CN108988976B - Automatic protection method and device for synchronous network - Google Patents

Automatic protection method and device for synchronous network Download PDF

Info

Publication number
CN108988976B
CN108988976B CN201710397589.7A CN201710397589A CN108988976B CN 108988976 B CN108988976 B CN 108988976B CN 201710397589 A CN201710397589 A CN 201710397589A CN 108988976 B CN108988976 B CN 108988976B
Authority
CN
China
Prior art keywords
clock
network element
alarm
source
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710397589.7A
Other languages
Chinese (zh)
Other versions
CN108988976A (en
Inventor
黄卓垚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201710397589.7A priority Critical patent/CN108988976B/en
Publication of CN108988976A publication Critical patent/CN108988976A/en
Application granted granted Critical
Publication of CN108988976B publication Critical patent/CN108988976B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J3/00Time-division multiplex systems
    • H04J3/02Details
    • H04J3/08Intermediate station arrangements, e.g. for branching, for tapping-off
    • H04J3/085Intermediate station arrangements, e.g. for branching, for tapping-off for ring networks, e.g. SDH/SONET rings, self-healing rings, meashed SDH/SONET networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • H04L41/0663Performing the actions predefined by failover planning, e.g. switching to standby network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The embodiment of the invention provides a method and a device for automatically protecting a synchronous network, wherein the method comprises the following steps: receiving alarm information sent by a network element, and determining that protection operation needs to be performed according to the alarm information; the network element is positioned in a preset protection area; determining a fault source based on the alarm information; and updating the clock configuration of the network elements in the protection area with the fault source eliminated to obtain the updated main clock source and the updated standby clock source of each network element.

Description

Automatic protection method and device for synchronous network
Technical Field
The present invention relates to a synchronous network in the technical field of mobile communication, and in particular, to an automatic protection method and apparatus for a synchronous network.
Background
The software defined synchronous network is based on a centralized control and management architecture, functions of intelligent synchronous network configuration management, protection recovery, fault management, performance management and the like are provided by introducing a control plane, so that the problems of synchronous network timing rings, 1588v2 broadcast storms, synchronous network configuration errors and the like are prevented, meanwhile, the planning and deployment of the synchronous network are facilitated, the operation safety and reliability of the synchronous network are enhanced, and the operation and maintenance management efficiency of the synchronous network is improved. The software defined synchronization network includes both frequency synchronization and control management of the time synchronization network. This document relates to the control and management of frequency synchronization therein.
The frequency signal of the network element is also called a clock signal, and in a normal case, one network element has a main clock signal and a standby clock signal, and when the main clock signal fails, the network element automatically switches to the standby clock signal. Because the synchronous network has the requirements of ring formation and protection, the tracking relation of clock signals needs to be artificially planned during clock configuration, and the clock configuration can be completed in a long time. When the main clock source and the standby clock source of the network element both fail, the equipment cannot work normally, and manual recovery based on the reasons takes long time, so that communication problems in the network can be eliminated for a long time, and economic loss is caused.
Disclosure of Invention
In order to solve the existing technical problem, embodiments of the present invention provide an automatic protection method and apparatus for a synchronous network.
In order to achieve the above purpose, the technical solution of the embodiment of the present invention is realized as follows:
the embodiment of the invention provides an automatic protection method of a synchronous network, which comprises the following steps:
receiving alarm information sent by a network element, and determining that protection operation needs to be performed according to the alarm information; the network element is positioned in a preset protection area;
determining a fault source based on the alarm information;
and updating the clock configuration of the network elements in the protection area with the fault source eliminated to obtain the updated main clock source and the updated standby clock source of each network element.
Optionally, after determining the fault source based on the alarm information, the method further includes:
and storing the alarm information, the identification information of the object generating the alarm and the clock configuration information of each network element in the protection area before updating.
Optionally, after the updating the clock configuration of the network element in the protection area where the fault source is eliminated, the method further includes:
receiving a message that the alarm sent by the network element in the protection area is eliminated;
acquiring the information of the eliminated alarm and the identification information of the object generating the eliminated alarm;
and if the information of the eliminated alarm is determined to be the same as the stored information of the alarm and the identification information of the object generating the eliminated alarm is determined to be the same as the stored identification information of the object generating the alarm, correspondingly setting the clock configuration information of each network element in the protection area as the stored clock configuration information before updating.
Wherein the determining a fault source based on the alarm information comprises:
if the links where the active clock source port and the standby clock source port of one network element are located generate the LOS alarm, determining that the link generating the LOS alarm is a fault source; and/or the presence of a gas in the gas,
and if the LOS alarm occurs on the external clock port of one network element and the clock source is unlocked or degraded, determining that the external clock source of the network element is a fault source.
Wherein the updating the clock configuration of the network element in the protection area excluding the fault source includes:
acquiring network topology except the fault source in the protection area, and determining a clock injection source based on the network topology;
splitting the network topology into a ring set and a chain set, and determining the current clock signal tracking mode based on the clock signal tracking mode before updating;
and taking the determined current clock signal tracking path as an updated main clock source of each network element, taking a signal source in a residual clock source port as an updated standby clock source, and performing damage-breaking processing on the clock configuration of each network element.
Wherein the clock injection source comprises: and an external clock injection point and a strategy domain external adjacent point of the boundary point.
Wherein the determining a current clock signal tracking manner based on the clock signal tracking manner before updating includes:
traversing the network topology in the protection area, if at least one clock signal tracking path has a difference of one hop and then forms a ring, judging that the clock signal tracking mode before the network topology is updated is a ring mode, and if not, judging that the clock signal tracking mode is a shortest path mode;
the current clock signal is tracked in the same way as the clock signal before updating.
Wherein, the damage treatment comprises:
deleting a standby clock source of a network element in the network topology.
Wherein the deleting a standby clock source of a network element in the network topology includes:
and deleting a standby clock source corresponding to a network element with a plurality of standby clock sources in the network topology.
The embodiment of the invention also provides an automatic protection device of the synchronous network, which comprises:
the alarm processing module is used for receiving alarm information sent by a network element and determining that protection operation is required according to the alarm information; the network element is positioned in a preset protection area;
the fault determining module is used for determining a fault source based on the alarm information;
and the clock configuration module is used for updating the clock configuration of the network elements in the protection area for eliminating the fault source to obtain the updated main clock source and the updated standby clock source of each network element.
The method and the device for automatically protecting the synchronous network, provided by the embodiment of the invention, receive the alarm information sent by the network element and determine the protection operation to be carried out according to the alarm information; the network element is positioned in a preset protection area; determining a fault source based on the alarm information; and updating the clock configuration of the network elements in the protection area with the fault source eliminated to obtain the updated main clock source and the updated standby clock source of each network element. The embodiment of the invention judges the alarm sent by the network element, determines to carry out subsequent protection operation when needed, and resets the main clock source and the standby clock source for each network element, thereby solving the problem of manually recovering the main clock source and the standby clock source in the prior art, reducing the time consumed by network recovery, ensuring the normal operation of communication and reducing the economic loss.
In addition, the embodiment of the invention also provides a clock configuration method of each network element in the protection area after the alarm is eliminated, namely, the clock configuration of each network element is automatically recovered to the configuration before the alarm occurs, and the implementation method is simple and easy.
Drawings
Fig. 1 is a first schematic flow chart of an automatic protection method for a synchronous network according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of an automatic protection method for a synchronous network according to an embodiment of the present invention;
fig. 3 is a schematic flow chart of an automatic protection method for a synchronous network according to an embodiment of the present invention;
fig. 4 is a first schematic structural diagram of an automatic protection device of a synchronous network according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a second automatic protection device of the synchronous network according to the embodiment of the present invention;
fig. 6 is a schematic structural diagram of a clock configuration module according to an embodiment of the present invention;
FIG. 7 is a diagram illustrating a policy domain-outside adjacency point of a boundary point according to an embodiment of the present invention;
fig. 8 is a schematic diagram of a ring mode and a shortest path mode of a synchronous network plan according to an embodiment of the present invention;
FIG. 9 is a diagram illustrating clock tracking looping according to an embodiment of the present invention;
FIG. 10 is a schematic diagram illustrating clock tracking damage according to an embodiment of the present invention;
FIG. 11 is a schematic diagram of a reduction stack according to an embodiment of the present invention;
FIG. 12 is a schematic view of a reduction process according to an embodiment of the present invention.
Detailed Description
The present invention will be described in detail with reference to specific examples.
The embodiment of the invention provides an automatic protection method for a synchronous network, which comprises the following steps of:
step 101: receiving alarm information sent by a network element, and determining that protection operation needs to be performed according to the alarm information; the network element is positioned in a preset protection area;
step 102: determining a fault source based on the alarm information;
step 103: and updating the clock configuration of the network elements in the protection area with the fault source eliminated to obtain the updated main clock source and the updated standby clock source of each network element.
The embodiment of the invention judges the alarm sent by the network element, determines to carry out subsequent protection operation when needed, and resets the main clock source and the standby clock source for each network element, thereby solving the problem of manually recovering the main clock source and the standby clock source in the prior art, reducing the time consumed by network recovery, ensuring the normal operation of communication and reducing the economic loss.
Here, the preset protection area refers to a subnet in the synchronous network.
In one embodiment, as shown in fig. 2, after determining the fault source based on the alarm information, the method further includes:
step 104: and storing the alarm information, the identification information of the object generating the alarm and the clock configuration information of each network element in the protection area before updating.
Here, the order of step 103 and step 104 is not limited.
In an embodiment, as shown in fig. 3, after the updating the clock configuration of the network element in the protection area where the failure source is eliminated, the method further includes:
step 105: receiving a message that the alarm sent by the network element in the protection area is eliminated;
step 106: acquiring the information of the eliminated alarm and the identification information of the object generating the eliminated alarm;
step 107: and if the information of the eliminated alarm (such as the alarm type) is determined to be the same as the information of the stored alarm (such as the alarm type) and the identification information of the object generating the eliminated alarm is determined to be the same as the identification information of the object generating the alarm, correspondingly setting the clock configuration information of each network element in the protection area as the stored clock configuration information before updating.
The clock configuration method of each network element in the protection area after the alarm is eliminated, which is provided by the embodiment of the invention, automatically restores the clock configuration of each network element to the configuration before the alarm occurs, and has simple and easy realization method.
In the embodiment of the present invention, the determining a fault source based on the alarm information includes:
if the links where the active clock source port and the standby clock source port of one network element are located generate the LOS alarm, determining that the link generating the LOS alarm is a fault source; and/or the presence of a gas in the gas,
and if the LOS alarm occurs on the external clock port of one network element and the clock source is unlocked or degraded, determining that the external clock source of the network element is a fault source.
In this embodiment of the present invention, the updating the clock configuration of the network element in the protection area where the fault source is eliminated includes:
acquiring network topology except the fault source in the protection area, and determining a clock injection source based on the network topology;
splitting the network topology into a ring set and a chain set, and determining the current clock signal tracking mode based on the clock signal tracking mode before updating;
and taking the determined current clock signal tracking path as an updated main clock source of each network element, taking a signal source in a residual clock source port as an updated standby clock source, and performing damage-breaking processing on the clock configuration of each network element.
In an embodiment of the present invention, the clock injection source includes: and an external clock injection point and a strategy domain external adjacent point of the boundary point.
In this embodiment of the present invention, the determining the current clock signal tracking mode based on the clock signal tracking mode before updating includes:
traversing the network topology in the protection area, if at least one clock signal tracking path has a difference of one hop and then forms a ring, judging that the clock signal tracking mode before the network topology is updated is a ring mode, and if not, judging that the clock signal tracking mode is a shortest path mode;
the current clock signal is tracked in the same way as the clock signal before updating.
In an embodiment of the present invention, the damage-destroying process includes:
deleting a standby clock source of a network element in the network topology.
Optionally, the deleting a standby clock source of a network element in the network topology includes:
and deleting a standby clock source corresponding to a network element with a plurality of standby clock sources in the network topology.
The embodiment of the invention also provides an automatic protection device for the synchronous network, which is used for realizing the embodiment and is not described again after being explained. As used hereinafter, the terms "module" and "unit" may be a combination of software and/or hardware that implements a predetermined function. As shown in fig. 4, the apparatus includes:
the alarm processing module 401 is configured to receive alarm information sent by a network element, and determine that a protection operation needs to be performed according to the alarm information; the network element is positioned in a preset protection area;
a fault determining module 402, configured to determine a fault source based on the alarm information;
a clock configuration module 403, configured to update the clock configuration of the network element in the protection area where the fault source is eliminated, so as to obtain an updated main clock source and a updated standby clock source of each network element.
The embodiment of the invention judges the alarm sent by the network element, determines to carry out subsequent protection operation when needed, and resets the main clock source and the standby clock source for each network element, thereby solving the problem of manually recovering the main clock source and the standby clock source in the prior art, reducing the time consumed by network recovery, ensuring the normal operation of communication and reducing the economic loss.
In one embodiment, as shown in fig. 5, the apparatus further comprises:
a storage module 404 (e.g. a memory) is configured to store information of the alarm, identification information of an object generating the alarm, and clock configuration information of each network element in the protection area before the update.
In one embodiment of the present invention,
the alarm processing module 401 is further configured to receive a message that an alarm sent by a network element in the protection area is eliminated; acquiring the information of the eliminated alarm and the identification information of the object generating the eliminated alarm;
the clock configuration module 403 is further configured to determine that the information of the eliminated alarm is the same as the information of the alarm already stored in the storage module 404, and that the identification information of the object generating the eliminated alarm is the same as the identification information of the object generating the alarm already stored in the storage module 404, and then set the clock configuration information of each network element in the protection area to the stored clock configuration information before updating.
The clock configuration method of each network element in the protection area after the alarm is eliminated, which is provided by the embodiment of the invention, automatically restores the clock configuration of each network element to the configuration before the alarm occurs, and has simple and easy realization method.
In the embodiment of the present invention, the first and second substrates,
the fault determining module 402 is configured to determine that links where the active clock source port and the standby clock source port of a network element are located both generate a LOS alarm, and determine that the link generating the LOS alarm is a fault source; and/or the presence of a gas in the gas,
the method is used for determining that LOS alarm occurs on an external clock port of a network element, and a clock source is unlocked or degraded, and determining that the external clock source of the network element is a fault source.
In one embodiment, as shown in fig. 6, the clock configuration module 403 includes:
an obtaining and determining unit 4031, configured to obtain a network topology in the protection area except for the fault source, and determine a clock injection source based on the network topology;
a splitting determination unit 4032, configured to split the network topology into a set of rings and a set of chains, and determine a current clock signal tracking manner based on the clock signal tracking manner before updating;
a clock determining unit 4033, configured to use the determined current clock signal tracking path as an updated main clock source for each network element, use a signal source in the remaining clock source port as an updated standby clock source, and perform a destruction process on the clock configuration of each network element.
The present invention will be described in detail with reference to specific examples.
The method for automatically protecting the synchronous network in the embodiment comprises a protection recovery flow after alarm generation and a recovery flow after alarm elimination, wherein the protection recovery flow comprises the following steps:
step 1: a protection area is planned in a synchronous network in advance;
step 2: a network element in a protection area in the synchronous network sends an alarm;
and step 3: judging that protection recovery operation is required according to the alarm;
and 4, step 4: positioning a fault source according to the alarm;
and 5: removing the fault source from the network topology, and then performing incremental planning (resetting the network topology);
step 6: and configuring a clock source according to the result of the incremental planning to achieve the effect of protection and recovery.
The process further comprises:
and 7: and storing (storing to a reduction stack) the clock configuration information before protection recovery (before resetting) and the associated alarm and detection point (object generating the alarm) information for use in a subsequent reduction process.
Wherein, the protection area in step 1 refers to a subnet in the synchronous network, and has the following two meanings:
1) the network elements in the protection area can be protected: when the clock signals of the main clock port and the standby clock port are small, other ports with normal clock signals can be automatically selected as clock recovery ports, and the clock signals of the selected clock recovery ports do not track the clock signals from the node (network element);
2) in a network element in a protection area, a clock configuration of the network element may change due to protection recovery of another network element in the same area.
Wherein, the protection recovery is judged to be required according to the alarm in the step 3, and the protection recovery can be:
if a certain network element in the protection area generates clock source lock losing and quality degradation, or all links configured with clock source signals by the network element lose signals, protection recovery is required. In particular, it is possible to activate protection restoration when a network element in the protection area generates a LOSs of lock, a degradation alarm, or a LOSs of synchronization (LOS) alarm.
Wherein, the locating the fault source in the step 4 may include at least the following two cases:
1) LOSs of link signal, generating LOS alarm:
if the links of the active and standby clock source ports in a network element both generate LOS alarms, the link generated by the LOS alarm is a fault source, and the link is excluded when protection recovery is performed and is no longer used as a link for transmitting clock signals.
2) An external clock source LOS:
supposing that the network element A receives the external clock BITS and transmits clock signals to other network elements in the network, if LOS alarm occurs at an external clock port of the network element A and the clock source is unlocked or degraded, the problem of the external clock source of the network element A is determined, and when protection is recovered, the network element A does not serve as an external clock injection source to provide clock signals to other network elements in the network, but serves as a common network element and is provided with Ethernet clock signals by other network elements.
Wherein, the protection recovery process of the step 5-6 comprises:
step 10: acquiring clock configuration of the whole network;
step 20: acquiring a network topology (namely a network element topology in a protection area) supporting a synchronous recovery strategy, and removing a positioned fault source;
step 30: determining a clock injection source (including an external clock injection point and a policy domain external adjacent point of a boundary point (as shown in fig. 7)) in the network topology supporting the synchronization recovery policy, and if the clock injection source cannot be found (if a fault link occurs between the boundary point and the policy domain external adjacent point and no external clock injection point exists in the topology), replanning fails, and directly jumping to step 60;
step 40: performing incremental planning on a network supporting a synchronization recovery strategy, namely a network element topology in a protection area, which is described in detail in the following description;
step 50: integrating the incremental planning result into the clock configuration of the whole network, and performing damage-breaking processing on the clock configuration of the whole network, which is described in detail in the following description;
step 60: taking the clock configuration before the change of the network element with the changed clock configuration and the clock configuration after the change as the returned results; if the replanning fails, returning an empty result;
step 70: storing information of an alarm triggering protection recovery, information of a detection point (object) where the alarm occurs and corresponding clock configuration information before the protection recovery occurs;
here, the alarm causing protection recovery, the object information where the alarm occurs, and the corresponding clock configuration information before protection recovery occur are stored in a stack manner, and this data stack is referred to as a "reduction stack" (as shown in fig. 11). If a plurality of protection recoveries occur successively, the data corresponding to the protection recovery occurring first is pushed to the stack and is located at the bottom of the stack, and the data corresponding to the protection recovery occurring last is located at the top of the stack.
When the corresponding alarm on the object which is triggered to be protected and restored is eliminated, the corresponding alarm can be directly replaced and returned according to the stored clock source information, and the restoration effect is achieved.
The increment planning related content in the step 40 is as follows:
it should be noted that the network element serving as the clock injection source only provides clock source signals for other network elements in the incremental planning process, and the clock source configuration of the network element itself is not changed in the incremental planning.
The following network elements will become the source of clock injection in the incremental planning: outer clock injection points, strategic domain outside adjacency points of boundary points (shown in fig. 7).
In addition, there are two strategies for planning a synchronous network: the loop method and the shortest path method are shown in fig. 8. The incremental planning needs to determine which planning method is used in the existing planning (before the above-mentioned update), and the incremental planning needs to be performed in the same manner.
The method for judging which mode is adopted by the existing planning comprises the following steps: traversing all topologies in the network, if finding that at least one clock signal tracking path has a difference of one hop, then determining that the existing synchronous network tracking planning strategy in the network is in a ring mode, otherwise, determining that the existing synchronous network tracking planning strategy is in a shortest path mode.
The incremental planning comprises the following steps:
firstly, splitting a network topology into a set of rings and chains;
then, judging the planning mode, traversing all rings and chains if the ring mode planning is adopted, and planning the clock signal tracking path according to the sequence of the network elements arranged in the rings and chains; if the shortest path is planned, calculating the shortest path from each network element to a clock injection source by adopting a Dijkstra algorithm, and planning a clock signal tracking path according to the shortest path;
then, the obtained clock signal tracking path is used as a main clock source of each network element, and the signal sources in the residual available clock source ports are used as standby clock sources;
finally, ring formation detection is performed on the whole network, if it is found that a clock source signal transmitted by a certain network element can return to the network element according to a clock signal tracking path, ring formation is found, and ring breaking processing needs to be performed as shown in fig. 9 in the following manner.
The damage method comprises the following steps:
first, two requirements for synchronous network planning are introduced:
1) ring formation cannot be performed: the clock signal tracked by the network element can not come from the node;
2) the protection is as follows: at least two clock sources of the network element are provided, one of the clock sources is main, the other clock source is standby, and the main clock source can be automatically switched to the standby clock source when the main clock source signal has a problem.
The two requirements cannot be met simultaneously in some cases, and in such cases, the requirement that the ring cannot be formed is preferably guaranteed, so that the requirement of protection can only be met to the greatest extent.
The essence of the damage method is as follows: the standby clock source signal of a certain network element is deleted, so that the clock source signal transmitted by a certain network element is no longer returned to the local network element (as shown in fig. 10). Based on the above requirements of planning two synchronous networks, one standby clock source on the network element with multiple standby clock sources is preferentially deleted, so that the network element still has a protection effect after being damaged.
Wherein, the restoration process after the alarm is eliminated comprises:
step 1: a network element in a protection area in a synchronous network sends out a message for eliminating the alarm;
step 2: storing the information of the eliminated alarm and the information of the corresponding detection point (the object generating the alarm) into a cache set;
and step 3: checking whether the information of the alarm at the top of the restore stack and the information of the detection point are in a cache set; if so, popping the stack, carrying out the restoring operation in the step 4, and deleting the alarm information and the detection point information at the top of the stack in a cache set; otherwise, exiting the current flow;
and 4, step 4: when the restoration operation is carried out, the clock configuration stored in the restoration stack before the protection recovery is carried out is replaced;
and 5: the above-described processes 3-4 are looped until the top of the restore stack is different from the cache set.
Here, when alarm elimination occurs, the eliminated alarm and information of the corresponding detection point (object) are first stored into a set S, which is called a "cache set"; and then checking whether the alarm and the detection point of the stack top D of the reduction stack are in the cache set S, if so, popping the alarm and the detection point of the stack top D and performing reduction operation, and meanwhile, deleting the alarm and the detection point of the stack top D in the cache set S, and circulating the process until the stack top of the reduction stack does not belong to the cache set (the flow is shown in figure 12).
When the restore operation is performed, the clock configuration stored in the restore stack before the protection recovery occurs is only required to be replaced.
The embodiment of the present invention may be implemented by a Software Defined Network (SDN) controller deployed through a packet transport Network, and may of course be implemented by other devices.
For example, the following modular division of the device may be made:
a human-computer interaction interface: the network elements can be selected to create the protection area, the range of the protection area can be shown, and the protection area can be modified and deleted, when the protection recovery occurs, a prompt can be given and which network elements are subjected to the protection recovery can be shown, and when the recovery occurs, which network elements are subjected to the recovery can be shown;
the area management module: the network element is responsible for creating, modifying and deleting the protection area, and the network element is allowed to be added into the protection area or excluded from the protection area when the protection area is modified;
an alarm arbitration module: an alert generation message is received. When an alarm is generated, a fault source is found and a command is sent to the clock planning module to trigger a protection recovery process;
a clock planning module: receiving a command from an alarm arbitration module and performing increment planning to achieve the purpose of protection and recovery;
the data recovery module: and receiving the alarm elimination message and carrying out reduction processing.
In the practical application process, when a fault generates an alarm, the alarm is transmitted to the alarm arbitration module, the alarm arbitration module judges a fault source according to the alarm, a protection recovery flow is started, and an increment planning command is sent to the clock planning module;
the clock planning module performs increment planning on a clock signal tracking path of the synchronous network topology after removing a fault source, compares a new planning result with the existing clock source configuration, finds changed clock source configuration data, returns the data before the change to the alarm arbitration module, applies the changed data to a network element, and generates protection recovery;
the alarm arbitration module receives the data before change returned by the clock planning module, associates the data before change with the alarm information, and pushes the data to the data reduction module, and the data reduction module stores the data in a reduction stack.
And after the network element generates an alarm eliminating message, transmitting the alarm eliminating message to the data restoring module, storing the alarm eliminating message into a cache set by the data restoring module, judging whether the stack top alarm information of the restoring stack is in the cache set or not, and if so, carrying out data restoring operation.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention.

Claims (10)

1. An automatic protection method for a synchronous network is characterized by comprising the following steps:
receiving alarm information sent by a network element, and determining that protection operation needs to be performed according to the alarm information; the network element is located in a preset protection area, and the alarm information represents that a clock signal of the network element fails;
determining a fault source based on the alarm information;
and updating the clock configuration of the network elements in the protection area with the fault source eliminated to obtain the updated main clock source and the updated standby clock source of each network element.
2. The method of claim 1, wherein after determining the source of the fault based on the alarm information, the method further comprises:
and storing the alarm information, the identification information of the object generating the alarm and the clock configuration information of each network element in the protection area before updating.
3. The method of claim 2, wherein after updating the clock configuration of the network element in the protection area excluding the fault source, the method further comprises:
receiving a message that the alarm sent by the network element in the protection area is eliminated;
acquiring the information of the eliminated alarm and the identification information of the object generating the eliminated alarm;
and if the information of the eliminated alarm is determined to be the same as the stored information of the alarm and the identification information of the object generating the eliminated alarm is determined to be the same as the stored identification information of the object generating the alarm, correspondingly setting the clock configuration information of each network element in the protection area as the stored clock configuration information before updating.
4. The method of claim 1, wherein determining a fault source based on the alarm information comprises:
if the links where the active clock source port and the standby clock source port of one network element are located generate the LOS alarm, determining that the link generating the LOS alarm is a fault source; and/or the presence of a gas in the gas,
and if the LOS alarm occurs on the external clock port of one network element and the clock source is unlocked or degraded, determining that the external clock source of the network element is a fault source.
5. The method of claim 1, wherein the updating the clock configuration of the network element in the protection area excluding the fault source comprises:
acquiring network topology except the fault source in the protection area, and determining a clock injection source based on the network topology;
splitting the network topology into a ring set and a chain set, and determining the current clock signal tracking mode based on the clock signal tracking mode before updating;
and taking the determined current clock signal tracking path as an updated main clock source of each network element, taking a signal source in a residual clock source port as an updated standby clock source, and performing damage-breaking processing on the clock configuration of each network element.
6. The method of claim 5,
the clock injection source includes: and an external clock injection point and a strategy domain external adjacent point of the boundary point.
7. The method of claim 5, wherein determining a current clock signal tracking mode based on the pre-update clock signal tracking mode comprises:
traversing the network topology in the protection area, if at least one clock signal tracking path has a difference of one hop and then forms a ring, judging that the clock signal tracking mode before the network topology is updated is a ring mode, and if not, judging that the clock signal tracking mode is a shortest path mode;
the current clock signal is tracked in the same way as the clock signal before updating.
8. The method of claim 5, wherein the destruction process comprises:
deleting a standby clock source of a network element in the network topology.
9. The method of claim 8, wherein removing a standby clock source of a network element in the network topology comprises:
and deleting a standby clock source corresponding to a network element with a plurality of standby clock sources in the network topology.
10. An automatic protection device for a synchronous network, the device comprising:
the alarm processing module is used for receiving alarm information sent by a network element and determining that protection operation is required according to the alarm information; the network element is located in a preset protection area, and the alarm information represents that a clock signal of the network element fails;
the fault determining module is used for determining a fault source based on the alarm information;
and the clock configuration module is used for updating the clock configuration of the network elements in the protection area for eliminating the fault source to obtain the updated main clock source and the updated standby clock source of each network element.
CN201710397589.7A 2017-05-31 2017-05-31 Automatic protection method and device for synchronous network Active CN108988976B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710397589.7A CN108988976B (en) 2017-05-31 2017-05-31 Automatic protection method and device for synchronous network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710397589.7A CN108988976B (en) 2017-05-31 2017-05-31 Automatic protection method and device for synchronous network

Publications (2)

Publication Number Publication Date
CN108988976A CN108988976A (en) 2018-12-11
CN108988976B true CN108988976B (en) 2021-01-26

Family

ID=64502131

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710397589.7A Active CN108988976B (en) 2017-05-31 2017-05-31 Automatic protection method and device for synchronous network

Country Status (1)

Country Link
CN (1) CN108988976B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112311575B (en) * 2019-07-31 2022-06-03 烽火通信科技股份有限公司 Clock ring forming detection method and system in optical transmission network management
CN114448792B (en) * 2022-01-04 2023-09-26 武汉烽火技术服务有限公司 Method and device for automatically maintaining clock synchronization network based on network configuration change

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1770701A (en) * 2004-11-03 2006-05-10 华为技术有限公司 Clock track realizing method in MESH network
CN105099647A (en) * 2014-05-16 2015-11-25 中兴通讯股份有限公司 Synchronous method, controller, synchronous node and synchronous network
CN105245306A (en) * 2015-10-27 2016-01-13 中国南方电网有限责任公司 Method and system for switching main and standby synchronous clocks under BC (Basic Control) mode of PTN (Packet Transport Network) synchronous network of wide area protection system
CN106452817A (en) * 2015-08-12 2017-02-22 中国电信股份有限公司 Protection configuration management method and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104348568A (en) * 2013-07-23 2015-02-11 中兴通讯股份有限公司 Time synchronization processing method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1770701A (en) * 2004-11-03 2006-05-10 华为技术有限公司 Clock track realizing method in MESH network
CN105099647A (en) * 2014-05-16 2015-11-25 中兴通讯股份有限公司 Synchronous method, controller, synchronous node and synchronous network
CN106452817A (en) * 2015-08-12 2017-02-22 中国电信股份有限公司 Protection configuration management method and system
CN105245306A (en) * 2015-10-27 2016-01-13 中国南方电网有限责任公司 Method and system for switching main and standby synchronous clocks under BC (Basic Control) mode of PTN (Packet Transport Network) synchronous network of wide area protection system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
软件定义传送网标准化发展探讨与思考;张海懿等;《中兴通讯技术》;20151231;第21卷(第6期);全文 *

Also Published As

Publication number Publication date
CN108988976A (en) 2018-12-11

Similar Documents

Publication Publication Date Title
CN101702663B (en) Method and device for updating ring network topology information
US20090016214A1 (en) Method and system for network recovery from multiple link failures
EP2632081B1 (en) Path switch-back method and apparatus in transport network
EP3386156A1 (en) Failure recovery method and device, controller, and software defined network
EP3121996B1 (en) Synchronization failure processing method and system for clock and time synchronization network
CN108988976B (en) Automatic protection method and device for synchronous network
US9954735B2 (en) Realizing graceful restart in IS-IS network
CN101286835A (en) Clock tracing method, device and network element device
US8804485B2 (en) Method and apparatus for coordinating fault recovery techniques among domains
CN104301142A (en) Backup method and device for configuration files
CN114422418B (en) SDN-based satellite network route switching method, device and storage medium
CN103763137B (en) A kind of device configuration connection guard method, system and device
CN102006202A (en) Router identification collision detection method and router
CN102792636B (en) There is provided and recover the method for survivability, equipment and communication network
CN105391629A (en) Resource backup method and device
CN108804129A (en) A kind of method for upgrading software and device
JP5697071B2 (en) Network system and failure recovery method thereof
US20020167896A1 (en) Methods and apparatus for configuration information recovery
WO2013185583A1 (en) Method and device for recovering protection service in intelligent optical network
CN107453995B (en) Designated router election method, device, router and communication system
WO2017181781A1 (en) Traffic forwarding method and apparatus
CN114173367B (en) Time synchronization path protection method, device and readable storage medium
CN112583650A (en) SR-BE tunnel link detection method and system in SPN
CN111344962A (en) Network interface switching method of optical network unit and optical network unit
CN113472642B (en) Protection switching method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant