 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The technology described by this patented method allows for quicker protection against overlapping requests from multiple sources without wasting valuable bandwidth or other communication resource capacity on any one line. This helps improve overall efficiency and quality control within an auto switched Optical Network system.

Problems solved by technology

This patents describes different ways how Optical Networks are protected during failures such as faulty connections between components like cables. One approach involves adding extra equipment called self-repairing capabilities on top of each component's own functions. These techniques help prevent damage caused by failure events but they cannot work together efficiently when dealing with higher priorities than usual traffic levels. Therefore, this problem arises due to lack of effective resource allocation strategies used within Automatic Switched Opticals (ASON).

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Service protecting method for automatic exchange optical network
  • Service protecting method for automatic exchange optical network
  • Service protecting method for automatic exchange optical network

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0046] Example 1: The network element detects the alarm information on the working connection

[0047] Combined with Figure 2, Figure 6, and Figure 7, the services on the working connection W2 in the protection group have been switched to the protection connection P1, and the services on the working connection W4 have been switched to the protection connection P2; at this time, the A-side network element detects Working connection W1 failed. The following will use this scenario to describe in detail the specific steps for the M:N protection group to implement protection switching when the A-side network element detects the alarm information on the working connection:

[0048] Step 21: Find the faulty working connection W1, and check whether there is an idle protection connection in the protection group;

[0049] Step 22: There is no idle protection connection in the protection group, compare the priorities of the working services on W1, W2 and W4;

[0050] Step 23: On the prote

example 2

[0053] Instance 2: The failure on the working connection disappears

[0054] Combining Figure 3, Figure 6, and Figure 7, in this example, the services on the working connection W1 in the protection group are switched to the protection connection P2, the services on the working connection W2 are switched to the protection connection P1, and the working connections W3, There are alarms on W4; at this time, the A-side network element detects that the fault on the working connection W2 disappears. The following will use this scenario to describe in detail the specific steps for the M:N protection group to implement protection switching when the A-side network element detects that the alarm on the working connection disappears:

[0055] Step 31: find out the working connection W2 where the fault disappears, and check whether the service on W2 has been switched to the protection connection;

[0056] Step 32: The service on W2 is switched to the protection connection P1, and its switch

example 3

[0059] Example 3: Alarm on protected connection

[0060] Combining Figure 4, Figure 6, and Figure 7, in this example, the service on the working connection W1 in the protection group is switched to the protection connection P2, and P1 is idle; at this time, the A-side network element detects an alarm on the protection connection P2 . The following will use this scenario to describe in detail the specific steps for the M:N protection group to implement protection switching when the A-side network element detects the alarm information on the protection connection:

[0061] Step 41: find out the faulty protection connection P2, and check whether there is a working service being protected on P2;

[0062] Step 42: find out the idle protection connection P1 in the protection group;

[0063] Step 43: Switch the working service on the protection connection P2 to the protection connection P1.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for service protection in an automatic exchange optical network, which comprises: searching the idle protection connections other than the above partial connection in the protection group when needing to switch a work service on a partial connection in the connection of the protection group; switching the work service on the partial connection onto the idle protection connection if the idle protection connection is found; otherwise, switching based on the priority of the work service on the partial connection and the priority of work services on other protection connections except for the partial connection mentioned above. The invention can completely protect the services with high priority in the automatic exchange optical network rapidly and efficiently in limited network resources, thereby complying with the service level agreement (SLA).

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products