CN106330512B - Method and device for generating protection subnet - Google Patents
Method and device for generating protection subnet Download PDFInfo
- Publication number
- CN106330512B CN106330512B CN201510375764.3A CN201510375764A CN106330512B CN 106330512 B CN106330512 B CN 106330512B CN 201510375764 A CN201510375764 A CN 201510375764A CN 106330512 B CN106330512 B CN 106330512B
- Authority
- CN
- China
- Prior art keywords
- protection
- port
- service
- relationship
- group
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 50
- 238000012544 monitoring process Methods 0.000 claims description 71
- 238000004891 communication Methods 0.000 claims description 8
- 238000001514 detection method Methods 0.000 claims description 5
- 239000000835 fiber Substances 0.000 claims description 5
- 238000005516 engineering process Methods 0.000 abstract description 3
- 230000006870 function Effects 0.000 description 27
- 238000012545 processing Methods 0.000 description 19
- 238000010586 diagram Methods 0.000 description 6
- 230000005540 biological transmission Effects 0.000 description 3
- 238000012423 maintenance Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000007781 pre-processing Methods 0.000 description 1
- 230000026676 system process Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
技术领域technical field
本发明涉及通信领域,具体而言,涉及一种保护子网生成方法和装置。The present invention relates to the field of communications, and in particular, to a method and device for generating a protection subnet.
背景技术Background technique
随着通信网络技术的发展,通信业务量在不断地增长,相应地,负责对网络网元设备进行维护管理的网元管理系统所支持的业务数量和保护组数目也越来越多,于此同时,保护功能作为网元管理系统的重要功能,在传输系统工程中使用越来越频繁,从而导致维护业务保护所需时间也越来越多。With the development of communication network technology, the traffic volume of communication is increasing continuously. Correspondingly, the number of services and protection groups supported by the network element management system responsible for the maintenance and management of network element equipment is also increasing. At the same time, the protection function, as an important function of the network element management system, is used more and more frequently in transmission system engineering, resulting in more and more time required to maintain service protection.
网元设备上的保护系统由检测器、控制器、执行器、协议传递器四大部分组成,其中检测器负责告警的检测;控制器负责保护协议的计算以及整个保护系统流程的控制;执行器负责业务倒换;协议传递器负责自动保护转换(Automatic Protection Switching,简称为APS)协议传递。为了实现网元设备上的保护系统,需要在网元管理系统中配置保护组和端口业务、组播路由、保护模式、高阶通道串联连接监控(Tandem ConnectionMonitoring,简称为TCM)工作模式、APS/保护通信信道(Protection CommunicationChannel,简称为PCC)开销监测使能等。The protection system on the network element equipment consists of four parts: detector, controller, actuator, and protocol transmitter. The detector is responsible for alarm detection; the controller is responsible for the calculation of the protection protocol and the control of the entire protection system process; the actuator Responsible for service switching; the protocol transmitter is responsible for automatic protection switching (Automatic Protection Switching, APS for short) protocol transmission. In order to realize the protection system on the NE device, it is necessary to configure the protection group and port services, multicast routing, protection mode, Tandem Connection Monitoring (TCM) working mode, APS/ The protection communication channel (Protection Communication Channel, PCC for short) overhead monitoring is enabled, and the like.
业务保护子网是将网元按照复用段/通道层/电层/客户侧保护将网络进行分割构成的子集,现有配置业务保护子网的方法有两种:The service protection subnet is a subset formed by dividing the network elements according to the multiplex section/channel layer/electrical layer/client side protection. There are two existing methods for configuring the service protection subnet:
第一种方法是:单点配置,即在业务途经的网元上依次配置保护组和端口业务,然后再配置保护组和端口业务相关功能,比如保护模式、TCM工作模式、APS/PCC开销监测使能、组播路由等,最后配置纤缆连接并搜索保护子网。The first method is: single-point configuration, that is, configure the protection group and port services in sequence on the network elements that the services pass through, and then configure the protection group and port services-related functions, such as protection mode, TCM working mode, and APS/PCC overhead monitoring. Enable, multicast routing, etc., and finally configure fiber and cable connections and search for protection subnets.
第一种方法的缺点是:配置保护组和端口业务次数比较多,比如业务途经10个网元,就需要配置10次保护组;配置保护组和端口业务过程复杂,容易出错;保护组相关功能与保护组保护关系端口存在关联,每次配置保护组相关功能时,需要预先记住保护组保护关系端口。The disadvantage of the first method is that there are many times to configure protection groups and port services. For example, when services pass through 10 NEs, you need to configure protection groups 10 times; the process of configuring protection groups and port services is complicated and prone to errors; protection group related functions It is associated with the protection group protection relationship port. Each time you configure the protection group related functions, you need to remember the protection group protection relationship port in advance.
第二种方法是:保护视图配置,即配置纤缆连接后自动发现业务,然后在保护视图中创建保护子网、保护组和端口业务,最后配置保护组和端口业务相关功能。The second method is: protection view configuration, that is, after configuring the fiber and cable connection to automatically discover services, then create protection subnets, protection groups and port services in protection view, and finally configure protection group and port services related functions.
第二种方法的缺点是:手工创建保护子网有六个步骤,并且每个步骤都需要用户选择或者确认配置数据,配置过程繁琐;保护组相关功能与保护组保护关系端口存在关联,每次配置保护组相关功能时,需要预先记住保护组的保护关系端口。The disadvantage of the second method is that there are six steps to manually create a protection subnet, and each step requires the user to select or confirm the configuration data, which makes the configuration process cumbersome; the protection group-related functions are associated with the protection group protection relationship ports, and each time When configuring protection group related functions, you need to remember the protection relationship port of the protection group in advance.
可见,对于传输系统工程来说,现有配置业务保护子网的方法存在较大的局限性,不能满足测试和工程要求。It can be seen that, for transmission system engineering, the existing method for configuring service protection subnets has great limitations and cannot meet the requirements of testing and engineering.
针对相关技术中配置业务保护子网过程复杂、效率低的技术问题,目前尚未提出有效的解决方案。Aiming at the technical problems of complex and low efficiency in the configuration of the service protection subnet in the related art, no effective solution has been proposed so far.
发明内容SUMMARY OF THE INVENTION
本发明提供了一种保护子网生成方法和装置,以至少解决相关技术中配置业务保护子网过程复杂、效率低的技术问题。The present invention provides a method and device for generating a protection sub-network, so as to at least solve the technical problems in the related art that the process of configuring the service protection sub-network is complicated and the efficiency is low.
根据本发明的一个方面,提供了一种保护子网生成方法,包括:根据端到端业务的物理路由,确定所述端到端业务的业务途经网元的保护关系端口;根据所述保护关系端口和所述端到端业务的保护参数,生成所述业务途经网元的保护组以及端口业务信息;根据所述业务途经网元的所述保护组以及所述端口业务信息,生成并下发与所述端到端业务相关的保护子网。According to an aspect of the present invention, a method for generating a protection subnet is provided, comprising: determining, according to a physical route of an end-to-end service, a protection relationship port of a network element where the service of the end-to-end service passes through; and according to the protection relationship protection parameters of the port and the end-to-end service, generate a protection group and port service information of the service passing through the network element; generate and deliver the protection group according to the protection group and the port service information of the service passing through the network element the protection subnet associated with the end-to-end service.
优选地,在根据所述端到端业务的所述物理路由,确定所述端到端业务的所述业务途经网元的所述保护关系端口之前,所述方法还包括:初始化数据,其中,所述初始化数据包括:查询所述端到端业务的所述物理路由;缓存所述端到端业务的所述保护参数;查询所述端到端业务的所述业务途经网元。Preferably, before determining that the service of the end-to-end service passes through the protection relationship port of the network element according to the physical route of the end-to-end service, the method further includes: initializing data, wherein: The initialization data includes: querying the physical route of the end-to-end service; caching the protection parameter of the end-to-end service; and querying the network element of the service route of the end-to-end service.
优选地,根据所述端到端业务的所述物理路由,确定所述端到端业务的所述业务途经网元的所述保护关系端口包括:分析所述端到端业务的所述物理路由、源端口以及宿端口,区分工作路径和保护路径,并且以所述宿端口为搜索起点,使用深度优先算法遍历工作路径和保护路径,直至找到所述源端口,并记录遍历的端口列表,生成有序的工作或者保护路径端口列表;遍历所述工作或者保护路径端口列表,分析路径上的保护关系端口、检测端口以及业务信息,生成所述业务途经网元的保护关系以及所述端口业务信息;计算所述业务途经网元的保护组名称、保护组ID、控制器、执行器,并结合所述端到端业务的所述保护参数,生成所述业务途经网元的所述保护组和所述端口业务信息。Preferably, according to the physical route of the end-to-end service, determining the protection relationship port of the network element where the service of the end-to-end service passes through includes: analyzing the physical route of the end-to-end service , source port and sink port, distinguish the working path and the protection path, and take the sink port as the search starting point, use the depth-first algorithm to traverse the working path and the protection path until the source port is found, and record the traversed port list, generate Ordered work or protection path port list; traverse the work or protection path port list, analyze the protection relationship port, detection port and service information on the path, and generate the protection relationship of the network element through which the service passes and the port service information ; Calculate the protection group name, protection group ID, controller, executor of the network element through the service, and combine the protection parameters of the end-to-end service to generate the protection group and the protection group of the service through the network element. the port service information.
优选地,根据所述保护关系端口和所述端到端业务的保护参数,生成所述业务途经网元的保护组以及端口业务信息包括以下至少之一:计算并设置所述保护组的保护关系接收端口相关的保护模式;计算并设置所述保护组的所述保护关系端口相关的高阶通道串联连接监控(TCM)工作模式;计算并设置所述保护组相关的组播路由;计算并设置所述保护组的所述保护关系保护端口相关的自动保护转换(APS)/保护通信信道(PCC)开销监测使能。Preferably, according to the protection relationship port and the protection parameter of the end-to-end service, generating the protection group of the service passing through the network element and the port service information includes at least one of the following: calculating and setting the protection relationship of the protection group Receive the protection mode related to the port; calculate and set the high-order channel serial connection monitoring (TCM) working mode related to the protection relationship port of the protection group; calculate and set the multicast route related to the protection group; calculate and set The protection port-related automatic protection switching (APS)/protection communication channel (PCC) overhead monitoring of the protection relationship of the protection group is enabled.
优选地,计算并设置所述保护组的所述保护关系接收端口相关的所述保护模式包括:从所述端到端业务的所述保护参数中获取保护模式参数;从网管数据库查询所述业务途经网元的保护组对象,生成保护关系接收端口列表;根据所述保护模式参数,配置所述保护关系接收端口列表中的保护关系接收端口所在单板的保护模式。Preferably, calculating and setting the protection mode related to the protection relationship receiving port of the protection group includes: acquiring protection mode parameters from the protection parameters of the end-to-end service; querying the service from a network management database Passing through the protection group object of the network element, a protection relationship receiving port list is generated; according to the protection mode parameter, the protection mode of the board where the protection relationship receiving port in the protection relationship receiving port list is configured is configured.
优选地,根据所述保护模式参数,配置所述保护关系接收端口列表中的保护关系接收端口所在单板的保护模式包括:从所述网管数据库查询所述保护关系接收端口所在单板的保护模式,并检查所述单板是否已配置保护模式;在所述单板已配置保护模式的情况下,根据所述保护模式参数,更新所述单板的保护模式;否则,按照预设规则生成所述单板的保护模式,并根据所述保护模式参数,更新所述单板的保护模式。Preferably, according to the protection mode parameter, configuring the protection mode of the board where the protection relationship reception port is located in the protection relationship reception port list includes: querying the protection mode of the board where the protection relationship reception port is located from the network management database , and check whether the board has been configured with the protection mode; if the board has been configured with the protection mode, update the protection mode of the board according to the protection mode parameters; otherwise, generate the protection mode according to the preset rules The protection mode of the single board is updated, and the protection mode of the single board is updated according to the protection mode parameter.
优选地,计算并设置所述保护组的所述保护关系端口相关的TCM工作模式包括:在判断到需要处理TCM工作模式的情况下,从所述端到端业务的所述保护参数中获取TCM工作模式参数;从网管数据库查询所述业务途经网元的保护组对象,生成保护关系端口列表;根据所述TCM工作模式参数,配置所述保护关系端口列表中的保护关系端口的TCM工作模式。Preferably, calculating and setting the TCM working mode related to the protection relationship port of the protection group includes: when it is determined that the TCM working mode needs to be processed, acquiring the TCM from the protection parameters of the end-to-end service Working mode parameters; query the protection group object of the network element that the service passes through from the network management database, and generate a protection relationship port list; configure the TCM working mode of the protection relationship port in the protection relationship port list according to the TCM working mode parameter.
优选地,根据所述TCM工作模式参数,配置所述保护关系端口列表中的保护关系端口的TCM工作模式包括:从所述网管数据库查询所述保护关系端口的TCM工作模式,并检查所述保护关系端口是否已配置TCM工作模式;在所述单板已配置TCM工作模式的情况下,根据所述TCM工作模式参数,更新所述保护关系端口的TCM工作模式;否则,按照预设规则生成所述保护关系端口的TCM工作模式,并根据所述TCM工作模式参数,更新所述保护关系端口的TCM工作模式。Preferably, according to the TCM working mode parameter, configuring the TCM working mode of the protection-related port in the protection-related port list includes: querying the TCM working mode of the protection-related port from the network management database, and checking the protection Whether the relationship port has been configured with the TCM working mode; in the case that the single board has been configured with the TCM working mode, update the TCM working mode of the protection relationship port according to the TCM working mode parameter; otherwise, generate the TCM working mode according to the preset rule The TCM working mode of the protection relationship port is updated, and the TCM working mode of the protection relationship port is updated according to the TCM working mode parameter.
优选地,计算并设置所述保护组相关的组播路由包括:在判断到需要处理组播路由的情况下,从所述端到端业务的所述保护参数中获取组播路由参数;从网管数据库查询所述业务途经网元的保护组对象,生成所述保护组的组播组;根据所述组播组以及纤缆连接,计算所述组播组的组播路由。Preferably, calculating and setting the multicast routing related to the protection group includes: in the case of determining that the multicast routing needs to be processed, acquiring the multicast routing parameters from the protection parameters of the end-to-end service; obtaining the multicast routing parameters from the network management The database queries the protection group object of the network element through which the service passes, and generates a multicast group of the protection group; and calculates the multicast route of the multicast group according to the multicast group and the fiber-cable connection.
优选地,计算并设置所述保护组的所述保护关系保护端口相关的APS/PCC开销监测使能包括:在判断到需要处理APS/PCC开销监测使能的情况下,从所述端到端业务的所述保护参数中获取APS/PCC开销监测使能参数;从网管数据库查询所述业务途经网元的保护组对象,生成保护关系保护端口列表;根据所述APS/PCC开销监测使能参数,配置所述保护关系保护端口列表中的保护关系保护端口的APS/PCC开销监测使能。Preferably, calculating and setting the APS/PCC overhead monitoring enable related to the protection port of the protection relationship of the protection group includes: when it is determined that the APS/PCC overhead monitoring enable needs to be processed, from the end-to-end Obtain the APS/PCC overhead monitoring enable parameter from the protection parameters of the service; query the protection group object of the network element that the service passes through from the network management database, and generate a protection relationship protection port list; according to the APS/PCC overhead monitoring enable parameter , configure the APS/PCC overhead monitoring enable of the protection relationship protection port in the protection relationship protection port list.
优选地,根据所述APS/PCC开销监测使能参数,配置所述保护关系保护端口列表中的保护关系保护端口的APS/PCC开销监测使能包括:从所述网管数据库查询所述保护关系保护端口的APS/PCC开销监测使能,并检查所述保护关系保护端口是否已配置APS/PCC开销监测使能;在所述单板已配置APS/PCC开销监测使能的情况下,根据所述APS/PCC开销监测使能参数,更新所述保护关系保护端口的APS/PCC开销监测使能;否则,按照预设规则生成所述保护关系保护端口的APS/PCC开销监测使能,并根据所述APS/PCC开销监测使能参数,更新所述保护关系保护端口的APS/PCC开销监测使能。Preferably, according to the APS/PCC overhead monitoring enabling parameter, configuring the APS/PCC overhead monitoring enabling of the protection relationship protection ports in the protection relationship protection port list includes: querying the protection relationship protection port from the network management database Enable APS/PCC overhead monitoring of the port, and check whether the protection relationship protection port has been configured with APS/PCC overhead monitoring enabled; if the single board has been configured with APS/PCC overhead monitoring enabled, according to the The APS/PCC overhead monitoring enable parameter is to update the APS/PCC overhead monitoring enable of the protection relationship protection port; otherwise, the APS/PCC overhead monitoring enable of the protection relationship protection port is generated according to the preset rule, and the APS/PCC overhead monitoring enable of the protection relationship protection port is generated according to the The APS/PCC overhead monitoring enable parameter is updated, and the APS/PCC overhead monitoring enable of the protection relationship protection port is updated.
根据本发明的另一个方面,还提供了一种保护子网生成装置,包括:确定模块,用于根据端到端业务的物理路由,确定所述端到端业务的业务途经网元的保护关系端口;第一生成模块,用于根据所述保护关系端口和所述端到端业务的保护参数,生成所述业务途经网元的保护组以及端口业务信息;第二生成模块,用于根据所述业务途经网元的所述保护组以及所述端口业务信息,生成与所述端到端业务相关的保护子网。According to another aspect of the present invention, there is also provided an apparatus for generating a protection subnet, comprising: a determining module, configured to determine, according to the physical route of the end-to-end service, the protection relationship of the network element that the service of the end-to-end service passes through a port; a first generation module is configured to generate, according to the protection relationship port and the protection parameter of the end-to-end service, a protection group and port service information of the service passing through the network element; a second generation module is configured to The service passes through the protection group of the network element and the port service information, and generates a protection subnet related to the end-to-end service.
通过本发明,采用根据端到端业务的物理路由,确定端到端业务的业务途经网元的保护关系端口;根据保护关系端口和端到端业务的保护参数,生成业务途经网元的保护组以及端口业务信息;根据业务途经网元的保护组以及端口业务信息,生成与端到端业务相关的保护子网的方式,解决了相关技术中配置业务保护子网过程复杂、效率低的技术问题,减少了人工操作,提升了配置效率。Through the present invention, the physical route according to the end-to-end service is used to determine the protection relation port of the network element through which the service of the end-to-end service passes; according to the protection relation port and the protection parameter of the end-to-end service, the protection group of the service passing through the network element is generated. and port service information; according to the protection group of the network element and port service information of the service passing through, the method of generating the protection subnet related to the end-to-end service solves the technical problem of complex and low efficiency in the related art of configuring the service protection subnet , reducing manual operations and improving configuration efficiency.
附图说明Description of drawings
此处所说明的附图用来提供对本发明的进一步理解,构成本申请的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:The accompanying drawings described herein are used to provide a further understanding of the present invention and constitute a part of the present application. The exemplary embodiments of the present invention and their descriptions are used to explain the present invention and do not constitute an improper limitation of the present invention. In the attached image:
图1是根据本发明实施例的保护子网生成方法的流程图;1 is a flowchart of a method for generating a protection subnet according to an embodiment of the present invention;
图2是根据本发明优选实施例的保护子网生成方法的流程图;2 is a flowchart of a method for generating a protection subnet according to a preferred embodiment of the present invention;
图3是根据本发明优选实施例的生成保护组和端口业务的流程图;3 is a flow chart of generating a protection group and port services according to a preferred embodiment of the present invention;
图4是根据本发明优选实施例的处理保护模式的流程图;FIG. 4 is a flowchart of processing protection mode according to a preferred embodiment of the present invention;
图5是根据本发明优选实施例的处理TCM工作模式的流程图;5 is a flow chart of processing a TCM working mode according to a preferred embodiment of the present invention;
图6是根据本发明优选实施例的处理组播路由的流程图;6 is a flowchart of processing multicast routing according to a preferred embodiment of the present invention;
图7是根据本发明优选实施例的处理APS/PCC开销监测使能的流程图;7 is a flowchart of processing APS/PCC overhead monitoring enabling according to a preferred embodiment of the present invention;
图8是根据本发明实施例的保护子网生成装置的结构示意图;8 is a schematic structural diagram of an apparatus for generating a protection subnet according to an embodiment of the present invention;
图9是根据本发明优选实施例的端到端配置业务保护子网的装置的结构示意图;9 is a schematic structural diagram of an apparatus for configuring an end-to-end service protection subnet according to a preferred embodiment of the present invention;
图10是根据本发明优选实施例的保护相关功能处理模块的优选结构示意图。FIG. 10 is a schematic diagram of a preferred structure of a protection-related function processing module according to a preferred embodiment of the present invention.
具体实施方式Detailed ways
下文中将参考附图并结合实施例来详细说明本发明。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。Hereinafter, the present invention will be described in detail with reference to the accompanying drawings and in conjunction with embodiments. It should be noted that the embodiments in the present application and the features of the embodiments may be combined with each other in the case of no conflict.
需要说明的是,本发明的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。It should be noted that the terms "first", "second" and the like in the description and claims of the present invention and the above drawings are used to distinguish similar objects, and are not necessarily used to describe a specific sequence or sequence.
本实施例提供了一种保护子网生成方法,图1是根据本发明实施例的保护子网生成方法的流程图,如图1所示,该流程包括如下步骤:This embodiment provides a method for generating a protection subnet. FIG. 1 is a flowchart of a method for generating a protection subnet according to an embodiment of the present invention. As shown in FIG. 1 , the process includes the following steps:
步骤S102,根据端到端业务的物理路由,确定端到端业务的业务途经网元的保护关系端口;Step S102, according to the physical route of the end-to-end service, determine the protection relationship port of the network element where the service of the end-to-end service passes through;
步骤S104,根据保护关系端口和端到端业务的保护参数,生成业务途经网元的保护组以及端口业务信息;Step S104, according to the protection relationship port and the protection parameter of the end-to-end service, generate the protection group and port service information of the service passing through the network element;
步骤S106,根据业务途经网元的保护组以及端口业务信息,生成并下发与端到端业务相关的保护子网。Step S106: Generate and deliver a protection subnet related to the end-to-end service according to the protection group and port service information of the network element through which the service passes.
通过上述步骤,利用端到端业务、保护子网和保护组、保护组相关功能三者的联系,生成并下发端到端业务相关的保护子网,从而实现了自动的配置,解决了相关技术中配置业务保护子网过程复杂、效率低的技术问题,减少了人工操作,提升了配置效率。Through the above steps, the connection between the end-to-end service, the protection subnet, the protection group, and the related functions of the protection group is used to generate and deliver the protection subnet related to the end-to-end service, thereby realizing automatic configuration and solving related technologies. The technical problem of complex and low efficiency in the configuration of service protection subnets in China reduces manual operations and improves configuration efficiency.
优选地,在步骤S102之前,还可以检查端到端业务是否具备配置保护子网、保护组、保护组相关功能的条件,如果条件不具备,则结束保护子网的生成。Preferably, before step S102, it is also possible to check whether the end-to-end service meets the conditions for configuring protection subnets, protection groups, and protection group-related functions. If the conditions are not met, the generation of the protection subnets is terminated.
优选地,如果具备上述的条件,在步骤S102之前,可以先初始化数据,其中,初始化数据包括:查询端到端业务的物理路由;缓存端到端业务的保护参数;查询端到端业务的业务途经网元(例如,单板对象以及网元对象)等。Preferably, if the above conditions are met, data can be initialized before step S102, wherein the initialization data includes: querying the physical route of the end-to-end service; caching the protection parameters of the end-to-end service; querying the service of the end-to-end service Passing through network elements (for example, board objects and network element objects), etc.
优选地,在步骤S102中,可以分析端到端业务的物理路由,确定业务途经网元的保护关系端口,结合端到端业务的保护参数,生成业务途经网元的保护组以及端口业务信息。例如,分析端到端业务的物理路由、源端口以及宿端口,区分工作路径和保护路径,并且以宿端口为搜索起点,使用深度优先算法遍历工作路径和保护路径,直至找到源端口,并记录遍历的端口列表,生成有序的工作或者保护路径端口列表;遍历工作或者保护路径端口列表,分析路径上的保护关系端口、检测端口以及业务信息,生成业务途经网元的保护关系以及端口业务信息;计算业务途经网元的保护组名称、保护组ID、控制器、执行器,并结合端到端业务的保护参数,生成业务途经网元的保护组和端口业务信息。Preferably, in step S102, the physical route of the end-to-end service can be analyzed, the protection relationship port of the service passing through the network element is determined, and the protection group of the service passing through the network element and port service information are generated in combination with the protection parameters of the end-to-end service. For example, analyze the physical route, source port, and sink port of the end-to-end service, distinguish the working path and the protection path, and use the sink port as the starting point of the search, use the depth-first algorithm to traverse the working path and the protection path until the source port is found, and record The traversed port list generates an ordered list of work or protection path ports; traverses the work or protection path port list, analyzes the protection relationship ports, detection ports and service information on the path, and generates the protection relationship and port service information of the network elements that the service passes through. ; Calculate the protection group name, protection group ID, controller, and executor of the network element that the service passes through, and combine the protection parameters of the end-to-end service to generate the protection group and port service information of the service passing network element.
优选地,在步骤S104中,可以采用多线程创建业务途经网元的保护组和端口业务信息,其中,这些线程分别执行以下之一的操作:计算并设置保护组的保护关系接收端口相关的保护模式;计算并设置保护组的保护关系端口相关的高阶通道串联连接监控(TCM)工作模式;计算并设置保护组相关的组播路由;计算并设置保护组的保护关系保护端口相关的自动保护转换(APS)/保护通信信道(PCC)开销监测使能。通过该方式,可以通过分析端到端业务途经的端口列表,自动计算业务关联的保护子网和保护组,然后结合保护组的保护关系端口和端到端业务的保护参数,自动生成保护组相关功能的配置数据。Preferably, in step S104, multi-threading can be used to create protection groups and port service information of the network element through which services pass through, wherein these threads respectively perform one of the following operations: calculating and setting the protection relationship of the protection group and receiving port-related protection Mode; calculate and set the protection relationship of the protection group; port-related higher-order channel serial connection monitoring (TCM) working mode; calculate and set the multicast routing related to the protection group; calculate and set the protection relationship of the protection group; automatic protection related to the protection port Switching (APS)/Protected Communication Channel (PCC) overhead monitoring enabled. In this way, the protection subnet and protection group associated with the service can be automatically calculated by analyzing the port list for end-to-end services, and then combined with the protection relationship ports of the protection group and the protection parameters of the end-to-end service, the protection group related ports can be automatically generated. Configuration data for the function.
优选地,使用多线程创建业务途经网元的保护组和端口业务信息的过程中,如果此过程没有异常,则继续创建保护子网,否则删除已经创建的保护组和端口业务信息,结束保护子网的生成。Preferably, in the process of using multi-threading to create the protection group and port service information of the service passing through the network element, if the process is not abnormal, continue to create the protection subnet, otherwise delete the created protection group and port service information, and end the protection subnet Generation of the web.
优选地,在步骤S106中,根据步骤S104中计算得到的业务途经网元的保护组以及端口业务信息,计算全网唯一的保护子网标识(Identification,简称为ID)、管理状态、倒换状态、关联保护组列表,生成业务相关的保护子网。Preferably, in step S106, according to the protection group and port service information of the service passing through the network element calculated in step S104, calculate the unique protection subnet identification (Identification, ID for short), management state, switching state, Associate the protection group list to generate service-related protection subnets.
图2是根据本发明优选实施例的保护子网生成方法的流程图,如图2所示,该流程包括如下步骤:FIG. 2 is a flowchart of a method for generating a protection subnet according to a preferred embodiment of the present invention. As shown in FIG. 2 , the flowchart includes the following steps:
步骤S201,检查端到端业务是否具备配置保护子网、保护组、保护组相关功能的条件;Step S201, checking whether the end-to-end service has the conditions for configuring protection subnets, protection groups, and protection group-related functions;
步骤S202,如果条件不具备,则退出处理流程,否则执行步骤S203;Step S202, if the condition is not met, exit the processing flow; otherwise, execute Step S203;
步骤S203,初始化数据,查询端到端业务物理路由,缓存端到端业务保护参数,查询端到端业务途经网元的单板和网元对象;Step S203, initializing data, querying the physical route of the end-to-end service, caching the protection parameters of the end-to-end service, and querying the single board and the network element object of the network element that the end-to-end service passes through;
步骤S204,分析端到端业务的物理路由,确定业务途经网元的保护关系端口,结合端到端业务的保护参数,使用多线程生成业务途经网元的保护组以及端口业务信息;Step S204, analyzing the physical route of the end-to-end service, determining the protection relationship port of the service passing through the network element, and combining the protection parameters of the end-to-end service, using multithreading to generate the protection group and port service information of the service passing through the network element;
步骤S205,根据业务途经网元的保护组以及端口业务信息,计算全网唯一的保护子网ID、管理状态、倒换状态、关联保护组列表,生成业务相关保护子网的结构;Step S205: Calculate the unique protection subnet ID, management state, switching state, and associated protection group list of the entire network according to the protection group of the network element and the port service information of the service passing through, and generate the structure of the service-related protection subnet;
步骤S206,创建保护组和保护子网,使用多线程创建业务途经网元的保护组和端口业务信息;Step S206, creating a protection group and a protection subnet, and using multithreading to create a protection group and port service information of the service passing through the network element;
步骤S207,检查保护组和端口业务信息是否创建成功,如果创建失败,则执行步骤S208,否则执行步骤S209;Step S207, check whether the protection group and the port service information are successfully created, if the creation fails, go to step S208, otherwise go to step S209;
步骤S208,删除已经创建的保护组和端口业务信息,并退出此处理流程;Step S208, delete the created protection group and port service information, and exit this processing flow;
步骤S209,计算并设置保护组保护关系接收端口相关的保护模式,不管此步骤是否失败,继续执行步骤S210;Step S209, calculating and setting the protection mode related to the receiving port of the protection group protection relationship, regardless of whether this step fails, continue to step S210;
步骤S210,计算并设置保护组保护关系端口相关的TCM工作模式,不管此步骤是否失败,继续执行步骤S211;Step S210, calculate and set the TCM working mode related to the protection group protection relationship port, regardless of whether this step fails, continue to perform step S211;
步骤S211,根据端到端业务保护参数以及步骤S204中的保护组和端口业务,检查是否需要处理组播路由或者APS/PCC开销监测使能;Step S211, according to the end-to-end service protection parameters and the protection group and port services in step S204, check whether it is necessary to process multicast routing or enable APS/PCC overhead monitoring;
步骤S212,如果需要处理组播路由,则计算并设置保护组相关的组播路由,处理流程结束;Step S212, if the multicast routing needs to be processed, then calculate and set the multicast routing related to the protection group, and the processing flow ends;
步骤S213,如果需要处理APS/PCC开销监测使能,计算并设置保护组保护关系端口相关的APS/PCC开销监测使能,结束处理流程;Step S213, if it is necessary to process the APS/PCC overhead monitoring enable, calculate and set the APS/PCC overhead monitoring enable related to the protection group protection relationship port, and end the processing flow;
图3是根据本发明优选实施例的步骤S204的优选流程图,如图3所示,优选地,在步骤S204中可以包括如下步骤:FIG. 3 is a preferred flowchart of step S204 according to a preferred embodiment of the present invention. As shown in FIG. 3 , preferably, step S204 may include the following steps:
步骤S301,分析端到端业务的物理路由以及源/宿端口,区分工作路径和保护路径,并且以宿端口为搜索起点,使用深度优先算法遍历工作和保护路径,直至找到源端口,同时记录此次操作遍历的端口列表,生成一条有序的工作或者保护路径端口列表;Step S301, analyze the physical route and source/sink port of the end-to-end service, distinguish the working path and the protection path, and take the sink port as the search starting point, use the depth-first algorithm to traverse the working and protection paths until the source port is found, and record this. The list of ports traversed by the operation to generate an ordered list of work or protection path ports;
步骤S302,遍历步骤S301中有序的工作或者保护路径端口列表,分析路径上的保护关系端口、检测端口以及业务信息,生成业务途经网元的保护关系以及端口业务信息;Step S302, traverse the ordered work or protection path port list in step S301, analyze the protection relationship port, detection port and service information on the path, and generate the protection relationship and port service information of the network element through which the service passes;
步骤S303,计算业务途经网元的保护组名称、保护组ID、控制器、执行器等,结合端到端业务的保护参数,生成网元相关的保护组和端口业务信息;Step S303, calculating the protection group name, protection group ID, controller, actuator, etc. of the network element that the service passes through, and combining the protection parameters of the end-to-end service, generating network element-related protection group and port service information;
步骤S304,根据端到端业务物理路由以及保护参数、网元版本等,优化步骤S303中的保护组和端口业务信息。Step S304, optimize the protection group and port service information in step S303 according to the physical route of the end-to-end service, protection parameters, network element version, etc.
优选地,在步骤S209中,从端到端业务的保护参数中获取保护模式参数;从网管数据库查询业务途经网元的保护组对象,生成保护关系接收端口列表;根据保护模式参数,配置保护关系接收端口列表中的保护关系接收端口所在单板的保护模式。Preferably, in step S209, the protection mode parameter is obtained from the protection parameter of the end-to-end service; the protection group object of the service passing through the network element is queried from the network management database, and the protection relationship receiving port list is generated; according to the protection mode parameter, the protection relationship is configured The protection relationship in the receiving port list indicates the protection mode of the board where the receiving port is located.
优选地,根据保护模式参数,配置保护关系接收端口列表中的保护关系接收端口所在单板的保护模式包括:从网管数据库查询保护关系接收端口所在单板的保护模式,并检查单板是否已配置保护模式;在单板已配置保护模式的情况下,根据保护模式参数,更新单板的保护模式;否则,按照预设规则生成单板的保护模式,并根据保护模式参数,更新单板的保护模式。Preferably, according to the protection mode parameter, configuring the protection mode of the board where the protection relationship receiving port is located in the protection relationship receiving port list includes: querying the protection mode of the board where the protection relationship receiving port is located from the network management database, and checking whether the board has been configured Protection mode; if the board has been configured with protection mode, the protection mode of the board is updated according to the protection mode parameters; otherwise, the protection mode of the board is generated according to the preset rules, and the protection mode of the board is updated according to the protection mode parameters. model.
图4是根据本发明优选实施例的步骤S209的优选流程图,如图4所示,优选地,在步骤S209中可以包括如下步骤:FIG. 4 is a preferred flowchart of step S209 according to a preferred embodiment of the present invention. As shown in FIG. 4 , preferably, step S209 may include the following steps:
步骤S401,从网管数据库查询网元保护组对象,生成保护关系接收端口列表;Step S401, query the network element protection group object from the network management database, and generate a protection relationship receiving port list;
步骤S402,从端到端业务保护参数中获取保护模式相关参数;Step S402, obtaining protection mode related parameters from end-to-end service protection parameters;
步骤S403,从网管数据库查询保护关系接收端口所在单板的保护模式;Step S403, querying the protection relationship from the network management database to receive the protection mode of the board where the port is located;
步骤S404,检查保护关系接收端口所在单板是否配置保护模式,如果未配置保护模式,则执行步骤S405,否则执行步骤S406;Step S404, check whether the protection mode is configured on the board where the protection relationship receiving port is located, if the protection mode is not configured, go to step S405, otherwise go to step S406;
步骤S405,按照默认规则生成保护关系接收端口所在单板的保护模式;Step S405, generating the protection mode of the board where the protection relationship receiving port is located according to the default rule;
步骤S406,根据步骤S402中保护模式相关参数,修改步骤S403或者步骤S405中保护关系接收端口相关的保护模式;Step S406, according to the protection mode related parameters in step S402, modify the protection mode related to the protection relationship receiving port in step S403 or step S405;
步骤S407,修改后的保护模式依次下发给相关网元。Step S407, the modified protection modes are sequentially delivered to the relevant network elements.
优选地,在步骤S210中:在判断到需要处理TCM工作模式的情况下,从端到端业务的保护参数中获取TCM工作模式参数;从网管数据库查询业务途经网元的保护组对象,生成保护关系端口列表;根据TCM工作模式参数,配置保护关系端口列表中的保护关系端口的TCM工作模式。Preferably, in step S210: when it is determined that the TCM working mode needs to be processed, the TCM working mode parameters are obtained from the protection parameters of the end-to-end service; the protection group object of the service passing through the network element is queried from the network management database, and the protection group object is generated. List of relational ports; according to the TCM working mode parameter, configure the TCM working mode of the protection relational port in the protection relational port list.
优选地,根据TCM工作模式参数,配置保护关系端口列表中的保护关系端口的TCM工作模式包括:从网管数据库查询保护关系端口的TCM工作模式,并检查保护关系端口是否已配置TCM工作模式;在单板已配置TCM工作模式的情况下,根据TCM工作模式参数,更新保护关系端口的TCM工作模式;否则,按照预设规则生成保护关系端口的TCM工作模式,并根据TCM工作模式参数,更新保护关系端口的TCM工作模式。Preferably, according to the TCM working mode parameter, configuring the TCM working mode of the protection relationship port in the protection relationship port list includes: querying the TCM working mode of the protection relationship port from the network management database, and checking whether the protection relationship port has been configured with the TCM working mode; If the TCM working mode is configured on the board, the TCM working mode of the protection-related port is updated according to the TCM working mode parameters; otherwise, the TCM working mode of the protection-related port is generated according to the preset rules, and the protection relationship is updated according to the TCM working mode parameters. TCM working mode of the relational port.
图5是根据本发明优选实施例的步骤S210的优选流程图,如图5所示,优选地,在步骤S210中可以包括如下步骤:FIG. 5 is a preferred flowchart of step S210 according to a preferred embodiment of the present invention, as shown in FIG. 5 , preferably, step S210 may include the following steps:
步骤S501,从端到端业务保护参数中获取TCM工作模式相关参数;Step S501, obtaining the relevant parameters of the TCM working mode from the end-to-end service protection parameters;
步骤S502,判断是否需要处理TCM工作模式,如果不需要处理,则执行步骤S503;否则执行步骤S504;Step S502, judging whether the TCM working mode needs to be processed, if no processing is required, then step S503 is performed; otherwise, step S504 is performed;
步骤S503,退出此次操作流程处理;Step S503, exit this operation flow process;
步骤S504,从网管数据库查询保护组对象,生成保护关系端口列表;Step S504, query the protection group object from the network management database, and generate a protection relationship port list;
步骤S505,从网管数据库查询保护关系端口相关的TCM工作模式;Step S505, query the TCM working mode related to the protection relationship port from the network management database;
步骤S506,检查保护关系端口是否配置TCM工作模式,如果未配置TCM工作模式,则执行步骤S507;否则执行步骤S508;Step S506, check whether the protection relationship port is configured with the TCM working mode, if the TCM working mode is not configured, go to step S507; otherwise, go to step S508;
步骤S507,按照默认规则生成保护关系端口相关的TCM工作模式;Step S507, generating the TCM working mode related to the protection relationship port according to the default rule;
步骤S508,根据步骤S501中的TCM工作模式相关参数,修改步骤S505或者步骤S507中保护关系端口相关的TCM工作模式;Step S508, according to the relevant parameters of the TCM working mode in step S501, modify the TCM working mode related to the protection relationship port in step S505 or step S507;
步骤S509,将修改后的TCM工作模式依次下发给相关网元。Step S509, delivering the modified TCM working modes to the relevant network elements in sequence.
优选地,在步骤S212中:在判断到需要处理组播路由的情况下,从端到端业务的保护参数中获取组播路由参数;从网管数据库查询业务途经网元的保护组对象,生成保护组的组播组;根据组播组以及纤缆连接,计算组播组的组播路由。Preferably, in step S212: when it is determined that the multicast routing needs to be processed, the multicast routing parameters are obtained from the protection parameters of the end-to-end service; the protection group object of the service passing through the network element is queried from the network management database, and the protection group object is generated. The multicast group of the group; according to the multicast group and the fiber cable connection, the multicast route of the multicast group is calculated.
图6是根据本发明优选实施例的步骤S212的优选流程图,如图6所示,优选地,在步骤S212中可以包括如下步骤:FIG. 6 is a preferred flowchart of step S212 according to a preferred embodiment of the present invention. As shown in FIG. 6 , preferably, step S212 may include the following steps:
步骤S601,从端到端业务保护参数中获取组播路由相关参数;Step S601, obtain multicast routing related parameters from end-to-end service protection parameters;
步骤S602,检查是否需要处理组播路由,如果不需要处理,执行步骤S603;否则执行步骤S604;Step S602, check whether the multicast routing needs to be processed, if no processing is required, go to step S603; otherwise, go to step S604;
步骤S603,退出此次操作处理流程;Step S603, exit the processing flow of this operation;
步骤S604,从网管数据库查询业务途经网元的保护组对象;Step S604, query the protection group object of the network element through which the service passes from the network management database;
步骤S605,根据网元的保护组对象,生成保护组相关的组播组;Step S605, generating a multicast group related to the protection group according to the protection group object of the network element;
步骤S606,根据组播组以及纤缆连接,计算组播组相关的组播路由;Step S606, according to the multicast group and the fiber cable connection, calculate the multicast route related to the multicast group;
步骤S607,将组播组相关的组播路由依次下发给相关网元。Step S607: Deliver the multicast routes related to the multicast group to the related network elements in sequence.
优选地,在步骤S213中:在判断到需要处理APS/PCC开销监测使能的情况下,从端到端业务的保护参数中获取APS/PCC开销监测使能参数;从网管数据库查询业务途经网元的保护组对象,生成保护关系保护端口列表;根据APS/PCC开销监测使能参数,配置保护关系保护端口列表中的保护关系保护端口的APS/PCC开销监测使能。Preferably, in step S213: when it is determined that the APS/PCC overhead monitoring enablement needs to be processed, obtain the APS/PCC overhead monitoring enabling parameters from the protection parameters of the end-to-end service; query the service route network from the network management database Meta protection group object, generate a protection relationship protection port list; according to the APS/PCC cost monitoring enable parameter, configure APS/PCC cost monitoring for the protection relationship protection ports in the protection relationship protection port list.
优选地,根据APS/PCC开销监测使能参数,配置保护关系保护端口列表中的保护关系保护端口的APS/PCC开销监测使能包括:从网管数据库查询保护关系保护端口的APS/PCC开销监测使能,并检查保护关系保护端口是否已配置APS/PCC开销监测使能;在单板已配置APS/PCC开销监测使能的情况下,根据APS/PCC开销监测使能参数,更新保护关系保护端口的APS/PCC开销监测使能;否则,按照预设规则生成保护关系保护端口的APS/PCC开销监测使能,并根据APS/PCC开销监测使能参数,更新保护关系保护端口的APS/PCC开销监测使能。Preferably, according to the APS/PCC overhead monitoring enable parameter, configuring the APS/PCC overhead monitoring enable of the protection relationship protection port in the protection relationship protection port list includes: querying the APS/PCC overhead monitoring enable of the protection relationship protection port from the network management database Check whether the APS/PCC overhead monitoring is enabled on the protection port of the protection relationship; if the APS/PCC overhead monitoring is enabled on the board, update the protection relationship protection port according to the APS/PCC overhead monitoring enabled parameters. The APS/PCC overhead monitoring is enabled for the protection relationship; otherwise, the APS/PCC overhead monitoring enable of the protection relationship protection port is generated according to the preset rules, and the APS/PCC overhead monitoring of the protection relationship protection port is updated according to the APS/PCC overhead monitoring enable parameter. Monitoring is enabled.
图7是根据本发明优选实施例的步骤S213的优选流程图,如图7所示,优选地,在步骤S213中可以包括如下步骤:FIG. 7 is a preferred flowchart of step S213 according to a preferred embodiment of the present invention. As shown in FIG. 7 , preferably, step S213 may include the following steps:
步骤S701,从端到端业务保护参数中获取APS/PCC开销监测使能相关参数;Step S701, obtaining APS/PCC overhead monitoring enabling related parameters from end-to-end service protection parameters;
步骤S702,检查是否需要处理APS/PCC开销监测使能,如果不需要处理,则执行步骤S703,否则执行步骤S704;Step S702, check whether the APS/PCC overhead monitoring enable is required to be processed, if no processing is required, step S703 is performed; otherwise, step S704 is performed;
步骤S703,退出此次操作处理流程;Step S703, exit the processing flow of this operation;
步骤S704,从网管数据库查询保护组对象,生成保护关系保护端口列表;Step S704, query the protection group object from the network management database, and generate a protection relationship protection port list;
步骤S705,从网管数据库查询保护关系保护端口相关的APS/PCC开销监测使能;Step S705, query the APS/PCC overhead monitoring enable related to the protection port of the protection relationship from the network management database;
步骤S706,检查保护关系保护端口是否配置APS/PCC开销监测使能,如果未配置APS/PCC开销监测使能,则执行步骤S707,否则执行步骤S708;Step S706, check whether the APS/PCC overhead monitoring enable is configured on the protection relationship protection port, if the APS/PCC overhead monitoring enable is not configured, step S707 is performed; otherwise, step S708 is performed;
步骤S707,按照默认规则生成保护关系保护端口相关的APS/PCC开销监测使能;Step S707, generating the APS/PCC overhead monitoring enable related to the protection port of the protection relationship according to the default rule;
步骤S708,根据步骤S701中的APS/PCC开销监测使能相关参数,修改步骤S705或者步骤S707中保护关系保护端口相关的APS/PCC开销监测使能;Step S708, according to the related parameters of the APS/PCC overhead monitoring enablement in step S701, modify the APS/PCC overhead monitoring enablement related to the protection port of the protection relationship in step S705 or step S707;
步骤S709,将修改后的APS/PCC开销监测使能依次下发给相关网元。In step S709, the modified APS/PCC overhead monitoring enable is sequentially delivered to the relevant network elements.
在上述实施例中,保护关系中包含工作单元和保护单元,工作单元/保护单元包含发送端口和接收端口。保护关系端口包括工作单元/保护单元包含的发送和接收端口,又称为保护组资源;保护关系接收端口,又称为保护通道;保护关系保护端口又称为保护组保护资源。In the above embodiment, the protection relationship includes a working unit and a protection unit, and the working unit/protection unit includes a sending port and a receiving port. Protection relationship ports include sending and receiving ports included in work units/protection units, also known as protection group resources; protection relationship receiving ports, also known as protection channels; protection relationship protection ports, also known as protection group protection resources.
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到根据上述实施例的方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,或者网络设备等)执行本发明各个实施例的方法。From the description of the above embodiments, those skilled in the art can clearly understand that the method according to the above embodiment can be implemented by means of software plus a necessary general hardware platform, and of course can also be implemented by hardware, but in many cases the former is better implementation. Based on this understanding, the technical solutions of the present invention can be embodied in the form of software products in essence or the parts that make contributions to the prior art, and the computer software products are stored in a storage medium (such as ROM/RAM, magnetic disk, CD-ROM), including several instructions to make a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to execute the methods of the various embodiments of the present invention.
在本实施例中还提供了一种保护子网生成装置,该装置用于实现上述实施例及优选实施方式,已经进行过说明的不再赘述。如以下所使用的,术语“模块”可以实现预定功能的软件和/或硬件的组合。尽管以下实施例所描述的装置较佳地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。In this embodiment, an apparatus for generating a protection subnet is also provided, and the apparatus is used to implement the above-mentioned embodiments and preferred implementations, and what has been described will not be repeated. As used below, the term "module" may be a combination of software and/or hardware that implements a predetermined function. Although the apparatus described in the following embodiments is preferably implemented in software, implementations in hardware, or a combination of software and hardware, are also possible and contemplated.
图8是根据本发明实施例的保护子网生成装置的结构框图,如图8所示,该装置包括:确定模块82、第一生成模块84和第二生成模块86,其中,确定模块82,用于根据端到端业务的物理路由,确定端到端业务的业务途经网元的保护关系端口;第一生成模块84,耦合至确定模块82,用于根据保护关系端口和端到端业务的保护参数,生成业务途经网元的保护组以及端口业务信息;第二生成模块86,耦合至第一生成模块84,用于根据业务途经网元的保护组以及端口业务信息,生成与端到端业务相关的保护子网。FIG. 8 is a structural block diagram of an apparatus for generating a protection subnet according to an embodiment of the present invention. As shown in FIG. 8, the apparatus includes: a determining module 82, a first generating module 84 and a second generating module 86, wherein the determining module 82, The first generation module 84 is coupled to the determination module 82, and is used for determining the protection relationship port of the end-to-end service through the network element according to the physical route of the end-to-end service. The protection parameter is used to generate the protection group and port service information of the network element through which the service passes; the second generation module 86 is coupled to the first generation module 84, and is used for generating and end-to-end according to the protection group and port service information of the network element through the service. Service-related protection subnets.
本实施例中还提供了一种端到端配置业务保护子网的装置。图9是根据本发明优选实施例的端到端配置业务保护子网的装置的结构示意图,如图9所示,该装置包括:This embodiment also provides an apparatus for configuring a service protection subnet end-to-end. FIG. 9 is a schematic structural diagram of an apparatus for end-to-end configuration of a service protection subnet according to a preferred embodiment of the present invention. As shown in FIG. 9 , the apparatus includes:
预处理模块,用于确定端到端业务是否具备配置保护子网、保护组、保护相关功能的条件,比如,端到端业务是否是带保护业务,是否已经配置保护组;The preprocessing module is used to determine whether the end-to-end service meets the conditions for configuring protection subnets, protection groups, and protection-related functions, for example, whether the end-to-end service is a protection service, and whether a protection group has been configured;
初始化模块,用于初始化相关的配置数据,比如,缓存端到端业务保护参数、查询端到端业务相关的物理路由等;The initialization module is used to initialize related configuration data, such as caching end-to-end service protection parameters, querying physical routes related to end-to-end services, etc.;
保护组处理模块(用于实现上述的第一生成模块84的功能),用于生成和设置端到端业务相关的保护组和端口业务;a protection group processing module (for realizing the function of the above-mentioned first generation module 84), for generating and setting protection groups and port services related to end-to-end services;
保护子网处理模块(用于实现上述的第二生成模块86的功能),用于生成和设置端到端业务相关的保护子网;a protection subnet processing module (for realizing the function of the above-mentioned second generation module 86), for generating and setting the protection subnet related to the end-to-end service;
保护相关功能处理模块,用于生成和设置保护相关功能,比如保护模式、TCM工作模式、APS/PCC开销监测使能、组播路由等。The protection-related function processing module is used to generate and set protection-related functions, such as protection mode, TCM working mode, APS/PCC overhead monitoring enable, and multicast routing.
图10是根据本发明优选实施例的保护相关功能处理模块的优选结构示意图,如图10所示,保护相关功能处理模块还可以包括:FIG. 10 is a schematic diagram of a preferred structure of a protection-related function processing module according to a preferred embodiment of the present invention. As shown in FIG. 10 , the protection-related function processing module may further include:
保护模式模块,用于根据保护组和端口业务信息,处理保护模式相关功能;The protection mode module is used to process the protection mode related functions according to the protection group and port service information;
TCM工作模式模块,用于根据保护组和端口业务信息,处理TCM工作模式相关功能;The TCM working mode module is used to process the related functions of the TCM working mode according to the protection group and port service information;
组播路由模块,用于根据保护组和端口业务信息,处理组播路由相关功能;The multicast routing module is used to process the functions related to multicast routing according to the protection group and port service information;
APS/PCC开销监测使能模块,用于根据保护组和端口业务信息,处理APS/PCC开销监测使能相关功能。The APS/PCC overhead monitoring enabling module is used to process the related functions of APS/PCC overhead monitoring enabling according to the protection group and port service information.
需要说明的是,上述各个模块是可以通过软件或硬件来实现的,对于后者,可以通过以下方式实现,但不限于此:上述模块均位于同一处理器中;或者,上述模块分别位于多个处理器中。It should be noted that the above modules can be implemented by software or hardware, and the latter can be implemented in the following ways, but not limited to this: the above modules are all located in the same processor; or, the above modules are located in multiple in the processor.
本发明的实施例还提供了一种软件,该软件用于执行上述实施例及优选实施方式中描述的技术方案。Embodiments of the present invention also provide software, which is used to execute the technical solutions described in the foregoing embodiments and preferred embodiments.
本发明的实施例还提供了一种存储介质。在本实施例中,上述存储介质可以被设置为存储用于执行以下步骤的程序代码:Embodiments of the present invention also provide a storage medium. In this embodiment, the above-mentioned storage medium may be configured to store program codes for executing the following steps:
S1,根据端到端业务的物理路由,确定端到端业务的业务途经网元的保护关系端口;S1, according to the physical route of the end-to-end service, determine that the service of the end-to-end service passes through the protection relationship port of the network element;
S2,根据保护关系端口和端到端业务的保护参数,生成业务途经网元的保护组以及端口业务信息;S2, according to the protection relationship port and the protection parameter of the end-to-end service, generate the protection group of the service passing through the network element and the port service information;
S3,根据业务途经网元的保护组以及端口业务信息,生成与端到端业务相关的保护子网。S3 , generating a protection subnet related to the end-to-end service according to the protection group of the network element and the port service information of the service passing through.
可选地,在本实施例中,上述存储介质可以包括但不限于:U盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。Optionally, in this embodiment, the above-mentioned storage medium may include but is not limited to: a U disk, a read-only memory (ROM, Read-Only Memory), a random access memory (RAM, Random Access Memory), a mobile hard disk, a magnetic Various media that can store program codes, such as discs or optical discs.
可选地,本实施例中的具体示例可以参考上述实施例及可选实施方式中所描述的示例,本实施例在此不再赘述。Optionally, for specific examples in this embodiment, reference may be made to the examples described in the foregoing embodiments and optional implementation manners, and details are not described herein again in this embodiment.
综上所述,与现有技术相比,本发明的上述实施例或者优选实施例的有益效果是:To sum up, compared with the prior art, the beneficial effects of the above embodiments or preferred embodiments of the present invention are:
1、通过端到端业务自动生成保护子网、保护组配置数据,简化了保护子网、保护组配置流程;1. Automatically generate protection subnet and protection group configuration data through end-to-end services, simplifying the configuration process of protection subnet and protection group;
2、通过端到端业务自动配置保护相关功能,减少了保护相关功能配置错误概率,满足了工程维护和对外测试要求;2. Through the automatic configuration of protection-related functions through end-to-end services, the probability of configuration errors of protection-related functions is reduced, and the requirements for engineering maintenance and external testing are met;
3、通过分析端到端业务的保护参数等,自动优化端到端业务相关的保护组和端口业务;3. By analyzing the protection parameters of end-to-end services, etc., automatically optimize the protection groups and port services related to end-to-end services;
4、所提供的配置业务保护子网过程对用户透明,用户体验较好。4. The process of configuring the service protection subnet provided is transparent to the user, and the user experience is better.
显然,本领域的技术人员应该明白,上述的本发明的各模块或各步骤可以用通用的计算装置来实现,它们可以集中在单个的计算装置上,或者分布在多个计算装置所组成的网络上,可选地,它们可以用计算装置可执行的程序代码来实现,从而,可以将它们存储在存储装置中由计算装置来执行,并且在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤,或者将它们分别制作成各个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。这样,本发明不限制于任何特定的硬件和软件结合。Obviously, those skilled in the art should understand that the above-mentioned modules or steps of the present invention can be implemented by a general-purpose computing device, which can be centralized on a single computing device, or distributed in a network composed of multiple computing devices Alternatively, they may be implemented in program code executable by a computing device, such that they may be stored in a storage device and executed by the computing device, and in some cases, in a different order than here The steps shown or described are performed either by fabricating them separately into individual integrated circuit modules, or by fabricating multiple modules or steps of them into a single integrated circuit module. As such, the present invention is not limited to any particular combination of hardware and software.
以上所述仅为本发明的优选实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有各种更改和变化。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。The above descriptions are only preferred embodiments of the present invention, and are not intended to limit the present invention. For those skilled in the art, the present invention may have various modifications and changes. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention shall be included within the protection scope of the present invention.
Claims (12)
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510375764.3A CN106330512B (en) | 2015-06-30 | 2015-06-30 | Method and device for generating protection subnet |
| PCT/CN2015/093433 WO2017000451A1 (en) | 2015-06-30 | 2015-10-30 | Protection subnetwork generation method and device |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510375764.3A CN106330512B (en) | 2015-06-30 | 2015-06-30 | Method and device for generating protection subnet |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN106330512A CN106330512A (en) | 2017-01-11 |
| CN106330512B true CN106330512B (en) | 2020-07-31 |
Family
ID=57607558
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201510375764.3A Active CN106330512B (en) | 2015-06-30 | 2015-06-30 | Method and device for generating protection subnet |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN106330512B (en) |
| WO (1) | WO2017000451A1 (en) |
Families Citing this family (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN115550154B (en) * | 2022-09-05 | 2025-08-19 | 中国电信股份有限公司 | Processing method and device for network communication, electronic equipment and storage medium |
| CN116633848A (en) * | 2023-05-23 | 2023-08-22 | 国网山东省电力公司信息通信公司 | A method and system for checking the channel mode independence of electric power dedicated communication network |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101001173A (en) * | 2006-06-29 | 2007-07-18 | 华为技术有限公司 | Method and system for estimating network protection station |
| CN101001172A (en) * | 2006-06-28 | 2007-07-18 | 华为技术有限公司 | Managing method for route, method for implementing cross-domain end-to-end management |
| CN101145925A (en) * | 2006-09-13 | 2008-03-19 | 中兴通讯股份有限公司 | Method and system for realizing multicast service on multi-service transmission platform |
| CN101179350A (en) * | 2007-11-22 | 2008-05-14 | 华为技术有限公司 | Method and device for managing optical channel data unit shared protection subnet |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101145963B (en) * | 2007-07-27 | 2010-08-18 | 中兴通讯股份有限公司 | A topology discovery method of protective sub-network |
| US20100290340A1 (en) * | 2009-05-15 | 2010-11-18 | Electronics And Telecommunications Research Institute | Method for protection switching |
| US8891360B2 (en) * | 2012-05-04 | 2014-11-18 | Infinera Corporation | Optimal segment identification for shared mesh protection |
-
2015
- 2015-06-30 CN CN201510375764.3A patent/CN106330512B/en active Active
- 2015-10-30 WO PCT/CN2015/093433 patent/WO2017000451A1/en active Application Filing
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101001172A (en) * | 2006-06-28 | 2007-07-18 | 华为技术有限公司 | Managing method for route, method for implementing cross-domain end-to-end management |
| CN101001173A (en) * | 2006-06-29 | 2007-07-18 | 华为技术有限公司 | Method and system for estimating network protection station |
| CN101145925A (en) * | 2006-09-13 | 2008-03-19 | 中兴通讯股份有限公司 | Method and system for realizing multicast service on multi-service transmission platform |
| CN101179350A (en) * | 2007-11-22 | 2008-05-14 | 华为技术有限公司 | Method and device for managing optical channel data unit shared protection subnet |
Also Published As
| Publication number | Publication date |
|---|---|
| CN106330512A (en) | 2017-01-11 |
| WO2017000451A1 (en) | 2017-01-05 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10958725B2 (en) | Systems and methods for distributing partial data to subnetworks | |
| EP3829117B1 (en) | Packet path recording with fixed header size | |
| EP2880829B1 (en) | Adaptive infrastructure for distributed virtual switch | |
| EP2713556A1 (en) | Mapping a network topology request to a physical network | |
| US10355971B2 (en) | System and method for data path validation and verification | |
| EP3373533A1 (en) | Sdn network system, controller, and controlling method | |
| CN105592487B (en) | LTE network service flow evaluation method and device | |
| CN104094565A (en) | Controller, method for distributing load, non-transitory computer-readable medium storing program, computer system and control device | |
| CN112217655B (en) | Network equipment configuration method and device in SD-WAN system and computer equipment | |
| CN109981326B (en) | Method and device for positioning household broadband sensing fault | |
| CN113872784A (en) | Network configuration verification method and device | |
| CN109558727A (en) | A kind of routing safety detection method and system | |
| CN106330512B (en) | Method and device for generating protection subnet | |
| CN106411553B (en) | Method and device for optimizing service chain path | |
| CN112822221A (en) | Server selection method, device, equipment and medium | |
| CN106878356B (en) | Scheduling method and computing node | |
| Monakhov et al. | An algorithm for assessing the availability criteria in telecommunication networks | |
| KR101940802B1 (en) | System for calculating the number of the local triangular using the terminal resources and method thereof | |
| WO2017061893A1 (en) | Method and system for automatic discovery of network usage patterns | |
| CN110049082A (en) | Device and method for the data dissemination in distributed network | |
| CN112350881B (en) | Method and device for testing performance of switch | |
| CN105991429B (en) | A route reselection determination method and device | |
| CN113243014B (en) | Method and device for establishing communication model of network equipment | |
| CN107733690B (en) | Method and device for establishing topology model through information and communication fusion analysis | |
| CN106713098A (en) | Routing target processing method and device |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| TA01 | Transfer of patent application right | ||
| TA01 | Transfer of patent application right |
Effective date of registration: 20200703 Address after: 210012 Nanjing, Yuhuatai District, South Street, Bauhinia Road, No. 68 Applicant after: Nanjing Zhongxing Software Co.,Ltd. Address before: 518057 Nanshan District science and technology, Guangdong Province, South Road, No. 55, No. Applicant before: ZTE Corp. |
|
| GR01 | Patent grant | ||
| GR01 | Patent grant |