CN1798084A - Method for realizing feedthrough establishment of K words of ring net element of multiplexing segment - Google Patents
Method for realizing feedthrough establishment of K words of ring net element of multiplexing segment Download PDFInfo
- Publication number
- CN1798084A CN1798084A CN 200410103472 CN200410103472A CN1798084A CN 1798084 A CN1798084 A CN 1798084A CN 200410103472 CN200410103472 CN 200410103472 CN 200410103472 A CN200410103472 A CN 200410103472A CN 1798084 A CN1798084 A CN 1798084A
- Authority
- CN
- China
- Prior art keywords
- byte
- break
- lim
- state
- process module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Maintenance And Management Of Digital Transmission (AREA)
Abstract
The method includes following steps: a) the interface module of net element circuit extracts the k-byte from the received bitstream signal; b) the circuit interface module makes pass-through analyses for the extracted k-by to decide if the k-byte conforms to the pass-through condition; if yes, allows the k-byte enter into the pass-through state; otherwise, keeps the k-byte in current state. The invention can shortens the time of building the k-byte pass-through in middle net element, and further more shortens the time of multiplex section protection switching.
Description
Technical field
The present invention relates to multiplex section looped network protection technology, particularly relate to a kind of method that realizes that the break-through of ring net element of multiplexing segment K byte is set up.
Background technology
As a kind of synchronizing network tranmission techniques, SDH (Synchronous Digital Hierarchy) (SDH) is by optical fiber/wavelength division multiplexing physical communication circuits such as (WDM), and coffret reliably is provided extensively, support that the exchange of speech on upper strata converges/and exchanges data network application such as converges.Multiplex section looped network protection in the SDH technology is a kind of safe and reliable and cost-effective SDH network technology; this technology not only can provide the passage of high speed quick and safe under normal situation; also can break down at network; when for example optical fiber is disconnected; provide the professional ability of from fault, recovering transmission automatically fast, i.e. the self-healing ability of network.More specifically; the multiplex section looped network protection is by the communication port performance monitoring of multiplex section and bridge joint protection control automatically; can be when working channels breaks down; business is switched to alternate channel from working channels; be shorter than the self-healing that realizes transmitting looped network in time of 50 milliseconds; thereby guaranteed that the upper layer network application apparatus can also keep continuous application when physical circuit loses efficacy, can not connect by interrupting service.Therefore, the multiplex section looped network protection has obtained using widely at present.
The multiplex section looped network protection is realized according to APS (APS) agreement, and the transmission of APS protocol information is to realize by K1 in the MSOH and K2 byte, the below unified K byte that abbreviates as.Multiplex section protective ring in the SDH technology mainly contains two kinds of structures: two-fibre two-way multi-section shared protection ring and Four-fiber MS shared protection ring.The principle of switching of two-fibre two-way multi-section shared protection ring and Four-fiber MS shared protection ring is similarly, and for for simplicity, this paper is that example describes with the more two-fibre two-way multi-section shared protection ring of present application only.
Network element on the multiplex section protective ring is commonly called node, and therefore, the network element in hereinafter describing is consistent with node.Only need two optical fiber between two adjacent nodes on the two-fibre two-way multi-section shared protection ring.Node state on the two-fibre two-way multi-section shared protection ring has three kinds: Idle state, switch attitude, break-through or straight-through attitude.All nodes all are in Idle state under the normal stable situation of whole multiplex section protective ring, promptly do not produce, detect or request of not break-through bridge joint or bridge joint requesting state information, at this moment only receive the K byte of not having request.Break down at certain section circuit on the multiplex section protective ring, ring protection switches under the situation about working, two nodes that link to each other with this segment fault circuit will be transformed into by Idle state and switch attitude, other node is that intermediate NE will be transformed into the break-through attitude by Idle state on the ring.Wherein, so-called break-through is exactly the action that sends the information identical with the information that is receiving on any assigned direction.
According to the APS turning protocol, the multiplex section protection exchanging process can be divided into roughly: the SF event detection and report, APS protocol processes, the break-through of intermediate NE K byte set up and professional break-through is set up, switched the calculating of bridging traffic and issue.According to APS agreement regulation, multiplex section protection exchanging has 50 milliseconds of strict switching time requirements.Wherein, the protection of multiplex section protective ring is switched the deadline and is meant to switch from decision and begins to finishing bridge joint and switching operation during this period of time at the switching node that starts the bridge joint request.Suppose that node n has fault to the optical-fibre channel of node 0,, then have the multiplex section protection exchanging time of n+1 network element (n≤15) to be expressed as if ignore the transmission time of signal in optical fiber:
Protection switch time=node 0 detect the SF incident to send the K byte time+time+intermediate NE that node n receipts minor axis K byte enters the break-through of K byte to the time+intermediate NE that sends major diameter K byte enters the time+node 0 of break-through K byte after the break-through of K byte, the time that n carries out switching operation at last.Wherein, intermediate NE time of entering the break-through of K byte also claims intermediate NE K byte break-through settling time.
From the composition of above-mentioned protection switch time as can be seen, because the break-through of intermediate NE K byte has cumulative effect settling time, intermediate NE is many more, and K byte break-through total on the multiplex section protective ring is just long more settling time, thereby switching time is also just long more.
In multiplex section protective ring, each network element realizes that the module of K byte break-through function mainly contains two: LIM and APS protocol process module.As shown in Figure 1, the APS protocol process module is mainly used in and carries out software processes, comprises whole APS protocol processes, and this module comprises the CPU processing unit and the system control panel of wiring board; LIM comprises other processing unit of wiring board, specifically comprises FPGA (Field Programmable Gate Array) processing unit, Service Processing Unit and UFIU UMSC Fiber Interface Unit, and whole LIM all adopts hardware to realize; Professional Cross module comprises professional cross board, is used for the scheduling of customer service signal.In a two-fibre two-way multi-section shared protection ring; the LIM of each network element all has both direction; be used to receive and handle line signal code stream from this direction; be that LIM comprises two line signal processing units at least; these two line signal processing units can be integrated in respectively on two wiring boards, also can all be integrated on the wiring board.All being integrated in respectively on two wiring boards with two line signal processing units below is that example describes.For simplicity, two wiring boards are called east orientation wiring board and west to wiring board.
Wherein, wiring board receives the signal that fibre circuit is sent here, this signal becomes the signal of telecommunication through UFIU UMSC Fiber Interface Unit, this signal of telecommunication is through Service Processing Unit, isolate the customer service signal and be used for the overhead signal that network control monitors usefulness, wherein the overhead signal K byte that comprises warning information, network management information and carry the APS protocol information.The customer service signal of separating is delivered to professional cross board carry out professional scheduling, the overhead signal of separating is delivered to other module that the FPGA (Field Programmable Gate Array) processing unit handles or supply with in the network element use.
In the multiplex section protection exchanging process of prior art, the K byte break-through of intermediate NE is set up and to be finished by the APS protocol process module, wherein east orientation and west to processing procedure be duplicate.With a direction of intermediate NE for example east orientation be treated to example, referring to Fig. 1 and Fig. 2, the prior art intermediate NE may further comprise the steps from Idle state to the break-through attitude with the processing procedure of setting up the break-through of K byte:
After step 202, APS protocol processes mould are certainly received the K byte, carry out the APS protocol processes;
By such scheme as can be seen, the prior art scheme adopts the mode by the complete control and treatment APS agreement of APS protocol process module, therefore, need have high requirement to speed of system architecture and protocol processing software etc., otherwise just be difficult to reach 50 milliseconds protection switch time requirement of agreement regulation, and the APS protocol processes is fully by APS protocol process module control and treatment, and complicated APS protocol processes will reduce the speed that protection is switched; In addition, the information interaction in the processing procedure of APS agreement to the APS protocol process module, turns back to LIM by the APS protocol process module by LIM again, and link is more, will reduce the reliability that protection is switched.
Summary of the invention
In view of this, main purpose of the present invention is to provide a kind of method that realizes that the break-through of ring net element of multiplexing segment K byte is set up, and shortens K byte break-through settling time, and improves the reliability that protection is switched.
For achieving the above object, technical scheme of the present invention is achieved in that
The invention discloses a kind of method that realizes that the break-through of ring net element of multiplexing segment K byte is set up, this method may further comprise the steps:
A. the LIM of network element extracts the K byte from the line signal code stream of receiving;
B. LIM carries out the break-through analysis to the K byte of being extracted, and judges whether to meet K byte break-through condition, if meet, then enters the state that allows the break-through of K byte, otherwise keeps the whether state of break-through of current K byte.
Wherein, described LIM comprises at least two line signal processing units, described step B is: the first line signal processing unit that receives current line signal code stream in the LIM carries out the break-through analysis to the K byte of being extracted, the analysis result that whether meets K byte break-through condition is sent to the second line signal processing unit in the LIM, the second line signal processing unit judges that whether the analysis result of receiving is for meeting K byte break-through condition, if, then enter the state that allows the break-through of K byte, otherwise keep the whether state of break-through of current K byte.
Perhaps, described LIM comprises at least two line signal processing units, and described step B is: the first line signal processing unit that receives current line signal code stream in the LIM sends to the second line signal processing unit in the LIM with the K byte of being extracted; The second line signal processing unit carries out the break-through analysis after receiving the K byte, judges whether to meet K byte break-through condition, if meet, then enters the state that allows the break-through of K byte, otherwise keeps the whether state of break-through of current K byte.
In the such scheme, described K byte break-through condition be the K byte extracted whether be major diameter K byte with described K byte in the destination node address that comprises whether identical with the node address of this network element;
If the K byte of being extracted is that the destination node address that comprises in major diameter K byte and the K byte is identical with the node address of this network element, then meets K byte break-through condition, otherwise do not meet K byte break-through condition.
In the steps A, after described LIM extracts the K byte, further comprise: LIM reports the APS protocol process module of this network element with the K byte of being extracted, and is carried out the analyzing and processing of APS agreement by the APS protocol process module;
Among the step B, before described LIM is carried out the break-through analysis, may further include: judge whether whether permission LIM by the setting of APS protocol process module carries out that the break-through of K byte analyzes is permission, if do not allow, then LIM determines whether to enter the state that allows the break-through of K byte according to the APS protocal analysis result that the APS protocol process module issues; If allow, then LIM is carried out described break-through analysis.
Wherein, the described APS protocal analysis result who issues according to the APS protocol process module determines whether to enter and allows the state of K byte break-through to be: if analysis result should break-through for the K byte, then enter the state that allows the break-through of K byte; Should break-through if analysis result is the K byte, then do not enter the state that allows the break-through of K byte.After described APS protocol process module carries out the analyzing and processing of APS agreement, further comprise: the APS protocol process module determines whether to set up professional break-through according to the APS protocal analysis result of self.
Perhaps among the step B, after described LIM is carried out described break-through analysis, may further include: the analysis result whether LIM will enter K byte pass-through state reports the APS protocol process module of this network element, and the APS protocol process module determines whether to set up professional break-through according to this analysis result.
After carrying out described step B, further comprise:
Described LIM according to current whether be to allow the state of K byte break-through to carry out the K byte to select, if current state is the state that allows the break-through of K byte, then the K byte that current break-through is analyzed is converged and is entered in the service signal, sends to fibre circuit; If current state is not the state that allows the break-through of K byte, then the K byte of the APS protocol process module setting of this network element is converged and entered in the service signal, send to fibre circuit.
In addition, when the APS of this network element protocol process module analyzes the K byte break-through dismounting that need will set up, further comprise: send the break-through of K byte by the APS protocol process module to LIM and remove order, after LIM receives that order is removed in this K byte break-through, current K byte break-through of having set up is removed.
The method that realization K byte provided by the present invention break-through is set up; mainly be to handle, share the mode of handling a part of APS agreement by the APS agreement being carried out layering with LIM; save the information interaction between APS protocol process module and the LIM; shorten intermediate NE and set up the processing time of K byte break-through; thereby shorten the time of whole multiplex section protection exchanging; and reduce the dependence of break-through foundation, thereby improve the reliability that protection is switched to the processing links of APS protocol process module.Simultaneously, the present invention program has considered the compatibility with the prior art scheme, by the APS protocol processing software break-through of LIM K byte is set and sets up enabling of function, has improved the flexibility that realizes that the break-through of K byte is set up.
Description of drawings
Fig. 1 is that the structure of APS protocol processes part in the network element is formed schematic diagram;
Fig. 2 is the method flow diagram that the break-through of existing techniques in realizing K byte is set up;
Fig. 3 realizes the method flow diagram that the break-through of K byte is set up for the present invention;
Fig. 4 is the process flowchart of LIM to K byte in the line signal code stream;
Fig. 5 is that LIM is to the process flowchart to the plate expense.
Embodiment
For making the purpose, technical solutions and advantages of the present invention express clearlyer, the present invention is further described in more detail below in conjunction with drawings and the specific embodiments.
Main thought of the present invention is: will performed K byte break-through analyze in the APS protocol process module, and transfer in the LIM and realize.
As previously mentioned, LIM comprises two line signal processing units at least, and these two line signal processing units can be integrated in respectively on two wiring boards, also can all be integrated on the wiring board.All being integrated in respectively on two wiring boards with two line signal processing units below is that example describes, and with two wiring boards be called the east orientation LIM and the west to LIM, perhaps be called east orientation wiring board and west to wiring board, perhaps also can be called first wiring board and second wiring board, which can specifically not distinguished is first or second wiring board.
With a direction of intermediate NE for example the east orientation LIM be treated to example, wherein the east orientation LIM is exactly the east orientation wiring board among Fig. 1, its Chinese and Western is exactly that west among Fig. 1 is to wiring board to LIM.
Fig. 3 may further comprise the steps for the present invention realizes the method flow diagram that the break-through of K byte is set up:
Step 301, east orientation LIM extract the K byte from the line signal code stream of receiving.Wherein, LIM still need report the APS protocol process module with the K byte of extracting, to be carried out the analyzing and processing of APS agreement by the APS protocol process module when having new K byte to arrive.
Step 302, east orientation LIM carry out the break-through analysis to the K byte of extracting.
Step 303~305, judge whether to meet K byte break-through condition, if meet, then the break-through of K byte is set up to LIM in the notice west, if do not meet, then keeps the west to the current K byte of the LIM state of break-through whether.In this process, the east orientation LIM can be set up the break-through of K byte simultaneously, perhaps also can wait for the western K byte break-through of setting up again after LIM analyzes the result who whether sets up the break-through of K byte.Wherein, the break-through of the described K of foundation byte is that network element enters the state that allows the break-through of K byte.Usually, with the K byte whether the initial condition default setting of break-through for not allowing the state of K byte break-through.When for the first time carrying out said process, the current K byte whether state of break-through is exactly an initial condition, and the K byte afterwards whether state of break-through then is the last final result that flow process obtains of carrying out.
Before carrying out K byte break-through foundation, according to the APS agreement, the multiplexing segment status of node is necessary for Idle state.The Idle state of network element node is guaranteed by the APS agreement.In the present embodiment, when node is in Idle state, the APS protocol process module will be provided with " allowing the automatic break-through of K byte ", to guarantee that LIM carries out the break-through of K byte and analyzes.In addition, according to the APS agreement, K byte break-through condition can be understood as: when network element from a direction or simultaneously when both direction is received major diameter K byte, judge whether the entrained target network element node address of this major diameter K byte is identical with this network element node address, if identical, then this network element is a destination node, does not meet K byte break-through condition, if inequality, then meet K byte break-through condition.Belong to the network element of Multiplex Section Shared Protection Ring for each,, the unique node address of this network element loopful need be set in LIM in order to produce correct K byte.
Process is set up in the K byte break-through that describes each wiring board in the LIM in detail below.The flow chart that Fig. 4 handles the K byte of self submitting to from the signal that fibre circuit receives for this plate; Fig. 5 is the flow chart that plate expense handled of this plate to receiving.FPGA (Field Programmable Gate Array) processing unit in two wiring boards is execution graph 4 and processing procedure shown in Figure 5 simultaneously.
Wherein, described the plate expense is meant two each other to the bi-directional data signal between the wiring board of plate.Referring to Fig. 1, just each other to plate, just, if the west is considered as this plate to wiring board, then the east orientation wiring board is to plate just to wiring board for east orientation wiring board wherein and west; Conversely, if the east orientation wiring board is considered as this plate, then the west is to plate just to wiring board.For the east orientation wiring board, the expense that the west is sent here to wiring board is it to the plate expense; To wiring board, the expense that the east orientation wiring board is sent here is it to the plate expense for the west.
The present invention can adopt numerous embodiments to realize, wherein a kind of execution mode is: by the K byte of this plate of this plate analysis FPGA (Field Programmable Gate Array) processing unit extraction, then analysis result is inserted in the expense that is sent to plate and sends to, use for the plate break-through is set up to plate.In addition, the present invention also can adopt following execution mode: the break-through analysis is put into this plate equally carries out, promptly at first will be sent to this plate by mode to the K byte that the plate Service Processing Unit is sent to the plate expense, the K byte that this plate extracts is wherein carried out the break-through analysis, analysis result is directly supplied with the break-through of this plate set up use.The principle of above-mentioned two kinds of execution modes is the same, and its difference only is: the former break-through analysis and break-through are set up and are carried out on two wiring boards respectively, and latter's break-through analysis and break-through are based upon on the same wiring board to be carried out.Describe first kind of execution mode below in detail.
As shown in Figure 4, LIM may further comprise the steps the analyzing and processing process of the K byte from the line signal code stream:
Whether step 401, this plate allow automatic break-through field to extraction the plate expense to plate from what receive, to determine whether plate is allowed automatic break-through.
In the present embodiment, in order to increase the reliability of agreement, the condition that allows automatic break-through is to satisfy this plate simultaneously to allow automatic break-through and plate is allowed two conditions of automatic break-through, as long as one of them does not satisfy, does not then allow automatic break-through.Wherein, whether this plate allows automatic break-through and whether plate is allowed automatic break-through is CPU processing unit in the APS protocol process module, analyzes for K byte break-through next time to set in advance when each node returns to Idle state.And be based upon the embodiment that same wiring board carried out for break-through analysis and break-through, then can will allow the condition setting of automatic break-through to allow automatic break-through to get final product for only satisfying this plate.
Wherein, above-mentioned filtration and checking treatment all belong to avoids data because of transmitting or other reason causes that mistake causes the measure of adverse effect, be used to improve the reliability of agreement and network, to guarantee follow-up flow process effective K byte is carried out the break-through analysis, therefore, this step is not necessary for the present invention, and can adopt existing filtration and verifying method, does not repeat them here.
Wherein, the break-through analysis to the K byte comprises: analyze whether the K byte is whether the destination node address of carrying in major diameter K byte and the K byte is this network element node address.If major diameter K byte and destination node address are not this network element node addresss, then meet the break-through condition, otherwise do not meet the break-through condition.
Wherein, the overhead signal here not only comprises the expenses such as K byte in the SDH signal, also is included as whether asking of realizing that each intra-node of the present invention program the uses information such as the whether automatic break-through of permission to plate break-through and the configuration of CPU processing unit.Wherein, the status indicator of " request is to the plate break-through " is that present embodiment is provided with plate for K byte break-through analysis result is sent to.
As shown in Figure 5, this plate may further comprise the steps the processing procedure from expense that plate is sent here:
Wherein, coding check belongs to and avoids data because of transmitting or other reason causes that mistake causes the measure of adverse effect, is used to improve the reliability of agreement and network, therefore, this step is not necessary for the present invention, and can adopt existing coding check method, does not repeat them here.
This step is to consider the compatibility of the present invention and prior art processing scheme, and the K byte break-through analytic function that LIM is set is controlled by the APS protocol process module.For example, if by the APS protocol process module " this plate does not allow automatic break-through " and/or " plate is not allowed automatic break-through " is set, then the K byte break-through analytic function of LIM just has been under an embargo.If the K byte break-through analytic function of LIM is not under an embargo, such as " this plate allows automatic break-through " and " plate is allowed automatic break-through " is set, then the K byte break-through analytic function of LIM will work.
Step 503~505, judge that software forces break-through whether effective, if then directly enter the state that allows the break-through of K byte; Otherwise do not enter the state that allows the break-through of K byte.
In case the APS protocol process module has been forbidden the K byte break-through analytic function of LIM, the K byte break-through of LIM is analyzed and just can not have been carried out, and at this moment, the analyzing and processing of APS agreement is all undertaken by the APS protocol process module.For this reason, the present invention adopted the K byte that analyzes according to the APS protocol process module whether the result of break-through the control logic of " software pressure break-through " is set.Specifically, when the K of LIM byte break-through analytic function is under an embargo, if the APS protocol process module is effective according to analysis result setting " software pressure break-through ", then set up the break-through of K byte, if the APS protocol process module is invalid according to analysis result setting " software pressure break-through ", then do not enter the state that allows the break-through of K byte.
What step 506~508, basis were received judges whether to ask the break-through of this plate to the plate expense, if then enter the state that allows the break-through of K byte, otherwise keep current state.
Wherein, keep current state to be meant: if current state is to enter the state that allows the break-through of K byte, then remain and enter the state that allows the break-through of K byte, if current state is not for entering the state that allows the break-through of K byte, then remain the state that allows the break-through of K byte that do not enter.
Step 509~510, carry out the K byte according to current state and select, and selected K byte is loaded in the service signal sends.
Wherein, the K byte is selected to be specially: if current state is for entering the break-through of K byte, then will be converged in the service signal by Service Processing Unit the K byte sent here on the plate expense, and become light signal by UFIU UMSC Fiber Interface Unit again and send on the fibre circuit; If current state is not for entering the break-through of K byte, then the K byte of this plate protocol process module setting is converged in the service signal by Service Processing Unit, become light signal by UFIU UMSC Fiber Interface Unit again and send on the fibre circuit.
In fact, in the such scheme, if the K byte break-through analytic function of LIM is not under an embargo, the K byte break-through analytic function of LIM will work, at this moment, whether " software pressure break-through " effectively is actually not influence, because at this moment analyze the whether analysis of the break-through certain fast APS of mistake protocol process module on speed of K byte by LIM, should break-through if LIM analyzes the K byte, will enter the break-through of K byte immediately, both having made the APS protocol process module separate out the K byte through inborn ability after a while should break-through, " software pressure break-through " become effectively from invalid, but owing to entered the break-through of K byte, therefore to break-through without any influence.
If carrying out the break-through of K byte by LIM analyzes, for accelerating professional break-through, after LIM is carried out the break-through analysis, LIM can report the APS protocol process module with the analysis result that whether carries out the break-through of K byte, and the APS protocol process module determines whether to set up professional break-through according to this analysis result.Because present embodiment mainly is the mode of employing and prior art compatibility, the APS protocol process module still can be analyzed the K byte, determine whether to set up professional break-through according to analysis result then, therefore, to report the APS protocol process module be optional to the analysis result of LIM K byte break-through that self is obtained.
In a single day LIM has set up the break-through of K byte, will remain the break-through of K byte always, removes break-through up to the APS protocol process module according to the result of APS protocal analysis.When the network recovery normal condition, if the APS protocol process module of this network element analyzes the K byte break-through that needs to have set up and removes, such as needs business is got back to working channels by the alternate channel switching, by the APS protocol process module according to APS protocal analysis result, send the break-through of K byte to LIM and remove order, the control intermediate NE turns back to Idle state by the break-through attitude, and the break-through of K byte is set forbids, the K byte break-through of having set up is removed, and two-way simultaneous is removed.In addition, when intermediate NE became other attitude by the break-through attitude, the processing that the break-through of K byte is removed also was the same.In the present embodiment, can " this plate does not allow automatic break-through " and/or " plate is not allowed automatic break-through " be set by the APS protocol process module and remove the break-through of K byte.
Because main purpose of the present invention is to shorten the time of whole multiplex section protection exchanging; therefore; the inventive method only relates to the LIM processing that the K byte break-through from Idle state to the break-through attitude is set up to intermediate NE in the multiplex section protection exchanging; and do not relate to other process in the multiplex section protection exchanging; this is because whole APS protocol processes more complicated; and the saving in other process processing time and not obvious, so other process is handled more convenient flexible economy by the APS protocol process module.
In a word, the above only is preferred embodiment of the present invention, and is in order to restriction the present invention, within the spirit and principles in the present invention not all, any modification of being done, is equal to replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (10)
1, a kind of method that realizes that the break-through of ring net element of multiplexing segment K byte is set up is characterized in that this method may further comprise the steps:
A. the LIM of network element extracts the K byte from the line signal code stream of receiving;
B. LIM carries out the break-through analysis to the K byte of being extracted, and judges whether to meet K byte break-through condition, if meet, then enters the state that allows the break-through of K byte, otherwise keeps the whether state of break-through of current K byte.
2, method according to claim 1, it is characterized in that, described LIM comprises at least two line signal processing units, described step B is: the first line signal processing unit that receives current line signal code stream in the LIM carries out the break-through analysis to the K byte of being extracted, the analysis result that whether meets K byte break-through condition is sent to the second line signal processing unit in the LIM, the second line signal processing unit judges that whether the analysis result of receiving is for meeting K byte break-through condition, if, then enter the state that allows the break-through of K byte, otherwise keep the whether state of break-through of current K byte.
3, method according to claim 1, it is characterized in that, described LIM comprises at least two line signal processing units, and described step B is: the first line signal processing unit that receives current line signal code stream in the LIM sends to the second line signal processing unit in the LIM with the K byte of being extracted; The second line signal processing unit carries out the break-through analysis after receiving the K byte, judges whether to meet K byte break-through condition, if meet, then enters the state that allows the break-through of K byte, otherwise keeps the whether state of break-through of current K byte.
4, according to claim 1,2 or 3 described methods, it is characterized in that, described K byte break-through condition be the K byte extracted whether be major diameter K byte with described K byte in the destination node address that comprises whether identical with the node address of this network element;
If the K byte of being extracted is that the destination node address that comprises in major diameter K byte and the K byte is identical with the node address of this network element, then meets K byte break-through condition, otherwise do not meet K byte break-through condition.
5, method according to claim 1, it is characterized in that, in the steps A, after described LIM extracts the K byte, further comprise: LIM reports the APS protocol process module of this network element with the K byte of being extracted, and is carried out the analyzing and processing of APS agreement by the APS protocol process module;
Among the step B, before described LIM is carried out the break-through analysis, further comprise: judge whether whether permission LIM by the setting of APS protocol process module carries out that the break-through of K byte analyzes is permission, if do not allow, then LIM determines whether to enter the state that allows the break-through of K byte according to the APS protocal analysis result that the APS protocol process module obtains; If allow, then LIM is carried out described break-through analysis.
6, method according to claim 5, it is characterized in that, the described APS protocal analysis result who issues according to the APS protocol process module determines whether to enter and allows the state of K byte break-through to be: if analysis result should break-through for the K byte, then enter the state that allows the break-through of K byte; Should break-through if analysis result is the K byte, then do not enter the state that allows the break-through of K byte.
7, method according to claim 5; it is characterized in that; after described APS protocol process module carries out the analyzing and processing of APS agreement, further comprise: the APS protocol process module determines whether to set up professional break-through according to the APS protocal analysis result of self.
8, method according to claim 1 or 5; it is characterized in that; among the step B; after described LIM is carried out described break-through analysis; further comprise: the analysis result whether LIM will enter K byte pass-through state reports the APS protocol process module of this network element, and the APS protocol process module determines whether to set up professional break-through according to this analysis result.
9, method according to claim 1 or 5 is characterized in that, after carrying out described step B, further comprises:
Described LIM according to current whether be to allow the state of K byte break-through to carry out the K byte to select, if current state is the state that allows the break-through of K byte, then the K byte that current break-through is analyzed is converged and is entered in the service signal, sends to fibre circuit; If current state is not the state that allows the break-through of K byte, then the K byte of the APS protocol process module setting of this network element is converged and entered in the service signal, send to fibre circuit.
10, method according to claim 1 or 5; it is characterized in that; when the APS protocol process module of this network element analyzes the K byte break-through dismounting that need will set up; further comprise: send the break-through of K byte by the APS protocol process module to LIM and remove order; after LIM receives that order is removed in this K byte break-through, current K byte break-through of having set up is removed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2004101034726A CN100388707C (en) | 2004-12-28 | 2004-12-28 | Method for realizing feedthrough establishment of K words of ring net element of multiplexing segment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2004101034726A CN100388707C (en) | 2004-12-28 | 2004-12-28 | Method for realizing feedthrough establishment of K words of ring net element of multiplexing segment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1798084A true CN1798084A (en) | 2006-07-05 |
CN100388707C CN100388707C (en) | 2008-05-14 |
Family
ID=36818870
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2004101034726A Active CN100388707C (en) | 2004-12-28 | 2004-12-28 | Method for realizing feedthrough establishment of K words of ring net element of multiplexing segment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100388707C (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009155836A1 (en) * | 2008-06-27 | 2009-12-30 | 华为技术有限公司 | Method and apparatus for realizing interaction of optical channel data unit protection tangency rings |
CN101854255A (en) * | 2010-05-14 | 2010-10-06 | 中兴通讯股份有限公司 | Method and system for protecting multiplex section in packet transport network |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2677244B2 (en) * | 1995-05-10 | 1997-11-17 | 日本電気株式会社 | Protection control signal transmission system |
US6349092B1 (en) * | 1998-11-16 | 2002-02-19 | Cisco Systems, Inc. | BLSR node extension |
ITMI991277A1 (en) * | 1999-06-09 | 2000-12-09 | Cit Alcatel | OPTIMIZATION OF K-BYTE INFORMATION MANAGEMENT IN SDH TRAME |
CN1126331C (en) * | 1999-11-04 | 2003-10-29 | 深圳市中兴通讯股份有限公司 | Automatically protected switching method and device in high rate SDH loop |
EP1461890B1 (en) * | 2001-09-04 | 2008-12-17 | Rumi Sheryar Gonda | Method for supporting sdh/sonet aps on ethernet |
CN100420223C (en) * | 2003-02-26 | 2008-09-17 | 华为技术有限公司 | A test method for multiplexing segment protection protocol |
-
2004
- 2004-12-28 CN CNB2004101034726A patent/CN100388707C/en active Active
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009155836A1 (en) * | 2008-06-27 | 2009-12-30 | 华为技术有限公司 | Method and apparatus for realizing interaction of optical channel data unit protection tangency rings |
CN101615966B (en) * | 2008-06-27 | 2012-11-21 | 华为技术有限公司 | Method and device for realizing interaction of protecting and cutting rings of optical channel data unit |
US8805181B2 (en) | 2008-06-27 | 2014-08-12 | Huawei Technologies Co., Ltd. | Method and device for realizing interaction of optical channel data unit protection tangent rings |
CN101854255A (en) * | 2010-05-14 | 2010-10-06 | 中兴通讯股份有限公司 | Method and system for protecting multiplex section in packet transport network |
WO2011140785A1 (en) * | 2010-05-14 | 2011-11-17 | 中兴通讯股份有限公司 | Multiplex section protection method and system in packet transport network |
CN101854255B (en) * | 2010-05-14 | 2014-03-12 | 中兴通讯股份有限公司 | Method and system for protecting multiplex section in packet transport network |
Also Published As
Publication number | Publication date |
---|---|
CN100388707C (en) | 2008-05-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1070326C (en) | Method for providing facility protection, cross-connector system and communication system | |
CN1099775C (en) | Fault restoration control method and its apparatus in communication network | |
CN1295397A (en) | Automatically protected switching method and device in high rate SDH loop | |
CN1744479A (en) | Method of setting up a backup path in a transport network | |
CN1536819A (en) | Method for implementing dual home in next network | |
CN1645840A (en) | Fast rerouting of traffic in a circuit switched mesh network | |
CN1883157A (en) | Method and apparatus for providing grades of service for unprotected traffic in an optical network | |
CN1859431A (en) | Method for realizing two-way marked exchange path | |
CN1556637A (en) | Method of proceeding failure recovery using shared spare passage in lattice shape network | |
CN1400781A (en) | Network unit with redundant exchange matrix | |
CN1852071A (en) | Data-communication net work system of optical network and its realizing method | |
CN1808926A (en) | Method and apparatus of protective switching at both ends of non-framed 2M communication channel | |
CN1812360A (en) | Intelligent optical network business re-routing trigging method | |
CN100338886C (en) | Flashing method of non-service cut-off of light transmission of link network | |
CN1665174A (en) | Apparatus for providing node protection in optical network and implementing method thereof | |
CN1684381A (en) | Realizing method and device for optical path shared protection in wave division complex system | |
CN101345600B (en) | Method and system for implementing sub-wavelength passage sharing protection by electronic crossing mode | |
CN1798084A (en) | Method for realizing feedthrough establishment of K words of ring net element of multiplexing segment | |
CN1738213A (en) | Method for preventing error connection | |
CN1149761C (en) | Protection method based on business in optical network | |
CN101345590B (en) | SNCP business collocation method | |
CN1808950A (en) | Method of dynamic bandwidth adjustment for protection ring of multiplexed segment | |
CN1299459C (en) | Channel sharing ring protection supported protection switching protocol implementing method | |
CN1753323A (en) | Implementation method of protection exchanging in circular network | |
CN1369976A (en) | Multifnctional light split/insersion multiplexer |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |