WO2018214743A1 - Code error detection method and device for bit block stream - Google Patents
Code error detection method and device for bit block stream Download PDFInfo
- Publication number
- WO2018214743A1 WO2018214743A1 PCT/CN2018/086326 CN2018086326W WO2018214743A1 WO 2018214743 A1 WO2018214743 A1 WO 2018214743A1 CN 2018086326 W CN2018086326 W CN 2018086326W WO 2018214743 A1 WO2018214743 A1 WO 2018214743A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- bit
- result
- block
- parity
- bit block
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
Definitions
- the present application relates to the field of communications technologies, and in particular, to a bit block stream error detection method and device.
- Ethernet packet FCS check error when a Bit error is made, the BER of 1*e-5 is evaluated, and at least 100,000 Ethernet packets need to be continuously sent and received and detected. Assuming that the user service bandwidth is 10 Mbps, full traffic is sent, and the Ethernet packet length is 256 B, the detection time is at least 22.08 seconds. If the user service bandwidth is only 100Kbps and the Ethernet packet length is 256B, the detection time is at least 36.8 minutes (2208 seconds).
- the FCS occupies 4 bytes, so the above method still has the problem of occupying more fixed frame bytes, and the bearer efficiency is lower.
- the CRC-32 check is introduced.
- the bearer efficiency is reduced by 6.25%.
- the maximum packet is 1518B, the bearer efficiency is reduced by 0.263%.
- bit error detection method based on bit interleaving parity (BIP) per frame, for example, in Synchronous Digital Hierarchy (SDH), an optical transport network (Optical Transport Network)
- SDH Synchronous Digital Hierarchy
- Optical Transport Network optical transport network
- This method bears the efficiency rigidity and cannot dynamically define the check algorithm according to user requirements, such as BIP-8 downgrading to BIP-4, or upgrading to BIP. -16.
- X-Ethernet is a Bit Block switching technology based on the Ethernet physical layer, such as 64/66 Bit Block, which has the technical characteristics of deterministic ultra-low latency.
- the X-Ethernet is based on the M/N Bit block exchange.
- the error detection method can be used to perform error detection. For example, the following two methods can be used:
- Method 1 Borrowing a method based on PACKET for CRC detection, X-E arranges several Bits to perform CRC check on a block by block, for example, a 66Bit Block, which can set 4 or 8 Bits to perform CRC check on other 60 or 56 Bits.
- Method 2 Borrow SDH/OTN mode, arrange one byte or several Bits to implement BIP check by block, such as a 66Bit Block, you can set 2-8 Bits to perform BIP check on other 62-56 Bits.
- each block performs BIP-4/CRC-4 check, the bearer efficiency will decrease by 6.25%, and each block will be BIP-8/CRC-8, and the carrying efficiency will decrease. 12.5%.
- the embodiment of the present invention provides a bit block stream error detection method and device, which are used to solve the problem that the error detection method in the M/N Bit block exchange scenario is difficult to implement and has low bearer efficiency.
- a bit block stream error detection method includes: transmitting a first boundary bit block, where a first boundary bit block is used to distinguish N pieces of subsequent transmission, N is a positive integer; and transmitting a first bit block in sequence I is an integer greater than or equal to 1 and less than or equal to N; determining a first parity result and a second parity result, the check object of the first parity result including consecutive bits of each of the N bit blocks m bits, the parity object of the second parity result includes consecutive n bits of each of the N bit blocks, at least one of m and n being greater than or equal to 2; transmitting the second boundary bit block, A parity result and a second parity block are used to distinguish N bits that have been transmitted.
- the method provided by the embodiment of the present application can completely implement the error or error detection of the M/N Bit Block network path, does not affect the user service, and has a bearer efficiency of 100%, and can be inserted or deleted due to the synchronization problem during the transmission process.
- the bit block, and the detection period (ie, the number of bit blocks between the two boundary bit blocks) and the detection accuracy (ie, the preset algorithm) are dynamically configurable as needed.
- the detection method can not only verify that the path of the bit fast stream is an end-to-end path, but also can use the path of the verified bit fast stream as a non-end-to-end path. Therefore, the method provided by the embodiment of the present application can solve the problem that the error detection method in the M/N Bit block exchange scenario is difficult to implement and has low bearer efficiency.
- the execution body of the above method may be a bit block transmitting end.
- the path of the verified bit fast stream is from the bit block transmitting end to the bit block receiving end
- the path of the verified bit fast stream is an end-to-end path.
- the path of the verified bit fast stream is any intermediate device from the bit block transmitting end to the bit block receiving end
- the path of the verified bit fast stream is a path that is suspended at one end. This application is collectively referred to as a transmitting device.
- the embodiment of the present application can be used not only for error detection of an end-to-end path, but also for error detection of a non-end-to-end path, for example, a planned reserved path, and a protection path of a 1:1 connection protection group. Or have other special purpose paths.
- the path of the verified bit fast stream is the second intermediate device from the first intermediate device after the bit block transmitting end to the bit block receiving end
- the execution body of the above method may be the first intermediate device.
- the path of the bit fast stream being verified is a path that is suspended at both ends.
- the type of each bit block is an M1/M2 bit block, where M1 represents the number of payload bits in each bit block, and M2 represents the total number of bits per bit block, M2-M1 Represents the number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
- the sending the first boundary bit block includes: sending the first boundary bit block to the first device; and sequentially transmitting the first bit block, including: sequentially transmitting the first bit block to the first device;
- the two boundary bit block, the first parity result, and the second parity result may include two cases: (1) transmitting the second boundary bit block, the first parity result, and the second parity result to the first a device; therefore, in the above implementation, the first parity result and the second parity result are sent to the first device together with the N bit blocks between the two boundary bit blocks and the two boundary bit blocks, when When the path of the verified bit fast stream is from the bit block transmitting end to the bit block receiving end, the first device here may be the bit block receiving end, and when the verified bit fast stream path is the bit block transmitting end When going to any intermediate device before the bit block receiving end, or when the path of the verified bit fast stream is the second intermediate device from the first intermediate device after the bit block transmitting end to the bit block receiving end, here the first A device can also be an intermediate device
- the second device herein may be an SDN controller or any device having a function of determining a bit stream transmission error.
- the two methods can also be used at the same time, that is, the first parity result and the second parity result are sent to both the first device and the second device. Therefore, the embodiments of the present application provide two optional ways to implement error detection, which is more flexible and efficient, and is simple to implement.
- the second boundary bit block, the first parity result, and the second parity result are sent, and the following possible implementation manners are: sending the second boundary bit block at the first moment, in the first
- the first parity result and the second parity result are sent at two moments, wherein the first moment is earlier than the second moment, or the first moment is later than the second moment, and the first moment is equal to the second moment.
- the first parity result and the second parity result are stored in a second boundary bit block.
- each N bit block in the bit block stream is a group
- the i-th boundary bit block stores the first parity result and the second parity result corresponding to the i-th N-bit block
- i +1 boundary bit block stores a first parity result and a second parity result corresponding to the i+1th group of N bit blocks
- the i+1th group of N bit blocks is the ith boundary bit block
- a bit block between the i+1th boundary bit block and i is a positive integer.
- the boundary bit block mentioned in this application may be a newly inserted bit block, and a new bit block may be deleted, and a first bit block may be deleted to reduce the impact on user bandwidth.
- the first bit block refers to a bit block in which N bit blocks may be inserted or deleted from N bit blocks during transmission of N bit blocks. For example, for a 64/66 bit block stream, the first block of bits may refer to a free block.
- the first parity result and the second parity result are calculated according to a preset check algorithm, and the preset check algorithm is used to increase or decrease the first time in the N bit blocks.
- the first parity block does not change the first parity result and the second parity result
- the first bit block refers to a bit that may be inserted into or deleted from the N bit blocks during transmission of the N bit blocks.
- the preset check algorithm provided by the embodiment of the present application can ensure that the first parity result and the second parity result can tolerate insertion or deletion of one or more first bit blocks (such as IDLE Block) during transmission. And when the first bit block has a bit error, it can also be detected.
- the preset check algorithm is the xBIP-y algorithm, where x is the number of bits of consecutive bit interleaving, x is determined according to the definition of the pattern of the first bit block, and y is the monitoring area.
- the number of segments, x, y is a positive integer, y ⁇ 2, for example, 8BIP-8 algorithm, 16BIP-4 algorithm.
- the specific method of determining the first parity result and the second parity result by using the xBIP-y algorithm is: starting from the first payload bit of the N bit blocks, sequentially recording every x consecutive bits of each bit block.
- the xBIP-y algorithm provided by the embodiment of the present application can tolerate insertion or deletion of one or more first bit blocks during transmission, and the method is simple.
- the preset verification algorithm is the flexBIP-z algorithm, where z refers to the number of monitoring segments, and the number of consecutive bit interleaving bits corresponding to each monitoring segment is not the same, z monitoring
- the number of consecutive bit interleaving corresponding to the segments is A1, A2, A 3 ... Az-1, Az, A1, A2, A 3 ...
- the specific method of determining the first parity result and the second parity result by the flexBIP-z algorithm is: starting from the first payload bit of the N bit blocks, recording the A1 consecutive bits in each bit block to the first One monitoring segment records A2 consecutive bits after A1 consecutive bits to the second monitoring segment, and records A3 consecutive bits after A2 consecutive bits to the third monitoring segment until Az- Az consecutive bits after 1 consecutive bits are recorded to the zth monitoring segment; an odd parity or even parity is used for each monitoring segment to determine a 1-bit monitoring code, and a z-bit monitoring code is obtained, and the z-bit monitoring code is obtained.
- a first parity result and a second parity result are included. Therefore, the flexBIP-z algorithm provided by the embodiment of the present application can more flexibly and succinctly determine the first parity result and the second parity result, and tolerate insertion or deletion of one or more first bit blocks during transmission.
- determining the first parity result and the second parity result includes: determining a first verification result set, the first verification result set includes a y-bit monitoring code, or, the first school The result set includes a z-bit monitoring code; transmitting the first parity result and the second parity result, comprising: transmitting the first verification result set. Therefore, the error or error detection of the M/N Bit Block network path can be completely implemented by using the method provided by the embodiment of the present application.
- a bit block stream error detection method includes: receiving a first boundary bit block, where a first boundary bit block is used to distinguish T bits that are subsequently received, T is a positive integer; and receiving a first bit block in sequence I is an integer greater than or equal to 1 and less than or equal to T; receiving a second boundary bit block for distinguishing T bits that have been received; determining a third parity result and a fourth parity result
- the check object of the third parity result includes consecutive m bits of each of the T bit blocks, and the check object of the second parity result includes consecutive bits of each of the T bit blocks At least one of m bits, m, n is greater than or equal to 2; when receiving the first parity result and the second parity result, according to the first parity result and the third parity result, and Determining, by the second parity result and the fourth parity result, whether there is an error in the T bit blocks, wherein the check object of the first parity result includes consecutive m of each of the N bit blocks Bit, second par
- the method provided by the embodiment of the present application can completely implement the error or error detection of the M/N Bit Block network path, does not affect the user service, and has a bearer efficiency of 100%, and can be inserted or deleted due to the synchronization problem during the transmission process.
- the bit block, and the detection period (ie, the number of bit blocks between the two boundary bit blocks) and the detection accuracy (ie, the preset algorithm) are dynamically configurable as needed.
- the detection method can not only verify that the path of the bit fast stream is an end-to-end path, but also can use the path of the verified bit fast stream as a non-end-to-end path. Therefore, the method provided by the embodiment of the present application can solve the problem that the error detection method in the M/N Bit block exchange scenario is difficult to implement and has low bearer efficiency.
- the execution body of each step in FIG. 13 may be the bit block receiving end, when the checked bit is fast
- the path of the stream is any intermediate device from the transmitting end of the bit block to the receiving end of the bit block, or the execution body of the above method when the path of the bit stream to be verified is from the transmitting end of the bit block to the receiving end of the bit block Can be an intermediate device.
- This application is collectively referred to as a receiving device.
- the N bit blocks are the bit blocks between the first boundary bit block and the second boundary bit block when the first parity result and the second parity result are determined by the transmitting device.
- the sending device sends the first boundary bit block, sequentially transmitting N bit blocks, and then calculating the first parity result and the second parity result according to the N bit blocks, The two results are stored in a second boundary bit block, and the second boundary bit block is transmitted.
- the first bit block may be inserted or deleted in the N bit blocks, and the receiving device sequentially receives the first boundary bit block after receiving the first bit block.
- T bit blocks, where N T, or N>T (ie, inserting the first bit block in N bit blocks), or N ⁇ T (ie, deleting the first bit block in N bit blocks) )three situations.
- the method further includes: sending the third parity result and the fourth parity result to the second device when the first parity result and the second parity result are not received,
- the second device stores the first parity result and the second parity result.
- the second device herein may be an SDN controller or any device having a function of determining a bit stream transmission error.
- the third parity result and the fourth parity result may also be transmitted to the second device.
- the second device may receive the first parity result and the second parity result sent by the sending device, and the third parity result and the fourth parity result sent by the receiving device, and the second device according to the two
- the group result determines if there is a bit error during the transmission of the bit block stream. Therefore, the embodiment of the present application provides error detection by using a third-party device, such as an SDN controller, or any device having a function of determining a bit stream transmission error, which is more flexible and efficient, and is simple to implement.
- the type of each bit block is an M1/M2 bit block, where M1 represents the number of payload bits in each bit block, and M2 represents the total number of bits per bit block, M2-M1 Represents the number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
- receiving the second boundary bit block includes: receiving the second boundary bit block at the first time;
- Receiving the first parity result and the second parity result comprising: receiving the first parity result and the second parity result at a second time, wherein the first time is earlier than the second time, or the first The moment is later than the second moment, the first moment being equal to the second moment.
- the first parity result and the second parity result are stored in a second boundary bit block.
- the third parity result and the fourth parity result are calculated according to a preset check algorithm, and the preset check algorithm is used to increase or decrease the first time in the T bit blocks.
- the third parity result and the fourth parity result are not changed in the bit block, and the first bit block refers to a bit that may be inserted into or deleted from the T bit blocks during transmission of the T bit blocks. Piece. Therefore, the preset check algorithm provided by the embodiment of the present application can ensure that the first parity result and the second parity result can tolerate insertion or deletion of one or more first bit blocks (such as IDLE Block) during transmission. And when the first bit block has a bit error, it can also be detected.
- the receiving device determines a preset algorithm used by the third parity result and the fourth parity result, and a preset algorithm used by the transmitting device to determine the first parity result and the second parity result. The same, the repetition will not be repeated.
- the preset check algorithm is the xBIP-y algorithm, where x is the number of bits of consecutive bit interleaving, x is determined according to the definition of the pattern of the first bit block, and y is the monitoring area.
- the number of segments, x, y is a positive integer, y ⁇ 2;
- Determining the third parity result and the fourth parity result comprising: sequentially recording every x consecutive bits of each bit block to the first monitoring area, starting from the first payload bit of the T bit blocks Segment to yth monitoring section; determining a 1-bit monitoring code using odd or even parity for each monitoring section, obtaining a y-bit monitoring code, the y-bit monitoring code including a third parity result and a fourth Parity result. Therefore, the xBIP-y algorithm provided by the embodiment of the present application can tolerate insertion or deletion of one or more first bit blocks during transmission, and the method is simple.
- the preset verification algorithm is the flexBIP-z algorithm, where z refers to the number of monitoring segments, and the number of consecutive bit interleaving bits corresponding to each monitoring segment is not the same, z monitoring
- the number of consecutive bit interleaving corresponding to the segments is A1, A2, A 3 ... Az-1, Az, A1, A2, A 3 ... Az-1, Az, z are positive integers, z ⁇ 2;
- Determining the third parity result and the fourth parity result comprising: recording, from the first payload bit of the T bit blocks, A1 consecutive bits of each bit block to the first monitoring segment, Recording A2 consecutive bits after A1 consecutive bits to the second monitoring segment, and recording A3 consecutive bits after A2 consecutive bits to the third monitoring segment until after Az-1 consecutive bits Az consecutive bits are recorded to the zth monitoring section; an odd parity or even parity is used for each monitoring section to determine a 1-bit monitoring code to obtain a z-bit monitoring code, and the z-bit monitoring code includes a third parity The result and the fourth parity result. Therefore, the flexBIP-z algorithm provided by the embodiment of the present application can more flexibly and succinctly determine the first parity result and the second parity result, and tolerate insertion or deletion of one or more first bit blocks during transmission.
- determining whether there are bit errors in the T bit blocks according to the first parity result and the third parity result, and the second parity result and the fourth parity result including: If it is determined that the first parity result and the third parity result are the same, and the second parity result and the fourth parity result are the same, determining that there are no error in the T bit blocks; if the first parity is determined The result of the verification is not the same as the third parity result, and/or the second parity result and the fourth parity result are not the same, and it is determined that there are bit errors in the T bit blocks.
- receiving the first parity result and the second parity result comprising: receiving a first check result set, where the first check result set is calculated according to an xBIP-y algorithm, The first parity result and the second parity result are included in the y-bit monitoring code included in the verification result set; determining the third parity result and the fourth parity result, including: determining the second verification result The second parity result is calculated according to the xBIP-y algorithm, and the y-bit monitoring code included in the second verification result set includes a third parity result and a third parity result;
- determining T according to the first parity result and the third parity result, and the second parity result and the fourth parity result Whether there is an error in the bit block includes: determining whether there is a bit error in the T bit block according to the first check result set and the second check result set. Therefore, the error or error detection of the M/N Bit Block network path can be completely implemented by using the method provided by the embodiment of the present application.
- receiving the first parity result and the second parity result comprising: receiving a first check result set, where the first check result set is calculated according to a flexBIP-z algorithm, a z-bit monitoring code included in a set of verification results includes a first parity result and a second parity result; determining the third parity result and the fourth parity result, comprising: determining a second verification result
- the set, the second check result set is calculated according to the flexBIP-z algorithm, and the z-bit monitoring code included in the second check result set includes the third parity result and the fourth parity result; when receiving the first a parity result and a second parity result, based on the first parity result and the third parity result, and the second parity result and the fourth parity result, determining whether T bit blocks are
- the error code includes: determining, according to the first verification result set and the second verification result set, whether the T bit blocks have an error. Therefore, the error or error detection of the M/N Bit Block network path can be
- determining whether the T bit blocks have an error according to the first check result set and the second check result set includes: determining the first check result set and the second check result set If the same, it is determined that there are no error codes in the T bit blocks; if it is determined that the first check result set and the second check result set are not the same, it is determined that the T bit blocks have an error.
- a third aspect a bit block stream error detection method, comprising: determining, by a first device, that a start byte in a start block in a bit block stream and an end byte in an end block corresponding to the start block are detected a segment; the first device calculates a first verification result according to the detected segment.
- the first device transmits the first check result and the bit block stream.
- the algorithm used by the first device to calculate the first check result may be CRC-x or BIP-x, and the first check result is recorded as B, and B may be one or more bytes.
- the error or error detection of the M/N Bit Block network path can be completely implemented by using the method provided in the embodiment of the present application, which has little impact on the user service and is close to the SDH/OTN, and is superior to the error detection provided in the prior art.
- Method, the implementation process is simple and easy to implement.
- the bit block stream includes at least one M1/M2 bit block; wherein M1 represents the number of payload bits in each bit block, M2 represents the total number of bits per bit block, and M2-M1 represents The number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
- the first device sends the first check result and the bit block stream, including: the first device sends the first check result and the bit block stream to the second device; or the first device sends the first
- the result of the verification is sent to the third device, and the bit block is sent to the second device. Therefore, the embodiment of the present application provides error detection by using a third-party device, such as an SDN controller, or any device having a function of determining a bit stream transmission error, which is more flexible and efficient, and is simple to implement.
- the method before the first device sends the first verification result and the bit block stream to the second device, the method further includes: the first device storing the first verification result in the end block, and obtaining the updated Ending the block; or, the first device stores the first check result in the check result storage block, and deletes any first bit block in the bit block stream, wherein the check result storage block refers to before the end block A new block, the first block of bits refers to a block of bits that may be inserted into or deleted from the block stream during transmission of the block stream. Therefore, the embodiment of the present application provides two methods for storing the first verification result, and the storage method is more flexible and simple to implement.
- the first device stores the first check result in the end block, and obtains the updated end block, including: when the number of bytes occupied by the first check result is greater than or equal to the target number of bytes, The first device stores the first check result before the end byte in the end block, and moves the end byte to a new block after the end block according to the number of bytes occupied by the first check result, and deletes the bit block.
- any first block in the stream, the new block where the end byte is moved is used as the updated end block; when the number of bytes occupied by the first check result is less than the target number of bytes, the first device will The first check result is stored before the end byte in the end block, and the end byte is shifted back by the number of bytes occupied by the first check result according to the number of bytes occupied by the first check result, and the end byte is moved.
- the bit block that is located later is used as the updated end block; wherein the target number of bytes is the number of bytes in the end block after the end byte plus one. Therefore, the method provided by the embodiment of the present application is simple to implement.
- a fourth aspect a bit block stream error detection method, comprising: determining, by the second device, that the start byte in the start block in the bit block stream and the end byte in the end block corresponding to the start block are detected a segment; the second device calculates a second verification result according to the detected segment.
- the second device receives the first verification result
- the second device determines, according to the first verification result and the second verification result, whether the detected segment has an error. Therefore, the error or error detection of the M/N Bit Block network path can be completely implemented by using the method provided in the embodiment of the present application, which has little impact on the user service and is close to the SDH/OTN, and is superior to the error detection provided in the prior art.
- Method the implementation process is simple and easy to implement.
- the algorithm used by the second device in calculating the second verification result is the same as the algorithm used when the first device calculates the first verification result.
- the bit block stream includes at least one M1/M2 bit block; wherein M1 represents the number of payload bits in each bit block, M2 represents the total number of bits per bit block, and M2-M1 represents The number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
- the second device determines the detected segment according to the start byte in the start block in the bit block stream and the end byte in the end block corresponding to the start block, including three possible Case: (1) When the second device receives the first verification result, and the first verification result is stored in the end block, the second device deletes the second verification result from the end block, and obtains the updated end block. a byte between the start byte in the start block and the end byte in the updated end block as the detected segment; (2) when the second device receives the first check result, and When a check result is stored in the check result storage block, the second device deletes the check result storage block from the bit block stream, and obtains the updated bit block stream, which is to be updated in the start block in the bit block stream.
- the byte between the start byte and the end byte in the end block is taken as the detected segment, wherein the check result storage block is located before the end block.
- the first check result is included in the byte between the start byte in the start block and the end byte in the end block. Therefore, the first check result needs to be deleted first, and the remaining The part is taken as the detected section.
- the second device deletes the check result storage block from the bit block stream, and obtains the updated bit. A block stream in which the check result storage block is located before the end block.
- the second device detects the byte between the start byte in the start block and the end byte in the end block in the bit block stream as the detected Section. At this time, the byte between the start byte in the start block and the end byte in the end block does not include the first check result, and can be directly used as the detected segment.
- the method further includes: when the second device does not receive the first verification result, the second device sends the second verification result to the third device, where the third device stores the first verification result. . Therefore, the embodiment of the present application provides two methods for storing the first verification result, and the storage method is more flexible and simple to implement.
- the second device determines, according to the first verification result and the second verification result, whether the detected segment has an error, including: if the second device determines the first verification result and the second calibration If the test result is the same, it is determined that there is no error in the detected segment; if it is determined that the first verification result is different from the second verification result, it is determined that the detected segment has an error.
- the second device deletes the first check result from the end block, and obtains the updated end block, including: when the number of bytes occupied by the first check result is greater than or equal to the target number of bytes
- the second device moves the end byte to a bit block before the end block according to the number of bytes occupied by the first check result, and adds a first bit block to the bit block stream, where the end byte is moved.
- the bit block is used as the updated end block; when the number of bytes occupied by the first check result is less than the target number of bytes, the second device moves the end byte to the first school according to the number of bytes occupied by the first check result.
- the number of bytes occupied by the result is the updated end block after the end byte is moved; wherein the target number of bytes is the number of bytes in the end block before the end byte plus one. Therefore, the method provided by the embodiment of the present application is simple to implement.
- a bit block stream error detecting apparatus comprising: a processor, a transceiver, the transceiver is configured to send a bit stream block, and the processor is configured to complete the first aspect according to the bit stream block sent by the transceiver or A method in any of the possible implementations of the first aspect.
- a bit block stream error detecting apparatus includes a processor, a transceiver, the transceiver is configured to receive a bit stream block, and the processor is configured to complete the foregoing second aspect according to the bit stream block received by the transceiver or A method in any of the possible implementations of the second aspect.
- a bit block stream error detecting apparatus comprising: a processor, a transceiver, the transceiver is configured to send a bit stream block, and the processor is configured to complete the first aspect according to the bit stream block sent by the transceiver or A method in any of the possible implementations of the first aspect.
- a bit block stream error detecting apparatus includes a processor, a transceiver, the transceiver is configured to receive a bit stream block, and the processor is configured to complete the second aspect according to the bit stream block received by the transceiver or A method in any of the possible implementations of the second aspect.
- the embodiment of the present application proposes a new device for transmitting an M1/M2 bit block stream.
- a new bit error detection unit is also called a bit error ratio (BER) unit, which is referred to as BER.
- BER bit error ratio
- the PE device includes uAdpt, L1.5Switch, nAdpt, and BER.
- One end is connected to the user equipment, the interface is UNI, the other end is connected to the network device, the interface is NNI, and the P device includes uAdpt, L1.5Switch, nAdpt, and BER. Both ends are connected to the network device, and the interface is NNI, as shown in Figure 23(a) and Figure 23(b).
- the embodiment of the present application further provides a packet bearer product, such as an IPRAN and PTN device that plans to load X-E features.
- a packet bearer product such as an IPRAN and PTN device that plans to load X-E features.
- the present application provides a packet bearer product, where the interface board can be an interface card of a box device or an interface chip of a line card of a box device.
- the embodiment of the present application further provides a packet bearer product.
- the present application provides a new type of chip, such as SDxxxx, which is built into the chip, or in an existing interface chip, such as SDyyyy and the host. Between the switch boards, a Field-Programmable Gate Array (FPGA) or Network Processor (NP) is added to implement the BER function through the FPGA or NP.
- FPGA Field-Programmable Gate Array
- NP Network Processor
- the present application provides a computer readable storage medium having stored therein instructions that, when run on a computer, cause the computer to perform any of the above aspects or any of the possible aspects of the first aspect Methods.
- the present application also provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method of any of the first aspect or the first aspect of the first aspect described above.
- FIG. 1 is a schematic diagram of a code pattern definition of a 64/66 bit code in an embodiment of the present application
- FIG. 2 is a schematic diagram of a code pattern definition of a free block in the embodiment of the present application.
- FIG. 3(a) is a schematic structural diagram of a PE device in an embodiment of the present application.
- FIG. 3(b) is a schematic structural diagram of a P device in an embodiment of the present application.
- FIG. 4 is a schematic diagram of constructing a network by using X-E technology and forwarding in the embodiment of the present application;
- FIG. 5 is a schematic diagram of the basic idea of BIP-8 in the embodiment of the present application.
- FIG. 7 is a schematic diagram of the location and pattern definition of a second boundary bit block in the embodiment of the present application.
- FIG. 8 is a schematic diagram of inserting a first bit block in an embodiment of the present application.
- FIG. 9 is a schematic diagram of the basic idea of 8BIP-8 in the embodiment of the present application.
- 10 is a schematic diagram of the basic idea of 16BIP-4 in the embodiment of the present application.
- 11(a) is a schematic diagram showing the basic idea of flexBIP-8 in the embodiment of the present application.
- 11(b) is a schematic diagram showing the basic idea of flexBIP-9 in the embodiment of the present application.
- FIG. 13 is a third embodiment of a bit block stream error detection method according to an embodiment of the present application.
- FIG. 14 is a schematic diagram of a 64/66 bitstream in an embodiment of the present application.
- 15 is a schematic diagram of a code pattern definition of a pure data block D in the embodiment of the present application.
- 16 is a schematic diagram of a code pattern definition of a starting block in an embodiment of the present application.
- 17 is a schematic diagram of a code pattern definition of an end block in an embodiment of the present application.
- FIG. 18 is a schematic diagram of a first device storing a first verification result in an end block according to an embodiment of the present application
- FIG. 19 is a schematic diagram of the first device using the CRC-8 or the BIP-8 to calculate the first check result B insertion end block in the embodiment of the present application;
- FIG. 20 is a schematic diagram of a newly added bit block before a first device inserts a first check result B into an end block according to an embodiment of the present application;
- 21 is a fourth embodiment of a bit block stream error detection method according to an embodiment of the present application.
- FIG. 22 is a schematic diagram of a first verification result B in a second device deletion end block according to an embodiment of the present application.
- 23(a) is a second schematic structural diagram of a PE device in an embodiment of the present application.
- 23(b) is a second schematic structural diagram of a P device in an embodiment of the present application.
- FIG. 24 is a schematic structural diagram of a packet bearer product in an embodiment of the present application.
- 25 is a second schematic structural diagram of a packet bearer product in an embodiment of the present application.
- 26 is a schematic diagram of error detection of an end-to-end path of a bit fast stream to be verified in the embodiment of the present application;
- 27(a) is a schematic diagram of error detection of a path of a bit fast stream that is verified to be a non-end-to-end path in the embodiment of the present application;
- 27(b) is a second schematic diagram of error detection of a path of a bit fast stream that is verified to be a non-end-to-end path in the embodiment of the present application;
- FIG. 28 is a schematic structural diagram of a bit block stream error detecting apparatus according to an embodiment of the present application.
- FIG. 29 is a second schematic structural diagram of a bit block stream error detecting apparatus according to an embodiment of the present application.
- FIG. 30 is a third schematic structural diagram of a bit block stream error detecting apparatus according to an embodiment of the present application.
- FIG. 31 is a fourth schematic structural diagram of a bit block stream error detecting apparatus according to an embodiment of the present application.
- the bit block mentioned in the embodiment of the present application is an M1/M2 bit block, and the M1/M2 bit represents an encoding mode, where M1 represents the number of payload bits in each bit block, and M2 represents each bit.
- M1 represents the number of payload bits in each bit block
- M2 represents each bit.
- the total number of bits of the bit block, M2-M1 represents the number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
- the M1/M2 bit block stream is transmitted on the Ethernet physical layer link.
- 1G Ethernet uses 8/10Bit encoding
- 1GE physical layer link delivers 8/10 Bit Block stream
- 10GE/40GE/100GE adopts 64/.
- 66 bit code 10GE/40GE/100GE physical layer link is the 64/66 Bit Block stream.
- other coding methods will also appear, such as 128/130 bit encoding and 256/258 bit encoding.
- the embodiment of the present application is uniformly represented by an M1/M2 bit block stream.
- Bit Blocks For the M1/M2 bit block stream exchanged by the L1.5 layer, there are different types of Bit Blocks and are clearly defined in the standard. The following is an example of a 64/66 bit coded pattern definition, as shown in FIG.
- the first two Bits "10" or "01" of the header are 64/66 Bit Block sync header bits, and the last 64 Bit is used to carry payload data or protocols.
- Figure 1 includes 16 pattern definitions, each of which represents a pattern definition of a block of bits, where D0-D7 represents the data byte, C0-C7 represents the control byte, S0 represents the start byte, and T0-T7 represents the code.
- the second line corresponds to the pattern definition of the IDLE Block, and the free block can be represented by /I/, as shown in Figure 2.
- Line 7 corresponds to the definition of the pattern of the starting block.
- the starting block can be represented by /s/
- the lines 9-16 correspond to the pattern definition of the 8 ending blocks
- the 8 ending blocks can be represented by /T/.
- the device shown in FIG. 3(a) and FIG. 3(a) is used to transmit the M1/M2 bit block stream, specifically, as shown in FIG. 3(a) and FIG. 3(b). , including PE equipment and P equipment.
- the PE device represents an edge device, and one end is connected to the user device.
- the interface is a user network interface (UNI), the other end is connected to the network device, the interface is NNI, and the P device represents the network device. Both ends are connected to the network.
- the device is connected.
- the interface is the network to network interface (NNI) between the networks or devices in the network.
- NNI network to network interface
- the client signal adaptation unit (uAdpt) represents a user-side processing unit of the X-E technology system for accessing user service signals and performing code conversion, rate adaptation, and the like.
- the network signal adaptation unit (nAdpt) represents a network side processing unit of the XE technology system, and is configured to send the service signal in the device to the network side and complete corresponding function processing; or receive the network side service signal and transmit it to other processing units in the device.
- the L1.5switch or the X-Ethernet switch, that is, the X-Ethernet Relay that is, the forwarding of the intermediate node
- the path shown in FIG. 4 is an X-E end-to-end forwarding path.
- BIP-x Based on the BIP algorithm, the basic idea of the algorithm is to divide the verified signal into X check blocks. For example, SDH adopts BIP-16, BIP-8, BIP-2, and OTN adopts BIP- 8.
- the 8-bit monitoring code generation process shown by BIP-8 can be briefly described as follows: all the verified parts of the bit stream are grouped into 8 bits, and are divided into a series of 8-bit sequences. Code group.
- the BIP-8 code is used as the first column, and the first 8-bit sequence is the second column, which is sequentially arranged into a monitoring matrix. Then, the first bit of each 8-bit sequence code group and the first bit of the BIP-8 code form a first monitoring code group (first line of the matrix), and the second bit and BIP of each 8-bit sequence code group
- the 2nd bit of the -8 code constitutes the 2nd monitoring code group (the second line of the matrix), and so on.
- the first bit of the BIP-8 code provides even parity for the first monitoring code group (ie, the number of "1"s in the monitoring code group is even), and the second bit of the BIP-8 code is the first bit.
- the monitoring code group provides even parity, and so on. It should be noted that odd parity can also be used here.
- CRC-x based on the CRC algorithm, wherein the standardized algorithms include CRC-4, CRC-8, CRC-16, CRC-32, etc., and the X-bit loop check is performed on the verified signal, and the Ethernet frame or The packet uses CRC-32 to store the CRC-32 result in the last FCS field (4 bytes) of the frame or packet.
- the embodiment of the present application provides a bit block stream error detection method, which solves the problem that the error detection method in the M/N Bit block exchange scenario is difficult to implement and has low bearer efficiency.
- the method comprises:
- Step 600 Send a first boundary bit block, where the first boundary bit block is used to distinguish N pieces of subsequent transmission, and N is a positive integer.
- Step 610 The first bit block is sequentially transmitted, where I is an integer greater than or equal to 1 and less than or equal to N.
- Step 620 Determine a first parity result and a second parity result, where the check object of the first parity result includes consecutive m bits of each of the N bit blocks, and the second parity The resulting check object includes consecutive n bits of each of the N bit blocks, at least one of m, n being greater than or equal to two.
- Step 630 Send a second boundary bit block, a first parity result, and a second parity result, where the second boundary bit block is used to distinguish N bits that have been transmitted.
- the execution body of each step in FIG. 6 may be a bit block transmitting end.
- the path of the checked bit block stream is from the bit block transmitting end to the bit block receiving end
- the path of the checked bit block stream is an end-to-end path.
- the path of the checked bit block stream is any intermediate device from the bit block transmitting end to the bit block receiving end
- the path of the checked bit block stream is a path that is suspended at one end. This application is collectively referred to as a transmitting device.
- the embodiment of the present application can be used not only for error detection of an end-to-end path, but also for error detection of a non-end-to-end path, for example, a planned reserved path, and a protection path of a 1:1 connection protection group. Or have other special purpose paths.
- the execution body of each step in FIG. 6 may be the first intermediate device.
- the path of the bitstream to be verified is a path that is suspended at both ends.
- step 600 step 610, step 630
- step 630 the embodiment of the present application provides the following two possible implementation manners:
- the first parity result and the second parity result are transmitted to the first device together with the N bit blocks between the two boundary bit blocks and the two boundary bit blocks, when being When the path of the bit block stream is from the bit block transmitting end to the bit block receiving end, the first device here may be the bit block receiving end, and the path of the checked bit block stream is from the bit block transmitting end to the bit When the intermediate device before the block receiving end, or when the path of the verified bit block stream is the second intermediate device from the first intermediate device after the bit block transmitting end to the bit block receiving end, the first here A device can also be an intermediate device.
- the second device herein may be an SDN controller or any device having a function of determining a bit stream transmission error.
- the two methods can also be used at the same time, that is, the first parity result and the second parity result are sent to both the first device and the second device.
- the second boundary bit block is sent at the first moment, and the first parity result and the second parity result are sent at the second moment, where the first moment is earlier than the second moment, or The first moment is later than the second moment, and the first moment is equal to the second moment.
- the check object of the first parity result may be consecutive m bits of each of the N bit blocks, and the check object of the second parity result may be each of the N bit blocks a consecutive n bits, in a possible implementation manner, the check object of the first parity result may include the foregoing, in addition to the consecutive m bits of each of the N bit blocks.
- the consecutive m bits of a boundary bit block may also include consecutive m bits of the second boundary bit block; likewise, the check object of the second parity result includes, in addition to each bit block of the N bit blocks.
- the consecutive n bits it may also include consecutive n bits of the first boundary bit block, and may also include consecutive n bits of the second boundary bit block.
- the first parity result and the second parity result may be stored in the second boundary bit block. Therefore, assuming that each N bit block in the bit block stream is a group, the i-th boundary bit block stores the first parity result and the second parity result corresponding to the i-th N-bit block, i +1 boundary bit block stores a first parity result and a second parity result corresponding to the i+1th group of N bit blocks, wherein the i+1th group of N bit blocks is the ith boundary bit block A bit block between the i+1th boundary bit block and i is a positive integer.
- boundary bit block mentioned in this application may be a newly inserted bit block, and a first bit block may be deleted while a boundary bit block is newly inserted, wherein the first bit block refers to N bit blocks or bit blocks deleted from N bit blocks may be inserted during transmission of a bit block.
- the first block of bits may refer to a free block.
- the second boundary bit block is in FIG.
- the bit block pattern definition corresponding to the 8th line that is, the type of the bit block is 0x4B, the O code of the bit block is 0x06, and the first parity result and the second parity result are stored in the 3 Data fields of the bit block.
- the unoccupied Data field Bit fills in binary 0. Therefore, the second boundary bit block is inserted after the N bit blocks, and in order to reduce the influence on the user bandwidth, one free block can be deleted.
- the frequency influence is generally eliminated by inserting or deleting the first bit block.
- a 64/66 bit block stream is implemented by inserting or deleting an IDLE Block, as shown in FIG. Therefore, when the first parity result and the second parity result are determined in step 620, if the existing BIP-x algorithm is used, the first parity result is affected by inserting or deleting the first bit block during transmission. And the second parity result.
- the first parity result and the second parity result are calculated according to a preset check algorithm, where the preset check algorithm is used to increase or decrease the first bit in the N bit blocks.
- the first parity result and the second parity result are not changed at the time of the block.
- first bit blocks such as IDLE Block
- This application transforms the existing BIP algorithm, which can include but is not limited to the following two algorithms:
- the preset check algorithm is the xBIP-y algorithm, where x is the number of bits of consecutive bit interleaving, x is determined according to the definition of the pattern of the first bit block, and y is the number of monitored segments, x, y is a positive integer, y ⁇ 2.
- Every x consecutive bits of each bit block are sequentially recorded to the first monitoring segment to the yth monitoring segment;
- the parity or even parity determines a 1-bit monitoring code to obtain a y-bit monitoring code, and the y-bit monitoring code includes a first parity result and a second parity result.
- sync bit header in each bit block is not included in the calculation of the first parity result and the second parity result.
- FIG. 9 is a schematic diagram of the 64/66 Bit Block using the 8BIP-8 algorithm.
- B0-B7 is 8 monitoring codes (also called check codes) included in the 8BIP-8 algorithm, and each monitoring code corresponds to one monitoring segment, which provides an odd test or even for the bits included in the corresponding monitoring segment. check.
- Each monitoring segment corresponds to 8 consecutive bits of each bit block, for example, the first monitoring segment corresponds to the first payload bit to the eighth payload bit of each bit block, and the second monitoring segment Corresponding to the ninth payload bit to the 16th payload bit of each bit block, ..., the eighth monitoring segment corresponds to the 57th payload bit to the 64th payload bit of each bit block.
- the inserted IDLE Block has the first byte being 0x1e and the others being 0.
- the first byte of the IDLE Block enters the 1st monitoring section of 8BIP-8, and the other bytes enter the 2-8th monitoring section.
- 0x1e has 4 binary 1s, other fields are 0, and there are 0 binary ones. Therefore, no matter how many IDLE blocks are inserted or deleted during transmission, the verification results of B0--B7 are not affected.
- FIG. 10 is a schematic diagram of the 64/66 Bit Block using the 16BIP-4 algorithm.
- B0-B3 is a four monitoring code (also called a check code) included in the 16BIP-4 algorithm, and each monitoring code corresponds to one monitoring section, providing an odd test or even for the bits included in the corresponding monitoring section. check.
- Each monitoring section corresponds to 16 consecutive bits of each bit block, for example, the first monitoring section corresponds to the first payload bit of each bit block to the 16th payload bit, and the second monitoring section Corresponding to the 17th payload bit of each bit block to the 32nd payload bit, the third monitoring segment corresponds to the 33rd payload bit of each bit block to the 48th payload bit, the 4th monitoring The segment corresponds to the 49th payload bit to the 64th payload bit of each bit block.
- the preset check algorithm is a flexBIP-z algorithm, where z refers to the number of monitored segments, and the number of consecutive bit interleaving bits corresponding to each monitoring segment is not the same, and z monitoring segments respectively correspond to The number of bits of consecutive bit interleaving is A1, A2, A 3 ... Az-1, Az, A1, A2, A 3 ... Az-1, Az, z are positive integers, z ⁇ 2.
- A1 consecutive bits in each bit block are recorded to the first monitoring segment, and A2 consecutive bits after A1 consecutive bits are recorded to the second Monitoring section, recording A3 consecutive bits after A2 consecutive bits to the third monitoring section until Az consecutive bits after Az-1 consecutive bits are recorded to the zth monitoring section;
- the monitoring section determines the 1-bit monitoring code by using odd or even parity to obtain a z-bit monitoring code, and the z-bit monitoring code includes a first parity result and a second parity result.
- Figure 11(a) is a schematic diagram of the 64/66 Bit Block using the flexBIP-8 algorithm.
- B0-B7 is 8 monitoring codes included in the flexBIP-8 algorithm, and each monitoring code corresponds to one monitoring section, and provides odd or even parity for the bits included in the corresponding monitoring section.
- the first monitoring segment corresponds to the first payload bit to the eighth payload bit of each bit block, and the second monitoring segment corresponds to the ninth payload bit to the 18th payload bit of each bit block.
- the third monitoring section corresponds to the 19th payload bit to the 24th payload bit of each bit block
- the 4th monitoring section corresponds to the 25th payload bit to the 33rd payload bit of each bit block
- the fifth monitoring segment corresponds to the 34th payload bit to the 40th payload bit of each bit block
- the sixth monitoring segment corresponds to the 41st payload bit to the 48th payload of each bit block.
- Bit the seventh monitoring section corresponds to the 49th payload bit of each bit block to the 58th payload bit
- the 8th monitoring section corresponds to the 59th payload bit of each bit block to the 64th Payload bits.
- FIG. 11(b) is a schematic diagram of the 64/6B Bit Block using the flexBIP-9 algorithm.
- B0-B8 is 9 monitoring codes included in the flexBIP-9 algorithm, and each monitoring code corresponds to one monitoring section, and provides odd or even parity for the bits included in the corresponding monitoring section.
- the first monitoring section corresponds to the first payload bit to the eighth payload bit of each bit block
- the second monitoring section corresponds to the ninth payload bit of each bit block to the 15th payload total 7 Bits
- the third monitoring segment corresponds to the 16th payload bit of each bit block to the 22nd payload bit, a total of 7 bits
- the 4th monitoring segment corresponds to the 23rd payload bit of each bit block to
- the 29th payload bit has a total of 7 bits
- the 5th monitoring segment corresponds to the 30th payload bit of each bit block to the 36th payload bit, a total of 7 bits
- the sixth monitoring segment corresponds to each
- the 37th payload bit of the bit block has a total of 7 bits to the 43rd payload bit
- the 7th monitoring segment corresponds to the 44th payload bit of each bit block to the 50th payload bit of 7 bits.
- the eighth monitoring section corresponds to the 51st payload bit of each bit block to the 57th payload bit of 7 bits
- the check object of the first parity result includes N bit blocks and the bit block in the first boundary of step 600, each bit block Any one of the consecutive 9 groups of bits enters the check area corresponding to the flexBIP-9 algorithm, and finally forms the first parity result.
- the check object of the second parity result includes a block of N bits and a bit block in the first boundary of step 600, and consecutive 9 groups of bits of each bit block are selected according to the first parity result. Any one of the other 8 groups outside the group enters the check area corresponding to the flexBIP-9 algorithm, and finally forms a second parity result.
- the check object of the first parity result includes N bit blocks and the bit block in the second boundary of step 630, each bit block Any one of the consecutive 9 groups of bits enters the check area corresponding to the flexBIP-9 algorithm, and finally forms the first parity result.
- the check object of the second parity result includes a block of N bits and a block of bits in the second boundary of step 630, and consecutive 9 groups of bits of each block block are selected according to the first parity result. Any one of the other 8 groups outside the group enters the check area corresponding to the flexBIP-9 algorithm, and finally forms a second parity result.
- the check object of the third parity result includes T bit blocks and the bit block in the first boundary described in step 1200, each bit Any one of the consecutive 9 groups of bits of the block enters the check area corresponding to the flexBIP-9 algorithm, and finally forms a third parity result.
- the check object of the fourth parity result includes a T bit block and a bit block in the first boundary in step 600, and consecutive 9 groups of bits of each bit block are selected according to a third parity result. Any one of the other 8 groups in the group enters the check area corresponding to the flexBIP-9 algorithm, and finally forms a fourth parity result.
- the check object of the third parity result includes T bit blocks and the bit block in the second boundary of step 1220, each bit block Any one of the consecutive 9 groups of bits enters the check area corresponding to the flexBIP-9 algorithm, and finally forms a third parity result.
- the check object of the fourth parity result includes T bit blocks and the bit block in the second boundary of step 1220, and the consecutive 9 groups of bits of each bit block are selected according to the third parity result. Any one of the other 8 groups outside the group enters the check area corresponding to the flexBIP-9 algorithm, and finally forms a fourth parity result.
- the inserted bit block is an IDLE Block
- the first byte is 0x1e
- the others are 0.
- the first byte of the IDLE Block enters the first monitoring section of flexBIP-9, and the other packets are grouped in consecutive 7 bits into the 2-9th monitoring section.
- 0x1e has 4 binary 1s, other fields are 0, and there are 0 binary ones. Therefore, no matter how many IDLE blocks are inserted or deleted during transmission, the verification results of B0--B8 are not affected.
- the inserted bit block is a low power idle block (LPI Block)
- the first byte is 0x1e
- the others are divided into 8 groups according to 7 bits, and each group is 0x6.
- the first byte of the LPI enters the first monitoring section of flexBIP-9, and the other packets are grouped in consecutive 7 bits into the 2-9th monitoring section.
- 0x1e has 4 binary 1s
- the other 7bi t fields are 0x6, and there are 2 binary 1s. Therefore, no matter how many LPI blocks are inserted or deleted during transmission, the verification results of B0--B8 are not affected.
- the first byte is 0x1e, and the others are divided into 8 groups according to 7 bits, and each group is 0x1e.
- the first byte of the LPI enters the first monitoring section of flexBIP-9, and the other packets are grouped in consecutive 7 bits into the 2-9th monitoring section.
- 0x1e has 4 binary 1s, so the check result of B0--B8 is not affected regardless of how many ERROR blocks are inserted or deleted during transmission.
- the y-bit monitoring code obtained by the algorithm 1 can be used as the first verification result set, or the z-bit monitoring code obtained by the algorithm 2 can be used as the first school. Test results collection. When the first parity result and the second parity result are transmitted, all the obtained verification results, that is, the first verification result set, may be simultaneously transmitted.
- the embodiment of the present application provides a bit block stream error detection method to solve the problem that the error detection method in the M/N Bit block exchange scenario is difficult to implement and has low bearer efficiency.
- the method comprises:
- Step 1200 Receive a first boundary bit block, where the first boundary bit block is used to distinguish the subsequently received T bit blocks, where T is a positive integer.
- Step 1210 Receive the first bit block in sequence, where I is an integer greater than or equal to 1 and less than or equal to T.
- Step 1220 Receive a second boundary bit block, where the second boundary bit block is used to distinguish T bits that have been received.
- Step 1230 Determine a third parity result and a fourth parity result, where the check object of the third parity result includes consecutive m bits of each of the T bit blocks, and the fourth parity The resulting check object includes consecutive n bits of each of the T bit blocks, at least one of m, n being greater than or equal to two.
- Step 1240 When receiving the first parity result and the second parity result, according to the first parity result and the third parity result, and the second parity result and the fourth parity result Determining whether there is an error in the T bit blocks, wherein the check object of the first parity result includes consecutive m bits of each of the N bit blocks, and the check object of the second parity result Included consecutive n bits of each of the N bit blocks, N being a bit block between the first boundary bit block and the second boundary bit block when determining the first parity result and the second parity result Number of.
- the execution body of each step in FIG. 12 may be the bit block receiving end, when the checked bit block
- the path of the stream is any intermediate device from the transmitting end of the bit block to the receiving end of the bit block, or when the path of the bit block stream to be verified is from the transmitting end of the bit block to the receiving end of the bit block, the steps in FIG. 12
- the execution body can be an intermediate device. This application is collectively referred to as a receiving device.
- N bit blocks are the bit blocks between the first boundary bit block and the second boundary bit block when the first parity result and the second parity result are determined by the transmitting device.
- the sending device sends the first boundary bit block, sequentially transmitting N bit blocks, and then calculating the first parity result and the second parity result according to the N bit blocks
- the two results are stored in a second boundary bit block, and the second boundary bit block is transmitted.
- the first bit block may be inserted or deleted in the N bit blocks, and the receiving device sequentially receives the first boundary bit block after receiving the first bit block.
- the second device when the first parity result and the second parity result are not received, sending the third parity result and the fourth parity result to the second device, the second device A first parity result and a second parity result are stored.
- the second device herein may be an SDN controller or any device having a function of determining a bit stream transmission error.
- the third parity result and the fourth parity result may also be transmitted to the second device.
- the second device may receive the first parity result and the second parity result sent by the sending device, and the third parity result and the fourth parity result sent by the receiving device, and the second device according to the two The group result determines if there is a bit error during the transmission of the bit block stream.
- the second boundary bit block is received at the first time, and the first parity result and the second parity result are received at the second time, where the first time is earlier than the second time, Or the first moment is later than the second moment, the first moment is equal to the second moment.
- the check object of the third parity result may be consecutive m bits of each of the T bit blocks, and the check object of the fourth parity result may be each bit block of the T bit blocks.
- the check object of the first parity result may be consecutive m bits of each of the N bit blocks, and the check object of the second parity result may be N bit blocks.
- the check object of the third parity result includes only m consecutive bits of each bit block in the T bit block In addition, it may further include consecutive m bits of the first boundary bit block, and may also include consecutive m bits of the second boundary bit block; likewise, the check object of the fourth parity result includes T except In addition to successive n bits of each bit block in a block of bits, it may also include consecutive n bits of the first boundary bit block, and may also include consecutive n bits of the second boundary bit block.
- the check object of the first parity result may include, in addition to consecutive m bits of each of the N bit blocks, consecutive m bits of the first boundary bit block, and may also include The consecutive m bits of the two boundary bit blocks; likewise, the check object of the second parity result may include the first one in addition to the consecutive n bits of each of the N bit blocks The consecutive n bits of the boundary bit block may also include consecutive n bits of the second boundary bit block.
- the check object of the third parity result also needs to include consecutive m bits of the first boundary bit block;
- the check object of the first parity result includes consecutive m bits of the second boundary bit block, the check object of the third parity result also needs to include consecutive m bits of the second boundary bit block;
- the check object of the second parity result includes consecutive n bits of the first boundary bit block, the check object of the fourth parity result also needs to include consecutive n bits of the first boundary bit block;
- the check object of the second parity result includes consecutive n bits of the second boundary bit block, the check object of the fourth parity result also needs to include consecutive n bits of the second boundary bit block.
- the first parity result and the second parity result are stored in the second boundary bit block.
- the receiving device determines, according to the first parity result and the third parity result, and the second parity result and the fourth parity result, whether the T bit blocks have an error.
- the specific method is: if it is determined that the first parity result and the third parity result are the same, and the second parity result is the same as the fourth parity result, determining that there are no error codes in the T bit blocks; It is determined that the first parity result and the third parity result are not the same, and/or the second parity result and the fourth parity result are not the same, and it is determined that the T bit blocks have an error.
- the receiving device determines a preset algorithm used by the third parity result and the fourth parity result, and a preset algorithm used by the transmitting device to determine the first parity result and the second parity result. The same, the repetition will not be repeated.
- the receiving device receives the first verification result set
- the first verification result set is calculated according to the xBIP-y algorithm
- the first verification result set includes the y-bit monitoring code.
- a first parity result and a second parity result are included.
- the receiving device needs to determine a second set of check results, the second parity result is calculated according to the xBIP-y algorithm, and the y-bit monitoring code included in the second check result set includes the third parity result and the first Three parity results. Further, the receiving device determines, according to the first verification result set and the second verification result set, whether the T bit blocks have an error.
- the receiving device receives the first check result set, the first check result set is calculated according to the flexBIP-z algorithm, and the first check result set includes the z-bit monitoring code.
- the first parity result and the second parity result are included.
- the receiving device needs to determine a second verification result set, where the second verification result set is calculated according to the flexBIP-z algorithm, and the z-bit monitoring code included in the second verification result set includes the third parity result and the third Four parity results. Further, the receiving device determines, according to the first verification result set and the second verification result set, whether the T bit blocks have an error.
- the receiving device determines, according to the first verification result set and the second verification result set, whether the T bit blocks have an error, including the following two possible situations:
- the error or error detection of the M/N Bit Block network path can be completely implemented by using the method provided in the embodiment of the present application, without affecting user services, and the bearer efficiency is 100%, and the bit block inserted or deleted due to the synchronization problem during the transmission process can be tolerated.
- the detection period ie, the number of bit blocks between two boundary bit blocks
- the detection accuracy ie, the preset algorithm
- the detection method can not only use the path of the bit block stream to be verified as an end-to-end path, but also the path of the bit block stream to be verified as a non-end-to-end path.
- the embodiment of the present application provides a bit block stream error detection method to solve the problem that the error detection method in the M/N Bit block exchange scenario is difficult to implement and has low bearer efficiency.
- the method comprises:
- Step 1300 The first device determines the detected segment according to a start byte in the start block in the bit block stream and an end byte in the end block corresponding to the start block.
- the user service starts with the start block/S/flag, the end block/T/flag ends, and the middle D is a pure data block, as shown in FIG.
- the seventh line corresponds to the pattern definition of the start block
- S0 represents the start byte
- lines 9-16 correspond to the pattern definitions of the eight end blocks, respectively
- T0-T7 represents the end.
- the byte as shown in FIG. 17, is exemplified by including T0 in the end block, and the detected segment is a byte from S0 to T0.
- Step 1310 The first device calculates a first verification result according to the detected segment.
- the algorithm used by the first device in calculating the first check result may be CRC-x or BIP-x, and the result of the first check result is recorded as B, and B may be one or more bytes.
- Step 1320 The first device sends the first check result and the bit block stream.
- the sending, by the first device, the first check result and the bit block stream may specifically include the following two possible implementation manners:
- the first possible implementation manner the first device sends the first check result and the bit block stream to the second device.
- a second possible implementation manner is: the first device sends the first verification result to the third device, and sends the bit block flow to the second device.
- the first device here is a bit block transmitting end
- the second device is a bit block receiving end
- the third device is an SDN controller, or has any device for determining a bit stream transmission error function.
- the first device needs to store the first verification result obtained by the calculation, including the following two types. Possible storage methods:
- the first storage mode the first device stores the first verification result in the end block, and obtains the updated end block.
- the first device stores the first check result in the end block, and specifically includes the following two scenarios:
- Scenario 1 When the number of bytes occupied by the first check result is greater than or equal to the target number of bytes, the first device stores the first check result before the end byte in the end block, and occupies according to the first check result. The number of bytes moves the end byte to a new block after the end block, deletes any first bit block in the bit block stream, and adds the new block where the end byte is moved as the updated end block.
- the target number of bytes is the number of bytes in the end block after the end byte plus one.
- Scenario 2 When the number of bytes occupied by the first check result is less than the target number of bytes, the first device stores the first check result before the end byte in the end block, and is occupied according to the first check result. The number of bytes will end the byte and the number of bytes occupied by the first check result, and the bit block where the end byte is moved is used as the updated end block.
- the target number of bytes is the number of bytes in the end block after the end byte plus one.
- the end block When the end block is not inserted B, if the end block is D0 D1 D2 D3 D4 D5 D6 T7, the target number of bytes is 1, after inserting B, it is updated to D0 D1 D2 D3 D4 D5 D6 B, and then add a block.
- the updated end block is T0 C1 C2 C3 C4 C5 C6 C7.
- the end block When the end block is not inserted B, if the end block is T0 C1 C2 C3 C4 C5 C6 C7, the target number of bytes is 8, and after inserting B, the updated end block is B T1 C1 C2 C3 C4 C5 C6. Similarly, when the end block is not inserted B, if the end byte included in the end block is T1-T6, after inserting B, the corresponding update is T2-T7.
- the second storage mode the first device stores the first check result in the check result storage block, and deletes any first bit block in the bit block stream, where the check result storage block refers to before the end block A new block, the first bit block refers to a bit block that may be inserted into or deleted from the bit block stream during the transmission of the bit block stream.
- a data block is separately allocated for storing the first verification result B calculated by using CRC-x or BIP-x, and the type is D0 D1 D2 D3 D4 D5 D6 D7, corresponding to FIG. 1
- D0-D7 is used to store the calculation result B.
- an IDLE Block (/I/identified block) after /T/Block is deleted. As shown in FIG. 20, B occupies one block separately, and the IDLE block after /T/ is deleted one.
- the embodiment of the present application provides a bit block stream error detection method to solve the problem that the error detection method in the M/N Bit block exchange scenario is difficult to implement and has low bearer efficiency.
- the method comprises:
- Step 2100 The second device determines the detected segment according to the start byte in the start block in the bit block stream and the end byte in the end block corresponding to the start block.
- the second device determines, according to the start byte in the start block in the bit block stream and the end byte in the end block corresponding to the start block, that the detected segment includes the following three specific cases:
- Case 1 When the second device receives the first verification result, and the first verification result is stored in the end block, the second device deletes the second verification result from the end block, and obtains the updated end block, and The byte between the start byte in the start block and the end byte in the updated end block is taken as the detected segment.
- Case 2 When the second device receives the first verification result, and the first verification result is stored in the verification result storage block, the second device deletes the verification result storage block from the bit block stream, and obtains the updated a bit block stream, the byte between the start byte in the start block and the end byte in the end block in the updated bit block stream is used as the detected segment, wherein the check result storage block is located at the end block prior to.
- the first check result is included in the byte between the start byte in the start block and the end byte in the end block. Therefore, the first check result needs to be deleted first, and the remaining The part is taken as the detected section.
- Case 3 When the second device does not receive the first check result, the second device detects the byte between the start byte in the start block and the end byte in the end block in the bit block stream as the detected Section.
- the byte between the start byte in the start block and the end byte in the end block does not include the first check result, and can be directly used as the detected segment.
- the second device when the second device does not receive the first verification result, the second device sends the second verification result to the third device, where the third device stores the first verification. result.
- the third device is an SDN controller or any device having a function of determining a bit stream transmission error.
- Step 2110 The second device calculates a second verification result according to the detected segment.
- the algorithm used by the second device in calculating the second verification result is the same as the algorithm used when the first device calculates the first verification result.
- Step 2120 When the second device receives the first verification result, the second device determines, according to the first verification result and the second verification result, whether the detected segment has an error.
- the second device determines that the first verification result is the same as the second verification result, determining that the detected segment does not have an error, and if it is determined that the first verification result is different from the second verification result, determining that the second verification result is different from the second verification result There is a bit error in the detection section.
- the second device deletes the first check result from the end block, and obtains the updated end block, which specifically includes the following two scenarios:
- Scenario 1 When the number of bytes occupied by the first check result is greater than or equal to the target number of bytes, the second device moves the end byte to a bit block before the end block according to the number of bytes occupied by the first check result. A first bit block is added to the bit block stream, and the bit block in which the end byte is moved is used as the updated end block.
- the target number of bytes is the number of bytes in the end block before the end byte plus one.
- Scenario 2 When the number of bytes occupied by the first check result is less than the target number of bytes, the first device advances the end byte by the number of bytes occupied by the first check result and advances the byte occupied by the first check result.
- the number is the bit block in which the end byte is moved as the updated end block.
- the target number of bytes is the number of bytes in the end block before the end byte plus one.
- the end block is B T1 C1 C2 C3 C4 C5 C6, the target number of bytes is 2, and after B is deleted, the updated end block is T0 C1 C2 C3 C4 C5 C6 C7. Similarly, if the end byte included in the end block is T2-T7, and B is deleted, the corresponding update is T1-T6.
- the end block is T0 C1 C2 C3 C4 C5 C6 C7
- the data block immediately before the end block is D0 D1 D2 D3 D4 D5 D6 B
- the target number of bytes is 1, and after deleting B, the updated end block is D0 D1 D2 D3 D4 D5 D6 T7.
- the second device when the second device receives the first check result, and the first check result is stored in the check result storage block, the second device deletes the check result storage block from the bit block stream, and obtains the updated bit.
- a block stream in which the check result storage block is located before the end block.
- the error or error detection of the M/N Bit Block network path can be completely implemented by using the method provided in the embodiment of the present application, which has little impact on the user service, is close to the SDH/OTN, and is superior to the detection mode of the existing packet, and the implementation process is simple. Easy to implement.
- the device of the present application proposes a new device for transmitting an M1/M2 bit block stream.
- a bit error detection unit is also called a bit error ratio (BER) unit, which is referred to as BER. This unit is used to calculate the check result and error detection.
- BER bit error ratio
- the PE device includes uAdpt, L1.5Switch, nAdpt, and BER. One end is connected to the user equipment, the interface is UNI, and the other end is connected to the network device. The interface is NNI.
- the P device includes uAdpt, L1.5Switch, nAdpt, and BER. Both are connected to the network device, and the interface is NNI, as shown in Figure 23(a) and Figure 23(b).
- the embodiment of the present application further provides a packet bearer product, such as an IPRAN and PTN device that plans to load X-E features.
- a packet bearer product such as an IPRAN and PTN device that plans to load X-E features.
- the present application provides a packet bearer product, where the interface board can be an interface card of a box device or an interface chip of a line card of a box device.
- the embodiment of the present application further provides a packet bearer product.
- the present application provides a new type of chip, such as SDxxxx, which is built into the chip, or in an existing interface chip, such as SDyyyy and the host. Between the switch boards, a Field-Programmable Gate Array (FPGA) or Network Processor (NP) is added to implement the BER function through the FPGA or NP.
- FPGA Field-Programmable Gate Array
- NP Network Processor
- the path of the checked bit block stream is an end-to-end path.
- Embodiment 1 The user side interface (UNI) is 1GE, the network side interface (NNI) is 100GE, the granularity of the three-end XE equipment XE1, XE2, XE3, L1.5Switch exchange and the network side signal flow is 64/66 Bit Block flow.
- UNI user side interface
- NNI network side interface
- the granularity of the three-end XE equipment XE1, XE2, XE3, L1.5Switch exchange and the network side signal flow is 64/66 Bit Block flow.
- an 8BIP-8 check result is inserted every 1024 blocks as an example to illustrate the embodiment shown in FIG.
- the STEP 1:1GE user signal enters the XE1 device from the UNI side. uAdpt transcodes the 8/10BitBlock to 64/66 Bit Block, which in turn combines the 8GE user signals of the 2Bit sync header into one 64Bit string, and then adds The 2Bit sync header forms a 64/66 Bit block, and in this way, a 64/66 Bit Block stream is finally formed.
- the BER counts the block in the bit block stream from the uAdpt side, inserts a first boundary bit block before the first bit block, and calculates the first check result set by using the 8BIP-8 algorithm, when the number of blocks reaches After 1024, as the first group of blocks, the first set of check results is stored in a bit block identified by 4B and 06 and inserted after the 1024th bit block as a second boundary bit block.
- an IDLE Block in the bit block stream is deleted.
- the BER-processed bit block stream enters the L1.5Switch and then enters nAdpt to be sent to the network side.
- the BER continues to count the Block, and uses the 8BIP-8 algorithm to calculate the first set of check results of the second set of blocks, which is the same as the processing method of the first set of Blocks, and then the first check result of the second set of Blocks.
- the set is stored in a bit block identified by 4B and 06 and inserted after the 2048th bit block as a third boundary bit block. The BER repeats the above process until the end of the bit block stream.
- STEP 2 The bit block stream sent by X1 is passed to nAdpt of XE2.
- the receiving clock frequency is slower than the XE1 system clock.
- the nAdpt of X2 needs to insert one or several IDLE blocks when sending to L1.5Switch to tolerate the clock frequency being out of sync.
- the resulting transmission speed problem is then passed to the direction of the network side XE3.
- STEP 3 The bit block stream sent by X2 is transmitted to XE3, and reaches the BER unit of the UNI side through nAdpt and L1.5Switch; when receiving the first boundary bit block, the BER starts to perform 8BIP-8 on the subsequently received bit block stream.
- the BER stops calculating, and the bit block between the first boundary bit block and the second boundary bit block is used as the first group block.
- the BER compares the second check result set obtained by the current calculation with the first check result set stored in the second boundary bit block, and if there is no difference, there is no error code. If the BER is inconsistent, the number of error codes is counted and stored.
- the second boundary bit block is deleted from the bit block stream and an IDLE Block is inserted.
- the two sync headers are removed, and 64 bits are divided into eight 8-bit groups, each of which adds a 2Bit sync header and is sequentially sent to the UNI link.
- the BER continues to count the Block, and uses the 8BIP-8 algorithm to calculate a second set of check results for the second set of blocks, and the second set of blocks is a block of bits between the second boundary block and the third boundary block.
- the BER stops calculating.
- the BER stores the second check result set of the second group of blocks and the third boundary bit block.
- the first set of check results of the second group of blocks is compared, and if there is no error, the number of errors is counted and stored. The BER repeats the above process until the end of the bit block stream.
- the user signal enters XE1 and passes through XE2, and flows out of the network from XE3.
- the xBIP-y error detection is completely implemented on the entire end-to-end path, and the implementation manner is simple.
- the block carrying the xBIP-y result has no impact on the user service by adding or deleting IDLE Block compensation, and the bearer efficiency is 100%.
- the asynchronous node has an IDLE Block insertion or deletion.
- the xBIP-y algorithm tolerates this scenario and ensures that the verification result is accurate and effective.
- the xBIP-y algorithm, flexBIP-y algorithm is obviously superior to the static rigid mode of ETHERNET, SDH and OTN occupying fixed bytes. It compensates with the first bit block and has no influence on the user signal, but the existing ETHERNET, SDH and OTN errors. Code or error detection occupies a fixed byte and occupies user bandwidth.
- the path of the checked bit block stream is a non-end-to-end path.
- the start end of the path shown in FIG. 27( a ) performs calculation of the first check result set
- the unit inserted into the second boundary bit block is the BER of the nAdpt unit side
- the end of the path performs the calculation second.
- the check result set deletes the unit of the second boundary bit block as the BER of the nAdpt unit side;
- the start end of the path shown in FIG. 27(b) performs calculation of the first check result set.
- the unit inserted into the second boundary bit block is the BER of the uAdpt unit side, and the end end of the path performs calculation to delete the second check result set.
- the unit of the second boundary bit block is the BER of the nAdpt unit side;
- bit block stream in the path shown in FIG. 27(b) does not flow to the L1.5Switch element and the uAdpt unit at the end.
- Embodiment 2 The user side interface (UNI) is 1GE, the network side interface (NNI) is 100GE, the granularity of the three-end XE equipment XE1, XE2, XE3, L1.5Switch exchange and the network side signal flow is 64/66 Bit Block flow.
- UNI user side interface
- NNI network side interface
- the granularity of the three-end XE equipment XE1, XE2, XE3, L1.5Switch exchange and the network side signal flow is 64/66 Bit Block flow.
- a BIP-8 result B1 is inserted into the end block as an example, and the embodiment shown in FIG. 26 is explained.
- the STEP 1:1GE user signal enters the XE1 device from the UNI side.
- uAdpt transcodes the 8/10BitBlock to 64/66 Bit Block, which in turn combines the 8GE user signals of the 2Bit sync header into one 64Bit string, and then adds The 2Bit sync header forms a 64/66 Bit block, and in this way, a 64/66 Bit Block stream is finally formed.
- the BER identifies the bit block stream from the uAdpt side, starts the BIP-8 calculation from the receipt of the start block /S/identity block, receives the Block stop calculation with the end block /T/identification, and inserts the result B1. Before /T/, the /T/pattern is modified at the same time, and the bit block stream processed by the BER enters the L1.5Switch, and then enters nAdpt and is sent to the network side.
- the BER continues to identify the bit block stream from the uAdpt side, repeating the above process until the end of the bit block stream.
- STEP 2 The bit block stream sent by X1 is passed to nAdpt of XE2.
- the receiving clock frequency is higher than the XE1 system clock block.
- the nAdpt of X2 needs to delete one or several IDLE blocks when sending to L1.5Switch to tolerate the clock frequency being out of sync.
- the resulting transmission speed problem is then passed to the direction of the network side XE3.
- STEP 3 The bit block stream sent by X2 is passed to XE3, and reaches the UNI side BER unit via nAdpt and L1.5Switch; the BER recognizes the bit block stream, and starts BIP- from the start block/S/flag block. 8 Calculate, receive the Block with the end block /T / flag, stop the calculation before ending the result B1 in the block, delete the result B1, and modify the /T / pattern. The BER compares the result B2 obtained by the current calculation with the result B1, and if there is no error, the error is counted and stored.
- the two sync headers are removed, and 64 bits are divided into eight 8-bit groups, each of which adds a 2Bit sync header and is sequentially sent to the UNI link.
- the BIP-8 algorithm mentioned above can be calculated and replaced with the CRC-8 algorithm.
- the user signal enters XE1 and passes through XE2, and flows out of the network from XE3.
- the CRC or BIP error detection is completely implemented on the entire end-to-end path.
- the implementation is simple; the bearer efficiency is improved compared with the existing Ethernet, and SDH and OTN are improved. Close, but there is a certain gap with the embodiment 1 shown in FIG. 26;
- the BER inserts the result B1 into a separate block before /T/Block, while deleting the IDLE Block after /T/Block, and in STEP 3, deleting the independent block, and /T/Block adds IDLE Block to compensate, has no impact on user services, and bears 100% efficiency.
- the bit block stream error detection method provided by the embodiment of the present application is a detection mode for the bit block stream transmission path, and is not limited to the telecommunication cable bearer, and can be completely used in a wireless communication, industrial or industrial communication network.
- the present application further provides a bit block stream error detecting device, which can be used to perform the corresponding method embodiment in FIG. 6 , and thus the bit block stream error detecting device provided by the embodiment of the present application
- a bit block stream error detecting device which can be used to perform the corresponding method embodiment in FIG. 6 , and thus the bit block stream error detecting device provided by the embodiment of the present application
- the bit block stream error detecting device provided by the embodiment of the present application
- the embodiment of the present application provides a bit block stream error detecting device 2800, including: a transceiver 2801 and a processor 2802;
- the transceiver 2801 is configured to send a first boundary bit block, where the first boundary bit block is used to distinguish the N bit blocks that are subsequently sent, and N is a positive integer; the first bit block is sequentially sent, and I is greater than or equal to 1 and less than or equal to An integer of N;
- the processor 2802 is configured to determine a first parity result and a second parity result, where the check object of the first parity result includes consecutive m pieces of each of the N bit blocks a bit, the check object of the second parity result includes consecutive n bits of each of the N bit blocks, at least one of m, n being greater than or equal to 2;
- the transceiver 2801 is further configured to send a second boundary bit block, the first parity result, and the second parity result, where the second boundary bit block is used to distinguish the that has been sent N bit blocks.
- the type of each bit block is an M1/M2 bit block, where M1 represents the number of payload bits in each bit block, and M2 represents the total number of bits per bit block, M2-M1 Represents the number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
- the transceiver 2801 is configured to:
- the transceiver 2801 is configured to:
- the first parity result and the second parity result are stored in the second boundary bit block.
- the first parity result and the second parity result are calculated according to a preset check algorithm, where the preset check algorithm is used when the N
- the first parity block and the second parity result are not changed when the first bit block is added or decreased in the bit block, and the first bit block refers to the transmission process of the N bit blocks It is possible to insert the N bit blocks or the bit blocks deleted from the N bit blocks.
- the preset check algorithm is an xBIP-y algorithm, where x is the number of bits of consecutive bit interleaving, and x is determined according to the definition of the pattern of the first bit block, y Refers to the number of monitored segments, x, y is a positive integer, y ⁇ 2;
- the processor 2802 is configured to record, from the first payload bit of the N bit blocks, each x consecutive bits of each bit block to the first monitoring segment to the yth monitoring region. segment;
- the preset check algorithm is a flexBIP-z algorithm, where z is the number of monitored segments, and the number of consecutive bit interleaving bits corresponding to each monitoring segment is not the same, z
- the number of bits of consecutive bit interleaving corresponding to each monitoring section is A1, A2, A 3 ... Az-1, Az, A1, A2, A 3 ... Az-1, Az, z are positive integers, z ⁇ 2 ;
- the processor 2802 is configured to record, according to the first payload bit of the N bit blocks, the A1 consecutive bits in each bit block to the first monitoring segment, and the A1 consecutive segments A2 consecutive bits after the bit are recorded to the second monitoring segment, and A3 consecutive bits after the A2 consecutive bits are recorded to the third monitoring segment until after the Az-1 consecutive bits are Az consecutive bits are recorded to the zth monitoring section;
- the processor 2802 is configured to:
- the first verification result set includes the y-bit monitoring code, or the first verification result set includes the z-bit monitoring code
- the transceiver 2801 is configured to:
- the present application further provides a bit block stream error detecting device, which can be used to perform the corresponding method embodiment in FIG. 12, and thus the bit block stream error detecting device provided by the embodiment of the present application is
- the implementation manner reference may be made to the implementation manner of the method, and the repeated description is not repeated.
- the embodiment of the present application provides a bit block stream error detecting device 2900, including: a transceiver 2901 and a processor 2902;
- the transceiver 2901 is configured to receive a first boundary bit block, where the first boundary bit block is used to distinguish the subsequently received T bit blocks, where T is a positive integer; and the first bit block is sequentially received, where I is greater than or equal to 1 and less than or equal to An integer of T; receiving a second boundary bit block, the second boundary bit block being used to distinguish the T bit blocks that have been received;
- the processor 2902 is configured to determine a third parity result and a fourth parity result, where the check object of the third parity result includes consecutive m pieces of each of the T bit blocks a bit, the check object of the fourth parity result includes consecutive n bits of each of the T bit blocks, at least one of m, n being greater than or equal to 2; when passing through the transceiver Receiving the first parity result and the second parity result, according to the first parity result and the third parity result, and the second parity result and the fourth a parity result, determining whether the T bit blocks have an error, wherein the check object of the first parity result includes consecutive m bits of each of the N bit blocks, The check object of the second parity result includes consecutive n bits of each of the N bit blocks, where N is the result of determining the first parity result and the second parity result Between the first boundary bit block and the second boundary bit block Patent number blocks.
- the transceiver 2901 is also used to:
- the type of each bit block is an M1/M2 bit block, where M1 represents the number of payload bits in each bit block, and M2 represents the total number of bits per bit block, M2-M1 Represents the number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
- the transceiver 2901 is used to:
- the first parity result and the second parity result are stored in the second boundary bit block.
- the third parity result and the fourth parity result are calculated according to a preset check algorithm, where the preset check algorithm is used when the T
- the third parity result and the fourth parity result are not changed when the first bit block is added or decreased in the bit block, and the first bit block refers to the transmission process of the T bit block It is possible to insert the T bit blocks or the bit blocks deleted from the T bit blocks.
- the preset check algorithm is an xBIP-y algorithm, where x is the number of bits of consecutive bit interleaving, and x is determined according to the definition of the pattern of the first bit block, y Refers to the number of monitored segments, x, y is a positive integer, y ⁇ 2;
- the processor 2902 is configured to record, from the first payload bit of the T bit blocks, each x consecutive bits of each bit block to the first monitoring segment to the yth monitoring region. segment;
- the preset check algorithm is a flexBIP-z algorithm, where z is the number of monitored segments, and the number of consecutive bit interleaving bits corresponding to each monitoring segment is not the same, z
- the number of bits of consecutive bit interleaving corresponding to each monitoring section is A1, A2, A 3 ... Az-1, Az, A1, A2, A 3 ... Az-1, Az, z are positive integers, z ⁇ 2 ;
- the processor 2902 is configured to record, according to a first payload bit of the T bit blocks, A1 consecutive bits of each bit block to a first monitoring segment, where the A1 consecutive bits are The last A2 consecutive bits are recorded to the second monitoring segment, and the A3 consecutive bits after the A2 consecutive bits are recorded to the third monitoring segment until the Az-1 consecutive bits are followed by Az. Continuous bits are recorded to the zth monitoring section;
- the processor 2902 is configured to:
- the transceiver 2901 is configured to:
- the processor 2902 is configured to: determine a second check result set, where the second parity result is calculated according to the xBIP-y algorithm, and the second check result set includes y bit monitoring Included in the code, the third parity result and the third parity result; determining, according to the first verification result set and the second verification result set, whether the T bit blocks have errors code.
- the transceiver 2901 is configured to:
- the processor 2902 is configured to: determine a second verification result set, where the second verification result set is calculated according to the flexBIP-z algorithm, and the second verification result set includes z-bit monitoring
- the code includes the third parity result and the fourth parity result; determining, according to the first verification result set and the second verification result set, whether the T bit block has an error code.
- the processor 2902 is configured to:
- the present application further provides a bit block stream error detecting device, which can be used to perform the corresponding method embodiment in FIG. 13 , and therefore, the bit block stream error detecting device provided by the embodiment of the present application is
- the implementation manner reference may be made to the implementation manner of the method, and the repeated description is not repeated.
- the embodiment of the present application provides a bit block stream error detecting apparatus 3000, including: a transceiver 3001 and a processor 3002;
- the processor 3002 is configured to determine, according to a start byte in a start block in a bit block stream and an end byte in an end block corresponding to the start block, a detected segment; and calculate, according to the detected segment First verification result;
- the transceiver 3001 is configured to send the first check result and the bit block stream.
- the bit block stream includes at least one M1/M2 bit block; wherein M1 represents the number of payload bits in each bit block, and M2 represents the total number of bits per bit block, M2- M1 represents the number of header sync header bits in each bit block, and M1 and M2 are positive integers, and M2>M1.
- the transceiver 3001 is configured to:
- the processor 3002 is further configured to:
- the transceiver Before the transceiver sends the first verification result and the bit block stream to the second device, storing the first verification result in the end block to obtain an updated end block; or Storing the first check result in a check result storage block, and deleting any first bit block in the bit block stream, where the check result storage block refers to being located before the end block A new block, the first bit block being a bit block that may be inserted into or deleted from the bit block stream during transmission of the bit block stream.
- the processor 3002 is configured to:
- the target number of bytes is the number of bytes in the end block after the end byte plus one.
- the present application further provides a bit block stream error detecting device, which can be used to perform the corresponding method embodiment in FIG. 21, and thus the bit block stream error detecting device provided by the embodiment of the present application is
- the bit block stream error detecting device provided by the embodiment of the present application is
- the embodiment of the present application provides a bit block stream error detecting apparatus 3100, including: a transceiver 3101 and a processor 3102;
- the processor 3102 is configured to determine a detected segment according to a start byte in a start block in a bit block stream and an end byte in an end block corresponding to the start block, and calculate, according to the detected segment Second verification result;
- the transceiver 3101 When the first check result is received by the transceiver 3101, it is determined whether the detected segment has an error according to the first check result and the second check result.
- the bit block stream includes at least one M1/M2 bit block; wherein M1 represents the number of payload bits in each bit block, and M2 represents the total number of bits per bit block, M2- M1 represents the number of header sync header bits in each bit block, and M1 and M2 are positive integers, and M2>M1.
- the processor 3102 is configured to:
- the second check result is deleted from the end block, and the updated end block is obtained. a byte between the start byte in the start block and the end byte in the updated end block as a detected segment;
- the verification result storage block is deleted from the bit block stream, and the updated a bit block stream, the byte between the start byte in the start block and the end byte in the end block in the updated bit block stream is used as a detected segment, wherein a check result storage block is located before the end block;
- the transceiver 3101 is further configured to:
- the second verification result is sent to the third device, and the third device stores the first verification result.
- the processor 3102 is configured to:
- the processor 3102 is configured to:
- the end byte is forwarded by the first check result according to the number of bytes occupied by the first check result
- the number of bytes occupied, the bit block in which the end byte is moved is used as the updated end block
- the target number of bytes is the number of bytes in the end block before the end byte plus one.
- the embodiment of the present application provides a bit block stream error detection method, where the method includes: the sending device sends a first boundary bit block, where the first boundary bit block is used to distinguish the N bit blocks that are subsequently sent, N a positive integer; the first bit block is sequentially transmitted, I is an integer greater than or equal to 1 and less than or equal to N; the first parity result and the second parity result are determined, and the check object of the first parity result includes N a continuous m bits of each bit block in the bit block, the check object of the second parity result includes consecutive n bits of each of the N bit blocks, at least one of m and n being greater than or equal to 2: transmitting a second boundary bit block, a first parity result, and a second parity block, wherein the second boundary bit block is used to distinguish N bits that have been transmitted.
- the receiving device receives the first boundary bit block, where the first boundary bit block is used to distinguish the subsequently received T bit blocks, T is a positive integer; the first bit block is sequentially received, and I is an integer greater than or equal to 1 and less than or equal to T; Receiving a second boundary bit block, the second boundary bit block is configured to distinguish the T bit blocks that have been received; determining a third parity result and a fourth parity result, where the check object of the third parity result includes Contiguous m bits of each of the T bit blocks, the check object of the second parity result includes at least one of n consecutive bits, m, n of each of the T bit blocks Greater than or equal to 2; when receiving the first parity result and the second parity result, according to the first parity result and the third parity result, and the second parity result and the fourth parity As a result, it is determined whether there are error codes in the T bit blocks, wherein the check object of the first parity result includes consecutive m bits of each of the N bit
- the method provided by the embodiment of the present application can completely implement the error or error detection of the M/N Bit Block network path, does not affect the user service, and has a bearer efficiency of 100%, and can be inserted or deleted due to the synchronization problem during the transmission process.
- the bit block, and the detection period (ie, the number of bit blocks between the two boundary bit blocks) and the detection accuracy (ie, the preset algorithm) are dynamically configurable as needed.
- the detection method can not only use the path of the bit block stream to be verified as an end-to-end path, but also the path of the bit block stream to be verified as a non-end-to-end path. Therefore, the method provided by the embodiment of the present application can solve the problem that the error detection method in the M/N Bit block exchange scenario is difficult to implement and has low bearer efficiency.
- the embodiment of the present application further provides a bit block stream error detection method, the method comprising: the first device according to a start byte in a start block in a bit block stream and an end word in an end block corresponding to the start block
- the section determines the detected section; the first device calculates a first verification result according to the detected section.
- the first device transmits the first check result and the bit block stream.
- the algorithm used by the first device to calculate the first check result may be CRC-x or BIP-x, and the first check result is recorded as B, and B may be one or more bytes.
- the second device determines the detected segment according to the start byte in the start block in the bit block stream and the end byte in the end block corresponding to the start block; the second device calculates the second check according to the detected segment result.
- the second device receives the first verification result
- the second device determines, according to the first verification result and the second verification result, whether the detected segment has an error. Therefore, the error or error detection of the M/N Bit Block network path can be completely implemented by using the method provided in the embodiment of the present application, which has little impact on the user service and is close to the SDH/OTN, and is superior to the error detection provided in the prior art.
- Method the implementation process is simple and easy to implement.
- embodiments of the present application can be provided as a method, system, or computer program product. Therefore, the embodiments of the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware. Moreover, embodiments of the present application can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
- computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
- Embodiments of the present application are described with reference to flowchart illustrations and/or block diagrams of methods, devices (systems), and computer program products according to embodiments of the present application. It will be understood that each flow and/or block of the flowchart illustrations and/or FIG.
- These computer program instructions can be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing device to produce a machine for the execution of instructions for execution by a processor of a computer or other programmable data processing device.
- the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
- the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
- These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
- the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Error Detection And Correction (AREA)
Abstract
Description
Claims (72)
- 一种比特块流误码检测方法,其特征在于,包括:A bit block stream error detection method, comprising:发送第一边界比特块,所述第一边界比特块用于区别后续发送的N个比特块,N为正整数;Transmitting a first boundary bit block, where the first boundary bit block is used to distinguish the N bit blocks that are subsequently sent, where N is a positive integer;依次发送第I比特块,I为大于等于1小于等于N的整数;Transmitting the first bit block, where I is an integer greater than or equal to 1 and less than or equal to N;确定第一奇偶校验结果和第二奇偶校验结果,所述第一奇偶校验结果的校验对象包括所述N个比特块中每个比特块的连续的m个比特,所述第二奇偶校验结果的校验对象包括所述N个比特块中每个比特块的连续的n个比特,m、n中的至少一个大于等于2;Determining a first parity result and a second parity result, the check object of the first parity result including consecutive m bits of each of the N bit blocks, the second The parity object of the parity result includes consecutive n bits of each of the N bit blocks, at least one of m and n being greater than or equal to 2;发送第二边界比特块、所述第一奇偶校验结果和所述第二奇偶校验结果,所述第二边界比特块用于区别已经发送完成的所述N个比特块。Transmitting a second boundary bit block, the first parity result, and the second parity result, the second boundary bit block being used to distinguish the N bit blocks that have been transmitted.
- 如权利要求1所述的方法,其特征在于,每个比特块的类型为M1/M2比特块,其中,M1表示每个比特块中的净荷比特数,M2表示每个比特块的总比特数,M2-M1表示每个比特块中的首部同步头比特数,M1、M2为正整数,M2>M1。The method of claim 1 wherein the type of each bit block is an M1/M2 bit block, wherein M1 represents the number of payload bits in each bit block and M2 represents the total bits of each bit block. The number, M2-M1, represents the number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
- 如权利要求1或2所述的方法,其特征在于,发送第一边界比特块,包括:The method of claim 1 or 2, wherein transmitting the first boundary bit block comprises:发送第一边界比特块至第一设备;Transmitting a first boundary bit block to the first device;依次发送第I比特块,包括:Sending the first bit block in sequence, including:依次发送第I比特块至所述第一设备;Transmitting the first bit block to the first device in sequence;发送第二边界比特块、所述第一奇偶校验结果和所述第二奇偶校验结果,包括:Transmitting the second boundary bit block, the first parity result, and the second parity result, including:发送第二边界比特块、所述第一奇偶校验结果和所述第二奇偶校验结果至所述第一设备;Transmitting a second boundary bit block, the first parity result, and the second parity result to the first device;或者,发送第二边界比特块至所述第一设备,发送所述第一奇偶校验结果和所述第二奇偶校验结果至第二设备。Or sending a second boundary bit block to the first device, and sending the first parity result and the second parity result to the second device.
- 如权利要求1所述的方法,其特征在于,所述第一奇偶校验结果的校验对象还包括所述第一边界比特块的连续的m个比特,所述第二奇偶校验结果的校验对象还包括所述第一边界比特块的连续的n个比特。The method according to claim 1, wherein the check object of the first parity result further comprises consecutive m bits of the first boundary bit block, the second parity result The check object also includes consecutive n bits of the first boundary bit block.
- 如权利要求1或4所述的方法,其特征在于,所述第一奇偶校验结果的校验对象还包括所述第二边界比特块的连续的m个比特,所述第二奇偶校验结果的校验对象还包括所述第二边界比特块的连续的n个比特。The method according to claim 1 or 4, wherein the check object of the first parity result further comprises consecutive m bits of the second boundary bit block, the second parity The resulting check object also includes consecutive n bits of the second boundary bit block.
- 如权利要求1-5任一项所述的方法,其特征在于,发送第二边界比特块、第一奇偶校验结果和第二奇偶校验结果,包括:The method of any of claims 1-5, wherein transmitting the second boundary bit block, the first parity result, and the second parity result comprises:在第一时刻发送第二边界比特块,在第二时刻发送第一奇偶校验结果和第二奇偶校验结果,其中,所述第一时刻早于所述第二时刻,或所述第一时刻晚于所述第二时刻,所述第一时刻等于所述第二时刻。Transmitting a second boundary bit block at a first time, and transmitting a first parity result and a second parity result at a second time, wherein the first time is earlier than the second time, or the first The time is later than the second time, the first time is equal to the second time.
- 如权利要求1-6任一项所述的方法,其特征在于,所述第一奇偶校验结果和所述第二奇偶校验结果存储于所述第二边界比特块中。The method of any of claims 1-6, wherein the first parity result and the second parity result are stored in the second boundary bit block.
- 如权利要求1-7任一项所述的方法,其特征在于,所述第一奇偶校验结果和所述第二奇偶校验结果是根据预设校验算法计算得到的,所述预设校验算法用于当所述N个比特块中增加或减少第一比特块时不改变所述第一奇偶校验结果和所述第二奇偶校验结果,所述第一比特块是指在所述N个比特块的传输过程中可能插入所述N个比特块或从所述N 个比特块中删除的比特块。The method according to any one of claims 1 to 7, wherein the first parity result and the second parity result are calculated according to a preset check algorithm, the preset a check algorithm for not changing the first parity result and the second parity result when the first bit block is added or decreased in the N bit blocks, where the first bit block refers to The N bit blocks or bit blocks deleted from the N bit blocks may be inserted during transmission of the N bit blocks.
- 如权利要求8所述的方法,其特征在于,所述预设校验算法为xBIP-y算法,其中,x是指连续比特交织的比特数,x是根据所述第一比特块的码型定义确定的,y是指监视区段的个数,x,y为正整数,y≥2;The method according to claim 8, wherein the preset check algorithm is an xBIP-y algorithm, wherein x is a number of bits of consecutive bit interleaving, and x is a pattern according to the first bit block Defining the definition, y refers to the number of monitoring segments, x, y is a positive integer, y ≥ 2;确定第一奇偶校验结果和第二奇偶校验结果,包括:Determining the first parity result and the second parity result, including:从所述N个比特块中的第1净荷比特开始,将每个比特块的每x个连续比特依次记录至第1个监视区段至第y个监视区段;Starting from the first payload bit of the N bit blocks, sequentially recording every x consecutive bits of each bit block to the first monitoring segment to the yth monitoring segment;针对每个监视区段采用奇校验或偶校验确定1比特监视码,获得y比特监视码,所述y比特监视码中包括所述第一奇偶校验结果和所述第二奇偶校验结果。Determining a 1-bit monitoring code by using an odd or even parity for each monitoring section, obtaining a y-bit monitoring code, the y-bit monitoring code including the first parity result and the second parity result.
- 如权利要求8所述的方法,其特征在于,所述预设校验算法为flexBIP-z算法,其中,z是指监视区段的个数,每个监视区段对应的连续比特交织的比特数不全相同,z个监视区段分别对应的连续比特交织的比特数为A1、A2、A3……Az-1,Az,A1、A2、A3……Az-1,Az,z为正整数,z≥2;The method according to claim 8, wherein the preset check algorithm is a flexBIP-z algorithm, wherein z is the number of monitored segments, and consecutive bit-interleaved bits corresponding to each monitored segment The number of consecutive bit interleaving corresponding to z monitoring sections is A1, A2, A3, ... Az-1, Az, A1, A2, A3, ..., Az-1, Az, z are positive integers. Z≥2;确定第一奇偶校验结果和第二奇偶校验结果,包括:Determining the first parity result and the second parity result, including:从所述N个比特块中的第1净荷比特开始,将每个比特块中的A1个连续比特记录至第1个监视区段,将所述A1个连续比特后的A2个连续比特记录至第2个监视区段,将所述A2个连续比特后的A3个连续比特记录至第3个监视区段,直至将所述Az-1个连续比特后的Az个连续比特记录至第z个监视区段;Starting from the first payload bit of the N bit blocks, record A1 consecutive bits in each bit block to the first monitoring segment, and record A2 consecutive bits after the A1 consecutive bits Up to the second monitoring section, recording A3 consecutive bits after the A2 consecutive bits to the third monitoring section until the Az consecutive bits after the Az-1 consecutive bits are recorded to the zth Monitoring section;针对每个监视区段采用奇校验或偶校验确定1比特监视码,获得z比特监视码,所述z比特监视码中包括所述第一奇偶校验结果和所述第二奇偶校验结果。Determining a 1-bit monitoring code by using an odd or even parity for each monitoring section, obtaining a z-bit monitoring code, the z-bit monitoring code including the first parity result and the second parity result.
- 如权利要求9或10所述的方法,其特征在于,确定第一奇偶校验结果和第二奇偶校验结果,包括:The method according to claim 9 or 10, wherein determining the first parity result and the second parity result comprises:确定第一校验结果集合,所述第一校验结果集合包括所述y比特监视码,或者,所述第一校验结果集合包括所述z比特监视码;Determining a first verification result set, the first verification result set includes the y-bit monitoring code, or the first verification result set includes the z-bit monitoring code;发送所述第一奇偶校验结果和所述第二奇偶校验结果,包括:Transmitting the first parity result and the second parity result, including:发送所述第一校验结果集合。Sending the first set of verification results.
- 一种比特块流误码检测方法,其特征在于,包括:A bit block stream error detection method, comprising:接收第一边界比特块,所述第一边界比特块用于区别后续接收的T个比特块,T为正整数;Receiving a first boundary bit block, where the first boundary bit block is used to distinguish the subsequently received T bit blocks, where T is a positive integer;依次接收第I比特块,I为大于等于1小于等于T的整数;Receiving the first bit block in sequence, where I is an integer greater than or equal to 1 and less than or equal to T;接收第二边界比特块,所述第二边界比特块用于区别已经接收完成的所述T个比特块;Receiving a second boundary bit block, the second boundary bit block is used to distinguish the T bit blocks that have been received;确定第三奇偶校验结果和第四奇偶校验结果,所述第三奇偶校验结果的校验对象包括所述T个比特块中每个比特块的连续的m个比特,所述第四奇偶校验结果的校验对象包括所述T个比特块中每个比特块的连续的n个比特,m、n中的至少一个大于等于2;Determining a third parity result and a fourth parity result, the check object of the third parity result including consecutive m bits of each of the T bit blocks, the fourth The parity object of the parity result includes consecutive n bits of each of the T bit blocks, at least one of m and n being greater than or equal to 2;当接收到第一奇偶校验结果和第二奇偶校验结果时,根据所述第一奇偶校验结果和所述第三奇偶校验结果,以及所述第二奇偶校验结果和所述第四奇偶校验结果,确定所述T个比特块是否存在误码,其中,所述第一奇偶校验结果的校验对象包括N个比特块中每个比特块的连续的m个比特,所述第二奇偶校验结果的校验对象包括所述N个比特块中每个比特块的连续的n个比特,N为确定所述第一奇偶校验结果和所述第二奇偶校验结果时所述第一边界比特块和所述第二边界比特块之间的比特块的数目。When receiving the first parity result and the second parity result, according to the first parity result and the third parity result, and the second parity result and the first Determining, by the four parity results, whether there is an error in the T bit blocks, wherein the check object of the first parity result includes consecutive m bits of each of the N bit blocks, The check object of the second parity result includes consecutive n bits of each of the N bit blocks, and N is determining the first parity result and the second parity result The number of bit blocks between the first boundary bit block and the second boundary bit block.
- 如权利要求12所述的方法,其特征在于,还包括:The method of claim 12, further comprising:当未接收到第一奇偶校验结果和第二奇偶校验结果时,发送所述第三奇偶校验结果和所述第四奇偶校验结果至第二设备,所述第二设备存储有所述第一奇偶校验结果和所述第二奇偶校验结果。Transmitting the third parity result and the fourth parity result to a second device when the first parity result and the second parity result are not received, where the second device stores The first parity result and the second parity result are described.
- 如权利要求12所述的方法,其特征在于,所述第三奇偶校验结果的校验对象还包括所述第一边界比特块的连续的m个比特,所述第四奇偶校验结果的校验对象还包括所述第一边界比特块的n个比特;所述第一奇偶校验结果的校验对象还包括所述第一边界比特块的连续的m个比特,所述第二奇偶校验结果的校验对象还包括所述第一边界比特块的连续的n个比特。The method according to claim 12, wherein the check object of the third parity result further comprises consecutive m bits of the first boundary bit block, the fourth parity result The check object further includes n bits of the first boundary bit block; the check object of the first parity result further includes consecutive m bits of the first boundary bit block, the second parity The check object of the check result further includes consecutive n bits of the first boundary bit block.
- 如权利要求12或14所述的方法,其特征在于,所述第三奇偶校验结果的校验对象还包括所述第二边界比特块的连续的m个比特,所述第四奇偶校验结果的校验对象还包括所述第二边界比特块的n个比特;所述第一奇偶校验结果的校验对象还包括所述第二边界比特块的连续的m个比特,所述第二奇偶校验结果的校验对象还包括所述第二边界比特块的连续的n个比特。The method according to claim 12 or 14, wherein the check object of the third parity result further comprises consecutive m bits of the second boundary bit block, the fourth parity The resulting check object further includes n bits of the second boundary bit block; the check object of the first parity result further includes consecutive m bits of the second boundary bit block, the first The check object of the second parity result further includes consecutive n bits of the second boundary bit block.
- 如权利要求12-15所述的方法,其特征在于,每个比特块的类型为M1/M2比特块,其中,M1表示每个比特块中的净荷比特数,M2表示每个比特块的总比特数,M2-M1表示每个比特块中的首部同步头比特数,M1、M2为正整数,M2>M1。The method according to claims 12-15, characterized in that each type of bit block is an M1/M2 bit block, wherein M1 represents the number of payload bits in each bit block, and M2 represents the block number of each bit block. The total number of bits, M2-M1, represents the number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
- 如权利要求12-16任一项所述的方法,其特征在于,接收第二边界比特块,包括:The method of any of claims 12-16, wherein receiving the second boundary bit block comprises:在第一时刻接收第二边界比特块;Receiving a second boundary bit block at a first time;接收第一奇偶校验结果和第二奇偶校验结果,包括:Receiving the first parity result and the second parity result, including:在第二时刻接收第一奇偶校验结果和第二奇偶校验结果,其中,所述第一时刻早于所述第二时刻,或所述第一时刻晚于所述第二时刻,所述第一时刻等于所述第二时刻。Receiving, at a second time, a first parity result and a second parity result, wherein the first time is earlier than the second time, or the first time is later than the second time, The first moment is equal to the second moment.
- 如权利要求12-17任一项所述的方法,其特征在于,所述第一奇偶校验结果和所述第二奇偶校验结果存储于所述第二边界比特块中。The method of any of claims 12-17, wherein the first parity result and the second parity result are stored in the second boundary bit block.
- 如权利要求12-18任一项所述的方法,其特征在于,所述第三奇偶校验结果和所述第四奇偶校验结果是根据预设校验算法计算得到的,所述预设校验算法用于当所述T个比特块中增加或减少第一比特块时不改变所述第三奇偶校验结果和所述第四奇偶校验结果,所述第一比特块是指在所述T个比特块的传输过程中可能插入所述T个比特块或从所述T个比特块中删除的比特块。The method according to any one of claims 12 to 18, wherein the third parity result and the fourth parity result are calculated according to a preset check algorithm, the preset a check algorithm for not changing the third parity result and the fourth parity result when the first bit block is added or decreased in the T bit blocks, where the first bit block refers to The T bit blocks or bit blocks deleted from the T bit blocks may be inserted during transmission of the T bit blocks.
- 如权利要求19所述的方法,其特征在于,所述预设校验算法为xBIP-y算法,其中,x是指连续比特交织的比特数,x是根据所述第一比特块的码型定义确定的,y是指监视区段的个数,x,y为正整数,y≥2;The method according to claim 19, wherein said preset check algorithm is an xBIP-y algorithm, wherein x is a number of bits of consecutive bit interleaving, and x is a pattern according to said first block of bits Defining the definition, y refers to the number of monitoring segments, x, y is a positive integer, y ≥ 2;确定第三奇偶校验结果和第四奇偶校验结果,包括:Determining the third parity result and the fourth parity result, including:从所述T个比特块中的第1净荷比特开始,将每个比特块的每x个连续比特依次记录至第1个监视区段至第y个监视区段;Starting from the first payload bit of the T bit blocks, every x consecutive bits of each bit block are sequentially recorded to the first monitoring segment to the yth monitoring segment;针对每个监视区段采用奇校验或偶校验确定1比特监视码,获得y比特监视码,所述y比特监视码中包括所述第三奇偶校验结果和所述第四奇偶校验结果。Determining a 1-bit monitoring code by using an odd or even parity for each monitoring section, obtaining a y-bit monitoring code, wherein the y-bit monitoring code includes the third parity result and the fourth parity result.
- 如权利要求19所述的方法,其特征在于,所述预设校验算法为flexBIP-z算法,其中,z是指监视区段的个数,每个监视区段对应的连续比特交织的比特数不全相同,z个监视区段分别对应的连续比特交织的比特数为A1、A2、A3……Az-1,Az,A1、A2、A 3……Az-1,Az,z为正整数,z≥2;The method according to claim 19, wherein the preset check algorithm is a flexBIP-z algorithm, wherein z is the number of monitored segments, and consecutive bit-interleaved bits corresponding to each monitored segment The number of consecutive bit interleaving corresponding to z monitoring sections is A1, A2, A3, ... Az-1, Az, A1, A2, A3, ... Az-1, Az, z are positive integers. , z≥2;确定第三奇偶校验结果和第四奇偶校验结果,包括:Determining the third parity result and the fourth parity result, including:从所述T个比特块中的第1净荷比特开始,将每个比特块的A1个连续比特记录至第1个监视区段,将所述A1个连续比特后的A2个连续比特记录至第2个监视区段,将所述A2个连续比特后的A3个连续比特记录至第3个监视区段,直至将所述Az-1个连续比特后的Az个连续比特记录至第z个监视区段;Starting from the first payload bit of the T bit blocks, recording A1 consecutive bits of each bit block to the first monitoring segment, and recording A2 consecutive bits after the A1 consecutive bits to The second monitoring section records A3 consecutive bits after the A2 consecutive bits to the third monitoring section until the Az consecutive bits after the Az-1 consecutive bits are recorded to the zth Monitoring section;针对每个监视区段采用奇校验或偶校验确定1比特监视码,获得z比特监视码,所述z比特监视码中包括所述第三奇偶校验结果和所述第四奇偶校验结果。Determining a 1-bit monitoring code by using an odd parity or an even parity for each monitoring section, obtaining a z-bit monitoring code including the third parity result and the fourth parity in the z-bit monitoring code result.
- 如权利要求12-20任一项所述的方法,其特征在于,根据所述第一奇偶校验结果和所述第三奇偶校验结果,以及所述第二奇偶校验结果和所述第四奇偶校验结果,确定所述T个比特块是否存在误码,包括:The method according to any one of claims 12 to 20, wherein the first parity result and the third parity result, and the second parity result and the first And determining, by the four parity results, whether the T bit blocks have an error, including:若确定所述第一奇偶校验结果和所述第三奇偶校验结果相同,且所述第二奇偶校验结果和所述第四奇偶校验结果相同,则确定所述T个比特块不存在误码;If it is determined that the first parity result and the third parity result are the same, and the second parity result and the fourth parity result are the same, determining that the T bit blocks are not There is a bit error;若确定所述第一奇偶校验结果和所述第三奇偶校验结果不相同,和/或所述第二奇偶校验结果和所述第四奇偶校验结果不相同,则确定所述T个比特块存在误码。Determining the T if it is determined that the first parity result and the third parity result are not the same, and/or the second parity result and the fourth parity result are not the same There are bit errors in the bit blocks.
- 如权利要求19所述的方法,其特征在于,接收第一奇偶校验结果和第二奇偶校验结果,包括:The method of claim 19, wherein receiving the first parity result and the second parity result comprises:接收第一校验结果集合,所述第一校验结果集合是根据xBIP-y算法计算得到的,所述第一校验结果集合包括的y比特监视码中包括所述第一奇偶校验结果和所述第二奇偶校验结果;Receiving a first check result set, where the first check result set is calculated according to an xBIP-y algorithm, where the first check result set includes a y bit monitor code including the first parity result And the second parity result;确定第三奇偶校验结果和第四奇偶校验结果,包括:Determining the third parity result and the fourth parity result, including:确定第二校验结果集合,所述第二奇偶校验结果是根据所述xBIP-y算法计算得到的,所述第二校验结果集合包括的y比特监视码中包括所述第三奇偶校验结果和所述第三奇偶校验结果;Determining a second parity result set, the second parity result being calculated according to the xBIP-y algorithm, where the second parity result set includes a third parity check code included in the y-bit monitoring code And the third parity result;当接收到第一奇偶校验结果和第二奇偶校验结果时,根据所述第一奇偶校验结果和所述第三奇偶校验结果,以及所述第二奇偶校验结果和所述第四奇偶校验结果,确定所述T个比特块是否存在误码,包括:When receiving the first parity result and the second parity result, according to the first parity result and the third parity result, and the second parity result and the first And determining, by the four parity results, whether the T bit blocks have an error, including:根据所述第一校验结果集合和所述第二校验结果集合,确定所述T个比特块是否存在误码。Determining whether the T bit blocks have an error according to the first check result set and the second check result set.
- 如权利要求20所述的方法,其特征在于,接收第一奇偶校验结果和第二奇偶校验结果,包括:The method of claim 20, wherein receiving the first parity result and the second parity result comprises:接收第一校验结果集合,所述第一校验结果集合是根据flexBIP-z算法计算得到的,所述第一校验结果集合包括的z比特监视码中包括所述第一奇偶校验结果和所述第二奇偶校验结果;Receiving a first check result set, where the first check result set is calculated according to a flexBIP-z algorithm, where the first check result set includes a z-bit monitoring code including the first parity result And the second parity result;确定第三奇偶校验结果和第四奇偶校验结果,包括:Determining the third parity result and the fourth parity result, including:确定第二校验结果集合,所述第二校验结果集合是根据所述flexBIP-z算法计算得到的,所述第二校验结果集合包括的z比特监视码中包括所述第三奇偶校验结果和所述第四奇偶校验结果;Determining a second set of check results, the second set of check results being calculated according to the flexBIP-z algorithm, where the z-bit monitoring code included in the second set of check results includes the third parity And the fourth parity result;当接收到第一奇偶校验结果和第二奇偶校验结果时,根据所述第一奇偶校验结果和所述第三奇偶校验结果,以及所述第二奇偶校验结果和所述第四奇偶校验结果,确定所述T 个比特块是否存在误码,包括:When receiving the first parity result and the second parity result, according to the first parity result and the third parity result, and the second parity result and the first And determining, by the four parity results, whether the T bit blocks have an error, including:根据所述第一校验结果集合和所述第二校验结果集合,确定所述T个比特块是否存在误码。Determining whether the T bit blocks have an error according to the first check result set and the second check result set.
- 如权利要求23或24所述的方法,其特征在于,根据所述第一校验结果集合和所述第二校验结果集合,确定所述T个比特块是否存在误码,包括:The method according to claim 23 or 24, wherein determining whether the T bit blocks have an error according to the first verification result set and the second verification result set comprises:若确定所述第一校验结果集合和所述第二校验结果集合相同,则确定所述T个比特块不存在误码;If it is determined that the first verification result set and the second verification result set are the same, determining that the T bit blocks have no error;若确定所述第一校验结果集合和所述第二校验结果集合不相同,则确定所述T个比特块存在误码。If it is determined that the first verification result set and the second verification result set are different, it is determined that the T bit blocks have an error.
- 一种比特块流误码检测方法,其特征在于,包括:A bit block stream error detection method, comprising:第一设备根据比特块流中起始块中的起始字节和与所述起始块对应的结束块中的结束字节确定被检测区段;Determining, by the first device, the detected segment according to a start byte in the start block in the bit block stream and an end byte in the end block corresponding to the start block;所述第一设备根据所述被检测区段计算第一校验结果;The first device calculates a first verification result according to the detected segment;所述第一设备发送所述第一校验结果和所述比特块流。The first device sends the first check result and the bit block stream.
- 如权利要求26所述的方法,其特征在于,所述比特块流包括至少一个M1/M2比特块;其中,M1表示每个比特块中的净荷比特数,M2表示每个比特块的总比特数,M2-M1表示每个比特块中的首部同步头比特数,M1、M2为正整数,M2>M1。The method of claim 26 wherein said bit block stream comprises at least one M1/M2 bit block; wherein M1 represents the number of payload bits in each bit block and M2 represents the total of each bit block The number of bits, M2-M1, represents the number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
- 如权利要求26或27所述的方法,其特征在于,所述第一设备发送所述第一校验结果和所述比特块流,包括:The method of claim 26 or 27, wherein the transmitting, by the first device, the first verification result and the bit block stream comprises:所述第一设备发送所述第一校验结果和所述比特块流至第二设备;Transmitting, by the first device, the first verification result and the bit block stream to a second device;或者,所述第一设备发送所述第一校验结果至第三设备,发送所述比特块流至所述第二设备。Or the first device sends the first check result to the third device, and sends the bit block stream to the second device.
- 如权利要求26-28任一项所述的方法,其特征在于,在所述第一设备将所述第一校验结果和所述比特块流发送至第二设备之前,还包括:The method according to any one of claims 26 to 28, further comprising: before the first device sends the first verification result and the bit block stream to the second device,所述第一设备将所述第一校验结果存储于所述结束块,获得更新后的结束块;The first device stores the first verification result in the end block, and obtains an updated end block;或者,所述第一设备将所述第一校验结果存储于校验结果存储块,并删除所述比特块流中的任一第一比特块,其中,所述校验结果存储块是指位于所述结束块之前的一个新增块,所述第一比特块是指在所述比特块流的传输过程中可能插入所述比特块流或从所述比特块流中删除的比特块。Or the first device stores the first check result in a check result storage block, and deletes any first bit block in the bit block stream, where the check result storage block refers to A new block located before the end block, the first bit block being a bit block that may be inserted into or deleted from the bit block stream during transmission of the bit block stream.
- 如权利要求29所述的方法,其特征在于,所述第一设备将所述第一校验结果存储于所述结束块,获得更新后的结束块,包括:The method of claim 29, wherein the first device stores the first verification result in the end block, and obtains an updated end block, including:当所述第一校验结果占用的字节数大于等于目标字节数时,所述第一设备将所述第一校验结果存储于所述结束块中的所述结束字节之前,并根据所述第一校验结果占用的字节数将所述结束字节移至所述结束块后的一个新增块,删除所述比特块流中的任一第一比特块,将所述结束字节移动后所在的新增块作为更新后的结束块;When the number of bytes occupied by the first check result is greater than or equal to the target number of bytes, the first device stores the first check result before the end byte in the end block, and And moving the end byte to a new block after the end block according to the number of bytes occupied by the first check result, deleting any first bit block in the bit block stream, The new block where the end byte is moved is used as the updated end block;当所述第一校验结果占用的字节数小于所述目标字节数时,所述第一设备将所述第一校验结果存储于所述结束块中的所述结束字节之前,并根据所述第一校验结果占用的字节数将所述结束字节后移所述第一校验结果占用的字节数,将所述结束字节移动后所在的比特块作为更新后的结束块;When the number of bytes occupied by the first check result is less than the target number of bytes, the first device stores the first check result before the end byte in the end block, And moving the end byte back to the number of bytes occupied by the first check result according to the number of bytes occupied by the first check result, and using the bit block in which the end byte is moved as an update End block其中,所述目标字节数为所述结束块中位于所述结束字节后的字节数加1。The target number of bytes is the number of bytes in the end block after the end byte plus one.
- 一种比特块流误码检测方法,其特征在于,包括:A bit block stream error detection method, comprising:第二设备根据比特块流中起始块中的起始字节和与所述起始块对应的结束块中的结束字节确定被检测区段;The second device determines the detected segment according to a start byte in the start block in the bit block stream and an end byte in the end block corresponding to the start block;所述第二设备根据所述被检测区段计算第二校验结果;The second device calculates a second verification result according to the detected segment;当所述第二设备接收到第一校验结果时,所述第二设备根据所述第一校验结果与第二校验结果,确定所述被检测区段是否存在误码。When the second device receives the first verification result, the second device determines, according to the first verification result and the second verification result, whether the detected segment has an error.
- 如权利要求31所述的方法,其特征在于,所述比特块流包括至少一个M1/M2比特块;其中,M1表示每个比特块中的净荷比特数,M2表示每个比特块的总比特数,M2-M1表示每个比特块中的首部同步头比特数,M1、M2为正整数,M2>M1。The method of claim 31 wherein said bit block stream comprises at least one M1/M2 bit block; wherein M1 represents the number of payload bits in each bit block and M2 represents the total of each bit block The number of bits, M2-M1, represents the number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
- 如权利要求31或32所述的方法,其特征在于,第二设备根据比特块流中起始块中的起始字节和与所述起始块对应的结束块中的结束字节确定被检测区段,包括:The method according to claim 31 or 32, wherein the second device determines, according to the start byte in the start block in the bit block stream and the end byte in the end block corresponding to the start block, Detection section, including:当所述第二设备接收到第一校验结果,且所述第一校验结果存储于所述结束块时,所述第二设备将所述第二校验结果从所述结束块中删除,获得更新后的结束块,将所述起始块中的起始字节和所述更新后的结束块中的结束字节之间的字节作为被检测区段;When the second device receives the first verification result, and the first verification result is stored in the end block, the second device deletes the second verification result from the end block Obtaining an updated end block, taking a byte between the start byte in the start block and the end byte in the updated end block as a detected segment;当所述第二设备接收到第一校验结果,且所述第一校验结果存储于校验结果存储块时,所述第二设备将所述校验结果存储块从所述比特块流中删除,获得更新后的比特块流,将所述更新后的比特块流中所述起始块中的起始字节和所述结束块中的结束字节之间的字节作为被检测区段,其中,所述校验结果存储块位于所述结束块之前;When the second device receives the first verification result, and the first verification result is stored in the verification result storage block, the second device streams the verification result storage block from the bit block Deleting, obtaining an updated bit block stream, detecting, as the detected byte between the start byte in the start block and the end byte in the end block in the updated bit block stream a segment, wherein the check result storage block is located before the end block;当所述第二设备未接收到第一校验结果时,所述第二设备将所述比特块流中所述起始块中的起始字节和所述结束块中的结束字节之间的字节作为被检测区段。When the second device does not receive the first check result, the second device sets a start byte in the start block and an end byte in the end block in the bit block stream. Between the bytes as the detected segment.
- 如权利要求31-33任一项所述的方法,其特征在于,还包括:The method of any of claims 31-33, further comprising:当所述第二设备未接收到第一校验结果时,所述第二设备将所述第二校验结果发送至第三设备,所述第三设备存储有所述第一校验结果。When the second device does not receive the first verification result, the second device sends the second verification result to the third device, where the third device stores the first verification result.
- 如权利要求31-34任一项所述的方法,其特征在于,所述第二设备根据所述第一校验结果与第二校验结果,确定所述被检测区段是否存在误码,包括:The method according to any one of claims 31 to 34, wherein the second device determines whether the detected segment has an error according to the first verification result and the second verification result. include:所述第二设备若确定所述第一校验结果与第二校验结果相同,则确定所述被检测区段不存在误码;If the second device determines that the first verification result is the same as the second verification result, determining that the detected segment does not have an error;若确定所述第一校验结果与第二校验结果不同,则确定所述被检测区段存在误码。If it is determined that the first check result is different from the second check result, it is determined that the detected segment has an error.
- 如权利要求33所述的方法,其特征在于,所述第二设备将所述第一校验结果从所述结束块中删除,获得更新后的结束块,包括:The method according to claim 33, wherein the second device deletes the first verification result from the end block to obtain an updated end block, including:当所述第一校验结果占用的字节数大于等于目标字节数时,所述第二设备根据所述第一校验结果占用的字节数将所述结束字节移至所述结束块前的一个比特块,在所述比特块流中新增一个第一比特块,将所述结束字节移动后所在的比特块作为更新后的结束块;When the number of bytes occupied by the first check result is greater than or equal to the target number of bytes, the second device moves the end byte to the end according to the number of bytes occupied by the first check result. a bit block in front of the block, adding a first bit block to the bit block stream, and using the bit block in which the end byte is moved as an updated end block;当所述第一校验结果占用的字节数小于所述目标字节数时,所述第二设备根据所述第一校验结果占用的字节数将所述结束字节前移所述第一校验结果占用的字节数,将所述结束字节移动后所在的比特块作为更新后的结束块;When the number of bytes occupied by the first check result is less than the target number of bytes, the second device advances the end byte according to the number of bytes occupied by the first check result. The number of bytes occupied by the first check result, and the bit block in which the end byte is moved is used as the updated end block;其中,所述目标字节数为所述结束块中位于所述结束字节前的字节数加1。The target number of bytes is the number of bytes in the end block before the end byte plus one.
- 一种比特块流误码检测设备,其特征在于,包括:A bit block stream error detecting device, comprising:收发器,用于发送第一边界比特块,所述第一边界比特块用于区别后续发送的N个比特块,N为正整数;依次发送第I比特块,I为大于等于1小于等于N的整数;The transceiver is configured to send a first boundary bit block, where the first boundary bit block is used to distinguish the N bit blocks that are subsequently sent, and N is a positive integer; the first bit block is sequentially sent, and I is greater than or equal to 1 and less than or equal to N. Integer处理器,用于确定第一奇偶校验结果和第二奇偶校验结果,所述第一奇偶校验结果的校验对象包括所述N个比特块中每个比特块的连续的m个比特,所述第二奇偶校验结果的校验对象包括所述N个比特块中每个比特块的连续的n个比特,m、n中的至少一个大于等于2;a processor, configured to determine a first parity result and a second parity result, where the check object of the first parity result includes consecutive m bits of each of the N bit blocks The check object of the second parity result includes consecutive n bits of each of the N bit blocks, at least one of m and n being greater than or equal to 2;所述收发器,还用于发送第二边界比特块、所述第一奇偶校验结果和所述第二奇偶校验结果,所述第二边界比特块用于区别已经发送完成的所述N个比特块。The transceiver is further configured to send a second boundary bit block, the first parity result, and the second parity result, where the second boundary bit block is used to distinguish the N that has been sent Bit blocks.
- 如权利要求37所述的设备,其特征在于,所述第一奇偶校验结果的校验对象还包括所述第一边界比特块的连续的m个比特,所述第二奇偶校验结果的校验对象还包括所述第一边界比特块的连续的n个比特。The device according to claim 37, wherein the check object of the first parity result further comprises consecutive m bits of the first boundary bit block, the second parity result The check object also includes consecutive n bits of the first boundary bit block.
- 如权利要求37或38所述的设备,其特征在于,所述第一奇偶校验结果的校验对象还包括所述第二边界比特块的连续的m个比特,所述第二奇偶校验结果的校验对象还包括所述第二边界比特块的连续的n个比特。The apparatus according to claim 37 or 38, wherein the check object of the first parity result further comprises consecutive m bits of the second boundary bit block, the second parity The resulting check object also includes consecutive n bits of the second boundary bit block.
- 如权利要求37所述的设备,其特征在于,每个比特块的类型为M1/M2比特块,其中,M1表示每个比特块中的净荷比特数,M2表示每个比特块的总比特数,M2-M1表示每个比特块中的首部同步头比特数,M1、M2为正整数,M2>M1。The apparatus according to claim 37, wherein each type of the bit block is an M1/M2 bit block, wherein M1 represents the number of payload bits in each bit block, and M2 represents the total bit of each bit block. The number, M2-M1, represents the number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
- 如权利要求37-40所述的设备,其特征在于,所述收发器,用于:The device of any of claims 37-40, wherein said transceiver is for:发送第一边界比特块至第一设备;Transmitting a first boundary bit block to the first device;依次发送第I比特块至所述第一设备;Transmitting the first bit block to the first device in sequence;发送第二边界比特块、所述第一奇偶校验结果和所述第二奇偶校验结果至所述第一设备;Transmitting a second boundary bit block, the first parity result, and the second parity result to the first device;或者,发送第二边界比特块至所述第一设备,发送所述第一奇偶校验结果和所述第二奇偶校验结果至第二设备。Or sending a second boundary bit block to the first device, and sending the first parity result and the second parity result to the second device.
- 如权利要求37-41任一项所述的设备,其特征在于,所述收发器,用于:The device according to any one of claims 37 to 41, wherein the transceiver is configured to:在第一时刻发送第二边界比特块,在第二时刻发送第一奇偶校验结果和第二奇偶校验结果,其中,所述第一时刻早于所述第二时刻,或所述第一时刻晚于所述第二时刻,所述第一时刻等于所述第二时刻。Transmitting a second boundary bit block at a first time, and transmitting a first parity result and a second parity result at a second time, wherein the first time is earlier than the second time, or the first The time is later than the second time, the first time is equal to the second time.
- 如权利要求37-41任一项所述的设备,其特征在于,所述第一奇偶校验结果和所述第二奇偶校验结果存储于所述第二边界比特块中。The apparatus of any of claims 37-41, wherein the first parity result and the second parity result are stored in the second boundary bit block.
- 如权利要求37-43任一项所述的设备,其特征在于,所述第一奇偶校验结果和所述第二奇偶校验结果是根据预设校验算法计算得到的,所述预设校验算法用于当所述N个比特块中增加或减少第一比特块时不改变所述第一奇偶校验结果和所述第二奇偶校验结果,所述第一比特块是指在所述N个比特块的传输过程中可能插入所述N个比特块或从所述N个比特块中删除的比特块。The device according to any one of claims 37 to 43, wherein the first parity result and the second parity result are calculated according to a preset check algorithm, the preset a check algorithm for not changing the first parity result and the second parity result when the first bit block is added or decreased in the N bit blocks, where the first bit block refers to The N bit blocks or bit blocks deleted from the N bit blocks may be inserted during transmission of the N bit blocks.
- 如权利要求43所述的设备,其特征在于,所述预设校验算法为xBIP-y算法,其中,x是指连续比特交织的比特数,x是根据所述第一比特块的码型定义确定的,y是指监视区段的个数,x,y为正整数,y≥2;The device according to claim 43, wherein the preset check algorithm is an xBIP-y algorithm, wherein x is a number of bits of consecutive bit interleaving, and x is a pattern according to the first bit block Defining the definition, y refers to the number of monitoring segments, x, y is a positive integer, y ≥ 2;所述处理器,用于从所述N个比特块中的第1净荷比特开始,将每个比特块的每x个连续比特依次记录至第1个监视区段至第y个监视区段;The processor, for starting from the first payload bit of the N bit blocks, sequentially recording every x consecutive bits of each bit block to the first monitoring segment to the yth monitoring segment ;针对每个监视区段采用奇校验或偶校验确定1比特监视码,获得y比特监视码,所述y比特监视码中包括所述第一奇偶校验结果和所述第二奇偶校验结果。Determining a 1-bit monitoring code by using an odd or even parity for each monitoring section, obtaining a y-bit monitoring code, the y-bit monitoring code including the first parity result and the second parity result.
- 如权利要求43所述的设备,其特征在于,所述预设校验算法为flexBIP-z算法,其中,z是指监视区段的个数,每个监视区段对应的连续比特交织的比特数不全相同,z个监视区段分别对应的连续比特交织的比特数为A1、A2、A3……Az-1,Az,A1、A2、A3……Az-1,Az,z为正整数,z≥2;The device according to claim 43, wherein the preset check algorithm is a flexBIP-z algorithm, where z is the number of monitored segments, and consecutive bit interleaved bits corresponding to each monitored segment The number of consecutive bit interleaving corresponding to z monitoring sections is A1, A2, A3, ... Az-1, Az, A1, A2, A3, ..., Az-1, Az, z are positive integers. Z≥2;所述处理器,用于从所述N个比特块中的第1净荷比特开始,将每个比特块中的A1个连续比特记录至第1个监视区段,将所述A1个连续比特后的A2个连续比特记录至第2个监视区段,将所述A2个连续比特后的A3个连续比特记录至第3个监视区段,直至将所述Az-1个连续比特后的Az个连续比特记录至第z个监视区段;The processor, configured to record, according to a first payload bit of the N bit blocks, A1 consecutive bits in each bit block to a first monitoring segment, where the A1 consecutive bits The last A2 consecutive bits are recorded to the second monitoring segment, and the A3 consecutive bits after the A2 consecutive bits are recorded to the third monitoring segment until the Az-1 consecutive bits are followed by Az. Continuous bits are recorded to the zth monitoring section;针对每个监视区段采用奇校验或偶校验确定1比特监视码,获得z比特监视码,所述z比特监视码中包括所述第一奇偶校验结果和所述第二奇偶校验结果。Determining a 1-bit monitoring code by using an odd or even parity for each monitoring section, obtaining a z-bit monitoring code, the z-bit monitoring code including the first parity result and the second parity result.
- 如权利要求45或46所述的设备,其特征在于,所述处理器,用于:The device according to claim 45 or 46, wherein the processor is configured to:确定第一校验结果集合,所述第一校验结果集合包括所述y比特监视码,或者,所述第一校验结果集合包括所述z比特监视码;Determining a first verification result set, the first verification result set includes the y-bit monitoring code, or the first verification result set includes the z-bit monitoring code;所述收发器,用于:The transceiver is configured to:发送所述第一校验结果集合。Sending the first set of verification results.
- 一种比特块流误码检测设备,其特征在于,包括:A bit block stream error detecting device, comprising:收发器,用于接收第一边界比特块,所述第一边界比特块用于区别后续接收的T个比特块,T为正整数;依次接收第I比特块,I为大于等于1小于等于T的整数;接收第二边界比特块,所述第二边界比特块用于区别已经接收完成的所述T个比特块;a transceiver, configured to receive a first boundary bit block, where the first boundary bit block is used to distinguish T bits that are subsequently received, T is a positive integer; and the first bit block is sequentially received, where I is greater than or equal to 1 and less than or equal to T An integer that receives a second boundary bit block, the second boundary bit block being used to distinguish the T bit blocks that have been received;处理器,用于确定第三奇偶校验结果和第四奇偶校验结果,所述第三奇偶校验结果的校验对象包括所述T个比特块中每个比特块的连续的m个比特,所述第四奇偶校验结果的校验对象包括所述T个比特块中每个比特块的连续的n个比特,m、n中的至少一个大于等于2;当通过所述收发器接收到第一奇偶校验结果和第二奇偶校验结果时,根据所述第一奇偶校验结果和所述第三奇偶校验结果,以及所述第二奇偶校验结果和所述第四奇偶校验结果,确定所述T个比特块是否存在误码,其中,所述第一奇偶校验结果的校验对象包括N个比特块中每个比特块的连续的m个比特,所述第二奇偶校验结果的校验对象包括所述N个比特块中每个比特块的连续的n个比特,N为确定所述第一奇偶校验结果和所述第二奇偶校验结果时所述第一边界比特块和所述第二边界比特块之间的比特块的数目。a processor, configured to determine a third parity result and a fourth parity result, where the check object of the third parity result includes consecutive m bits of each of the T bit blocks The check object of the fourth parity result includes consecutive n bits of each of the T bit blocks, at least one of m, n being greater than or equal to 2; when received by the transceiver And the first parity result and the third parity result, and the second parity result and the fourth parity according to the first parity result and the second parity result a check result, determining whether the T bit block has an error, wherein the check object of the first parity result includes consecutive m bits of each of the N bit blocks, the The check object of the second parity result includes consecutive n bits of each of the N bit blocks, where N is the result of determining the first parity result and the second parity result a bit between the first boundary bit block and the second boundary bit block The number of blocks.
- 如权利要求48所述的设备,其特征在于,所述收发器还用于:The device of claim 48, wherein the transceiver is further configured to:当未接收到第一奇偶校验结果和第二奇偶校验结果时,发送所述第三奇偶校验结果和所述第四奇偶校验结果至第二设备,所述第二设备存储有所述第一奇偶校验结果和所述第二奇偶校验结果。Transmitting the third parity result and the fourth parity result to a second device when the first parity result and the second parity result are not received, where the second device stores The first parity result and the second parity result are described.
- 如权利要求48所述的设备,其特征在于,所述第三奇偶校验结果的校验对象还包括所述第一边界比特块的连续的m个比特,所述第四奇偶校验结果的校验对象还包括所述第一边界比特块的n个比特;所述第一奇偶校验结果的校验对象还包括所述第一边界比特块的连续的m个比特,所述第二奇偶校验结果的校验对象还包括所述第一边界比特块的连续的n个比特。The device according to claim 48, wherein the check object of the third parity result further comprises consecutive m bits of the first boundary bit block, the fourth parity result The check object further includes n bits of the first boundary bit block; the check object of the first parity result further includes consecutive m bits of the first boundary bit block, the second parity The check object of the check result further includes consecutive n bits of the first boundary bit block.
- 如权利要求48或50所述的设备,其特征在于,所述第三奇偶校验结果的校验对象还包括所述第二边界比特块的连续的m个比特,所述第四奇偶校验结果的校验对象还包括所述第二边界比特块的n个比特;所述第一奇偶校验结果的校验对象还包括所述第二边 界比特块的连续的m个比特,所述第二奇偶校验结果的校验对象还包括所述第二边界比特块的连续的n个比特。The apparatus according to claim 48 or 50, wherein the check object of the third parity result further comprises consecutive m bits of the second boundary bit block, the fourth parity The resulting check object further includes n bits of the second boundary bit block; the check object of the first parity result further includes consecutive m bits of the second boundary bit block, the first The check object of the second parity result further includes consecutive n bits of the second boundary bit block.
- 如权利要求48-51所述的设备,其特征在于,每个比特块的类型为M1/M2比特块,其中,M1表示每个比特块中的净荷比特数,M2表示每个比特块的总比特数,M2-M1表示每个比特块中的首部同步头比特数,M1、M2为正整数,M2>M1。The apparatus according to claims 48-51, wherein the type of each bit block is an M1/M2 bit block, wherein M1 represents the number of payload bits in each bit block, and M2 represents the block number of each bit block. The total number of bits, M2-M1, represents the number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
- 如权利要求48-52任一项所述的设备,其特征在于,所述收发器用于:The device of any of claims 48-52, wherein the transceiver is for:在第一时刻接收第二边界比特块;Receiving a second boundary bit block at a first time;在第二时刻接收第一奇偶校验结果和第二奇偶校验结果,其中,所述第一时刻早于所述第二时刻,或所述第一时刻晚于所述第二时刻,所述第一时刻等于所述第二时刻。Receiving, at a second time, a first parity result and a second parity result, wherein the first time is earlier than the second time, or the first time is later than the second time, The first moment is equal to the second moment.
- 如权利要求48-53任一项所述的设备,其特征在于,所述第一奇偶校验结果和所述第二奇偶校验结果存储于所述第二边界比特块中。The apparatus of any of claims 48-53, wherein the first parity result and the second parity result are stored in the second boundary bit block.
- 如权利要求48-54任一项所述的设备,其特征在于,所述第三奇偶校验结果和所述第四奇偶校验结果是根据预设校验算法计算得到的,所述预设校验算法用于当所述T个比特块中增加或减少第一比特块时不改变所述第三奇偶校验结果和所述第四奇偶校验结果,所述第一比特块是指在所述T个比特块的传输过程中可能插入所述T个比特块或从所述T个比特块中删除的比特块。The device according to any one of claims 48 to 54, wherein the third parity result and the fourth parity result are calculated according to a preset check algorithm, the preset a check algorithm for not changing the third parity result and the fourth parity result when the first bit block is added or decreased in the T bit blocks, where the first bit block refers to The T bit blocks or bit blocks deleted from the T bit blocks may be inserted during transmission of the T bit blocks.
- 如权利55所述的设备,其特征在于,所述预设校验算法为xBIP-y算法,其中,x是指连续比特交织的比特数,x是根据所述第一比特块的码型定义确定的,y是指监视区段的个数,x,y为正整数,y≥2;The device according to claim 55, wherein the preset check algorithm is an xBIP-y algorithm, wherein x is a number of bits of consecutive bit interleaving, and x is a code type definition according to the first bit block Determined, y refers to the number of monitored segments, x, y is a positive integer, y ≥ 2;所述处理器,用于从所述T个比特块中的第1净荷比特开始,将每个比特块的每x个连续比特依次记录至第1个监视区段至第y个监视区段;The processor, for starting from the first payload bit of the T bit blocks, sequentially recording each x consecutive bits of each bit block to the first monitoring segment to the yth monitoring segment ;针对每个监视区段采用奇校验或偶校验确定1比特监视码,获得y比特监视码,所述y比特监视码中包括所述第三奇偶校验结果和所述第四奇偶校验结果。Determining a 1-bit monitoring code by using an odd or even parity for each monitoring section, obtaining a y-bit monitoring code, wherein the y-bit monitoring code includes the third parity result and the fourth parity result.
- 如权利要求55所述的设备,其特征在于,所述预设校验算法为flexBIP-z算法,其中,z是指监视区段的个数,每个监视区段对应的连续比特交织的比特数不全相同,z个监视区段分别对应的连续比特交织的比特数为A1、A2、A3……Az-1,Az,A1、A2、A3……Az-1,Az,z为正整数,z≥2;The device according to claim 55, wherein the preset check algorithm is a flexBIP-z algorithm, wherein z is a number of monitored segments, and consecutive bit-interleaved bits corresponding to each monitored segment The number of consecutive bit interleaving corresponding to z monitoring sections is A1, A2, A3, ... Az-1, Az, A1, A2, A3, ..., Az-1, Az, z are positive integers. Z≥2;所述处理器,用于从所述T个比特块中的第1净荷比特开始,将每个比特块的A1个连续比特记录至第1个监视区段,将所述A1个连续比特后的A2个连续比特记录至第2个监视区段,将所述A2个连续比特后的A3个连续比特记录至第3个监视区段,直至将所述Az-1个连续比特后的Az个连续比特记录至第z个监视区段;The processor is configured to record, according to a first payload bit of the T bit blocks, A1 consecutive bits of each bit block to a first monitoring segment, and after the A1 consecutive bits A2 consecutive bits are recorded to the second monitoring segment, and A3 consecutive bits after the A2 consecutive bits are recorded to the third monitoring segment until Az-1 consecutive bits are Az Continuous bits are recorded to the zth monitoring section;针对每个监视区段采用奇校验或偶校验确定1比特监视码,获得z比特监视码,所述z比特监视码中包括所述第三奇偶校验结果和所述第四奇偶校验结果。Determining a 1-bit monitoring code by using an odd parity or an even parity for each monitoring section, obtaining a z-bit monitoring code including the third parity result and the fourth parity in the z-bit monitoring code result.
- 如权利要求58-57任一项所述的设备,其特征在于,所述处理器,用于:The device of any of claims 58-57, wherein the processor is configured to:若确定所述第一奇偶校验结果和所述第三奇偶校验结果相同,且所述第二奇偶校验结果和所述第四奇偶校验结果相同,则确定所述T个比特块不存在误码;If it is determined that the first parity result and the third parity result are the same, and the second parity result and the fourth parity result are the same, determining that the T bit blocks are not There is a bit error;若确定所述第一奇偶校验结果和所述第三奇偶校验结果不相同,和/或所述第二奇偶校验结果和所述第四奇偶校验结果不相同,则确定所述T个比特块存在误码。Determining the T if it is determined that the first parity result and the third parity result are not the same, and/or the second parity result and the fourth parity result are not the same There are bit errors in the bit blocks.
- 如权利要求56所述的设备,其特征在于,所述收发器,用于:The device of claim 56, wherein said transceiver is for:接收第一校验结果集合,所述第一校验结果集合是根据xBIP-y算法计算得到的, 所述第一校验结果集合包括的y比特监视码中包括所述第一奇偶校验结果和所述第二奇偶校验结果;Receiving a first check result set, where the first check result set is calculated according to an xBIP-y algorithm, where the first check result set includes a y-bit monitoring code including the first parity result And the second parity result;所述处理器,用于:确定第二校验结果集合,所述第二奇偶校验结果是根据所述xBIP-y算法计算得到的,所述第二校验结果集合包括的y比特监视码中包括所述第三奇偶校验结果和所述第三奇偶校验结果;根据所述第一校验结果集合和所述第二校验结果集合,确定所述T个比特块是否存在误码。The processor is configured to: determine a second verification result set, where the second parity result is calculated according to the xBIP-y algorithm, and the second verification result set includes a y-bit monitoring code Include the third parity result and the third parity result; determining, according to the first verification result set and the second verification result set, whether the T bit block has a bit error .
- 如权利要求57所述的设备,其特征在于,所述收发器,用于:The device according to claim 57, wherein said transceiver is configured to:接收第一校验结果集合,所述第一校验结果集合是根据flexBIP-z算法计算得到的,所述第一校验结果集合包括的z比特监视码中包括所述第一奇偶校验结果和所述第二奇偶校验结果;Receiving a first check result set, where the first check result set is calculated according to a flexBIP-z algorithm, where the first check result set includes a z-bit monitoring code including the first parity result And the second parity result;所述处理器,用于:确定第二校验结果集合,所述第二校验结果集合是根据所述flexBIP-z算法计算得到的,所述第二校验结果集合包括的z比特监视码中包括所述第三奇偶校验结果和所述第四奇偶校验结果;根据所述第一校验结果集合和所述第二校验结果集合,确定所述T个比特块是否存在误码。The processor is configured to: determine a second verification result set, where the second verification result set is calculated according to the flexBIP-z algorithm, and the second verification result set includes a z-bit monitoring code Include the third parity result and the fourth parity result; determining, according to the first verification result set and the second verification result set, whether the T bit block has an error .
- 如权利要求59或60所述的设备,其特征在于,所述处理器,用于:The device according to claim 59 or 60, wherein the processor is configured to:若确定所述第一校验结果集合和所述第二校验结果集合相同,则确定所述T个比特块不存在误码;If it is determined that the first verification result set and the second verification result set are the same, determining that the T bit blocks have no error;若确定所述第一校验结果集合和所述第二校验结果集合不相同,则确定所述T个比特块存在误码。If it is determined that the first verification result set and the second verification result set are different, it is determined that the T bit blocks have an error.
- 一种比特块流误码检测设备,其特征在于,包括:A bit block stream error detecting device, comprising:处理器,用于根据比特块流中起始块中的起始字节和与所述起始块对应的结束块中的结束字节确定被检测区段;根据所述被检测区段计算第一校验结果;a processor, configured to determine, according to a start byte in a start block in a bit block stream and an end byte in an end block corresponding to the start block, a detected segment according to the detected segment; a check result;收发器,用于发送所述第一校验结果和所述比特块流。And a transceiver, configured to send the first verification result and the bit block stream.
- 如权利要求62所述的设备,其特征在于,所述比特块流包括至少一个M1/M2比特块;其中,M1表示每个比特块中的净荷比特数,M2表示每个比特块的总比特数,M2-M1表示每个比特块中的首部同步头比特数,M1、M2为正整数,M2>M1。The apparatus according to claim 62, wherein said bit block stream comprises at least one M1/M2 bit block; wherein M1 represents the number of payload bits in each bit block, and M2 represents the total of each bit block The number of bits, M2-M1, represents the number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
- 如权利要求62或63所述的设备,其特征在于,所述收发器,用于:The device according to claim 62 or 63, wherein the transceiver is configured to:发送所述第一校验结果和所述比特块流至第二设备;Transmitting the first verification result and the bit block to the second device;或者,发送所述第一校验结果至第三设备,发送所述比特块流至所述第二设备;Or sending the first verification result to the third device, and sending the bit block flow to the second device;
- 如权利要求62-64任一项所述的设备,其特征在于,所述处理器,还用于:The device according to any one of claims 62 to 64, wherein the processor is further configured to:在所述收发器将所述第一校验结果和所述比特块流发送至第二设备之前,将所述第一校验结果存储于所述结束块,获得更新后的结束块;或者,将所述第一校验结果存储于校验结果存储块,并删除所述比特块流中的任一第一比特块,其中,所述校验结果存储块是指位于所述结束块之前的一个新增块,所述第一比特块是指在所述比特块流的传输过程中可能插入所述比特块流或从所述比特块流中删除的比特块。Before the transceiver sends the first verification result and the bit block stream to the second device, storing the first verification result in the end block to obtain an updated end block; or Storing the first check result in a check result storage block, and deleting any first bit block in the bit block stream, where the check result storage block refers to being located before the end block A new block, the first bit block being a bit block that may be inserted into or deleted from the bit block stream during transmission of the bit block stream.
- 如权利要求65所述的设备,其特征在于,所述处理器,用于:The device according to claim 65, wherein said processor is configured to:当所述第一校验结果占用的字节数大于等于目标字节数时,将所述第一校验结果存储于所述结束块中的所述结束字节之前,并根据所述第一校验结果占用的字节数将所述结束字节移至所述结束块后的一个新增块,删除所述比特块流中的任一第一比特块,将所述结束字节移动后所在的新增块作为更新后的结束块;When the number of bytes occupied by the first verification result is greater than or equal to the target number of bytes, storing the first verification result before the end byte in the end block, and according to the first The number of bytes occupied by the verification result moves the end byte to a new block after the end block, deletes any first bit block in the bit block stream, and moves the end byte The new block is located as the updated end block;当所述第一校验结果占用的字节数小于所述目标字节数时,将所述第一校验结果存储于所述结束块中的所述结束字节之前,并根据所述第一校验结果占用的字节数将所述结束字节后移所述第一校验结果占用的字节数,将所述结束字节移动后所在的比特块作为更新后的结束块;When the number of bytes occupied by the first verification result is less than the target number of bytes, storing the first verification result before the end byte in the end block, and according to the The number of bytes occupied by a check result shifts the end byte back by the number of bytes occupied by the first check result, and the bit block where the end byte is moved is used as the updated end block;其中,所述目标字节数为所述结束块中位于所述结束字节后的字节数加1。The target number of bytes is the number of bytes in the end block after the end byte plus one.
- 一种比特块流误码检测设备,其特征在于,包括:A bit block stream error detecting device, comprising:处理器,用于根据比特块流中起始块中的起始字节和与所述起始块对应的结束块中的结束字节确定被检测区段;根据所述被检测区段计算第二校验结果;a processor, configured to determine, according to a start byte in a start block in a bit block stream and an end byte in an end block corresponding to the start block, a detected segment according to the detected segment; Second check result;当通过收发器接收到第一校验结果时,根据所述第一校验结果与第二校验结果,确定所述被检测区段是否存在误码。When receiving the first verification result by the transceiver, determining, according to the first verification result and the second verification result, whether the detected segment has an error.
- 如权利要求67所述的设备,其特征在于,所述比特块流包括至少一个M1/M2比特块;其中,M1表示每个比特块中的净荷比特数,M2表示每个比特块的总比特数,M2-M1表示每个比特块中的首部同步头比特数,M1、M2为正整数,M2>M1。The apparatus according to claim 67, wherein said bit block stream comprises at least one M1/M2 bit block; wherein M1 represents the number of payload bits in each bit block, and M2 represents the total of each bit block The number of bits, M2-M1, represents the number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
- 如权利要求67或68所述的设备,其特征在于,所述处理器,用于The device according to claim 67 or 68, wherein said processor is for当通过收发器接收到第一校验结果,且所述第一校验结果存储于所述结束块时,将所述第二校验结果从所述结束块中删除,获得更新后的结束块,将所述起始块中的起始字节和所述更新后的结束块中的结束字节之间的字节作为被检测区段;When the first check result is received by the transceiver, and the first check result is stored in the end block, the second check result is deleted from the end block, and the updated end block is obtained. a byte between the start byte in the start block and the end byte in the updated end block as a detected segment;当通过收发器接收到第一校验结果,且所述第一校验结果存储于校验结果存储块时,将所述校验结果存储块从所述比特块流中删除,获得更新后的比特块流,将所述更新后的比特块流中所述起始块中的起始字节和所述结束块中的结束字节之间的字节作为被检测区段,其中,所述校验结果存储块位于所述结束块之前;When the first verification result is received by the transceiver, and the first verification result is stored in the verification result storage block, the verification result storage block is deleted from the bit block stream, and the updated a bit block stream, the byte between the start byte in the start block and the end byte in the end block in the updated bit block stream is used as a detected segment, wherein a check result storage block is located before the end block;当未接收到第一校验结果时,将所述比特块流中所述起始块中的起始字节和所述结束块中的结束字节之间的字节作为被检测区段。When the first check result is not received, a byte between the start byte in the start block and the end byte in the end block in the bit block stream is taken as the detected segment.
- 如权利要求67-69任一项所述的设备,其特征在于,所述收发器还用于:The device of any of claims 67-69, wherein the transceiver is further configured to:当未接收到第一校验结果时,将所述第二校验结果发送至第三设备,所述第三设备存储有所述第一校验结果。When the first verification result is not received, the second verification result is sent to the third device, and the third device stores the first verification result.
- 如权利要求67-70任一项所述的设备,其特征在于,所述处理器,用于:The device according to any one of claims 67 to 70, wherein the processor is configured to:若确定所述第一校验结果与第二校验结果相同,则确定所述被检测区段不存在误码;If it is determined that the first verification result is the same as the second verification result, determining that the detected segment does not have an error;若确定所述第一校验结果与第二校验结果不同,则确定所述被检测区段存在误码。If it is determined that the first check result is different from the second check result, it is determined that the detected segment has an error.
- 如权利要求69所述的设备,其特征在于,所述处理器,用于:The device according to claim 69, wherein said processor is configured to:当所述第一校验结果占用的字节数大于等于目标字节数时,根据所述第一校验结果占用的字节数将所述结束字节移至所述结束块前的一个比特块,在所述比特块流中新增一个第一比特块,将所述结束字节移动后所在的比特块作为更新后的结束块;When the number of bytes occupied by the first check result is greater than or equal to the target number of bytes, moving the end byte to a bit before the end block according to the number of bytes occupied by the first check result Block, adding a first bit block to the bit block stream, and using the bit block in which the end byte is moved as an updated end block;当所述第一校验结果占用的字节数小于所述目标字节数时,根据所述第一校验结果占用的字节数将所述结束字节前移所述第一校验结果占用的字节数,将所述结束字节移动后所在的比特块作为更新后的结束块;When the number of bytes occupied by the first check result is less than the target number of bytes, the end byte is forwarded by the first check result according to the number of bytes occupied by the first check result The number of bytes occupied, the bit block in which the end byte is moved is used as the updated end block;其中,所述目标字节数为所述结束块中位于所述结束字节前的字节数加1。The target number of bytes is the number of bytes in the end block before the end byte plus one.
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP18806648.4A EP3637650A4 (en) | 2017-05-24 | 2018-05-10 | Code error detection method and device for bit block stream |
KR1020197037429A KR102268902B1 (en) | 2017-05-24 | 2018-05-10 | Code error detection method and device for bit block stream |
JP2019564840A JP7047233B2 (en) | 2017-05-24 | 2018-05-10 | Bit blockstream Bit error detection method and device |
EP23213598.8A EP4351005A2 (en) | 2017-05-24 | 2018-05-10 | Bit block stream bit error detection method and device |
US16/692,151 US10992315B2 (en) | 2017-05-24 | 2019-11-22 | Bit block stream bit error detection method and device |
US17/240,321 US11463104B2 (en) | 2017-05-24 | 2021-04-26 | Bit block stream bit error detection method and device |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710374518.5 | 2017-05-24 | ||
CN201710374518 | 2017-05-24 | ||
CN201710764932.7A CN108964837B (en) | 2017-05-24 | 2017-08-30 | Method and device for receiving and transmitting bit block stream |
CN201710764932.7 | 2017-08-30 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/692,151 Continuation US10992315B2 (en) | 2017-05-24 | 2019-11-22 | Bit block stream bit error detection method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018214743A1 true WO2018214743A1 (en) | 2018-11-29 |
Family
ID=64396206
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2018/086326 WO2018214743A1 (en) | 2017-05-24 | 2018-05-10 | Code error detection method and device for bit block stream |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2018214743A1 (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005053215A1 (en) * | 2003-11-28 | 2005-06-09 | Samsung Electronics Co., Ltd. | Error correction method and apparatus for low density parity check |
US20150256206A1 (en) * | 2014-03-06 | 2015-09-10 | Fujitsu Limited | Error detection device and error detecting method |
CN106375151A (en) * | 2016-08-31 | 2017-02-01 | 北京信而泰科技股份有限公司 | Ethernet error code test method and system |
CN106411511A (en) * | 2016-11-18 | 2017-02-15 | 浙江神州量子网络科技有限公司 | Multiparty quantum key distribution system error correction method |
-
2018
- 2018-05-10 WO PCT/CN2018/086326 patent/WO2018214743A1/en unknown
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005053215A1 (en) * | 2003-11-28 | 2005-06-09 | Samsung Electronics Co., Ltd. | Error correction method and apparatus for low density parity check |
US20150256206A1 (en) * | 2014-03-06 | 2015-09-10 | Fujitsu Limited | Error detection device and error detecting method |
CN106375151A (en) * | 2016-08-31 | 2017-02-01 | 北京信而泰科技股份有限公司 | Ethernet error code test method and system |
CN106411511A (en) * | 2016-11-18 | 2017-02-15 | 浙江神州量子网络科技有限公司 | Multiparty quantum key distribution system error correction method |
Non-Patent Citations (1)
Title |
---|
See also references of EP3637650A4 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7047233B2 (en) | Bit blockstream Bit error detection method and device | |
US11316802B2 (en) | Time transfer systems and methods over a stream of Ethernet blocks | |
CN108123813B (en) | Transmission method and device for operation, administration and maintenance OAM data | |
US11082199B2 (en) | Data transmission method in optical network and optical network device | |
US8705570B2 (en) | Communication device and communication method | |
CN109391461B (en) | Method and equipment for transparently transmitting service frequency | |
KR102324923B1 (en) | Detection block sending and receiving method, network device and system | |
CN112511266A (en) | Transmission method, detection method and device, acquisition method, network equipment and system | |
EP3876443A1 (en) | Service sending method and apparatus, service receiving method and apparatus, and system and storage medium | |
US7586950B1 (en) | Remote management interface | |
EP4160956A1 (en) | Method and apparatus for determining code block loss | |
KR102309444B1 (en) | Data encapsulation, transmission methods, devices and computer storage media | |
WO2019015462A1 (en) | Method for sending detection block and method for receiving detection block, and network device and system | |
WO2018214743A1 (en) | Code error detection method and device for bit block stream | |
US10771178B2 (en) | Method for sending and receiving optical transport network (OTN) signal, OTN device, and system | |
WO2021218721A1 (en) | Service processing method and apparatus | |
WO2020108392A1 (en) | Service bit stream processing method and apparatus | |
CN112751645A (en) | Communication method, device and storage medium | |
WO2024001230A1 (en) | Bearing method, communication equipment and storage medium | |
WO2010043128A1 (en) | Method and device for transmitting and receiving mapping overheads | |
ITMI951607A1 (en) | DEVICE AND METHOD FOR IMPLEMENTING ATM ADAPTATION LEVEL PROTOCOL FUNCTIONS (AAL) IN A NETWORK | |
CN113726475A (en) | Code block processing method and device | |
JPS62159933A (en) | Frame synchronizing detection circuit |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18806648 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2019564840 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2018806648 Country of ref document: EP Effective date: 20191206 |
|
ENP | Entry into the national phase |
Ref document number: 20197037429 Country of ref document: KR Kind code of ref document: A |