CN1753386A - Method of elastic packet ring protection mode switching - Google Patents
Method of elastic packet ring protection mode switching Download PDFInfo
- Publication number
- CN1753386A CN1753386A CN 200410080007 CN200410080007A CN1753386A CN 1753386 A CN1753386 A CN 1753386A CN 200410080007 CN200410080007 CN 200410080007 CN 200410080007 A CN200410080007 A CN 200410080007A CN 1753386 A CN1753386 A CN 1753386A
- Authority
- CN
- China
- Prior art keywords
- ring
- protected mode
- node
- wraparound
- protection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
This invention relates to a method for switching the protection modes of a spring packet ring including: 1, computing the protection mode of a spring packet ring based on the mode designed for all nodes, comparing the configuration values of the protection modes of this node with all nodes in the topology database, if the value of any node is not in conformity with that of this one, then the protection mode of the spring packet ring is forced to become to a conversion mode and carry out step 3, 2, comparing the computed protection modes with that registered by history, if they are the same, then it is turned to step 1, otherwise, the ring protection mode is switched to the computed one, 3, switching and registering the protection modes of the ring.
Description
Technical field
The present invention relates to Resilient Packet Ring (RPR:Resilient packet ring), the particularly guard method of Resilient Packet Ring.
Background technology
Along with Internet development, data traffic is being explosive growth.Adapt to this growth, communication network is carrying out all technological innovations.The metropolitan area network technology of various a new generations emerged in an endless stream over the past two years, wherein Resilient Packet Ring (RPR:Resilient packet ring) technology provides a good solution with the advance of its technology, the validity of investment, the superiority of performance, the diversity of supporting business.The RPR technology has solved these problems that Ethernet is used in telecommunications network: the protection of QoS mechanism, Resilient Packet Ring is efficiently switched, the justice of bandwidth is shared, space multiplexing technique etc.
In the IEEE802.17 draft proplsal, having proposed elastic packet ring protection mode has two kinds: turn to (STEERING) protected mode and wraparound (WRAPPING) protected mode.Turn to protected mode be the suggestion requirement must have, the wraparound protected mode then is optional.The selection of these two kinds of protected modes is to the COMPREHENSIVE CALCULATING result of the configuration of protected mode by all websites on the full Resilient Packet Ring.But how not provide the protected mode of compatible these two kinds of Resilient Packet Ring in the suggestion, and in the application system of reality, owing to a plurality of nodes on the Resilient Packet Ring may be produced by different manufacturers, the producer that has may only provide the necessary protected mode that turns to, and does not have the wraparound protected mode; This has just limited the protected mode of whole ring, and when increasing node newly or reducing node, the protected mode of ring just may switch; In addition, even in the process of the normal operation of Resilient Packet Ring, network management system also may be because a variety of causes changes the configuration of the protected mode of individual node, and this just may cause the variation of the protected mode of whole ring again.Have not yet to see about solving the disclosed scheme that two kinds of protected modes are compatible or switch.
Summary of the invention
Purpose of the present invention overcomes the compatible and uncertain problem of handover scheme of two kinds of protected modes of Resilient Packet Ring in the prior art exactly; the method that a kind of elastic packet ring protection mode switches has been proposed, with the switching that realizes two kinds of protected modes and reduce owing to switch the service damage that brings.
The method that elastic packet ring protection mode switches comprises the following steps:
The first step, go up the protected mode of the protected mode calculating elastic grouping ring of all node configuration according to ring: the protected mode Configuration Values of all nodes in this node and the topological database relatively, if the Configuration Values of the Configuration Values of any one node and this node is inconsistent the protected mode of Resilient Packet Ring is forced to and turns to protected mode, carried out for the 3rd step; If it is all consistent then the protected mode of Resilient Packet Ring is exactly the protected mode of this node;
If the protected mode of the protected mode of second Resilient Packet Ring that goes on foot, relatively calculates and the ring of historical record consistent, is then returned the first step; If inconsistent, then the protected mode with ring switches to the protected mode of calculating;
The 3rd step, the protected mode of switching Resilient Packet Ring and record switch the protected mode of back Resilient Packet Ring, and wherein: the protected mode of ring switched to turn to protected mode, handover operation comprises:
3.1, revise and the protection type of record ring for turning to protected mode;
3.2, be that the node of wraparound switches to and turns to protected mode with protected mode: the east orientation west that node is set returns to the state of no wraparound to the limit; Node removes the state that the wraparound protection enables; For ring all nodes in the option table, again this node is encircled selection according to the position and the state of this node in the topological database;
The protected mode of ring is switched to the wraparound protected mode, and handover operation comprises:
3.3, revise and the protection type of record ring is the wraparound protected mode;
3.4, whether the East and West direction edge of judging all nodes on the ring have the situation of interruption, if on the Resilient Packet Ring arbitrarily the place limit of an interruption is arranged, then the wraparound of Resilient Packet Ring protection enables, otherwise the wraparound protection of cancellation Resilient Packet Ring enables; Judge the rim condition of the east orientation west of all nodes to the limit, the side ring that the respective direction of respective nodes is set if there is rim condition in node returns and enables, otherwise the loopback of cancelling this limit enables.
In actual applications, above-mentioned changing method can be that circulation is carried out, and the above-mentioned first step is to trigger in the cycle.
The method that adopts the present invention to propose has solved the coexistence of the two kinds of protected modes (turning to and wraparound) in the resilient packet ring technology and the problem of switching, makes that two kinds of protected modes can be used in equipment flexibly.And, can make and also can not cause service damage because the sluggish protection that causes of configuration is disposed under the unmatched situation by the method that the present invention proposes.The use of the method for the invention can reduce because protected mode is switched the service damage that brings, and can improve the reliability and stability of equipment.The present invention can support respectively under open loop and closed-loop case, the switching of the protected mode of Resilient Packet Ring.And only when open loop, switch to from the wraparound protected mode and to turn to the business that influences that protected mode just can be very slight, can not cause professional damage under other situations.
Description of drawings
Fig. 1 is the flow chart of the changing method that proposes of the present invention;
Fig. 2 turns to the disconnected fibre of wraparound protected mode to handle schematic diagram;
Fig. 3 is the Resilient Packet Ring networking schematic diagram of one embodiment of the present of invention.
Embodiment
The present invention is described in further detail below in conjunction with drawings and Examples.
The several notions that arrive involved in the present invention once at first are described:
The protected mode of node: Resilient Packet Ring is made of a plurality of nodes, and each node on the ring can be become to turn to and the wraparound mode by exterior arrangement, is gone up the protection configuration of each node by ring and can calculate unique protected mode on the ring;
The protected mode of ring: the protected mode of Resilient Packet Ring is to be gone up the protection configuration result calculated of all nodes by ring, and the protected mode of a ring at a time is a kind of mode of determining.The computation rule of the protected mode of ring specifically describes below;
Topological database: this database all has portion at each node, and it has write down the information of all visible nodes on the Resilient Packet Ring, comprises the protection configuration, rim condition, ring number of node identification, node, distance of destination node distance sources node etc.;
Topology Protection: the protocol frame in the Resilient Packet Ring, to send by the node on the ring, the information of other these nodes of node on the notice ring, its packets of information contain the rim condition of protection configuration, the node of node, ring that frame belongs to number;
In actual applications, two kinds of situations may cause the switching of the protected mode of Resilient Packet Ring below:
1, site-local receive protected mode configuration variation and Resilient Packet Ring stable in, because the protection configuration variation of site-local may cause the variation of the protected mode of Resilient Packet Ring, may cause under this feelings that therefore the protected mode of Resilient Packet Ring is switched;
2, site-local is received other website Topology Protection (TP frame: when site protection configuration variation and Resilient Packet Ring are stable Topology and ProtectionFrame), comprised the protection configuration of transmit frame node in the Topology Protection, if the protection configuration variation of the node of transmit frame also may cause the variation of the protected mode of Resilient Packet Ring, may cause also under this feelings that therefore the protected mode of Resilient Packet Ring is switched;
Fig. 1 is the flow chart of the changing method that proposes of the present invention.As shown in Figure 1, comprise the following steps:
1, the protected mode of encircling according to the protected mode calculating elastic grouping that encircles the configuration of going up all websites.Its computational methods are: compare the protected mode Configuration Values of all nodes in this node and the topological database, the alarm that do not match is disposed in the protection that produces ring if the Configuration Values of the Configuration Values of any one node and this node is inconsistent.If have protection configuration not match to alarm then the protected mode of Resilient Packet Ring is forced to and turns to protected mode; If protection configuration does not match and alarms then the protected mode of Resilient Packet Ring is exactly the protected mode of this node.Why adopting such computational methods, is to consider that turning to protected mode is that suggestion stipulates that system is necessary, so each producer all needs to provide, and when generation did not match alarm, system switched to the protected mode that turns to that all nodes all support with same.If the protected mode of the protected mode of the Resilient Packet Ring of 2, relatively calculating and the ring of historical record consistent, then returned for the 1st step; If inconsistent, then the protected mode with ring switches to the protected mode of calculating.Mention above, the protected mode of ring may change, and the configuration of the protected mode of node also can change.Therefore following two kinds of situations may take place: the protected mode of the ring of historical records is for turning to protected mode; But before this calculates; all nodes on the ring receive the webmaster order and all have been configured to the wraparound protected mode; therefore each node does not all have to produce the alarm that do not match in the 1st step, but the protected mode of the ring that calculates this moment just should be the wraparound protected mode, therefore need switch.In like manner can release the another kind of situation that needs switching: the protected mode of the ring of historical records is the wraparound protected mode; But before this calculates; all nodes on the ring receive the webmaster order and all have been configured to turn to protected mode; therefore each node does not all have to produce the alarm that do not match in the 1st step, and still the protected mode of the ring that calculates this moment just should be and turns to protected mode, therefore need switch.3, switch the protected mode of Resilient Packet Ring and the protected mode that record switches the back Resilient Packet Ring.From rapping around to the switching that turns to protected mode: the protection type of revising and write down ring is for turning to protected mode; With protected mode is that the node of wraparound switches to and turns to protected mode: the east orientation west that node is set returns to the state of no wraparound to the limit; Node removes the state that the wraparound protection enables; For ring all nodes in the option table, again this node is encircled selection according to the position and the state of this node in the topological database.From redirecting to the switching of wraparound protected mode: the protection type of revising and write down ring is the wraparound protected mode; Whether the East and West direction edge of judging all nodes on the ring has the situation of interruption, if on the Resilient Packet Ring arbitrarily the place limit of an interruption is arranged, then the wraparound of Resilient Packet Ring protection enables, otherwise the wraparound protection of cancellation Resilient Packet Ring enables; Judge the rim condition of the east orientation west of all nodes to the limit, the side ring that the respective direction of respective nodes is set if there is rim condition in node returns and enables, otherwise the loopback of cancelling this limit enables.At first whether the East and West direction edge of all nodes on the judgement ring has the situation of interruption; because for ring protection mode is the Resilient Packet Ring of wraparound protected mode; data service can not swung at the source end when interruption is given birth in environment-development; still send according to original direction; so do not lose in order to guarantee business; just must carry out the action (promptly will rap around to the another one direction, not so descend all business of interrupting the limit to disconnect) of wraparound so in the wraparound protected mode by the data service of interrupting the limit at the edge that Resilient Packet Ring is interrupted.Simultaneously owing to carried out the wraparound operation at the edge that disconnected fine situation node is arranged, then after the wraparound, the ring value that professional ring value and its expectation are received in its packet just do not matched (because the ring value does not make an amendment during the interrupted edges wraparound), generally, the unmatched frame of ring value can abandon, but just can not abandon in this case.The wraparound protected mode is just to need judge the node whether interruption is arranged on the whole ring the node on ring, if the node that interruption arranged just expression carrying out wraparound protection at present and enabling (notifying node can not abandon the unmatched frame of ring value).
Fig. 2 turns to the disconnected fibre of wraparound protected mode to handle schematic diagram.As shown in Figure 2, under not disconnected fine situation, S2 is S2 → S3 → S4 → S5 → S6 to the path of the business of S6; When the situation of disconnected fibre appears in S3 between S4, will become S2 → S1 → S7 → S6 for the path that turns to protected mode S2 to the business of S6, professional swinging to of taking place; And will become S2 → S3 → S2 → S1 → S7 → S6 → S5 → S4 → S5 → S6 for wraparound protected mode S2 to the path of the business of S6, professional respectively in the west of the east orientation of S3 and S4 to producing wraparound.For the wraparound protected mode; because business can not swung to; can go to the edge of interruption; can do not lost in order to guarantee Frame; the wraparound protected mode just must be carried out wraparound at the end that interrupts, and just makes to carry out on the limit of the interruption of node that wraparound enables otherwise to cross the business of interrupted edges just obstructed.And simultaneously for generally, whether the ring value in the Frame that node can relatively receive when receiving Frame and the ring value of expectation mate, and have not directly abandoned with regard to thinking wrong frame if match.For the wraparound protected mode; because the latter end in interrupted edges need carry out the wraparound processing to business; ring value at the wraparound Frame can not be modified; and the ring value of Frame after the wraparound and transfer path has just been mated; handle (protection of the wraparound of Resilient Packet Ring just enables) so just need notify this time present Resilient Packet Ring carrying out wraparound, can not abandon the unmatched frame of ring value.
Fig. 3 is the Resilient Packet Ring networking schematic diagram of one embodiment of the present of invention.As shown in Figure 3, Fig. 3 (A) is this Resilient Packet Ring normal condition schematic diagram; Fig. 3 (B) be in the ring S2 to the schematic diagram of limit disconnection of S1.Below in conjunction with specific embodiment detailed embodiment of the present invention is described.
For Resilient Packet Ring as shown in Figure 3, if with the counter clockwise direction be ring 0 direction, clockwise direction is ring 1 direction, Zuo Weixi to, the right side is an east orientation.The meaning of each field is described as follows in the topological database.
Effective marker: whether this record is effective in the expression topological database, and 0 is invalid, and 1 is effective.
Ring number: in the expression topological database this record come source ring number, value is 0 or 1.
Index: this record is along the distance of ring direction, value from 1 to 255 in the expression topological database.
Website: the site address of the source Resilient Packet Ring of this record in the expression topological database.
Protection configuration: represent the protected mode configuration of this node, for turning to or wraparound.
Western to the edge: whether the west of representing this node to can reach.
Western to the edge: whether the east orientation of representing this node can reach.
The meaning of a field is described as follows in the ring option table.
Website: the site address of the source Resilient Packet Ring that writes down in the representative ring option table.
Ring selection information: the routing information of expression from this node to this website, value is 0 or 1.
Range information: achieve the goal from this node along the direction of the selecting distance of node of expression.
As shown in Figure 3, be the example point of processing method of the present invention with website S1, other 2 websites (S2 and S3) its processing modes and S1 are similar substantially.Suppose that when initial, all site protection modes all are set to turn to, then the information in the topological database of S1 is as shown in table 1 during closed loop:
The topological database of website S1 during table 1 closed loop
Effective marker | The ring number | Index | Website | The protection configuration | The west is to the edge | The |
1 | 0 | 1 | S3 | Turn to | 0 | 0 |
1 | 0 | 2 | S2 | Turn to | 0 | 0 |
1 | 0 | 3 | S1 | Turn to | 0 | 0 |
…… | …… | …… | …… | …… | …… | …… |
1 | 1 | 1 | S2 | Turn to | 0 | 0 |
1 | 1 | 2 | S3 | Turn to | 0 | 0 |
1 | 1 | 3 | S1 | Turn to | 0 | 0 |
…… | …… | …… | …… | …… | …… | …… |
Because the configuration of all site protections all turns to, so the protected mode of Resilient Packet Ring is also for turning to protected mode, and its ring selection information table is as shown in table 2:
The ring of website S1 is selected information during table 2 closed loop
Website | Ring selection information | Range information |
S3 | 0 | 1 |
| 1 | 1 |
When wherein the S3 website is arranged to the wraparound protected mode.At this moment website S1 just can receive the Topology Protection that website S3 sends, if this moment, Resilient Packet Ring was stable, then just carries out the computing of elastic packet ring protection mode at once; If this moment, Resilient Packet Ring was unsettled, then write down the protected mode of S3 website, waiting for that Resilient Packet Ring enters carries out the computing of elastic packet ring protection mode stable the time.Because website S3 is inconsistent with the protection configuration that ring is gone up other websites, therefore produce the unmatched alarm of protection configuration, the protected mode of Resilient Packet Ring remains and turns to protected mode.When this website S1 is arranged to the wraparound protected mode; then S1 at first sends Topology Protection; notify the protected mode of other these websites of website to change; and then carry out the computing of elastic packet ring protection mode, the computing mode changes the same with the protected mode of receiving other websites.When the protected mode of all websites was set to the wraparound protected mode, the protected mode of Resilient Packet Ring became the wraparound protected mode.Because do not have to occur disconnected fine situation, therefore the protection type that just simply will encircle is revised, ring selection information remains unchanged.At this moment business is not have damage.
When again from wraparound protected mode switching revolution row protected mode the time, ring selection information still remains unchanged, and also the protection type that just simply will encircle is repaiied.At this moment business also is not have damage.
When if the protected mode of all websites is configured to the wraparound protected mode, to suppose to occur disconnected fine situation between website S1 and the website S2, the topological classification of Resilient Packet Ring has become open loop, and the information in the topological database of S1 is as shown in table 3:
The topological database of website S1 when table 3 S1 and S2 interrupt
Effective marker | The ring number | Index | Website | The protection configuration | The west is to the edge | The |
1 | 0 | 1 | S3 | Wraparound | 0 | 0 |
1 | 0 | 2 | S2 | Wraparound | 1 | 0 |
…… | …… | …… | …… | …… | …… | …… |
In closed loop, the ring of website S1 selects information as shown in table 2.Under disconnected fine situation between S1 and the S2, finish protection owing to can carry out loopback at disconnected fine end, so the ring of website S1 selection information is still as shown in table 2, remains unchanged for the wraparound protected mode.The protected mode that causes Resilient Packet Ring when the protected mode configuration variation owing to website switches to (protected mode of Resilient Packet Ring is calculated with above-described the same) when turning to protected mode by the wraparound protected mode; can not pass through disconnected fine place for turning to the protected mode business; therefore at this moment need information, select the data in the information table to handle again ring according to topological database.Select each website in the information table for ring, the traversal topological database is searched the active position of website in topological database, upgrades ring selection information simultaneously.When the protected mode of Resilient Packet Ring becomes when turning to protected mode from the wraparound protected mode, the ring option table is as shown in table 4:
The ring of website S1 was selected information when table 4 S1 and S2 interrupted
Website | Ring selection information | Range information |
S3 | 0 | 1 |
S2 | 0 | 2 |
When revising ring and selecting, wraparound state that ring goes up all limits is set for not enabling, the wraparound of closed loop protection enables simultaneously.
When Resilient Packet Ring at this moment again when turning to protected mode to switch to unroll back protected mode, the ring option table remains unchanged, the wraparound state that the limit that rim condition is arranged on the ring is set simultaneously is for enabling, the wraparound protection of opening ring simultaneously enables.
Claims (2)
1, the method for elastic packet ring protection mode switching is characterized in that comprising the following steps:
The first step, go up the protected mode of the protected mode calculating elastic grouping ring of all node configuration according to ring: the protected mode Configuration Values of all nodes in this node and the topological database relatively, if the Configuration Values of the Configuration Values of any one node and this node is inconsistent the protected mode of Resilient Packet Ring is forced to and turns to protected mode, carried out for the 3rd step; If it is all consistent then the protected mode of Resilient Packet Ring is exactly the protected mode of this node;
If the protected mode of the protected mode of second Resilient Packet Ring that goes on foot, relatively calculates and the ring of historical record consistent, is then returned the first step; If inconsistent, then the protected mode with ring switches to the protected mode of calculating;
The 3rd step, the protected mode of switching Resilient Packet Ring and record switch the protected mode of back Resilient Packet Ring, and wherein: the protected mode of ring switched to turn to protected mode, handover operation comprises:
3.1, revise and the protection type of record ring for turning to protected mode;
3.2, be that the node of wraparound switches to and turns to protected mode with protected mode: the east orientation west that node is set returns to the state of no wraparound to the limit; Node removes the state that the wraparound protection enables; For ring all nodes in the option table, again this node is encircled selection according to the position and the state of this node in the topological database;
The protected mode of ring is switched to the wraparound protected mode, and handover operation comprises:
3.3, revise and the protection type of record ring is the wraparound protected mode;
3.4, whether the East and West direction edge of judging all nodes on the ring have the situation of interruption, if on the Resilient Packet Ring arbitrarily the place limit of an interruption is arranged, then the wraparound of Resilient Packet Ring protection enables, otherwise the wraparound protection of cancellation Resilient Packet Ring enables; Judge the rim condition of the east orientation west of all nodes to the limit, the side ring that the respective direction of respective nodes is set if there is rim condition in node returns and enables, otherwise the loopback of cancelling this limit enables.
2, changing method according to claim 1 is characterized in that: described changing method is that circulation is carried out, and the described first step is to trigger in the cycle.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2004100800075A CN1328884C (en) | 2004-09-22 | 2004-09-22 | Method of elastic packet ring protection mode switching |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2004100800075A CN1328884C (en) | 2004-09-22 | 2004-09-22 | Method of elastic packet ring protection mode switching |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1753386A true CN1753386A (en) | 2006-03-29 |
CN1328884C CN1328884C (en) | 2007-07-25 |
Family
ID=36680075
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2004100800075A Expired - Fee Related CN1328884C (en) | 2004-09-22 | 2004-09-22 | Method of elastic packet ring protection mode switching |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1328884C (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101582857B (en) * | 2009-06-30 | 2011-06-22 | 福建星网锐捷网络有限公司 | Data upper ring forwarding method based on elastic grouping ring and device |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2392942C (en) * | 2001-07-10 | 2010-03-16 | Tropic Networks Inc. | Protection system and method for resilient packet ring (rpr) interconnection |
EP1324543A1 (en) * | 2001-12-26 | 2003-07-02 | Alcatel | Method to protect RPR networks of extended topology, in particular RPR ring to ring and meshed backbone networks |
CN1266896C (en) * | 2002-08-29 | 2006-07-26 | 华为技术有限公司 | Fast replacing method of elastic group loop network |
-
2004
- 2004-09-22 CN CNB2004100800075A patent/CN1328884C/en not_active Expired - Fee Related
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101582857B (en) * | 2009-06-30 | 2011-06-22 | 福建星网锐捷网络有限公司 | Data upper ring forwarding method based on elastic grouping ring and device |
Also Published As
Publication number | Publication date |
---|---|
CN1328884C (en) | 2007-07-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110301120B (en) | Stream classification device, method and system | |
CN101572667B (en) | Method for realizing equal cost multipath of IP route and device | |
CN1240004C (en) | Route calculating apparatus wiht switchable route selective standard | |
CN111953507B (en) | Network topology discovery method and device and computer storage medium | |
CN102098224B (en) | Method and device for sharing data stream loads | |
CN102123091B (en) | Method, device and network equipment for generating multilink transparent transmission interconnection forwarding table | |
EP3681081A1 (en) | Data transmission method, device and system | |
CN102957616B (en) | In the method and system of ASIC repeating TRILL network message | |
CN102447623B (en) | Cascade method of optical network frequency spectrum resource fragments and apparatus thereof | |
CN100561970C (en) | A kind of method and apparatus of realizing load balancing | |
CN101352003A (en) | Method of providing virtual router functionality | |
CN1625160A (en) | Switch capable of controlling data packet transmission and related method | |
CN105978741A (en) | Network fault handling method and system | |
CN106254254B (en) | Mesh topology structure-based network-on-chip communication method | |
US20120163163A1 (en) | Apparatus and method for protection switching of multiple protection group | |
CN109327401B (en) | Flow scheduling method and system of SDN (software defined network) | |
CN108696438A (en) | The retransmission method and device of BIER messages | |
CN108337176B (en) | Message processing method and device | |
CN111314223A (en) | Routing interface ranking-based forwarding method in NDN (named data networking) | |
CN1494269A (en) | Transmission network restraint path calculating method | |
EP2429132B1 (en) | Table creating and searching method used by network processor | |
CN110830394B (en) | Method for generating routing table based on RapidIO network | |
CN102546380B (en) | Modified tree-based multicast routing scheme | |
CN109756422B (en) | Forwarding routing node selection method | |
CN104734825A (en) | Network redundancy fault tolerance method and system based on IP protocol expansion |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20070725 Termination date: 20170922 |
|
CF01 | Termination of patent right due to non-payment of annual fee |