-
公开(公告)号:US20230261982A1
公开(公告)日:2023-08-17
申请号:US18301092
申请日:2023-04-14
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Min Zhao , Yixiao Chen , Gang Xie
Abstract: This application provides a node configuration method, wherein the method includes: First, determinning a target network based on an original network, where the original network is for flooding control topology information, the target network is for flooding the service topology information, and a quantity of flooding paths in the target network is less than a quantity of flooding paths in the original network. Next, determinning attributes of all interfaces on each node, where the attributes of the interfaces include a first attribute and a second attribute, an interface with the first attribute is configured to flood the service topology information. Further, generating first configuration information based on the attributes of all the interfaces on each node, and sends, to each node, the first configuration information corresponding to each node, where the first configuration information indicates each node to configure the attributes of all the local interfaces.
-
公开(公告)号:US11848698B2
公开(公告)日:2023-12-19
申请号:US17733199
申请日:2022-04-29
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Gang Xie , Hao Li , Xianlong Luo , Min Zhao , Haomian Zheng
IPC: H04B10/032 , H04B10/038 , H04J14/02
CPC classification number: H04B10/032 , H04B10/038 , H04J14/0287
Abstract: A path protection method includes receiving, by a source node of a first path, a path event notify message from a first node on the first path. The path event notify message includes indication information that the first path is predicted to fail. The path protection method further includes obtaining, by the source node, information about a predicted protection path. The information about the predicted protection path includes resource information of a second path useable to protect a service on the first path. The first path and the second path include the source node and a same sink node. The path protection method further includes storing, by the source node, the resource information of the second path.
-