CN115514626A - Fault location detection method, root node, communication system topology and storage medium - Google Patents

Fault location detection method, root node, communication system topology and storage medium Download PDF

Info

Publication number
CN115514626A
CN115514626A CN202110685578.5A CN202110685578A CN115514626A CN 115514626 A CN115514626 A CN 115514626A CN 202110685578 A CN202110685578 A CN 202110685578A CN 115514626 A CN115514626 A CN 115514626A
Authority
CN
China
Prior art keywords
leaf node
uplink
node
target
onu
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110685578.5A
Other languages
Chinese (zh)
Inventor
余辰东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN202110685578.5A priority Critical patent/CN115514626A/en
Priority to PCT/CN2022/092745 priority patent/WO2022267737A1/en
Publication of CN115514626A publication Critical patent/CN115514626A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/44Star or tree networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0677Localisation of faults
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0817Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements

Abstract

The invention provides a fault positioning detection method, a root node, a communication system topology and a storage medium, wherein the root node acquires a first communication quality parameter of a target leaf node, acquires historical characteristic information of a plurality of leaf nodes when the first communication quality parameter does not meet the requirement of a first preset communication quality parameter, and determines a first leaf node suspected to interfere with the target leaf node from the plurality of leaf nodes according to the historical characteristic information; then controlling the first leaf node to stop uploading data in the first uplink time slot of the target leaf node, and acquiring a second communication quality parameter of the target leaf node in the first uplink time slot; and when the second communication quality parameter meets the requirement of a second preset communication quality parameter, determining the first leaf node as a second leaf node of the interference target leaf node. The method can screen out the interference leaf nodes, can solve the problem that the uplink logic channels of the leaf nodes in the PToMP communication system topology adopting the TDMA mechanism are occupied, and realizes the positioning of faults.

Description

Fault location detection method, root node, communication system topology and storage medium
Technical Field
The embodiments of the present invention relate to, but not limited to, the field of communications technologies, and in particular, to a fault location detection method, a root node, a communication system topology, and a computer-readable storage medium.
Background
For a PToMP (Point To MultiPoint) communication architecture system, a root node and a plurality of leaf nodes are included. When the PToMP communication architecture system described above employs a TDMA (Time Division Multiple Access) mechanism, under a normal condition, the root node may allocate different uplink logical channel identifiers to different leaf nodes, and the root node may allocate different uplink bandwidth Time slots for the leaf nodes to upload data according to the uplink logical channel identifiers. However, since the uplink logical channel identifier employs a dynamic allocation mechanism, the root node may repeatedly allocate an uplink logical channel identifier to other leaf nodes when the leaf node allocated last time fails, for example, goes offline. The leaf node that allocated the uplink logical channel identifier last time may not normally release the uplink logical channel identifier under the condition that the leaf node fails, so that a problem of duplication of the uplink logical channel identifier may occur. In other words, when a certain leaf node does not release the uplink logical channel identifier according to the requirement of the root node due to an exception, if the root node allocates the uplink logical channel identifier to another leaf node again, the uplink logical channel identifiers of the leaf nodes collide with each other, and then the abnormal leaf node may cause interference to the uplink data of the normal leaf node.
In order to solve the interference problem, the abnormal leaf node needs to be located first. However, there are often two cases during positioning: firstly, because the state differences of different leaf nodes, such as signal strength difference or bandwidth difference, are different in expression form under the condition that an uplink logic channel is occupied, and because the leaf nodes possibly have unsteady characteristics, the difficulty exists in detecting the problem of occupation of the uplink logic channel identifier; secondly, for a dynamic allocation mechanism of the uplink logical channel identifier, the problem of occupation of the uplink logical channel identifier exists implicitly, so that there is difficulty in locating leaf nodes occupied by the uplink logical channel identifier.
Disclosure of Invention
The following is a summary of the subject matter described in detail herein. This summary is not intended to limit the scope of the claims.
The embodiment of the invention provides a fault positioning detection method, a root node, a communication system topology and a computer readable storage medium, which can realize the positioning of abnormal leaf nodes.
In a first aspect, an embodiment of the present invention provides a fault location detection method, which is applied to a root node in a communication system topology, where the communication system topology further includes a plurality of leaf nodes that communicate with the root node, and the method includes:
acquiring a first communication quality parameter of a target leaf node, wherein the target leaf node is one of a plurality of leaf nodes;
when the first communication quality parameter does not meet the requirement of a first preset communication quality parameter, acquiring historical characteristic information of a plurality of leaf nodes;
determining a first leaf node suspected of interfering the target leaf node in the plurality of leaf nodes according to the historical characteristic information;
controlling the first leaf node to stop uploading data in a first uplink time slot of the target leaf node, and acquiring a second communication quality parameter of the target leaf node in the first uplink time slot;
and when the second communication quality parameter meets a second preset communication quality parameter requirement, determining the first leaf node as a second leaf node interfering with the target leaf node.
In a second aspect, an embodiment of the present invention further provides a root node, including: a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the fault location detection method according to the first aspect when executing the computer program.
In a third aspect, an embodiment of the present invention further provides a communication system topology, including a plurality of leaf nodes and the root node according to the second aspect, where the root node communicates with the plurality of leaf nodes.
In a fourth aspect, an embodiment of the present invention further provides a computer-readable storage medium, which stores computer-executable instructions for executing the fault location detection method according to the first aspect.
The embodiment of the invention comprises the following steps: a root node in a communication system topology acquires a first communication quality parameter of a target leaf node, wherein the target leaf node is one of a plurality of leaf nodes in the communication system topology; when the first communication quality parameter does not meet the requirement of a first preset communication quality parameter, a root node acquires historical characteristic information of a plurality of leaf nodes, and determines a first leaf node suspected of interfering the target leaf node in the plurality of leaf nodes according to the historical characteristic information; then, the root node controls the first leaf node to stop uploading data in a first uplink time slot of the target leaf node, and obtains a second communication quality parameter of the target leaf node in the first uplink time slot; when the second communication quality parameter meets a second preset communication quality parameter requirement, the root node determines that the first leaf node is a second leaf node interfering with the target leaf node. According to the technical scheme of the embodiment of the invention, the root node of the embodiment of the invention can screen out a second leaf node which causes interference to a target leaf node, namely an abnormal leaf node from a plurality of leaf nodes, so that the problem that an uplink logic channel of the leaf node in the PToMP communication system topology adopting a TDMA mechanism is occupied is solved, and the abnormal leaf node is positioned.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the example serve to explain the principles of the invention and not to limit the invention.
FIG. 1 is a schematic diagram of a PToMP communication system topology provided by one embodiment of the present invention;
fig. 2 is a schematic diagram of an xPON network provided by an embodiment of the invention;
FIG. 3 is a schematic diagram of a system architecture platform for performing a fault location detection method according to an embodiment of the present invention;
FIG. 4 is a flow chart of a fault location detection method provided by an embodiment of the invention;
fig. 5 is a specific flowchart for determining a first leaf node in the fault location detection method according to an embodiment of the present invention;
fig. 6 is a specific flowchart for determining a first leaf node in a fault location detection method according to another embodiment of the present invention;
fig. 7 is a specific flowchart for controlling a first leaf node to stop uploading data in a first uplink time slot of a target leaf node in the fault location detection method according to an embodiment of the present invention;
fig. 8 is a specific flowchart for controlling a first leaf node to stop uploading data in a first uplink time slot of a target leaf node in a fault location detection method according to another embodiment of the present invention;
fig. 9 is a specific flowchart for controlling a first leaf node to stop uploading data in a first uplink timeslot of a target leaf node in a fault location detection method according to yet another embodiment of the present invention;
fig. 10 is a detailed flowchart of subsequently uploading the characteristic parameters of the second leaf node in the fault location detection method according to an embodiment of the present invention;
fig. 11 is a flowchart illustrating an authorization process of an xPON network topology according to an embodiment of the present invention;
fig. 12 is a specific flowchart of a method for detecting a fault location in an xPON network according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and do not limit the invention.
It should be noted that although functional blocks are partitioned in a schematic diagram of an apparatus and a logical order is shown in a flowchart, in some cases, the steps shown or described may be performed in a different order than the partitioning of blocks in the apparatus or the order in the flowchart. The terms "first," "second," and the like in the description, in the claims, or in the drawings described above, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order.
As shown in fig. 1, fig. 1 is a schematic diagram of a topology of a PToMP communication system according to an embodiment of the present invention. For the PToMP communication architecture system of fig. 1, a root node 110 and a plurality of leaf nodes 120 in communication with the root node 110 are included. When the PToMP communication architecture system in fig. 1 employs a TDMA mechanism, under normal conditions, the root node 110 dynamically allocates different uplink logical channel identifiers to different leaf nodes 120, and the root node 110 allocates different uplink bandwidth timeslots to the leaf nodes 120 according to the uplink logical channel identifiers for uploading data. However, because the uplink logical channel identifiers adopt a dynamic allocation mechanism, the root node may repeatedly allocate one uplink logical channel identifier to other leaf nodes when the leaf node allocated last time fails, for example, when the leaf node allocated last time is offline. The leaf node that allocated the uplink logical channel identifier last time may not normally release the uplink logical channel identifier under the condition that the leaf node fails, so that a problem of duplication of the uplink logical channel identifier may occur. In other words, when a certain leaf node does not release the uplink logical channel identifier according to the requirement of the root node due to an exception, if the root node allocates the uplink logical channel identifier to another leaf node again, the uplink logical channel identifiers of the leaf nodes may collide, and the abnormal leaf node 120 may further cause interference to the uplink data of the normal leaf node 120.
It should be noted that, regarding the above-mentioned PToMP communication system topology using the TDMA mechanism, it may be a PON (Passive Optical Network ) communication system using the TDMA mechanism in an access Network, specifically, the root node 110 may correspond to an OLT (Optical Line Terminal) in the PON communication system, and the leaf node 120 may correspond to an ONU (Optical Network Unit) or an ONT (Optical Network Termination) in the PON communication system. In addition, the topology of the communication system using the TDMA scheme may also be another network architecture using the TDMA scheme or a plurality of terminal devices using the TDMA scheme, and the embodiment of the present invention is not limited in any way.
Specifically, in order to more clearly describe the situation that the uplink logical channel identifier in the PToMP communication architecture topology using the TDMA mechanism is occupied, the embodiment of the present invention takes a PON communication system using the TDMA mechanism in the access network as an example, and details the situation.
It can be understood that the Passive Optical Network device based on the TDMA mechanism can be classified into an EPON (Ethernet Passive Optical Network, ethernet-based Passive Optical Network device), a G-PON (Gigabit-capable Passive Optical Network, gigabit Passive Optical Network device) and Passive Optical Network devices of other working mechanisms according to the working mechanism; the passive optical network devices have the same system architecture and all include an OLT and an ONU, and in the embodiment of the present invention, the PON technology is collectively referred to as xPON.
As shown in fig. 2, fig. 2 is a schematic diagram of an xPON network according to an embodiment of the present invention. For the xPON Network in fig. 2, an EMS (Element Management Server) 210, an OLT220, an ODN (Optical Distribution Network) 230, and a plurality of ONUs 240 are included. The OLT220 serves as a central office device and is connected and converged with a plurality of ONUs 240 through the ODN 230; the ONU240 is configured to implement access of a user service, thereby implementing functions such as data service and configuration management. In addition, it can be understood that the transmission direction from OLT220 to ONU240 is a downlink direction, the downlink direction sends data in a broadcast manner, and finally, ONU240 determines whether the data is valid according to the data identifier and decides to receive or discard the data; the transmission direction from the ONU240 to the OLT220 is the uplink direction, the uplink direction transmits data in a TDMA manner, the ONU240 transmits data according to the uplink grant of the OLT based on the logical channel identifier, and the OLT determines whether the data is valid and decides to receive or discard the data.
The bandwidth authorization mechanism for the xPON network in fig. 2 is specifically as follows: after the ONU240 completes registration, bandwidth authorization is periodically performed between the OLT220 and the ONUs 240, specifically, the OLT220 sends a general authorization to each ONU240 based on an ONU identifier, only the ONUs 240 with the same identifier may respond and send a report according to an authorization requirement, then the OLT220 allocates a new bandwidth to the ONUs 240 through an authorization frame in the next period according to a report frame reported by the ONUs 240, and then the ONUs with the same uplink logical channel identifier send data within a time specified by the authorization frame. When the ON240U is deleted, the deleted ONU240 upstream logical channel identifier is reassigned to another newly accessed ONU240 by the OLT, that is, the ONU240 upstream logical channel identifier adopts a dynamic assignment mechanism.
It will be appreciated that the ordinary grants sent by OLT220 to each ONU240 based on ONU identification as described above may be, but are not limited to, MPCP GATE frames in an EPON system, or GTC/BWmap frames in a GPON system. In addition, the report sent by the ONU responding and according to the authorization requirement may be, but not limited to, MPCP report frame in EPON system or PLOAMu/DBRu frame in GPON system.
It should be noted that the ONU240 upstream logical channel identifiers are uniformly allocated by the OLT220 when the ONU240 registers, and after the ONU240 successfully registers, the OLT220 allocates different upstream bandwidth timeslots according to the ONU240 upstream logical channel identifiers. For the xPON network, under the control of the OLT220, each ONU240 is configured to allocate one or more logical channel identifiers unique to the PON port as an uplink channel timeslot identifier of the ONU240 according to its service configuration, so that the ONU240 forwards data only in the uplink timeslot allocated by the OLT 220.
It is to be understood that, regarding the above uplink channel timeslot Identifier, in an EPON system, the uplink channel timeslot Identifier corresponds to a LIID (Logical Link Identifier); in the GPON system, the uplink channel timeslot Identifier is corresponding to AllocID (allocated Identifier).
Based on the xPON network in fig. 2, when the xPON network in fig. 2 adopts a TDMA access method, the registration process is periodically started, only the unregistered newly accessed ONU240 may respond to the registration authorization frame sent by the OLT220 in the registration period, and the OLT220 allocates a unique ONU identifier to the newly accessed ONU240, and finally sends a registration completion frame by interaction to complete the whole registration process. That is, in the bandwidth allocation between the ONU240 in the xPON network and normal operation, the ONU240 turns on the upstream light emission of the optical module only within the authorized time of the OLT220 and responds to various messages of the OLT 220. After the authorized time slice is not reached or closed, the ONU240 must turn off the upstream light emission of the optical module, and only monitor the downstream message of the OLT220, and accept or discard the downstream message according to the ONU identifier in the downstream message header.
It is understood that, regarding the above-mentioned registration authorization Frame, it may be, but is not limited to, an MPCP discovery GATE Frame in an EPON system, or a DS Frame with valid Psync Frame in a GPON system. In addition, the ONU identifier may be, but not limited to, an LLID in an EPON system or an ONU ID in a GPON system. In addition, the registration completion frame may be, but is not limited to, an MPCP register ack frame sent by the ONU240 in the EPON system, or a Serial _ Number _ ONU or Password frame sent by the ONU240 in the GPON system.
In the xPON network, since the uplink logical channel identifier adopts a dynamic allocation mechanism, when the OLT220 recovers the uplink logical channel identifier of a certain ONU240, the ONU240, that is, the abnormal ONU240, incorrectly releases the uplink logical channel identifier originally allocated to it by the OLT220 due to a certain abnormality, and the OLT220 reallocates the uplink logical channel identifier to another normal ONU240 on the same link. In this case, there may be two ONUs 240 sending data in the uplink bandwidth timeslot marked by the same uplink logical channel identifier, that is, an abnormal ONU240 that does not correctly release the uplink logical channel identifier interferes with the uplink data of the normal ONU240 that is allocated with the uplink logical channel identifier by the OLT220, that is, the uplink logical channel is occupied.
When the abnormal ONU240 illegally occupies the uplink logical channel identifier allocated by the OLT220, it directly affects the interaction between the ONU240 that the OLT220 normally allocates the uplink logical channel identifier and the OLT220, and causes the uplink service of the ONU240 that is normally allocated with the uplink logical channel identifier to generate packet loss, and if it is serious, it drops, and seriously affects the service, including the following two aspects:
in a first aspect: because different ONU240 state differences, such as signal strength differences or bandwidth differences, are different in presentation form under the condition of uplink logical channel occupancy, and because of the unsteady characteristic of the ONU240 itself, it is difficult to detect the uplink logical channel identifier occupancy problem.
In a second aspect: in the dynamic allocation mechanism of the logical channel identifier, the problem of occupation of the logical channel identifier exists implicitly, so that it is difficult to locate the abnormal ONU240 occupied by the uplink logical channel identifier.
Therefore, the above problem occurs because the abnormal ONU240 operates abnormally in software and hardware, which causes an abnormality in the allocation management and use of the uplink logical channel identifier of the OLT220 in the xPON network using the TDMA operating mode, and causes interference to the ONU240 that normally allocates the uplink logical channel identifier to the OLT 220.
Based on the foregoing, an embodiment of the present invention provides a fault location detection method, a root node, a communication system topology, and a computer-readable storage medium, where the fault location detection method includes, but is not limited to, the following steps: a root node in a communication system topology acquires a first communication quality parameter of a target leaf node, wherein the target leaf node is one of a plurality of leaf nodes in the communication system topology; when the first communication quality parameter does not meet the requirement of a first preset communication quality parameter, the root node acquires historical characteristic information of a plurality of leaf nodes, and determines a first leaf node of a suspected interference target leaf node in the plurality of leaf nodes according to the historical characteristic information; then, the root node controls the first leaf node to stop uploading data in a first uplink time slot of the target leaf node, and acquires a second communication quality parameter of the target leaf node in the first uplink time slot; and when the second communication quality parameter meets the requirement of a second preset communication quality parameter, the root node determines that the first leaf node is a second leaf node of the interference target leaf node. According to the technical scheme of the embodiment of the invention, the root node of the embodiment of the invention can screen out a second leaf node which causes interference to a target leaf node from a plurality of leaf nodes, namely an abnormal leaf node, so that the problem that an uplink logic channel of the leaf node in the topology of the PToMP communication system is occupied is solved, and the abnormal leaf node is positioned.
The embodiments of the present invention will be further explained with reference to the drawings.
As shown in fig. 3, fig. 3 is a schematic diagram of a system architecture platform 300 for performing a fault location detection method according to an embodiment of the present invention.
In the example of fig. 3, the system architecture platform 300 is provided with a processor 310 and a memory 320, wherein the processor 310 and the memory 320 may be connected by a bus or other means, and the connection by the bus is taken as an example in fig. 3.
The memory 320, which is a non-transitory computer readable storage medium, may be used to store non-transitory software programs as well as non-transitory computer executable programs. Further, the memory 320 may include high speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, memory 320 may optionally include memory located remotely from processor 310, which may be connected to the system architecture platform via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
It can be understood by those skilled in the art that the system architecture platform can be applied to a 3G communication network system, an LTE communication network system, a 5G communication network system, a mobile communication network system that is evolved later, and the like, and this embodiment is not limited in particular.
Those skilled in the art will appreciate that the system architecture platform illustrated in FIG. 3 does not constitute a limitation on embodiments of the invention, and may include more or fewer components than those illustrated, or some components may be combined, or a different arrangement of components.
In the system architecture platform shown in fig. 3, the processor 310 may invoke a fault location detection program stored in the memory 320 to perform a fault location detection method.
Based on the above system architecture platform, the following provides various embodiments of the fault location detection method of the present invention.
As shown in fig. 4, fig. 4 is a flowchart of a fault location detection method according to an embodiment of the present invention, the fault location detection method is applied to a root node in a communication system topology, where the communication system topology further includes a plurality of leaf nodes in communication with the root node, and the fault location detection method includes, but is not limited to, step S100, step S200, step S300, step S400, and step S500.
Step S100, acquiring a first communication quality parameter of a target leaf node, wherein the target leaf node is one of a plurality of leaf nodes;
s200, when the first communication quality parameter does not meet the requirement of a first preset communication quality parameter, acquiring historical characteristic information of a plurality of leaf nodes;
step S300, determining a first leaf node of a suspected interference target leaf node in a plurality of leaf nodes according to historical characteristic information;
step S400, controlling the first leaf node to stop uploading data in the first uplink time slot of the target leaf node, and acquiring a second communication quality parameter of the target leaf node in the first uplink time slot;
and S500, when the second communication quality parameter meets the requirement of a second preset communication quality parameter, determining the first leaf node as a second leaf node of the interference target leaf node.
Specifically, in a PToMP communication architecture topology adopting a TDMA mechanism, a root node acquires a first communication quality parameter of a target leaf node, compares the first communication quality parameter with a first preset communication quality parameter requirement, and when the first communication quality parameter does not meet the first preset communication quality parameter requirement, the target leaf node is indicated to receive interference of other leaf nodes, and the target leaf node is an interfered leaf node. Then, the root node obtains the historical feature information of the plurality of leaf nodes, and based on the analysis of the historical feature information of the plurality of leaf nodes, determines a first leaf node which is suspected to interfere with the target leaf node from the plurality of leaf nodes except the target leaf node, that is, the first leaf node is a suspicious leaf node. After the first leaf node is screened out, the root node controls the first leaf node to stop uploading data in the first uplink time slot of the target leaf node, and obtains the second communication quality parameter of the target leaf node in the first uplink time slot, in other words, during the period of trying to close the first leaf node, the communication quality of the target leaf node is observed and cannot be recovered. When the second communication quality parameter meets the requirement of a second preset communication quality parameter, that is, if the communication quality of the target leaf node is recovered during the closing period of the first leaf node, it indicates that the first leaf node which stops uploading data is an interference leaf node which causes interference to the target leaf node, and thus the root node determines that the first leaf node is a second leaf node which interferes with the target leaf node, that is, the first leaf node is an interference leaf node. Conversely, when the second communication quality parameter does not satisfy the requirement of the second preset communication quality parameter, that is, if the communication quality of the target leaf node is not recovered during the closing period of the first leaf node, it indicates that the first leaf node that has stopped uploading data is not an interfering leaf node that causes interference to the target leaf node.
According to the technical scheme of the embodiment of the invention, the root node of the embodiment of the invention can screen out a second leaf node which causes interference to a target leaf node from a plurality of leaf nodes, namely an abnormal leaf node, so that the problem that an uplink logic channel of the leaf node in the topology of the PToMP communication system is occupied is solved, and the abnormal leaf node is positioned. In addition, the fault location detection method of the embodiment of the invention can solve the problem that the uplink logic channel of the leaf node in the PToMP communication architecture topology adopting the TDMA mechanism is occupied without depending on the cooperation with the leaf node, and locates the abnormal leaf node. In addition, the embodiment of the invention adopts a software mode to realize the dynamic monitoring of the problem that the uplink logic channel is occupied on the basis of the existing hardware, so that the method is simpler and more flexible, and has lower cost.
It should be noted that, the first communication quality parameter may be, but is not limited to, an upper and lower line number of the target leaf node in a preset period, an uplink error number of the target leaf node in the preset period, a change value of the upper and lower line number of the target leaf node in the preset period, or a change value of the uplink error number of the target leaf node in the preset period.
In addition, the second communication quality parameter may be, but is not limited to, an upper and lower line number of the target leaf node in a preset period, an uplink error number of the target leaf node in the preset period, a change value of the upper and lower line number of the target leaf node in the preset period, or a change value of the uplink error number of the target leaf node in the preset period.
In addition, it can be understood that, regarding the first preset communication quality parameter requirement and the second preset communication quality parameter requirement described above, the following four cases are included but not limited to:
in the first case: and when the first communication quality parameter and the second communication quality parameter are the up-down times in a preset period, the first preset communication quality parameter requirement and the second preset communication quality parameter requirement are corresponding to the up-down times threshold.
In the second case: and when the first communication quality parameter and the second communication quality parameter are uplink error numbers in a preset period, the first preset communication quality parameter requirement and the second preset communication quality parameter requirement are corresponding to uplink error number threshold values.
In the third case: when the first communication quality parameter and the second communication quality parameter are up-down line frequency change values in a preset period, the first preset communication quality parameter requirement and the second preset communication quality parameter requirement are corresponding up-down line frequency change threshold values.
In a fourth case: when the first communication quality parameter and the second communication quality parameter are uplink error number change values in a preset period, the first preset communication quality parameter requirement and the second preset communication quality parameter requirement are corresponding to uplink error number change threshold values.
It should be noted that the first preset communication quality parameter requirement and the second preset communication quality parameter requirement may be the same, and for example, when the first preset communication quality parameter requirement and the second preset communication quality parameter requirement are the upper and lower threshold values, the upper and lower threshold values corresponding to the first preset communication quality parameter requirement and the second preset communication quality parameter requirement are the same. Or the first preset communication quality parameter requirement is lower than the second preset communication quality parameter requirement, for example, when the first preset communication quality parameter requirement and the second preset communication quality parameter requirement are the upper and lower line times threshold values, the upper and lower line times threshold value corresponding to the first preset communication quality parameter requirement is lower than the upper and lower line times threshold value corresponding to the second preset communication quality parameter requirement.
It should be noted that the first uplink timeslot of the target leaf node is allocated by the root node according to the uplink logical channel identifier allocated by the target leaf node. Specifically, when the target leaf node is registered, the root node allocates an uplink logical channel identifier to the target leaf node, and after the target leaf node completes registration, the root node also allocates a first uplink time slot to the target leaf node according to the uplink logical channel identifier allocated to the target leaf node, so that the target leaf node can upload data in the first uplink time slot.
In addition, it should be noted that the historical characteristic information about the plurality of leaf nodes includes, but is not limited to, registration characteristic information of the plurality of leaf nodes or service characteristic information historically adopted by the leaf nodes.
The step S300 can be divided into two embodiments shown in fig. 5 and 6. Fig. 5 is a specific flowchart for determining a first leaf node in the fault location detection method according to an embodiment of the present invention; fig. 6 is a specific flowchart for determining a first leaf node in a fault location detection method according to another embodiment of the present invention.
As shown in fig. 5, fig. 5 is a specific flowchart for determining a first leaf node in the fault location detection method according to an embodiment of the present invention. The step S300 includes, but is not limited to, the steps S610, S620, S630 and S640.
Step S610, controlling the target leaf node to stop uploading data in the second uplink time slot;
step S620, when the uplink data is obtained in the second uplink time slot and cannot be analyzed, obtaining a logic channel identifier corresponding to the target leaf node;
step S630, according to the logic channel identifier and the historical characteristic information, determining a leaf node matched with the logic channel identifier in the plurality of leaf nodes as a first leaf node, wherein the historical characteristic information comprises the logic channel identifiers of the plurality of leaf nodes;
and step S640, controlling the target leaf node to recover the uploaded data.
Specifically, in the PToMP communication architecture topology using the TDMA mechanism, after the root node determines that the target leaf node is an interfered leaf node, a suspected leaf node of the suspected interfered target leaf node is screened out from other leaf nodes except the target leaf node.
First, the embodiment of the present invention closes the data uploading function of the target leaf node, i.e., controls the target leaf node to stop uploading data in the second uplink timeslot.
Then, the root node judges whether uplink data from the leaf node is received or not in the second uplink time slot, and if the uplink data from the leaf node is not received in the second uplink time slot, the root node indicates that the target leaf node does not have the problem that the uplink logic channel identifier is occupied; if the uplink data from the leaf node is received in the second uplink time slot, the problem that the uplink logical channel identifier of the target leaf node is occupied is indicated.
And then, after receiving the uplink data from the leaf nodes, the root node analyzes the uplink data, and if the uplink data cannot be analyzed, the root node indicates that only the logical channel identifier allocated by the target leaf node is taken as an entry point, and finds out the suspicious leaf node suspected to interfere with the target leaf node. Specifically, in the embodiment of the present invention, a logical channel identifier allocated to a target leaf node is obtained, where the logical channel identifier is an interfered logical channel identifier, where the interfered logical channel identifier may be one or multiple logical channel identifiers, and then a root node searches historical characteristic information of multiple leaf nodes by using the interfered logical channel identifier as an index, so as to find a first leaf node corresponding to a logical channel identifier that is the same as the interfered logical channel identifier in the historical characteristic information, where the first leaf node does not include the target leaf node, and the first leaf node is a suspected leaf node of a suspected interference target leaf node.
It should be noted that, the first uplink timeslot may be allocated according to a preset rule, where the preset rule includes a bandwidth allocation rule corresponding to a priority of a leaf node, a fixed bandwidth allocation rule, and one of bandwidth allocation rules of multiple leaf nodes before the target leaf node stops uploading data.
In addition, it can be understood that, regarding the second uplink timeslot, the second uplink timeslot may also be allocated according to the preset rule, where the preset rule includes a bandwidth allocation rule corresponding to the priority of the leaf node, a fixed bandwidth allocation rule, and one of bandwidth allocation rules of multiple leaf nodes before the target leaf node stops uploading data.
Note that, the first uplink timeslot and the second uplink timeslot may be uplink timeslots having the same bandwidth or uplink timeslots having different bandwidths. In addition, the first uplink timeslot and the second uplink timeslot may be the same uplink timeslot, or may also be two different uplink timeslots.
As shown in fig. 6, fig. 6 is a specific flowchart for determining a first leaf node in a fault location detection method according to another embodiment of the present invention. The step S300 includes, but is not limited to, step S710, step S720, step S730, and step S740.
Step S710, controlling the target leaf node to stop uploading data in a second uplink time slot;
step S720, when the uplink data is acquired in the second uplink time slot and successfully analyzed, acquiring characteristic parameters obtained by analyzing the uplink data;
step S730, determining leaf nodes matched with the characteristic parameters from the plurality of leaf nodes as first leaf nodes according to the characteristic parameters and the historical characteristic information, wherein the historical characteristic information comprises the characteristic parameters of the plurality of leaf nodes;
and step S740, controlling the target leaf node to recover the uploaded data.
Specifically, in the PToMP communication architecture topology using the TDMA mechanism, after the root node determines that the target leaf node is an interfered leaf node, a suspected leaf node that is suspected to interfere with the target leaf node is screened out from other leaf nodes except the target leaf node.
First, the embodiment of the present invention closes the data uploading function of the target leaf node, i.e., controls the target leaf node to stop uploading data in the second uplink timeslot.
Then, the root node judges whether the uplink data from the leaf node is received or not in the second uplink time slot, and if the uplink data from the leaf node is not received in the second uplink time slot, the root node indicates that the target leaf node does not have the problem that the uplink logic channel identifier is occupied; if the uplink data from the leaf node is received in the second uplink time slot, the problem that the uplink logical channel identifier of the target leaf node is occupied is indicated.
And then, after receiving the uplink data from the leaf nodes, the root node analyzes the uplink data, and if the uplink data is successfully analyzed, the root node indicates that suspicious leaf nodes suspected to interfere with the target leaf nodes can be found by taking the uplink data as an entry point. Specifically, in the embodiment of the present invention, the feature parameter obtained by analyzing the uplink data is obtained, and then the root node uses the feature parameter obtained by analysis as an index to search in the historical feature information of the plurality of leaf nodes, so as to search, in the historical feature information, a first leaf node corresponding to the feature parameter that is the same as the feature parameter obtained by analysis, where the first leaf node does not include the target leaf node, and the first leaf node is a suspected leaf node that is a suspected interference target leaf node.
It should be noted that, regarding the above-mentioned determining, as the first leaf node, a leaf node that matches the feature parameter from among the plurality of leaf nodes according to the feature parameter and the historical feature information, two cases may be distinguished as follows:
in the first case: and when the characteristic parameters obtained by analysis are the same as the characteristic parameters currently configured by the leaf nodes, taking the leaf nodes as the first leaf nodes, namely the suspected leaf nodes.
In the second case: and when the characteristic parameters obtained by analysis cannot be the same as the characteristic parameters currently configured by the leaf nodes, matching search is carried out on the characteristic parameters used by the leaf nodes in the past by taking the characteristic parameters obtained by analysis as indexes, and the matched leaf nodes are found to be used as first leaf nodes, namely the leaf nodes can be suspected.
It should be noted that, for the above two cases, the historical feature information mentioned in the embodiment of the present invention may include feature information of the current configuration of the leaf node, and may also include feature information of the past configuration of the leaf node. The feature information about the current configuration and the feature information about the past configuration may be registered feature information or service feature information.
The characteristic parameter may be registration characteristic information or service characteristic information in the same manner.
It should be noted that, the first uplink timeslot may be allocated according to a preset rule, where the preset rule includes a bandwidth allocation rule corresponding to a priority of a leaf node, a fixed bandwidth allocation rule, and one of bandwidth allocation rules of multiple leaf nodes before the target leaf node stops uploading data.
In addition, it can be understood that, regarding the second uplink timeslot, the second uplink timeslot may also be allocated according to the preset rule, where the preset rule includes a bandwidth allocation rule corresponding to the priority of the leaf node, a fixed bandwidth allocation rule, and one of bandwidth allocation rules of multiple leaf nodes before the target leaf node stops uploading data.
Note that, the first uplink timeslot and the second uplink timeslot may be uplink timeslots having the same bandwidth or uplink timeslots having different bandwidths.
In addition, the method for controlling the first leaf node to stop uploading data in the first uplink timeslot of the target leaf node in step S400 may be specifically divided into three embodiments shown in fig. 7 to 9. Fig. 7 is a specific flowchart illustrating a method for controlling a first leaf node to stop uploading data in a first uplink time slot of a target leaf node in a fault location detection method according to an embodiment of the present invention; fig. 8 is a specific flowchart for controlling a first leaf node to stop uploading data in a first uplink time slot of a target leaf node in a fault location detection method according to another embodiment of the present invention; fig. 9 is a specific flowchart for controlling a first leaf node to stop uploading data in a first uplink timeslot of a target leaf node in a fault location detection method according to yet another embodiment of the present invention.
As shown in fig. 7, fig. 7 is a specific flowchart for controlling a first leaf node to stop uploading data in a first uplink timeslot of a target leaf node in a fault location detection method according to an embodiment of the present invention. For controlling the first leaf node to stop uploading data in the first uplink timeslot of the target leaf node in the step S400, the method includes, but is not limited to, the step S810.
Step S810, acquiring the current state of the first leaf node, sending registration information to the first leaf node when the current state is the unregistered state so as to switch the first leaf node from the unregistered state to the on-line registration state, and controlling the first leaf node to stop uploading data in the first uplink time slot of the target leaf node.
As shown in fig. 8, fig. 8 is a specific flowchart for controlling a first leaf node to stop uploading data in a first uplink timeslot of a target leaf node in a fault location detection method according to another embodiment of the present invention. For the step S400, controlling the first leaf node to stop uploading data in the first uplink timeslot of the target leaf node includes, but is not limited to, the step S820.
And step S820, acquiring the current state of the first leaf node, and controlling the first leaf node to stop uploading data in the first uplink time slot of the target leaf node when the current state is the registration online state.
As shown in fig. 9, fig. 9 is a specific flowchart for controlling a first leaf node to stop uploading data in a first uplink timeslot of a target leaf node in a fault location detection method according to another embodiment of the present invention. For controlling the first leaf node to stop uploading data in the first uplink timeslot of the target leaf node in the step S400, the method includes, but is not limited to, the step S830.
Step S830, obtaining a current state of the first leaf node, and controlling the first leaf node to stop uploading data in a first uplink time slot of the target leaf node when the current state is an offline state.
In addition, an embodiment of the present invention further provides a specific process for screening out a second leaf node from the first leaf node. The process is as follows: after the first leaf node in the unregistered state and the first leaf node in the registered state are screened, if the second leaf node interfering with the target leaf node cannot be screened, the first leaf node in the offline state is used as the second leaf node interfering with the target leaf node in the embodiment of the present invention.
In addition, as shown in fig. 10, fig. 10 is a specific flowchart for subsequently uploading the characteristic parameters of the second leaf node in the fault location detection method according to an embodiment of the present invention. After the step S500, the method further includes, but is not limited to, steps S910 and S920.
Step S910, acquiring characteristic parameters of a second leaf node;
and step S920, sending the characteristic parameters of the second blade node to a fault processing platform.
Specifically, after the root node is located to the second leaf node interfering with the target leaf node, the root node obtains the characteristic parameters of the second leaf node, and sends the characteristic parameters of the second leaf node to the fault processing platform.
It is understood that the fault handling platform described above includes, but is not limited to, a network management or other operation and maintenance platform.
In addition, it is understood that with respect to the above-mentioned feature parameters, including but not limited to registration feature parameters or service feature parameters.
In order to more clearly describe the fault location detection method in fig. 4 to 10, an exemplary embodiment of the present invention is specifically described based on the xPON network in fig. 2. For the xPON network of fig. 2, the leaf nodes mentioned in the fault location detection methods in fig. 4 to fig. 10 may correspond to ONUs in the xPON network of fig. 2, and secondly, the root node may correspond to an OLT in the xPON network of fig. 2.
With reference to fig. 2 and fig. 4 to fig. 10, specifically, as shown in fig. 11, fig. 11 is a flowchart of authorization of an xPON network topology according to an embodiment of the present invention, taking GPON as an example, and other systems are similar.
Specifically, a GPON GTC (Gigabit Pon Transmission Convergence) system provides media access control for an uplink service flow: the downstream frame indicates the allowed position of the upstream in the upstream frame by BWMAP (bandwidth map), and the upstream frame and the downstream frame are synchronized.
The OLT sends pointers in the PCBd that indicate the start and end times of each ONU upstream transmission. Therefore, only one ONU can access the medium at any time, and the collision can not occur in the normal working state. Pointers are in bytes, allowing the OLT to make effective static control of the medium at a bandwidth granularity of 64 kbit/s. However, some OLT applications may choose a larger pointer granularity to achieve better dynamic bandwidth scheduling control. The pointers in the example of fig. 11 are sent in ascending order. The pointers that the OLT sends to the ONUs are required to be arranged in ascending order of start time, suggesting that all pointers are sent in ascending order of their start time.
BWMAP is a vector array of 8-byte allocation structures, with each entry in the array representing a bandwidth allocated to a particular T-CONT.
The Allocation ID field is 12 bits and is used for indicating the specific T-CONT corresponding to the PON upstream authorization time.
The Start field is 16 bits long and indicates the Start time of the allocated time slot. The time is in bytes, starts from 0 in the uplink frame, and limits the size of the uplink frame not to exceed 65536 bytes, thereby meeting the uplink rate requirement of 2.488 Gb/s.
The End field is 16 bits long and is used for indicating the End time of the allocated time slot. This time is in bytes, starting with 0 in the upstream frame, indicating the last valid data byte allocated this time.
In addition, referring to fig. 2, fig. 4 to fig. 10 and fig. 11, as shown in fig. 12, fig. 12 is a specific flowchart of a method for detecting fault location in an xPON network according to an embodiment of the present invention, which includes, but is not limited to, step S1010, step S1020, step S1030, step S1040, step S1050, step S1060, step S1070, step S1080 and step S1090.
Step S1010, the OLT maintains an ONU historical characteristic information list for a unit based on the PON port, and initializes a suspicious ONU record table and an interference ONU record table.
Specifically, an OLT central office device in the xPON network maintains an ONU historical feature information list based on a PON port as a unit, where a feature value in the ONU historical feature information list refers to a feature value that can uniquely characterize an ONU on an optical link and is related to registration or service, where the registration feature value includes, but is not limited to, an ONU registration MAC (Media Access Control) address, an SN (Series number), an LOID (Logical ONU Identifier), and a registration status; the service characteristic value includes, but is not limited to, LLID assigned to ONU in EPON Network, allocID assigned to ONU in GPON Network, ONU bearer service MAC address, ONU bearer service VLAN (Virtual Local Area Network).
The ONU historical characteristic information list under the PON port takes the PON port as a unit, records the ONU information of registration authentication based on the ONU registration identification, and records the ONU historical characteristic value in a certain period: the OLT updates the ONU historical characteristic value according to a certain strategy, and records the relevant characteristic value into a characteristic information list by taking the ONU relevant characteristic value as an index after the ONU is on line for the first time; and in the process of acquiring the ONU service characteristic value and recording the ONU service characteristic value into the characteristic value list, when the ONU service characteristic value changes, the changed value is recorded into the characteristic information list.
It is to be understood that with respect to certain periods mentioned above, including but not limited to, manual designation or configuration according to certain policies, etc. In addition, the ONU-related characteristic values mentioned above include, but are not limited to, the logical channel identifier assigned to the ONU by the OLT, and the ONU-related service characteristic values mentioned above include, but are not limited to, the logical channel identifier and the VLAN. In addition, the service characteristic value of the ONU mentioned above changes, including but not limited to adding a new configuration, changing a configuration, and the like.
For a new ONU, the ONU based on the ONU registration identifier may cause the ONU logical channel identifier to be re-established when the OLT is first on line or the configuration data is deleted on the OLT.
It is understood that the ONU registration identities mentioned above include, but are not limited to, MAC addresses, SNs, etc.
In addition, the root node also maintains a suspicious ONU record table and an interference ONU record table, and records the registration authentication information of the related ONU according to a certain strategy; and initializing the suspicious ONU record table and the interference ONU record table after the OLT is powered on.
It is understood that the registration authentication information about the ONU mentioned above includes, but is not limited to, ONU index, ONU registration information, and ONU service configuration information. The ONU registration information includes, but is not limited to, MAC, SN, LOID, etc. The ONU service configuration information includes, but is not limited to, explicitly or implicitly configured logical channel identification, service VLAN, etc.
In conjunction with fig. 2 and fig. 4 to 10, specifically, the ONU history characteristic information list mentioned in fig. 12 may correspond to the history characteristic information mentioned in fig. 4 to 10, and the characteristic value may correspond to the characteristic information.
Step S1020, the OLT maintains a first behavior feature threshold and a second behavior feature threshold of the corresponding ONU based on the PON port as a unit, and sets the ONU as the interfered ONU when the behavior feature of the ONU exceeds the first behavior feature threshold.
Specifically, the OLT in the xPON network maintains a first behavior characteristic threshold and a second behavior characteristic threshold of the corresponding ONU on a PON port basis. The first behavior feature threshold and the second behavior feature threshold are set according to the relevant parameters. Wherein, the first behavior feature threshold is a detection trigger threshold, and when the feature behavior exceeds the first behavior feature threshold, it is considered that a fault occurs, and the ONU is an interfered ONU, thereby executing step S1030. The second behavior feature threshold is a failure recovery threshold, and when the feature behavior is lower than the second behavior feature threshold, the failure is considered to be recovered.
It is understood that the related parameters include, but are not limited to, an absolute number of uplink and downlink for a specific reason in a certain period of the ONU, an absolute number of uplink errors in a certain period of the ONU, a change in the number of uplink and downlink for a specific reason based on historical statistics, and a change in the number of relative uplink errors based on historical statistics.
In addition, it can be understood that, regarding the above ONU characteristic behavior, it can be queried and counted on the OLT, specifically including but not limited to the number of times of uplink and downlink and the uplink error code.
In addition, it can be understood that the specific reason mentioned above refers to that, when the OLT-side ONU optical power index is normal, the ONU is removed from power-down, or is manually deactivated, and the ONU is turned on or off due to an uplink abnormality.
Note that, regarding the behavior characteristics described above, the behavior characteristics correspond to the communication quality parameters described above; the first behavior feature threshold and the second behavior feature threshold correspond to the first communication quality parameter requirement and the second communication quality parameter requirement, respectively.
And step S1030, the OLT sets a T1 timer and controls the interfered ONU to prohibit upstream light emission before T1 is overtime.
Specifically, the OLT in the xPON network sets a timer T1 for the specific interfered ONU, and prohibits the interfered ONU from emitting light upstream until T1 times out.
It is to be understood that with respect to disabling upstream illumination of an interfered ONU prior to a T1 timeout, including but not limited to, for an ONU in an EPON network, the OLT downstream direction turns off the ONU upstream laser for a specified time T1 via an extended OAM protocol or requires that the ONU remain quiet via an MPCP protocol: as for an ONU in a GPON network, the OLT downstream direction turns off the ONU upstream laser within a specified time T1 through PLOAM protocol.
Step S1040, the OLT continues authorization for the interfered ONU, detects an authorization window signal, judges whether data is received or not, and executes step S1050 when the data is received but cannot be analyzed; when the data is received and successfully parsed, step S1060 is executed; when no data is received, step S1090 is performed.
Specifically, the OLT in the xPON network continues to allocate an uplink timeslot grant window according to a certain DBA rule according to the logical channel identifier configured for the interfered ONU. The OLT detects whether uplink data exists in an uplink time slot authorization window corresponding to the interfered ONU; if T1 is not overtime, continuing to distribute an uplink time slot authorization window for the specified logic channel identifier according to a certain DBA rule, and continuing to detect until T1 is overtime.
It should be noted that, by continuously allocating bandwidth to the uplink logical channel identifier corresponding to the interfered ONU, the data on the PON port and the bandwidth allocation under the fault condition are not changed, so as to avoid false detection or false judgment caused by the change of the fault state.
When a signal is detected in the uplink timeslot grant window but the signal data cannot be analyzed, there may be an uplink logical channel interference problem, and the process goes to step S1050.
When a signal is detected in the uplink time slot authorization window and signal data can be effectively analyzed, if the problem of uplink logic channel interference exists, recording and comparing data acquired by multiple rounds of distribution authorization windows within T1 overtime, analyzing ONU characteristic values in the data, and recording all different characteristic values; and jumps to step S1060.
When no signal or data is detected in the uplink timeslot grant window and T1 times out, it is determined that there is no uplink logical channel interference problem, and the process goes to step S1090.
In addition, the DBA rule refers to that the bandwidth is allocated according to the configured bandwidth of each ONU under the PON port, or the bandwidth is allocated according to a fixed bandwidth, or the last bandwidth before the power of the interfered ONU is turned off is used to keep the authorization before the T1 timeout.
In addition, after the time-out of T1, the OLT turns on the upstream laser again for the interfered ONU, and authorizes it normally.
It is understood that the grant window during T1 corresponds to the second uplink timeslot.
And step S1050, retrieving the ONU historical characteristic values, and finding all the ONUs using the same logic channel identifier as the interfered ONUs to serve as suspicious ONUs.
Specifically, when a signal is detected in the uplink slot grant window, the data cannot be resolved. In the embodiment of the invention, all ONUs adopting the uplink logic channel identifiers of the interfered ONUs in the ONU historical characteristic information list under the PON port are classified as suspicious ONUs, and the suspicious ONUs are recorded into the suspicious ONU list.
Exemplarily, first, a logical channel identifier of the interfered ONU is obtained, and the logical channel identifier is set as an interfered logical channel identifier. If the interfered ONU has a plurality of logical channel identifications, the logical channel identifications are all set as the interfered logical channel identifications. And then, searching an ONU historical characteristic information list according to the interfered logical channel identifier as an index. And then, setting the ONU with the registration information different from the interfered ONU as the suspicious ONU, wherein all the logic channel identifications in the ONU historical characteristic information list are the same as the interfered logic channel identifications. And finally, listing all suspicious ONUs into a suspicious ONU list.
Step S1060, retrieving the current characteristic value of the ONU, and finding all ONUs using the same logical channel identifier as the interfered ONU, which is the suspicious ONU.
Specifically, when data is detected in the uplink time slot authorization window, the data can be effectively analyzed. The embodiment of the present invention may analyze the registration characteristic value or the service characteristic value in the uplink data. And searching ONU information in the ONU historical characteristic value list according to the registration characteristic value or the service characteristic value as an index, finding the recorded ONU which is currently using the information characteristic value and accords with the information characteristic value, and recording the recorded ONU into a suspicious ONU list. Or, comparing the information carried by the uplink message with an ONU historical characteristic value list maintained by the OLT, and if the list item with the consistent information exists, recording the ONU into a suspicious ONU list.
Illustratively, first, valid data is parsed from upstream data. Then, when the registration characteristic value or the service characteristic value analyzed from the valid data is the same as the registration characteristic value or the service characteristic value of the ONU currently configured by the OLT, setting the ONU as a suspicious ONU; and when the registration characteristic value analyzed from the valid data cannot be matched with the ONU data currently configured by the OLT, inquiring an ONU historical characteristic information list by taking the registration characteristic value or the service characteristic value as an index, finding a corresponding matching item, and setting the relevant ONU as a suspicious ONU. And finally, listing all suspicious ONUs into a suspicious ONU list.
And S1070, setting a T2 timer, closing the suspicious ONU, observing whether the fault of the interfered ONU disappears, and screening the interfered ONU from the suspicious ONU according to the fault condition of the interfered ONU.
Specifically, after T1 times out, the OLT opens the laser to the interfered ONU, that is, the interfered ONU may allocate normal authorization to its bandwidth according to the OLT, and complete the sending of the on-line and uplink data of the ONU. Meanwhile, a T2 timer is set according to a certain strategy, and suspicious ONUs in the suspicious ONU list are processed as follows:
if the suspicious ONU is in an unregistered state, after the suspicious ONU is registered, starting a timer T2, closing the upstream light emission of the suspicious ONU, and observing the state of the interfered ONU, wherein if the suspicious ONU is in a registered state or an upstream error code state, when a behavior characteristic value is smaller than a second behavior characteristic threshold value when the behavior characteristic value is overtime at T2, the fault is considered to disappear, the suspicious ONU is an interfering ONU, is removed from a suspicious ONU list, and is arranged in an interfering ONU list; otherwise, the suspicious ONU is unregistered again and is removed from the suspicious ONU list.
If the suspicious ONU is in the online registration state, starting a timer T2 aiming at the suspicious ONU, closing uplink luminescence of the suspicious ONU, and observing the state of the interfered ONU, if the suspicious ONU is in the online registration state or in the uplink error code condition, when the behavior characteristic value is less than a second behavior characteristic threshold value when the behavior characteristic value is overtime in T2, considering that the fault disappears, determining the suspicious ONU as the interfered ONU, removing the suspicious ONU from the suspicious ONU list and listing the suspicious ONU list in the interfered ONU list, otherwise, opening the uplink luminescence again for the suspicious ONU, authorizing normally, and removing the suspicious ONU from the suspicious ONU list.
If the state of the suspicious ONU is in an off-line state and the fault still exists after the polling processing of the suspicious ONU in the unregistered state and the registered on-line state is finished, removing the suspicious ONU in the off-line state from the suspicious ONU list and adding the suspicious ONU in the interference ONU list; otherwise, removing the suspicious ONU in the off-line state from the suspicious ONU list.
It is understood that the grant window during T2 corresponds to the first uplink timeslot.
And S1080, reporting the interference ONU in the interference ONU list to a fault processing platform, and troubleshooting.
Specifically, the root node in the embodiment of the present invention reports the interfering ONU in the interfering ONU list to a network management or other operation and maintenance platform through an alarm message or a notification message, carries information in an ONU history registration authentication information table at the PON port, and processes the information in combination with the user account information.
And step S1090 ends.
According to the technical scheme of the embodiment of the invention, the OLT can screen out the interference ONU causing interference to the interfered ONU from the plurality of ONUs, namely the abnormal ONU, solves the problem that the uplink logic channel of the ONU in the xPON network topology is occupied, and realizes the positioning of the abnormal ONU. In addition, the fault location detection method of the embodiment of the invention can solve the problem that the uplink logic channel of the ONU in the xPON network topology adopting the TDMA mechanism is occupied without depending on the cooperation with the ONU, and locates the abnormal ONU. In addition, the embodiment of the invention adopts a software mode to realize the dynamic monitoring of the problem that the uplink logic channel is occupied on the basis of the existing hardware, so that the method is simpler and more flexible, and has lower cost.
Based on the fault location detection method of the above embodiment, various embodiments of the root node, the communication system topology, and the computer-readable storage medium of the present invention are presented below.
In addition, an embodiment of the present invention provides a root node including: a memory, a processor, and a computer program stored on the memory and executable on the processor.
The processor and memory may be connected by a bus or other means.
It should be noted that the root node in this embodiment may be configured to include a memory and a processor as in the embodiment shown in fig. 3, and can form a part of the system architecture platform in the embodiment shown in fig. 3, and both are within the same inventive concept, so that both have the same implementation principle and beneficial effect, and will not be described in detail herein.
The non-transitory software programs and instructions required to implement the fault localization detection method of the above-described embodiment are stored in the memory, and when executed by the processor, perform the fault localization detection method of the above-described embodiment, for example, performing the above-described method steps S100 to S500 in fig. 4, method steps S610 to S640 in fig. 5, method steps S710 to S740 in fig. 6, method step S810 in fig. 7, method step S820 in fig. 8, method step S830 in fig. 9, method steps S910 to S920 in fig. 10, and method steps S1010 to S1090 in fig. 12.
It should be noted that, for the specific implementation and technical effect of the root node in the embodiment of the present invention, reference may be made to the specific implementation and technical effect of the fault location detection method in the foregoing embodiment.
Additionally, one embodiment of the present invention provides a communication system topology comprising a plurality of leaf nodes and a root node as described above, the root node communicating with the plurality of leaf nodes.
It should be noted that, for the specific implementation and technical effect of the root node in the embodiment of the present invention, reference may be made to the specific implementation and technical effect of the fault location detection method in the foregoing embodiment.
Furthermore, an embodiment of the present invention further provides a computer-readable storage medium, where the computer-readable storage medium stores computer-executable instructions, when the computer-executable instructions are used for executing the above-described fault location detection method, for example, the method steps S100 to S500 in fig. 4, the method steps S610 to S640 in fig. 5, the method steps S710 to S740 in fig. 6, the method step S810 in fig. 7, the method step S820 in fig. 8, the method step S830 in fig. 9, the method steps S910 to S920 in fig. 10, and the method steps S1010 to S1090 in fig. 12 are executed.
One of ordinary skill in the art will appreciate that all or some of the steps, systems, and methods disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as is well known to those of ordinary skill in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by a computer. In addition, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media as known to those skilled in the art.
While the preferred embodiments of the present invention have been described in detail, it will be understood by those skilled in the art that the foregoing and various other changes, omissions and deviations in the form and detail thereof may be made without departing from the scope of this invention.

Claims (11)

1. A fault location detection method for use in a root node in a communication system topology further comprising a plurality of leaf nodes in communication with the root node, the method comprising:
acquiring a first communication quality parameter of a target leaf node, wherein the target leaf node is one of a plurality of leaf nodes;
when the first communication quality parameter does not meet the requirement of a first preset communication quality parameter, acquiring historical characteristic information of a plurality of leaf nodes;
determining a first leaf node suspected of interfering the target leaf node in the plurality of leaf nodes according to the historical characteristic information;
controlling the first leaf node to stop uploading data in a first uplink time slot of the target leaf node, and acquiring a second communication quality parameter of the target leaf node in the first uplink time slot;
and when the second communication quality parameter meets a second preset communication quality parameter requirement, determining the first leaf node as a second leaf node interfering with the target leaf node.
2. The method of claim 1, wherein determining a first leaf node of the plurality of leaf nodes suspected of interfering with the target leaf node based on the historical profile information comprises:
controlling the target leaf node to stop uploading data in a second uplink time slot;
when uplink data are obtained in the second uplink time slot and cannot be analyzed, obtaining a logic channel identifier corresponding to the target leaf node;
determining a leaf node matched with the logical channel identifier as a first leaf node in the plurality of leaf nodes according to the logical channel identifier and the historical characteristic information, wherein the historical characteristic information comprises the logical channel identifiers of the plurality of leaf nodes;
and controlling the target leaf node to recover the uploaded data.
3. The method of claim 1, wherein determining a first leaf node of the plurality of leaf nodes that is suspected of interfering with the target leaf node based on the historical signature information comprises:
controlling the target leaf node to stop uploading data in a second uplink time slot;
when uplink data are acquired in the second uplink time slot and successfully analyzed, acquiring characteristic parameters obtained by analyzing the uplink data;
determining a leaf node matched with the feature parameter as a first leaf node in a plurality of leaf nodes according to the feature parameter and the historical feature information, wherein the historical feature information comprises the feature parameters of the plurality of leaf nodes;
and controlling the target leaf node to recover the uploaded data.
4. The method according to claim 2 or 3, wherein the first uplink timeslot and/or the second uplink timeslot are allocated according to a preset rule, wherein the preset rule includes one of a bandwidth allocation rule corresponding to a priority of the leaf node, a fixed bandwidth allocation rule, and a bandwidth allocation rule of a plurality of leaf nodes before the target leaf node stops uploading data.
5. The method of claim 1, wherein the controlling the first leaf node to stop uploading data during the first uplink time slot of the target leaf node comprises at least one of:
acquiring the current state of the first leaf node, and when the current state is an unregistered state, sending registration information to the first leaf node so that the first leaf node is switched from the unregistered state to a registered online state, and controlling the first leaf node to stop uploading data in a first uplink time slot of the target leaf node;
acquiring the current state of the first leaf node, and controlling the first leaf node to stop uploading data in a first uplink time slot of the target leaf node when the current state is a registered online state;
and acquiring the current state of the first leaf node, and controlling the first leaf node to stop uploading data in a first uplink time slot of the target leaf node when the current state is an offline state.
6. The method of claim 1, wherein after the determining that the first leaf node is a second leaf node that interferes with the target leaf node, the method further comprises:
acquiring characteristic parameters of the second leaf node;
and sending the characteristic parameters of the second leaf node to a fault processing platform.
7. The method of claim 1, wherein the communication quality parameter comprises at least one of:
the number of times of line ascending and descending in a preset period;
the number of uplink error codes in a preset period;
the change value of the number of times of going up and down the line in a preset period;
and the change value of the uplink error code number in a preset period.
8. The method according to claim 3 or 6, wherein the feature parameters comprise registration feature parameters and/or traffic feature parameters.
9. A root node, comprising: memory, processor and computer program stored on the memory and executable on the processor, the processor implementing the fault localization detection method according to any one of claims 1 to 8 when executing the computer program.
10. A communication system topology comprising a plurality of leaf nodes and the root node of claim 9, the root node in communication with a plurality of the leaf nodes.
11. A computer-readable storage medium having stored thereon computer-executable instructions for performing the fault location detection method of any one of claims 1 to 8.
CN202110685578.5A 2021-06-21 2021-06-21 Fault location detection method, root node, communication system topology and storage medium Pending CN115514626A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202110685578.5A CN115514626A (en) 2021-06-21 2021-06-21 Fault location detection method, root node, communication system topology and storage medium
PCT/CN2022/092745 WO2022267737A1 (en) 2021-06-21 2022-05-13 Fault positioning and detection method, root node, communication system topology and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110685578.5A CN115514626A (en) 2021-06-21 2021-06-21 Fault location detection method, root node, communication system topology and storage medium

Publications (1)

Publication Number Publication Date
CN115514626A true CN115514626A (en) 2022-12-23

Family

ID=84499717

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110685578.5A Pending CN115514626A (en) 2021-06-21 2021-06-21 Fault location detection method, root node, communication system topology and storage medium

Country Status (2)

Country Link
CN (1) CN115514626A (en)
WO (1) WO2022267737A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116017516A (en) * 2023-03-24 2023-04-25 广州世炬网络科技有限公司 Node connection configuration method and device based on link interference

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101132234A (en) * 2006-08-24 2008-02-27 上海贝尔阿尔卡特股份有限公司 Device and method for detecting time slot conflict between optical network units in optical network
EP2053763B1 (en) * 2007-10-26 2012-01-11 Nokia Siemens Networks Oy Method to diagnose an optical communication network
CN111107449B (en) * 2018-10-25 2022-09-02 中兴通讯股份有限公司 Method and device for positioning burst type long-luminous-interference ONU (optical network Unit)
CN112738660B (en) * 2019-10-28 2022-06-07 华为技术有限公司 Detection method, device and system of passive optical network

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116017516A (en) * 2023-03-24 2023-04-25 广州世炬网络科技有限公司 Node connection configuration method and device based on link interference

Also Published As

Publication number Publication date
WO2022267737A1 (en) 2022-12-29

Similar Documents

Publication Publication Date Title
US8254780B2 (en) Passive optical network system and fault determination method
CA2831337C (en) Method and apparatus for detecting optical network unit, and passive optical network system
US8554075B2 (en) Communication system, subscriber accommodating apparatus and communication method
KR100584383B1 (en) OPTICAL LINE TERMINALOLT FOR MANAGING LINK STATUS OF OPTOCAL NETWORK UNITSONUs AND GIGABIT ETHERNET PASSIVE OPTICAL NETWORKGE-PON APPLING THE SAME
EP2418871B1 (en) Method and apparatus for detecting rogue optical network unit in passive optical network
US20090010650A1 (en) Passive optical network system and communication method therefor
CN107294595B (en) Detection method and device for long-luminescence optical network unit and optical line terminal
JP2022505764A (en) Burst type continuous emission interference ONU positioning method and equipment
US9992561B2 (en) Method and apparatus for determining a rogue ONU in a PON
WO2013053248A1 (en) Method and apparatus for processing uplink data abnormity
KR101961053B1 (en) Method, device and system for detecting rogue optical network unit
CN115514626A (en) Fault location detection method, root node, communication system topology and storage medium
WO2016188196A1 (en) Method and device for detecting abnormal pon terminal
US10848261B1 (en) Systems and methods for identifying rogue optical network units in optical networks with wavelength-division multiplexing
CN111954101B (en) Method and device for detecting repeated ALLOC ID in GPON system
JP4891410B2 (en) Method and device for bandwidth allocation in a PON with different transmission rates that exist together
CN112953627A (en) Fault detection method, device, equipment and storage medium
WO2023029805A1 (en) Channel occupancy detection and protection method, optical line terminal, network and storage medium
KR100929132B1 (en) Apparatus and method for handling subscriber communication failure in passive optical network operated by L3 / L2 network
CN112218180B (en) Method, apparatus, storage medium, and program product for detecting status of optical fiber
CN108924674B (en) Optical network system and monitoring management method thereof
KR101586076B1 (en) System and method for recovering error in Passive Optical Network
JP6235644B2 (en) Subscriber line termination device, accommodation station device, and alarm transmission method
CN113438567A (en) Passive optical network system and data processing method thereof
CN117639934A (en) Node migration method, optical line terminal and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination