摘要:
A method for permitting a network element to transmit to a second network element a message over a link, that identifies a tunnel segment occupying predefined proportion of the data transport on the link, and a status of the tunnel, so that each tunnel may be provided with independent protection switching messaging involves providing an identifying scheme for locally identifying the tunnels passing through the tunnel segment. In order to permit this information to be sent over existing (narrow) automatic protection switching (APS) channels, the identifying scheme only provides a local identifier of the tunnel. To permit extended messaging to include messages that do not fit in a single K-byte overhead, extension bits are used to identify continuation of a message across multiple frames.
摘要:
Protection techniques within optical communication networks are extremely important. An alternative to a line protection scheme, as most current optical communication networks use, is to utilize a path protection technique in which working and protection paths that are desired are assigned during network setup. During normal operations, only the working path is configured within the network elements' switch fabric with protection paths being left unconfigured. If a failure indication is detected in the working path by a network element, a protection entry within a routing table of the network element is looked up to determine protection switching data that is required to switch the data traffic to the pre-assigned protection path. This protection switching data is inserted within the path overhead for the data traffic so that it can be communicated to all of the network elements that require their switch fabrics reconfigured to establish the protection path of communications. This protection technique allows for similar switching speed to that of line switching protection such as BLSR designs, but with an increase in efficiency in terms of protection bandwidth.
摘要:
Commands are shown and described that enable a user to manipulate a call connection for the purpose of maintaining links in a network. The Block command prevents new traffic from being added to an output port of a device in a connection. The Forced Restoration/Release of Forced Restoration command set may be used to service the working channel. The Lockout of Restoration/Release of Lockout commands provide an alternative method of servicing a working connection and preventing unnecessary generation of redundant connections in the network.
摘要:
A method of creating/terminating a connection associated with an end-to-end path defined through a communications network. According to the invention, cross-connection download/undownload processes in each intermediate node of the end-to-end path are triggered substantially in parallel. A confirmation message indicative of successful completion of respective download/undownload processes in each intermediate node is subsequently propagated to an end-node of the path.
摘要:
A method of creating/terminating a connection associated with an end-to-end path defined through a communications network. According to the invention, cross-connection download/undownload processes in each intermediate node of the end-to-end path are triggered substantially in parallel. A confirmation message indicative of successful completion of respective download/undownload processes in each intermediate node is subsequently propagated to an end-node of the path.