CN1798084A - Method for realizing feedthrough establishment of K words of ring net element of multiplexing segment - Google Patents

Method for realizing feedthrough establishment of K words of ring net element of multiplexing segment Download PDF

Info

Publication number
CN1798084A
CN1798084A CN 200410103472 CN200410103472A CN1798084A CN 1798084 A CN1798084 A CN 1798084A CN 200410103472 CN200410103472 CN 200410103472 CN 200410103472 A CN200410103472 A CN 200410103472A CN 1798084 A CN1798084 A CN 1798084A
Authority
CN
China
Prior art keywords
byte
break
lim
state
process module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200410103472
Other languages
Chinese (zh)
Other versions
CN100388707C (en
Inventor
肖新华
严明
卢超刚
张波
徐斌慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB2004101034726A priority Critical patent/CN100388707C/en
Publication of CN1798084A publication Critical patent/CN1798084A/en
Application granted granted Critical
Publication of CN100388707C publication Critical patent/CN100388707C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Maintenance And Management Of Digital Transmission (AREA)

Abstract

The method includes following steps: a) the interface module of net element circuit extracts the k-byte from the received bitstream signal; b) the circuit interface module makes pass-through analyses for the extracted k-by to decide if the k-byte conforms to the pass-through condition; if yes, allows the k-byte enter into the pass-through state; otherwise, keeps the k-byte in current state. The invention can shortens the time of building the k-byte pass-through in middle net element, and further more shortens the time of multiplex section protection switching.

Description

A kind of method that realizes that the break-through of ring net element of multiplexing segment K byte is set up
Technical field
The present invention relates to multiplex section looped network protection technology, particularly relate to a kind of method that realizes that the break-through of ring net element of multiplexing segment K byte is set up.
Background technology
As a kind of synchronizing network tranmission techniques, SDH (Synchronous Digital Hierarchy) (SDH) is by optical fiber/wavelength division multiplexing physical communication circuits such as (WDM), and coffret reliably is provided extensively, support that the exchange of speech on upper strata converges/and exchanges data network application such as converges.Multiplex section looped network protection in the SDH technology is a kind of safe and reliable and cost-effective SDH network technology; this technology not only can provide the passage of high speed quick and safe under normal situation; also can break down at network; when for example optical fiber is disconnected; provide the professional ability of from fault, recovering transmission automatically fast, i.e. the self-healing ability of network.More specifically; the multiplex section looped network protection is by the communication port performance monitoring of multiplex section and bridge joint protection control automatically; can be when working channels breaks down; business is switched to alternate channel from working channels; be shorter than the self-healing that realizes transmitting looped network in time of 50 milliseconds; thereby guaranteed that the upper layer network application apparatus can also keep continuous application when physical circuit loses efficacy, can not connect by interrupting service.Therefore, the multiplex section looped network protection has obtained using widely at present.
The multiplex section looped network protection is realized according to APS (APS) agreement, and the transmission of APS protocol information is to realize by K1 in the MSOH and K2 byte, the below unified K byte that abbreviates as.Multiplex section protective ring in the SDH technology mainly contains two kinds of structures: two-fibre two-way multi-section shared protection ring and Four-fiber MS shared protection ring.The principle of switching of two-fibre two-way multi-section shared protection ring and Four-fiber MS shared protection ring is similarly, and for for simplicity, this paper is that example describes with the more two-fibre two-way multi-section shared protection ring of present application only.
Network element on the multiplex section protective ring is commonly called node, and therefore, the network element in hereinafter describing is consistent with node.Only need two optical fiber between two adjacent nodes on the two-fibre two-way multi-section shared protection ring.Node state on the two-fibre two-way multi-section shared protection ring has three kinds: Idle state, switch attitude, break-through or straight-through attitude.All nodes all are in Idle state under the normal stable situation of whole multiplex section protective ring, promptly do not produce, detect or request of not break-through bridge joint or bridge joint requesting state information, at this moment only receive the K byte of not having request.Break down at certain section circuit on the multiplex section protective ring, ring protection switches under the situation about working, two nodes that link to each other with this segment fault circuit will be transformed into by Idle state and switch attitude, other node is that intermediate NE will be transformed into the break-through attitude by Idle state on the ring.Wherein, so-called break-through is exactly the action that sends the information identical with the information that is receiving on any assigned direction.
According to the APS turning protocol, the multiplex section protection exchanging process can be divided into roughly: the SF event detection and report, APS protocol processes, the break-through of intermediate NE K byte set up and professional break-through is set up, switched the calculating of bridging traffic and issue.According to APS agreement regulation, multiplex section protection exchanging has 50 milliseconds of strict switching time requirements.Wherein, the protection of multiplex section protective ring is switched the deadline and is meant to switch from decision and begins to finishing bridge joint and switching operation during this period of time at the switching node that starts the bridge joint request.Suppose that node n has fault to the optical-fibre channel of node 0,, then have the multiplex section protection exchanging time of n+1 network element (n≤15) to be expressed as if ignore the transmission time of signal in optical fiber:
Protection switch time=node 0 detect the SF incident to send the K byte time+time+intermediate NE that node n receipts minor axis K byte enters the break-through of K byte to the time+intermediate NE that sends major diameter K byte enters the time+node 0 of break-through K byte after the break-through of K byte, the time that n carries out switching operation at last.Wherein, intermediate NE time of entering the break-through of K byte also claims intermediate NE K byte break-through settling time.
From the composition of above-mentioned protection switch time as can be seen, because the break-through of intermediate NE K byte has cumulative effect settling time, intermediate NE is many more, and K byte break-through total on the multiplex section protective ring is just long more settling time, thereby switching time is also just long more.
In multiplex section protective ring, each network element realizes that the module of K byte break-through function mainly contains two: LIM and APS protocol process module.As shown in Figure 1, the APS protocol process module is mainly used in and carries out software processes, comprises whole APS protocol processes, and this module comprises the CPU processing unit and the system control panel of wiring board; LIM comprises other processing unit of wiring board, specifically comprises FPGA (Field Programmable Gate Array) processing unit, Service Processing Unit and UFIU UMSC Fiber Interface Unit, and whole LIM all adopts hardware to realize; Professional Cross module comprises professional cross board, is used for the scheduling of customer service signal.In a two-fibre two-way multi-section shared protection ring; the LIM of each network element all has both direction; be used to receive and handle line signal code stream from this direction; be that LIM comprises two line signal processing units at least; these two line signal processing units can be integrated in respectively on two wiring boards, also can all be integrated on the wiring board.All being integrated in respectively on two wiring boards with two line signal processing units below is that example describes.For simplicity, two wiring boards are called east orientation wiring board and west to wiring board.
Wherein, wiring board receives the signal that fibre circuit is sent here, this signal becomes the signal of telecommunication through UFIU UMSC Fiber Interface Unit, this signal of telecommunication is through Service Processing Unit, isolate the customer service signal and be used for the overhead signal that network control monitors usefulness, wherein the overhead signal K byte that comprises warning information, network management information and carry the APS protocol information.The customer service signal of separating is delivered to professional cross board carry out professional scheduling, the overhead signal of separating is delivered to other module that the FPGA (Field Programmable Gate Array) processing unit handles or supply with in the network element use.
In the multiplex section protection exchanging process of prior art, the K byte break-through of intermediate NE is set up and to be finished by the APS protocol process module, wherein east orientation and west to processing procedure be duplicate.With a direction of intermediate NE for example east orientation be treated to example, referring to Fig. 1 and Fig. 2, the prior art intermediate NE may further comprise the steps from Idle state to the break-through attitude with the processing procedure of setting up the break-through of K byte:
Step 201, LIM extract the K byte from the line signal code stream, report the APS protocol process module;
After step 202, APS protocol processes mould are certainly received the K byte, carry out the APS protocol processes;
Step 203, APS protocol process module issue K byte break-through order according to result to LIM after the K byte is handled;
Step 204, LIM are set up the two-way break-through of K byte after receiving the K byte break-through order that the APS protocol process module issues.
By such scheme as can be seen, the prior art scheme adopts the mode by the complete control and treatment APS agreement of APS protocol process module, therefore, need have high requirement to speed of system architecture and protocol processing software etc., otherwise just be difficult to reach 50 milliseconds protection switch time requirement of agreement regulation, and the APS protocol processes is fully by APS protocol process module control and treatment, and complicated APS protocol processes will reduce the speed that protection is switched; In addition, the information interaction in the processing procedure of APS agreement to the APS protocol process module, turns back to LIM by the APS protocol process module by LIM again, and link is more, will reduce the reliability that protection is switched.
Summary of the invention
In view of this, main purpose of the present invention is to provide a kind of method that realizes that the break-through of ring net element of multiplexing segment K byte is set up, and shortens K byte break-through settling time, and improves the reliability that protection is switched.
For achieving the above object, technical scheme of the present invention is achieved in that
The invention discloses a kind of method that realizes that the break-through of ring net element of multiplexing segment K byte is set up, this method may further comprise the steps:
A. the LIM of network element extracts the K byte from the line signal code stream of receiving;
B. LIM carries out the break-through analysis to the K byte of being extracted, and judges whether to meet K byte break-through condition, if meet, then enters the state that allows the break-through of K byte, otherwise keeps the whether state of break-through of current K byte.
Wherein, described LIM comprises at least two line signal processing units, described step B is: the first line signal processing unit that receives current line signal code stream in the LIM carries out the break-through analysis to the K byte of being extracted, the analysis result that whether meets K byte break-through condition is sent to the second line signal processing unit in the LIM, the second line signal processing unit judges that whether the analysis result of receiving is for meeting K byte break-through condition, if, then enter the state that allows the break-through of K byte, otherwise keep the whether state of break-through of current K byte.
Perhaps, described LIM comprises at least two line signal processing units, and described step B is: the first line signal processing unit that receives current line signal code stream in the LIM sends to the second line signal processing unit in the LIM with the K byte of being extracted; The second line signal processing unit carries out the break-through analysis after receiving the K byte, judges whether to meet K byte break-through condition, if meet, then enters the state that allows the break-through of K byte, otherwise keeps the whether state of break-through of current K byte.
In the such scheme, described K byte break-through condition be the K byte extracted whether be major diameter K byte with described K byte in the destination node address that comprises whether identical with the node address of this network element;
If the K byte of being extracted is that the destination node address that comprises in major diameter K byte and the K byte is identical with the node address of this network element, then meets K byte break-through condition, otherwise do not meet K byte break-through condition.
In the steps A, after described LIM extracts the K byte, further comprise: LIM reports the APS protocol process module of this network element with the K byte of being extracted, and is carried out the analyzing and processing of APS agreement by the APS protocol process module;
Among the step B, before described LIM is carried out the break-through analysis, may further include: judge whether whether permission LIM by the setting of APS protocol process module carries out that the break-through of K byte analyzes is permission, if do not allow, then LIM determines whether to enter the state that allows the break-through of K byte according to the APS protocal analysis result that the APS protocol process module issues; If allow, then LIM is carried out described break-through analysis.
Wherein, the described APS protocal analysis result who issues according to the APS protocol process module determines whether to enter and allows the state of K byte break-through to be: if analysis result should break-through for the K byte, then enter the state that allows the break-through of K byte; Should break-through if analysis result is the K byte, then do not enter the state that allows the break-through of K byte.After described APS protocol process module carries out the analyzing and processing of APS agreement, further comprise: the APS protocol process module determines whether to set up professional break-through according to the APS protocal analysis result of self.
Perhaps among the step B, after described LIM is carried out described break-through analysis, may further include: the analysis result whether LIM will enter K byte pass-through state reports the APS protocol process module of this network element, and the APS protocol process module determines whether to set up professional break-through according to this analysis result.
After carrying out described step B, further comprise:
Described LIM according to current whether be to allow the state of K byte break-through to carry out the K byte to select, if current state is the state that allows the break-through of K byte, then the K byte that current break-through is analyzed is converged and is entered in the service signal, sends to fibre circuit; If current state is not the state that allows the break-through of K byte, then the K byte of the APS protocol process module setting of this network element is converged and entered in the service signal, send to fibre circuit.
In addition, when the APS of this network element protocol process module analyzes the K byte break-through dismounting that need will set up, further comprise: send the break-through of K byte by the APS protocol process module to LIM and remove order, after LIM receives that order is removed in this K byte break-through, current K byte break-through of having set up is removed.
The method that realization K byte provided by the present invention break-through is set up; mainly be to handle, share the mode of handling a part of APS agreement by the APS agreement being carried out layering with LIM; save the information interaction between APS protocol process module and the LIM; shorten intermediate NE and set up the processing time of K byte break-through; thereby shorten the time of whole multiplex section protection exchanging; and reduce the dependence of break-through foundation, thereby improve the reliability that protection is switched to the processing links of APS protocol process module.Simultaneously, the present invention program has considered the compatibility with the prior art scheme, by the APS protocol processing software break-through of LIM K byte is set and sets up enabling of function, has improved the flexibility that realizes that the break-through of K byte is set up.
Description of drawings
Fig. 1 is that the structure of APS protocol processes part in the network element is formed schematic diagram;
Fig. 2 is the method flow diagram that the break-through of existing techniques in realizing K byte is set up;
Fig. 3 realizes the method flow diagram that the break-through of K byte is set up for the present invention;
Fig. 4 is the process flowchart of LIM to K byte in the line signal code stream;
Fig. 5 is that LIM is to the process flowchart to the plate expense.
Embodiment
For making the purpose, technical solutions and advantages of the present invention express clearlyer, the present invention is further described in more detail below in conjunction with drawings and the specific embodiments.
Main thought of the present invention is: will performed K byte break-through analyze in the APS protocol process module, and transfer in the LIM and realize.
As previously mentioned, LIM comprises two line signal processing units at least, and these two line signal processing units can be integrated in respectively on two wiring boards, also can all be integrated on the wiring board.All being integrated in respectively on two wiring boards with two line signal processing units below is that example describes, and with two wiring boards be called the east orientation LIM and the west to LIM, perhaps be called east orientation wiring board and west to wiring board, perhaps also can be called first wiring board and second wiring board, which can specifically not distinguished is first or second wiring board.
With a direction of intermediate NE for example the east orientation LIM be treated to example, wherein the east orientation LIM is exactly the east orientation wiring board among Fig. 1, its Chinese and Western is exactly that west among Fig. 1 is to wiring board to LIM.
Fig. 3 may further comprise the steps for the present invention realizes the method flow diagram that the break-through of K byte is set up:
Step 301, east orientation LIM extract the K byte from the line signal code stream of receiving.Wherein, LIM still need report the APS protocol process module with the K byte of extracting, to be carried out the analyzing and processing of APS agreement by the APS protocol process module when having new K byte to arrive.
Step 302, east orientation LIM carry out the break-through analysis to the K byte of extracting.
Step 303~305, judge whether to meet K byte break-through condition, if meet, then the break-through of K byte is set up to LIM in the notice west, if do not meet, then keeps the west to the current K byte of the LIM state of break-through whether.In this process, the east orientation LIM can be set up the break-through of K byte simultaneously, perhaps also can wait for the western K byte break-through of setting up again after LIM analyzes the result who whether sets up the break-through of K byte.Wherein, the break-through of the described K of foundation byte is that network element enters the state that allows the break-through of K byte.Usually, with the K byte whether the initial condition default setting of break-through for not allowing the state of K byte break-through.When for the first time carrying out said process, the current K byte whether state of break-through is exactly an initial condition, and the K byte afterwards whether state of break-through then is the last final result that flow process obtains of carrying out.
Before carrying out K byte break-through foundation, according to the APS agreement, the multiplexing segment status of node is necessary for Idle state.The Idle state of network element node is guaranteed by the APS agreement.In the present embodiment, when node is in Idle state, the APS protocol process module will be provided with " allowing the automatic break-through of K byte ", to guarantee that LIM carries out the break-through of K byte and analyzes.In addition, according to the APS agreement, K byte break-through condition can be understood as: when network element from a direction or simultaneously when both direction is received major diameter K byte, judge whether the entrained target network element node address of this major diameter K byte is identical with this network element node address, if identical, then this network element is a destination node, does not meet K byte break-through condition, if inequality, then meet K byte break-through condition.Belong to the network element of Multiplex Section Shared Protection Ring for each,, the unique node address of this network element loopful need be set in LIM in order to produce correct K byte.
Process is set up in the K byte break-through that describes each wiring board in the LIM in detail below.The flow chart that Fig. 4 handles the K byte of self submitting to from the signal that fibre circuit receives for this plate; Fig. 5 is the flow chart that plate expense handled of this plate to receiving.FPGA (Field Programmable Gate Array) processing unit in two wiring boards is execution graph 4 and processing procedure shown in Figure 5 simultaneously.
Wherein, described the plate expense is meant two each other to the bi-directional data signal between the wiring board of plate.Referring to Fig. 1, just each other to plate, just, if the west is considered as this plate to wiring board, then the east orientation wiring board is to plate just to wiring board for east orientation wiring board wherein and west; Conversely, if the east orientation wiring board is considered as this plate, then the west is to plate just to wiring board.For the east orientation wiring board, the expense that the west is sent here to wiring board is it to the plate expense; To wiring board, the expense that the east orientation wiring board is sent here is it to the plate expense for the west.
The present invention can adopt numerous embodiments to realize, wherein a kind of execution mode is: by the K byte of this plate of this plate analysis FPGA (Field Programmable Gate Array) processing unit extraction, then analysis result is inserted in the expense that is sent to plate and sends to, use for the plate break-through is set up to plate.In addition, the present invention also can adopt following execution mode: the break-through analysis is put into this plate equally carries out, promptly at first will be sent to this plate by mode to the K byte that the plate Service Processing Unit is sent to the plate expense, the K byte that this plate extracts is wherein carried out the break-through analysis, analysis result is directly supplied with the break-through of this plate set up use.The principle of above-mentioned two kinds of execution modes is the same, and its difference only is: the former break-through analysis and break-through are set up and are carried out on two wiring boards respectively, and latter's break-through analysis and break-through are based upon on the same wiring board to be carried out.Describe first kind of execution mode below in detail.
As shown in Figure 4, LIM may further comprise the steps the analyzing and processing process of the K byte from the line signal code stream:
Whether step 401, this plate allow automatic break-through field to extraction the plate expense to plate from what receive, to determine whether plate is allowed automatic break-through.
Step 402~403, judge whether to allow automatic break-through, if allow, then execution in step 504; Otherwise it is invalid that the state of " request is to the plate break-through " is set to, and execution in step 413 then.
In the present embodiment, in order to increase the reliability of agreement, the condition that allows automatic break-through is to satisfy this plate simultaneously to allow automatic break-through and plate is allowed two conditions of automatic break-through, as long as one of them does not satisfy, does not then allow automatic break-through.Wherein, whether this plate allows automatic break-through and whether plate is allowed automatic break-through is CPU processing unit in the APS protocol process module, analyzes for K byte break-through next time to set in advance when each node returns to Idle state.And be based upon the embodiment that same wiring board carried out for break-through analysis and break-through, then can will allow the condition setting of automatic break-through to allow automatic break-through to get final product for only satisfying this plate.
Step 404, from the line signal code stream that receives, extract K byte, executed in parallel step 405 and step 407 then.
Step 405~406, the K byte of being extracted is inserted in the expense that is sent to plate, and with software arrangements whether the automatic break-through of permission is inserted in the expense, execution in step 412 then.
Step 407~408, filter and verification, judge whether verification succeeds, if then execution in step 409; Otherwise direct execution in step 412.
Wherein, above-mentioned filtration and checking treatment all belong to avoids data because of transmitting or other reason causes that mistake causes the measure of adverse effect, be used to improve the reliability of agreement and network, to guarantee follow-up flow process effective K byte is carried out the break-through analysis, therefore, this step is not necessary for the present invention, and can adopt existing filtration and verifying method, does not repeat them here.
Step 409~411, the K byte is carried out the break-through analysis, judge whether to meet the break-through condition, if meet, then the state of " request is to the plate break-through " is set to effectively, otherwise execution in step 412.
Wherein, the break-through analysis to the K byte comprises: analyze whether the K byte is whether the destination node address of carrying in major diameter K byte and the K byte is this network element node address.If major diameter K byte and destination node address are not this network element node addresss, then meet the break-through condition, otherwise do not meet the break-through condition.
Step 412, maintenance laststate.Wherein keep laststate to be meant, if the result that finally is provided with of last flow process is that request is effective to the plate break-through, then keep request effective,, then keep request invalid the plate break-through if the result that finally is provided with of last flow process is that request is invalid to the plate break-through to the plate break-through.
Step 413, state information that will " request to the plate break-through " are inserted in the overhead signal that is sent to plate, send overhead signal to plate.
Wherein, the overhead signal here not only comprises the expenses such as K byte in the SDH signal, also is included as whether asking of realizing that each intra-node of the present invention program the uses information such as the whether automatic break-through of permission to plate break-through and the configuration of CPU processing unit.Wherein, the status indicator of " request is to the plate break-through " is that present embodiment is provided with plate for K byte break-through analysis result is sent to.
As shown in Figure 5, this plate may further comprise the steps the processing procedure from expense that plate is sent here:
Step 501, the plate expense is carried out coding check to what receive.
Wherein, coding check belongs to and avoids data because of transmitting or other reason causes that mistake causes the measure of adverse effect, is used to improve the reliability of agreement and network, therefore, this step is not necessary for the present invention, and can adopt existing coding check method, does not repeat them here.
Step 502, judge whether the break-through analytic function of LIM is under an embargo, if then execution in step 503; Otherwise execution in step 506.
This step is to consider the compatibility of the present invention and prior art processing scheme, and the K byte break-through analytic function that LIM is set is controlled by the APS protocol process module.For example, if by the APS protocol process module " this plate does not allow automatic break-through " and/or " plate is not allowed automatic break-through " is set, then the K byte break-through analytic function of LIM just has been under an embargo.If the K byte break-through analytic function of LIM is not under an embargo, such as " this plate allows automatic break-through " and " plate is allowed automatic break-through " is set, then the K byte break-through analytic function of LIM will work.
Step 503~505, judge that software forces break-through whether effective, if then directly enter the state that allows the break-through of K byte; Otherwise do not enter the state that allows the break-through of K byte.
In case the APS protocol process module has been forbidden the K byte break-through analytic function of LIM, the K byte break-through of LIM is analyzed and just can not have been carried out, and at this moment, the analyzing and processing of APS agreement is all undertaken by the APS protocol process module.For this reason, the present invention adopted the K byte that analyzes according to the APS protocol process module whether the result of break-through the control logic of " software pressure break-through " is set.Specifically, when the K of LIM byte break-through analytic function is under an embargo, if the APS protocol process module is effective according to analysis result setting " software pressure break-through ", then set up the break-through of K byte, if the APS protocol process module is invalid according to analysis result setting " software pressure break-through ", then do not enter the state that allows the break-through of K byte.
What step 506~508, basis were received judges whether to ask the break-through of this plate to the plate expense, if then enter the state that allows the break-through of K byte, otherwise keep current state.
Wherein, keep current state to be meant: if current state is to enter the state that allows the break-through of K byte, then remain and enter the state that allows the break-through of K byte, if current state is not for entering the state that allows the break-through of K byte, then remain the state that allows the break-through of K byte that do not enter.
Step 509~510, carry out the K byte according to current state and select, and selected K byte is loaded in the service signal sends.
Wherein, the K byte is selected to be specially: if current state is for entering the break-through of K byte, then will be converged in the service signal by Service Processing Unit the K byte sent here on the plate expense, and become light signal by UFIU UMSC Fiber Interface Unit again and send on the fibre circuit; If current state is not for entering the break-through of K byte, then the K byte of this plate protocol process module setting is converged in the service signal by Service Processing Unit, become light signal by UFIU UMSC Fiber Interface Unit again and send on the fibre circuit.
In fact, in the such scheme, if the K byte break-through analytic function of LIM is not under an embargo, the K byte break-through analytic function of LIM will work, at this moment, whether " software pressure break-through " effectively is actually not influence, because at this moment analyze the whether analysis of the break-through certain fast APS of mistake protocol process module on speed of K byte by LIM, should break-through if LIM analyzes the K byte, will enter the break-through of K byte immediately, both having made the APS protocol process module separate out the K byte through inborn ability after a while should break-through, " software pressure break-through " become effectively from invalid, but owing to entered the break-through of K byte, therefore to break-through without any influence.
If carrying out the break-through of K byte by LIM analyzes, for accelerating professional break-through, after LIM is carried out the break-through analysis, LIM can report the APS protocol process module with the analysis result that whether carries out the break-through of K byte, and the APS protocol process module determines whether to set up professional break-through according to this analysis result.Because present embodiment mainly is the mode of employing and prior art compatibility, the APS protocol process module still can be analyzed the K byte, determine whether to set up professional break-through according to analysis result then, therefore, to report the APS protocol process module be optional to the analysis result of LIM K byte break-through that self is obtained.
In a single day LIM has set up the break-through of K byte, will remain the break-through of K byte always, removes break-through up to the APS protocol process module according to the result of APS protocal analysis.When the network recovery normal condition, if the APS protocol process module of this network element analyzes the K byte break-through that needs to have set up and removes, such as needs business is got back to working channels by the alternate channel switching, by the APS protocol process module according to APS protocal analysis result, send the break-through of K byte to LIM and remove order, the control intermediate NE turns back to Idle state by the break-through attitude, and the break-through of K byte is set forbids, the K byte break-through of having set up is removed, and two-way simultaneous is removed.In addition, when intermediate NE became other attitude by the break-through attitude, the processing that the break-through of K byte is removed also was the same.In the present embodiment, can " this plate does not allow automatic break-through " and/or " plate is not allowed automatic break-through " be set by the APS protocol process module and remove the break-through of K byte.
Because main purpose of the present invention is to shorten the time of whole multiplex section protection exchanging; therefore; the inventive method only relates to the LIM processing that the K byte break-through from Idle state to the break-through attitude is set up to intermediate NE in the multiplex section protection exchanging; and do not relate to other process in the multiplex section protection exchanging; this is because whole APS protocol processes more complicated; and the saving in other process processing time and not obvious, so other process is handled more convenient flexible economy by the APS protocol process module.
In a word, the above only is preferred embodiment of the present invention, and is in order to restriction the present invention, within the spirit and principles in the present invention not all, any modification of being done, is equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1, a kind of method that realizes that the break-through of ring net element of multiplexing segment K byte is set up is characterized in that this method may further comprise the steps:
A. the LIM of network element extracts the K byte from the line signal code stream of receiving;
B. LIM carries out the break-through analysis to the K byte of being extracted, and judges whether to meet K byte break-through condition, if meet, then enters the state that allows the break-through of K byte, otherwise keeps the whether state of break-through of current K byte.
2, method according to claim 1, it is characterized in that, described LIM comprises at least two line signal processing units, described step B is: the first line signal processing unit that receives current line signal code stream in the LIM carries out the break-through analysis to the K byte of being extracted, the analysis result that whether meets K byte break-through condition is sent to the second line signal processing unit in the LIM, the second line signal processing unit judges that whether the analysis result of receiving is for meeting K byte break-through condition, if, then enter the state that allows the break-through of K byte, otherwise keep the whether state of break-through of current K byte.
3, method according to claim 1, it is characterized in that, described LIM comprises at least two line signal processing units, and described step B is: the first line signal processing unit that receives current line signal code stream in the LIM sends to the second line signal processing unit in the LIM with the K byte of being extracted; The second line signal processing unit carries out the break-through analysis after receiving the K byte, judges whether to meet K byte break-through condition, if meet, then enters the state that allows the break-through of K byte, otherwise keeps the whether state of break-through of current K byte.
4, according to claim 1,2 or 3 described methods, it is characterized in that, described K byte break-through condition be the K byte extracted whether be major diameter K byte with described K byte in the destination node address that comprises whether identical with the node address of this network element;
If the K byte of being extracted is that the destination node address that comprises in major diameter K byte and the K byte is identical with the node address of this network element, then meets K byte break-through condition, otherwise do not meet K byte break-through condition.
5, method according to claim 1, it is characterized in that, in the steps A, after described LIM extracts the K byte, further comprise: LIM reports the APS protocol process module of this network element with the K byte of being extracted, and is carried out the analyzing and processing of APS agreement by the APS protocol process module;
Among the step B, before described LIM is carried out the break-through analysis, further comprise: judge whether whether permission LIM by the setting of APS protocol process module carries out that the break-through of K byte analyzes is permission, if do not allow, then LIM determines whether to enter the state that allows the break-through of K byte according to the APS protocal analysis result that the APS protocol process module obtains; If allow, then LIM is carried out described break-through analysis.
6, method according to claim 5, it is characterized in that, the described APS protocal analysis result who issues according to the APS protocol process module determines whether to enter and allows the state of K byte break-through to be: if analysis result should break-through for the K byte, then enter the state that allows the break-through of K byte; Should break-through if analysis result is the K byte, then do not enter the state that allows the break-through of K byte.
7, method according to claim 5; it is characterized in that; after described APS protocol process module carries out the analyzing and processing of APS agreement, further comprise: the APS protocol process module determines whether to set up professional break-through according to the APS protocal analysis result of self.
8, method according to claim 1 or 5; it is characterized in that; among the step B; after described LIM is carried out described break-through analysis; further comprise: the analysis result whether LIM will enter K byte pass-through state reports the APS protocol process module of this network element, and the APS protocol process module determines whether to set up professional break-through according to this analysis result.
9, method according to claim 1 or 5 is characterized in that, after carrying out described step B, further comprises:
Described LIM according to current whether be to allow the state of K byte break-through to carry out the K byte to select, if current state is the state that allows the break-through of K byte, then the K byte that current break-through is analyzed is converged and is entered in the service signal, sends to fibre circuit; If current state is not the state that allows the break-through of K byte, then the K byte of the APS protocol process module setting of this network element is converged and entered in the service signal, send to fibre circuit.
10, method according to claim 1 or 5; it is characterized in that; when the APS protocol process module of this network element analyzes the K byte break-through dismounting that need will set up; further comprise: send the break-through of K byte by the APS protocol process module to LIM and remove order; after LIM receives that order is removed in this K byte break-through, current K byte break-through of having set up is removed.
CNB2004101034726A 2004-12-28 2004-12-28 Method for realizing feedthrough establishment of K words of ring net element of multiplexing segment Active CN100388707C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2004101034726A CN100388707C (en) 2004-12-28 2004-12-28 Method for realizing feedthrough establishment of K words of ring net element of multiplexing segment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2004101034726A CN100388707C (en) 2004-12-28 2004-12-28 Method for realizing feedthrough establishment of K words of ring net element of multiplexing segment

Publications (2)

Publication Number Publication Date
CN1798084A true CN1798084A (en) 2006-07-05
CN100388707C CN100388707C (en) 2008-05-14

Family

ID=36818870

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004101034726A Active CN100388707C (en) 2004-12-28 2004-12-28 Method for realizing feedthrough establishment of K words of ring net element of multiplexing segment

Country Status (1)

Country Link
CN (1) CN100388707C (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009155836A1 (en) * 2008-06-27 2009-12-30 华为技术有限公司 Method and apparatus for realizing interaction of optical channel data unit protection tangency rings
CN101854255A (en) * 2010-05-14 2010-10-06 中兴通讯股份有限公司 Method and system for protecting multiplex section in packet transport network

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2677244B2 (en) * 1995-05-10 1997-11-17 日本電気株式会社 Protection control signal transmission system
US6349092B1 (en) * 1998-11-16 2002-02-19 Cisco Systems, Inc. BLSR node extension
ITMI991277A1 (en) * 1999-06-09 2000-12-09 Cit Alcatel OPTIMIZATION OF K-BYTE INFORMATION MANAGEMENT IN SDH TRAME
CN1126331C (en) * 1999-11-04 2003-10-29 深圳市中兴通讯股份有限公司 Automatically protected switching method and device in high rate SDH loop
EP1461890B1 (en) * 2001-09-04 2008-12-17 Rumi Sheryar Gonda Method for supporting sdh/sonet aps on ethernet
CN100420223C (en) * 2003-02-26 2008-09-17 华为技术有限公司 A test method for multiplexing segment protection protocol

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009155836A1 (en) * 2008-06-27 2009-12-30 华为技术有限公司 Method and apparatus for realizing interaction of optical channel data unit protection tangency rings
CN101615966B (en) * 2008-06-27 2012-11-21 华为技术有限公司 Method and device for realizing interaction of protecting and cutting rings of optical channel data unit
US8805181B2 (en) 2008-06-27 2014-08-12 Huawei Technologies Co., Ltd. Method and device for realizing interaction of optical channel data unit protection tangent rings
CN101854255A (en) * 2010-05-14 2010-10-06 中兴通讯股份有限公司 Method and system for protecting multiplex section in packet transport network
WO2011140785A1 (en) * 2010-05-14 2011-11-17 中兴通讯股份有限公司 Multiplex section protection method and system in packet transport network
CN101854255B (en) * 2010-05-14 2014-03-12 中兴通讯股份有限公司 Method and system for protecting multiplex section in packet transport network

Also Published As

Publication number Publication date
CN100388707C (en) 2008-05-14

Similar Documents

Publication Publication Date Title
CN1070326C (en) Method for providing facility protection, cross-connector system and communication system
CN1099775C (en) Fault restoration control method and its apparatus in communication network
CN1295397A (en) Automatically protected switching method and device in high rate SDH loop
CN1744479A (en) Method of setting up a backup path in a transport network
CN1536819A (en) Method for implementing dual home in next network
CN1645840A (en) Fast rerouting of traffic in a circuit switched mesh network
CN1883157A (en) Method and apparatus for providing grades of service for unprotected traffic in an optical network
CN1859431A (en) Method for realizing two-way marked exchange path
CN1556637A (en) Method of proceeding failure recovery using shared spare passage in lattice shape network
CN1400781A (en) Network unit with redundant exchange matrix
CN1852071A (en) Data-communication net work system of optical network and its realizing method
CN1808926A (en) Method and apparatus of protective switching at both ends of non-framed 2M communication channel
CN1812360A (en) Intelligent optical network business re-routing trigging method
CN100338886C (en) Flashing method of non-service cut-off of light transmission of link network
CN1665174A (en) Apparatus for providing node protection in optical network and implementing method thereof
CN1684381A (en) Realizing method and device for optical path shared protection in wave division complex system
CN101345600B (en) Method and system for implementing sub-wavelength passage sharing protection by electronic crossing mode
CN1798084A (en) Method for realizing feedthrough establishment of K words of ring net element of multiplexing segment
CN1738213A (en) Method for preventing error connection
CN1149761C (en) Protection method based on business in optical network
CN101345590B (en) SNCP business collocation method
CN1808950A (en) Method of dynamic bandwidth adjustment for protection ring of multiplexed segment
CN1299459C (en) Channel sharing ring protection supported protection switching protocol implementing method
CN1753323A (en) Implementation method of protection exchanging in circular network
CN1369976A (en) Multifnctional light split/insersion multiplexer

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant