H04J3/085

COMMUNICATION METHOD AND COMMUNICATIONS APPARATUS
20210273826 · 2021-09-02 ·

This application provides a method for transmitting data on a FlexE cross ring. At least three nodes forming the FlexE cross ring include a first node, a second node, and a third node. There is a protection path and a working path between any two adjacent nodes, and the protection path is a backup path of the working path. In the solution provided in this application, the protection path between nodes is established on the FlexE cross ring. In this way, when a FlexE group between any two adjacent nodes on the FlexE cross ring is faulty, a node on the FlexE cross ring can still complete data forwarding.

Protection switching method and node
10993005 · 2021-04-27 · ·

A protection switching method, including sending, by a first end node, a first protection switching request message to an intermediate node in response to a fault occurring on a working path between the first end node and a second end node, wherein a protection path of the working path comprises the first end node, the second end node, and at least one intermediate node, receiving, by the first end node, a second protection switching request message from the intermediate node, and switching service data to the protection path for transmission in response to receiving the second protection switching request message, where one overhead frame of each of the first and second protection switching request messages has at least two overhead information groups, and each of the at least two overhead information groups comprises a request type field, a request signal identifier field, and a bridge flag field.

Protection Switching Method and Node
20200260163 · 2020-08-13 ·

A protection switching method, including sending, by a first end node, a first protection switching request message to an intermediate node in response to a fault occurring on a working path between the first end node and a second end node, wherein a protection path of the working path comprises the first end node, the second end node, and at least one intermediate node, receiving, by the first end node, a second protection switching request message from the intermediate node, and switching service data to the protection path for transmission in response to receiving the second protection switching request message, where one overhead frame of each of the first and second protection switching request messages has at least two overhead information groups, and each of the at least two overhead information groups comprises a request type field, a request signal identifier field, and a bridge flag field.

Protection switching method and node
10674240 · 2020-06-02 · ·

A protection switching method, including sending, by a first end node, a first protection switching request message to an intermediate node in response to a fault occurring on a working trail between the first end node and a second end node, wherein a protection trail of the working trail comprises the first end node, the second end node, and at least one intermediate node, receiving, by the first end node, a second protection switching request message from the intermediate node, and switching service data to the protection trail for transmission in response to receiving the second protection switching request message, where one overhead frame of each of the first and second protection switching request messages has at least two overhead information groups, and each of the at least two overhead information groups comprises a request type field, a request signal identifier field, and a bridge flag field.

RING INTERCONNECT BANDWIDTH ALLOCATION

A ring interconnect system comprises a plurality of nodes. Each node is connected to two other nodes to form a ring interconnect. Every pair of nodes is connected by an inter-node path for that pair of nodes distinct from the ring interconnect. Each of the nodes comprises a message buffer to buffer messages received from at least one device associated with the node. Each of the nodes also comprises activity level circuitry to transmit an activity indication, when a number of the messages in the message buffer is equal to or above a threshold, to each other node of the plurality of nodes via the respective inter-node paths. Each of the nodes also comprises arbitrator circuitry to receive the activity indications from each other node and from the activity level circuitry, and to allow ingress of a message from the message buffer onto the ring interconnect in dependence on the activity indications. Also provided is a method of operating a node of a ring interconnect system

Protection path determination method and device based on resilient optical network

A protection path determination method and apparatus based on an elastic optical network are provided. The method includes: searching a virtual working topology for a virtual working link satisfying a condition on receipt of a routing request of a target service; updating a residual bandwidth of the virtual working link if the virtual working link is found; otherwise, creating a working link for the target service and creating a virtual working link in the virtual working topology; searching a virtual protection topology for a virtual protection link satisfying a condition according to a shared path protection mechanism; updating a residual bandwidth of the virtual protection link if the virtual protection link is found; otherwise, creating a protection link for the target service according to the shared path protection mechanism and creating a virtual protection link in the virtual protection topology.

Packet forwarding in RPR network

A network device in a RPR network receives a RPR flooding data packet sent by another network device in the RPR network, determines whether a next-hop network device of the RPR flooding data packet is a source network device sending the RPR flooding data packet, and strips the RPR flooding data packet when determining that the next-hop network device of the RPR flooding data packet is the source network device sending the RPR flooding data packet.

Switching-on method, base station, base station controller, switching-on system and storage medium
10405361 · 2019-09-03 · ·

A switching-on method for implementing automatic switching-on of base station, which is applied on a base station, includes: establishing, by the base station, an interactive link with a base station controller; transmitting, by the base station, an identifier uniquely identifying the base station; and receiving, by the base station, switching-on parameters corresponding to the identifier and executing the switching-on parameters.

SCALABLE TRAFFIC MANAGEMENT FOR MULTIPLE LEVELS OF QUALITY OF SERVICE

Packets are differentiated based on their traffic class. A traffic class is allocated bandwidth for transmission. One or more core or thread can be allocated to process packets of a traffic class for transmission based on allocated bandwidth for that traffic class. If multiple traffic classes are allocated bandwidth, and a traffic class underutilizes allocated bandwidth or a traffic class is allocated insufficient bandwidth, then allocated bandwidth can be adjusted for a future transmission time slot. For example, a higher priority traffic class with excess bandwidth can share the excess bandwidth with a next highest priority traffic class for use to allocate packets for transmission for the same time slot. In the same or another example, bandwidth allocated to a traffic class depends on an extent of insufficient allocation or underutilization of allocated bandwidth such that a traffic class with insufficient allocated bandwidth in one or more prior time slot can be provided more bandwidth in a current time slot and a traffic class with underutilization of allocated bandwidth can be provided with less allocated bandwidth for a current time slot.

Determining feasibility of a network service using a ring analysis
10284449 · 2019-05-07 · ·

A mesh network (such as a mesh Ethernet network) is subdivided into rings. For each ring, a network utilization is assessed in both the clockwise and counter-clockwise directions around the ring. A user requests a particular network service. The network rings that would be utilized by the network service are determined. A maximum utilization of all the network rings utilized by the network service in both clockwise and counter-clockwise is determined. The determined maximum utilization is used to determine the feasibility of provisioning the requested network service.