CN103384353A - Passive optical network system and detection method for customer premise equipment of passive optical network system - Google Patents

Passive optical network system and detection method for customer premise equipment of passive optical network system Download PDF

Info

Publication number
CN103384353A
CN103384353A CN2013102118978A CN201310211897A CN103384353A CN 103384353 A CN103384353 A CN 103384353A CN 2013102118978 A CN2013102118978 A CN 2013102118978A CN 201310211897 A CN201310211897 A CN 201310211897A CN 103384353 A CN103384353 A CN 103384353A
Authority
CN
China
Prior art keywords
test result
ustomer premises
premises access
access equipment
subset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013102118978A
Other languages
Chinese (zh)
Other versions
CN103384353B (en
Inventor
周鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Feixun Data Communication Technology Co Ltd
Original Assignee
Shanghai Feixun Data Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Feixun Data Communication Technology Co Ltd filed Critical Shanghai Feixun Data Communication Technology Co Ltd
Priority to CN201310211897.8A priority Critical patent/CN103384353B/en
Publication of CN103384353A publication Critical patent/CN103384353A/en
Application granted granted Critical
Publication of CN103384353B publication Critical patent/CN103384353B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Optical Communication System (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention provides a passive optical network system and a detection method for customer premise equipment of the passive optical network system. The detection method includes that when the customer premise equipment is abnormal and signal receiving strength is zero, a dichotomizing searching method is used for performing dichotomization on a total set for three times; a first subset and a second set, a second subset and the second set, a third subset and a first set and a fourth subset and the first set are tested through a burst clock and data recovery method, if test results are right, the subsets corresponding to the right test results are eliminated, the rest subsets and sets form the total set, the dichotomizing searching method is used for performing dichotomization and tests on the total set again, if test results are wrong, random sort is performed on all customer premise equipment in the total set through an equal probability random sort algorithm, and the dichotomizing searching method is used for performing dichotomization and tests again until all abnormal customer premise equipment is detected. According to the passive optical network system and the detection method for the customer premise equipment of the passive optical network system, time consumption is reduced, logical complexity is lowered, and the detection method is flexible.

Description

Passive optical network and the detection method of ustomer premises access equipment
Technical field
The present invention relates to a kind of passive optical network, particularly the detection method of the ustomer premises access equipment in a kind of passive optical network and comprise the passive optical network of this detection method.
Background technology
Continuous maturation along with passive optical access network network technology, and the continuous expansion of passive optical access network network scale, operator transfers to the construction of passive optical access network network on operation and maintenance gradually from function realization and network size, and this needs the network equipment vendor to provide corresponding technical scheme to solve.
On the operation and maintenance of passive optical access network network, the diagnosis of optical link and fault restoration are very important, rogue ONU(optical network unit particularly) quick location and isolation are the most important things, because in case optical link breaks down, business on the ONU that impact is a large amount of, greatly reducing the QOS(service quality of network, is a kind of security mechanism of network, is with a kind of technology that solves the problems such as network delay and obstruction).
So-called rogue ONU(rogue ONU) refer to exist abnormal and other functional modules normal controlled ONU all except the light transmitting portion.From the phenomenon that rogue ONU causes, can be divided into the rogue ONU of long hair light and the rogue ONU of non-long hair light.The rogue ONU of long hair light refers to extremely cause luminously for a long time because the control logic of transmitting portion exists, and can cause very large impact to up link, causes other all ONU all can't work at up direction.The rogue ONU of non-long hair light refers to cause having exceeded the ascending time slot that distributes when sending data, thereby can have influence on the ONU that has distributed contiguous time slot because the reasons such as optical module is aging may be opened in advance luminous or postpone turn-off luminously.
The below introduces existing detection PON(EPON) method of rogue ONU in system:
the ONU business occurring in a PON mouth frequently interrupts, roll off the production line on ONU is frequent, all ONU of PON mouth can't register or receive the LOS(Received Loss Of Signal) during the phenomenon such as alarm, the general method that adopts: close one by one the ONU upstream data transmission that the PON mouth has been found, when run into close certain ONU after, optical link recovers normal (can find that ONU or ONU succeed in registration), can judge that this ONU is rogue ONU, continue to close for a long time the upstream data transmission of this ONU, until sending fault, the upstream data of this ONU solves or replaces this ONU, then carry out the detection of next ONU.
There is defective in above-mentioned detection rogue ONU method, and whether detect one by one each ONU such as needs is rogue ONU, when the ONU number in a PON mouth is more, and above-mentioned detection method length consuming time.And when detecting an ONU when the rogue ONU, could detect next ONU after only having the fault that this ONU is existed to solve, length consuming time and detection method are dumb.In addition, this detection method can't detect the rogue ONU that influencing each other between a plurality of ONU causes.
The below introduces existing another and detects the method for rogue ONU in the PON system:
Supposing has M ONU in a PON mouth to be detected, complete the detection of all rogue ONU under this PON mouth, just needs the test of M wheel.Often take turns when test and all need to close wherein n ONU(n since 1), therefore i takes turns that when testing, the ONU number under the PON mouth is M i=M-i+1(i is since 1), the time that n ONU closes is (M i-n) t dTake turns when test every, if the ONU number in this moment PON mouth needs the OLT(optical line terminal greater than 1) issue Temporarily Closed optical module t to each ONU dThe order of time.The time that n ONU closes is (M i-n) t dIn order to guarantee when each takes turns test, to open after this takes turns test just the ONU that closes previously will be unified in.After closing 1 ONU optical module, OLT will be at the observation cycle of 1 setting t dIn, observe the LLID(logical links mark of all uplink messages) situation:
A t if OLT issues orders after the optical module of closing n ONU dIn time, the unmatched situation of LLID no longer occurs, the ONU that has so just closed is exactly rogue ONU, and just there is no rogue ONU in M-n remaining ONU, only need this moment n-1 the ONU that the front has been closed detected again to get final product, can be arranged to i=M-n+2 this moment with i.
If two close n ONU optical module after, OLT is at t dIn still have the unmatched situation of LLID to occur, need to close again next ONU optical module.
If be last ONU three this moments, can determine that this ONU is exactly rogue ONU, does not need to have closed this ONU again.
Above-mentioned detection rogue ONU method subsistence logic is too complicated, length consuming time and can't detect the defectives such as rogue ONU that influencing each other between a plurality of ONU causes.
Summary of the invention
The technical problem to be solved in the present invention is for the defective that overcomes in prior art the method length consuming time that detects rogue ONU, logic is complicated, detection method is dumb and can't detects the rogue ONU that influencing each other between a plurality of ONU cause, provide passive optical network that a kind of relatively short, logical complexity consuming time reduces and can detect the rogue ONU that influencing each other between a plurality of ONU cause and the detection method of ustomer premises access equipment.
The present invention solves above-mentioned technical problem by following technical proposals:
The invention provides the detection method of the ustomer premises access equipment in a kind of passive optical network, this passive optical network comprises an OLT, this OLT is to there being N ustomer premises access equipment, this ustomer premises access equipment is ONU or ONT, and wherein, N is positive integer, this N ustomer premises access equipment consists of a total collection, its characteristics are, set m=0, and this detection method comprises the following steps:
S 1, judge whether occur abnormal ustomer premises access equipment in this ustomer premises access equipment, if enter step S 2, if not, process ends;
S 2, detect whether the received signal strength that this ustomer premises access equipment sends is zero, if received signal strength is zero, illustrate in this PON system to have controlled rogue ONU, enter step S 3, if not, process ends;
S 3, adopt binary chop that this total collection is divided into the first set and the second set, this first set is divided into the first subset and the second subset, and this second set is divided into three subsetss and the 4th subset;
S 4, by burst clock and data recovery method, this first subset and this second set are tested, if test result is correct test result, will this second subset and this second set integrate and again carry out S after consisting of this total collection 3If test result is wrong test result, enters step S 5
S 5, by burst clock and data recovery method, this second subset and this second set are tested, if test result is correct test result, will this first subset and this second set integrate and again carry out S after consisting of this total collection 3If test result is wrong test result, enters step S 6
S 6, by burst clock and data recovery method, these three subsetss and this first set are tested, if test result is correct test result, will the 4th subset and this first set integrate and again carry out S after consisting of this total collection 3If test result is wrong test result, enters step S 7
S 7, by burst clock and data recovery method, the 4th subset and this first set are tested, if test result is correct test result, will these three subsetss and this first set integrate and again carry out S after consisting of this total collection 3If test result is wrong test result, enters step S 8
S 8, whether the numerical value that judges m reach one and set numerical value, if not, enters S 9If,, enter S 10
S 9, to adopt the randomly ordered algorithm of equiprobability that all ustomer premises access equipments in this total collection are carried out once randomly ordered, and enters step S after the numerical value of m is added 1 3
S 10, the ustomer premises access equipment in this total collection is abnormal ustomer premises access equipment, and process ends.
Detection method by this programme, can detect the controlled rogue's ustomer premises access equipment that exists in this PON system, this controlled rogue's ustomer premises access equipment not only can cause for single ustomer premises access equipment, can also cause for influencing each other between a plurality of ustomer premises access equipments.
Step S 1Middlely judge whether occur abnormal ustomer premises access equipment in this ustomer premises access equipment by existing techniques in realizing, have in the prior art the ustomer premises access equipment of sign and abnormal parameter such as Signal Degrade and flow process etc. whether occur, just no longer describe in detail here.
Corresponding test result that " the correct test result " that this programme is mentioned refers to ustomer premises access equipment can work the time, by burst clock and data recovery method, ustomer premises access equipment is tested, if the parameter of characterization test result such as Signal Degrade and flow process etc. with all ustomer premises access equipment in the situation that all the intact test result that obtains compare, identical with the whole test results when intact of ustomer premises access equipment or poorer but do not affect the work of ustomer premises access equipment than the whole test results when intact of ustomer premises access equipment, be correct test result.
For example will be divided into five grades by the test result that burst clock and data recovery method records and be respectively outstanding test result, good test result, medium test result, poor test result and very poor test result, " correct test result " is the test result of poor test result and above grade thereof, and these test results do not affect the work of ustomer premises access equipment.
Corresponding test result when similarly, this programme " test result of mistake " mentioned refers to ustomer premises access equipment and can not work.By burst clock and data recovery method, ustomer premises access equipment is tested, if the parameter of characterization test result with all ustomer premises access equipments in the situation that all the intact test result that obtains compare, than the whole test result work that affected ustomer premises access equipment far short of what is expected when intact of ustomer premises access equipment, ustomer premises access equipment can't be worked, be wrong test result.What for example " test result of mistake " was corresponding is very poor test result, makes ustomer premises access equipment to work, and namely very significant degradation trend has appearred in the test result of this programme.
And when any subset in this first subset, this second subset, these three subsetss and the 4th subset is empty set, by burst clock and data recovery method, this subset and corresponding set are tested, test result is wrong test result.For example, this first subset is empty set, by burst clock and data recovery method, this first subset and this second set is tested, and test result is wrong test result.
In addition, the process ends described in this programme refers to the end of the flow process of this programme that relates to, rather than refers to the end of entire flow.Relate to a lot of flow processs as in this PON system, as the detection method flow process of this programme, the upgrade method flow process of ustomer premises access equipment and other flow process, when the PON system carries out the process ends of this programme, the detection method flow process that just means this programme finishes, and the upgrade method flow process of ustomer premises access equipment and other flow process do not finish.
And the burst clock and data recovery method of using in this programme, binary chop and the randomly ordered algorithm of equiprobability are prior art, just repeat no more here.
Preferably, store a feature database that comprises a plurality of setting features in this OLT, step S 1Comprise:
S 1, after receiving the feature that this ustomer premises access equipment occurs, judge whether the setting feature in this feature and this feature database mates, if result judge to have occurred abnormal ustomer premises access equipment in this ustomer premises access equipment for mating, enter step S 2If result is judged not occur abnormal ustomer premises access equipment, process ends in this ustomer premises access equipment for not mating.
Preferably, this setting feature comprises: this ustomer premises access equipment business is frequently interrupted, this ustomer premises access equipment rolls off the production line on frequent, all ustomer premises access equipments of the PON mouth correspondence of this OLT all can't register and this OLT receives loss of signal alarm.
Preferably, by RSSI(Received Signal Strength Indication, the signal strength signal intensity of reception indication) testing mechanism detects the received signal strength that this ustomer premises access equipment sends.This RSSI testing mechanism is prior art, just no longer describes in detail here.
Preferably, this setting numerical value is at step S 8The time total collection in the quantity of all ustomer premises access equipments.This setting numerical value is step S 7Turn to step S 8The time that quantity of all ustomer premises access equipments in corresponding total collection constantly.As entering step S 8The time that constantly the quantity of the ustomer premises access equipment in total collection be 8, should set numerical value for (8 factorials).When again entering step S 8The time that constantly the quantity of the ustomer premises access equipment in total collection be 6, should set numerical value for
The present invention also provides the detection method of the ustomer premises access equipment in a kind of passive optical network, this passive optical network comprises an OLT, this OLT is to there being N ustomer premises access equipment, this ustomer premises access equipment is ONU or ONT, and wherein, N is positive integer, this N ustomer premises access equipment consists of a total collection, its characteristics are, set m=0, and this detection method comprises the following steps:
S 1, judge whether occur potential abnormal ustomer premises access equipment in this ustomer premises access equipment, if enter step S 2, if not, process ends;
S 2, adopt binary chop that this total collection is divided into the first set and the second set, this first set is divided into the first subset and the second subset, and this second set is divided into three subsetss and the 4th subset;
S 3, by burst clock and data recovery method, this first subset and this second set are tested, if test result is correct test result, will this second subset and this second set integrate and again carry out S after consisting of this total collection 2If test result is wrong test result, enters step S 4
S 4, by burst clock and data recovery method, this second subset and this second set are tested, if test result is correct test result, will this first subset and this second set integrate and again carry out S after consisting of this total collection 2If test result is wrong test result, enters step S 5
S 5, by burst clock and data recovery method, these three subsetss and this first set are tested, if test result is correct test result, will the 4th subset and this first set integrate and again carry out S after consisting of this total collection 2If test result is wrong test result, enters step S 6
S 6, by burst clock and data recovery method, the 4th subset and this first set are tested, if test result is correct test result, will these three subsetss and this first set integrate and again carry out S after consisting of this total collection 2If test result is wrong test result, enters step S 7
S 7, whether the numerical value that judges m reach one and set numerical value, if not, enters S 8If,, enter S 9
S 8, to adopt the randomly ordered algorithm of equiprobability that all ustomer premises access equipments in this total collection are carried out once randomly ordered, and enters step S after the numerical value of m is added 1 2
S 9, the ustomer premises access equipment in this total collection is potential abnormal ustomer premises access equipment, and process ends.
Step S 1In potential abnormal ustomer premises access equipment be different from the above-mentioned abnormal ustomer premises access equipment of mentioning, this potential abnormal ustomer premises access equipment refers to when a certain or some special characteristic appear in ustomer premises access equipment, just characterizes and has potential abnormal ustomer premises access equipment in ustomer premises access equipment.
For example will be divided into five grades by the test result that burst clock and data recovery method records and be respectively outstanding test result, good test result, medium test result, poor test result and very poor test result, " the correct test result " that this programme is mentioned refers to that ustomer premises access equipment can be worked and the grade of test result corresponding test result when being good test result and outstanding test result, and these test results do not affect the work of ustomer premises access equipment.And " test result of mistake " that this programme is mentioned refers to that ustomer premises access equipment can be worked and the grade of test result corresponding test result when being medium test result and poor test result, and these test results do not affect the work of ustomer premises access equipment.
Preferably, store a feature database that comprises a plurality of setting features in this OLT, step S 1Comprise:
S 1, after receiving the feature that this ustomer premises access equipment occurs, judge whether the setting feature in this feature and this feature database mates, if result judge to have occurred potential abnormal ustomer premises access equipment in this ustomer premises access equipment for mating, enter step S 2If result is judged not occur potential abnormal ustomer premises access equipment, process ends in this ustomer premises access equipment for not mating.
Preferably, this setting numerical value is at step S 7The time total collection in the quantity of all ustomer premises access equipments.This setting numerical value is step S 6Turn to step S 7The time that quantity of all ustomer premises access equipments in corresponding total collection constantly.
The present invention provides again a kind of passive optical network, and its characteristics are, the above-mentioned detection method of this passive optical network use.
On the basis that meets this area general knowledge, above-mentioned each optimum condition, but combination in any namely get the preferred embodiments of the invention.
Positive progressive effect of the present invention is:
The present invention to all ustomer premises access equipments in the PON system that abnormal conditions occur by binary chop and the randomly ordered algorithm of equiprobability to find out rogue ONU, the present invention not only can find out single rogue ONU, can also find out the rogue ONU that influencing each other between a plurality of ONU causes, search accuracy rate high and comprehensive, and have that relatively short, logical complexity consuming time reduces and detection method advantage flexibly.
Description of drawings
Fig. 1 is the flow chart of the detection method of the ustomer premises access equipment in the passive optical network of the embodiment of the present invention 1.
Fig. 2 is the flow chart of the detection method of the ustomer premises access equipment in the passive optical network of the embodiment of the present invention 2.
Embodiment
Mode below by embodiment further illustrates the present invention, but does not therefore limit the present invention among described scope of embodiments.
Embodiment 1
the present embodiment provides the detection method of the ustomer premises access equipment in a kind of passive optical network, this passive optical network comprises an OLT, this OLT is to there being N ustomer premises access equipment, this ustomer premises access equipment is ONU or ONT, wherein, N is positive integer, this N ustomer premises access equipment consists of a total collection, store a feature database that comprises a plurality of setting features in this OLT, this setting feature comprises: this ustomer premises access equipment business is frequently interrupted, roll off the production line on this ustomer premises access equipment is frequent, all ustomer premises access equipments of the PON mouth correspondence of this OLT all can't register and this OLT receives loss of signal alarm.
Set m=0, as shown in Figure 1, this detection method comprises the following steps:
Step 101, after receiving the feature that this ustomer premises access equipment occurs, judge whether the setting feature in this feature and this feature database mates, if result is coupling, judge and occurred abnormal ustomer premises access equipment in this ustomer premises access equipment, enter step 102, abnormal ustomer premises access equipment, process ends do not appear in this ustomer premises access equipment if result for not mating, is judged;
Step 102, detect by the RSSI testing mechanism whether the received signal strength that this ustomer premises access equipment sends is zero, if received signal strength is zero, enter step 103, if not, process ends;
Step 103, employing binary chop are divided into the first set and the second set with this total collection, and this first set is divided into the first subset and the second subset, and this second set is divided into three subsetss and the 4th subset;
Step 104, by burst clock and data recovery method, this first subset and this second set are tested, if test result is correct test result, this second subset and this second set is integrated and consisted of after this total collection execution in step 103 again, if test result is wrong test result, enter step 105;
Step 105, by burst clock and data recovery method, this second subset and this second set are tested, if test result is correct test result, this first subset and this second set is integrated and consisted of after this total collection execution in step 103 again, if test result is wrong test result, enter step 106;
Step 106, by burst clock and data recovery method, these three subsetss and this first set are tested, if test result is correct test result, the 4th subset and this first set is integrated and consisted of after this total collection execution in step 103 again, if test result is wrong test result, enter step 107;
Step 107, by burst clock and data recovery method, the 4th subset and this first set are tested, if test result is correct test result, these three subsetss and this first set is integrated and consisted of after this total collection execution in step 103 again, if test result is wrong test result, enter step 108;
Whether step 108, the numerical value that judges m reach one is set numerical value, if not, enters step 109, if, enter step 110, wherein, this sets the quantity that numerical value is all ustomer premises access equipments in total collection when step 108;
Step 109, to adopt the randomly ordered algorithm of equiprobability that all ustomer premises access equipments in this total collection are carried out once randomly ordered, and enter step 103 after the numerical value of m is added 1;
Ustomer premises access equipment in step 110, this total collection is abnormal ustomer premises access equipment, and process ends.
In the present embodiment, after the feature that occurs by the ustomer premises access equipment that receives, judge further whether the setting feature in this feature and this feature database mates to realize judging whether to occur the purpose of abnormal ustomer premises access equipment.But it will be recognized by those skilled in the art that embodiment just exemplifies, the present invention is not limited to above-described embodiment.In fact the present invention can adopt other prior art to reach and judge the purpose that abnormal ustomer premises access equipment whether occurred.
The present embodiment also provides a kind of passive optical network that uses above-mentioned detection method.
Based on detection method and the passive optical network of the ustomer premises access equipment in above-mentioned passive optical network, further illustrate the present invention below by a concrete example:
this passive optical network comprises an OLT, and this OLT is to there being 8 ustomer premises access equipments to correspond to respectively A, B, C, D, E, F, G, H, these 8 ustomer premises access equipments consist of a total collection, the ustomer premises access equipment business occurred and frequently interrupt in these 8 ustomer premises access equipments, roll off the production line on ustomer premises access equipment is frequent, all ustomer premises access equipments of the PON mouth correspondence of OLT all can't be registered when receiving one or more features in loss of signal alarm with OLT, detect by the RSSI testing mechanism whether the received signal strength that these 8 ustomer premises access equipments send is zero, if received signal strength is zero, adopt binary chop that this total collection is divided into the first set { A, B, C, D} and the second set { E, F, G, H}, i.e. this first set and this second set include 4 ustomer premises access equipments, and this first set is divided into the first subset { A, B} and the second subset { C, D}, and this second set is divided into three subsetss { E, F} and the 4th subset { G, H}, i.e. this first subset, this second subset, these three subsetss and the 4th subset include 2 ustomer premises access equipments.
by burst clock and data recovery method to this first subset { A, B} and this second set { E, F, G, H} tests, test result is correct test result, illustrate that A and party B-subscriber's end equipment in this first subset are normal ustomer premises access equipment, with this second subset { C, D} and this second set { E, F, G, H} integrates and consists of this total collection { C, D, E, F, G, again utilize binary chop to carry out three times two after H} and be divided into this first set { C, D, E} and this second set { F, G, H}, this first subset { C, D}, this second subset { E}, these three subsetss { F, G} and the 4th subset { H}.
by burst clock and data recovery method to this first subset { C, D} and this second set { F, G, H} tests, test result is wrong test result, pass through burst clock and data recovery method again to this second subset { E} and this second set { F, G, H} tests, test result is correct test result, illustrate that the E ustomer premises access equipment in this second subset is normal ustomer premises access equipment, with this first subset { C, D} and this second set { F, G, H} integrates and consists of this total collection { C, D, F, G, again utilize binary chop to carry out three times two after H} and be divided into this first set { C, D, F} and this second set { G, H}, this first subset { C, D}, this second subset { F}, these three subsetss { G} and the 4th subset { H}.
by burst clock and data recovery method to this first subset { C, D} and this second set { G, H} tests, test result is wrong test result, pass through burst clock and data recovery method again to this second subset { F} and this second set { G, H} tests, test result is correct test result, illustrate that the F ustomer premises access equipment in this second subset is normal ustomer premises access equipment, with this first subset { C, D} and this second set { G, H} integrates and consists of this total collection { C, D, G, again utilize binary chop to carry out three times two after H} and be divided into this first set { C, D} and this second set { G, H}, this first subset { C}, this second subset { D}, these three subsetss { G} and the 4th subset { H}.
{ { G, H} test for C} and this second set to this first subset by burst clock and data recovery method, test result is correct test result, illustrate that the C ustomer premises access equipment in this first subset is normal ustomer premises access equipment, { { G, H} integrate and consist of this total collection { { { G, H}, { D}, this second subset are empty set, these three subsetss { G} and the 4th subset { H} to this first subset for D} and this second set again to utilize binary chop to carry out being divided into this first set three times two after D, G, H} in D} and this second set with this second subset.
by burst clock and data recovery method to this first subset { D} and this second set { G, H} tests, test result is wrong test result, pass through burst clock and data recovery method again to this second subset empty set and this second set { G, H} tests, test result is wrong test result, { { G} tests D} with these three subsetss to this first set again by burst clock and data recovery method, test result is correct test result, illustrate that the G ustomer premises access equipment in these three subsetss is normal ustomer premises access equipment, { { H} integrates and consists of this total collection { D for D} and the 4th subset with this first set, again utilize binary chop to carry out three times two after H} and be divided into this first set { D} and this second set { H}, this first subset { D}, this second subset is empty, { H} and the 4th subset are empty set to these three subsetss.
by burst clock and data recovery method successively to this first subset { D} and this second set { H}, this the second subset empty set and this second set { H}, this first set { D} and the 3rd set { H}, { D} and the 4th subset empty set are tested in this first set, test result is wrong test result, adopt the randomly ordered algorithm of equiprobability to carry out once randomly ordered to all ustomer premises access equipments in this total collection, this general collection after sequence is combined into { H, D}, pass through again burst clock and data recovery method respectively to this first subset { H} and this second set { D}, this the second subset empty set and this second set { D}, this first set { H} and these three subsetss { D}, { H} and the 4th subset empty set are tested in this first set, test result is wrong test result, adopt the randomly ordered algorithm of equiprobability to carry out once randomly ordered to all ustomer premises access equipments in this total collection, again test by burst clock and data recovery method, test result is wrong test result, the ustomer premises access equipment D in this total collection and H are abnormal ustomer premises access equipment.In this course, randomly ordered number of times be 2! , namely 2 times.
Embodiment 2
The present embodiment also provides the detection method of the ustomer premises access equipment in a kind of passive optical network on the basis of embodiment 1, as shown in Figure 2, this detection method comprises the following steps:
Step 201, after receiving the feature that this ustomer premises access equipment occurs, judge whether the setting feature in this feature and this feature database mates, if result is coupling, judge and occurred potential abnormal ustomer premises access equipment in this ustomer premises access equipment, enter step 202, potential abnormal ustomer premises access equipment, process ends do not appear in this ustomer premises access equipment if result for not mating, is judged;
Step 202, employing binary chop are divided into the first set and the second set with this total collection, and this first set is divided into the first subset and the second subset, and this second set is divided into three subsetss and the 4th subset;
Step 203, by burst clock and data recovery method, this first subset and this second set are tested, if test result is correct test result, this second subset and this second set is integrated and consisted of after this total collection execution in step 202 again, if test result is wrong test result, enter step 204;
Step 204, by burst clock and data recovery method, this second subset and this second set are tested, if test result is correct test result, this first subset and this second set is integrated and consisted of after this total collection execution in step 202 again, if test result is wrong test result, enter step 205;
Step 205, by burst clock and data recovery method, these three subsetss and this first set are tested, if test result is correct test result, the 4th subset and this first set is integrated and consisted of after this total collection execution in step 202 again, if test result is wrong test result, enter step 206;
Step 206, by burst clock and data recovery method, the 4th subset and this first set are tested, if test result is correct test result, these three subsetss and this first set is integrated and consisted of after this total collection execution in step 202 again, if test result is wrong test result, enter step 207;
Whether step 207, the numerical value that judges m reach one is set numerical value, if not, enters step 208, if, enter step 209, wherein, this sets the quantity that numerical value is all ustomer premises access equipments in total collection when step 207;
Step 208, to adopt the randomly ordered algorithm of equiprobability that all ustomer premises access equipments in this total collection are carried out once randomly ordered, and enter step 202 after the numerical value of m is added 1;
Ustomer premises access equipment in step 209, this total collection is potential abnormal ustomer premises access equipment, and process ends.
The present embodiment also provides a kind of passive optical network that uses above-mentioned detection method.
Based on detection method and the passive optical network of the ustomer premises access equipment in above-mentioned passive optical network, further illustrate the present invention below by a concrete example:
this passive optical network comprises an OLT, this OLT is to there being 6 ustomer premises access equipments to correspond to respectively A, B, C, D, E, F, these 6 ustomer premises access equipments consist of a total collection, the ustomer premises access equipment business having occurred in these 6 ustomer premises access equipments frequently interrupts, roll off the production line on ustomer premises access equipment is frequent, all ustomer premises access equipments of the PON mouth correspondence of OLT all can't be registered when receiving one or more features in loss of signal alarm with OLT, adopt binary chop that this total collection is divided into the first set { A, B, C} and the second set { D, E, F}, this first set is divided into the first subset { A, B} and the second subset { C}, and this second set is divided into three subsetss { D, E} and the 4th subset { F}.
by burst clock and data recovery method to this first subset { A, B} and this second set { D, E, F} tests, test result is wrong test result, pass through burst clock and data recovery method again to this second subset { C} and this second set { D, E, F} tests, test result is correct test result, illustrate that the C ustomer premises access equipment in this second subset is normal ustomer premises access equipment, with this first subset { A, B} and this second set { D, E, F} integrates and consists of this total collection { A, B, D, E, again utilize binary chop to carry out three times two after F} and be divided into this first set { A, B, D} and this second set { E, F}, this first subset { A, B}, this second subset { D}, these three subsetss { E} and the 4th subset { F}.
by burst clock and data recovery method to this first subset { A, B} and this second set { E, F} tests, test result is wrong test result, pass through burst clock and data recovery method again to this second subset { D} and this second set { E, F} tests, test result is correct test result, illustrate that the D ustomer premises access equipment in this second subset is normal ustomer premises access equipment, with this first subset { A, B} and this second set { E, F} integrates and consists of this total collection { A, B, E, again utilize binary chop to carry out three times two after F} and be divided into this first set { A, B} and this second set { E, F}, this first subset { A}, this second subset { B}, these three subsetss { E} and the 4th subset { F}.
{ { E, F} test for A} and this second set to this first subset by burst clock and data recovery method, test result is correct test result, illustrate that the party A-subscriber's end equipment in this second subset is normal ustomer premises access equipment, { { E, F} integrate this total collection of formation and { again utilize binary chop to carry out three times two after B, E, F} and be divided into this first set { B, E} and this second set { F}, this first subset { B}, this second subset { E}, these three subsetss { F} and the 4th subset empty set for B} and this second set with this second subset.
by burst clock and data recovery method successively to this first subset { B} and this second set { F}, this second subset { E} and this second set { F}, this first set { B, E} and these three subsetss { H}, this first set { B, E} and the 4th subset empty set are tested, test result is wrong test result, adopt the randomly ordered algorithm of equiprobability to carry out once randomly ordered to all ustomer premises access equipments in this total collection, utilize binary chop to carry out three times two minutes to the total collection after randomly ordered, and pass through burst clock and data recovery method successively to this first subset and this second set, this second subset and this second set, these first set and these three subsetss, this first set and the 4th subset are tested, test result is wrong test result, adopt the randomly ordered algorithm of equiprobability to all ustomer premises access equipments in this total collection carry out randomly ordered 3! inferior namely after 6 times, each test result be still the test result of mistake, and ustomer premises access equipment B, E, the H that can draw in total collection are abnormal ustomer premises access equipment.
The detection method that can draw this ustomer premises access equipment from embodiment 1 and embodiment 2 not only can find out single rogue ONU, can also find out the rogue ONU that influencing each other between a plurality of ONU causes, search accuracy rate high and comprehensive, and have that relatively short, logical complexity consuming time reduces and detection method advantage flexibly.
Although more than described the specific embodiment of the present invention, it will be understood by those of skill in the art that these only illustrate, protection scope of the present invention is limited by appended claims.Those skilled in the art can make various changes or modifications to these execution modes under the prerequisite that does not deviate from principle of the present invention and essence, but these changes and modification all fall into protection scope of the present invention.

Claims (9)

1. the detection method of the ustomer premises access equipment in a passive optical network, this passive optical network comprises an OLT, this OLT is to there being N ustomer premises access equipment, this ustomer premises access equipment is ONU or ONT, and wherein, N is positive integer, this N ustomer premises access equipment consists of a total collection, it is characterized in that, set m=0, this detection method comprises the following steps:
S 1, judge whether occur abnormal ustomer premises access equipment in this ustomer premises access equipment, if enter step S 2, if not, process ends;
S 2, detect whether the received signal strength that this ustomer premises access equipment sends is zero, if received signal strength is zero, enter step S 3, if not, process ends;
S 3, adopt binary chop that this total collection is divided into the first set and the second set, this first set is divided into the first subset and the second subset, and this second set is divided into three subsetss and the 4th subset;
S 4, by burst clock and data recovery method, this first subset and this second set are tested, if test result is correct test result, will this second subset and this second set integrate and again carry out S after consisting of this total collection 3If test result is wrong test result, enters step S 5
S 5, by burst clock and data recovery method, this second subset and this second set are tested, if test result is correct test result, will this first subset and this second set integrate and again carry out S after consisting of this total collection 3If test result is wrong test result, enters step S 6
S 6, by burst clock and data recovery method, these three subsetss and this first set are tested, if test result is correct test result, will the 4th subset and this first set integrate and again carry out S after consisting of this total collection 3If test result is wrong test result, enters step S 7
S 7, by burst clock and data recovery method, the 4th subset and this first set are tested, if test result is correct test result, will these three subsetss and this first set integrate and again carry out S after consisting of this total collection 3If test result is wrong test result, enters step S 8
S 8, whether the numerical value that judges m reach one and set numerical value, if not, enters S 9If,, enter S 10
S 9, to adopt the randomly ordered algorithm of equiprobability that all ustomer premises access equipments in this total collection are carried out once randomly ordered, and enters step S after the numerical value of m is added 1 3
S 10, the ustomer premises access equipment in this total collection is abnormal ustomer premises access equipment, and process ends.
2. detection method as claimed in claim 1, is characterized in that, stores a feature database that comprises a plurality of setting features in this OLT, step S 1Comprise:
S 1, after receiving the feature that this ustomer premises access equipment occurs, judge whether the setting feature in this feature and this feature database mates, if result judge to have occurred abnormal ustomer premises access equipment in this ustomer premises access equipment for mating, enter step S 2If result is judged not occur abnormal ustomer premises access equipment, process ends in this ustomer premises access equipment for not mating.
3. detection method as claimed in claim 2, it is characterized in that, this setting feature comprises: this ustomer premises access equipment business is frequently interrupted, this ustomer premises access equipment rolls off the production line on frequent, all ustomer premises access equipments of the PON mouth correspondence of this OLT all can't register and this OLT receives loss of signal alarm.
4. detection method as claimed in claim 1, is characterized in that, detects by the RSSI testing mechanism received signal strength that this ustomer premises access equipment sends.
5. detection method as claimed in claim 1, is characterized in that, this sets numerical value is at step S 8The time total collection in the quantity of all ustomer premises access equipments.
6. the detection method of the ustomer premises access equipment in a passive optical network, this passive optical network comprises an OLT, this OLT is to there being N ustomer premises access equipment, this ustomer premises access equipment is ONU or ONT, and wherein, N is positive integer, this N ustomer premises access equipment consists of a total collection, it is characterized in that, set m=0, this detection method comprises the following steps:
S 1, judge whether occur potential abnormal ustomer premises access equipment in this ustomer premises access equipment, if enter step S 2, if not, process ends;
S 2, adopt binary chop that this total collection is divided into the first set and the second set, this first set is divided into the first subset and the second subset, and this second set is divided into three subsetss and the 4th subset;
S 3, by burst clock and data recovery method, this first subset and this second set are tested, if test result is correct test result, will this second subset and this second set integrate and again carry out S after consisting of this total collection 2If test result is wrong test result, enters step S 4
S 4, by burst clock and data recovery method, this second subset and this second set are tested, if test result is correct test result, will this first subset and this second set integrate and again carry out S after consisting of this total collection 2If test result is wrong test result, enters step S 5
S 5, by burst clock and data recovery method, these three subsetss and this first set are tested, if test result is correct test result, will the 4th subset and this first set integrate and again carry out S after consisting of this total collection 2If test result is wrong test result, enters step S 6
S 6, by burst clock and data recovery method, the 4th subset and this first set are tested, if test result is correct test result, will these three subsetss and this first set integrate and again carry out S after consisting of this total collection 2If test result is wrong test result, enters step S 7
S 7, whether the numerical value that judges m reach one and set numerical value, if not, enters S 8If,, enter S 9
S 8, to adopt the randomly ordered algorithm of equiprobability that all ustomer premises access equipments in this total collection are carried out once randomly ordered, and enters step S after the numerical value of m is added 1 2
S 9, the ustomer premises access equipment in this total collection is potential abnormal ustomer premises access equipment, and process ends.
7. detection method as claimed in claim 6, is characterized in that, stores a feature database that comprises a plurality of setting features in this OLT, step S 1Comprise:
S 1, after receiving the feature that this ustomer premises access equipment occurs, judge whether the setting feature in this feature and this feature database mates, if result judge to have occurred potential abnormal ustomer premises access equipment in this ustomer premises access equipment for mating, enter step S 2If result is judged not occur potential abnormal ustomer premises access equipment, process ends in this ustomer premises access equipment for not mating.
8. detection method as claimed in claim 6, is characterized in that, this sets numerical value is at step S 7The time total collection in the quantity of all ustomer premises access equipments.
9. a passive optical network, is characterized in that, this passive optical network uses detection method as described in any one in claim 1-5, and/or this passive optical network uses detection method as described in any one in claim 6-8.
CN201310211897.8A 2013-05-30 2013-05-30 Passive optical network and the detection method of ustomer premises access equipment Active CN103384353B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310211897.8A CN103384353B (en) 2013-05-30 2013-05-30 Passive optical network and the detection method of ustomer premises access equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310211897.8A CN103384353B (en) 2013-05-30 2013-05-30 Passive optical network and the detection method of ustomer premises access equipment

Publications (2)

Publication Number Publication Date
CN103384353A true CN103384353A (en) 2013-11-06
CN103384353B CN103384353B (en) 2016-03-02

Family

ID=49492036

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310211897.8A Active CN103384353B (en) 2013-05-30 2013-05-30 Passive optical network and the detection method of ustomer premises access equipment

Country Status (1)

Country Link
CN (1) CN103384353B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104811243A (en) * 2014-01-26 2015-07-29 中兴通讯股份有限公司 Long-light-emitting detection method and device
CN106464991A (en) * 2014-04-11 2017-02-22 阿尔卡特朗讯 Apparatus and method for optical-network monitoring
CN112887018A (en) * 2021-02-03 2021-06-01 中国信息通信研究院 Optical module testing method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080317469A1 (en) * 2006-10-13 2008-12-25 Hitachi Communication Technologies, Ltd. Passive optical network system and ranging system thereof
CN101877611A (en) * 2009-04-30 2010-11-03 华为技术有限公司 Method for reducing consumption of passive optical network line, optical network unit device and terminal
CN102142897A (en) * 2011-03-29 2011-08-03 华为技术有限公司 Detection method and device of ONU (optical network unit) as well as passive optical network system
CN103036612A (en) * 2012-12-18 2013-04-10 华为技术有限公司 Detection method, isolation method and device of rascal optical network unit (ONU)

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080317469A1 (en) * 2006-10-13 2008-12-25 Hitachi Communication Technologies, Ltd. Passive optical network system and ranging system thereof
CN101877611A (en) * 2009-04-30 2010-11-03 华为技术有限公司 Method for reducing consumption of passive optical network line, optical network unit device and terminal
CN102142897A (en) * 2011-03-29 2011-08-03 华为技术有限公司 Detection method and device of ONU (optical network unit) as well as passive optical network system
CN103036612A (en) * 2012-12-18 2013-04-10 华为技术有限公司 Detection method, isolation method and device of rascal optical network unit (ONU)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104811243A (en) * 2014-01-26 2015-07-29 中兴通讯股份有限公司 Long-light-emitting detection method and device
CN104811243B (en) * 2014-01-26 2018-05-04 中兴通讯股份有限公司 Long luminous detection method and device
CN106464991A (en) * 2014-04-11 2017-02-22 阿尔卡特朗讯 Apparatus and method for optical-network monitoring
CN106464991B (en) * 2014-04-11 2019-11-01 阿尔卡特朗讯 Device and method for optical-fiber network monitoring
CN112887018A (en) * 2021-02-03 2021-06-01 中国信息通信研究院 Optical module testing method and device
CN112887018B (en) * 2021-02-03 2022-09-13 中国信息通信研究院 Optical module testing method and device

Also Published As

Publication number Publication date
CN103384353B (en) 2016-03-02

Similar Documents

Publication Publication Date Title
CN106130627B (en) Optical access network faulty section makes a decision a method and system
CN104495549B (en) Elevator maintenance monitoring system and monitoring method
CN105591770A (en) Determination method and apparatus for fault type in PON
CN102404141B (en) Method and device of alarm inhibition
CN104104542B (en) A kind of real-time intelligent troubleshooting method based on RS485
CN103384353A (en) Passive optical network system and detection method for customer premise equipment of passive optical network system
CN102497229B (en) Performance testing system and method for passive optical network (PON) card hardware
CN113759215A (en) Power failure detection system and method based on Internet of things
CN102546010A (en) Detection method and detection system based on passive optical network (PON) system
CN106330588A (en) BFD detection method and device
CN109217922A (en) A kind of method and device that optical module reports Received Loss Of Signal to alert
CN106330535A (en) Train-ground communication data processing method and apparatus
CN104333414B (en) The method and device that a kind of optic communication links failure is reported
CN103560823B (en) Optical network unit long hair optical detection device and detection method
CN116436833A (en) Fault diagnosis method, device and equipment in switch port test
CN102195791A (en) Alarm analysis method, device and system
CN106330297B (en) Method and device for detecting optical fiber fault point
CN204463278U (en) A kind of some inspection terminal, marking equipment and some cruising inspection system
CN101938365A (en) Fault handling method and device for Ethernet
CN104218987B (en) Optical link detecting method, system and detector in passive optical network
CN105681085A (en) Alarm system and method
CN106569061A (en) Fault mode, cause and importance analysis method
CN102868444A (en) Communication data extraction device and method of passive optical network
CN109586788A (en) Monitoring system method for diagnosing faults, device, computer equipment and storage medium
CN101227347B (en) Method and apparatus for remote monitoring mainframe network state

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
PP01 Preservation of patent right
PP01 Preservation of patent right

Effective date of registration: 20180313

Granted publication date: 20160302

PD01 Discharge of preservation of patent

Date of cancellation: 20210313

Granted publication date: 20160302

PD01 Discharge of preservation of patent
PP01 Preservation of patent right

Effective date of registration: 20210313

Granted publication date: 20160302

PP01 Preservation of patent right
PD01 Discharge of preservation of patent

Date of cancellation: 20240313

Granted publication date: 20160302

PD01 Discharge of preservation of patent