WO2018214743A1 - Code error detection method and device for bit block stream - Google Patents

Code error detection method and device for bit block stream Download PDF

Info

Publication number
WO2018214743A1
WO2018214743A1 PCT/CN2018/086326 CN2018086326W WO2018214743A1 WO 2018214743 A1 WO2018214743 A1 WO 2018214743A1 CN 2018086326 W CN2018086326 W CN 2018086326W WO 2018214743 A1 WO2018214743 A1 WO 2018214743A1
Authority
WO
WIPO (PCT)
Prior art keywords
bit
result
block
parity
bit block
Prior art date
Application number
PCT/CN2018/086326
Other languages
French (fr)
Chinese (zh)
Inventor
张小俊
钟其文
黄敬
查敏
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN201710764932.7A external-priority patent/CN108964837B/en
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP18806648.4A priority Critical patent/EP3637650A4/en
Priority to KR1020197037429A priority patent/KR102268902B1/en
Priority to JP2019564840A priority patent/JP7047233B2/en
Priority to EP23213598.8A priority patent/EP4351005A2/en
Publication of WO2018214743A1 publication Critical patent/WO2018214743A1/en
Priority to US16/692,151 priority patent/US10992315B2/en
Priority to US17/240,321 priority patent/US11463104B2/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received

Definitions

  • the present application relates to the field of communications technologies, and in particular, to a bit block stream error detection method and device.
  • Ethernet packet FCS check error when a Bit error is made, the BER of 1*e-5 is evaluated, and at least 100,000 Ethernet packets need to be continuously sent and received and detected. Assuming that the user service bandwidth is 10 Mbps, full traffic is sent, and the Ethernet packet length is 256 B, the detection time is at least 22.08 seconds. If the user service bandwidth is only 100Kbps and the Ethernet packet length is 256B, the detection time is at least 36.8 minutes (2208 seconds).
  • the FCS occupies 4 bytes, so the above method still has the problem of occupying more fixed frame bytes, and the bearer efficiency is lower.
  • the CRC-32 check is introduced.
  • the bearer efficiency is reduced by 6.25%.
  • the maximum packet is 1518B, the bearer efficiency is reduced by 0.263%.
  • bit error detection method based on bit interleaving parity (BIP) per frame, for example, in Synchronous Digital Hierarchy (SDH), an optical transport network (Optical Transport Network)
  • SDH Synchronous Digital Hierarchy
  • Optical Transport Network optical transport network
  • This method bears the efficiency rigidity and cannot dynamically define the check algorithm according to user requirements, such as BIP-8 downgrading to BIP-4, or upgrading to BIP. -16.
  • X-Ethernet is a Bit Block switching technology based on the Ethernet physical layer, such as 64/66 Bit Block, which has the technical characteristics of deterministic ultra-low latency.
  • the X-Ethernet is based on the M/N Bit block exchange.
  • the error detection method can be used to perform error detection. For example, the following two methods can be used:
  • Method 1 Borrowing a method based on PACKET for CRC detection, X-E arranges several Bits to perform CRC check on a block by block, for example, a 66Bit Block, which can set 4 or 8 Bits to perform CRC check on other 60 or 56 Bits.
  • Method 2 Borrow SDH/OTN mode, arrange one byte or several Bits to implement BIP check by block, such as a 66Bit Block, you can set 2-8 Bits to perform BIP check on other 62-56 Bits.
  • each block performs BIP-4/CRC-4 check, the bearer efficiency will decrease by 6.25%, and each block will be BIP-8/CRC-8, and the carrying efficiency will decrease. 12.5%.
  • the embodiment of the present invention provides a bit block stream error detection method and device, which are used to solve the problem that the error detection method in the M/N Bit block exchange scenario is difficult to implement and has low bearer efficiency.
  • a bit block stream error detection method includes: transmitting a first boundary bit block, where a first boundary bit block is used to distinguish N pieces of subsequent transmission, N is a positive integer; and transmitting a first bit block in sequence I is an integer greater than or equal to 1 and less than or equal to N; determining a first parity result and a second parity result, the check object of the first parity result including consecutive bits of each of the N bit blocks m bits, the parity object of the second parity result includes consecutive n bits of each of the N bit blocks, at least one of m and n being greater than or equal to 2; transmitting the second boundary bit block, A parity result and a second parity block are used to distinguish N bits that have been transmitted.
  • the method provided by the embodiment of the present application can completely implement the error or error detection of the M/N Bit Block network path, does not affect the user service, and has a bearer efficiency of 100%, and can be inserted or deleted due to the synchronization problem during the transmission process.
  • the bit block, and the detection period (ie, the number of bit blocks between the two boundary bit blocks) and the detection accuracy (ie, the preset algorithm) are dynamically configurable as needed.
  • the detection method can not only verify that the path of the bit fast stream is an end-to-end path, but also can use the path of the verified bit fast stream as a non-end-to-end path. Therefore, the method provided by the embodiment of the present application can solve the problem that the error detection method in the M/N Bit block exchange scenario is difficult to implement and has low bearer efficiency.
  • the execution body of the above method may be a bit block transmitting end.
  • the path of the verified bit fast stream is from the bit block transmitting end to the bit block receiving end
  • the path of the verified bit fast stream is an end-to-end path.
  • the path of the verified bit fast stream is any intermediate device from the bit block transmitting end to the bit block receiving end
  • the path of the verified bit fast stream is a path that is suspended at one end. This application is collectively referred to as a transmitting device.
  • the embodiment of the present application can be used not only for error detection of an end-to-end path, but also for error detection of a non-end-to-end path, for example, a planned reserved path, and a protection path of a 1:1 connection protection group. Or have other special purpose paths.
  • the path of the verified bit fast stream is the second intermediate device from the first intermediate device after the bit block transmitting end to the bit block receiving end
  • the execution body of the above method may be the first intermediate device.
  • the path of the bit fast stream being verified is a path that is suspended at both ends.
  • the type of each bit block is an M1/M2 bit block, where M1 represents the number of payload bits in each bit block, and M2 represents the total number of bits per bit block, M2-M1 Represents the number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
  • the sending the first boundary bit block includes: sending the first boundary bit block to the first device; and sequentially transmitting the first bit block, including: sequentially transmitting the first bit block to the first device;
  • the two boundary bit block, the first parity result, and the second parity result may include two cases: (1) transmitting the second boundary bit block, the first parity result, and the second parity result to the first a device; therefore, in the above implementation, the first parity result and the second parity result are sent to the first device together with the N bit blocks between the two boundary bit blocks and the two boundary bit blocks, when When the path of the verified bit fast stream is from the bit block transmitting end to the bit block receiving end, the first device here may be the bit block receiving end, and when the verified bit fast stream path is the bit block transmitting end When going to any intermediate device before the bit block receiving end, or when the path of the verified bit fast stream is the second intermediate device from the first intermediate device after the bit block transmitting end to the bit block receiving end, here the first A device can also be an intermediate device
  • the second device herein may be an SDN controller or any device having a function of determining a bit stream transmission error.
  • the two methods can also be used at the same time, that is, the first parity result and the second parity result are sent to both the first device and the second device. Therefore, the embodiments of the present application provide two optional ways to implement error detection, which is more flexible and efficient, and is simple to implement.
  • the second boundary bit block, the first parity result, and the second parity result are sent, and the following possible implementation manners are: sending the second boundary bit block at the first moment, in the first
  • the first parity result and the second parity result are sent at two moments, wherein the first moment is earlier than the second moment, or the first moment is later than the second moment, and the first moment is equal to the second moment.
  • the first parity result and the second parity result are stored in a second boundary bit block.
  • each N bit block in the bit block stream is a group
  • the i-th boundary bit block stores the first parity result and the second parity result corresponding to the i-th N-bit block
  • i +1 boundary bit block stores a first parity result and a second parity result corresponding to the i+1th group of N bit blocks
  • the i+1th group of N bit blocks is the ith boundary bit block
  • a bit block between the i+1th boundary bit block and i is a positive integer.
  • the boundary bit block mentioned in this application may be a newly inserted bit block, and a new bit block may be deleted, and a first bit block may be deleted to reduce the impact on user bandwidth.
  • the first bit block refers to a bit block in which N bit blocks may be inserted or deleted from N bit blocks during transmission of N bit blocks. For example, for a 64/66 bit block stream, the first block of bits may refer to a free block.
  • the first parity result and the second parity result are calculated according to a preset check algorithm, and the preset check algorithm is used to increase or decrease the first time in the N bit blocks.
  • the first parity block does not change the first parity result and the second parity result
  • the first bit block refers to a bit that may be inserted into or deleted from the N bit blocks during transmission of the N bit blocks.
  • the preset check algorithm provided by the embodiment of the present application can ensure that the first parity result and the second parity result can tolerate insertion or deletion of one or more first bit blocks (such as IDLE Block) during transmission. And when the first bit block has a bit error, it can also be detected.
  • the preset check algorithm is the xBIP-y algorithm, where x is the number of bits of consecutive bit interleaving, x is determined according to the definition of the pattern of the first bit block, and y is the monitoring area.
  • the number of segments, x, y is a positive integer, y ⁇ 2, for example, 8BIP-8 algorithm, 16BIP-4 algorithm.
  • the specific method of determining the first parity result and the second parity result by using the xBIP-y algorithm is: starting from the first payload bit of the N bit blocks, sequentially recording every x consecutive bits of each bit block.
  • the xBIP-y algorithm provided by the embodiment of the present application can tolerate insertion or deletion of one or more first bit blocks during transmission, and the method is simple.
  • the preset verification algorithm is the flexBIP-z algorithm, where z refers to the number of monitoring segments, and the number of consecutive bit interleaving bits corresponding to each monitoring segment is not the same, z monitoring
  • the number of consecutive bit interleaving corresponding to the segments is A1, A2, A 3 ... Az-1, Az, A1, A2, A 3 ...
  • the specific method of determining the first parity result and the second parity result by the flexBIP-z algorithm is: starting from the first payload bit of the N bit blocks, recording the A1 consecutive bits in each bit block to the first One monitoring segment records A2 consecutive bits after A1 consecutive bits to the second monitoring segment, and records A3 consecutive bits after A2 consecutive bits to the third monitoring segment until Az- Az consecutive bits after 1 consecutive bits are recorded to the zth monitoring segment; an odd parity or even parity is used for each monitoring segment to determine a 1-bit monitoring code, and a z-bit monitoring code is obtained, and the z-bit monitoring code is obtained.
  • a first parity result and a second parity result are included. Therefore, the flexBIP-z algorithm provided by the embodiment of the present application can more flexibly and succinctly determine the first parity result and the second parity result, and tolerate insertion or deletion of one or more first bit blocks during transmission.
  • determining the first parity result and the second parity result includes: determining a first verification result set, the first verification result set includes a y-bit monitoring code, or, the first school The result set includes a z-bit monitoring code; transmitting the first parity result and the second parity result, comprising: transmitting the first verification result set. Therefore, the error or error detection of the M/N Bit Block network path can be completely implemented by using the method provided by the embodiment of the present application.
  • a bit block stream error detection method includes: receiving a first boundary bit block, where a first boundary bit block is used to distinguish T bits that are subsequently received, T is a positive integer; and receiving a first bit block in sequence I is an integer greater than or equal to 1 and less than or equal to T; receiving a second boundary bit block for distinguishing T bits that have been received; determining a third parity result and a fourth parity result
  • the check object of the third parity result includes consecutive m bits of each of the T bit blocks, and the check object of the second parity result includes consecutive bits of each of the T bit blocks At least one of m bits, m, n is greater than or equal to 2; when receiving the first parity result and the second parity result, according to the first parity result and the third parity result, and Determining, by the second parity result and the fourth parity result, whether there is an error in the T bit blocks, wherein the check object of the first parity result includes consecutive m of each of the N bit blocks Bit, second par
  • the method provided by the embodiment of the present application can completely implement the error or error detection of the M/N Bit Block network path, does not affect the user service, and has a bearer efficiency of 100%, and can be inserted or deleted due to the synchronization problem during the transmission process.
  • the bit block, and the detection period (ie, the number of bit blocks between the two boundary bit blocks) and the detection accuracy (ie, the preset algorithm) are dynamically configurable as needed.
  • the detection method can not only verify that the path of the bit fast stream is an end-to-end path, but also can use the path of the verified bit fast stream as a non-end-to-end path. Therefore, the method provided by the embodiment of the present application can solve the problem that the error detection method in the M/N Bit block exchange scenario is difficult to implement and has low bearer efficiency.
  • the execution body of each step in FIG. 13 may be the bit block receiving end, when the checked bit is fast
  • the path of the stream is any intermediate device from the transmitting end of the bit block to the receiving end of the bit block, or the execution body of the above method when the path of the bit stream to be verified is from the transmitting end of the bit block to the receiving end of the bit block Can be an intermediate device.
  • This application is collectively referred to as a receiving device.
  • the N bit blocks are the bit blocks between the first boundary bit block and the second boundary bit block when the first parity result and the second parity result are determined by the transmitting device.
  • the sending device sends the first boundary bit block, sequentially transmitting N bit blocks, and then calculating the first parity result and the second parity result according to the N bit blocks, The two results are stored in a second boundary bit block, and the second boundary bit block is transmitted.
  • the first bit block may be inserted or deleted in the N bit blocks, and the receiving device sequentially receives the first boundary bit block after receiving the first bit block.
  • T bit blocks, where N T, or N>T (ie, inserting the first bit block in N bit blocks), or N ⁇ T (ie, deleting the first bit block in N bit blocks) )three situations.
  • the method further includes: sending the third parity result and the fourth parity result to the second device when the first parity result and the second parity result are not received,
  • the second device stores the first parity result and the second parity result.
  • the second device herein may be an SDN controller or any device having a function of determining a bit stream transmission error.
  • the third parity result and the fourth parity result may also be transmitted to the second device.
  • the second device may receive the first parity result and the second parity result sent by the sending device, and the third parity result and the fourth parity result sent by the receiving device, and the second device according to the two
  • the group result determines if there is a bit error during the transmission of the bit block stream. Therefore, the embodiment of the present application provides error detection by using a third-party device, such as an SDN controller, or any device having a function of determining a bit stream transmission error, which is more flexible and efficient, and is simple to implement.
  • the type of each bit block is an M1/M2 bit block, where M1 represents the number of payload bits in each bit block, and M2 represents the total number of bits per bit block, M2-M1 Represents the number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
  • receiving the second boundary bit block includes: receiving the second boundary bit block at the first time;
  • Receiving the first parity result and the second parity result comprising: receiving the first parity result and the second parity result at a second time, wherein the first time is earlier than the second time, or the first The moment is later than the second moment, the first moment being equal to the second moment.
  • the first parity result and the second parity result are stored in a second boundary bit block.
  • the third parity result and the fourth parity result are calculated according to a preset check algorithm, and the preset check algorithm is used to increase or decrease the first time in the T bit blocks.
  • the third parity result and the fourth parity result are not changed in the bit block, and the first bit block refers to a bit that may be inserted into or deleted from the T bit blocks during transmission of the T bit blocks. Piece. Therefore, the preset check algorithm provided by the embodiment of the present application can ensure that the first parity result and the second parity result can tolerate insertion or deletion of one or more first bit blocks (such as IDLE Block) during transmission. And when the first bit block has a bit error, it can also be detected.
  • the receiving device determines a preset algorithm used by the third parity result and the fourth parity result, and a preset algorithm used by the transmitting device to determine the first parity result and the second parity result. The same, the repetition will not be repeated.
  • the preset check algorithm is the xBIP-y algorithm, where x is the number of bits of consecutive bit interleaving, x is determined according to the definition of the pattern of the first bit block, and y is the monitoring area.
  • the number of segments, x, y is a positive integer, y ⁇ 2;
  • Determining the third parity result and the fourth parity result comprising: sequentially recording every x consecutive bits of each bit block to the first monitoring area, starting from the first payload bit of the T bit blocks Segment to yth monitoring section; determining a 1-bit monitoring code using odd or even parity for each monitoring section, obtaining a y-bit monitoring code, the y-bit monitoring code including a third parity result and a fourth Parity result. Therefore, the xBIP-y algorithm provided by the embodiment of the present application can tolerate insertion or deletion of one or more first bit blocks during transmission, and the method is simple.
  • the preset verification algorithm is the flexBIP-z algorithm, where z refers to the number of monitoring segments, and the number of consecutive bit interleaving bits corresponding to each monitoring segment is not the same, z monitoring
  • the number of consecutive bit interleaving corresponding to the segments is A1, A2, A 3 ... Az-1, Az, A1, A2, A 3 ... Az-1, Az, z are positive integers, z ⁇ 2;
  • Determining the third parity result and the fourth parity result comprising: recording, from the first payload bit of the T bit blocks, A1 consecutive bits of each bit block to the first monitoring segment, Recording A2 consecutive bits after A1 consecutive bits to the second monitoring segment, and recording A3 consecutive bits after A2 consecutive bits to the third monitoring segment until after Az-1 consecutive bits Az consecutive bits are recorded to the zth monitoring section; an odd parity or even parity is used for each monitoring section to determine a 1-bit monitoring code to obtain a z-bit monitoring code, and the z-bit monitoring code includes a third parity The result and the fourth parity result. Therefore, the flexBIP-z algorithm provided by the embodiment of the present application can more flexibly and succinctly determine the first parity result and the second parity result, and tolerate insertion or deletion of one or more first bit blocks during transmission.
  • determining whether there are bit errors in the T bit blocks according to the first parity result and the third parity result, and the second parity result and the fourth parity result including: If it is determined that the first parity result and the third parity result are the same, and the second parity result and the fourth parity result are the same, determining that there are no error in the T bit blocks; if the first parity is determined The result of the verification is not the same as the third parity result, and/or the second parity result and the fourth parity result are not the same, and it is determined that there are bit errors in the T bit blocks.
  • receiving the first parity result and the second parity result comprising: receiving a first check result set, where the first check result set is calculated according to an xBIP-y algorithm, The first parity result and the second parity result are included in the y-bit monitoring code included in the verification result set; determining the third parity result and the fourth parity result, including: determining the second verification result The second parity result is calculated according to the xBIP-y algorithm, and the y-bit monitoring code included in the second verification result set includes a third parity result and a third parity result;
  • determining T according to the first parity result and the third parity result, and the second parity result and the fourth parity result Whether there is an error in the bit block includes: determining whether there is a bit error in the T bit block according to the first check result set and the second check result set. Therefore, the error or error detection of the M/N Bit Block network path can be completely implemented by using the method provided by the embodiment of the present application.
  • receiving the first parity result and the second parity result comprising: receiving a first check result set, where the first check result set is calculated according to a flexBIP-z algorithm, a z-bit monitoring code included in a set of verification results includes a first parity result and a second parity result; determining the third parity result and the fourth parity result, comprising: determining a second verification result
  • the set, the second check result set is calculated according to the flexBIP-z algorithm, and the z-bit monitoring code included in the second check result set includes the third parity result and the fourth parity result; when receiving the first a parity result and a second parity result, based on the first parity result and the third parity result, and the second parity result and the fourth parity result, determining whether T bit blocks are
  • the error code includes: determining, according to the first verification result set and the second verification result set, whether the T bit blocks have an error. Therefore, the error or error detection of the M/N Bit Block network path can be
  • determining whether the T bit blocks have an error according to the first check result set and the second check result set includes: determining the first check result set and the second check result set If the same, it is determined that there are no error codes in the T bit blocks; if it is determined that the first check result set and the second check result set are not the same, it is determined that the T bit blocks have an error.
  • a third aspect a bit block stream error detection method, comprising: determining, by a first device, that a start byte in a start block in a bit block stream and an end byte in an end block corresponding to the start block are detected a segment; the first device calculates a first verification result according to the detected segment.
  • the first device transmits the first check result and the bit block stream.
  • the algorithm used by the first device to calculate the first check result may be CRC-x or BIP-x, and the first check result is recorded as B, and B may be one or more bytes.
  • the error or error detection of the M/N Bit Block network path can be completely implemented by using the method provided in the embodiment of the present application, which has little impact on the user service and is close to the SDH/OTN, and is superior to the error detection provided in the prior art.
  • Method, the implementation process is simple and easy to implement.
  • the bit block stream includes at least one M1/M2 bit block; wherein M1 represents the number of payload bits in each bit block, M2 represents the total number of bits per bit block, and M2-M1 represents The number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
  • the first device sends the first check result and the bit block stream, including: the first device sends the first check result and the bit block stream to the second device; or the first device sends the first
  • the result of the verification is sent to the third device, and the bit block is sent to the second device. Therefore, the embodiment of the present application provides error detection by using a third-party device, such as an SDN controller, or any device having a function of determining a bit stream transmission error, which is more flexible and efficient, and is simple to implement.
  • the method before the first device sends the first verification result and the bit block stream to the second device, the method further includes: the first device storing the first verification result in the end block, and obtaining the updated Ending the block; or, the first device stores the first check result in the check result storage block, and deletes any first bit block in the bit block stream, wherein the check result storage block refers to before the end block A new block, the first block of bits refers to a block of bits that may be inserted into or deleted from the block stream during transmission of the block stream. Therefore, the embodiment of the present application provides two methods for storing the first verification result, and the storage method is more flexible and simple to implement.
  • the first device stores the first check result in the end block, and obtains the updated end block, including: when the number of bytes occupied by the first check result is greater than or equal to the target number of bytes, The first device stores the first check result before the end byte in the end block, and moves the end byte to a new block after the end block according to the number of bytes occupied by the first check result, and deletes the bit block.
  • any first block in the stream, the new block where the end byte is moved is used as the updated end block; when the number of bytes occupied by the first check result is less than the target number of bytes, the first device will The first check result is stored before the end byte in the end block, and the end byte is shifted back by the number of bytes occupied by the first check result according to the number of bytes occupied by the first check result, and the end byte is moved.
  • the bit block that is located later is used as the updated end block; wherein the target number of bytes is the number of bytes in the end block after the end byte plus one. Therefore, the method provided by the embodiment of the present application is simple to implement.
  • a fourth aspect a bit block stream error detection method, comprising: determining, by the second device, that the start byte in the start block in the bit block stream and the end byte in the end block corresponding to the start block are detected a segment; the second device calculates a second verification result according to the detected segment.
  • the second device receives the first verification result
  • the second device determines, according to the first verification result and the second verification result, whether the detected segment has an error. Therefore, the error or error detection of the M/N Bit Block network path can be completely implemented by using the method provided in the embodiment of the present application, which has little impact on the user service and is close to the SDH/OTN, and is superior to the error detection provided in the prior art.
  • Method the implementation process is simple and easy to implement.
  • the algorithm used by the second device in calculating the second verification result is the same as the algorithm used when the first device calculates the first verification result.
  • the bit block stream includes at least one M1/M2 bit block; wherein M1 represents the number of payload bits in each bit block, M2 represents the total number of bits per bit block, and M2-M1 represents The number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
  • the second device determines the detected segment according to the start byte in the start block in the bit block stream and the end byte in the end block corresponding to the start block, including three possible Case: (1) When the second device receives the first verification result, and the first verification result is stored in the end block, the second device deletes the second verification result from the end block, and obtains the updated end block. a byte between the start byte in the start block and the end byte in the updated end block as the detected segment; (2) when the second device receives the first check result, and When a check result is stored in the check result storage block, the second device deletes the check result storage block from the bit block stream, and obtains the updated bit block stream, which is to be updated in the start block in the bit block stream.
  • the byte between the start byte and the end byte in the end block is taken as the detected segment, wherein the check result storage block is located before the end block.
  • the first check result is included in the byte between the start byte in the start block and the end byte in the end block. Therefore, the first check result needs to be deleted first, and the remaining The part is taken as the detected section.
  • the second device deletes the check result storage block from the bit block stream, and obtains the updated bit. A block stream in which the check result storage block is located before the end block.
  • the second device detects the byte between the start byte in the start block and the end byte in the end block in the bit block stream as the detected Section. At this time, the byte between the start byte in the start block and the end byte in the end block does not include the first check result, and can be directly used as the detected segment.
  • the method further includes: when the second device does not receive the first verification result, the second device sends the second verification result to the third device, where the third device stores the first verification result. . Therefore, the embodiment of the present application provides two methods for storing the first verification result, and the storage method is more flexible and simple to implement.
  • the second device determines, according to the first verification result and the second verification result, whether the detected segment has an error, including: if the second device determines the first verification result and the second calibration If the test result is the same, it is determined that there is no error in the detected segment; if it is determined that the first verification result is different from the second verification result, it is determined that the detected segment has an error.
  • the second device deletes the first check result from the end block, and obtains the updated end block, including: when the number of bytes occupied by the first check result is greater than or equal to the target number of bytes
  • the second device moves the end byte to a bit block before the end block according to the number of bytes occupied by the first check result, and adds a first bit block to the bit block stream, where the end byte is moved.
  • the bit block is used as the updated end block; when the number of bytes occupied by the first check result is less than the target number of bytes, the second device moves the end byte to the first school according to the number of bytes occupied by the first check result.
  • the number of bytes occupied by the result is the updated end block after the end byte is moved; wherein the target number of bytes is the number of bytes in the end block before the end byte plus one. Therefore, the method provided by the embodiment of the present application is simple to implement.
  • a bit block stream error detecting apparatus comprising: a processor, a transceiver, the transceiver is configured to send a bit stream block, and the processor is configured to complete the first aspect according to the bit stream block sent by the transceiver or A method in any of the possible implementations of the first aspect.
  • a bit block stream error detecting apparatus includes a processor, a transceiver, the transceiver is configured to receive a bit stream block, and the processor is configured to complete the foregoing second aspect according to the bit stream block received by the transceiver or A method in any of the possible implementations of the second aspect.
  • a bit block stream error detecting apparatus comprising: a processor, a transceiver, the transceiver is configured to send a bit stream block, and the processor is configured to complete the first aspect according to the bit stream block sent by the transceiver or A method in any of the possible implementations of the first aspect.
  • a bit block stream error detecting apparatus includes a processor, a transceiver, the transceiver is configured to receive a bit stream block, and the processor is configured to complete the second aspect according to the bit stream block received by the transceiver or A method in any of the possible implementations of the second aspect.
  • the embodiment of the present application proposes a new device for transmitting an M1/M2 bit block stream.
  • a new bit error detection unit is also called a bit error ratio (BER) unit, which is referred to as BER.
  • BER bit error ratio
  • the PE device includes uAdpt, L1.5Switch, nAdpt, and BER.
  • One end is connected to the user equipment, the interface is UNI, the other end is connected to the network device, the interface is NNI, and the P device includes uAdpt, L1.5Switch, nAdpt, and BER. Both ends are connected to the network device, and the interface is NNI, as shown in Figure 23(a) and Figure 23(b).
  • the embodiment of the present application further provides a packet bearer product, such as an IPRAN and PTN device that plans to load X-E features.
  • a packet bearer product such as an IPRAN and PTN device that plans to load X-E features.
  • the present application provides a packet bearer product, where the interface board can be an interface card of a box device or an interface chip of a line card of a box device.
  • the embodiment of the present application further provides a packet bearer product.
  • the present application provides a new type of chip, such as SDxxxx, which is built into the chip, or in an existing interface chip, such as SDyyyy and the host. Between the switch boards, a Field-Programmable Gate Array (FPGA) or Network Processor (NP) is added to implement the BER function through the FPGA or NP.
  • FPGA Field-Programmable Gate Array
  • NP Network Processor
  • the present application provides a computer readable storage medium having stored therein instructions that, when run on a computer, cause the computer to perform any of the above aspects or any of the possible aspects of the first aspect Methods.
  • the present application also provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method of any of the first aspect or the first aspect of the first aspect described above.
  • FIG. 1 is a schematic diagram of a code pattern definition of a 64/66 bit code in an embodiment of the present application
  • FIG. 2 is a schematic diagram of a code pattern definition of a free block in the embodiment of the present application.
  • FIG. 3(a) is a schematic structural diagram of a PE device in an embodiment of the present application.
  • FIG. 3(b) is a schematic structural diagram of a P device in an embodiment of the present application.
  • FIG. 4 is a schematic diagram of constructing a network by using X-E technology and forwarding in the embodiment of the present application;
  • FIG. 5 is a schematic diagram of the basic idea of BIP-8 in the embodiment of the present application.
  • FIG. 7 is a schematic diagram of the location and pattern definition of a second boundary bit block in the embodiment of the present application.
  • FIG. 8 is a schematic diagram of inserting a first bit block in an embodiment of the present application.
  • FIG. 9 is a schematic diagram of the basic idea of 8BIP-8 in the embodiment of the present application.
  • 10 is a schematic diagram of the basic idea of 16BIP-4 in the embodiment of the present application.
  • 11(a) is a schematic diagram showing the basic idea of flexBIP-8 in the embodiment of the present application.
  • 11(b) is a schematic diagram showing the basic idea of flexBIP-9 in the embodiment of the present application.
  • FIG. 13 is a third embodiment of a bit block stream error detection method according to an embodiment of the present application.
  • FIG. 14 is a schematic diagram of a 64/66 bitstream in an embodiment of the present application.
  • 15 is a schematic diagram of a code pattern definition of a pure data block D in the embodiment of the present application.
  • 16 is a schematic diagram of a code pattern definition of a starting block in an embodiment of the present application.
  • 17 is a schematic diagram of a code pattern definition of an end block in an embodiment of the present application.
  • FIG. 18 is a schematic diagram of a first device storing a first verification result in an end block according to an embodiment of the present application
  • FIG. 19 is a schematic diagram of the first device using the CRC-8 or the BIP-8 to calculate the first check result B insertion end block in the embodiment of the present application;
  • FIG. 20 is a schematic diagram of a newly added bit block before a first device inserts a first check result B into an end block according to an embodiment of the present application;
  • 21 is a fourth embodiment of a bit block stream error detection method according to an embodiment of the present application.
  • FIG. 22 is a schematic diagram of a first verification result B in a second device deletion end block according to an embodiment of the present application.
  • 23(a) is a second schematic structural diagram of a PE device in an embodiment of the present application.
  • 23(b) is a second schematic structural diagram of a P device in an embodiment of the present application.
  • FIG. 24 is a schematic structural diagram of a packet bearer product in an embodiment of the present application.
  • 25 is a second schematic structural diagram of a packet bearer product in an embodiment of the present application.
  • 26 is a schematic diagram of error detection of an end-to-end path of a bit fast stream to be verified in the embodiment of the present application;
  • 27(a) is a schematic diagram of error detection of a path of a bit fast stream that is verified to be a non-end-to-end path in the embodiment of the present application;
  • 27(b) is a second schematic diagram of error detection of a path of a bit fast stream that is verified to be a non-end-to-end path in the embodiment of the present application;
  • FIG. 28 is a schematic structural diagram of a bit block stream error detecting apparatus according to an embodiment of the present application.
  • FIG. 29 is a second schematic structural diagram of a bit block stream error detecting apparatus according to an embodiment of the present application.
  • FIG. 30 is a third schematic structural diagram of a bit block stream error detecting apparatus according to an embodiment of the present application.
  • FIG. 31 is a fourth schematic structural diagram of a bit block stream error detecting apparatus according to an embodiment of the present application.
  • the bit block mentioned in the embodiment of the present application is an M1/M2 bit block, and the M1/M2 bit represents an encoding mode, where M1 represents the number of payload bits in each bit block, and M2 represents each bit.
  • M1 represents the number of payload bits in each bit block
  • M2 represents each bit.
  • the total number of bits of the bit block, M2-M1 represents the number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
  • the M1/M2 bit block stream is transmitted on the Ethernet physical layer link.
  • 1G Ethernet uses 8/10Bit encoding
  • 1GE physical layer link delivers 8/10 Bit Block stream
  • 10GE/40GE/100GE adopts 64/.
  • 66 bit code 10GE/40GE/100GE physical layer link is the 64/66 Bit Block stream.
  • other coding methods will also appear, such as 128/130 bit encoding and 256/258 bit encoding.
  • the embodiment of the present application is uniformly represented by an M1/M2 bit block stream.
  • Bit Blocks For the M1/M2 bit block stream exchanged by the L1.5 layer, there are different types of Bit Blocks and are clearly defined in the standard. The following is an example of a 64/66 bit coded pattern definition, as shown in FIG.
  • the first two Bits "10" or "01" of the header are 64/66 Bit Block sync header bits, and the last 64 Bit is used to carry payload data or protocols.
  • Figure 1 includes 16 pattern definitions, each of which represents a pattern definition of a block of bits, where D0-D7 represents the data byte, C0-C7 represents the control byte, S0 represents the start byte, and T0-T7 represents the code.
  • the second line corresponds to the pattern definition of the IDLE Block, and the free block can be represented by /I/, as shown in Figure 2.
  • Line 7 corresponds to the definition of the pattern of the starting block.
  • the starting block can be represented by /s/
  • the lines 9-16 correspond to the pattern definition of the 8 ending blocks
  • the 8 ending blocks can be represented by /T/.
  • the device shown in FIG. 3(a) and FIG. 3(a) is used to transmit the M1/M2 bit block stream, specifically, as shown in FIG. 3(a) and FIG. 3(b). , including PE equipment and P equipment.
  • the PE device represents an edge device, and one end is connected to the user device.
  • the interface is a user network interface (UNI), the other end is connected to the network device, the interface is NNI, and the P device represents the network device. Both ends are connected to the network.
  • the device is connected.
  • the interface is the network to network interface (NNI) between the networks or devices in the network.
  • NNI network to network interface
  • the client signal adaptation unit (uAdpt) represents a user-side processing unit of the X-E technology system for accessing user service signals and performing code conversion, rate adaptation, and the like.
  • the network signal adaptation unit (nAdpt) represents a network side processing unit of the XE technology system, and is configured to send the service signal in the device to the network side and complete corresponding function processing; or receive the network side service signal and transmit it to other processing units in the device.
  • the L1.5switch or the X-Ethernet switch, that is, the X-Ethernet Relay that is, the forwarding of the intermediate node
  • the path shown in FIG. 4 is an X-E end-to-end forwarding path.
  • BIP-x Based on the BIP algorithm, the basic idea of the algorithm is to divide the verified signal into X check blocks. For example, SDH adopts BIP-16, BIP-8, BIP-2, and OTN adopts BIP- 8.
  • the 8-bit monitoring code generation process shown by BIP-8 can be briefly described as follows: all the verified parts of the bit stream are grouped into 8 bits, and are divided into a series of 8-bit sequences. Code group.
  • the BIP-8 code is used as the first column, and the first 8-bit sequence is the second column, which is sequentially arranged into a monitoring matrix. Then, the first bit of each 8-bit sequence code group and the first bit of the BIP-8 code form a first monitoring code group (first line of the matrix), and the second bit and BIP of each 8-bit sequence code group
  • the 2nd bit of the -8 code constitutes the 2nd monitoring code group (the second line of the matrix), and so on.
  • the first bit of the BIP-8 code provides even parity for the first monitoring code group (ie, the number of "1"s in the monitoring code group is even), and the second bit of the BIP-8 code is the first bit.
  • the monitoring code group provides even parity, and so on. It should be noted that odd parity can also be used here.
  • CRC-x based on the CRC algorithm, wherein the standardized algorithms include CRC-4, CRC-8, CRC-16, CRC-32, etc., and the X-bit loop check is performed on the verified signal, and the Ethernet frame or The packet uses CRC-32 to store the CRC-32 result in the last FCS field (4 bytes) of the frame or packet.
  • the embodiment of the present application provides a bit block stream error detection method, which solves the problem that the error detection method in the M/N Bit block exchange scenario is difficult to implement and has low bearer efficiency.
  • the method comprises:
  • Step 600 Send a first boundary bit block, where the first boundary bit block is used to distinguish N pieces of subsequent transmission, and N is a positive integer.
  • Step 610 The first bit block is sequentially transmitted, where I is an integer greater than or equal to 1 and less than or equal to N.
  • Step 620 Determine a first parity result and a second parity result, where the check object of the first parity result includes consecutive m bits of each of the N bit blocks, and the second parity The resulting check object includes consecutive n bits of each of the N bit blocks, at least one of m, n being greater than or equal to two.
  • Step 630 Send a second boundary bit block, a first parity result, and a second parity result, where the second boundary bit block is used to distinguish N bits that have been transmitted.
  • the execution body of each step in FIG. 6 may be a bit block transmitting end.
  • the path of the checked bit block stream is from the bit block transmitting end to the bit block receiving end
  • the path of the checked bit block stream is an end-to-end path.
  • the path of the checked bit block stream is any intermediate device from the bit block transmitting end to the bit block receiving end
  • the path of the checked bit block stream is a path that is suspended at one end. This application is collectively referred to as a transmitting device.
  • the embodiment of the present application can be used not only for error detection of an end-to-end path, but also for error detection of a non-end-to-end path, for example, a planned reserved path, and a protection path of a 1:1 connection protection group. Or have other special purpose paths.
  • the execution body of each step in FIG. 6 may be the first intermediate device.
  • the path of the bitstream to be verified is a path that is suspended at both ends.
  • step 600 step 610, step 630
  • step 630 the embodiment of the present application provides the following two possible implementation manners:
  • the first parity result and the second parity result are transmitted to the first device together with the N bit blocks between the two boundary bit blocks and the two boundary bit blocks, when being When the path of the bit block stream is from the bit block transmitting end to the bit block receiving end, the first device here may be the bit block receiving end, and the path of the checked bit block stream is from the bit block transmitting end to the bit When the intermediate device before the block receiving end, or when the path of the verified bit block stream is the second intermediate device from the first intermediate device after the bit block transmitting end to the bit block receiving end, the first here A device can also be an intermediate device.
  • the second device herein may be an SDN controller or any device having a function of determining a bit stream transmission error.
  • the two methods can also be used at the same time, that is, the first parity result and the second parity result are sent to both the first device and the second device.
  • the second boundary bit block is sent at the first moment, and the first parity result and the second parity result are sent at the second moment, where the first moment is earlier than the second moment, or The first moment is later than the second moment, and the first moment is equal to the second moment.
  • the check object of the first parity result may be consecutive m bits of each of the N bit blocks, and the check object of the second parity result may be each of the N bit blocks a consecutive n bits, in a possible implementation manner, the check object of the first parity result may include the foregoing, in addition to the consecutive m bits of each of the N bit blocks.
  • the consecutive m bits of a boundary bit block may also include consecutive m bits of the second boundary bit block; likewise, the check object of the second parity result includes, in addition to each bit block of the N bit blocks.
  • the consecutive n bits it may also include consecutive n bits of the first boundary bit block, and may also include consecutive n bits of the second boundary bit block.
  • the first parity result and the second parity result may be stored in the second boundary bit block. Therefore, assuming that each N bit block in the bit block stream is a group, the i-th boundary bit block stores the first parity result and the second parity result corresponding to the i-th N-bit block, i +1 boundary bit block stores a first parity result and a second parity result corresponding to the i+1th group of N bit blocks, wherein the i+1th group of N bit blocks is the ith boundary bit block A bit block between the i+1th boundary bit block and i is a positive integer.
  • boundary bit block mentioned in this application may be a newly inserted bit block, and a first bit block may be deleted while a boundary bit block is newly inserted, wherein the first bit block refers to N bit blocks or bit blocks deleted from N bit blocks may be inserted during transmission of a bit block.
  • the first block of bits may refer to a free block.
  • the second boundary bit block is in FIG.
  • the bit block pattern definition corresponding to the 8th line that is, the type of the bit block is 0x4B, the O code of the bit block is 0x06, and the first parity result and the second parity result are stored in the 3 Data fields of the bit block.
  • the unoccupied Data field Bit fills in binary 0. Therefore, the second boundary bit block is inserted after the N bit blocks, and in order to reduce the influence on the user bandwidth, one free block can be deleted.
  • the frequency influence is generally eliminated by inserting or deleting the first bit block.
  • a 64/66 bit block stream is implemented by inserting or deleting an IDLE Block, as shown in FIG. Therefore, when the first parity result and the second parity result are determined in step 620, if the existing BIP-x algorithm is used, the first parity result is affected by inserting or deleting the first bit block during transmission. And the second parity result.
  • the first parity result and the second parity result are calculated according to a preset check algorithm, where the preset check algorithm is used to increase or decrease the first bit in the N bit blocks.
  • the first parity result and the second parity result are not changed at the time of the block.
  • first bit blocks such as IDLE Block
  • This application transforms the existing BIP algorithm, which can include but is not limited to the following two algorithms:
  • the preset check algorithm is the xBIP-y algorithm, where x is the number of bits of consecutive bit interleaving, x is determined according to the definition of the pattern of the first bit block, and y is the number of monitored segments, x, y is a positive integer, y ⁇ 2.
  • Every x consecutive bits of each bit block are sequentially recorded to the first monitoring segment to the yth monitoring segment;
  • the parity or even parity determines a 1-bit monitoring code to obtain a y-bit monitoring code, and the y-bit monitoring code includes a first parity result and a second parity result.
  • sync bit header in each bit block is not included in the calculation of the first parity result and the second parity result.
  • FIG. 9 is a schematic diagram of the 64/66 Bit Block using the 8BIP-8 algorithm.
  • B0-B7 is 8 monitoring codes (also called check codes) included in the 8BIP-8 algorithm, and each monitoring code corresponds to one monitoring segment, which provides an odd test or even for the bits included in the corresponding monitoring segment. check.
  • Each monitoring segment corresponds to 8 consecutive bits of each bit block, for example, the first monitoring segment corresponds to the first payload bit to the eighth payload bit of each bit block, and the second monitoring segment Corresponding to the ninth payload bit to the 16th payload bit of each bit block, ..., the eighth monitoring segment corresponds to the 57th payload bit to the 64th payload bit of each bit block.
  • the inserted IDLE Block has the first byte being 0x1e and the others being 0.
  • the first byte of the IDLE Block enters the 1st monitoring section of 8BIP-8, and the other bytes enter the 2-8th monitoring section.
  • 0x1e has 4 binary 1s, other fields are 0, and there are 0 binary ones. Therefore, no matter how many IDLE blocks are inserted or deleted during transmission, the verification results of B0--B7 are not affected.
  • FIG. 10 is a schematic diagram of the 64/66 Bit Block using the 16BIP-4 algorithm.
  • B0-B3 is a four monitoring code (also called a check code) included in the 16BIP-4 algorithm, and each monitoring code corresponds to one monitoring section, providing an odd test or even for the bits included in the corresponding monitoring section. check.
  • Each monitoring section corresponds to 16 consecutive bits of each bit block, for example, the first monitoring section corresponds to the first payload bit of each bit block to the 16th payload bit, and the second monitoring section Corresponding to the 17th payload bit of each bit block to the 32nd payload bit, the third monitoring segment corresponds to the 33rd payload bit of each bit block to the 48th payload bit, the 4th monitoring The segment corresponds to the 49th payload bit to the 64th payload bit of each bit block.
  • the preset check algorithm is a flexBIP-z algorithm, where z refers to the number of monitored segments, and the number of consecutive bit interleaving bits corresponding to each monitoring segment is not the same, and z monitoring segments respectively correspond to The number of bits of consecutive bit interleaving is A1, A2, A 3 ... Az-1, Az, A1, A2, A 3 ... Az-1, Az, z are positive integers, z ⁇ 2.
  • A1 consecutive bits in each bit block are recorded to the first monitoring segment, and A2 consecutive bits after A1 consecutive bits are recorded to the second Monitoring section, recording A3 consecutive bits after A2 consecutive bits to the third monitoring section until Az consecutive bits after Az-1 consecutive bits are recorded to the zth monitoring section;
  • the monitoring section determines the 1-bit monitoring code by using odd or even parity to obtain a z-bit monitoring code, and the z-bit monitoring code includes a first parity result and a second parity result.
  • Figure 11(a) is a schematic diagram of the 64/66 Bit Block using the flexBIP-8 algorithm.
  • B0-B7 is 8 monitoring codes included in the flexBIP-8 algorithm, and each monitoring code corresponds to one monitoring section, and provides odd or even parity for the bits included in the corresponding monitoring section.
  • the first monitoring segment corresponds to the first payload bit to the eighth payload bit of each bit block, and the second monitoring segment corresponds to the ninth payload bit to the 18th payload bit of each bit block.
  • the third monitoring section corresponds to the 19th payload bit to the 24th payload bit of each bit block
  • the 4th monitoring section corresponds to the 25th payload bit to the 33rd payload bit of each bit block
  • the fifth monitoring segment corresponds to the 34th payload bit to the 40th payload bit of each bit block
  • the sixth monitoring segment corresponds to the 41st payload bit to the 48th payload of each bit block.
  • Bit the seventh monitoring section corresponds to the 49th payload bit of each bit block to the 58th payload bit
  • the 8th monitoring section corresponds to the 59th payload bit of each bit block to the 64th Payload bits.
  • FIG. 11(b) is a schematic diagram of the 64/6B Bit Block using the flexBIP-9 algorithm.
  • B0-B8 is 9 monitoring codes included in the flexBIP-9 algorithm, and each monitoring code corresponds to one monitoring section, and provides odd or even parity for the bits included in the corresponding monitoring section.
  • the first monitoring section corresponds to the first payload bit to the eighth payload bit of each bit block
  • the second monitoring section corresponds to the ninth payload bit of each bit block to the 15th payload total 7 Bits
  • the third monitoring segment corresponds to the 16th payload bit of each bit block to the 22nd payload bit, a total of 7 bits
  • the 4th monitoring segment corresponds to the 23rd payload bit of each bit block to
  • the 29th payload bit has a total of 7 bits
  • the 5th monitoring segment corresponds to the 30th payload bit of each bit block to the 36th payload bit, a total of 7 bits
  • the sixth monitoring segment corresponds to each
  • the 37th payload bit of the bit block has a total of 7 bits to the 43rd payload bit
  • the 7th monitoring segment corresponds to the 44th payload bit of each bit block to the 50th payload bit of 7 bits.
  • the eighth monitoring section corresponds to the 51st payload bit of each bit block to the 57th payload bit of 7 bits
  • the check object of the first parity result includes N bit blocks and the bit block in the first boundary of step 600, each bit block Any one of the consecutive 9 groups of bits enters the check area corresponding to the flexBIP-9 algorithm, and finally forms the first parity result.
  • the check object of the second parity result includes a block of N bits and a bit block in the first boundary of step 600, and consecutive 9 groups of bits of each bit block are selected according to the first parity result. Any one of the other 8 groups outside the group enters the check area corresponding to the flexBIP-9 algorithm, and finally forms a second parity result.
  • the check object of the first parity result includes N bit blocks and the bit block in the second boundary of step 630, each bit block Any one of the consecutive 9 groups of bits enters the check area corresponding to the flexBIP-9 algorithm, and finally forms the first parity result.
  • the check object of the second parity result includes a block of N bits and a block of bits in the second boundary of step 630, and consecutive 9 groups of bits of each block block are selected according to the first parity result. Any one of the other 8 groups outside the group enters the check area corresponding to the flexBIP-9 algorithm, and finally forms a second parity result.
  • the check object of the third parity result includes T bit blocks and the bit block in the first boundary described in step 1200, each bit Any one of the consecutive 9 groups of bits of the block enters the check area corresponding to the flexBIP-9 algorithm, and finally forms a third parity result.
  • the check object of the fourth parity result includes a T bit block and a bit block in the first boundary in step 600, and consecutive 9 groups of bits of each bit block are selected according to a third parity result. Any one of the other 8 groups in the group enters the check area corresponding to the flexBIP-9 algorithm, and finally forms a fourth parity result.
  • the check object of the third parity result includes T bit blocks and the bit block in the second boundary of step 1220, each bit block Any one of the consecutive 9 groups of bits enters the check area corresponding to the flexBIP-9 algorithm, and finally forms a third parity result.
  • the check object of the fourth parity result includes T bit blocks and the bit block in the second boundary of step 1220, and the consecutive 9 groups of bits of each bit block are selected according to the third parity result. Any one of the other 8 groups outside the group enters the check area corresponding to the flexBIP-9 algorithm, and finally forms a fourth parity result.
  • the inserted bit block is an IDLE Block
  • the first byte is 0x1e
  • the others are 0.
  • the first byte of the IDLE Block enters the first monitoring section of flexBIP-9, and the other packets are grouped in consecutive 7 bits into the 2-9th monitoring section.
  • 0x1e has 4 binary 1s, other fields are 0, and there are 0 binary ones. Therefore, no matter how many IDLE blocks are inserted or deleted during transmission, the verification results of B0--B8 are not affected.
  • the inserted bit block is a low power idle block (LPI Block)
  • the first byte is 0x1e
  • the others are divided into 8 groups according to 7 bits, and each group is 0x6.
  • the first byte of the LPI enters the first monitoring section of flexBIP-9, and the other packets are grouped in consecutive 7 bits into the 2-9th monitoring section.
  • 0x1e has 4 binary 1s
  • the other 7bi t fields are 0x6, and there are 2 binary 1s. Therefore, no matter how many LPI blocks are inserted or deleted during transmission, the verification results of B0--B8 are not affected.
  • the first byte is 0x1e, and the others are divided into 8 groups according to 7 bits, and each group is 0x1e.
  • the first byte of the LPI enters the first monitoring section of flexBIP-9, and the other packets are grouped in consecutive 7 bits into the 2-9th monitoring section.
  • 0x1e has 4 binary 1s, so the check result of B0--B8 is not affected regardless of how many ERROR blocks are inserted or deleted during transmission.
  • the y-bit monitoring code obtained by the algorithm 1 can be used as the first verification result set, or the z-bit monitoring code obtained by the algorithm 2 can be used as the first school. Test results collection. When the first parity result and the second parity result are transmitted, all the obtained verification results, that is, the first verification result set, may be simultaneously transmitted.
  • the embodiment of the present application provides a bit block stream error detection method to solve the problem that the error detection method in the M/N Bit block exchange scenario is difficult to implement and has low bearer efficiency.
  • the method comprises:
  • Step 1200 Receive a first boundary bit block, where the first boundary bit block is used to distinguish the subsequently received T bit blocks, where T is a positive integer.
  • Step 1210 Receive the first bit block in sequence, where I is an integer greater than or equal to 1 and less than or equal to T.
  • Step 1220 Receive a second boundary bit block, where the second boundary bit block is used to distinguish T bits that have been received.
  • Step 1230 Determine a third parity result and a fourth parity result, where the check object of the third parity result includes consecutive m bits of each of the T bit blocks, and the fourth parity The resulting check object includes consecutive n bits of each of the T bit blocks, at least one of m, n being greater than or equal to two.
  • Step 1240 When receiving the first parity result and the second parity result, according to the first parity result and the third parity result, and the second parity result and the fourth parity result Determining whether there is an error in the T bit blocks, wherein the check object of the first parity result includes consecutive m bits of each of the N bit blocks, and the check object of the second parity result Included consecutive n bits of each of the N bit blocks, N being a bit block between the first boundary bit block and the second boundary bit block when determining the first parity result and the second parity result Number of.
  • the execution body of each step in FIG. 12 may be the bit block receiving end, when the checked bit block
  • the path of the stream is any intermediate device from the transmitting end of the bit block to the receiving end of the bit block, or when the path of the bit block stream to be verified is from the transmitting end of the bit block to the receiving end of the bit block, the steps in FIG. 12
  • the execution body can be an intermediate device. This application is collectively referred to as a receiving device.
  • N bit blocks are the bit blocks between the first boundary bit block and the second boundary bit block when the first parity result and the second parity result are determined by the transmitting device.
  • the sending device sends the first boundary bit block, sequentially transmitting N bit blocks, and then calculating the first parity result and the second parity result according to the N bit blocks
  • the two results are stored in a second boundary bit block, and the second boundary bit block is transmitted.
  • the first bit block may be inserted or deleted in the N bit blocks, and the receiving device sequentially receives the first boundary bit block after receiving the first bit block.
  • the second device when the first parity result and the second parity result are not received, sending the third parity result and the fourth parity result to the second device, the second device A first parity result and a second parity result are stored.
  • the second device herein may be an SDN controller or any device having a function of determining a bit stream transmission error.
  • the third parity result and the fourth parity result may also be transmitted to the second device.
  • the second device may receive the first parity result and the second parity result sent by the sending device, and the third parity result and the fourth parity result sent by the receiving device, and the second device according to the two The group result determines if there is a bit error during the transmission of the bit block stream.
  • the second boundary bit block is received at the first time, and the first parity result and the second parity result are received at the second time, where the first time is earlier than the second time, Or the first moment is later than the second moment, the first moment is equal to the second moment.
  • the check object of the third parity result may be consecutive m bits of each of the T bit blocks, and the check object of the fourth parity result may be each bit block of the T bit blocks.
  • the check object of the first parity result may be consecutive m bits of each of the N bit blocks, and the check object of the second parity result may be N bit blocks.
  • the check object of the third parity result includes only m consecutive bits of each bit block in the T bit block In addition, it may further include consecutive m bits of the first boundary bit block, and may also include consecutive m bits of the second boundary bit block; likewise, the check object of the fourth parity result includes T except In addition to successive n bits of each bit block in a block of bits, it may also include consecutive n bits of the first boundary bit block, and may also include consecutive n bits of the second boundary bit block.
  • the check object of the first parity result may include, in addition to consecutive m bits of each of the N bit blocks, consecutive m bits of the first boundary bit block, and may also include The consecutive m bits of the two boundary bit blocks; likewise, the check object of the second parity result may include the first one in addition to the consecutive n bits of each of the N bit blocks The consecutive n bits of the boundary bit block may also include consecutive n bits of the second boundary bit block.
  • the check object of the third parity result also needs to include consecutive m bits of the first boundary bit block;
  • the check object of the first parity result includes consecutive m bits of the second boundary bit block, the check object of the third parity result also needs to include consecutive m bits of the second boundary bit block;
  • the check object of the second parity result includes consecutive n bits of the first boundary bit block, the check object of the fourth parity result also needs to include consecutive n bits of the first boundary bit block;
  • the check object of the second parity result includes consecutive n bits of the second boundary bit block, the check object of the fourth parity result also needs to include consecutive n bits of the second boundary bit block.
  • the first parity result and the second parity result are stored in the second boundary bit block.
  • the receiving device determines, according to the first parity result and the third parity result, and the second parity result and the fourth parity result, whether the T bit blocks have an error.
  • the specific method is: if it is determined that the first parity result and the third parity result are the same, and the second parity result is the same as the fourth parity result, determining that there are no error codes in the T bit blocks; It is determined that the first parity result and the third parity result are not the same, and/or the second parity result and the fourth parity result are not the same, and it is determined that the T bit blocks have an error.
  • the receiving device determines a preset algorithm used by the third parity result and the fourth parity result, and a preset algorithm used by the transmitting device to determine the first parity result and the second parity result. The same, the repetition will not be repeated.
  • the receiving device receives the first verification result set
  • the first verification result set is calculated according to the xBIP-y algorithm
  • the first verification result set includes the y-bit monitoring code.
  • a first parity result and a second parity result are included.
  • the receiving device needs to determine a second set of check results, the second parity result is calculated according to the xBIP-y algorithm, and the y-bit monitoring code included in the second check result set includes the third parity result and the first Three parity results. Further, the receiving device determines, according to the first verification result set and the second verification result set, whether the T bit blocks have an error.
  • the receiving device receives the first check result set, the first check result set is calculated according to the flexBIP-z algorithm, and the first check result set includes the z-bit monitoring code.
  • the first parity result and the second parity result are included.
  • the receiving device needs to determine a second verification result set, where the second verification result set is calculated according to the flexBIP-z algorithm, and the z-bit monitoring code included in the second verification result set includes the third parity result and the third Four parity results. Further, the receiving device determines, according to the first verification result set and the second verification result set, whether the T bit blocks have an error.
  • the receiving device determines, according to the first verification result set and the second verification result set, whether the T bit blocks have an error, including the following two possible situations:
  • the error or error detection of the M/N Bit Block network path can be completely implemented by using the method provided in the embodiment of the present application, without affecting user services, and the bearer efficiency is 100%, and the bit block inserted or deleted due to the synchronization problem during the transmission process can be tolerated.
  • the detection period ie, the number of bit blocks between two boundary bit blocks
  • the detection accuracy ie, the preset algorithm
  • the detection method can not only use the path of the bit block stream to be verified as an end-to-end path, but also the path of the bit block stream to be verified as a non-end-to-end path.
  • the embodiment of the present application provides a bit block stream error detection method to solve the problem that the error detection method in the M/N Bit block exchange scenario is difficult to implement and has low bearer efficiency.
  • the method comprises:
  • Step 1300 The first device determines the detected segment according to a start byte in the start block in the bit block stream and an end byte in the end block corresponding to the start block.
  • the user service starts with the start block/S/flag, the end block/T/flag ends, and the middle D is a pure data block, as shown in FIG.
  • the seventh line corresponds to the pattern definition of the start block
  • S0 represents the start byte
  • lines 9-16 correspond to the pattern definitions of the eight end blocks, respectively
  • T0-T7 represents the end.
  • the byte as shown in FIG. 17, is exemplified by including T0 in the end block, and the detected segment is a byte from S0 to T0.
  • Step 1310 The first device calculates a first verification result according to the detected segment.
  • the algorithm used by the first device in calculating the first check result may be CRC-x or BIP-x, and the result of the first check result is recorded as B, and B may be one or more bytes.
  • Step 1320 The first device sends the first check result and the bit block stream.
  • the sending, by the first device, the first check result and the bit block stream may specifically include the following two possible implementation manners:
  • the first possible implementation manner the first device sends the first check result and the bit block stream to the second device.
  • a second possible implementation manner is: the first device sends the first verification result to the third device, and sends the bit block flow to the second device.
  • the first device here is a bit block transmitting end
  • the second device is a bit block receiving end
  • the third device is an SDN controller, or has any device for determining a bit stream transmission error function.
  • the first device needs to store the first verification result obtained by the calculation, including the following two types. Possible storage methods:
  • the first storage mode the first device stores the first verification result in the end block, and obtains the updated end block.
  • the first device stores the first check result in the end block, and specifically includes the following two scenarios:
  • Scenario 1 When the number of bytes occupied by the first check result is greater than or equal to the target number of bytes, the first device stores the first check result before the end byte in the end block, and occupies according to the first check result. The number of bytes moves the end byte to a new block after the end block, deletes any first bit block in the bit block stream, and adds the new block where the end byte is moved as the updated end block.
  • the target number of bytes is the number of bytes in the end block after the end byte plus one.
  • Scenario 2 When the number of bytes occupied by the first check result is less than the target number of bytes, the first device stores the first check result before the end byte in the end block, and is occupied according to the first check result. The number of bytes will end the byte and the number of bytes occupied by the first check result, and the bit block where the end byte is moved is used as the updated end block.
  • the target number of bytes is the number of bytes in the end block after the end byte plus one.
  • the end block When the end block is not inserted B, if the end block is D0 D1 D2 D3 D4 D5 D6 T7, the target number of bytes is 1, after inserting B, it is updated to D0 D1 D2 D3 D4 D5 D6 B, and then add a block.
  • the updated end block is T0 C1 C2 C3 C4 C5 C6 C7.
  • the end block When the end block is not inserted B, if the end block is T0 C1 C2 C3 C4 C5 C6 C7, the target number of bytes is 8, and after inserting B, the updated end block is B T1 C1 C2 C3 C4 C5 C6. Similarly, when the end block is not inserted B, if the end byte included in the end block is T1-T6, after inserting B, the corresponding update is T2-T7.
  • the second storage mode the first device stores the first check result in the check result storage block, and deletes any first bit block in the bit block stream, where the check result storage block refers to before the end block A new block, the first bit block refers to a bit block that may be inserted into or deleted from the bit block stream during the transmission of the bit block stream.
  • a data block is separately allocated for storing the first verification result B calculated by using CRC-x or BIP-x, and the type is D0 D1 D2 D3 D4 D5 D6 D7, corresponding to FIG. 1
  • D0-D7 is used to store the calculation result B.
  • an IDLE Block (/I/identified block) after /T/Block is deleted. As shown in FIG. 20, B occupies one block separately, and the IDLE block after /T/ is deleted one.
  • the embodiment of the present application provides a bit block stream error detection method to solve the problem that the error detection method in the M/N Bit block exchange scenario is difficult to implement and has low bearer efficiency.
  • the method comprises:
  • Step 2100 The second device determines the detected segment according to the start byte in the start block in the bit block stream and the end byte in the end block corresponding to the start block.
  • the second device determines, according to the start byte in the start block in the bit block stream and the end byte in the end block corresponding to the start block, that the detected segment includes the following three specific cases:
  • Case 1 When the second device receives the first verification result, and the first verification result is stored in the end block, the second device deletes the second verification result from the end block, and obtains the updated end block, and The byte between the start byte in the start block and the end byte in the updated end block is taken as the detected segment.
  • Case 2 When the second device receives the first verification result, and the first verification result is stored in the verification result storage block, the second device deletes the verification result storage block from the bit block stream, and obtains the updated a bit block stream, the byte between the start byte in the start block and the end byte in the end block in the updated bit block stream is used as the detected segment, wherein the check result storage block is located at the end block prior to.
  • the first check result is included in the byte between the start byte in the start block and the end byte in the end block. Therefore, the first check result needs to be deleted first, and the remaining The part is taken as the detected section.
  • Case 3 When the second device does not receive the first check result, the second device detects the byte between the start byte in the start block and the end byte in the end block in the bit block stream as the detected Section.
  • the byte between the start byte in the start block and the end byte in the end block does not include the first check result, and can be directly used as the detected segment.
  • the second device when the second device does not receive the first verification result, the second device sends the second verification result to the third device, where the third device stores the first verification. result.
  • the third device is an SDN controller or any device having a function of determining a bit stream transmission error.
  • Step 2110 The second device calculates a second verification result according to the detected segment.
  • the algorithm used by the second device in calculating the second verification result is the same as the algorithm used when the first device calculates the first verification result.
  • Step 2120 When the second device receives the first verification result, the second device determines, according to the first verification result and the second verification result, whether the detected segment has an error.
  • the second device determines that the first verification result is the same as the second verification result, determining that the detected segment does not have an error, and if it is determined that the first verification result is different from the second verification result, determining that the second verification result is different from the second verification result There is a bit error in the detection section.
  • the second device deletes the first check result from the end block, and obtains the updated end block, which specifically includes the following two scenarios:
  • Scenario 1 When the number of bytes occupied by the first check result is greater than or equal to the target number of bytes, the second device moves the end byte to a bit block before the end block according to the number of bytes occupied by the first check result. A first bit block is added to the bit block stream, and the bit block in which the end byte is moved is used as the updated end block.
  • the target number of bytes is the number of bytes in the end block before the end byte plus one.
  • Scenario 2 When the number of bytes occupied by the first check result is less than the target number of bytes, the first device advances the end byte by the number of bytes occupied by the first check result and advances the byte occupied by the first check result.
  • the number is the bit block in which the end byte is moved as the updated end block.
  • the target number of bytes is the number of bytes in the end block before the end byte plus one.
  • the end block is B T1 C1 C2 C3 C4 C5 C6, the target number of bytes is 2, and after B is deleted, the updated end block is T0 C1 C2 C3 C4 C5 C6 C7. Similarly, if the end byte included in the end block is T2-T7, and B is deleted, the corresponding update is T1-T6.
  • the end block is T0 C1 C2 C3 C4 C5 C6 C7
  • the data block immediately before the end block is D0 D1 D2 D3 D4 D5 D6 B
  • the target number of bytes is 1, and after deleting B, the updated end block is D0 D1 D2 D3 D4 D5 D6 T7.
  • the second device when the second device receives the first check result, and the first check result is stored in the check result storage block, the second device deletes the check result storage block from the bit block stream, and obtains the updated bit.
  • a block stream in which the check result storage block is located before the end block.
  • the error or error detection of the M/N Bit Block network path can be completely implemented by using the method provided in the embodiment of the present application, which has little impact on the user service, is close to the SDH/OTN, and is superior to the detection mode of the existing packet, and the implementation process is simple. Easy to implement.
  • the device of the present application proposes a new device for transmitting an M1/M2 bit block stream.
  • a bit error detection unit is also called a bit error ratio (BER) unit, which is referred to as BER. This unit is used to calculate the check result and error detection.
  • BER bit error ratio
  • the PE device includes uAdpt, L1.5Switch, nAdpt, and BER. One end is connected to the user equipment, the interface is UNI, and the other end is connected to the network device. The interface is NNI.
  • the P device includes uAdpt, L1.5Switch, nAdpt, and BER. Both are connected to the network device, and the interface is NNI, as shown in Figure 23(a) and Figure 23(b).
  • the embodiment of the present application further provides a packet bearer product, such as an IPRAN and PTN device that plans to load X-E features.
  • a packet bearer product such as an IPRAN and PTN device that plans to load X-E features.
  • the present application provides a packet bearer product, where the interface board can be an interface card of a box device or an interface chip of a line card of a box device.
  • the embodiment of the present application further provides a packet bearer product.
  • the present application provides a new type of chip, such as SDxxxx, which is built into the chip, or in an existing interface chip, such as SDyyyy and the host. Between the switch boards, a Field-Programmable Gate Array (FPGA) or Network Processor (NP) is added to implement the BER function through the FPGA or NP.
  • FPGA Field-Programmable Gate Array
  • NP Network Processor
  • the path of the checked bit block stream is an end-to-end path.
  • Embodiment 1 The user side interface (UNI) is 1GE, the network side interface (NNI) is 100GE, the granularity of the three-end XE equipment XE1, XE2, XE3, L1.5Switch exchange and the network side signal flow is 64/66 Bit Block flow.
  • UNI user side interface
  • NNI network side interface
  • the granularity of the three-end XE equipment XE1, XE2, XE3, L1.5Switch exchange and the network side signal flow is 64/66 Bit Block flow.
  • an 8BIP-8 check result is inserted every 1024 blocks as an example to illustrate the embodiment shown in FIG.
  • the STEP 1:1GE user signal enters the XE1 device from the UNI side. uAdpt transcodes the 8/10BitBlock to 64/66 Bit Block, which in turn combines the 8GE user signals of the 2Bit sync header into one 64Bit string, and then adds The 2Bit sync header forms a 64/66 Bit block, and in this way, a 64/66 Bit Block stream is finally formed.
  • the BER counts the block in the bit block stream from the uAdpt side, inserts a first boundary bit block before the first bit block, and calculates the first check result set by using the 8BIP-8 algorithm, when the number of blocks reaches After 1024, as the first group of blocks, the first set of check results is stored in a bit block identified by 4B and 06 and inserted after the 1024th bit block as a second boundary bit block.
  • an IDLE Block in the bit block stream is deleted.
  • the BER-processed bit block stream enters the L1.5Switch and then enters nAdpt to be sent to the network side.
  • the BER continues to count the Block, and uses the 8BIP-8 algorithm to calculate the first set of check results of the second set of blocks, which is the same as the processing method of the first set of Blocks, and then the first check result of the second set of Blocks.
  • the set is stored in a bit block identified by 4B and 06 and inserted after the 2048th bit block as a third boundary bit block. The BER repeats the above process until the end of the bit block stream.
  • STEP 2 The bit block stream sent by X1 is passed to nAdpt of XE2.
  • the receiving clock frequency is slower than the XE1 system clock.
  • the nAdpt of X2 needs to insert one or several IDLE blocks when sending to L1.5Switch to tolerate the clock frequency being out of sync.
  • the resulting transmission speed problem is then passed to the direction of the network side XE3.
  • STEP 3 The bit block stream sent by X2 is transmitted to XE3, and reaches the BER unit of the UNI side through nAdpt and L1.5Switch; when receiving the first boundary bit block, the BER starts to perform 8BIP-8 on the subsequently received bit block stream.
  • the BER stops calculating, and the bit block between the first boundary bit block and the second boundary bit block is used as the first group block.
  • the BER compares the second check result set obtained by the current calculation with the first check result set stored in the second boundary bit block, and if there is no difference, there is no error code. If the BER is inconsistent, the number of error codes is counted and stored.
  • the second boundary bit block is deleted from the bit block stream and an IDLE Block is inserted.
  • the two sync headers are removed, and 64 bits are divided into eight 8-bit groups, each of which adds a 2Bit sync header and is sequentially sent to the UNI link.
  • the BER continues to count the Block, and uses the 8BIP-8 algorithm to calculate a second set of check results for the second set of blocks, and the second set of blocks is a block of bits between the second boundary block and the third boundary block.
  • the BER stops calculating.
  • the BER stores the second check result set of the second group of blocks and the third boundary bit block.
  • the first set of check results of the second group of blocks is compared, and if there is no error, the number of errors is counted and stored. The BER repeats the above process until the end of the bit block stream.
  • the user signal enters XE1 and passes through XE2, and flows out of the network from XE3.
  • the xBIP-y error detection is completely implemented on the entire end-to-end path, and the implementation manner is simple.
  • the block carrying the xBIP-y result has no impact on the user service by adding or deleting IDLE Block compensation, and the bearer efficiency is 100%.
  • the asynchronous node has an IDLE Block insertion or deletion.
  • the xBIP-y algorithm tolerates this scenario and ensures that the verification result is accurate and effective.
  • the xBIP-y algorithm, flexBIP-y algorithm is obviously superior to the static rigid mode of ETHERNET, SDH and OTN occupying fixed bytes. It compensates with the first bit block and has no influence on the user signal, but the existing ETHERNET, SDH and OTN errors. Code or error detection occupies a fixed byte and occupies user bandwidth.
  • the path of the checked bit block stream is a non-end-to-end path.
  • the start end of the path shown in FIG. 27( a ) performs calculation of the first check result set
  • the unit inserted into the second boundary bit block is the BER of the nAdpt unit side
  • the end of the path performs the calculation second.
  • the check result set deletes the unit of the second boundary bit block as the BER of the nAdpt unit side;
  • the start end of the path shown in FIG. 27(b) performs calculation of the first check result set.
  • the unit inserted into the second boundary bit block is the BER of the uAdpt unit side, and the end end of the path performs calculation to delete the second check result set.
  • the unit of the second boundary bit block is the BER of the nAdpt unit side;
  • bit block stream in the path shown in FIG. 27(b) does not flow to the L1.5Switch element and the uAdpt unit at the end.
  • Embodiment 2 The user side interface (UNI) is 1GE, the network side interface (NNI) is 100GE, the granularity of the three-end XE equipment XE1, XE2, XE3, L1.5Switch exchange and the network side signal flow is 64/66 Bit Block flow.
  • UNI user side interface
  • NNI network side interface
  • the granularity of the three-end XE equipment XE1, XE2, XE3, L1.5Switch exchange and the network side signal flow is 64/66 Bit Block flow.
  • a BIP-8 result B1 is inserted into the end block as an example, and the embodiment shown in FIG. 26 is explained.
  • the STEP 1:1GE user signal enters the XE1 device from the UNI side.
  • uAdpt transcodes the 8/10BitBlock to 64/66 Bit Block, which in turn combines the 8GE user signals of the 2Bit sync header into one 64Bit string, and then adds The 2Bit sync header forms a 64/66 Bit block, and in this way, a 64/66 Bit Block stream is finally formed.
  • the BER identifies the bit block stream from the uAdpt side, starts the BIP-8 calculation from the receipt of the start block /S/identity block, receives the Block stop calculation with the end block /T/identification, and inserts the result B1. Before /T/, the /T/pattern is modified at the same time, and the bit block stream processed by the BER enters the L1.5Switch, and then enters nAdpt and is sent to the network side.
  • the BER continues to identify the bit block stream from the uAdpt side, repeating the above process until the end of the bit block stream.
  • STEP 2 The bit block stream sent by X1 is passed to nAdpt of XE2.
  • the receiving clock frequency is higher than the XE1 system clock block.
  • the nAdpt of X2 needs to delete one or several IDLE blocks when sending to L1.5Switch to tolerate the clock frequency being out of sync.
  • the resulting transmission speed problem is then passed to the direction of the network side XE3.
  • STEP 3 The bit block stream sent by X2 is passed to XE3, and reaches the UNI side BER unit via nAdpt and L1.5Switch; the BER recognizes the bit block stream, and starts BIP- from the start block/S/flag block. 8 Calculate, receive the Block with the end block /T / flag, stop the calculation before ending the result B1 in the block, delete the result B1, and modify the /T / pattern. The BER compares the result B2 obtained by the current calculation with the result B1, and if there is no error, the error is counted and stored.
  • the two sync headers are removed, and 64 bits are divided into eight 8-bit groups, each of which adds a 2Bit sync header and is sequentially sent to the UNI link.
  • the BIP-8 algorithm mentioned above can be calculated and replaced with the CRC-8 algorithm.
  • the user signal enters XE1 and passes through XE2, and flows out of the network from XE3.
  • the CRC or BIP error detection is completely implemented on the entire end-to-end path.
  • the implementation is simple; the bearer efficiency is improved compared with the existing Ethernet, and SDH and OTN are improved. Close, but there is a certain gap with the embodiment 1 shown in FIG. 26;
  • the BER inserts the result B1 into a separate block before /T/Block, while deleting the IDLE Block after /T/Block, and in STEP 3, deleting the independent block, and /T/Block adds IDLE Block to compensate, has no impact on user services, and bears 100% efficiency.
  • the bit block stream error detection method provided by the embodiment of the present application is a detection mode for the bit block stream transmission path, and is not limited to the telecommunication cable bearer, and can be completely used in a wireless communication, industrial or industrial communication network.
  • the present application further provides a bit block stream error detecting device, which can be used to perform the corresponding method embodiment in FIG. 6 , and thus the bit block stream error detecting device provided by the embodiment of the present application
  • a bit block stream error detecting device which can be used to perform the corresponding method embodiment in FIG. 6 , and thus the bit block stream error detecting device provided by the embodiment of the present application
  • the bit block stream error detecting device provided by the embodiment of the present application
  • the embodiment of the present application provides a bit block stream error detecting device 2800, including: a transceiver 2801 and a processor 2802;
  • the transceiver 2801 is configured to send a first boundary bit block, where the first boundary bit block is used to distinguish the N bit blocks that are subsequently sent, and N is a positive integer; the first bit block is sequentially sent, and I is greater than or equal to 1 and less than or equal to An integer of N;
  • the processor 2802 is configured to determine a first parity result and a second parity result, where the check object of the first parity result includes consecutive m pieces of each of the N bit blocks a bit, the check object of the second parity result includes consecutive n bits of each of the N bit blocks, at least one of m, n being greater than or equal to 2;
  • the transceiver 2801 is further configured to send a second boundary bit block, the first parity result, and the second parity result, where the second boundary bit block is used to distinguish the that has been sent N bit blocks.
  • the type of each bit block is an M1/M2 bit block, where M1 represents the number of payload bits in each bit block, and M2 represents the total number of bits per bit block, M2-M1 Represents the number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
  • the transceiver 2801 is configured to:
  • the transceiver 2801 is configured to:
  • the first parity result and the second parity result are stored in the second boundary bit block.
  • the first parity result and the second parity result are calculated according to a preset check algorithm, where the preset check algorithm is used when the N
  • the first parity block and the second parity result are not changed when the first bit block is added or decreased in the bit block, and the first bit block refers to the transmission process of the N bit blocks It is possible to insert the N bit blocks or the bit blocks deleted from the N bit blocks.
  • the preset check algorithm is an xBIP-y algorithm, where x is the number of bits of consecutive bit interleaving, and x is determined according to the definition of the pattern of the first bit block, y Refers to the number of monitored segments, x, y is a positive integer, y ⁇ 2;
  • the processor 2802 is configured to record, from the first payload bit of the N bit blocks, each x consecutive bits of each bit block to the first monitoring segment to the yth monitoring region. segment;
  • the preset check algorithm is a flexBIP-z algorithm, where z is the number of monitored segments, and the number of consecutive bit interleaving bits corresponding to each monitoring segment is not the same, z
  • the number of bits of consecutive bit interleaving corresponding to each monitoring section is A1, A2, A 3 ... Az-1, Az, A1, A2, A 3 ... Az-1, Az, z are positive integers, z ⁇ 2 ;
  • the processor 2802 is configured to record, according to the first payload bit of the N bit blocks, the A1 consecutive bits in each bit block to the first monitoring segment, and the A1 consecutive segments A2 consecutive bits after the bit are recorded to the second monitoring segment, and A3 consecutive bits after the A2 consecutive bits are recorded to the third monitoring segment until after the Az-1 consecutive bits are Az consecutive bits are recorded to the zth monitoring section;
  • the processor 2802 is configured to:
  • the first verification result set includes the y-bit monitoring code, or the first verification result set includes the z-bit monitoring code
  • the transceiver 2801 is configured to:
  • the present application further provides a bit block stream error detecting device, which can be used to perform the corresponding method embodiment in FIG. 12, and thus the bit block stream error detecting device provided by the embodiment of the present application is
  • the implementation manner reference may be made to the implementation manner of the method, and the repeated description is not repeated.
  • the embodiment of the present application provides a bit block stream error detecting device 2900, including: a transceiver 2901 and a processor 2902;
  • the transceiver 2901 is configured to receive a first boundary bit block, where the first boundary bit block is used to distinguish the subsequently received T bit blocks, where T is a positive integer; and the first bit block is sequentially received, where I is greater than or equal to 1 and less than or equal to An integer of T; receiving a second boundary bit block, the second boundary bit block being used to distinguish the T bit blocks that have been received;
  • the processor 2902 is configured to determine a third parity result and a fourth parity result, where the check object of the third parity result includes consecutive m pieces of each of the T bit blocks a bit, the check object of the fourth parity result includes consecutive n bits of each of the T bit blocks, at least one of m, n being greater than or equal to 2; when passing through the transceiver Receiving the first parity result and the second parity result, according to the first parity result and the third parity result, and the second parity result and the fourth a parity result, determining whether the T bit blocks have an error, wherein the check object of the first parity result includes consecutive m bits of each of the N bit blocks, The check object of the second parity result includes consecutive n bits of each of the N bit blocks, where N is the result of determining the first parity result and the second parity result Between the first boundary bit block and the second boundary bit block Patent number blocks.
  • the transceiver 2901 is also used to:
  • the type of each bit block is an M1/M2 bit block, where M1 represents the number of payload bits in each bit block, and M2 represents the total number of bits per bit block, M2-M1 Represents the number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
  • the transceiver 2901 is used to:
  • the first parity result and the second parity result are stored in the second boundary bit block.
  • the third parity result and the fourth parity result are calculated according to a preset check algorithm, where the preset check algorithm is used when the T
  • the third parity result and the fourth parity result are not changed when the first bit block is added or decreased in the bit block, and the first bit block refers to the transmission process of the T bit block It is possible to insert the T bit blocks or the bit blocks deleted from the T bit blocks.
  • the preset check algorithm is an xBIP-y algorithm, where x is the number of bits of consecutive bit interleaving, and x is determined according to the definition of the pattern of the first bit block, y Refers to the number of monitored segments, x, y is a positive integer, y ⁇ 2;
  • the processor 2902 is configured to record, from the first payload bit of the T bit blocks, each x consecutive bits of each bit block to the first monitoring segment to the yth monitoring region. segment;
  • the preset check algorithm is a flexBIP-z algorithm, where z is the number of monitored segments, and the number of consecutive bit interleaving bits corresponding to each monitoring segment is not the same, z
  • the number of bits of consecutive bit interleaving corresponding to each monitoring section is A1, A2, A 3 ... Az-1, Az, A1, A2, A 3 ... Az-1, Az, z are positive integers, z ⁇ 2 ;
  • the processor 2902 is configured to record, according to a first payload bit of the T bit blocks, A1 consecutive bits of each bit block to a first monitoring segment, where the A1 consecutive bits are The last A2 consecutive bits are recorded to the second monitoring segment, and the A3 consecutive bits after the A2 consecutive bits are recorded to the third monitoring segment until the Az-1 consecutive bits are followed by Az. Continuous bits are recorded to the zth monitoring section;
  • the processor 2902 is configured to:
  • the transceiver 2901 is configured to:
  • the processor 2902 is configured to: determine a second check result set, where the second parity result is calculated according to the xBIP-y algorithm, and the second check result set includes y bit monitoring Included in the code, the third parity result and the third parity result; determining, according to the first verification result set and the second verification result set, whether the T bit blocks have errors code.
  • the transceiver 2901 is configured to:
  • the processor 2902 is configured to: determine a second verification result set, where the second verification result set is calculated according to the flexBIP-z algorithm, and the second verification result set includes z-bit monitoring
  • the code includes the third parity result and the fourth parity result; determining, according to the first verification result set and the second verification result set, whether the T bit block has an error code.
  • the processor 2902 is configured to:
  • the present application further provides a bit block stream error detecting device, which can be used to perform the corresponding method embodiment in FIG. 13 , and therefore, the bit block stream error detecting device provided by the embodiment of the present application is
  • the implementation manner reference may be made to the implementation manner of the method, and the repeated description is not repeated.
  • the embodiment of the present application provides a bit block stream error detecting apparatus 3000, including: a transceiver 3001 and a processor 3002;
  • the processor 3002 is configured to determine, according to a start byte in a start block in a bit block stream and an end byte in an end block corresponding to the start block, a detected segment; and calculate, according to the detected segment First verification result;
  • the transceiver 3001 is configured to send the first check result and the bit block stream.
  • the bit block stream includes at least one M1/M2 bit block; wherein M1 represents the number of payload bits in each bit block, and M2 represents the total number of bits per bit block, M2- M1 represents the number of header sync header bits in each bit block, and M1 and M2 are positive integers, and M2>M1.
  • the transceiver 3001 is configured to:
  • the processor 3002 is further configured to:
  • the transceiver Before the transceiver sends the first verification result and the bit block stream to the second device, storing the first verification result in the end block to obtain an updated end block; or Storing the first check result in a check result storage block, and deleting any first bit block in the bit block stream, where the check result storage block refers to being located before the end block A new block, the first bit block being a bit block that may be inserted into or deleted from the bit block stream during transmission of the bit block stream.
  • the processor 3002 is configured to:
  • the target number of bytes is the number of bytes in the end block after the end byte plus one.
  • the present application further provides a bit block stream error detecting device, which can be used to perform the corresponding method embodiment in FIG. 21, and thus the bit block stream error detecting device provided by the embodiment of the present application is
  • the bit block stream error detecting device provided by the embodiment of the present application is
  • the embodiment of the present application provides a bit block stream error detecting apparatus 3100, including: a transceiver 3101 and a processor 3102;
  • the processor 3102 is configured to determine a detected segment according to a start byte in a start block in a bit block stream and an end byte in an end block corresponding to the start block, and calculate, according to the detected segment Second verification result;
  • the transceiver 3101 When the first check result is received by the transceiver 3101, it is determined whether the detected segment has an error according to the first check result and the second check result.
  • the bit block stream includes at least one M1/M2 bit block; wherein M1 represents the number of payload bits in each bit block, and M2 represents the total number of bits per bit block, M2- M1 represents the number of header sync header bits in each bit block, and M1 and M2 are positive integers, and M2>M1.
  • the processor 3102 is configured to:
  • the second check result is deleted from the end block, and the updated end block is obtained. a byte between the start byte in the start block and the end byte in the updated end block as a detected segment;
  • the verification result storage block is deleted from the bit block stream, and the updated a bit block stream, the byte between the start byte in the start block and the end byte in the end block in the updated bit block stream is used as a detected segment, wherein a check result storage block is located before the end block;
  • the transceiver 3101 is further configured to:
  • the second verification result is sent to the third device, and the third device stores the first verification result.
  • the processor 3102 is configured to:
  • the processor 3102 is configured to:
  • the end byte is forwarded by the first check result according to the number of bytes occupied by the first check result
  • the number of bytes occupied, the bit block in which the end byte is moved is used as the updated end block
  • the target number of bytes is the number of bytes in the end block before the end byte plus one.
  • the embodiment of the present application provides a bit block stream error detection method, where the method includes: the sending device sends a first boundary bit block, where the first boundary bit block is used to distinguish the N bit blocks that are subsequently sent, N a positive integer; the first bit block is sequentially transmitted, I is an integer greater than or equal to 1 and less than or equal to N; the first parity result and the second parity result are determined, and the check object of the first parity result includes N a continuous m bits of each bit block in the bit block, the check object of the second parity result includes consecutive n bits of each of the N bit blocks, at least one of m and n being greater than or equal to 2: transmitting a second boundary bit block, a first parity result, and a second parity block, wherein the second boundary bit block is used to distinguish N bits that have been transmitted.
  • the receiving device receives the first boundary bit block, where the first boundary bit block is used to distinguish the subsequently received T bit blocks, T is a positive integer; the first bit block is sequentially received, and I is an integer greater than or equal to 1 and less than or equal to T; Receiving a second boundary bit block, the second boundary bit block is configured to distinguish the T bit blocks that have been received; determining a third parity result and a fourth parity result, where the check object of the third parity result includes Contiguous m bits of each of the T bit blocks, the check object of the second parity result includes at least one of n consecutive bits, m, n of each of the T bit blocks Greater than or equal to 2; when receiving the first parity result and the second parity result, according to the first parity result and the third parity result, and the second parity result and the fourth parity As a result, it is determined whether there are error codes in the T bit blocks, wherein the check object of the first parity result includes consecutive m bits of each of the N bit
  • the method provided by the embodiment of the present application can completely implement the error or error detection of the M/N Bit Block network path, does not affect the user service, and has a bearer efficiency of 100%, and can be inserted or deleted due to the synchronization problem during the transmission process.
  • the bit block, and the detection period (ie, the number of bit blocks between the two boundary bit blocks) and the detection accuracy (ie, the preset algorithm) are dynamically configurable as needed.
  • the detection method can not only use the path of the bit block stream to be verified as an end-to-end path, but also the path of the bit block stream to be verified as a non-end-to-end path. Therefore, the method provided by the embodiment of the present application can solve the problem that the error detection method in the M/N Bit block exchange scenario is difficult to implement and has low bearer efficiency.
  • the embodiment of the present application further provides a bit block stream error detection method, the method comprising: the first device according to a start byte in a start block in a bit block stream and an end word in an end block corresponding to the start block
  • the section determines the detected section; the first device calculates a first verification result according to the detected section.
  • the first device transmits the first check result and the bit block stream.
  • the algorithm used by the first device to calculate the first check result may be CRC-x or BIP-x, and the first check result is recorded as B, and B may be one or more bytes.
  • the second device determines the detected segment according to the start byte in the start block in the bit block stream and the end byte in the end block corresponding to the start block; the second device calculates the second check according to the detected segment result.
  • the second device receives the first verification result
  • the second device determines, according to the first verification result and the second verification result, whether the detected segment has an error. Therefore, the error or error detection of the M/N Bit Block network path can be completely implemented by using the method provided in the embodiment of the present application, which has little impact on the user service and is close to the SDH/OTN, and is superior to the error detection provided in the prior art.
  • Method the implementation process is simple and easy to implement.
  • embodiments of the present application can be provided as a method, system, or computer program product. Therefore, the embodiments of the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware. Moreover, embodiments of the present application can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
  • computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
  • Embodiments of the present application are described with reference to flowchart illustrations and/or block diagrams of methods, devices (systems), and computer program products according to embodiments of the present application. It will be understood that each flow and/or block of the flowchart illustrations and/or FIG.
  • These computer program instructions can be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing device to produce a machine for the execution of instructions for execution by a processor of a computer or other programmable data processing device.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Error Detection And Correction (AREA)

Abstract

Provided are a code error detection method and device for a bit block stream, for solving the problems of a code error detection method being difficult to realize in an M/N bit block exchange situation and a low loading efficiency. The method comprises: sending a first boundary bit block, wherein the first boundary bit block is used for differentiating N subsequently sent bit blocks; sending an Ith bit block in sequence, wherein I is an integer greater than or equal to 1 and less than or equal to N; determining a first odd-even check result and a second odd-even check result, wherein a check object of the first odd-even check result comprises m consecutive bits of each bit block in the N bit blocks, and a check object of the second odd-even check result comprises n consecutive bits of each bit block in the N bit blocks, with at least one of m and n being greater than or equal to 2; and sending a second boundary bit block, the first odd-even check result and the second odd-even check result, wherein the second boundary bit block is used for differentiating the N bit blocks that have been sent.

Description

一种比特块流误码检测方法及设备Bit block stream error detection method and device 技术领域Technical field
本申请涉及通信技术领域,特别涉及一种比特块流误码检测方法及设备。The present application relates to the field of communications technologies, and in particular, to a bit block stream error detection method and device.
背景技术Background technique
现有技术中,提出多种基于数据包(PACKET)进行误码检测的方法,例如,基于PACKET进行循环冗余校验(Cyclic Redundancy Check,CRC)检测。每个以太网报文根据其帧校验序列(Frame Check Sequence,FCS)域(CRC-32)判断错误包,通过统计一段时间内的错误包率,可以评估用户通道的质量。但是上述方式无法准确进行误码率(Bit error ratio,BER)测量。当没有用户业务数据包时,无法统计BER,或者用户业务数据包很少时,需要很长时间才能检测出BER。In the prior art, various methods for error detection based on a packet (PACKET) are proposed, for example, Cyclic Redundancy Check (CRC) detection based on PACKET. Each Ethernet packet is judged according to its Frame Check Sequence (FCS) field (CRC-32), and the quality of the user channel can be evaluated by counting the error packet rate over a period of time. However, the above method cannot accurately measure the bit error ratio (BER). When there is no user service data packet, the BER cannot be counted, or when the user service data packet is small, it takes a long time to detect the BER.
例如,按照一个以太网包FCS校验错,当做一个Bit错,则评估1*e-5的BER,需要连续至少收发及检测100000个以太网包。假设用户业务带宽10Mbps,满流量发送,以太网包长度为256B,则检测时间至少为22.08秒。如果用户业务带宽只有100Kbps,以太网包长度为256B,则检测时间至少为36.8分钟(2208秒)。For example, according to an Ethernet packet FCS check error, when a Bit error is made, the BER of 1*e-5 is evaluated, and at least 100,000 Ethernet packets need to be continuously sent and received and detected. Assuming that the user service bandwidth is 10 Mbps, full traffic is sent, and the Ethernet packet length is 256 B, the detection time is at least 22.08 seconds. If the user service bandwidth is only 100Kbps and the Ethernet packet length is 256B, the detection time is at least 36.8 minutes (2208 seconds).
如表1所示,FCS占用4字节,因此上述方法还存在占用较多固定帧字节的问题,且导致承载效率较低。引入CRC-32校验,当最小包为64B时承载效率降低6.25%;当最大包为1518B时承载效率降低0.263%。As shown in Table 1, the FCS occupies 4 bytes, so the above method still has the problem of occupying more fixed frame bytes, and the bearer efficiency is lower. The CRC-32 check is introduced. When the minimum packet is 64B, the bearer efficiency is reduced by 6.25%. When the maximum packet is 1518B, the bearer efficiency is reduced by 0.263%.
表1Table 1
Figure PCTCN2018086326-appb-000001
Figure PCTCN2018086326-appb-000001
此外,现有技术在还提出基于每帧做比特交织奇偶校验(Bit interleaving parity,BIP)的误码检测方法,例如在同步数字体系SDH(Synchronous Digital Hierarchy,SDH/光传送网(Optical Transport Network,OTN)中的帧结构设置了BIP校验的开销字节。因此,这种方法承载效率刚性,无法根据用户需求动态定义校验算法,例如BIP-8降级为BIP-4,或者升级为BIP-16。In addition, the prior art also proposes a bit error detection method based on bit interleaving parity (BIP) per frame, for example, in Synchronous Digital Hierarchy (SDH), an optical transport network (Optical Transport Network) The frame structure in OTN) sets the overhead bytes of the BIP check. Therefore, this method bears the efficiency rigidity and cannot dynamically define the check algorithm according to user requirements, such as BIP-8 downgrading to BIP-4, or upgrading to BIP. -16.
目前,第五代通信技术(即5G)已经在业界开始广泛研究,确定性低延时、可靠性、安全隔离技术已经成为5G急需攻克的重要课题。X-Ethernet(简称X-E)是一种基于Ethernet物理层的Bit Block交换技术,比如64/66 Bit Block,具备确定性超低时延的技术特征。X-Ethernet基于M/N Bit block交换,可以借用上述误码检测方法执行误码检测,例如可以包括以下两种方法:At present, the fifth-generation communication technology (ie 5G) has been widely studied in the industry. Deterministic low-latency, reliability, and security isolation technologies have become an important issue for 5G to overcome. X-Ethernet (X-E) is a Bit Block switching technology based on the Ethernet physical layer, such as 64/66 Bit Block, which has the technical characteristics of deterministic ultra-low latency. The X-Ethernet is based on the M/N Bit block exchange. The error detection method can be used to perform error detection. For example, the following two methods can be used:
方法1:借用基于PACKET进行CRC检测的方法,X-E逐Block安排几个Bit实施CRC校验,例如一个66Bit Block,可以设置4或8个Bit对其他60或56个Bit做CRC校验。Method 1: Borrowing a method based on PACKET for CRC detection, X-E arranges several Bits to perform CRC check on a block by block, for example, a 66Bit Block, which can set 4 or 8 Bits to perform CRC check on other 60 or 56 Bits.
方法2:借用SDH/OTN方式,逐Block安排一个字节或几个Bit实施BIP校验,例如一个66Bit Block,可以设置2-8个Bit对其他62-56个Bit做BIP校验。Method 2: Borrow SDH/OTN mode, arrange one byte or several Bits to implement BIP check by block, such as a 66Bit Block, you can set 2-8 Bits to perform BIP check on other 62-56 Bits.
虽然上述两种方法可以实施,但无论那种方法,设备中的处理单元需要逐Block进行 操作,因此实施难度较大。而且上述两种方法的承载效率都比较低,例如每个Block做BIP-4/CRC-4校验,承载效率将下降6.25%,每个Block做BIP-8/CRC-8,承载效率将下降12.5%。Although the above two methods can be implemented, regardless of the method, the processing unit in the device needs to operate on a block by block, and thus the implementation is difficult. Moreover, the carrying efficiency of the above two methods is relatively low. For example, each block performs BIP-4/CRC-4 check, the bearer efficiency will decrease by 6.25%, and each block will be BIP-8/CRC-8, and the carrying efficiency will decrease. 12.5%.
发明内容Summary of the invention
本申请实施例提供一种比特块流误码检测方法及设备,用以解决在M/N Bit block交换的场景中的误码检测方法实现难度较大且承载效率较低的问题。The embodiment of the present invention provides a bit block stream error detection method and device, which are used to solve the problem that the error detection method in the M/N Bit block exchange scenario is difficult to implement and has low bearer efficiency.
第一方面,一种比特块流误码检测方法,包括:发送第一边界比特块,第一边界比特块用于区别后续发送的N个比特块,N为正整数;依次发送第I比特块,I为大于等于1小于等于N的整数;确定第一奇偶校验结果和第二奇偶校验结果,第一奇偶校验结果的校验对象包括N个比特块中每个比特块的连续的m个比特,第二奇偶校验结果的校验对象包括N个比特块中每个比特块的连续的n个比特,m、n中的至少一个大于等于2;发送第二边界比特块、第一奇偶校验结果和第二奇偶校验结果,第二边界比特块用于区别已经发送完成的N个比特块。In a first aspect, a bit block stream error detection method includes: transmitting a first boundary bit block, where a first boundary bit block is used to distinguish N pieces of subsequent transmission, N is a positive integer; and transmitting a first bit block in sequence I is an integer greater than or equal to 1 and less than or equal to N; determining a first parity result and a second parity result, the check object of the first parity result including consecutive bits of each of the N bit blocks m bits, the parity object of the second parity result includes consecutive n bits of each of the N bit blocks, at least one of m and n being greater than or equal to 2; transmitting the second boundary bit block, A parity result and a second parity block are used to distinguish N bits that have been transmitted.
因此,采用本申请实施例提供的方法可以完整实施M/N Bit Block网络路径的错误或误码检测,不影响用户业务,承载效率100%,可以容忍传递过程中因同步问题而插入或删除的比特块,且检测周期(即两个边界比特块之间的比特块数目)和检测精度(即预设算法)动态按需可配置。此外,该检测方法不仅可以被校验的比特快流的路径为端到端的路径,还可以用于被校验的比特快流的路径为非端到端的路径。因此,采用本申请实施例提供的方法能够解决在M/N Bit block交换的场景中的误码检测方法实现难度较大且承载效率较低的问题。Therefore, the method provided by the embodiment of the present application can completely implement the error or error detection of the M/N Bit Block network path, does not affect the user service, and has a bearer efficiency of 100%, and can be inserted or deleted due to the synchronization problem during the transmission process. The bit block, and the detection period (ie, the number of bit blocks between the two boundary bit blocks) and the detection accuracy (ie, the preset algorithm) are dynamically configurable as needed. In addition, the detection method can not only verify that the path of the bit fast stream is an end-to-end path, but also can use the path of the verified bit fast stream as a non-end-to-end path. Therefore, the method provided by the embodiment of the present application can solve the problem that the error detection method in the M/N Bit block exchange scenario is difficult to implement and has low bearer efficiency.
应理解的是,当被校验的比特快流的路径为从比特块发送端到比特块接收端,或当被校验的比特快流的路径为从比特块发送端到比特块接收端之前的任一中间设备时,上述方法的执行主体可以为比特块发送端。当被校验的比特快流的路径为从比特块发送端到比特块接收端时,被校验的比特快流的路径是一个端到端的路径。当被校验的比特快流的路径为从比特块发送端到比特块接收端之前的任一中间设备时,被校验的比特快流的路径是一个一端悬空的路径。本申请中统称为发送设备。因此,本申请实施例不仅能够用于对端到端的路径进行误码检测,还可以对非端到端的路径进行误码检测,例如,规划的预留路径,1:1连接保护组的保护路径或有其他特殊目的的路径。当被校验的比特快流的路径为从比特块发送端之后的第一中间设备到比特块接收端之前第二中间设备时,上述方法的执行主体可以为第一中间设备。被校验的比特快流的路径为一个两端悬空的路径。It should be understood that when the path of the verified bit fast stream is from the bit block transmitting end to the bit block receiving end, or when the path of the verified bit fast stream is from the bit block transmitting end to the bit block receiving end When any of the intermediate devices is used, the execution body of the above method may be a bit block transmitting end. When the path of the verified bit fast stream is from the bit block transmitting end to the bit block receiving end, the path of the verified bit fast stream is an end-to-end path. When the path of the verified bit fast stream is any intermediate device from the bit block transmitting end to the bit block receiving end, the path of the verified bit fast stream is a path that is suspended at one end. This application is collectively referred to as a transmitting device. Therefore, the embodiment of the present application can be used not only for error detection of an end-to-end path, but also for error detection of a non-end-to-end path, for example, a planned reserved path, and a protection path of a 1:1 connection protection group. Or have other special purpose paths. When the path of the verified bit fast stream is the second intermediate device from the first intermediate device after the bit block transmitting end to the bit block receiving end, the execution body of the above method may be the first intermediate device. The path of the bit fast stream being verified is a path that is suspended at both ends.
在一种可能的设计中,每个比特块的类型为M1/M2比特块,其中,M1表示每个比特块中的净荷比特数,M2表示每个比特块的总比特数,M2-M1表示每个比特块中的首部同步头比特数,M1、M2为正整数,M2>M1。In one possible design, the type of each bit block is an M1/M2 bit block, where M1 represents the number of payload bits in each bit block, and M2 represents the total number of bits per bit block, M2-M1 Represents the number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
在一种可能的设计中,发送第一边界比特块,包括:发送第一边界比特块至第一设备;依次发送第I比特块,包括:依次发送第I比特块至第一设备;发送第二边界比特块、第一奇偶校验结果和第二奇偶校验结果可以包括两种情况:(1)发送第二边界比特块、第一奇偶校验结果和第二奇偶校验结果至第一设备;因此,在上述实现方式中,第一奇偶校验结果和第二奇偶校验结果与两个边界比特块和两个边界比特块之间的N个比特块一起发送至第一设备,当被校验的比特快流的路径为从比特块发送端到比特块接收端时,这里的第 一设备可以为比特块接收端,当被校验的比特快流的路径为从比特块发送端到比特块接收端之前的任一中间设备时,或当被校验的比特快流的路径为从比特块发送端之后的第一中间设备到比特块接收端之前第二中间设备时,这里的第一设备也可以是指中间设备。(2)发送第二边界比特块至第一设备,发送第一奇偶校验结果和第二奇偶校验结果至第二设备。须知,这里的第二设备可以为SDN控制器,或者具有判断比特流传输误码功能的任一设备。此外,这里两种方式还可以同时采用,即第一奇偶校验结果和第二奇偶校验结果既发送至第一设备也发送至第二设备。因此,本申请实施例提供了两种可选的方式以实现误码检测,更加灵活高效,实施简便。In a possible design, the sending the first boundary bit block includes: sending the first boundary bit block to the first device; and sequentially transmitting the first bit block, including: sequentially transmitting the first bit block to the first device; The two boundary bit block, the first parity result, and the second parity result may include two cases: (1) transmitting the second boundary bit block, the first parity result, and the second parity result to the first a device; therefore, in the above implementation, the first parity result and the second parity result are sent to the first device together with the N bit blocks between the two boundary bit blocks and the two boundary bit blocks, when When the path of the verified bit fast stream is from the bit block transmitting end to the bit block receiving end, the first device here may be the bit block receiving end, and when the verified bit fast stream path is the bit block transmitting end When going to any intermediate device before the bit block receiving end, or when the path of the verified bit fast stream is the second intermediate device from the first intermediate device after the bit block transmitting end to the bit block receiving end, here the first A device can also be an intermediate device. (2) transmitting the second boundary bit block to the first device, and transmitting the first parity result and the second parity result to the second device. It should be noted that the second device herein may be an SDN controller or any device having a function of determining a bit stream transmission error. In addition, the two methods can also be used at the same time, that is, the first parity result and the second parity result are sent to both the first device and the second device. Therefore, the embodiments of the present application provide two optional ways to implement error detection, which is more flexible and efficient, and is simple to implement.
在一种可能的设计中,发送第二边界比特块、第一奇偶校验结果和第二奇偶校验结果,以下几种可能的实现方式:在第一时刻发送第二边界比特块,在第二时刻发送第一奇偶校验结果和第二奇偶校验结果,其中,第一时刻早于第二时刻,或第一时刻晚于第二时刻,第一时刻等于第二时刻。In a possible design, the second boundary bit block, the first parity result, and the second parity result are sent, and the following possible implementation manners are: sending the second boundary bit block at the first moment, in the first The first parity result and the second parity result are sent at two moments, wherein the first moment is earlier than the second moment, or the first moment is later than the second moment, and the first moment is equal to the second moment.
在一种可能的设计中,第一奇偶校验结果和第二奇偶校验结果存储于第二边界比特块中。In one possible design, the first parity result and the second parity result are stored in a second boundary bit block.
因此,假设将比特块流中的每N个比特块为一组,第i个边界比特块存储第i组N个比特块对应的第一奇偶校验结果和第二奇偶校验结果,第i+1个边界比特块存储第i+1组N个比特块对应的第一奇偶校验结果和第二奇偶校验结果,其中,第i+1组N个比特块为第i个边界比特块与第i+1个边界比特块之间的比特块,i为正整数。Therefore, assuming that each N bit block in the bit block stream is a group, the i-th boundary bit block stores the first parity result and the second parity result corresponding to the i-th N-bit block, i +1 boundary bit block stores a first parity result and a second parity result corresponding to the i+1th group of N bit blocks, wherein the i+1th group of N bit blocks is the ith boundary bit block A bit block between the i+1th boundary bit block and i is a positive integer.
应理解的是,本申请中提到的边界比特块可以为新插入的比特块,在新插入一个边界比特块的同时,可以删除一个第一比特块,以减小对用户带宽的影响,其中,第一比特块是指在N个比特块的传输过程中可能插入N个比特块或从N个比特块中删除的比特块。例如,针对64/66比特块流,第一比特块可以是指空闲块。It should be understood that the boundary bit block mentioned in this application may be a newly inserted bit block, and a new bit block may be deleted, and a first bit block may be deleted to reduce the impact on user bandwidth. The first bit block refers to a bit block in which N bit blocks may be inserted or deleted from N bit blocks during transmission of N bit blocks. For example, for a 64/66 bit block stream, the first block of bits may refer to a free block.
在一种可能的设计中,第一奇偶校验结果和第二奇偶校验结果是根据预设校验算法计算得到的,预设校验算法用于当N个比特块中增加或减少第一比特块时不改变第一奇偶校验结果和第二奇偶校验结果,第一比特块是指在N个比特块的传输过程中可能插入N个比特块或从N个比特块中删除的比特块。因此,采用本申请实施例提供的预设校验算法能够保证第一奇偶校验结果和第二奇偶校验结果能够容忍传输过程中插入或删除一个或多个第一比特块(比如IDLE Block),而且当第一比特块发生误码时,也能被检测到。In a possible design, the first parity result and the second parity result are calculated according to a preset check algorithm, and the preset check algorithm is used to increase or decrease the first time in the N bit blocks. The first parity block does not change the first parity result and the second parity result, and the first bit block refers to a bit that may be inserted into or deleted from the N bit blocks during transmission of the N bit blocks. Piece. Therefore, the preset check algorithm provided by the embodiment of the present application can ensure that the first parity result and the second parity result can tolerate insertion or deletion of one or more first bit blocks (such as IDLE Block) during transmission. And when the first bit block has a bit error, it can also be detected.
在一种可能的设计中,预设校验算法为xBIP-y算法,其中,x是指连续比特交织的比特数,x是根据第一比特块的码型定义确定的,y是指监视区段的个数,x,y为正整数,y≥2,例如,8BIP-8算法,16BIP-4算法。采用xBIP-y算法确定第一奇偶校验结果和第二奇偶校验结果具体方法为:从N个比特块中的第1净荷比特开始,将每个比特块的每x个连续比特依次记录至第1个监视区段至第y个监视区段;针对每个监视区段采用奇校验或偶校验确定1比特监视码,获得y比特监视码,y比特监视码中包括第一奇偶校验结果和第二奇偶校验结果。因此,采用本申请实施例提供的xBIP-y算法能够容忍传输过程中插入或删除一个或多个第一比特块,方法简便。In a possible design, the preset check algorithm is the xBIP-y algorithm, where x is the number of bits of consecutive bit interleaving, x is determined according to the definition of the pattern of the first bit block, and y is the monitoring area. The number of segments, x, y is a positive integer, y ≥ 2, for example, 8BIP-8 algorithm, 16BIP-4 algorithm. The specific method of determining the first parity result and the second parity result by using the xBIP-y algorithm is: starting from the first payload bit of the N bit blocks, sequentially recording every x consecutive bits of each bit block. Up to the first monitoring section to the yth monitoring section; determining a 1-bit monitoring code by using an odd or even parity for each monitoring section, obtaining a y-bit monitoring code, and the first parity is included in the y-bit monitoring code Verification result and second parity result. Therefore, the xBIP-y algorithm provided by the embodiment of the present application can tolerate insertion or deletion of one or more first bit blocks during transmission, and the method is simple.
在一种可能的设计中,预设校验算法为flexBIP-z算法,其中,z是指监视区段的个数,每个监视区段对应的连续比特交织的比特数不全相同,z个监视区段分别对应的连续比特交织的比特数为A1、A2、A 3……Az-1,Az,A1、A2、A 3……Az-1,Az,z为正整数,z≥2;采用flexBIP-z算法确定第一奇偶校验结果和第二奇偶校验结果具体方法为: 从N个比特块中的第1净荷比特开始,将每个比特块中的A1个连续比特记录至第1个监视区段,将A1个连续比特后的A2个连续比特记录至第2个监视区段,将A2个连续比特后的A3个连续比特记录至第3个监视区段,直至将Az-1个连续比特后的Az个连续比特记录至第z个监视区段;针对每个监视区段采用奇校验或偶校验确定1比特监视码,获得z比特监视码,z比特监视码中包括第一奇偶校验结果和第二奇偶校验结果。因此,采用本申请实施例提供的flexBIP-z算法能够更加灵活,简洁地确定第一奇偶校验结果和第二奇偶校验结果,容忍传输过程中插入或删除一个或多个第一比特块。In a possible design, the preset verification algorithm is the flexBIP-z algorithm, where z refers to the number of monitoring segments, and the number of consecutive bit interleaving bits corresponding to each monitoring segment is not the same, z monitoring The number of consecutive bit interleaving corresponding to the segments is A1, A2, A 3 ... Az-1, Az, A1, A2, A 3 ... Az-1, Az, z are positive integers, z ≥ 2; The specific method of determining the first parity result and the second parity result by the flexBIP-z algorithm is: starting from the first payload bit of the N bit blocks, recording the A1 consecutive bits in each bit block to the first One monitoring segment records A2 consecutive bits after A1 consecutive bits to the second monitoring segment, and records A3 consecutive bits after A2 consecutive bits to the third monitoring segment until Az- Az consecutive bits after 1 consecutive bits are recorded to the zth monitoring segment; an odd parity or even parity is used for each monitoring segment to determine a 1-bit monitoring code, and a z-bit monitoring code is obtained, and the z-bit monitoring code is obtained. A first parity result and a second parity result are included. Therefore, the flexBIP-z algorithm provided by the embodiment of the present application can more flexibly and succinctly determine the first parity result and the second parity result, and tolerate insertion or deletion of one or more first bit blocks during transmission.
在一种可能的设计中,确定第一奇偶校验结果和第二奇偶校验结果,包括:确定第一校验结果集合,第一校验结果集合包括y比特监视码,或者,第一校验结果集合包括z比特监视码;发送第一奇偶校验结果和第二奇偶校验结果,包括:发送第一校验结果集合。因此,采用本申请实施例提供的方法可以完整实施M/N Bit Block网络路径的错误或误码检测。In a possible design, determining the first parity result and the second parity result includes: determining a first verification result set, the first verification result set includes a y-bit monitoring code, or, the first school The result set includes a z-bit monitoring code; transmitting the first parity result and the second parity result, comprising: transmitting the first verification result set. Therefore, the error or error detection of the M/N Bit Block network path can be completely implemented by using the method provided by the embodiment of the present application.
第二方面,一种比特块流误码检测方法,包括:接收第一边界比特块,第一边界比特块用于区别后续接收的T个比特块,T为正整数;依次接收第I比特块,I为大于等于1小于等于T的整数;接收第二边界比特块,第二边界比特块用于区别已经接收完成的T个比特块;确定第三奇偶校验结果和第四奇偶校验结果,第三奇偶校验结果的校验对象包括T个比特块中每个比特块的连续的m个比特,第二奇偶校验结果的校验对象包括T个比特块中每个比特块的连续的n个比特,m、n中的至少一个大于等于2;当接收到第一奇偶校验结果和第二奇偶校验结果时,根据第一奇偶校验结果和第三奇偶校验结果,以及第二奇偶校验结果和第四奇偶校验结果,确定T个比特块是否存在误码,其中,第一奇偶校验结果的校验对象包括N个比特块中每个比特块的连续的m个比特,第二奇偶校验结果的校验对象包括N个比特块中每个比特块的连续的n个比特,N为确定第一奇偶校验结果和第二奇偶校验结果时第一边界比特块和第二边界比特块之间的比特块的数目。因此,采用本申请实施例提供的方法可以完整实施M/N Bit Block网络路径的错误或误码检测,不影响用户业务,承载效率100%,可以容忍传递过程中因同步问题而插入或删除的比特块,且检测周期(即两个边界比特块之间的比特块数目)和检测精度(即预设算法)动态按需可配置。此外,该检测方法不仅可以被校验的比特快流的路径为端到端的路径,还可以用于被校验的比特快流的路径为非端到端的路径。因此,采用本申请实施例提供的方法能够解决在M/N Bit block交换的场景中的误码检测方法实现难度较大且承载效率较低的问题。In a second aspect, a bit block stream error detection method includes: receiving a first boundary bit block, where a first boundary bit block is used to distinguish T bits that are subsequently received, T is a positive integer; and receiving a first bit block in sequence I is an integer greater than or equal to 1 and less than or equal to T; receiving a second boundary bit block for distinguishing T bits that have been received; determining a third parity result and a fourth parity result The check object of the third parity result includes consecutive m bits of each of the T bit blocks, and the check object of the second parity result includes consecutive bits of each of the T bit blocks At least one of m bits, m, n is greater than or equal to 2; when receiving the first parity result and the second parity result, according to the first parity result and the third parity result, and Determining, by the second parity result and the fourth parity result, whether there is an error in the T bit blocks, wherein the check object of the first parity result includes consecutive m of each of the N bit blocks Bit, second parity The resulting check object includes consecutive n bits of each of the N bit blocks, and N is the first boundary bit block and the second boundary bit block when determining the first parity result and the second parity result. The number of bit blocks between. Therefore, the method provided by the embodiment of the present application can completely implement the error or error detection of the M/N Bit Block network path, does not affect the user service, and has a bearer efficiency of 100%, and can be inserted or deleted due to the synchronization problem during the transmission process. The bit block, and the detection period (ie, the number of bit blocks between the two boundary bit blocks) and the detection accuracy (ie, the preset algorithm) are dynamically configurable as needed. In addition, the detection method can not only verify that the path of the bit fast stream is an end-to-end path, but also can use the path of the verified bit fast stream as a non-end-to-end path. Therefore, the method provided by the embodiment of the present application can solve the problem that the error detection method in the M/N Bit block exchange scenario is difficult to implement and has low bearer efficiency.
应理解的是,当被校验的比特快流的路径为从比特块发送端到比特块接收端时,图13中各个步骤的执行主体可以为比特块接收端,当被校验的比特快流的路径为从比特块发送端到比特块接收端之前的任一中间设备,或当被校验的比特快流的路径为从比特块发送端到比特块接收端时,上述方法的执行主体可以为中间设备。本申请中统称为接收设备。It should be understood that when the path of the verified bit fast stream is from the bit block transmitting end to the bit block receiving end, the execution body of each step in FIG. 13 may be the bit block receiving end, when the checked bit is fast The path of the stream is any intermediate device from the transmitting end of the bit block to the receiving end of the bit block, or the execution body of the above method when the path of the bit stream to be verified is from the transmitting end of the bit block to the receiving end of the bit block Can be an intermediate device. This application is collectively referred to as a receiving device.
须知,这里的N个比特块为发送设备确定第一奇偶校验结果和第二奇偶校验结果时第一边界比特块与第二边界比特块之间的比特块。作为一个可选的实施例,发送设备发送第一边界比特块之后,依次发送了N个比特块,然后根据这N个比特块计算第一奇偶校验结果和第二奇偶校验结果,将这两个结果存储于第二边界比特块中,发送第二边界比特块。但是,考虑到从发送设备到接收设备所经过的路径中由于穿越异步节点,因此可能在N个比特块中插入或删除第一比特块,接收设备在接收到第一边界比特块后,依次接收了T个比特块,此时可能出现N=T,或N>T(即在N个比特块中插入第一比特块),或N<T(即 在N个比特块中删除第一比特块)三种情况。It should be noted that the N bit blocks here are the bit blocks between the first boundary bit block and the second boundary bit block when the first parity result and the second parity result are determined by the transmitting device. As an optional embodiment, after the sending device sends the first boundary bit block, sequentially transmitting N bit blocks, and then calculating the first parity result and the second parity result according to the N bit blocks, The two results are stored in a second boundary bit block, and the second boundary bit block is transmitted. However, considering that the path passing from the transmitting device to the receiving device traverses the asynchronous node, the first bit block may be inserted or deleted in the N bit blocks, and the receiving device sequentially receives the first boundary bit block after receiving the first bit block. T bit blocks, where N=T, or N>T (ie, inserting the first bit block in N bit blocks), or N<T (ie, deleting the first bit block in N bit blocks) )three situations.
在一种可能的设计中,还包括:当未接收到第一奇偶校验结果和第二奇偶校验结果时,发送第三奇偶校验结果和第四奇偶校验结果至第二设备,第二设备存储有第一奇偶校验结果和第二奇偶校验结果。须知,这里的第二设备可以为SDN控制器,或者具有判断比特流传输误码功能的任一设备。此外,当接收到第一奇偶校验结果和第二奇偶校验结果时,第三奇偶校验结果和第四奇偶校验结果也可发送至第二设备。因此,第二设备可以接收到发送设备发送的第一奇偶校验结果和第二奇偶校验结果,以及接收设备发送的第三奇偶校验结果和第四奇偶校验结果,第二设备根据两组结果确定比特块流的传输过程中是否存在误码。因此,本申请实施例提供了通过第三方设备实现误码检测,例如SDN控制器,或者具有判断比特流传输误码功能的任一设备,更加灵活高效,实施简便。In a possible design, the method further includes: sending the third parity result and the fourth parity result to the second device when the first parity result and the second parity result are not received, The second device stores the first parity result and the second parity result. It should be noted that the second device herein may be an SDN controller or any device having a function of determining a bit stream transmission error. Further, when the first parity result and the second parity result are received, the third parity result and the fourth parity result may also be transmitted to the second device. Therefore, the second device may receive the first parity result and the second parity result sent by the sending device, and the third parity result and the fourth parity result sent by the receiving device, and the second device according to the two The group result determines if there is a bit error during the transmission of the bit block stream. Therefore, the embodiment of the present application provides error detection by using a third-party device, such as an SDN controller, or any device having a function of determining a bit stream transmission error, which is more flexible and efficient, and is simple to implement.
在一种可能的设计中,每个比特块的类型为M1/M2比特块,其中,M1表示每个比特块中的净荷比特数,M2表示每个比特块的总比特数,M2-M1表示每个比特块中的首部同步头比特数,M1、M2为正整数,M2>M1。In one possible design, the type of each bit block is an M1/M2 bit block, where M1 represents the number of payload bits in each bit block, and M2 represents the total number of bits per bit block, M2-M1 Represents the number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
在一种可能的设计中,接收第二边界比特块,包括:在第一时刻接收第二边界比特块;In a possible design, receiving the second boundary bit block includes: receiving the second boundary bit block at the first time;
接收第一奇偶校验结果和第二奇偶校验结果,包括:在第二时刻接收第一奇偶校验结果和第二奇偶校验结果,其中,第一时刻早于第二时刻,或第一时刻晚于第二时刻,第一时刻等于第二时刻。Receiving the first parity result and the second parity result, comprising: receiving the first parity result and the second parity result at a second time, wherein the first time is earlier than the second time, or the first The moment is later than the second moment, the first moment being equal to the second moment.
在一种可能的设计中,第一奇偶校验结果和第二奇偶校验结果存储于第二边界比特块中。In one possible design, the first parity result and the second parity result are stored in a second boundary bit block.
在一种可能的设计中,第三奇偶校验结果和第四奇偶校验结果是根据预设校验算法计算得到的,预设校验算法用于当T个比特块中增加或减少第一比特块时不改变第三奇偶校验结果和第四奇偶校验结果,第一比特块是指在T个比特块的传输过程中可能插入T个比特块或从T个比特块中删除的比特块。因此,采用本申请实施例提供的预设校验算法能够保证第一奇偶校验结果和第二奇偶校验结果能够容忍传输过程中插入或删除一个或多个第一比特块(比如IDLE Block),而且当第一比特块发生误码时,也能被检测到。In a possible design, the third parity result and the fourth parity result are calculated according to a preset check algorithm, and the preset check algorithm is used to increase or decrease the first time in the T bit blocks. The third parity result and the fourth parity result are not changed in the bit block, and the first bit block refers to a bit that may be inserted into or deleted from the T bit blocks during transmission of the T bit blocks. Piece. Therefore, the preset check algorithm provided by the embodiment of the present application can ensure that the first parity result and the second parity result can tolerate insertion or deletion of one or more first bit blocks (such as IDLE Block) during transmission. And when the first bit block has a bit error, it can also be detected.
此外,应理解的是,接收设备确定第三奇偶校验结果和第四奇偶校验结果采用的预设算法与发送设备确定第一奇偶校验结果和第二奇偶校验结果采用的预设算法相同,重复之处不再赘述。In addition, it should be understood that the receiving device determines a preset algorithm used by the third parity result and the fourth parity result, and a preset algorithm used by the transmitting device to determine the first parity result and the second parity result. The same, the repetition will not be repeated.
在一种可能的设计中,预设校验算法为xBIP-y算法,其中,x是指连续比特交织的比特数,x是根据第一比特块的码型定义确定的,y是指监视区段的个数,x,y为正整数,y≥2;In a possible design, the preset check algorithm is the xBIP-y algorithm, where x is the number of bits of consecutive bit interleaving, x is determined according to the definition of the pattern of the first bit block, and y is the monitoring area. The number of segments, x, y is a positive integer, y ≥ 2;
确定第三奇偶校验结果和第四奇偶校验结果,包括:从T个比特块中的第1净荷比特开始,将每个比特块的每x个连续比特依次记录至第1个监视区段至第y个监视区段;针对每个监视区段采用奇校验或偶校验确定1比特监视码,获得y比特监视码,y比特监视码中包括第三奇偶校验结果和第四奇偶校验结果。因此,采用本申请实施例提供的xBIP-y算法能够容忍传输过程中插入或删除一个或多个第一比特块,方法简便。Determining the third parity result and the fourth parity result, comprising: sequentially recording every x consecutive bits of each bit block to the first monitoring area, starting from the first payload bit of the T bit blocks Segment to yth monitoring section; determining a 1-bit monitoring code using odd or even parity for each monitoring section, obtaining a y-bit monitoring code, the y-bit monitoring code including a third parity result and a fourth Parity result. Therefore, the xBIP-y algorithm provided by the embodiment of the present application can tolerate insertion or deletion of one or more first bit blocks during transmission, and the method is simple.
在一种可能的设计中,预设校验算法为flexBIP-z算法,其中,z是指监视区段的个数,每个监视区段对应的连续比特交织的比特数不全相同,z个监视区段分别对应的连续比特交织的比特数为A1、A2、A 3……Az-1,Az,A1、A2、A 3……Az-1,Az,z为正整数,z≥2;In a possible design, the preset verification algorithm is the flexBIP-z algorithm, where z refers to the number of monitoring segments, and the number of consecutive bit interleaving bits corresponding to each monitoring segment is not the same, z monitoring The number of consecutive bit interleaving corresponding to the segments is A1, A2, A 3 ... Az-1, Az, A1, A2, A 3 ... Az-1, Az, z are positive integers, z ≥ 2;
确定第三奇偶校验结果和第四奇偶校验结果,包括:从T个比特块中的第1净荷比特开始,将每个比特块的A1个连续比特记录至第1个监视区段,将A1个连续比特后的A2个连续比特记录至第2个监视区段,将A2个连续比特后的A3个连续比特记录至第3个监视区段,直至将Az-1个连续比特后的Az个连续比特记录至第z个监视区段;针对每个监视区段采用奇校验或偶校验确定1比特监视码,获得z比特监视码,z比特监视码中包括第三奇偶校验结果和第四奇偶校验结果。因此,采用本申请实施例提供的flexBIP-z算法能够更加灵活,简洁地确定第一奇偶校验结果和第二奇偶校验结果,容忍传输过程中插入或删除一个或多个第一比特块。Determining the third parity result and the fourth parity result, comprising: recording, from the first payload bit of the T bit blocks, A1 consecutive bits of each bit block to the first monitoring segment, Recording A2 consecutive bits after A1 consecutive bits to the second monitoring segment, and recording A3 consecutive bits after A2 consecutive bits to the third monitoring segment until after Az-1 consecutive bits Az consecutive bits are recorded to the zth monitoring section; an odd parity or even parity is used for each monitoring section to determine a 1-bit monitoring code to obtain a z-bit monitoring code, and the z-bit monitoring code includes a third parity The result and the fourth parity result. Therefore, the flexBIP-z algorithm provided by the embodiment of the present application can more flexibly and succinctly determine the first parity result and the second parity result, and tolerate insertion or deletion of one or more first bit blocks during transmission.
在一种可能的设计中,根据第一奇偶校验结果和第三奇偶校验结果,以及第二奇偶校验结果和第四奇偶校验结果,确定T个比特块是否存在误码,包括:若确定第一奇偶校验结果和第三奇偶校验结果相同,且第二奇偶校验结果和第四奇偶校验结果相同,则确定T个比特块不存在误码;若确定第一奇偶校验结果和第三奇偶校验结果不相同,和/或第二奇偶校验结果和第四奇偶校验结果不相同,则确定T个比特块存在误码。In a possible design, determining whether there are bit errors in the T bit blocks according to the first parity result and the third parity result, and the second parity result and the fourth parity result, including: If it is determined that the first parity result and the third parity result are the same, and the second parity result and the fourth parity result are the same, determining that there are no error in the T bit blocks; if the first parity is determined The result of the verification is not the same as the third parity result, and/or the second parity result and the fourth parity result are not the same, and it is determined that there are bit errors in the T bit blocks.
在一种可能的设计中,接收第一奇偶校验结果和第二奇偶校验结果,包括:接收第一校验结果集合,第一校验结果集合是根据xBIP-y算法计算得到的,第一校验结果集合包括的y比特监视码中包括第一奇偶校验结果和第二奇偶校验结果;确定第三奇偶校验结果和第四奇偶校验结果,包括:确定第二校验结果集合,第二奇偶校验结果是根据xBIP-y算法计算得到的,第二校验结果集合包括的y比特监视码中包括第三奇偶校验结果和第三奇偶校验结果;In a possible design, receiving the first parity result and the second parity result, comprising: receiving a first check result set, where the first check result set is calculated according to an xBIP-y algorithm, The first parity result and the second parity result are included in the y-bit monitoring code included in the verification result set; determining the third parity result and the fourth parity result, including: determining the second verification result The second parity result is calculated according to the xBIP-y algorithm, and the y-bit monitoring code included in the second verification result set includes a third parity result and a third parity result;
当接收到第一奇偶校验结果和第二奇偶校验结果时,根据第一奇偶校验结果和第三奇偶校验结果,以及第二奇偶校验结果和第四奇偶校验结果,确定T个比特块是否存在误码,包括:根据第一校验结果集合和第二校验结果集合,确定T个比特块是否存在误码。因此,采用本申请实施例提供的方法可以完整实施M/N Bit Block网络路径的错误或误码检测。When receiving the first parity result and the second parity result, determining T according to the first parity result and the third parity result, and the second parity result and the fourth parity result Whether there is an error in the bit block includes: determining whether there is a bit error in the T bit block according to the first check result set and the second check result set. Therefore, the error or error detection of the M/N Bit Block network path can be completely implemented by using the method provided by the embodiment of the present application.
在一种可能的设计中,接收第一奇偶校验结果和第二奇偶校验结果,包括:接收第一校验结果集合,第一校验结果集合是根据flexBIP-z算法计算得到的,第一校验结果集合包括的z比特监视码中包括第一奇偶校验结果和第二奇偶校验结果;确定第三奇偶校验结果和第四奇偶校验结果,包括:确定第二校验结果集合,第二校验结果集合是根据flexBIP-z算法计算得到的,第二校验结果集合包括的z比特监视码中包括第三奇偶校验结果和第四奇偶校验结果;当接收到第一奇偶校验结果和第二奇偶校验结果时,根据第一奇偶校验结果和第三奇偶校验结果,以及第二奇偶校验结果和第四奇偶校验结果,确定T个比特块是否存在误码,包括:根据第一校验结果集合和第二校验结果集合,确定T个比特块是否存在误码。因此,采用本申请实施例提供的方法可以完整实施M/N Bit Block网络路径的错误或误码检测。In a possible design, receiving the first parity result and the second parity result, comprising: receiving a first check result set, where the first check result set is calculated according to a flexBIP-z algorithm, a z-bit monitoring code included in a set of verification results includes a first parity result and a second parity result; determining the third parity result and the fourth parity result, comprising: determining a second verification result The set, the second check result set is calculated according to the flexBIP-z algorithm, and the z-bit monitoring code included in the second check result set includes the third parity result and the fourth parity result; when receiving the first a parity result and a second parity result, based on the first parity result and the third parity result, and the second parity result and the fourth parity result, determining whether T bit blocks are The error code includes: determining, according to the first verification result set and the second verification result set, whether the T bit blocks have an error. Therefore, the error or error detection of the M/N Bit Block network path can be completely implemented by using the method provided by the embodiment of the present application.
在一种可能的设计中,根据第一校验结果集合和第二校验结果集合,确定T个比特块是否存在误码,包括:若确定第一校验结果集合和第二校验结果集合相同,则确定T个比特块不存在误码;若确定第一校验结果集合和第二校验结果集合不相同,则确定T个比特块存在误码。In a possible design, determining whether the T bit blocks have an error according to the first check result set and the second check result set includes: determining the first check result set and the second check result set If the same, it is determined that there are no error codes in the T bit blocks; if it is determined that the first check result set and the second check result set are not the same, it is determined that the T bit blocks have an error.
第三方面,一种比特块流误码检测方法,包括:第一设备根据比特块流中起始块中的起始字节和与起始块对应的结束块中的结束字节确定被检测区段;第一设备根据被检测区段计算第一校验结果。第一设备发送第一校验结果和比特块流。例如,第一设备在计算第 一校验结果时采用的算法可以为CRC-x或BIP-x,第一校验结果记为的结果于B,B可以是一个或多个字节。因此,采用本申请实施例提供的方法可以完整实施M/N Bit Block网络路径的错误或误码检测,对用户业务影响小,与SDH/OTN接近,优于现有技术中提供的误码检测方法,实施流程简洁、易实施。A third aspect, a bit block stream error detection method, comprising: determining, by a first device, that a start byte in a start block in a bit block stream and an end byte in an end block corresponding to the start block are detected a segment; the first device calculates a first verification result according to the detected segment. The first device transmits the first check result and the bit block stream. For example, the algorithm used by the first device to calculate the first check result may be CRC-x or BIP-x, and the first check result is recorded as B, and B may be one or more bytes. Therefore, the error or error detection of the M/N Bit Block network path can be completely implemented by using the method provided in the embodiment of the present application, which has little impact on the user service and is close to the SDH/OTN, and is superior to the error detection provided in the prior art. Method, the implementation process is simple and easy to implement.
在一种可能的设计中,比特块流包括至少一个M1/M2比特块;其中,M1表示每个比特块中的净荷比特数,M2表示每个比特块的总比特数,M2-M1表示每个比特块中的首部同步头比特数,M1、M2为正整数,M2>M1。In one possible design, the bit block stream includes at least one M1/M2 bit block; wherein M1 represents the number of payload bits in each bit block, M2 represents the total number of bits per bit block, and M2-M1 represents The number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
在一种可能的设计中,第一设备发送第一校验结果和比特块流,包括:第一设备发送第一校验结果和比特块流至第二设备;或者,第一设备发送第一校验结果至第三设备,发送比特块流至第二设备。因此,本申请实施例提供了通过第三方设备实现误码检测,例如SDN控制器,或者具有判断比特流传输误码功能的任一设备,更加灵活高效,实施简便。In a possible design, the first device sends the first check result and the bit block stream, including: the first device sends the first check result and the bit block stream to the second device; or the first device sends the first The result of the verification is sent to the third device, and the bit block is sent to the second device. Therefore, the embodiment of the present application provides error detection by using a third-party device, such as an SDN controller, or any device having a function of determining a bit stream transmission error, which is more flexible and efficient, and is simple to implement.
在一种可能的设计中,在第一设备将第一校验结果和比特块流发送至第二设备之前,还包括:第一设备将第一校验结果存储于结束块,获得更新后的结束块;或者,第一设备将第一校验结果存储于校验结果存储块,并删除比特块流中的任一第一比特块,其中,校验结果存储块是指位于结束块之前的一个新增块,第一比特块是指在比特块流的传输过程中可能插入比特块流或从比特块流中删除的比特块。因此,本申请实施例提供两种存储第一校验结果的方法,存储方法更加灵活,实施简便。In a possible design, before the first device sends the first verification result and the bit block stream to the second device, the method further includes: the first device storing the first verification result in the end block, and obtaining the updated Ending the block; or, the first device stores the first check result in the check result storage block, and deletes any first bit block in the bit block stream, wherein the check result storage block refers to before the end block A new block, the first block of bits refers to a block of bits that may be inserted into or deleted from the block stream during transmission of the block stream. Therefore, the embodiment of the present application provides two methods for storing the first verification result, and the storage method is more flexible and simple to implement.
在一种可能的设计中,第一设备将第一校验结果存储于结束块,获得更新后的结束块,包括:当第一校验结果占用的字节数大于等于目标字节数时,第一设备将第一校验结果存储于结束块中的结束字节之前,并根据第一校验结果占用的字节数将结束字节移至结束块后的一个新增块,删除比特块流中的任一第一比特块,将结束字节移动后所在的新增块作为更新后的结束块;当第一校验结果占用的字节数小于目标字节数时,第一设备将第一校验结果存储于结束块中的结束字节之前,并根据第一校验结果占用的字节数将结束字节后移第一校验结果占用的字节数,将结束字节移动后所在的比特块作为更新后的结束块;其中,目标字节数为结束块中位于结束字节后的字节数加1。因此,采用本申请实施例提供的方法实施简便。In a possible design, the first device stores the first check result in the end block, and obtains the updated end block, including: when the number of bytes occupied by the first check result is greater than or equal to the target number of bytes, The first device stores the first check result before the end byte in the end block, and moves the end byte to a new block after the end block according to the number of bytes occupied by the first check result, and deletes the bit block. Any first block in the stream, the new block where the end byte is moved is used as the updated end block; when the number of bytes occupied by the first check result is less than the target number of bytes, the first device will The first check result is stored before the end byte in the end block, and the end byte is shifted back by the number of bytes occupied by the first check result according to the number of bytes occupied by the first check result, and the end byte is moved. The bit block that is located later is used as the updated end block; wherein the target number of bytes is the number of bytes in the end block after the end byte plus one. Therefore, the method provided by the embodiment of the present application is simple to implement.
第四方面,一种比特块流误码检测方法,包括:第二设备根据比特块流中起始块中的起始字节和与起始块对应的结束块中的结束字节确定被检测区段;第二设备根据被检测区段计算第二校验结果。当第二设备接收到第一校验结果时,第二设备根据第一校验结果与第二校验结果,确定被检测区段是否存在误码。因此,采用本申请实施例提供的方法可以完整实施M/N Bit Block网络路径的错误或误码检测,对用户业务影响小,与SDH/OTN接近,优于现有技术中提供的误码检测方法,实施流程简洁、易实施。A fourth aspect, a bit block stream error detection method, comprising: determining, by the second device, that the start byte in the start block in the bit block stream and the end byte in the end block corresponding to the start block are detected a segment; the second device calculates a second verification result according to the detected segment. When the second device receives the first verification result, the second device determines, according to the first verification result and the second verification result, whether the detected segment has an error. Therefore, the error or error detection of the M/N Bit Block network path can be completely implemented by using the method provided in the embodiment of the present application, which has little impact on the user service and is close to the SDH/OTN, and is superior to the error detection provided in the prior art. Method, the implementation process is simple and easy to implement.
第二设备在计算第二校验结果时采用的算法与第一设备计算第一校验结果时采用的算法相同。The algorithm used by the second device in calculating the second verification result is the same as the algorithm used when the first device calculates the first verification result.
在一种可能的设计中,比特块流包括至少一个M1/M2比特块;其中,M1表示每个比特块中的净荷比特数,M2表示每个比特块的总比特数,M2-M1表示每个比特块中的首部同步头比特数,M1、M2为正整数,M2>M1。In one possible design, the bit block stream includes at least one M1/M2 bit block; wherein M1 represents the number of payload bits in each bit block, M2 represents the total number of bits per bit block, and M2-M1 represents The number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
在一种可能的设计中,第二设备根据比特块流中起始块中的起始字节和与起始块对应的结束块中的结束字节确定被检测区段,包括三种可能的情况:(1)当第二设备接收到第一校验结果,且第一校验结果存储于结束块时,第二设备将第二校验结果从结束块中删除, 获得更新后的结束块,将起始块中的起始字节和更新后的结束块中的结束字节之间的字节作为被检测区段;(2)当第二设备接收到第一校验结果,且第一校验结果存储于校验结果存储块时,第二设备将校验结果存储块从比特块流中删除,获得更新后的比特块流,将更新后的比特块流中起始块中的起始字节和结束块中的结束字节之间的字节作为被检测区段,其中,校验结果存储块位于结束块之前。上述两种情况中,起始块中的起始字节和结束块中的结束字节之间的字节中包括第一校验结果,因此,需要首先将第一校验结果删除,将剩余的部分作为被检测区段。此外,当第二设备接收到第一校验结果,且第一校验结果存储于校验结果存储块时,第二设备将校验结果存储块从比特块流中删除,获得更新后的比特块流,其中,校验结果存储块位于结束块之前。同时,为了减小对用户带宽的影响,需要在结束块之后增加一个第一比特块。(3)当第二设备未接收到第一校验结果时,第二设备将比特块流中起始块中的起始字节和结束块中的结束字节之间的字节作为被检测区段。此时,起始块中的起始字节和结束块中的结束字节之间的字节不包括第一校验结果,可以直接作为被检测区段。In a possible design, the second device determines the detected segment according to the start byte in the start block in the bit block stream and the end byte in the end block corresponding to the start block, including three possible Case: (1) When the second device receives the first verification result, and the first verification result is stored in the end block, the second device deletes the second verification result from the end block, and obtains the updated end block. a byte between the start byte in the start block and the end byte in the updated end block as the detected segment; (2) when the second device receives the first check result, and When a check result is stored in the check result storage block, the second device deletes the check result storage block from the bit block stream, and obtains the updated bit block stream, which is to be updated in the start block in the bit block stream. The byte between the start byte and the end byte in the end block is taken as the detected segment, wherein the check result storage block is located before the end block. In the above two cases, the first check result is included in the byte between the start byte in the start block and the end byte in the end block. Therefore, the first check result needs to be deleted first, and the remaining The part is taken as the detected section. In addition, when the second device receives the first check result, and the first check result is stored in the check result storage block, the second device deletes the check result storage block from the bit block stream, and obtains the updated bit. A block stream in which the check result storage block is located before the end block. At the same time, in order to reduce the impact on the user bandwidth, it is necessary to add a first bit block after the end block. (3) When the second device does not receive the first check result, the second device detects the byte between the start byte in the start block and the end byte in the end block in the bit block stream as the detected Section. At this time, the byte between the start byte in the start block and the end byte in the end block does not include the first check result, and can be directly used as the detected segment.
在一种可能的设计中,还包括:当第二设备未接收到第一校验结果时,第二设备将第二校验结果发送至第三设备,第三设备存储有第一校验结果。因此,本申请实施例提供两种存储第一校验结果的方法,存储方法更加灵活,实施简便。In a possible design, the method further includes: when the second device does not receive the first verification result, the second device sends the second verification result to the third device, where the third device stores the first verification result. . Therefore, the embodiment of the present application provides two methods for storing the first verification result, and the storage method is more flexible and simple to implement.
在一种可能的设计中,第二设备根据第一校验结果与第二校验结果,确定被检测区段是否存在误码,包括:第二设备若确定第一校验结果与第二校验结果相同,则确定被检测区段不存在误码;若确定第一校验结果与第二校验结果不同,则确定被检测区段存在误码。In a possible design, the second device determines, according to the first verification result and the second verification result, whether the detected segment has an error, including: if the second device determines the first verification result and the second calibration If the test result is the same, it is determined that there is no error in the detected segment; if it is determined that the first verification result is different from the second verification result, it is determined that the detected segment has an error.
在一种可能的设计中,第二设备将第一校验结果从结束块中删除,获得更新后的结束块,包括:当第一校验结果占用的字节数大于等于目标字节数时,第二设备根据第一校验结果占用的字节数将结束字节移至结束块前的一个比特块,在比特块流中新增一个第一比特块,将结束字节移动后所在的比特块作为更新后的结束块;当第一校验结果占用的字节数小于目标字节数时,第二设备根据第一校验结果占用的字节数将结束字节前移第一校验结果占用的字节数,将结束字节移动后所在的比特块作为更新后的结束块;其中,目标字节数为结束块中位于结束字节前的字节数加1。因此,采用本申请实施例提供的方法实施简便。In a possible design, the second device deletes the first check result from the end block, and obtains the updated end block, including: when the number of bytes occupied by the first check result is greater than or equal to the target number of bytes The second device moves the end byte to a bit block before the end block according to the number of bytes occupied by the first check result, and adds a first bit block to the bit block stream, where the end byte is moved. The bit block is used as the updated end block; when the number of bytes occupied by the first check result is less than the target number of bytes, the second device moves the end byte to the first school according to the number of bytes occupied by the first check result. The number of bytes occupied by the result is the updated end block after the end byte is moved; wherein the target number of bytes is the number of bytes in the end block before the end byte plus one. Therefore, the method provided by the embodiment of the present application is simple to implement.
第五方面,一种比特块流误码检测设备,包括处理器,收发器,所述收发器用于发送比特流块,处理器用于根据收发器发送的比特流块,以完成上述第一方面或第一方面的任意可能的实现方式中的方法。A fifth aspect, a bit block stream error detecting apparatus, comprising: a processor, a transceiver, the transceiver is configured to send a bit stream block, and the processor is configured to complete the first aspect according to the bit stream block sent by the transceiver or A method in any of the possible implementations of the first aspect.
第六方面,一种比特块流误码检测设备,包括处理器,收发器,所述收发器用于接收比特流块,处理器用于根据收发器接收的比特流块,以完成上述第二方面或第二方面的任意可能的实现方式中的方法。In a sixth aspect, a bit block stream error detecting apparatus includes a processor, a transceiver, the transceiver is configured to receive a bit stream block, and the processor is configured to complete the foregoing second aspect according to the bit stream block received by the transceiver or A method in any of the possible implementations of the second aspect.
第七方面,一种比特块流误码检测设备,包括处理器,收发器,所述收发器用于发送比特流块,处理器用于根据收发器发送的比特流块,以完成上述第一方面或第一方面的任意可能的实现方式中的方法。A seventh aspect, a bit block stream error detecting apparatus, comprising: a processor, a transceiver, the transceiver is configured to send a bit stream block, and the processor is configured to complete the first aspect according to the bit stream block sent by the transceiver or A method in any of the possible implementations of the first aspect.
第八方面,一种比特块流误码检测设备,包括处理器,收发器,所述收发器用于接收比特流块,处理器用于根据收发器接收的比特流块,以完成上述第二方面或第二方面的任意可能的实现方式中的方法。In an eighth aspect, a bit block stream error detecting apparatus includes a processor, a transceiver, the transceiver is configured to receive a bit stream block, and the processor is configured to complete the second aspect according to the bit stream block received by the transceiver or A method in any of the possible implementations of the second aspect.
本申请实施例提出一种新的传递M1/M2比特块流的设备,该设备中新增一个误码检测 单元又称比特误码率(Bit error ratio,BER)单元,简称BER。该单元用于计算校验结果以及误码检测。其中,PE设备包括uAdpt、L1.5Switch、nAdpt和BER,其一端与用户设备连接,接口为UNI,另一端与网络设备连接,接口为NNI,P设备包括uAdpt、L1.5Switch、nAdpt和BER,两端均与网络设备连接,接口为NNI,如图23(a)和图23(b)所示。The embodiment of the present application proposes a new device for transmitting an M1/M2 bit block stream. A new bit error detection unit is also called a bit error ratio (BER) unit, which is referred to as BER. This unit is used to calculate the check result and error detection. The PE device includes uAdpt, L1.5Switch, nAdpt, and BER. One end is connected to the user equipment, the interface is UNI, the other end is connected to the network device, the interface is NNI, and the P device includes uAdpt, L1.5Switch, nAdpt, and BER. Both ends are connected to the network device, and the interface is NNI, as shown in Figure 23(a) and Figure 23(b).
本申请实施例还提出一种分组承载产品,例如规划加载X-E特性的IPRAN、PTN设备。参阅图24所示,本申请提供的一种分组承载产品,这里的接口板可以为盒式设备的接口卡或框式设备的线卡的接口芯片。The embodiment of the present application further provides a packet bearer product, such as an IPRAN and PTN device that plans to load X-E features. Referring to FIG. 24, the present application provides a packet bearer product, where the interface board can be an interface card of a box device or an interface chip of a line card of a box device.
或者,本申请实施例还提出一种分组承载产品,参阅图25所示,本申请提供一种新型芯片,比如SDxxxx,将BER内置于芯片中;或者在现有接口芯片,比如SDyyyy与主控交换板之间,增加一块现场可编程门阵列(Field-Programmable Gate Array,FPGA)或网络处理器(Network Processor,NP),通过FPGA或NP实施BER的功能。Alternatively, the embodiment of the present application further provides a packet bearer product. Referring to FIG. 25, the present application provides a new type of chip, such as SDxxxx, which is built into the chip, or in an existing interface chip, such as SDyyyy and the host. Between the switch boards, a Field-Programmable Gate Array (FPGA) or Network Processor (NP) is added to implement the BER function through the FPGA or NP.
第九方面,本申请提供了一种计算机可读存储介质,计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机执行上述第一方面或第一方面的任意可能的设计的方法。In a ninth aspect, the present application provides a computer readable storage medium having stored therein instructions that, when run on a computer, cause the computer to perform any of the above aspects or any of the possible aspects of the first aspect Methods.
第十方面,本申请还提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行上述第一方面或第一方面的任意可能的设计的方法。In a tenth aspect, the present application also provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method of any of the first aspect or the first aspect of the first aspect described above.
附图说明DRAWINGS
图1为本申请实施例中64/66 Bit编码的码型定义示意图;1 is a schematic diagram of a code pattern definition of a 64/66 bit code in an embodiment of the present application;
图2为本申请实施例中空闲块的码型定义示意图;2 is a schematic diagram of a code pattern definition of a free block in the embodiment of the present application;
图3(a)为本申请实施例中PE设备的结构示意图之一;FIG. 3(a) is a schematic structural diagram of a PE device in an embodiment of the present application;
图3(b)为本申请实施例中P设备的结构示意图之一;FIG. 3(b) is a schematic structural diagram of a P device in an embodiment of the present application;
图4为本申请实施例中采用X-E技术组建网络并转发的示意图;4 is a schematic diagram of constructing a network by using X-E technology and forwarding in the embodiment of the present application;
图5为本申请实施例中BIP-8的基本思想示意图;FIG. 5 is a schematic diagram of the basic idea of BIP-8 in the embodiment of the present application; FIG.
图6为本申请实施例中比特块流误码检测方法之一;6 is a method for detecting a bit block stream error in the embodiment of the present application;
图7为本申请实施例中第二边界比特块的位置和码型定义示意图;FIG. 7 is a schematic diagram of the location and pattern definition of a second boundary bit block in the embodiment of the present application; FIG.
图8为本申请实施例中插入第一比特块的示意图;FIG. 8 is a schematic diagram of inserting a first bit block in an embodiment of the present application;
图9为本申请实施例中8BIP-8的基本思想示意图;FIG. 9 is a schematic diagram of the basic idea of 8BIP-8 in the embodiment of the present application;
图10为本申请实施例中16BIP-4的基本思想示意图;10 is a schematic diagram of the basic idea of 16BIP-4 in the embodiment of the present application;
图11(a)为本申请实施例中flexBIP-8的基本思想示意图;11(a) is a schematic diagram showing the basic idea of flexBIP-8 in the embodiment of the present application;
图11(b)为本申请实施例中flexBIP-9的基本思想示意图;11(b) is a schematic diagram showing the basic idea of flexBIP-9 in the embodiment of the present application;
图12为本申请实施例中比特块流误码检测方法之二;12 is a second method for detecting a bit block stream error in the embodiment of the present application;
图13为本申请实施例中比特块流误码检测方法之三;FIG. 13 is a third embodiment of a bit block stream error detection method according to an embodiment of the present application;
图14为本申请实施例中64/66比特流的示意图;14 is a schematic diagram of a 64/66 bitstream in an embodiment of the present application;
图15为本申请实施例中纯数据块D的码型定义示意图;15 is a schematic diagram of a code pattern definition of a pure data block D in the embodiment of the present application;
图16为本申请实施例中起始块的码型定义示意图;16 is a schematic diagram of a code pattern definition of a starting block in an embodiment of the present application;
图17为本申请实施例中结束块的码型定义示意图;17 is a schematic diagram of a code pattern definition of an end block in an embodiment of the present application;
图18为本申请实施例中第一设备将第一校验结果存储于结束块的示意图;FIG. 18 is a schematic diagram of a first device storing a first verification result in an end block according to an embodiment of the present application;
图19为本申请实施例中第一设备采用CRC-8或BIP-8计算第一校验结果B插入结束块的示意图;FIG. 19 is a schematic diagram of the first device using the CRC-8 or the BIP-8 to calculate the first check result B insertion end block in the embodiment of the present application;
图20为本申请实施例中第一设备将第一校验结果B插入结束块之前的新增比特块的示意图;FIG. 20 is a schematic diagram of a newly added bit block before a first device inserts a first check result B into an end block according to an embodiment of the present application;
图21为本申请实施例中比特块流误码检测方法之四;21 is a fourth embodiment of a bit block stream error detection method according to an embodiment of the present application;
图22为本申请实施例中第二设备删除结束块中的第一校验结果B的示意图;FIG. 22 is a schematic diagram of a first verification result B in a second device deletion end block according to an embodiment of the present application;
图23(a)为本申请实施例中PE设备的结构示意图之二;23(a) is a second schematic structural diagram of a PE device in an embodiment of the present application;
图23(b)为本申请实施例中P设备的结构示意图之二;23(b) is a second schematic structural diagram of a P device in an embodiment of the present application;
图24为本申请实施例中分组承载产品的结构示意图之一;24 is a schematic structural diagram of a packet bearer product in an embodiment of the present application;
图25为本申请实施例中分组承载产品的结构示意图之二;25 is a second schematic structural diagram of a packet bearer product in an embodiment of the present application;
图26为本申请实施例中被校验的比特快流的路径为端到端的路径的误码检验示意图;26 is a schematic diagram of error detection of an end-to-end path of a bit fast stream to be verified in the embodiment of the present application;
图27(a)为本申请实施例中被校验的比特快流的路径为非端到端的路径的误码检验示意图之一;27(a) is a schematic diagram of error detection of a path of a bit fast stream that is verified to be a non-end-to-end path in the embodiment of the present application;
图27(b)为本申请实施例中被校验的比特快流的路径为非端到端的路径的误码检验示意图之二;27(b) is a second schematic diagram of error detection of a path of a bit fast stream that is verified to be a non-end-to-end path in the embodiment of the present application;
图28为本申请实施例中比特块流误码检测设备的结构示意图之一;28 is a schematic structural diagram of a bit block stream error detecting apparatus according to an embodiment of the present application;
图29为本申请实施例中比特块流误码检测设备的结构示意图之二;FIG. 29 is a second schematic structural diagram of a bit block stream error detecting apparatus according to an embodiment of the present application;
图30为本申请实施例中比特块流误码检测设备的结构示意图之三;FIG. 30 is a third schematic structural diagram of a bit block stream error detecting apparatus according to an embodiment of the present application;
图31为本申请实施例中比特块流误码检测设备的结构示意图之四。FIG. 31 is a fourth schematic structural diagram of a bit block stream error detecting apparatus according to an embodiment of the present application.
具体实施方式detailed description
下面结合附图,对本申请的实施例进行描述。Embodiments of the present application will be described below with reference to the accompanying drawings.
本申请实施例中提到的比特块为M1/M2比特块(Bit block),M1/M2 bit代表一种编码方式,其中,M1表示每个比特块中的净荷比特数,M2表示每个比特块的总比特数,M2-M1表示每个比特块中的首部同步头比特数,M1、M2为正整数,M2>M1。The bit block mentioned in the embodiment of the present application is an M1/M2 bit block, and the M1/M2 bit represents an encoding mode, where M1 represents the number of payload bits in each bit block, and M2 represents each bit. The total number of bits of the bit block, M2-M1 represents the number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
在Ethernet物理层链路传递的就是这种M1/M2比特块流,比如1G Ethernet采用8/10Bit编码,1GE物理层链路传递的就是8/10 Bit Block流;10GE/40GE/100GE采用64/66 Bit编码,10GE/40GE/100GE物理层链路传递的就是64/66 Bit Block流。未来随着Ethernet技术发展,还也会出现其他编码方式,比如可能出现128/130 Bit编码、256/258 Bit编码等。为了描述方便,本申请实施例中统一用M1/M2比特块流表示。The M1/M2 bit block stream is transmitted on the Ethernet physical layer link. For example, 1G Ethernet uses 8/10Bit encoding, 1GE physical layer link delivers 8/10 Bit Block stream, and 10GE/40GE/100GE adopts 64/. 66 bit code, 10GE/40GE/100GE physical layer link is the 64/66 Bit Block stream. In the future, with the development of Ethernet technology, other coding methods will also appear, such as 128/130 bit encoding and 256/258 bit encoding. For convenience of description, the embodiment of the present application is uniformly represented by an M1/M2 bit block stream.
对于L1.5层交换的M1/M2比特块流,存在不同类型的Bit Block并且在标准中明确规范,下面以64/66 Bit编码的码型定义为例进行说明,如图1所示,其中首部的2个Bit“10”或“01”是64/66 Bit Block同步头比特,后64Bit用于承载净荷数据或协议。图1中包括16种码型定义,每一行代表一种比特块的码型定义,其中,D0-D7代表数据字节,C0-C7代表控制字节,S0代表开始字节,T0-T7代表结束字节,第2行对应空闲块(IDLE Block)的码型定义,空闲块可以用/I/来表示,具体如图2所示。第7行对应开始块的码型定义,开始块可以用/s/来表示,第9-16行分别对应8种结束块的码型定义,8种结束块可以统一用/T/来表示。For the M1/M2 bit block stream exchanged by the L1.5 layer, there are different types of Bit Blocks and are clearly defined in the standard. The following is an example of a 64/66 bit coded pattern definition, as shown in FIG. The first two Bits "10" or "01" of the header are 64/66 Bit Block sync header bits, and the last 64 Bit is used to carry payload data or protocols. Figure 1 includes 16 pattern definitions, each of which represents a pattern definition of a block of bits, where D0-D7 represents the data byte, C0-C7 represents the control byte, S0 represents the start byte, and T0-T7 represents the code. End byte, the second line corresponds to the pattern definition of the IDLE Block, and the free block can be represented by /I/, as shown in Figure 2. Line 7 corresponds to the definition of the pattern of the starting block. The starting block can be represented by /s/, the lines 9-16 correspond to the pattern definition of the 8 ending blocks, and the 8 ending blocks can be represented by /T/.
进一步地,在X-E技术体系中采用如图3(a)和图3(a)所示的设备传递M1/M2比特块流,具体的,如图3(a)和图3(b)所示,包括PE设备和P设备。其中,PE设备代表边缘设备,其一端与用户设备连接,接口为用户侧接口(User network interface,UNI),另一端与网络设备连接,接口为NNI,P设备代表网络设备,两端均与网络设备连接,接 口为网络之间或网络内设备之间的接口(Network to Network interface,NNI)。Further, in the XE technology system, the device shown in FIG. 3(a) and FIG. 3(a) is used to transmit the M1/M2 bit block stream, specifically, as shown in FIG. 3(a) and FIG. 3(b). , including PE equipment and P equipment. The PE device represents an edge device, and one end is connected to the user device. The interface is a user network interface (UNI), the other end is connected to the network device, the interface is NNI, and the P device represents the network device. Both ends are connected to the network. The device is connected. The interface is the network to network interface (NNI) between the networks or devices in the network.
以图3(a)为例,客户信号适配单元(uAdpt)代表X-E技术体系的用户侧处理单元,用于接入用户业务信号,并进行码型转换、速率适配等工作。网络信号适配单元(nAdpt)代表X-E技术体系的网络侧处理单元,用于将设备内业务信号发送到网络侧,并完成相应的功能处理;或者接收网络侧业务信号传递到设备内其他处理单元。L1.5switch或者X-Ethernet switch,即X-Ethernet Relay(即中间节点的转发),体现为交换单元。As shown in FIG. 3(a), the client signal adaptation unit (uAdpt) represents a user-side processing unit of the X-E technology system for accessing user service signals and performing code conversion, rate adaptation, and the like. The network signal adaptation unit (nAdpt) represents a network side processing unit of the XE technology system, and is configured to send the service signal in the device to the network side and complete corresponding function processing; or receive the network side service signal and transmit it to other processing units in the device. . The L1.5switch or the X-Ethernet switch, that is, the X-Ethernet Relay (that is, the forwarding of the intermediate node), is embodied as a switching unit.
如图4所示,为采用X-E技术组建网络并转发的示意图,图4中所示的路径为X-E端到端转发路径。As shown in FIG. 4, in order to construct a network and forward it by using X-E technology, the path shown in FIG. 4 is an X-E end-to-end forwarding path.
此外,简要介绍一下本申请实施例中用到的两种常见校验算法。In addition, a brief introduction to the two common verification algorithms used in the embodiments of the present application.
(1)BIP-x:基于BIP算法,该算法的基本思想为对被校验信号划分为X个校验块,例如,SDH采用BIP-16,BIP-8,BIP-2,OTN采用BIP-8。(1) BIP-x: Based on the BIP algorithm, the basic idea of the algorithm is to divide the verified signal into X check blocks. For example, SDH adopts BIP-16, BIP-8, BIP-2, and OTN adopts BIP- 8.
例如,参阅图5所示,BIP-8所示的8比特监视码产生过程可以简述如下:将比特流所有被校验的部分按8比特为一组,分为一系列的8比特序列的码组。以BIP-8码为第一列,第1个8比特序列为第2列,依次排列成一个监视矩阵。然后由每一8比特序列码组的第1比特与BIP-8码的第1比特组成第1监视码组(矩阵的第一行),由每一8比特序列码组的第2比特与BIP-8码的第2比特组成第2监视码组(矩阵的第二行),如此等等。最后,由BIP-8码的第1比特为第一监视码组提供偶校验(即,使该监视码组中“1”的数目为偶数),由BIP-8码的第2比特为第2监视码组提供偶校验,如此等等。须知,此处也可采用奇校验。For example, referring to FIG. 5, the 8-bit monitoring code generation process shown by BIP-8 can be briefly described as follows: all the verified parts of the bit stream are grouped into 8 bits, and are divided into a series of 8-bit sequences. Code group. The BIP-8 code is used as the first column, and the first 8-bit sequence is the second column, which is sequentially arranged into a monitoring matrix. Then, the first bit of each 8-bit sequence code group and the first bit of the BIP-8 code form a first monitoring code group (first line of the matrix), and the second bit and BIP of each 8-bit sequence code group The 2nd bit of the -8 code constitutes the 2nd monitoring code group (the second line of the matrix), and so on. Finally, the first bit of the BIP-8 code provides even parity for the first monitoring code group (ie, the number of "1"s in the monitoring code group is even), and the second bit of the BIP-8 code is the first bit. 2 The monitoring code group provides even parity, and so on. It should be noted that odd parity can also be used here.
(2)CRC-x:基于CRC算法,其中,标准化的算法包括CRC-4,CRC-8,CRC-16,CRC-32等,对被校验信号采用X位循环校验,Ethernet的帧或包采用CRC-32,在帧或包的最后FCS域(4个字节)存放CRC-32结果。(2) CRC-x: based on the CRC algorithm, wherein the standardized algorithms include CRC-4, CRC-8, CRC-16, CRC-32, etc., and the X-bit loop check is performed on the verified signal, and the Ethernet frame or The packet uses CRC-32 to store the CRC-32 result in the last FCS field (4 bytes) of the frame or packet.
参阅图6所示,本申请实施例提出一种比特块流误码检测方法,以解决在M/N Bit block交换的场景中的误码检测方法实现难度较大且承载效率较低的问题。。该方法,包括:Referring to FIG. 6, the embodiment of the present application provides a bit block stream error detection method, which solves the problem that the error detection method in the M/N Bit block exchange scenario is difficult to implement and has low bearer efficiency. . The method comprises:
步骤600:发送第一边界比特块,第一边界比特块用于区别后续发送的N个比特块,N为正整数。Step 600: Send a first boundary bit block, where the first boundary bit block is used to distinguish N pieces of subsequent transmission, and N is a positive integer.
步骤610:依次发送第I比特块,I为大于等于1小于等于N的整数。Step 610: The first bit block is sequentially transmitted, where I is an integer greater than or equal to 1 and less than or equal to N.
步骤620:确定第一奇偶校验结果和第二奇偶校验结果,第一奇偶校验结果的校验对象包括N个比特块中每个比特块的连续的m个比特,第二奇偶校验结果的校验对象包括N个比特块中每个比特块的连续的n个比特,m、n中的至少一个大于等于2。Step 620: Determine a first parity result and a second parity result, where the check object of the first parity result includes consecutive m bits of each of the N bit blocks, and the second parity The resulting check object includes consecutive n bits of each of the N bit blocks, at least one of m, n being greater than or equal to two.
步骤630:发送第二边界比特块、第一奇偶校验结果和第二奇偶校验结果,第二边界比特块用于区别已经发送完成的N个比特块。Step 630: Send a second boundary bit block, a first parity result, and a second parity result, where the second boundary bit block is used to distinguish N bits that have been transmitted.
应理解的是,当被校验的比特块流的路径为从比特块发送端到比特块接收端,或当被校验的比特块流的路径为从比特块发送端到比特块接收端之前的任一中间设备时,图6中各个步骤的执行主体可以为比特块发送端。当被校验的比特块流的路径为从比特块发送端到比特块接收端时,被校验的比特块流的路径是一个端到端的路径。当被校验的比特块流的路径为从比特块发送端到比特块接收端之前的任一中间设备时,被校验的比特块流的路径是一个一端悬空的路径。本申请中统称为发送设备。It should be understood that when the path of the checked bit block stream is from the bit block transmitting end to the bit block receiving end, or when the path of the checked bit block stream is from the bit block transmitting end to the bit block receiving end When any of the intermediate devices is used, the execution body of each step in FIG. 6 may be a bit block transmitting end. When the path of the checked bit block stream is from the bit block transmitting end to the bit block receiving end, the path of the checked bit block stream is an end-to-end path. When the path of the checked bit block stream is any intermediate device from the bit block transmitting end to the bit block receiving end, the path of the checked bit block stream is a path that is suspended at one end. This application is collectively referred to as a transmitting device.
因此,本申请实施例不仅能够用于对端到端的路径进行误码检测,还可以对非端到端的路径进行误码检测,例如,规划的预留路径,1:1连接保护组的保护路径或有其他特殊 目的的路径。Therefore, the embodiment of the present application can be used not only for error detection of an end-to-end path, but also for error detection of a non-end-to-end path, for example, a planned reserved path, and a protection path of a 1:1 connection protection group. Or have other special purpose paths.
当被校验的比特块流的路径为从比特块发送端之后的第一中间设备到比特块接收端之前第二中间设备时,图6中各个步骤的执行主体可以为第一中间设备。被校验的比特块流的路径为一个两端悬空的路径。When the path of the checked bit block stream is the second intermediate device from the first intermediate device after the bit block transmitting end to the bit block receiving end, the execution body of each step in FIG. 6 may be the first intermediate device. The path of the bitstream to be verified is a path that is suspended at both ends.
针对步骤600,步骤610,步骤630,本申请实施例提供如下两种可能的实现方式:For the step 600, step 610, step 630, the embodiment of the present application provides the following two possible implementation manners:
第一种可能的实现方式:The first possible implementation:
发送第一边界比特块至第一设备;Transmitting a first boundary bit block to the first device;
依次发送第I比特块至第一设备;Transmitting the first bit block to the first device in sequence;
发送第二边界比特块、第一奇偶校验结果和第二奇偶校验结果至第一设备;Transmitting a second boundary bit block, a first parity result, and a second parity result to the first device;
因此,在上述实现方式中,第一奇偶校验结果和第二奇偶校验结果与两个边界比特块和两个边界比特块之间的N个比特块一起发送至第一设备,当被校验的比特块流的路径为从比特块发送端到比特块接收端时,这里的第一设备可以为比特块接收端,当被校验的比特块流的路径为从比特块发送端到比特块接收端之前的任一中间设备时,或当被校验的比特块流的路径为从比特块发送端之后的第一中间设备到比特块接收端之前第二中间设备时,这里的第一设备也可以是指中间设备。Therefore, in the above implementation manner, the first parity result and the second parity result are transmitted to the first device together with the N bit blocks between the two boundary bit blocks and the two boundary bit blocks, when being When the path of the bit block stream is from the bit block transmitting end to the bit block receiving end, the first device here may be the bit block receiving end, and the path of the checked bit block stream is from the bit block transmitting end to the bit When the intermediate device before the block receiving end, or when the path of the verified bit block stream is the second intermediate device from the first intermediate device after the bit block transmitting end to the bit block receiving end, the first here A device can also be an intermediate device.
第二种可能的实现方式:The second possible implementation:
发送第一边界比特块至第一设备;Transmitting a first boundary bit block to the first device;
依次发送第I比特块至第一设备;Transmitting the first bit block to the first device in sequence;
发送第二边界比特块至第一设备,发送第一奇偶校验结果和第二奇偶校验结果至第二设备。Transmitting the second boundary bit block to the first device, transmitting the first parity result and the second parity result to the second device.
须知,这里的第二设备可以为SDN控制器,或者具有判断比特流传输误码功能的任一设备。It should be noted that the second device herein may be an SDN controller or any device having a function of determining a bit stream transmission error.
此外,这里两种方式还可以同时采用,即第一奇偶校验结果和第二奇偶校验结果既发送至第一设备也发送至第二设备。In addition, the two methods can also be used at the same time, that is, the first parity result and the second parity result are sent to both the first device and the second device.
进一步地,应理解的是,在第一时刻发送第二边界比特块,在第二时刻发送第一奇偶校验结果和第二奇偶校验结果,其中,第一时刻早于第二时刻,或第一时刻晚于第二时刻,第一时刻等于第二时刻。Further, it should be understood that the second boundary bit block is sent at the first moment, and the first parity result and the second parity result are sent at the second moment, where the first moment is earlier than the second moment, or The first moment is later than the second moment, and the first moment is equal to the second moment.
第一奇偶校验结果的校验对象可以为N个比特块中每个比特块的连续的m个比特,第二奇偶校验结果的校验对象可以为N个比特块中每个比特块的连续的n个比特,在一种可能的实现方式中,第一奇偶校验结果的校验对象除了包括N个比特块中每个比特块的连续的m个比特外,还可以包括所述第一边界比特块的连续的m个比特,也可以包括第二边界比特块的连续的m个比特;同样的,第二奇偶校验结果的校验对象除了包括N个比特块中每个比特块的连续的n个比特外,还可以包括所述第一边界比特块的连续的n个比特,也可以包括第二边界比特块的连续的n个比特。The check object of the first parity result may be consecutive m bits of each of the N bit blocks, and the check object of the second parity result may be each of the N bit blocks a consecutive n bits, in a possible implementation manner, the check object of the first parity result may include the foregoing, in addition to the consecutive m bits of each of the N bit blocks The consecutive m bits of a boundary bit block may also include consecutive m bits of the second boundary bit block; likewise, the check object of the second parity result includes, in addition to each bit block of the N bit blocks. In addition to the consecutive n bits, it may also include consecutive n bits of the first boundary bit block, and may also include consecutive n bits of the second boundary bit block.
在一种可能的实现方式中,第一奇偶校验结果和第二奇偶校验结果可以存储于第二边界比特块中。因此,假设将比特块流中的每N个比特块为一组,第i个边界比特块存储第i组N个比特块对应的第一奇偶校验结果和第二奇偶校验结果,第i+1个边界比特块存储第i+1组N个比特块对应的第一奇偶校验结果和第二奇偶校验结果,其中,第i+1组N个比特块为第i个边界比特块与第i+1个边界比特块之间的比特块,i为正整数。In a possible implementation manner, the first parity result and the second parity result may be stored in the second boundary bit block. Therefore, assuming that each N bit block in the bit block stream is a group, the i-th boundary bit block stores the first parity result and the second parity result corresponding to the i-th N-bit block, i +1 boundary bit block stores a first parity result and a second parity result corresponding to the i+1th group of N bit blocks, wherein the i+1th group of N bit blocks is the ith boundary bit block A bit block between the i+1th boundary bit block and i is a positive integer.
应理解的是,本申请中提到的边界比特块可以为新插入的比特块,在新插入一个边界 比特块的同时,可以删除一个第一比特块,其中,第一比特块是指在N个比特块的传输过程中可能插入N个比特块或从N个比特块中删除的比特块。例如,针对64/66比特块流,第一比特块可以是指空闲块。It should be understood that the boundary bit block mentioned in this application may be a newly inserted bit block, and a first bit block may be deleted while a boundary bit block is newly inserted, wherein the first bit block refers to N bit blocks or bit blocks deleted from N bit blocks may be inserted during transmission of a bit block. For example, for a 64/66 bit block stream, the first block of bits may refer to a free block.
作为一个可选的实施例,如图7所示,以64/66比特块流为例,在确定第一奇偶校验结果和第二奇偶校验结果之后,第二边界比特块为图1中第8行对应的比特块码型定义,即比特块的类型为0x4B,比特块的O码为0x06,第一奇偶校验结果和第二奇偶校验结果存储于比特块的3个Data域中,未占用的Data域Bit填写二进制0。因此,第二边界比特块被插入到N个比特块之后,同时为了减小对用户带宽的影响,可以删除一个空闲块。As an optional embodiment, as shown in FIG. 7, taking a 64/66 bit block stream as an example, after determining the first parity result and the second parity result, the second boundary bit block is in FIG. The bit block pattern definition corresponding to the 8th line, that is, the type of the bit block is 0x4B, the O code of the bit block is 0x06, and the first parity result and the second parity result are stored in the 3 Data fields of the bit block. The unoccupied Data field Bit fills in binary 0. Therefore, the second boundary bit block is inserted after the N bit blocks, and in order to reduce the influence on the user bandwidth, one free block can be deleted.
考虑M1/M2比特块流在传输过程中穿越异步节点(即接收时钟与节点时钟、发送时钟不一定完全同步)时,一般会通过插入或删除第一比特块来消除频率影响。比如64/66比特块流通过插入或删除IDLE Block来实现,如图8所示。因此,在步骤620确定第一奇偶校验结果和第二奇偶校验结果时,如果采用已有BIP-x算法,会因传输过程中插入或删除第一比特块而影响第一奇偶校验结果和第二奇偶校验结果。Considering that the M1/M2 bit block stream traverses the asynchronous node during transmission (that is, the receiving clock is not completely synchronized with the node clock and the transmitting clock), the frequency influence is generally eliminated by inserting or deleting the first bit block. For example, a 64/66 bit block stream is implemented by inserting or deleting an IDLE Block, as shown in FIG. Therefore, when the first parity result and the second parity result are determined in step 620, if the existing BIP-x algorithm is used, the first parity result is affected by inserting or deleting the first bit block during transmission. And the second parity result.
在本申请实施例中,第一奇偶校验结果和第二奇偶校验结果是根据预设校验算法计算得到的,预设校验算法用于当N个比特块中增加或减少第一比特块时不改变第一奇偶校验结果和第二奇偶校验结果。In the embodiment of the present application, the first parity result and the second parity result are calculated according to a preset check algorithm, where the preset check algorithm is used to increase or decrease the first bit in the N bit blocks. The first parity result and the second parity result are not changed at the time of the block.
具体的,为保证第一奇偶校验结果和第二奇偶校验结果能够容忍传输过程中插入或删除一个或多个第一比特块(比如IDLE Block),而且当第一比特块发生误码时,也能被检测到,本申请对现有的BIP算法进行了改造,可以包括但不限于以下两种算法:Specifically, to ensure that the first parity result and the second parity result can tolerate insertion or deletion of one or more first bit blocks (such as IDLE Block) during transmission, and when the first bit block is in error It can also be detected. This application transforms the existing BIP algorithm, which can include but is not limited to the following two algorithms:
算法1:预设校验算法为xBIP-y算法,其中,x是指连续比特交织的比特数,x是根据第一比特块的码型定义确定的,y是指监视区段的个数,x,y为正整数,y≥2。Algorithm 1: The preset check algorithm is the xBIP-y algorithm, where x is the number of bits of consecutive bit interleaving, x is determined according to the definition of the pattern of the first bit block, and y is the number of monitored segments, x, y is a positive integer, y ≥ 2.
从N个比特块中的第1净荷比特开始,将每个比特块的每x个连续比特依次记录至第1个监视区段至第y个监视区段;针对每个监视区段采用奇校验或偶校验确定1比特监视码,获得y比特监视码,y比特监视码中包括第一奇偶校验结果和第二奇偶校验结果。Starting from the first payload bit of the N bit blocks, every x consecutive bits of each bit block are sequentially recorded to the first monitoring segment to the yth monitoring segment; The parity or even parity determines a 1-bit monitoring code to obtain a y-bit monitoring code, and the y-bit monitoring code includes a first parity result and a second parity result.
应理解的是,在计算第一奇偶校验结果和第二奇偶校验结果时,不包括每个比特块中的同步比特头。It should be understood that the sync bit header in each bit block is not included in the calculation of the first parity result and the second parity result.
作为一种可选的实施例如图9所示,已有的BIP-x算法可以看做是xBIP-y算法的一个特例(即x=1的场景)。图8是64/66 Bit Block采用8BIP-8算法的示意图。其中,B0-B7,是采用8BIP-8算法包括的8个监视码(又称为校验码),每个监视码对应一个监视区段,为对应监视区段内包含比特提供奇检验或偶校验。每个监视区段对应每个比特块的8个连续比特,例如,第1个监视区段对应每个比特块的第1个净荷比特至第8个净荷比特,第2个监视区段对应每个比特块的第9个净荷比特至第16个净荷比特,……,第8个监视区段对应每个比特块的第57个净荷比特至第64个净荷比特。具体的,插入的IDLE Block,第一个字节为0x1e,其他为0。IDLE Block的第一个字节进入8BIP-8的第1监视区段,其他字节进入第2-8监视区段。0x1e共有4个二进制1,其他域为0,有0个二进制1,因此无论传输过程中插入或删除多少IDLE Block,B0--B7的校验结果都不受影响。As an alternative implementation, as shown in FIG. 9, the existing BIP-x algorithm can be regarded as a special case of the xBIP-y algorithm (ie, a scene of x=1). Figure 8 is a schematic diagram of the 64/66 Bit Block using the 8BIP-8 algorithm. Among them, B0-B7 is 8 monitoring codes (also called check codes) included in the 8BIP-8 algorithm, and each monitoring code corresponds to one monitoring segment, which provides an odd test or even for the bits included in the corresponding monitoring segment. check. Each monitoring segment corresponds to 8 consecutive bits of each bit block, for example, the first monitoring segment corresponds to the first payload bit to the eighth payload bit of each bit block, and the second monitoring segment Corresponding to the ninth payload bit to the 16th payload bit of each bit block, ..., the eighth monitoring segment corresponds to the 57th payload bit to the 64th payload bit of each bit block. Specifically, the inserted IDLE Block has the first byte being 0x1e and the others being 0. The first byte of the IDLE Block enters the 1st monitoring section of 8BIP-8, and the other bytes enter the 2-8th monitoring section. 0x1e has 4 binary 1s, other fields are 0, and there are 0 binary ones. Therefore, no matter how many IDLE blocks are inserted or deleted during transmission, the verification results of B0--B7 are not affected.
作为一种可选的实施例如图10所示,图10是64/66 Bit Block采用16BIP-4算法的示意图。其中,B0-B3,是采用16BIP-4算法包括的4个监视码(又称为校验码),每个监视码对应一个监视区段,为对应监视区段内包含比特提供奇检验或偶校验。每个监视区段对应每个比特块的16个连续比特,例如,第1个监视区段对应每个比特块的第1个净荷 比特至第16个净荷比特,第2个监视区段对应每个比特块的第17个净荷比特至第32个净荷比特,第3个监视区段对应每个比特块的第33个净荷比特至第48个净荷比特,第4个监视区段对应每个比特块的第49个净荷比特至第64个净荷比特。As an alternative implementation, such as shown in FIG. 10, FIG. 10 is a schematic diagram of the 64/66 Bit Block using the 16BIP-4 algorithm. Among them, B0-B3 is a four monitoring code (also called a check code) included in the 16BIP-4 algorithm, and each monitoring code corresponds to one monitoring section, providing an odd test or even for the bits included in the corresponding monitoring section. check. Each monitoring section corresponds to 16 consecutive bits of each bit block, for example, the first monitoring section corresponds to the first payload bit of each bit block to the 16th payload bit, and the second monitoring section Corresponding to the 17th payload bit of each bit block to the 32nd payload bit, the third monitoring segment corresponds to the 33rd payload bit of each bit block to the 48th payload bit, the 4th monitoring The segment corresponds to the 49th payload bit to the 64th payload bit of each bit block.
算法2:预设校验算法为flexBIP-z算法,其中,z是指监视区段的个数,每个监视区段对应的连续比特交织的比特数不全相同,z个监视区段分别对应的连续比特交织的比特数为A1、A2、A 3……Az-1,Az,A1、A2、A 3……Az-1,Az,z为正整数,z≥2。Algorithm 2: The preset check algorithm is a flexBIP-z algorithm, where z refers to the number of monitored segments, and the number of consecutive bit interleaving bits corresponding to each monitoring segment is not the same, and z monitoring segments respectively correspond to The number of bits of consecutive bit interleaving is A1, A2, A 3 ... Az-1, Az, A1, A2, A 3 ... Az-1, Az, z are positive integers, z ≥ 2.
从N个比特块中的第1净荷比特开始,将每个比特块中的A1个连续比特记录至第1个监视区段,将A1个连续比特后的A2个连续比特记录至第2个监视区段,将A2个连续比特后的A3个连续比特记录至第3个监视区段,直至将Az-1个连续比特后的Az个连续比特记录至第z个监视区段;针对每个监视区段采用奇校验或偶校验确定1比特监视码,获得z比特监视码,z比特监视码中包括第一奇偶校验结果和第二奇偶校验结果。Starting from the first payload bit of the N bit blocks, A1 consecutive bits in each bit block are recorded to the first monitoring segment, and A2 consecutive bits after A1 consecutive bits are recorded to the second Monitoring section, recording A3 consecutive bits after A2 consecutive bits to the third monitoring section until Az consecutive bits after Az-1 consecutive bits are recorded to the zth monitoring section; The monitoring section determines the 1-bit monitoring code by using odd or even parity to obtain a z-bit monitoring code, and the z-bit monitoring code includes a first parity result and a second parity result.
作为一种可选的实施例如图11(a)所示,图11(a)是64/66 Bit Block采用flexBIP-8算法的示意图。其中,B0-B7,是采用flexBIP-8算法包括的8个监视码,每个监视码对应一个监视区段,为对应监视区段内包含比特提供奇检验或偶校验。第1个监视区段对应每个比特块的第1个净荷比特至第8个净荷比特,第2个监视区段对应每个比特块的第9净荷比特至第18净荷比特,第3个监视区段对应每个比特块的第19净荷比特至第24净荷比特,第4个监视区段对应每个比特块的第25个净荷比特至第33个净荷比特,第5个监视区段对应每个比特块的第34个净荷比特至第40个净荷比特,第6个监视区段对应每个比特块的第41个净荷比特至第48个净荷比特,第7个监视区段对应每个比特块的第49个净荷比特至第58个净荷比特,第8个监视区段对应每个比特块的第59个净荷比特至第64个净荷比特。As an alternative implementation, such as shown in Figure 11(a), Figure 11(a) is a schematic diagram of the 64/66 Bit Block using the flexBIP-8 algorithm. Among them, B0-B7 is 8 monitoring codes included in the flexBIP-8 algorithm, and each monitoring code corresponds to one monitoring section, and provides odd or even parity for the bits included in the corresponding monitoring section. The first monitoring segment corresponds to the first payload bit to the eighth payload bit of each bit block, and the second monitoring segment corresponds to the ninth payload bit to the 18th payload bit of each bit block. The third monitoring section corresponds to the 19th payload bit to the 24th payload bit of each bit block, and the 4th monitoring section corresponds to the 25th payload bit to the 33rd payload bit of each bit block, The fifth monitoring segment corresponds to the 34th payload bit to the 40th payload bit of each bit block, and the sixth monitoring segment corresponds to the 41st payload bit to the 48th payload of each bit block. Bit, the seventh monitoring section corresponds to the 49th payload bit of each bit block to the 58th payload bit, and the 8th monitoring section corresponds to the 59th payload bit of each bit block to the 64th Payload bits.
作为一种可选的实施例如图11(b)所示,图11(b)是64/6B Bit Block采用flexBIP-9算法的示意图。其中,B0-B8,是采用flexBIP-9算法包括的9个监视码,每个监视码对应一个监视区段,为对应监视区段内包含比特提供奇检验或偶校验。第1个监视区段对应每个比特块的第1个净荷比特至第8个净荷比特,第2个监视区段对应每个比特块的第9净荷比特至第15净荷共7个比特,第3个监视区段对应每个比特块的第16净荷比特至第22净荷比特共7个比特,第4个监视区段对应每个比特块的第23个净荷比特至第29个净荷比特共7个比特,第5个监视区段对应每个比特块的第30个净荷比特至第36个净荷比特共7个比特,第6个监视区段对应每个比特块的第37个净荷比特至第43个净荷比特共7个比特,第7个监视区段对应每个比特块的第44个净荷比特至第50个净荷比特共7个比特,第8个监视区段对应每个比特块的第51个净荷比特至第57个净荷比特共7个比特;第9个监视区段对应每个比特块的第58个净荷比特至第64个净荷比特共7个比特。As an alternative implementation, for example, as shown in FIG. 11(b), FIG. 11(b) is a schematic diagram of the 64/6B Bit Block using the flexBIP-9 algorithm. Among them, B0-B8 is 9 monitoring codes included in the flexBIP-9 algorithm, and each monitoring code corresponds to one monitoring section, and provides odd or even parity for the bits included in the corresponding monitoring section. The first monitoring section corresponds to the first payload bit to the eighth payload bit of each bit block, and the second monitoring section corresponds to the ninth payload bit of each bit block to the 15th payload total 7 Bits, the third monitoring segment corresponds to the 16th payload bit of each bit block to the 22nd payload bit, a total of 7 bits, and the 4th monitoring segment corresponds to the 23rd payload bit of each bit block to The 29th payload bit has a total of 7 bits, and the 5th monitoring segment corresponds to the 30th payload bit of each bit block to the 36th payload bit, a total of 7 bits, and the sixth monitoring segment corresponds to each The 37th payload bit of the bit block has a total of 7 bits to the 43rd payload bit, and the 7th monitoring segment corresponds to the 44th payload bit of each bit block to the 50th payload bit of 7 bits. The eighth monitoring section corresponds to the 51st payload bit of each bit block to the 57th payload bit of 7 bits; the ninth monitoring section corresponds to the 58th payload bit of each bit block to The 64th payload bit has a total of 7 bits.
在步骤620确定第一奇偶校验结果和第二奇偶校验结果时,第一奇偶校验结果的校验对象包括N个比特块和步骤600所述第一边界中比特块,每个比特块的连续的9组比特的任何一组,进入flexBIP-9算法对应的校验区,最终形成第一奇偶校验结果。所述的第二奇偶校验结果的校验对象包括包括N个比特块和步骤600所述第一边界中比特块,每个比特块的连续的9组比特除第一奇偶校验结果选择的一组外其他8组中的任何一组,进入flexBIP-9算法对应的校验区,最终形成第二奇偶校验结果。When the first parity result and the second parity result are determined in step 620, the check object of the first parity result includes N bit blocks and the bit block in the first boundary of step 600, each bit block Any one of the consecutive 9 groups of bits enters the check area corresponding to the flexBIP-9 algorithm, and finally forms the first parity result. The check object of the second parity result includes a block of N bits and a bit block in the first boundary of step 600, and consecutive 9 groups of bits of each bit block are selected according to the first parity result. Any one of the other 8 groups outside the group enters the check area corresponding to the flexBIP-9 algorithm, and finally forms a second parity result.
在步骤620确定第一奇偶校验结果和第二奇偶校验结果时,第一奇偶校验结果的校验对象包括N个比特块和步骤630所述第二边界中比特块,每个比特块的连续的9组比特的 任何一组,进入flexBIP-9算法对应的校验区,最终形成第一奇偶校验结果。所述的第二奇偶校验结果的校验对象包括包括N个比特块和步骤630所述第二边界中比特块,每个比特块的连续的9组比特除第一奇偶校验结果选择的一组外其他8组中的任何一组,进入flexBIP-9算法对应的校验区,最终形成第二奇偶校验结果。When the first parity result and the second parity result are determined in step 620, the check object of the first parity result includes N bit blocks and the bit block in the second boundary of step 630, each bit block Any one of the consecutive 9 groups of bits enters the check area corresponding to the flexBIP-9 algorithm, and finally forms the first parity result. The check object of the second parity result includes a block of N bits and a block of bits in the second boundary of step 630, and consecutive 9 groups of bits of each block block are selected according to the first parity result. Any one of the other 8 groups outside the group enters the check area corresponding to the flexBIP-9 algorithm, and finally forms a second parity result.
在下文步骤1230确定第三奇偶校验结果和第四奇偶校验结果时,第三奇偶校验结果的校验对象包括T个比特块和步骤1200所述第一边界中比特块,每个比特块的连续的9组比特的任何一组,进入flexBIP-9算法对应的校验区,最终形成第三奇偶校验结果。所述的第四奇偶校验结果的校验对象包括包括T个比特块和步骤600所述第一边界中比特块,每个比特块的连续的9组比特除第三奇偶校验结果选择的一组外其他8组中的任何一组,进入flexBIP-9算法对应的校验区,最终形成第四奇偶校验结果。When the third parity result and the fourth parity result are determined in step 1230 below, the check object of the third parity result includes T bit blocks and the bit block in the first boundary described in step 1200, each bit Any one of the consecutive 9 groups of bits of the block enters the check area corresponding to the flexBIP-9 algorithm, and finally forms a third parity result. The check object of the fourth parity result includes a T bit block and a bit block in the first boundary in step 600, and consecutive 9 groups of bits of each bit block are selected according to a third parity result. Any one of the other 8 groups in the group enters the check area corresponding to the flexBIP-9 algorithm, and finally forms a fourth parity result.
在步骤1230确定第三奇偶校验结果和第四奇偶校验结果时,第三奇偶校验结果的校验对象包括T个比特块和步骤1220所述第二边界中比特块,每个比特块的连续的9组比特的任何一组,进入flexBIP-9算法对应的校验区,最终形成第三奇偶校验结果。所述的第四奇偶校验结果的校验对象包括T个比特块和步骤1220所述第二边界中比特块,每个比特块的连续的9组比特除第三奇偶校验结果选择的一组外其他8组中的任何一组,进入flexBIP-9算法对应的校验区,最终形成第四奇偶校验结果。When the third parity result and the fourth parity result are determined in step 1230, the check object of the third parity result includes T bit blocks and the bit block in the second boundary of step 1220, each bit block Any one of the consecutive 9 groups of bits enters the check area corresponding to the flexBIP-9 algorithm, and finally forms a third parity result. The check object of the fourth parity result includes T bit blocks and the bit block in the second boundary of step 1220, and the consecutive 9 groups of bits of each bit block are selected according to the third parity result. Any one of the other 8 groups outside the group enters the check area corresponding to the flexBIP-9 algorithm, and finally forms a fourth parity result.
具体的,插入的比特块为空闲块(IDLE Block),第一个字节为0x1e,其他为0。IDLE Block的第一个字节进入flexBIP-9的第1监视区段,其他按照连续7比特分组,进入第2-9监视区段。0x1e共有4个二进制1,其他域为0,有0个二进制1,因此无论传输过程中插入或删除多少IDLE Block,B0--B8的校验结果都不受影响。Specifically, the inserted bit block is an IDLE Block, the first byte is 0x1e, and the others are 0. The first byte of the IDLE Block enters the first monitoring section of flexBIP-9, and the other packets are grouped in consecutive 7 bits into the 2-9th monitoring section. 0x1e has 4 binary 1s, other fields are 0, and there are 0 binary ones. Therefore, no matter how many IDLE blocks are inserted or deleted during transmission, the verification results of B0--B8 are not affected.
具体的,当插入的比特块为低功耗空闲块(LPI Block),第一个字节为0x1e,其他为按照7bit分8组,每组为0x6。LPI的第一个字节进入flexBIP-9的第1监视区段,其他按照连续7比特分组,进入第2-9监视区段。0x1e共有4个二进制1,其他7bi t域为0x6,有2个二进制1,因此无论传输过程中插入或删除多少LPI Block,B0--B8的校验结果都不受影响。Specifically, when the inserted bit block is a low power idle block (LPI Block), the first byte is 0x1e, and the others are divided into 8 groups according to 7 bits, and each group is 0x6. The first byte of the LPI enters the first monitoring section of flexBIP-9, and the other packets are grouped in consecutive 7 bits into the 2-9th monitoring section. 0x1e has 4 binary 1s, the other 7bi t fields are 0x6, and there are 2 binary 1s. Therefore, no matter how many LPI blocks are inserted or deleted during transmission, the verification results of B0--B8 are not affected.
具体的,当插入的比特块为错误块(ERROR Block),第一个字节为0x1e,其他为按照7bit分8组,每组为0x1e。LPI的第一个字节进入flexBIP-9的第1监视区段,其他按照连续7比特分组,进入第2-9监视区段。0x1e共有4个二进制1,因此无论传输过程中插入或删除多少ERROR Block,B0--B8的校验结果都不受影响。Specifically, when the inserted bit block is an ERROR Block, the first byte is 0x1e, and the others are divided into 8 groups according to 7 bits, and each group is 0x1e. The first byte of the LPI enters the first monitoring section of flexBIP-9, and the other packets are grouped in consecutive 7 bits into the 2-9th monitoring section. 0x1e has 4 binary 1s, so the check result of B0--B8 is not affected regardless of how many ERROR blocks are inserted or deleted during transmission.
因此,由上述提供的两种预设算法可知,可将通过算法1获得的y比特监视码,作为第一校验结果集合,或者,将通过算法2获得的z比特监视码,作为第一校验结果集合。在发送第一奇偶校验结果和第二奇偶校验结果时,可以同时将获得的所有校验结果即第一校验结果集合一起发送。Therefore, it can be known from the two preset algorithms provided above that the y-bit monitoring code obtained by the algorithm 1 can be used as the first verification result set, or the z-bit monitoring code obtained by the algorithm 2 can be used as the first school. Test results collection. When the first parity result and the second parity result are transmitted, all the obtained verification results, that is, the first verification result set, may be simultaneously transmitted.
参阅图12所示,本申请实施例提出一种比特块流误码检测方法,以解决在M/N Bit block交换的场景中的误码检测方法实现难度较大且承载效率较低的问题。该方法,包括:As shown in FIG. 12, the embodiment of the present application provides a bit block stream error detection method to solve the problem that the error detection method in the M/N Bit block exchange scenario is difficult to implement and has low bearer efficiency. The method comprises:
步骤1200:接收第一边界比特块,第一边界比特块用于区别后续接收的T个比特块,T为正整数。Step 1200: Receive a first boundary bit block, where the first boundary bit block is used to distinguish the subsequently received T bit blocks, where T is a positive integer.
步骤1210:依次接收第I比特块,I为大于等于1小于等于T的整数。Step 1210: Receive the first bit block in sequence, where I is an integer greater than or equal to 1 and less than or equal to T.
步骤1220:接收第二边界比特块,第二边界比特块用于区别已经接收完成的T个比特块。Step 1220: Receive a second boundary bit block, where the second boundary bit block is used to distinguish T bits that have been received.
步骤1230:确定第三奇偶校验结果和第四奇偶校验结果,第三奇偶校验结果的校验对象包括T个比特块中每个比特块的连续的m个比特,第四奇偶校验结果的校验对象包括T个比特块中每个比特块的连续的n个比特,m、n中的至少一个大于等于2。Step 1230: Determine a third parity result and a fourth parity result, where the check object of the third parity result includes consecutive m bits of each of the T bit blocks, and the fourth parity The resulting check object includes consecutive n bits of each of the T bit blocks, at least one of m, n being greater than or equal to two.
步骤1240:当接收到第一奇偶校验结果和第二奇偶校验结果时,根据第一奇偶校验结果和第三奇偶校验结果,以及第二奇偶校验结果和第四奇偶校验结果,确定T个比特块是否存在误码,其中,第一奇偶校验结果的校验对象包括N个比特块中每个比特块的连续的m个比特,第二奇偶校验结果的校验对象包括N个比特块中每个比特块的连续的n个比特,N为确定第一奇偶校验结果和第二奇偶校验结果时第一边界比特块和第二边界比特块之间的比特块的数目。Step 1240: When receiving the first parity result and the second parity result, according to the first parity result and the third parity result, and the second parity result and the fourth parity result Determining whether there is an error in the T bit blocks, wherein the check object of the first parity result includes consecutive m bits of each of the N bit blocks, and the check object of the second parity result Included consecutive n bits of each of the N bit blocks, N being a bit block between the first boundary bit block and the second boundary bit block when determining the first parity result and the second parity result Number of.
应理解的是,当被校验的比特块流的路径为从比特块发送端到比特块接收端时,图12中各个步骤的执行主体可以为比特块接收端,当被校验的比特块流的路径为从比特块发送端到比特块接收端之前的任一中间设备,或当被校验的比特块流的路径为从比特块发送端到比特块接收端时,图12中各个步骤的执行主体可以为中间设备。本申请中统称为接收设备。It should be understood that when the path of the checked bit block stream is from the bit block transmitting end to the bit block receiving end, the execution body of each step in FIG. 12 may be the bit block receiving end, when the checked bit block The path of the stream is any intermediate device from the transmitting end of the bit block to the receiving end of the bit block, or when the path of the bit block stream to be verified is from the transmitting end of the bit block to the receiving end of the bit block, the steps in FIG. 12 The execution body can be an intermediate device. This application is collectively referred to as a receiving device.
须知,这里的N个比特块为发送设备确定第一奇偶校验结果和第二奇偶校验结果时第一边界比特块与第二边界比特块之间的比特块。It should be noted that the N bit blocks here are the bit blocks between the first boundary bit block and the second boundary bit block when the first parity result and the second parity result are determined by the transmitting device.
作为一个可选的实施例,发送设备发送第一边界比特块之后,依次发送了N个比特块,然后根据这N个比特块计算第一奇偶校验结果和第二奇偶校验结果,将这两个结果存储于第二边界比特块中,发送第二边界比特块。但是,考虑到从发送设备到接收设备所经过的路径中由于穿越异步节点,因此可能在N个比特块中插入或删除第一比特块,接收设备在接收到第一边界比特块后,依次接收了T个比特块,此时可能出现N=T,或N>T(即在N个比特块中插入第一比特块),或N<T(即在N个比特块中删除第一比特块)三种情况。As an optional embodiment, after the sending device sends the first boundary bit block, sequentially transmitting N bit blocks, and then calculating the first parity result and the second parity result according to the N bit blocks, The two results are stored in a second boundary bit block, and the second boundary bit block is transmitted. However, considering that the path passing from the transmitting device to the receiving device traverses the asynchronous node, the first bit block may be inserted or deleted in the N bit blocks, and the receiving device sequentially receives the first boundary bit block after receiving the first bit block. T bit blocks, where N=T, or N>T (ie, inserting the first bit block in N bit blocks), or N<T (ie, deleting the first bit block in N bit blocks) )three situations.
在一种可能的实现方式中,当未接收到第一奇偶校验结果和第二奇偶校验结果时,发送第三奇偶校验结果和第四奇偶校验结果至第二设备,第二设备存储有第一奇偶校验结果和第二奇偶校验结果。须知,这里的第二设备可以为SDN控制器,或者具有判断比特流传输误码功能的任一设备。此外,当接收到第一奇偶校验结果和第二奇偶校验结果时,第三奇偶校验结果和第四奇偶校验结果也可发送至第二设备。因此,第二设备可以接收到发送设备发送的第一奇偶校验结果和第二奇偶校验结果,以及接收设备发送的第三奇偶校验结果和第四奇偶校验结果,第二设备根据两组结果确定比特块流的传输过程中是否存在误码。In a possible implementation manner, when the first parity result and the second parity result are not received, sending the third parity result and the fourth parity result to the second device, the second device A first parity result and a second parity result are stored. It should be noted that the second device herein may be an SDN controller or any device having a function of determining a bit stream transmission error. Further, when the first parity result and the second parity result are received, the third parity result and the fourth parity result may also be transmitted to the second device. Therefore, the second device may receive the first parity result and the second parity result sent by the sending device, and the third parity result and the fourth parity result sent by the receiving device, and the second device according to the two The group result determines if there is a bit error during the transmission of the bit block stream.
在一种可能的实现方式中,在第一时刻接收第二边界比特块,在第二时刻接收第一奇偶校验结果和第二奇偶校验结果,其中,第一时刻早于第二时刻,或第一时刻晚于第二时刻,第一时刻等于第二时刻。In a possible implementation, the second boundary bit block is received at the first time, and the first parity result and the second parity result are received at the second time, where the first time is earlier than the second time, Or the first moment is later than the second moment, the first moment is equal to the second moment.
第三奇偶校验结果的校验对象可以为T个比特块中每个比特块的连续的m个比特,第四奇偶校验结果的校验对象可以为T个比特块中每个比特块的连续的n个比特,第一奇偶校验结果的校验对象可以为N个比特块中每个比特块的连续的m个比特,第二奇偶校验结果的校验对象可以为N个比特块中每个比特块的连续的n个比特,在一种可能的实现方式中,所述第三奇偶校验结果的校验对象除了包括T个比特块中每个比特块的连续的m个比特外,还可以包括所述第一边界比特块的连续的m个比特,也可以包括第二边界比特块的连续的m个比特;同样的,第四奇偶校验结果的校验对象除了包括T个比特块中每个比特 块的连续的n个比特外,还可以包括所述第一边界比特块的连续的n个比特,也可以包括第二边界比特块的连续的n个比特。第一奇偶校验结果的校验对象除了包括N个比特块中每个比特块的连续的m个比特外,还可以包括所述第一边界比特块的连续的m个比特,也可以包括第二边界比特块的连续的m个比特;同样的,第二奇偶校验结果的校验对象除了包括N个比特块中每个比特块的连续的n个比特外,还可以包括所述第一边界比特块的连续的n个比特,也可以包括第二边界比特块的连续的n个比特。The check object of the third parity result may be consecutive m bits of each of the T bit blocks, and the check object of the fourth parity result may be each bit block of the T bit blocks. For consecutive n bits, the check object of the first parity result may be consecutive m bits of each of the N bit blocks, and the check object of the second parity result may be N bit blocks. a consecutive n bits of each bit block, in a possible implementation, the check object of the third parity result includes only m consecutive bits of each bit block in the T bit block In addition, it may further include consecutive m bits of the first boundary bit block, and may also include consecutive m bits of the second boundary bit block; likewise, the check object of the fourth parity result includes T except In addition to successive n bits of each bit block in a block of bits, it may also include consecutive n bits of the first boundary bit block, and may also include consecutive n bits of the second boundary bit block. The check object of the first parity result may include, in addition to consecutive m bits of each of the N bit blocks, consecutive m bits of the first boundary bit block, and may also include The consecutive m bits of the two boundary bit blocks; likewise, the check object of the second parity result may include the first one in addition to the consecutive n bits of each of the N bit blocks The consecutive n bits of the boundary bit block may also include consecutive n bits of the second boundary bit block.
当第一奇偶校验结果的校验对象包括第一边界比特块的连续的m个比特时,第三奇偶校验结果的校验对象也需要包括第一边界比特块的连续的m个比特;当第一奇偶校验结果的校验对象包括第二边界比特块的连续的m个比特时,第三奇偶校验结果的校验对象也需要包括第二边界比特块的连续的m个比特;当第二奇偶校验结果的校验对象包括第一边界比特块的连续的n个比特时,第四奇偶校验结果的校验对象也需要包括第一边界比特块的连续的n个比特;当第二奇偶校验结果的校验对象包括第二边界比特块的连续的n个比特时,第四奇偶校验结果的校验对象也需要包括第二边界比特块的连续的n个比特。When the check object of the first parity result includes consecutive m bits of the first boundary bit block, the check object of the third parity result also needs to include consecutive m bits of the first boundary bit block; When the check object of the first parity result includes consecutive m bits of the second boundary bit block, the check object of the third parity result also needs to include consecutive m bits of the second boundary bit block; When the check object of the second parity result includes consecutive n bits of the first boundary bit block, the check object of the fourth parity result also needs to include consecutive n bits of the first boundary bit block; When the check object of the second parity result includes consecutive n bits of the second boundary bit block, the check object of the fourth parity result also needs to include consecutive n bits of the second boundary bit block.
在一种可能的实现方式中,第一奇偶校验结果和第二奇偶校验结果存储于第二边界比特块中。In a possible implementation, the first parity result and the second parity result are stored in the second boundary bit block.
在一种可能的实现方式中,接收设备根据第一奇偶校验结果和第三奇偶校验结果,以及第二奇偶校验结果和第四奇偶校验结果,确定T个比特块是否存在误码的具体方法为:若确定第一奇偶校验结果和第三奇偶校验结果相同,且第二奇偶校验结果和第四奇偶校验结果相同,则确定T个比特块不存在误码;若确定第一奇偶校验结果和第三奇偶校验结果不相同,和/或第二奇偶校验结果和第四奇偶校验结果不相同,则确定T个比特块存在误码。In a possible implementation manner, the receiving device determines, according to the first parity result and the third parity result, and the second parity result and the fourth parity result, whether the T bit blocks have an error. The specific method is: if it is determined that the first parity result and the third parity result are the same, and the second parity result is the same as the fourth parity result, determining that there are no error codes in the T bit blocks; It is determined that the first parity result and the third parity result are not the same, and/or the second parity result and the fourth parity result are not the same, and it is determined that the T bit blocks have an error.
此外,应理解的是,接收设备确定第三奇偶校验结果和第四奇偶校验结果采用的预设算法与发送设备确定第一奇偶校验结果和第二奇偶校验结果采用的预设算法相同,重复之处不再赘述。In addition, it should be understood that the receiving device determines a preset algorithm used by the third parity result and the fourth parity result, and a preset algorithm used by the transmitting device to determine the first parity result and the second parity result. The same, the repetition will not be repeated.
在一种可能的实现方式中,若接收设备接收到第一校验结果集合,第一校验结果集合是根据xBIP-y算法计算得到的,第一校验结果集合包括的y比特监视码中包括第一奇偶校验结果和第二奇偶校验结果。则接收设备需要确定第二校验结果集合,第二奇偶校验结果是根据xBIP-y算法计算得到的,第二校验结果集合包括的y比特监视码中包括第三奇偶校验结果和第三奇偶校验结果。进一步地,接收设备根据第一校验结果集合和第二校验结果集合,确定T个比特块是否存在误码。In a possible implementation manner, if the receiving device receives the first verification result set, the first verification result set is calculated according to the xBIP-y algorithm, and the first verification result set includes the y-bit monitoring code. A first parity result and a second parity result are included. The receiving device needs to determine a second set of check results, the second parity result is calculated according to the xBIP-y algorithm, and the y-bit monitoring code included in the second check result set includes the third parity result and the first Three parity results. Further, the receiving device determines, according to the first verification result set and the second verification result set, whether the T bit blocks have an error.
在一种可能的实现方式中,若接收设备接收到接收第一校验结果集合,第一校验结果集合是根据flexBIP-z算法计算得到的,第一校验结果集合包括的z比特监视码中包括第一奇偶校验结果和第二奇偶校验结果。则接收设备需要确定第二校验结果集合,第二校验结果集合是根据flexBIP-z算法计算得到的,第二校验结果集合包括的z比特监视码中包括第三奇偶校验结果和第四奇偶校验结果。进一步地,接收设备根据第一校验结果集合和第二校验结果集合,确定T个比特块是否存在误码。In a possible implementation manner, if the receiving device receives the first check result set, the first check result set is calculated according to the flexBIP-z algorithm, and the first check result set includes the z-bit monitoring code. The first parity result and the second parity result are included. The receiving device needs to determine a second verification result set, where the second verification result set is calculated according to the flexBIP-z algorithm, and the z-bit monitoring code included in the second verification result set includes the third parity result and the third Four parity results. Further, the receiving device determines, according to the first verification result set and the second verification result set, whether the T bit blocks have an error.
具体的,接收设备根据第一校验结果集合和第二校验结果集合,确定T个比特块是否存在误码,包括以下两种可能的情况:Specifically, the receiving device determines, according to the first verification result set and the second verification result set, whether the T bit blocks have an error, including the following two possible situations:
(1)若确定第一校验结果集合和第二校验结果集合相同,则确定T个比特块不存在误码;(1) if it is determined that the first verification result set and the second verification result set are the same, it is determined that there are no error codes in the T bit blocks;
(2)若确定第一校验结果集合和第二校验结果集合不相同,则确定T个比特块存在误码。(2) If it is determined that the first verification result set and the second verification result set are not the same, it is determined that the T bit blocks have an error.
采用本申请实施例提供的方法可以完整实施M/N Bit Block网络路径的错误或误码检测,不影响用户业务,承载效率100%,可以容忍传递过程中因同步问题而插入或删除的比特块,且检测周期(即两个边界比特块之间的比特块数目)和检测精度(即预设算法)动态按需可配置。此外,该检测方法不仅可以被校验的比特块流的路径为端到端的路径,还可以用于被校验的比特块流的路径为非端到端的路径。The error or error detection of the M/N Bit Block network path can be completely implemented by using the method provided in the embodiment of the present application, without affecting user services, and the bearer efficiency is 100%, and the bit block inserted or deleted due to the synchronization problem during the transmission process can be tolerated. And the detection period (ie, the number of bit blocks between two boundary bit blocks) and the detection accuracy (ie, the preset algorithm) are dynamically configurable on demand. In addition, the detection method can not only use the path of the bit block stream to be verified as an end-to-end path, but also the path of the bit block stream to be verified as a non-end-to-end path.
参阅图13所示,本申请实施例提出一种比特块流误码检测方法,以解决在M/N Bit block交换的场景中的误码检测方法实现难度较大且承载效率较低的问题。该方法,包括:As shown in FIG. 13 , the embodiment of the present application provides a bit block stream error detection method to solve the problem that the error detection method in the M/N Bit block exchange scenario is difficult to implement and has low bearer efficiency. The method comprises:
步骤1300:第一设备根据比特块流中起始块中的起始字节和与起始块对应的结束块中的结束字节确定被检测区段。Step 1300: The first device determines the detected segment according to a start byte in the start block in the bit block stream and an end byte in the end block corresponding to the start block.
如图14所示,对于64/66比特流,用户业务以开始块/S/标记为开始,结束块/T/标记为结束,中间的D为纯数据块,具体如图15所示。如图1中,第7行对应开始块的码型定义,S0代表开始字节,具体如图16所示,第9-16行分别对应8种结束块的码型定义,T0-T7代表结束字节,具体如图17所示,以结束块中包括T0为例,被检测区段为从S0到T0之间的字节。As shown in FIG. 14, for the 64/66 bit stream, the user service starts with the start block/S/flag, the end block/T/flag ends, and the middle D is a pure data block, as shown in FIG. As shown in Fig. 1, the seventh line corresponds to the pattern definition of the start block, and S0 represents the start byte. Specifically, as shown in Fig. 16, lines 9-16 correspond to the pattern definitions of the eight end blocks, respectively, and T0-T7 represents the end. The byte, as shown in FIG. 17, is exemplified by including T0 in the end block, and the detected segment is a byte from S0 to T0.
步骤1310:第一设备根据被检测区段计算第一校验结果。Step 1310: The first device calculates a first verification result according to the detected segment.
第一设备在计算第一校验结果时采用的算法可以为CRC-x或BIP-x,第一校验结果记为的结果于B,B可以是一个或多个字节。The algorithm used by the first device in calculating the first check result may be CRC-x or BIP-x, and the result of the first check result is recorded as B, and B may be one or more bytes.
步骤1320:第一设备发送第一校验结果和比特块流。Step 1320: The first device sends the first check result and the bit block stream.
针对步骤1320,第一设备发送第一校验结果和比特块流具体可能包括以下两种可能的实现方式:For the step 1320, the sending, by the first device, the first check result and the bit block stream may specifically include the following two possible implementation manners:
第一种可能的实现方式:第一设备发送第一校验结果和比特块流至第二设备。The first possible implementation manner: the first device sends the first check result and the bit block stream to the second device.
第二种可能的实现方式:第一设备发送第一校验结果至第三设备,发送比特块流至第二设备。A second possible implementation manner is: the first device sends the first verification result to the third device, and sends the bit block flow to the second device.
须知,这里的第一设备为比特块发送端,第二设备为比特块接收端,第三设备为SDN控制器,或者具有判断比特流传输误码功能的任一设备。It should be noted that the first device here is a bit block transmitting end, the second device is a bit block receiving end, the third device is an SDN controller, or has any device for determining a bit stream transmission error function.
在一种可能的实现方式中,在第一设备将第一校验结果和比特块流发送至第二设备之前,第一设备需要将计算获得的第一校验结果存储起来,包括以下两种可能的存储方式:In a possible implementation manner, before the first device sends the first verification result and the bit block stream to the second device, the first device needs to store the first verification result obtained by the calculation, including the following two types. Possible storage methods:
第一种存储方式:第一设备将第一校验结果存储于结束块,获得更新后的结束块。The first storage mode: the first device stores the first verification result in the end block, and obtains the updated end block.
如图18所示,第一设备将第一校验结果存储于结束块,具体包括以下两种场景:As shown in FIG. 18, the first device stores the first check result in the end block, and specifically includes the following two scenarios:
场景1:当第一校验结果占用的字节数大于等于目标字节数时,第一设备将第一校验结果存储于结束块中的结束字节之前,并根据第一校验结果占用的字节数将结束字节移至结束块后的一个新增块,删除比特块流中的任一第一比特块,将结束字节移动后所在的新增块作为更新后的结束块。其中,目标字节数为结束块中位于结束字节后的字节数加1。Scenario 1: When the number of bytes occupied by the first check result is greater than or equal to the target number of bytes, the first device stores the first check result before the end byte in the end block, and occupies according to the first check result. The number of bytes moves the end byte to a new block after the end block, deletes any first bit block in the bit block stream, and adds the new block where the end byte is moved as the updated end block. The target number of bytes is the number of bytes in the end block after the end byte plus one.
场景2:当第一校验结果占用的字节数小于目标字节数时,第一设备将第一校验结果存储于结束块中的结束字节之前,并根据第一校验结果占用的字节数将结束字节后移第一校验结果占用的字节数,将结束字节移动后所在的比特块作为更新后的结束块。其中,目标字节数为结束块中位于结束字节后的字节数加1。Scenario 2: When the number of bytes occupied by the first check result is less than the target number of bytes, the first device stores the first check result before the end byte in the end block, and is occupied according to the first check result. The number of bytes will end the byte and the number of bytes occupied by the first check result, and the bit block where the end byte is moved is used as the updated end block. The target number of bytes is the number of bytes in the end block after the end byte plus one.
作为一个可选的实施例,如图19所示,当第一设备采用CRC-8或BIP-8计算第一校 验结果B时,B只占用1个BYTE。As an optional embodiment, as shown in FIG. 19, when the first device calculates the first calibration result B by using CRC-8 or BIP-8, B occupies only one BYTE.
当结束块未插入B时,如果结束块为D0 D1 D2 D3 D4 D5 D6 T7,则目标字节数为1,插入B后,则更新为D0 D1 D2 D3 D4 D5 D6 B,然后再增加一个Block,更新后的结束块为T0 C1 C2 C3 C4 C5 C6 C7。When the end block is not inserted B, if the end block is D0 D1 D2 D3 D4 D5 D6 T7, the target number of bytes is 1, after inserting B, it is updated to D0 D1 D2 D3 D4 D5 D6 B, and then add a block. The updated end block is T0 C1 C2 C3 C4 C5 C6 C7.
当结束块未插入B时,如果结束块为T0 C1 C2 C3 C4 C5 C6 C7,则目标字节数为8,插入B后,则更新后的结束块为B T1 C1 C2 C3 C4 C5 C6。同理,结束块未插入B时,如果结束块包括的结束字节分别为T1-T6时,插入B后,对应更新为T2-T7。When the end block is not inserted B, if the end block is T0 C1 C2 C3 C4 C5 C6 C7, the target number of bytes is 8, and after inserting B, the updated end block is B T1 C1 C2 C3 C4 C5 C6. Similarly, when the end block is not inserted B, if the end byte included in the end block is T1-T6, after inserting B, the corresponding update is T2-T7.
第二种存储方式:第一设备将第一校验结果存储于校验结果存储块,并删除比特块流中的任一第一比特块,其中,校验结果存储块是指位于结束块之前的一个新增块,第一比特块是指在比特块流的传输过程中可能插入比特块流或从比特块流中删除的比特块。The second storage mode: the first device stores the first check result in the check result storage block, and deletes any first bit block in the bit block stream, where the check result storage block refers to before the end block A new block, the first bit block refers to a bit block that may be inserted into or deleted from the bit block stream during the transmission of the bit block stream.
例如,在结束块之前,紧挨结束块,为存储采用CRC-x或BIP-x计算的第一校验结果B单独分配一个数据块,类型为D0 D1 D2 D3 D4 D5 D6 D7,对应图1中第一行对应的码型定义。D0-D7用于存储计算结果B,在插入B的同时,为了减小对用户带宽的影响,删除/T/Block之后的一个IDLE Block(/I/标识的块)。如图20所示,B单独占用一个Block,/T/之后的IDLE Block被删除1个。For example, before ending the block, next to the end block, a data block is separately allocated for storing the first verification result B calculated by using CRC-x or BIP-x, and the type is D0 D1 D2 D3 D4 D5 D6 D7, corresponding to FIG. 1 The pattern definition corresponding to the first line in the middle. D0-D7 is used to store the calculation result B. At the same time as inserting B, in order to reduce the influence on the user bandwidth, an IDLE Block (/I/identified block) after /T/Block is deleted. As shown in FIG. 20, B occupies one block separately, and the IDLE block after /T/ is deleted one.
参阅图21所示,本申请实施例提出一种比特块流误码检测方法,以解决在M/N Bit block交换的场景中的误码检测方法实现难度较大且承载效率较低的问题。该方法,包括:Referring to FIG. 21, the embodiment of the present application provides a bit block stream error detection method to solve the problem that the error detection method in the M/N Bit block exchange scenario is difficult to implement and has low bearer efficiency. The method comprises:
步骤2100:第二设备根据比特块流中起始块中的起始字节和与起始块对应的结束块中的结束字节确定被检测区段。Step 2100: The second device determines the detected segment according to the start byte in the start block in the bit block stream and the end byte in the end block corresponding to the start block.
针对步骤2100,第二设备根据比特块流中起始块中的起始字节和与起始块对应的结束块中的结束字节确定被检测区段包括以下三种具体情况:For step 2100, the second device determines, according to the start byte in the start block in the bit block stream and the end byte in the end block corresponding to the start block, that the detected segment includes the following three specific cases:
情况1:当第二设备接收到第一校验结果,且第一校验结果存储于结束块时,第二设备将第二校验结果从结束块中删除,获得更新后的结束块,将起始块中的起始字节和更新后的结束块中的结束字节之间的字节作为被检测区段。Case 1: When the second device receives the first verification result, and the first verification result is stored in the end block, the second device deletes the second verification result from the end block, and obtains the updated end block, and The byte between the start byte in the start block and the end byte in the updated end block is taken as the detected segment.
情况2:当第二设备接收到第一校验结果,且第一校验结果存储于校验结果存储块时,第二设备将校验结果存储块从比特块流中删除,获得更新后的比特块流,将更新后的比特块流中起始块中的起始字节和结束块中的结束字节之间的字节作为被检测区段,其中,校验结果存储块位于结束块之前。Case 2: When the second device receives the first verification result, and the first verification result is stored in the verification result storage block, the second device deletes the verification result storage block from the bit block stream, and obtains the updated a bit block stream, the byte between the start byte in the start block and the end byte in the end block in the updated bit block stream is used as the detected segment, wherein the check result storage block is located at the end block prior to.
上述两种情况中,起始块中的起始字节和结束块中的结束字节之间的字节中包括第一校验结果,因此,需要首先将第一校验结果删除,将剩余的部分作为被检测区段。In the above two cases, the first check result is included in the byte between the start byte in the start block and the end byte in the end block. Therefore, the first check result needs to be deleted first, and the remaining The part is taken as the detected section.
情况3:当第二设备未接收到第一校验结果时,第二设备将比特块流中起始块中的起始字节和结束块中的结束字节之间的字节作为被检测区段。Case 3: When the second device does not receive the first check result, the second device detects the byte between the start byte in the start block and the end byte in the end block in the bit block stream as the detected Section.
此时,起始块中的起始字节和结束块中的结束字节之间的字节不包括第一校验结果,可以直接作为被检测区段。At this time, the byte between the start byte in the start block and the end byte in the end block does not include the first check result, and can be directly used as the detected segment.
具体的,在一种可能的实现方式中,当第二设备未接收到第一校验结果时,第二设备将第二校验结果发送至第三设备,第三设备存储有第一校验结果。第三设备为SDN控制器,或者具有判断比特流传输误码功能的任一设备。Specifically, in a possible implementation manner, when the second device does not receive the first verification result, the second device sends the second verification result to the third device, where the third device stores the first verification. result. The third device is an SDN controller or any device having a function of determining a bit stream transmission error.
步骤2110:第二设备根据被检测区段计算第二校验结果。Step 2110: The second device calculates a second verification result according to the detected segment.
同理,第二设备在计算第二校验结果时采用的算法与第一设备计算第一校验结果时采用的算法相同。Similarly, the algorithm used by the second device in calculating the second verification result is the same as the algorithm used when the first device calculates the first verification result.
步骤2120:当第二设备接收到第一校验结果时,第二设备根据第一校验结果与第二校验结果,确定被检测区段是否存在误码。Step 2120: When the second device receives the first verification result, the second device determines, according to the first verification result and the second verification result, whether the detected segment has an error.
具体的,第二设备若确定第一校验结果与第二校验结果相同,则确定被检测区段不存在误码,若确定第一校验结果与第二校验结果不同,则确定被检测区段存在误码。Specifically, if the second device determines that the first verification result is the same as the second verification result, determining that the detected segment does not have an error, and if it is determined that the first verification result is different from the second verification result, determining that the second verification result is different from the second verification result There is a bit error in the detection section.
进一步地,第二设备将第一校验结果从结束块中删除,获得更新后的结束块,具体包括以下两种场景:Further, the second device deletes the first check result from the end block, and obtains the updated end block, which specifically includes the following two scenarios:
场景1:当第一校验结果占用的字节数大于等于目标字节数时,第二设备根据第一校验结果占用的字节数将结束字节移至结束块前的一个比特块,在比特块流中新增一个第一比特块,将结束字节移动后所在的比特块作为更新后的结束块。其中,目标字节数为结束块中位于结束字节前的字节数加1。Scenario 1: When the number of bytes occupied by the first check result is greater than or equal to the target number of bytes, the second device moves the end byte to a bit block before the end block according to the number of bytes occupied by the first check result. A first bit block is added to the bit block stream, and the bit block in which the end byte is moved is used as the updated end block. The target number of bytes is the number of bytes in the end block before the end byte plus one.
场景2:当第一校验结果占用的字节数小于目标字节数时,第一设备根据第一校验结果占用的字节数将结束字节前移第一校验结果占用的字节数,将结束字节移动后所在的比特块作为更新后的结束块。其中,目标字节数为结束块中位于结束字节前的字节数加1。Scenario 2: When the number of bytes occupied by the first check result is less than the target number of bytes, the first device advances the end byte by the number of bytes occupied by the first check result and advances the byte occupied by the first check result. The number is the bit block in which the end byte is moved as the updated end block. The target number of bytes is the number of bytes in the end block before the end byte plus one.
如图22所示,当第一设备采用CRC-8或BIP-8计算第一校验结果B时,B只占用1个BYTE。As shown in FIG. 22, when the first device calculates the first verification result B by using CRC-8 or BIP-8, B occupies only one BYTE.
当结束块为B T1 C1 C2 C3 C4 C5 C6时,则目标字节数为2,删除B后,则更新后的结束块为T0 C1 C2 C3 C4 C5 C6 C7。同理,如果结束块包括的结束字节分别为T2-T7,删除B后,则对应更新为T1-T6。When the end block is B T1 C1 C2 C3 C4 C5 C6, the target number of bytes is 2, and after B is deleted, the updated end block is T0 C1 C2 C3 C4 C5 C6 C7. Similarly, if the end byte included in the end block is T2-T7, and B is deleted, the corresponding update is T1-T6.
当结束块为T0 C1 C2 C3 C4 C5 C6 C7,则紧挨结束块之前的数据块为D0 D1 D2 D3 D4 D5 D6 B,目标字节数为1,删除B后,则更新后的结束块为D0 D1 D2 D3 D4 D5 D6 T7。When the end block is T0 C1 C2 C3 C4 C5 C6 C7, the data block immediately before the end block is D0 D1 D2 D3 D4 D5 D6 B, the target number of bytes is 1, and after deleting B, the updated end block is D0 D1 D2 D3 D4 D5 D6 T7.
此外,当第二设备接收到第一校验结果,且第一校验结果存储于校验结果存储块时,第二设备将校验结果存储块从比特块流中删除,获得更新后的比特块流,其中,校验结果存储块位于结束块之前。同时,为了减小对用户带宽的影响,需要在结束块之后增加一个第一比特块。In addition, when the second device receives the first check result, and the first check result is stored in the check result storage block, the second device deletes the check result storage block from the bit block stream, and obtains the updated bit. A block stream in which the check result storage block is located before the end block. At the same time, in order to reduce the impact on the user bandwidth, it is necessary to add a first bit block after the end block.
采用本申请实施例提供的方法可以完整实施M/N Bit Block网络路径的错误或误码检测,对用户业务影响小,与SDH/OTN接近,优于已有分组的检测方式,实施流程简洁、易实施。The error or error detection of the M/N Bit Block network path can be completely implemented by using the method provided in the embodiment of the present application, which has little impact on the user service, is close to the SDH/OTN, and is superior to the detection mode of the existing packet, and the implementation process is simple. Easy to implement.
本申请实施例提出一种新的传递M1/M2比特块流的设备,该设备中新增一个误码检测单元又称比特误码率(Bit error ratio,BER)单元,简称BER。该单元用于计算校验结果以及误码检测。The device of the present application proposes a new device for transmitting an M1/M2 bit block stream. A bit error detection unit is also called a bit error ratio (BER) unit, which is referred to as BER. This unit is used to calculate the check result and error detection.
PE设备包括uAdpt、L1.5Switch、nAdpt和BER,其一端与用户设备连接,接口为UNI,另一端与网络设备连接,接口为NNI,P设备包括uAdpt、L1.5Switch、nAdpt和BER,两端均与网络设备连接,接口为NNI,如图23(a)和图23(b)所示。The PE device includes uAdpt, L1.5Switch, nAdpt, and BER. One end is connected to the user equipment, the interface is UNI, and the other end is connected to the network device. The interface is NNI. The P device includes uAdpt, L1.5Switch, nAdpt, and BER. Both are connected to the network device, and the interface is NNI, as shown in Figure 23(a) and Figure 23(b).
本申请实施例还提出一种分组承载产品,例如规划加载X-E特性的IPRAN、PTN设备。参阅图24所示,本申请提供的一种分组承载产品,这里的接口板可以为盒式设备的接口卡或框式设备的线卡的接口芯片。The embodiment of the present application further provides a packet bearer product, such as an IPRAN and PTN device that plans to load X-E features. Referring to FIG. 24, the present application provides a packet bearer product, where the interface board can be an interface card of a box device or an interface chip of a line card of a box device.
或者,本申请实施例还提出一种分组承载产品,参阅图25所示,本申请提供一种新型芯片,比如SDxxxx,将BER内置于芯片中;或者在现有接口芯片,比如SDyyyy与主控交换板之间,增加一块现场可编程门阵列(Field-Programmable Gate Array,FPGA)或网络处理器(Network Processor,NP),通过FPGA或NP实施BER的功能。Alternatively, the embodiment of the present application further provides a packet bearer product. Referring to FIG. 25, the present application provides a new type of chip, such as SDxxxx, which is built into the chip, or in an existing interface chip, such as SDyyyy and the host. Between the switch boards, a Field-Programmable Gate Array (FPGA) or Network Processor (NP) is added to implement the BER function through the FPGA or NP.
下面结合附图对本申请实施例进行说明。The embodiments of the present application are described below with reference to the accompanying drawings.
作为一个可选的实施例,参阅图26所示,被校验的比特块流的路径为端到端的路径。As an alternative embodiment, referring to Figure 26, the path of the checked bit block stream is an end-to-end path.
实施例1:以用户侧接口(UNI)为1GE,网络侧接口(NNI)为100GE,三端X-E设备XE1、XE2、XE3,L1.5Switch交换的粒度以及网络侧信号流为64/66Bit Block流,在XE1的用户侧,每隔1024个Block插入一个8BIP-8校验结果为例,说明图26所示的实施例。Embodiment 1: The user side interface (UNI) is 1GE, the network side interface (NNI) is 100GE, the granularity of the three-end XE equipment XE1, XE2, XE3, L1.5Switch exchange and the network side signal flow is 64/66 Bit Block flow. On the user side of XE1, an 8BIP-8 check result is inserted every 1024 blocks as an example to illustrate the embodiment shown in FIG.
STEP 1:1GE用户信号从UNI侧进入XE1设备,uAdpt将8/10BitBlock转码为64/66 Bit Block,即依次将8个去掉2Bit同步头的1GE用户信号组装为1个64Bit串,然后再增加2Bit同步头形成1个64/66Bit block,按此方法最终形成一个64/66Bit Block流。BER对从uAdpt侧来的比特块流中的Block进行记数,在第1个比特块之前插入一个第一边界比特块,并采用8BIP-8算法计算第一校验结果集合,当Block数目达到1024之后,作为第一组Block,将第一校验结果集合存储于一个4B和06标识的比特块中并插入到第1024个比特块之后,作为第二边界比特块。同时,删除比特块流中的一个IDLE Block。经BER处理后的比特块流进入L1.5Switch,然后进入nAdpt发送到网络侧。The STEP 1:1GE user signal enters the XE1 device from the UNI side. uAdpt transcodes the 8/10BitBlock to 64/66 Bit Block, which in turn combines the 8GE user signals of the 2Bit sync header into one 64Bit string, and then adds The 2Bit sync header forms a 64/66 Bit block, and in this way, a 64/66 Bit Block stream is finally formed. The BER counts the block in the bit block stream from the uAdpt side, inserts a first boundary bit block before the first bit block, and calculates the first check result set by using the 8BIP-8 algorithm, when the number of blocks reaches After 1024, as the first group of blocks, the first set of check results is stored in a bit block identified by 4B and 06 and inserted after the 1024th bit block as a second boundary bit block. At the same time, an IDLE Block in the bit block stream is deleted. The BER-processed bit block stream enters the L1.5Switch and then enters nAdpt to be sent to the network side.
须知,BER继续对Block记数,并采用8BIP-8算法计算第二组Block的第一校验结果集合,与第一组Block的处理方法相同,然后将第二组Block的第一校验结果集合存储于一个4B和06标识的比特块中并插入到第2048个比特块之后,作为第三边界比特块。BER重复上述过程直至比特块流结束。It should be noted that the BER continues to count the Block, and uses the 8BIP-8 algorithm to calculate the first set of check results of the second set of blocks, which is the same as the processing method of the first set of Blocks, and then the first check result of the second set of Blocks. The set is stored in a bit block identified by 4B and 06 and inserted after the 2048th bit block as a third boundary bit block. The BER repeats the above process until the end of the bit block stream.
STEP 2:X1发出的比特块流传递至XE2的nAdpt,接收时钟频率比XE1系统时钟慢,X2的nAdpt在发往L1.5Switch时需要插入一个或几个IDLE Block,以容忍因时钟频率不同步而引起的传送速度问题,然后传递至网络侧XE3的方向。STEP 2: The bit block stream sent by X1 is passed to nAdpt of XE2. The receiving clock frequency is slower than the XE1 system clock. The nAdpt of X2 needs to insert one or several IDLE blocks when sending to L1.5Switch to tolerate the clock frequency being out of sync. The resulting transmission speed problem is then passed to the direction of the network side XE3.
STEP 3:X2发出的比特块流传递至XE3,经nAdpt、L1.5Switch,到达UNI侧BER单元;BER当接收到第一边界比特块时,开始对后续接收到的比特块流进行8BIP-8奇偶校验计算,当收到XE1插入的第二边界比特块时,BER停止计算,将第一边界比特块与第二边界比特块之间的比特块作为第一组Block。BER将当前计算获得的第二校验结果集合与第二边界比特块中存储的第一校验结果集合比较,一致则无误码,不一致则统计误码个数并存储。同时,从比特块流中删除第二边界比特块,并插入一个IDLE Block。经BER处理后的比特块流到uAdpt后,去掉2个同步头Bit,将64个Bit分为8个8Bit组,各增加2Bit同步头,并按顺序发送至UNI链路。STEP 3: The bit block stream sent by X2 is transmitted to XE3, and reaches the BER unit of the UNI side through nAdpt and L1.5Switch; when receiving the first boundary bit block, the BER starts to perform 8BIP-8 on the subsequently received bit block stream. In the parity calculation, when the second boundary bit block inserted by XE1 is received, the BER stops calculating, and the bit block between the first boundary bit block and the second boundary bit block is used as the first group block. The BER compares the second check result set obtained by the current calculation with the first check result set stored in the second boundary bit block, and if there is no difference, there is no error code. If the BER is inconsistent, the number of error codes is counted and stored. At the same time, the second boundary bit block is deleted from the bit block stream and an IDLE Block is inserted. After the BER-processed bit block flows to uAdpt, the two sync headers are removed, and 64 bits are divided into eight 8-bit groups, each of which adds a 2Bit sync header and is sequentially sent to the UNI link.
须知,BER继续对Block记数,并采用8BIP-8算法计算第二组Block的第二校验结果集合,第二组Block为第二边界比特块与第三边界比特块之间的比特块,当收到XE1插入的第三边界比特块时,BER停止计算,与第一组Block的处理方法相同,BER将当前计算第二组Block的第二校验结果集合与第三边界比特块中存储的第二组Block的第一校验结果集合比较,一致则无误码,不一致则统计误码个数并存储。BER重复上述过程直至比特块流结束。It should be noted that the BER continues to count the Block, and uses the 8BIP-8 algorithm to calculate a second set of check results for the second set of blocks, and the second set of blocks is a block of bits between the second boundary block and the third boundary block. When the third boundary bit block inserted by XE1 is received, the BER stops calculating. As with the processing method of the first group of blocks, the BER stores the second check result set of the second group of blocks and the third boundary bit block. The first set of check results of the second group of blocks is compared, and if there is no error, the number of errors is counted and stored. The BER repeats the above process until the end of the bit block stream.
因此,用户信号进入XE1经过XE2传递,从XE3流出网络,在整个端到端路径上完整地实施了xBIP-y误码检测,实施方式简洁。承载xBIP-y结果的Block通过增删IDLE Block补偿,对用户业务无影响,承载效率100%。传递过程中经过异步节点,存在IDLE Block插入或删除的情况,xBIP-y算法容忍了这种场景,且保证了校验结果准确有效。Therefore, the user signal enters XE1 and passes through XE2, and flows out of the network from XE3. The xBIP-y error detection is completely implemented on the entire end-to-end path, and the implementation manner is simple. The block carrying the xBIP-y result has no impact on the user service by adding or deleting IDLE Block compensation, and the bearer efficiency is 100%. During the transmission process, the asynchronous node has an IDLE Block insertion or deletion. The xBIP-y algorithm tolerates this scenario and ensures that the verification result is accurate and effective.
此外,上述提到的8BIP-8算法可以计算替换为flexBIP-z算法。In addition, the 8BIP-8 algorithm mentioned above can be calculated and replaced with the flexBIP-z algorithm.
xBIP-y算法,flexBIP-y算法明显优于ETHERNET、SDH、OTN的占用固定字节的静态 刚性方式,以第一比特块补偿,对用户信号无影响,而现有ETHERNET、SDH、OTN的误码或错误检测占用固定字节,占用用户带宽。作为一个可选的实施例,参阅图27(a)和图27(b)所示,被校验的比特块流的路径为非端到端的路径。The xBIP-y algorithm, flexBIP-y algorithm is obviously superior to the static rigid mode of ETHERNET, SDH and OTN occupying fixed bytes. It compensates with the first bit block and has no influence on the user signal, but the existing ETHERNET, SDH and OTN errors. Code or error detection occupies a fixed byte and occupies user bandwidth. As an alternative embodiment, referring to Figures 27(a) and 27(b), the path of the checked bit block stream is a non-end-to-end path.
需要注意的是,图27(a)所示的路径的开始端执行计算第一校验结果集合插入第二边界比特块的单元为nAdpt单元侧的BER,该段路径的结束端执行计算第二校验结果集合删除第二边界比特块的单元为nAdpt单元侧的BER;It should be noted that the start end of the path shown in FIG. 27( a ) performs calculation of the first check result set, and the unit inserted into the second boundary bit block is the BER of the nAdpt unit side, and the end of the path performs the calculation second. The check result set deletes the unit of the second boundary bit block as the BER of the nAdpt unit side;
此外,图27(a)所示的路径中没有用户信号插入和提取,即不需要两端的uAdpt执行相关操作。In addition, there is no user signal insertion and extraction in the path shown in FIG. 27(a), that is, uAdpt at both ends is not required to perform related operations.
图27(b)所示的路径的开始端执行计算第一校验结果集合插入第二边界比特块的单元为uAdpt单元侧的BER,该段路径的结束端执行计算第二校验结果集合删除第二边界比特块的单元为nAdpt单元侧的BER;The start end of the path shown in FIG. 27(b) performs calculation of the first check result set. The unit inserted into the second boundary bit block is the BER of the uAdpt unit side, and the end end of the path performs calculation to delete the second check result set. The unit of the second boundary bit block is the BER of the nAdpt unit side;
此外,图27(b)所示的路径中比特块流没有流至结束端的L1.5Switch元及uAdpt单元。Further, the bit block stream in the path shown in FIG. 27(b) does not flow to the L1.5Switch element and the uAdpt unit at the end.
实施例2:以用户侧接口(UNI)为1GE,网络侧接口(NNI)为100GE,三端X-E设备XE1、XE2、XE3,L1.5Switch交换的粒度以及网络侧信号流为64/66Bit Block流,在XE1的用户侧,在结束块内插入一个BIP-8结果B1为例,说明图26所示的实施例。Embodiment 2: The user side interface (UNI) is 1GE, the network side interface (NNI) is 100GE, the granularity of the three-end XE equipment XE1, XE2, XE3, L1.5Switch exchange and the network side signal flow is 64/66 Bit Block flow. In the user side of XE1, a BIP-8 result B1 is inserted into the end block as an example, and the embodiment shown in FIG. 26 is explained.
STEP 1:1GE用户信号从UNI侧进入XE1设备,uAdpt将8/10BitBlock转码为64/66 Bit Block,即依次将8个去掉2Bit同步头的1GE用户信号组装为1个64Bit串,然后再增加2Bit同步头形成1个64/66Bit block,按此方法最终形成一个64/66Bit Block流。BER对从uAdpt侧来的比特块流进行识别,从收到有开始块/S/标识Block开始进行BIP-8计算,收到有结束块/T/标识的Block停止计算,并将结果B1插入到/T/之前,同时修改/T/码型,经BER处理后的比特块流进入L1.5Switch,然后进入nAdpt发送到网络侧。The STEP 1:1GE user signal enters the XE1 device from the UNI side. uAdpt transcodes the 8/10BitBlock to 64/66 Bit Block, which in turn combines the 8GE user signals of the 2Bit sync header into one 64Bit string, and then adds The 2Bit sync header forms a 64/66 Bit block, and in this way, a 64/66 Bit Block stream is finally formed. The BER identifies the bit block stream from the uAdpt side, starts the BIP-8 calculation from the receipt of the start block /S/identity block, receives the Block stop calculation with the end block /T/identification, and inserts the result B1. Before /T/, the /T/pattern is modified at the same time, and the bit block stream processed by the BER enters the L1.5Switch, and then enters nAdpt and is sent to the network side.
须知,BER对从uAdpt侧来的比特块流继续识别,重复上述过程,直至比特块流结束。It should be noted that the BER continues to identify the bit block stream from the uAdpt side, repeating the above process until the end of the bit block stream.
STEP 2:X1发出的比特块流传递至XE2的nAdpt,接收时钟频率比XE1系统时钟块,X2的nAdpt在发往L1.5Switch时需要删除一个或几个IDLE Block,以容忍因时钟频率不同步而引起的传送速度问题,然后传递至网络侧XE3的方向。STEP 2: The bit block stream sent by X1 is passed to nAdpt of XE2. The receiving clock frequency is higher than the XE1 system clock block. The nAdpt of X2 needs to delete one or several IDLE blocks when sending to L1.5Switch to tolerate the clock frequency being out of sync. The resulting transmission speed problem is then passed to the direction of the network side XE3.
STEP 3:X2发出的比特块流传递至XE3,经nAdpt、L1.5Switch,到达UNI侧BER单元;BER对从比特块流进行识别,从收到有开始块/S/标识Block开始进行BIP-8计算,收到有结束块/T/标识的Block,在结束块中的结果B1前停止计算,删除结果B1,同时修改/T/码型。BER将当前计算获得的结果B2与结果B1比较,一致则无误码,不一致则统计误码个数并存储。经BER处理后的比特块流到uAdpt后,去掉2个同步头Bit,将64个Bit分为8个8Bit组,各增加2Bit同步头,并按顺序发送至UNI链路。STEP 3: The bit block stream sent by X2 is passed to XE3, and reaches the UNI side BER unit via nAdpt and L1.5Switch; the BER recognizes the bit block stream, and starts BIP- from the start block/S/flag block. 8 Calculate, receive the Block with the end block /T / flag, stop the calculation before ending the result B1 in the block, delete the result B1, and modify the /T / pattern. The BER compares the result B2 obtained by the current calculation with the result B1, and if there is no error, the error is counted and stored. After the BER-processed bit block flows to uAdpt, the two sync headers are removed, and 64 bits are divided into eight 8-bit groups, each of which adds a 2Bit sync header and is sequentially sent to the UNI link.
此外,上述提到的BIP-8算法可以计算替换为CRC-8算法。In addition, the BIP-8 algorithm mentioned above can be calculated and replaced with the CRC-8 algorithm.
因此,用户信号进入XE1经过XE2传递,从XE3流出网络,在整个端到端路径上完整地实施了CRC或BIP误码检测,实施方式简洁;承载效率比现有Ethernet有提升,与SDH和OTN接近,但与图26所示的实施例1有一定差距;Therefore, the user signal enters XE1 and passes through XE2, and flows out of the network from XE3. The CRC or BIP error detection is completely implemented on the entire end-to-end path. The implementation is simple; the bearer efficiency is improved compared with the existing Ethernet, and SDH and OTN are improved. Close, but there is a certain gap with the embodiment 1 shown in FIG. 26;
此外,若在STEP 1中,BER将结果B1插入到/T/Block之前的独立的Block,同时通过删除/T/Block之后的IDLE Block,并在STEP 3中,删除该独立的Block,并在/T/Block之后增加IDLE Block来补偿,对用户业务无影响,承载效率100%。In addition, in STEP 1, the BER inserts the result B1 into a separate block before /T/Block, while deleting the IDLE Block after /T/Block, and in STEP 3, deleting the independent block, and /T/Block adds IDLE Block to compensate, has no impact on user services, and bears 100% efficiency.
本申请实施例提供的比特块流误码检测方法是针对比特块流传递路径的一种检测方 式,不局限于电信有线承载,完全可以用到无线通讯、工业或行业通讯网络。The bit block stream error detection method provided by the embodiment of the present application is a detection mode for the bit block stream transmission path, and is not limited to the telecommunication cable bearer, and can be completely used in a wireless communication, industrial or industrial communication network.
基于同一构思,本申请还提供了一种比特块流误码检测设备,该设备可以用于执行上述图6中对应的方法实施例,因此本申请实施例提供的比特块流误码检测设备的实施方式可以参见该方法的实施方式,重复之处不再赘述。Based on the same concept, the present application further provides a bit block stream error detecting device, which can be used to perform the corresponding method embodiment in FIG. 6 , and thus the bit block stream error detecting device provided by the embodiment of the present application For the implementation manner, reference may be made to the implementation manner of the method, and the repeated description is not repeated.
参阅图28所示,本申请实施例提供一种比特块流误码检测设备2800,包括:收发器2801和处理器2802;As shown in FIG. 28, the embodiment of the present application provides a bit block stream error detecting device 2800, including: a transceiver 2801 and a processor 2802;
收发器2801,用于发送第一边界比特块,所述第一边界比特块用于区别后续发送的N个比特块,N为正整数;依次发送第I比特块,I为大于等于1小于等于N的整数;The transceiver 2801 is configured to send a first boundary bit block, where the first boundary bit block is used to distinguish the N bit blocks that are subsequently sent, and N is a positive integer; the first bit block is sequentially sent, and I is greater than or equal to 1 and less than or equal to An integer of N;
处理器2802,用于确定第一奇偶校验结果和第二奇偶校验结果,所述第一奇偶校验结果的校验对象包括所述N个比特块中每个比特块的连续的m个比特,所述第二奇偶校验结果的校验对象包括所述N个比特块中每个比特块的连续的n个比特,m、n中的至少一个大于等于2;The processor 2802 is configured to determine a first parity result and a second parity result, where the check object of the first parity result includes consecutive m pieces of each of the N bit blocks a bit, the check object of the second parity result includes consecutive n bits of each of the N bit blocks, at least one of m, n being greater than or equal to 2;
所述收发器2801,还用于发送第二边界比特块、所述第一奇偶校验结果和所述第二奇偶校验结果,所述第二边界比特块用于区别已经发送完成的所述N个比特块。The transceiver 2801 is further configured to send a second boundary bit block, the first parity result, and the second parity result, where the second boundary bit block is used to distinguish the that has been sent N bit blocks.
在一种可能的设计中,每个比特块的类型为M1/M2比特块,其中,M1表示每个比特块中的净荷比特数,M2表示每个比特块的总比特数,M2-M1表示每个比特块中的首部同步头比特数,M1、M2为正整数,M2>M1。In one possible design, the type of each bit block is an M1/M2 bit block, where M1 represents the number of payload bits in each bit block, and M2 represents the total number of bits per bit block, M2-M1 Represents the number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
在一种可能的设计中,所述收发器2801,用于:In one possible design, the transceiver 2801 is configured to:
发送第一边界比特块至第一设备;Transmitting a first boundary bit block to the first device;
依次发送第I比特块至所述第一设备;Transmitting the first bit block to the first device in sequence;
发送第二边界比特块、所述第一奇偶校验结果和所述第二奇偶校验结果至所述第一设备;Transmitting a second boundary bit block, the first parity result, and the second parity result to the first device;
或者,发送第二边界比特块至所述第一设备,发送所述第一奇偶校验结果和所述第二奇偶校验结果至第二设备。Or sending a second boundary bit block to the first device, and sending the first parity result and the second parity result to the second device.
在一种可能的设计中,所述收发器2801,用于:In one possible design, the transceiver 2801 is configured to:
在第一时刻发送第二边界比特块,在第二时刻发送第一奇偶校验结果和第二奇偶校验结果,其中,所述第一时刻早于所述第二时刻,或所述第一时刻晚于所述第二时刻,所述第一时刻等于所述第二时刻。Transmitting a second boundary bit block at a first time, and transmitting a first parity result and a second parity result at a second time, wherein the first time is earlier than the second time, or the first The time is later than the second time, the first time is equal to the second time.
在一种可能的设计中,所述第一奇偶校验结果和所述第二奇偶校验结果存储于所述第二边界比特块中。In one possible design, the first parity result and the second parity result are stored in the second boundary bit block.
在一种可能的设计中,所述第一奇偶校验结果和所述第二奇偶校验结果是根据预设校验算法计算得到的,所述预设校验算法用于当所述N个比特块中增加或减少第一比特块时不改变所述第一奇偶校验结果和所述第二奇偶校验结果,所述第一比特块是指在所述N个比特块的传输过程中可能插入所述N个比特块或从所述N个比特块中删除的比特块。In a possible design, the first parity result and the second parity result are calculated according to a preset check algorithm, where the preset check algorithm is used when the N The first parity block and the second parity result are not changed when the first bit block is added or decreased in the bit block, and the first bit block refers to the transmission process of the N bit blocks It is possible to insert the N bit blocks or the bit blocks deleted from the N bit blocks.
在一种可能的设计中,所述预设校验算法为xBIP-y算法,其中,x是指连续比特交织的比特数,x是根据所述第一比特块的码型定义确定的,y是指监视区段的个数,x,y为正整数,y≥2;In a possible design, the preset check algorithm is an xBIP-y algorithm, where x is the number of bits of consecutive bit interleaving, and x is determined according to the definition of the pattern of the first bit block, y Refers to the number of monitored segments, x, y is a positive integer, y ≥ 2;
所述处理器2802,用于从所述N个比特块中的第1净荷比特开始,将每个比特块的每x个连续比特依次记录至第1个监视区段至第y个监视区段;The processor 2802 is configured to record, from the first payload bit of the N bit blocks, each x consecutive bits of each bit block to the first monitoring segment to the yth monitoring region. segment;
针对每个监视区段采用奇校验或偶校验确定1比特监视码,获得y比特监视码,所述 y比特监视码中包括所述第一奇偶校验结果和所述第二奇偶校验结果。Determining a 1-bit monitoring code by using an odd or even parity for each monitoring section, obtaining a y-bit monitoring code, the y-bit monitoring code including the first parity result and the second parity result.
在一种可能的设计中,所述预设校验算法为flexBIP-z算法,其中,z是指监视区段的个数,每个监视区段对应的连续比特交织的比特数不全相同,z个监视区段分别对应的连续比特交织的比特数为A1、A2、A 3……Az-1,Az,A1、A2、A 3……Az-1,Az,z为正整数,z≥2;In a possible design, the preset check algorithm is a flexBIP-z algorithm, where z is the number of monitored segments, and the number of consecutive bit interleaving bits corresponding to each monitoring segment is not the same, z The number of bits of consecutive bit interleaving corresponding to each monitoring section is A1, A2, A 3 ... Az-1, Az, A1, A2, A 3 ... Az-1, Az, z are positive integers, z ≥ 2 ;
所述处理器2802,用于从所述N个比特块中的第1净荷比特开始,将每个比特块中的A1个连续比特记录至第1个监视区段,将所述A1个连续比特后的A2个连续比特记录至第2个监视区段,将所述A2个连续比特后的A3个连续比特记录至第3个监视区段,直至将所述Az-1个连续比特后的Az个连续比特记录至第z个监视区段;The processor 2802 is configured to record, according to the first payload bit of the N bit blocks, the A1 consecutive bits in each bit block to the first monitoring segment, and the A1 consecutive segments A2 consecutive bits after the bit are recorded to the second monitoring segment, and A3 consecutive bits after the A2 consecutive bits are recorded to the third monitoring segment until after the Az-1 consecutive bits are Az consecutive bits are recorded to the zth monitoring section;
针对每个监视区段采用奇校验或偶校验确定1比特监视码,获得z比特监视码,所述z比特监视码中包括所述第一奇偶校验结果和所述第二奇偶校验结果。Determining a 1-bit monitoring code by using an odd or even parity for each monitoring section, obtaining a z-bit monitoring code, the z-bit monitoring code including the first parity result and the second parity result.
在一种可能的设计中,所述处理器2802,用于:In one possible design, the processor 2802 is configured to:
确定第一校验结果集合,所述第一校验结果集合包括所述y比特监视码,或者,所述第一校验结果集合包括所述z比特监视码;Determining a first verification result set, the first verification result set includes the y-bit monitoring code, or the first verification result set includes the z-bit monitoring code;
所述收发器2801,用于:The transceiver 2801 is configured to:
发送所述第一校验结果集合。Sending the first set of verification results.
基于同一构思,本申请还提供了一种比特块流误码检测设备,该设备可以用于执行上述图12中对应的方法实施例,因此本申请实施例提供的比特块流误码检测设备的实施方式可以参见该方法的实施方式,重复之处不再赘述。Based on the same concept, the present application further provides a bit block stream error detecting device, which can be used to perform the corresponding method embodiment in FIG. 12, and thus the bit block stream error detecting device provided by the embodiment of the present application is For the implementation manner, reference may be made to the implementation manner of the method, and the repeated description is not repeated.
参阅图29所示,本申请实施例提供一种比特块流误码检测设备2900,包括:收发器2901和处理器2902;As shown in FIG. 29, the embodiment of the present application provides a bit block stream error detecting device 2900, including: a transceiver 2901 and a processor 2902;
收发器2901,用于接收第一边界比特块,所述第一边界比特块用于区别后续接收的T个比特块,T为正整数;依次接收第I比特块,I为大于等于1小于等于T的整数;接收第二边界比特块,所述第二边界比特块用于区别已经接收完成的所述T个比特块;The transceiver 2901 is configured to receive a first boundary bit block, where the first boundary bit block is used to distinguish the subsequently received T bit blocks, where T is a positive integer; and the first bit block is sequentially received, where I is greater than or equal to 1 and less than or equal to An integer of T; receiving a second boundary bit block, the second boundary bit block being used to distinguish the T bit blocks that have been received;
处理器2902,用于确定第三奇偶校验结果和第四奇偶校验结果,所述第三奇偶校验结果的校验对象包括所述T个比特块中每个比特块的连续的m个比特,所述第四奇偶校验结果的校验对象包括所述T个比特块中每个比特块的连续的n个比特,m、n中的至少一个大于等于2;当通过所述收发器接收到第一奇偶校验结果和第二奇偶校验结果时,根据所述第一奇偶校验结果和所述第三奇偶校验结果,以及所述第二奇偶校验结果和所述第四奇偶校验结果,确定所述T个比特块是否存在误码,其中,所述第一奇偶校验结果的校验对象包括N个比特块中每个比特块的连续的m个比特,所述第二奇偶校验结果的校验对象包括所述N个比特块中每个比特块的连续的n个比特,N为确定所述第一奇偶校验结果和所述第二奇偶校验结果时所述第一边界比特块和所述第二边界比特块之间的比特块的数目。The processor 2902 is configured to determine a third parity result and a fourth parity result, where the check object of the third parity result includes consecutive m pieces of each of the T bit blocks a bit, the check object of the fourth parity result includes consecutive n bits of each of the T bit blocks, at least one of m, n being greater than or equal to 2; when passing through the transceiver Receiving the first parity result and the second parity result, according to the first parity result and the third parity result, and the second parity result and the fourth a parity result, determining whether the T bit blocks have an error, wherein the check object of the first parity result includes consecutive m bits of each of the N bit blocks, The check object of the second parity result includes consecutive n bits of each of the N bit blocks, where N is the result of determining the first parity result and the second parity result Between the first boundary bit block and the second boundary bit block Patent number blocks.
在一种可能的设计中,所述收发器2901还用于:In one possible design, the transceiver 2901 is also used to:
当未接收到第一奇偶校验结果和第二奇偶校验结果时,发送所述第三奇偶校验结果和所述第四奇偶校验结果至第二设备,所述第二设备存储有所述第一奇偶校验结果和所述第二奇偶校验结果。Transmitting the third parity result and the fourth parity result to a second device when the first parity result and the second parity result are not received, where the second device stores The first parity result and the second parity result are described.
在一种可能的设计中,每个比特块的类型为M1/M2比特块,其中,M1表示每个比特块中的净荷比特数,M2表示每个比特块的总比特数,M2-M1表示每个比特块中的首部同步头比特数,M1、M2为正整数,M2>M1。In one possible design, the type of each bit block is an M1/M2 bit block, where M1 represents the number of payload bits in each bit block, and M2 represents the total number of bits per bit block, M2-M1 Represents the number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
在一种可能的设计中,所述收发器2901用于:In one possible design, the transceiver 2901 is used to:
在第一时刻接收第二边界比特块;Receiving a second boundary bit block at a first time;
在第二时刻接收第一奇偶校验结果和第二奇偶校验结果,其中,所述第一时刻早于所述第二时刻,或所述第一时刻晚于所述第二时刻,所述第一时刻等于所述第二时刻。Receiving, at a second time, a first parity result and a second parity result, wherein the first time is earlier than the second time, or the first time is later than the second time, The first moment is equal to the second moment.
在一种可能的设计中,,所述第一奇偶校验结果和所述第二奇偶校验结果存储于所述第二边界比特块中。In one possible design, the first parity result and the second parity result are stored in the second boundary bit block.
在一种可能的设计中,所述第三奇偶校验结果和所述第四奇偶校验结果是根据预设校验算法计算得到的,所述预设校验算法用于当所述T个比特块中增加或减少第一比特块时不改变所述第三奇偶校验结果和所述第四奇偶校验结果,所述第一比特块是指在所述T个比特块的传输过程中可能插入所述T个比特块或从所述T个比特块中删除的比特块。In a possible design, the third parity result and the fourth parity result are calculated according to a preset check algorithm, where the preset check algorithm is used when the T The third parity result and the fourth parity result are not changed when the first bit block is added or decreased in the bit block, and the first bit block refers to the transmission process of the T bit block It is possible to insert the T bit blocks or the bit blocks deleted from the T bit blocks.
在一种可能的设计中,所述预设校验算法为xBIP-y算法,其中,x是指连续比特交织的比特数,x是根据所述第一比特块的码型定义确定的,y是指监视区段的个数,x,y为正整数,y≥2;In a possible design, the preset check algorithm is an xBIP-y algorithm, where x is the number of bits of consecutive bit interleaving, and x is determined according to the definition of the pattern of the first bit block, y Refers to the number of monitored segments, x, y is a positive integer, y ≥ 2;
所述处理器2902,用于从所述T个比特块中的第1净荷比特开始,将每个比特块的每x个连续比特依次记录至第1个监视区段至第y个监视区段;The processor 2902 is configured to record, from the first payload bit of the T bit blocks, each x consecutive bits of each bit block to the first monitoring segment to the yth monitoring region. segment;
针对每个监视区段采用奇校验或偶校验确定1比特监视码,获得y比特监视码,所述y比特监视码中包括所述第三奇偶校验结果和所述第四奇偶校验结果。Determining a 1-bit monitoring code by using an odd or even parity for each monitoring section, obtaining a y-bit monitoring code, wherein the y-bit monitoring code includes the third parity result and the fourth parity result.
在一种可能的设计中,所述预设校验算法为flexBIP-z算法,其中,z是指监视区段的个数,每个监视区段对应的连续比特交织的比特数不全相同,z个监视区段分别对应的连续比特交织的比特数为A1、A2、A 3……Az-1,Az,A1、A2、A 3……Az-1,Az,z为正整数,z≥2;In a possible design, the preset check algorithm is a flexBIP-z algorithm, where z is the number of monitored segments, and the number of consecutive bit interleaving bits corresponding to each monitoring segment is not the same, z The number of bits of consecutive bit interleaving corresponding to each monitoring section is A1, A2, A 3 ... Az-1, Az, A1, A2, A 3 ... Az-1, Az, z are positive integers, z ≥ 2 ;
所述处理器2902,用于从所述T个比特块中的第1净荷比特开始,将每个比特块的A1个连续比特记录至第1个监视区段,将所述A1个连续比特后的A2个连续比特记录至第2个监视区段,将所述A2个连续比特后的A3个连续比特记录至第3个监视区段,直至将所述Az-1个连续比特后的Az个连续比特记录至第z个监视区段;The processor 2902 is configured to record, according to a first payload bit of the T bit blocks, A1 consecutive bits of each bit block to a first monitoring segment, where the A1 consecutive bits are The last A2 consecutive bits are recorded to the second monitoring segment, and the A3 consecutive bits after the A2 consecutive bits are recorded to the third monitoring segment until the Az-1 consecutive bits are followed by Az. Continuous bits are recorded to the zth monitoring section;
针对每个监视区段采用奇校验或偶校验确定1比特监视码,获得z比特监视码,所述z比特监视码中包括所述第三奇偶校验结果和所述第四奇偶校验结果。Determining a 1-bit monitoring code by using an odd parity or an even parity for each monitoring section, obtaining a z-bit monitoring code including the third parity result and the fourth parity in the z-bit monitoring code result.
在一种可能的设计中,所述处理器2902,用于:In one possible design, the processor 2902 is configured to:
若确定所述第一奇偶校验结果和所述第三奇偶校验结果相同,且所述第二奇偶校验结果和所述第四奇偶校验结果相同,则确定所述T个比特块不存在误码;If it is determined that the first parity result and the third parity result are the same, and the second parity result and the fourth parity result are the same, determining that the T bit blocks are not There is a bit error;
若确定所述第一奇偶校验结果和所述第三奇偶校验结果不相同,和/或所述第二奇偶校验结果和所述第四奇偶校验结果不相同,则确定所述T个比特块存在误码。Determining the T if it is determined that the first parity result and the third parity result are not the same, and/or the second parity result and the fourth parity result are not the same There are bit errors in the bit blocks.
在一种可能的设计中,所述收发器2901,用于:In one possible design, the transceiver 2901 is configured to:
接收第一校验结果集合,所述第一校验结果集合是根据xBIP-y算法计算得到的,所述第一校验结果集合包括的y比特监视码中包括所述第一奇偶校验结果和所述第二奇偶校验结果;Receiving a first check result set, where the first check result set is calculated according to an xBIP-y algorithm, where the first check result set includes a y bit monitor code including the first parity result And the second parity result;
所述处理器2902,用于:确定第二校验结果集合,所述第二奇偶校验结果是根据所述xBIP-y算法计算得到的,所述第二校验结果集合包括的y比特监视码中包括所述第三奇偶校验结果和所述第三奇偶校验结果;根据所述第一校验结果集合和所述第二校验结果集合,确定所述T个比特块是否存在误码。The processor 2902 is configured to: determine a second check result set, where the second parity result is calculated according to the xBIP-y algorithm, and the second check result set includes y bit monitoring Included in the code, the third parity result and the third parity result; determining, according to the first verification result set and the second verification result set, whether the T bit blocks have errors code.
在一种可能的设计中,所述收发器2901,用于:In one possible design, the transceiver 2901 is configured to:
接收第一校验结果集合,所述第一校验结果集合是根据flexBIP-z算法计算得到的,所述第一校验结果集合包括的z比特监视码中包括所述第一奇偶校验结果和所述第二奇偶校验结果;Receiving a first check result set, where the first check result set is calculated according to a flexBIP-z algorithm, where the first check result set includes a z-bit monitoring code including the first parity result And the second parity result;
所述处理器2902,用于:确定第二校验结果集合,所述第二校验结果集合是根据所述flexBIP-z算法计算得到的,所述第二校验结果集合包括的z比特监视码中包括所述第三奇偶校验结果和所述第四奇偶校验结果;根据所述第一校验结果集合和所述第二校验结果集合,确定所述T个比特块是否存在误码。The processor 2902 is configured to: determine a second verification result set, where the second verification result set is calculated according to the flexBIP-z algorithm, and the second verification result set includes z-bit monitoring The code includes the third parity result and the fourth parity result; determining, according to the first verification result set and the second verification result set, whether the T bit block has an error code.
在一种可能的设计中,所述处理器2902,用于:In one possible design, the processor 2902 is configured to:
若确定所述第一校验结果集合和所述第二校验结果集合相同,则确定所述T个比特块不存在误码;If it is determined that the first verification result set and the second verification result set are the same, determining that the T bit blocks have no error;
若确定所述第一校验结果集合和所述第二校验结果集合不相同,则确定所述T个比特块存在误码。If it is determined that the first verification result set and the second verification result set are different, it is determined that the T bit blocks have an error.
基于同一构思,本申请还提供了一种比特块流误码检测设备,该设备可以用于执行上述图13中对应的方法实施例,因此本申请实施例提供的比特块流误码检测设备的实施方式可以参见该方法的实施方式,重复之处不再赘述。Based on the same concept, the present application further provides a bit block stream error detecting device, which can be used to perform the corresponding method embodiment in FIG. 13 , and therefore, the bit block stream error detecting device provided by the embodiment of the present application is For the implementation manner, reference may be made to the implementation manner of the method, and the repeated description is not repeated.
参阅图30所示,本申请实施例提供一种比特块流误码检测设备3000,包括:收发器3001和处理器3002;As shown in FIG. 30, the embodiment of the present application provides a bit block stream error detecting apparatus 3000, including: a transceiver 3001 and a processor 3002;
处理器3002,用于根据比特块流中起始块中的起始字节和与所述起始块对应的结束块中的结束字节确定被检测区段;根据所述被检测区段计算第一校验结果;The processor 3002 is configured to determine, according to a start byte in a start block in a bit block stream and an end byte in an end block corresponding to the start block, a detected segment; and calculate, according to the detected segment First verification result;
收发器3001,用于发送所述第一校验结果和所述比特块流;The transceiver 3001 is configured to send the first check result and the bit block stream.
在一种可能的设计中,所述比特块流包括至少一个M1/M2比特块;其中,M1表示每个比特块中的净荷比特数,M2表示每个比特块的总比特数,M2-M1表示每个比特块中的首部同步头比特数,M1、M2为正整数,M2>M1。In one possible design, the bit block stream includes at least one M1/M2 bit block; wherein M1 represents the number of payload bits in each bit block, and M2 represents the total number of bits per bit block, M2- M1 represents the number of header sync header bits in each bit block, and M1 and M2 are positive integers, and M2>M1.
在一种可能的设计中,所述收发器3001,用于:In one possible design, the transceiver 3001 is configured to:
发送所述第一校验结果和所述比特块流至第二设备;Transmitting the first verification result and the bit block to the second device;
或者,发送所述第一校验结果至第三设备,发送所述比特块流至所述第二设备;Or sending the first verification result to the third device, and sending the bit block flow to the second device;
在一种可能的设计中,所述处理器3002,还用于:In a possible design, the processor 3002 is further configured to:
在所述收发器将所述第一校验结果和所述比特块流发送至第二设备之前,将所述第一校验结果存储于所述结束块,获得更新后的结束块;或者,将所述第一校验结果存储于校验结果存储块,并删除所述比特块流中的任一第一比特块,其中,所述校验结果存储块是指位于所述结束块之前的一个新增块,所述第一比特块是指在所述比特块流的传输过程中可能插入所述比特块流或从所述比特块流中删除的比特块。Before the transceiver sends the first verification result and the bit block stream to the second device, storing the first verification result in the end block to obtain an updated end block; or Storing the first check result in a check result storage block, and deleting any first bit block in the bit block stream, where the check result storage block refers to being located before the end block A new block, the first bit block being a bit block that may be inserted into or deleted from the bit block stream during transmission of the bit block stream.
在一种可能的设计中,所述处理器3002,用于:In a possible design, the processor 3002 is configured to:
当所述第一校验结果占用的字节数大于等于目标字节数时,将所述第一校验结果存储于所述结束块中的所述结束字节之前,并根据所述第一校验结果占用的字节数将所述结束字节移至所述结束块后的一个新增块,删除所述比特块流中的任一第一比特块,将所述结束字节移动后所在的新增块作为更新后的结束块;When the number of bytes occupied by the first verification result is greater than or equal to the target number of bytes, storing the first verification result before the end byte in the end block, and according to the first The number of bytes occupied by the verification result moves the end byte to a new block after the end block, deletes any first bit block in the bit block stream, and moves the end byte The new block is located as the updated end block;
当所述第一校验结果占用的字节数小于所述目标字节数时,将所述第一校验结果存储于所述结束块中的所述结束字节之前,并根据所述第一校验结果占用的字节数将所述结束 字节后移所述第一校验结果占用的字节数,将所述结束字节移动后所在的比特块作为更新后的结束块;When the number of bytes occupied by the first verification result is less than the target number of bytes, storing the first verification result before the end byte in the end block, and according to the The number of bytes occupied by a check result shifts the end byte back by the number of bytes occupied by the first check result, and the bit block where the end byte is moved is used as the updated end block;
其中,所述目标字节数为所述结束块中位于所述结束字节后的字节数加1。The target number of bytes is the number of bytes in the end block after the end byte plus one.
基于同一构思,本申请还提供了一种比特块流误码检测设备,该设备可以用于执行上述图21中对应的方法实施例,因此本申请实施例提供的比特块流误码检测设备的实施方式可以参见该方法的实施方式,重复之处不再赘述。Based on the same concept, the present application further provides a bit block stream error detecting device, which can be used to perform the corresponding method embodiment in FIG. 21, and thus the bit block stream error detecting device provided by the embodiment of the present application is For the implementation manner, reference may be made to the implementation manner of the method, and the repeated description is not repeated.
参阅图31所示,本申请实施例提供一种比特块流误码检测设备3100,包括:收发器3101和处理器3102;As shown in FIG. 31, the embodiment of the present application provides a bit block stream error detecting apparatus 3100, including: a transceiver 3101 and a processor 3102;
处理器3102,用于根据比特块流中起始块中的起始字节和与所述起始块对应的结束块中的结束字节确定被检测区段;根据所述被检测区段计算第二校验结果;The processor 3102 is configured to determine a detected segment according to a start byte in a start block in a bit block stream and an end byte in an end block corresponding to the start block, and calculate, according to the detected segment Second verification result;
当通过收发器3101接收到第一校验结果时,根据所述第一校验结果与第二校验结果,确定所述被检测区段是否存在误码。When the first check result is received by the transceiver 3101, it is determined whether the detected segment has an error according to the first check result and the second check result.
在一种可能的设计中,所述比特块流包括至少一个M1/M2比特块;其中,M1表示每个比特块中的净荷比特数,M2表示每个比特块的总比特数,M2-M1表示每个比特块中的首部同步头比特数,M1、M2为正整数,M2>M1。In one possible design, the bit block stream includes at least one M1/M2 bit block; wherein M1 represents the number of payload bits in each bit block, and M2 represents the total number of bits per bit block, M2- M1 represents the number of header sync header bits in each bit block, and M1 and M2 are positive integers, and M2>M1.
在一种可能的设计中,所述处理器3102,用于In a possible design, the processor 3102 is configured to:
当通过收发器接收到第一校验结果,且所述第一校验结果存储于所述结束块时,将所述第二校验结果从所述结束块中删除,获得更新后的结束块,将所述起始块中的起始字节和所述更新后的结束块中的结束字节之间的字节作为被检测区段;When the first check result is received by the transceiver, and the first check result is stored in the end block, the second check result is deleted from the end block, and the updated end block is obtained. a byte between the start byte in the start block and the end byte in the updated end block as a detected segment;
当通过收发器接收到第一校验结果,且所述第一校验结果存储于校验结果存储块时,将所述校验结果存储块从所述比特块流中删除,获得更新后的比特块流,将所述更新后的比特块流中所述起始块中的起始字节和所述结束块中的结束字节之间的字节作为被检测区段,其中,所述校验结果存储块位于所述结束块之前;When the first verification result is received by the transceiver, and the first verification result is stored in the verification result storage block, the verification result storage block is deleted from the bit block stream, and the updated a bit block stream, the byte between the start byte in the start block and the end byte in the end block in the updated bit block stream is used as a detected segment, wherein a check result storage block is located before the end block;
当未接收到第一校验结果时,将所述比特块流中所述起始块中的起始字节和所述结束块中的结束字节之间的字节作为被检测区段;When the first check result is not received, a byte between the start byte in the start block and the end byte in the end block in the bit block stream is taken as a detected segment;
在一种可能的设计中,所述收发器3101还用于:In one possible design, the transceiver 3101 is further configured to:
当未接收到第一校验结果时,将所述第二校验结果发送至第三设备,所述第三设备存储有所述第一校验结果。When the first verification result is not received, the second verification result is sent to the third device, and the third device stores the first verification result.
在一种可能的设计中,所述处理器3102,用于:In a possible design, the processor 3102 is configured to:
若确定所述第一校验结果与第二校验结果相同,则确定所述被检测区段不存在误码;If it is determined that the first verification result is the same as the second verification result, determining that the detected segment does not have an error;
若确定所述第一校验结果与第二校验结果不同,则确定所述被检测区段存在误码。If it is determined that the first check result is different from the second check result, it is determined that the detected segment has an error.
在一种可能的设计中,所述处理器3102,用于:In a possible design, the processor 3102 is configured to:
当所述第一校验结果占用的字节数大于等于目标字节数时,根据所述第一校验结果占用的字节数将所述结束字节移至所述结束块前的一个比特块,在所述比特块流中新增一个第一比特块,将所述结束字节移动后所在的比特块作为更新后的结束块;When the number of bytes occupied by the first check result is greater than or equal to the target number of bytes, moving the end byte to a bit before the end block according to the number of bytes occupied by the first check result Block, adding a first bit block to the bit block stream, and using the bit block in which the end byte is moved as an updated end block;
当所述第一校验结果占用的字节数小于所述目标字节数时,根据所述第一校验结果占用的字节数将所述结束字节前移所述第一校验结果占用的字节数,将所述结束字节移动后所在的比特块作为更新后的结束块;When the number of bytes occupied by the first check result is less than the target number of bytes, the end byte is forwarded by the first check result according to the number of bytes occupied by the first check result The number of bytes occupied, the bit block in which the end byte is moved is used as the updated end block;
其中,所述目标字节数为所述结束块中位于所述结束字节前的字节数加1。The target number of bytes is the number of bytes in the end block before the end byte plus one.
综上所述,本申请实施例提供一种比特块流误码检测方法,该方法包括:发送设备发 送第一边界比特块,第一边界比特块用于区别后续发送的N个比特块,N为正整数;依次发送第I比特块,I为大于等于1小于等于N的整数;确定第一奇偶校验结果和第二奇偶校验结果,第一奇偶校验结果的校验对象包括N个比特块中每个比特块的连续的m个比特,第二奇偶校验结果的校验对象包括N个比特块中每个比特块的连续的n个比特,m、n中的至少一个大于等于2;发送第二边界比特块、第一奇偶校验结果和第二奇偶校验结果,第二边界比特块用于区别已经发送完成的N个比特块。同时,接收设备接收第一边界比特块,第一边界比特块用于区别后续接收的T个比特块,T为正整数;依次接收第I比特块,I为大于等于1小于等于T的整数;接收第二边界比特块,第二边界比特块用于区别已经接收完成的T个比特块;确定第三奇偶校验结果和第四奇偶校验结果,第三奇偶校验结果的校验对象包括T个比特块中每个比特块的连续的m个比特,第二奇偶校验结果的校验对象包括T个比特块中每个比特块的连续的n个比特,m、n中的至少一个大于等于2;当接收到第一奇偶校验结果和第二奇偶校验结果时,根据第一奇偶校验结果和第三奇偶校验结果,以及第二奇偶校验结果和第四奇偶校验结果,确定T个比特块是否存在误码,其中,第一奇偶校验结果的校验对象包括N个比特块中每个比特块的连续的m个比特,第二奇偶校验结果的校验对象包括N个比特块中每个比特块的连续的n个比特,N为确定第一奇偶校验结果和第二奇偶校验结果时第一边界比特块和第二边界比特块之间的比特块的数目。因此,采用本申请实施例提供的方法可以完整实施M/N Bit Block网络路径的错误或误码检测,不影响用户业务,承载效率100%,可以容忍传递过程中因同步问题而插入或删除的比特块,且检测周期(即两个边界比特块之间的比特块数目)和检测精度(即预设算法)动态按需可配置。此外,该检测方法不仅可以被校验的比特块流的路径为端到端的路径,还可以用于被校验的比特块流的路径为非端到端的路径。因此,采用本申请实施例提供的方法能够解决在M/N Bit block交换的场景中的误码检测方法实现难度较大且承载效率较低的问题。In summary, the embodiment of the present application provides a bit block stream error detection method, where the method includes: the sending device sends a first boundary bit block, where the first boundary bit block is used to distinguish the N bit blocks that are subsequently sent, N a positive integer; the first bit block is sequentially transmitted, I is an integer greater than or equal to 1 and less than or equal to N; the first parity result and the second parity result are determined, and the check object of the first parity result includes N a continuous m bits of each bit block in the bit block, the check object of the second parity result includes consecutive n bits of each of the N bit blocks, at least one of m and n being greater than or equal to 2: transmitting a second boundary bit block, a first parity result, and a second parity block, wherein the second boundary bit block is used to distinguish N bits that have been transmitted. At the same time, the receiving device receives the first boundary bit block, where the first boundary bit block is used to distinguish the subsequently received T bit blocks, T is a positive integer; the first bit block is sequentially received, and I is an integer greater than or equal to 1 and less than or equal to T; Receiving a second boundary bit block, the second boundary bit block is configured to distinguish the T bit blocks that have been received; determining a third parity result and a fourth parity result, where the check object of the third parity result includes Contiguous m bits of each of the T bit blocks, the check object of the second parity result includes at least one of n consecutive bits, m, n of each of the T bit blocks Greater than or equal to 2; when receiving the first parity result and the second parity result, according to the first parity result and the third parity result, and the second parity result and the fourth parity As a result, it is determined whether there are error codes in the T bit blocks, wherein the check object of the first parity result includes consecutive m bits of each of the N bit blocks, and the check of the second parity result Object includes N bit blocks N consecutive bits of each bit block, the number of bits of the block boundary between a first block and a second boundary bit block of bits N is first determined result and the second parity parity check result. Therefore, the method provided by the embodiment of the present application can completely implement the error or error detection of the M/N Bit Block network path, does not affect the user service, and has a bearer efficiency of 100%, and can be inserted or deleted due to the synchronization problem during the transmission process. The bit block, and the detection period (ie, the number of bit blocks between the two boundary bit blocks) and the detection accuracy (ie, the preset algorithm) are dynamically configurable as needed. In addition, the detection method can not only use the path of the bit block stream to be verified as an end-to-end path, but also the path of the bit block stream to be verified as a non-end-to-end path. Therefore, the method provided by the embodiment of the present application can solve the problem that the error detection method in the M/N Bit block exchange scenario is difficult to implement and has low bearer efficiency.
本申请实施例还提供一种比特块流误码检测方法,该方法包括:第一设备根据比特块流中起始块中的起始字节和与起始块对应的结束块中的结束字节确定被检测区段;第一设备根据被检测区段计算第一校验结果。第一设备发送第一校验结果和比特块流。例如,第一设备在计算第一校验结果时采用的算法可以为CRC-x或BIP-x,第一校验结果记为的结果于B,B可以是一个或多个字节。第二设备根据比特块流中起始块中的起始字节和与起始块对应的结束块中的结束字节确定被检测区段;第二设备根据被检测区段计算第二校验结果。当第二设备接收到第一校验结果时,第二设备根据第一校验结果与第二校验结果,确定被检测区段是否存在误码。因此,采用本申请实施例提供的方法可以完整实施M/N Bit Block网络路径的错误或误码检测,对用户业务影响小,与SDH/OTN接近,优于现有技术中提供的误码检测方法,实施流程简洁、易实施。The embodiment of the present application further provides a bit block stream error detection method, the method comprising: the first device according to a start byte in a start block in a bit block stream and an end word in an end block corresponding to the start block The section determines the detected section; the first device calculates a first verification result according to the detected section. The first device transmits the first check result and the bit block stream. For example, the algorithm used by the first device to calculate the first check result may be CRC-x or BIP-x, and the first check result is recorded as B, and B may be one or more bytes. The second device determines the detected segment according to the start byte in the start block in the bit block stream and the end byte in the end block corresponding to the start block; the second device calculates the second check according to the detected segment result. When the second device receives the first verification result, the second device determines, according to the first verification result and the second verification result, whether the detected segment has an error. Therefore, the error or error detection of the M/N Bit Block network path can be completely implemented by using the method provided in the embodiment of the present application, which has little impact on the user service and is close to the SDH/OTN, and is superior to the error detection provided in the prior art. Method, the implementation process is simple and easy to implement.
本领域内的技术人员应明白,本申请实施例可提供为方法、系统、或计算机程序产品。因此,本申请实施例可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请实施例可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art will appreciate that embodiments of the present application can be provided as a method, system, or computer program product. Therefore, the embodiments of the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware. Moreover, embodiments of the present application can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
本申请实施例是参照根据本申请实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的 每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。Embodiments of the present application are described with reference to flowchart illustrations and/or block diagrams of methods, devices (systems), and computer program products according to embodiments of the present application. It will be understood that each flow and/or block of the flowchart illustrations and/or FIG. These computer program instructions can be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing device to produce a machine for the execution of instructions for execution by a processor of a computer or other programmable data processing device. Means for implementing the functions specified in one or more of the flow or in a block or blocks of the flow chart.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。The computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device. The apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device. The instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
显然,本领域的技术人员可以对本申请实施例进行各种改动和变型而不脱离本申请的精神和范围。这样,倘若本申请实施例的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。It is apparent that those skilled in the art can make various modifications and variations to the embodiments of the present application without departing from the spirit and scope of the application. Thus, it is intended that the present invention cover the modifications and variations of the embodiments of the present invention.

Claims (72)

  1. 一种比特块流误码检测方法,其特征在于,包括:A bit block stream error detection method, comprising:
    发送第一边界比特块,所述第一边界比特块用于区别后续发送的N个比特块,N为正整数;Transmitting a first boundary bit block, where the first boundary bit block is used to distinguish the N bit blocks that are subsequently sent, where N is a positive integer;
    依次发送第I比特块,I为大于等于1小于等于N的整数;Transmitting the first bit block, where I is an integer greater than or equal to 1 and less than or equal to N;
    确定第一奇偶校验结果和第二奇偶校验结果,所述第一奇偶校验结果的校验对象包括所述N个比特块中每个比特块的连续的m个比特,所述第二奇偶校验结果的校验对象包括所述N个比特块中每个比特块的连续的n个比特,m、n中的至少一个大于等于2;Determining a first parity result and a second parity result, the check object of the first parity result including consecutive m bits of each of the N bit blocks, the second The parity object of the parity result includes consecutive n bits of each of the N bit blocks, at least one of m and n being greater than or equal to 2;
    发送第二边界比特块、所述第一奇偶校验结果和所述第二奇偶校验结果,所述第二边界比特块用于区别已经发送完成的所述N个比特块。Transmitting a second boundary bit block, the first parity result, and the second parity result, the second boundary bit block being used to distinguish the N bit blocks that have been transmitted.
  2. 如权利要求1所述的方法,其特征在于,每个比特块的类型为M1/M2比特块,其中,M1表示每个比特块中的净荷比特数,M2表示每个比特块的总比特数,M2-M1表示每个比特块中的首部同步头比特数,M1、M2为正整数,M2>M1。The method of claim 1 wherein the type of each bit block is an M1/M2 bit block, wherein M1 represents the number of payload bits in each bit block and M2 represents the total bits of each bit block. The number, M2-M1, represents the number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
  3. 如权利要求1或2所述的方法,其特征在于,发送第一边界比特块,包括:The method of claim 1 or 2, wherein transmitting the first boundary bit block comprises:
    发送第一边界比特块至第一设备;Transmitting a first boundary bit block to the first device;
    依次发送第I比特块,包括:Sending the first bit block in sequence, including:
    依次发送第I比特块至所述第一设备;Transmitting the first bit block to the first device in sequence;
    发送第二边界比特块、所述第一奇偶校验结果和所述第二奇偶校验结果,包括:Transmitting the second boundary bit block, the first parity result, and the second parity result, including:
    发送第二边界比特块、所述第一奇偶校验结果和所述第二奇偶校验结果至所述第一设备;Transmitting a second boundary bit block, the first parity result, and the second parity result to the first device;
    或者,发送第二边界比特块至所述第一设备,发送所述第一奇偶校验结果和所述第二奇偶校验结果至第二设备。Or sending a second boundary bit block to the first device, and sending the first parity result and the second parity result to the second device.
  4. 如权利要求1所述的方法,其特征在于,所述第一奇偶校验结果的校验对象还包括所述第一边界比特块的连续的m个比特,所述第二奇偶校验结果的校验对象还包括所述第一边界比特块的连续的n个比特。The method according to claim 1, wherein the check object of the first parity result further comprises consecutive m bits of the first boundary bit block, the second parity result The check object also includes consecutive n bits of the first boundary bit block.
  5. 如权利要求1或4所述的方法,其特征在于,所述第一奇偶校验结果的校验对象还包括所述第二边界比特块的连续的m个比特,所述第二奇偶校验结果的校验对象还包括所述第二边界比特块的连续的n个比特。The method according to claim 1 or 4, wherein the check object of the first parity result further comprises consecutive m bits of the second boundary bit block, the second parity The resulting check object also includes consecutive n bits of the second boundary bit block.
  6. 如权利要求1-5任一项所述的方法,其特征在于,发送第二边界比特块、第一奇偶校验结果和第二奇偶校验结果,包括:The method of any of claims 1-5, wherein transmitting the second boundary bit block, the first parity result, and the second parity result comprises:
    在第一时刻发送第二边界比特块,在第二时刻发送第一奇偶校验结果和第二奇偶校验结果,其中,所述第一时刻早于所述第二时刻,或所述第一时刻晚于所述第二时刻,所述第一时刻等于所述第二时刻。Transmitting a second boundary bit block at a first time, and transmitting a first parity result and a second parity result at a second time, wherein the first time is earlier than the second time, or the first The time is later than the second time, the first time is equal to the second time.
  7. 如权利要求1-6任一项所述的方法,其特征在于,所述第一奇偶校验结果和所述第二奇偶校验结果存储于所述第二边界比特块中。The method of any of claims 1-6, wherein the first parity result and the second parity result are stored in the second boundary bit block.
  8. 如权利要求1-7任一项所述的方法,其特征在于,所述第一奇偶校验结果和所述第二奇偶校验结果是根据预设校验算法计算得到的,所述预设校验算法用于当所述N个比特块中增加或减少第一比特块时不改变所述第一奇偶校验结果和所述第二奇偶校验结果,所述第一比特块是指在所述N个比特块的传输过程中可能插入所述N个比特块或从所述N 个比特块中删除的比特块。The method according to any one of claims 1 to 7, wherein the first parity result and the second parity result are calculated according to a preset check algorithm, the preset a check algorithm for not changing the first parity result and the second parity result when the first bit block is added or decreased in the N bit blocks, where the first bit block refers to The N bit blocks or bit blocks deleted from the N bit blocks may be inserted during transmission of the N bit blocks.
  9. 如权利要求8所述的方法,其特征在于,所述预设校验算法为xBIP-y算法,其中,x是指连续比特交织的比特数,x是根据所述第一比特块的码型定义确定的,y是指监视区段的个数,x,y为正整数,y≥2;The method according to claim 8, wherein the preset check algorithm is an xBIP-y algorithm, wherein x is a number of bits of consecutive bit interleaving, and x is a pattern according to the first bit block Defining the definition, y refers to the number of monitoring segments, x, y is a positive integer, y ≥ 2;
    确定第一奇偶校验结果和第二奇偶校验结果,包括:Determining the first parity result and the second parity result, including:
    从所述N个比特块中的第1净荷比特开始,将每个比特块的每x个连续比特依次记录至第1个监视区段至第y个监视区段;Starting from the first payload bit of the N bit blocks, sequentially recording every x consecutive bits of each bit block to the first monitoring segment to the yth monitoring segment;
    针对每个监视区段采用奇校验或偶校验确定1比特监视码,获得y比特监视码,所述y比特监视码中包括所述第一奇偶校验结果和所述第二奇偶校验结果。Determining a 1-bit monitoring code by using an odd or even parity for each monitoring section, obtaining a y-bit monitoring code, the y-bit monitoring code including the first parity result and the second parity result.
  10. 如权利要求8所述的方法,其特征在于,所述预设校验算法为flexBIP-z算法,其中,z是指监视区段的个数,每个监视区段对应的连续比特交织的比特数不全相同,z个监视区段分别对应的连续比特交织的比特数为A1、A2、A3……Az-1,Az,A1、A2、A3……Az-1,Az,z为正整数,z≥2;The method according to claim 8, wherein the preset check algorithm is a flexBIP-z algorithm, wherein z is the number of monitored segments, and consecutive bit-interleaved bits corresponding to each monitored segment The number of consecutive bit interleaving corresponding to z monitoring sections is A1, A2, A3, ... Az-1, Az, A1, A2, A3, ..., Az-1, Az, z are positive integers. Z≥2;
    确定第一奇偶校验结果和第二奇偶校验结果,包括:Determining the first parity result and the second parity result, including:
    从所述N个比特块中的第1净荷比特开始,将每个比特块中的A1个连续比特记录至第1个监视区段,将所述A1个连续比特后的A2个连续比特记录至第2个监视区段,将所述A2个连续比特后的A3个连续比特记录至第3个监视区段,直至将所述Az-1个连续比特后的Az个连续比特记录至第z个监视区段;Starting from the first payload bit of the N bit blocks, record A1 consecutive bits in each bit block to the first monitoring segment, and record A2 consecutive bits after the A1 consecutive bits Up to the second monitoring section, recording A3 consecutive bits after the A2 consecutive bits to the third monitoring section until the Az consecutive bits after the Az-1 consecutive bits are recorded to the zth Monitoring section;
    针对每个监视区段采用奇校验或偶校验确定1比特监视码,获得z比特监视码,所述z比特监视码中包括所述第一奇偶校验结果和所述第二奇偶校验结果。Determining a 1-bit monitoring code by using an odd or even parity for each monitoring section, obtaining a z-bit monitoring code, the z-bit monitoring code including the first parity result and the second parity result.
  11. 如权利要求9或10所述的方法,其特征在于,确定第一奇偶校验结果和第二奇偶校验结果,包括:The method according to claim 9 or 10, wherein determining the first parity result and the second parity result comprises:
    确定第一校验结果集合,所述第一校验结果集合包括所述y比特监视码,或者,所述第一校验结果集合包括所述z比特监视码;Determining a first verification result set, the first verification result set includes the y-bit monitoring code, or the first verification result set includes the z-bit monitoring code;
    发送所述第一奇偶校验结果和所述第二奇偶校验结果,包括:Transmitting the first parity result and the second parity result, including:
    发送所述第一校验结果集合。Sending the first set of verification results.
  12. 一种比特块流误码检测方法,其特征在于,包括:A bit block stream error detection method, comprising:
    接收第一边界比特块,所述第一边界比特块用于区别后续接收的T个比特块,T为正整数;Receiving a first boundary bit block, where the first boundary bit block is used to distinguish the subsequently received T bit blocks, where T is a positive integer;
    依次接收第I比特块,I为大于等于1小于等于T的整数;Receiving the first bit block in sequence, where I is an integer greater than or equal to 1 and less than or equal to T;
    接收第二边界比特块,所述第二边界比特块用于区别已经接收完成的所述T个比特块;Receiving a second boundary bit block, the second boundary bit block is used to distinguish the T bit blocks that have been received;
    确定第三奇偶校验结果和第四奇偶校验结果,所述第三奇偶校验结果的校验对象包括所述T个比特块中每个比特块的连续的m个比特,所述第四奇偶校验结果的校验对象包括所述T个比特块中每个比特块的连续的n个比特,m、n中的至少一个大于等于2;Determining a third parity result and a fourth parity result, the check object of the third parity result including consecutive m bits of each of the T bit blocks, the fourth The parity object of the parity result includes consecutive n bits of each of the T bit blocks, at least one of m and n being greater than or equal to 2;
    当接收到第一奇偶校验结果和第二奇偶校验结果时,根据所述第一奇偶校验结果和所述第三奇偶校验结果,以及所述第二奇偶校验结果和所述第四奇偶校验结果,确定所述T个比特块是否存在误码,其中,所述第一奇偶校验结果的校验对象包括N个比特块中每个比特块的连续的m个比特,所述第二奇偶校验结果的校验对象包括所述N个比特块中每个比特块的连续的n个比特,N为确定所述第一奇偶校验结果和所述第二奇偶校验结果时所述第一边界比特块和所述第二边界比特块之间的比特块的数目。When receiving the first parity result and the second parity result, according to the first parity result and the third parity result, and the second parity result and the first Determining, by the four parity results, whether there is an error in the T bit blocks, wherein the check object of the first parity result includes consecutive m bits of each of the N bit blocks, The check object of the second parity result includes consecutive n bits of each of the N bit blocks, and N is determining the first parity result and the second parity result The number of bit blocks between the first boundary bit block and the second boundary bit block.
  13. 如权利要求12所述的方法,其特征在于,还包括:The method of claim 12, further comprising:
    当未接收到第一奇偶校验结果和第二奇偶校验结果时,发送所述第三奇偶校验结果和所述第四奇偶校验结果至第二设备,所述第二设备存储有所述第一奇偶校验结果和所述第二奇偶校验结果。Transmitting the third parity result and the fourth parity result to a second device when the first parity result and the second parity result are not received, where the second device stores The first parity result and the second parity result are described.
  14. 如权利要求12所述的方法,其特征在于,所述第三奇偶校验结果的校验对象还包括所述第一边界比特块的连续的m个比特,所述第四奇偶校验结果的校验对象还包括所述第一边界比特块的n个比特;所述第一奇偶校验结果的校验对象还包括所述第一边界比特块的连续的m个比特,所述第二奇偶校验结果的校验对象还包括所述第一边界比特块的连续的n个比特。The method according to claim 12, wherein the check object of the third parity result further comprises consecutive m bits of the first boundary bit block, the fourth parity result The check object further includes n bits of the first boundary bit block; the check object of the first parity result further includes consecutive m bits of the first boundary bit block, the second parity The check object of the check result further includes consecutive n bits of the first boundary bit block.
  15. 如权利要求12或14所述的方法,其特征在于,所述第三奇偶校验结果的校验对象还包括所述第二边界比特块的连续的m个比特,所述第四奇偶校验结果的校验对象还包括所述第二边界比特块的n个比特;所述第一奇偶校验结果的校验对象还包括所述第二边界比特块的连续的m个比特,所述第二奇偶校验结果的校验对象还包括所述第二边界比特块的连续的n个比特。The method according to claim 12 or 14, wherein the check object of the third parity result further comprises consecutive m bits of the second boundary bit block, the fourth parity The resulting check object further includes n bits of the second boundary bit block; the check object of the first parity result further includes consecutive m bits of the second boundary bit block, the first The check object of the second parity result further includes consecutive n bits of the second boundary bit block.
  16. 如权利要求12-15所述的方法,其特征在于,每个比特块的类型为M1/M2比特块,其中,M1表示每个比特块中的净荷比特数,M2表示每个比特块的总比特数,M2-M1表示每个比特块中的首部同步头比特数,M1、M2为正整数,M2>M1。The method according to claims 12-15, characterized in that each type of bit block is an M1/M2 bit block, wherein M1 represents the number of payload bits in each bit block, and M2 represents the block number of each bit block. The total number of bits, M2-M1, represents the number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
  17. 如权利要求12-16任一项所述的方法,其特征在于,接收第二边界比特块,包括:The method of any of claims 12-16, wherein receiving the second boundary bit block comprises:
    在第一时刻接收第二边界比特块;Receiving a second boundary bit block at a first time;
    接收第一奇偶校验结果和第二奇偶校验结果,包括:Receiving the first parity result and the second parity result, including:
    在第二时刻接收第一奇偶校验结果和第二奇偶校验结果,其中,所述第一时刻早于所述第二时刻,或所述第一时刻晚于所述第二时刻,所述第一时刻等于所述第二时刻。Receiving, at a second time, a first parity result and a second parity result, wherein the first time is earlier than the second time, or the first time is later than the second time, The first moment is equal to the second moment.
  18. 如权利要求12-17任一项所述的方法,其特征在于,所述第一奇偶校验结果和所述第二奇偶校验结果存储于所述第二边界比特块中。The method of any of claims 12-17, wherein the first parity result and the second parity result are stored in the second boundary bit block.
  19. 如权利要求12-18任一项所述的方法,其特征在于,所述第三奇偶校验结果和所述第四奇偶校验结果是根据预设校验算法计算得到的,所述预设校验算法用于当所述T个比特块中增加或减少第一比特块时不改变所述第三奇偶校验结果和所述第四奇偶校验结果,所述第一比特块是指在所述T个比特块的传输过程中可能插入所述T个比特块或从所述T个比特块中删除的比特块。The method according to any one of claims 12 to 18, wherein the third parity result and the fourth parity result are calculated according to a preset check algorithm, the preset a check algorithm for not changing the third parity result and the fourth parity result when the first bit block is added or decreased in the T bit blocks, where the first bit block refers to The T bit blocks or bit blocks deleted from the T bit blocks may be inserted during transmission of the T bit blocks.
  20. 如权利要求19所述的方法,其特征在于,所述预设校验算法为xBIP-y算法,其中,x是指连续比特交织的比特数,x是根据所述第一比特块的码型定义确定的,y是指监视区段的个数,x,y为正整数,y≥2;The method according to claim 19, wherein said preset check algorithm is an xBIP-y algorithm, wherein x is a number of bits of consecutive bit interleaving, and x is a pattern according to said first block of bits Defining the definition, y refers to the number of monitoring segments, x, y is a positive integer, y ≥ 2;
    确定第三奇偶校验结果和第四奇偶校验结果,包括:Determining the third parity result and the fourth parity result, including:
    从所述T个比特块中的第1净荷比特开始,将每个比特块的每x个连续比特依次记录至第1个监视区段至第y个监视区段;Starting from the first payload bit of the T bit blocks, every x consecutive bits of each bit block are sequentially recorded to the first monitoring segment to the yth monitoring segment;
    针对每个监视区段采用奇校验或偶校验确定1比特监视码,获得y比特监视码,所述y比特监视码中包括所述第三奇偶校验结果和所述第四奇偶校验结果。Determining a 1-bit monitoring code by using an odd or even parity for each monitoring section, obtaining a y-bit monitoring code, wherein the y-bit monitoring code includes the third parity result and the fourth parity result.
  21. 如权利要求19所述的方法,其特征在于,所述预设校验算法为flexBIP-z算法,其中,z是指监视区段的个数,每个监视区段对应的连续比特交织的比特数不全相同,z个监视区段分别对应的连续比特交织的比特数为A1、A2、A3……Az-1,Az,A1、A2、A 3……Az-1,Az,z为正整数,z≥2;The method according to claim 19, wherein the preset check algorithm is a flexBIP-z algorithm, wherein z is the number of monitored segments, and consecutive bit-interleaved bits corresponding to each monitored segment The number of consecutive bit interleaving corresponding to z monitoring sections is A1, A2, A3, ... Az-1, Az, A1, A2, A3, ... Az-1, Az, z are positive integers. , z≥2;
    确定第三奇偶校验结果和第四奇偶校验结果,包括:Determining the third parity result and the fourth parity result, including:
    从所述T个比特块中的第1净荷比特开始,将每个比特块的A1个连续比特记录至第1个监视区段,将所述A1个连续比特后的A2个连续比特记录至第2个监视区段,将所述A2个连续比特后的A3个连续比特记录至第3个监视区段,直至将所述Az-1个连续比特后的Az个连续比特记录至第z个监视区段;Starting from the first payload bit of the T bit blocks, recording A1 consecutive bits of each bit block to the first monitoring segment, and recording A2 consecutive bits after the A1 consecutive bits to The second monitoring section records A3 consecutive bits after the A2 consecutive bits to the third monitoring section until the Az consecutive bits after the Az-1 consecutive bits are recorded to the zth Monitoring section;
    针对每个监视区段采用奇校验或偶校验确定1比特监视码,获得z比特监视码,所述z比特监视码中包括所述第三奇偶校验结果和所述第四奇偶校验结果。Determining a 1-bit monitoring code by using an odd parity or an even parity for each monitoring section, obtaining a z-bit monitoring code including the third parity result and the fourth parity in the z-bit monitoring code result.
  22. 如权利要求12-20任一项所述的方法,其特征在于,根据所述第一奇偶校验结果和所述第三奇偶校验结果,以及所述第二奇偶校验结果和所述第四奇偶校验结果,确定所述T个比特块是否存在误码,包括:The method according to any one of claims 12 to 20, wherein the first parity result and the third parity result, and the second parity result and the first And determining, by the four parity results, whether the T bit blocks have an error, including:
    若确定所述第一奇偶校验结果和所述第三奇偶校验结果相同,且所述第二奇偶校验结果和所述第四奇偶校验结果相同,则确定所述T个比特块不存在误码;If it is determined that the first parity result and the third parity result are the same, and the second parity result and the fourth parity result are the same, determining that the T bit blocks are not There is a bit error;
    若确定所述第一奇偶校验结果和所述第三奇偶校验结果不相同,和/或所述第二奇偶校验结果和所述第四奇偶校验结果不相同,则确定所述T个比特块存在误码。Determining the T if it is determined that the first parity result and the third parity result are not the same, and/or the second parity result and the fourth parity result are not the same There are bit errors in the bit blocks.
  23. 如权利要求19所述的方法,其特征在于,接收第一奇偶校验结果和第二奇偶校验结果,包括:The method of claim 19, wherein receiving the first parity result and the second parity result comprises:
    接收第一校验结果集合,所述第一校验结果集合是根据xBIP-y算法计算得到的,所述第一校验结果集合包括的y比特监视码中包括所述第一奇偶校验结果和所述第二奇偶校验结果;Receiving a first check result set, where the first check result set is calculated according to an xBIP-y algorithm, where the first check result set includes a y bit monitor code including the first parity result And the second parity result;
    确定第三奇偶校验结果和第四奇偶校验结果,包括:Determining the third parity result and the fourth parity result, including:
    确定第二校验结果集合,所述第二奇偶校验结果是根据所述xBIP-y算法计算得到的,所述第二校验结果集合包括的y比特监视码中包括所述第三奇偶校验结果和所述第三奇偶校验结果;Determining a second parity result set, the second parity result being calculated according to the xBIP-y algorithm, where the second parity result set includes a third parity check code included in the y-bit monitoring code And the third parity result;
    当接收到第一奇偶校验结果和第二奇偶校验结果时,根据所述第一奇偶校验结果和所述第三奇偶校验结果,以及所述第二奇偶校验结果和所述第四奇偶校验结果,确定所述T个比特块是否存在误码,包括:When receiving the first parity result and the second parity result, according to the first parity result and the third parity result, and the second parity result and the first And determining, by the four parity results, whether the T bit blocks have an error, including:
    根据所述第一校验结果集合和所述第二校验结果集合,确定所述T个比特块是否存在误码。Determining whether the T bit blocks have an error according to the first check result set and the second check result set.
  24. 如权利要求20所述的方法,其特征在于,接收第一奇偶校验结果和第二奇偶校验结果,包括:The method of claim 20, wherein receiving the first parity result and the second parity result comprises:
    接收第一校验结果集合,所述第一校验结果集合是根据flexBIP-z算法计算得到的,所述第一校验结果集合包括的z比特监视码中包括所述第一奇偶校验结果和所述第二奇偶校验结果;Receiving a first check result set, where the first check result set is calculated according to a flexBIP-z algorithm, where the first check result set includes a z-bit monitoring code including the first parity result And the second parity result;
    确定第三奇偶校验结果和第四奇偶校验结果,包括:Determining the third parity result and the fourth parity result, including:
    确定第二校验结果集合,所述第二校验结果集合是根据所述flexBIP-z算法计算得到的,所述第二校验结果集合包括的z比特监视码中包括所述第三奇偶校验结果和所述第四奇偶校验结果;Determining a second set of check results, the second set of check results being calculated according to the flexBIP-z algorithm, where the z-bit monitoring code included in the second set of check results includes the third parity And the fourth parity result;
    当接收到第一奇偶校验结果和第二奇偶校验结果时,根据所述第一奇偶校验结果和所述第三奇偶校验结果,以及所述第二奇偶校验结果和所述第四奇偶校验结果,确定所述T 个比特块是否存在误码,包括:When receiving the first parity result and the second parity result, according to the first parity result and the third parity result, and the second parity result and the first And determining, by the four parity results, whether the T bit blocks have an error, including:
    根据所述第一校验结果集合和所述第二校验结果集合,确定所述T个比特块是否存在误码。Determining whether the T bit blocks have an error according to the first check result set and the second check result set.
  25. 如权利要求23或24所述的方法,其特征在于,根据所述第一校验结果集合和所述第二校验结果集合,确定所述T个比特块是否存在误码,包括:The method according to claim 23 or 24, wherein determining whether the T bit blocks have an error according to the first verification result set and the second verification result set comprises:
    若确定所述第一校验结果集合和所述第二校验结果集合相同,则确定所述T个比特块不存在误码;If it is determined that the first verification result set and the second verification result set are the same, determining that the T bit blocks have no error;
    若确定所述第一校验结果集合和所述第二校验结果集合不相同,则确定所述T个比特块存在误码。If it is determined that the first verification result set and the second verification result set are different, it is determined that the T bit blocks have an error.
  26. 一种比特块流误码检测方法,其特征在于,包括:A bit block stream error detection method, comprising:
    第一设备根据比特块流中起始块中的起始字节和与所述起始块对应的结束块中的结束字节确定被检测区段;Determining, by the first device, the detected segment according to a start byte in the start block in the bit block stream and an end byte in the end block corresponding to the start block;
    所述第一设备根据所述被检测区段计算第一校验结果;The first device calculates a first verification result according to the detected segment;
    所述第一设备发送所述第一校验结果和所述比特块流。The first device sends the first check result and the bit block stream.
  27. 如权利要求26所述的方法,其特征在于,所述比特块流包括至少一个M1/M2比特块;其中,M1表示每个比特块中的净荷比特数,M2表示每个比特块的总比特数,M2-M1表示每个比特块中的首部同步头比特数,M1、M2为正整数,M2>M1。The method of claim 26 wherein said bit block stream comprises at least one M1/M2 bit block; wherein M1 represents the number of payload bits in each bit block and M2 represents the total of each bit block The number of bits, M2-M1, represents the number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
  28. 如权利要求26或27所述的方法,其特征在于,所述第一设备发送所述第一校验结果和所述比特块流,包括:The method of claim 26 or 27, wherein the transmitting, by the first device, the first verification result and the bit block stream comprises:
    所述第一设备发送所述第一校验结果和所述比特块流至第二设备;Transmitting, by the first device, the first verification result and the bit block stream to a second device;
    或者,所述第一设备发送所述第一校验结果至第三设备,发送所述比特块流至所述第二设备。Or the first device sends the first check result to the third device, and sends the bit block stream to the second device.
  29. 如权利要求26-28任一项所述的方法,其特征在于,在所述第一设备将所述第一校验结果和所述比特块流发送至第二设备之前,还包括:The method according to any one of claims 26 to 28, further comprising: before the first device sends the first verification result and the bit block stream to the second device,
    所述第一设备将所述第一校验结果存储于所述结束块,获得更新后的结束块;The first device stores the first verification result in the end block, and obtains an updated end block;
    或者,所述第一设备将所述第一校验结果存储于校验结果存储块,并删除所述比特块流中的任一第一比特块,其中,所述校验结果存储块是指位于所述结束块之前的一个新增块,所述第一比特块是指在所述比特块流的传输过程中可能插入所述比特块流或从所述比特块流中删除的比特块。Or the first device stores the first check result in a check result storage block, and deletes any first bit block in the bit block stream, where the check result storage block refers to A new block located before the end block, the first bit block being a bit block that may be inserted into or deleted from the bit block stream during transmission of the bit block stream.
  30. 如权利要求29所述的方法,其特征在于,所述第一设备将所述第一校验结果存储于所述结束块,获得更新后的结束块,包括:The method of claim 29, wherein the first device stores the first verification result in the end block, and obtains an updated end block, including:
    当所述第一校验结果占用的字节数大于等于目标字节数时,所述第一设备将所述第一校验结果存储于所述结束块中的所述结束字节之前,并根据所述第一校验结果占用的字节数将所述结束字节移至所述结束块后的一个新增块,删除所述比特块流中的任一第一比特块,将所述结束字节移动后所在的新增块作为更新后的结束块;When the number of bytes occupied by the first check result is greater than or equal to the target number of bytes, the first device stores the first check result before the end byte in the end block, and And moving the end byte to a new block after the end block according to the number of bytes occupied by the first check result, deleting any first bit block in the bit block stream, The new block where the end byte is moved is used as the updated end block;
    当所述第一校验结果占用的字节数小于所述目标字节数时,所述第一设备将所述第一校验结果存储于所述结束块中的所述结束字节之前,并根据所述第一校验结果占用的字节数将所述结束字节后移所述第一校验结果占用的字节数,将所述结束字节移动后所在的比特块作为更新后的结束块;When the number of bytes occupied by the first check result is less than the target number of bytes, the first device stores the first check result before the end byte in the end block, And moving the end byte back to the number of bytes occupied by the first check result according to the number of bytes occupied by the first check result, and using the bit block in which the end byte is moved as an update End block
    其中,所述目标字节数为所述结束块中位于所述结束字节后的字节数加1。The target number of bytes is the number of bytes in the end block after the end byte plus one.
  31. 一种比特块流误码检测方法,其特征在于,包括:A bit block stream error detection method, comprising:
    第二设备根据比特块流中起始块中的起始字节和与所述起始块对应的结束块中的结束字节确定被检测区段;The second device determines the detected segment according to a start byte in the start block in the bit block stream and an end byte in the end block corresponding to the start block;
    所述第二设备根据所述被检测区段计算第二校验结果;The second device calculates a second verification result according to the detected segment;
    当所述第二设备接收到第一校验结果时,所述第二设备根据所述第一校验结果与第二校验结果,确定所述被检测区段是否存在误码。When the second device receives the first verification result, the second device determines, according to the first verification result and the second verification result, whether the detected segment has an error.
  32. 如权利要求31所述的方法,其特征在于,所述比特块流包括至少一个M1/M2比特块;其中,M1表示每个比特块中的净荷比特数,M2表示每个比特块的总比特数,M2-M1表示每个比特块中的首部同步头比特数,M1、M2为正整数,M2>M1。The method of claim 31 wherein said bit block stream comprises at least one M1/M2 bit block; wherein M1 represents the number of payload bits in each bit block and M2 represents the total of each bit block The number of bits, M2-M1, represents the number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
  33. 如权利要求31或32所述的方法,其特征在于,第二设备根据比特块流中起始块中的起始字节和与所述起始块对应的结束块中的结束字节确定被检测区段,包括:The method according to claim 31 or 32, wherein the second device determines, according to the start byte in the start block in the bit block stream and the end byte in the end block corresponding to the start block, Detection section, including:
    当所述第二设备接收到第一校验结果,且所述第一校验结果存储于所述结束块时,所述第二设备将所述第二校验结果从所述结束块中删除,获得更新后的结束块,将所述起始块中的起始字节和所述更新后的结束块中的结束字节之间的字节作为被检测区段;When the second device receives the first verification result, and the first verification result is stored in the end block, the second device deletes the second verification result from the end block Obtaining an updated end block, taking a byte between the start byte in the start block and the end byte in the updated end block as a detected segment;
    当所述第二设备接收到第一校验结果,且所述第一校验结果存储于校验结果存储块时,所述第二设备将所述校验结果存储块从所述比特块流中删除,获得更新后的比特块流,将所述更新后的比特块流中所述起始块中的起始字节和所述结束块中的结束字节之间的字节作为被检测区段,其中,所述校验结果存储块位于所述结束块之前;When the second device receives the first verification result, and the first verification result is stored in the verification result storage block, the second device streams the verification result storage block from the bit block Deleting, obtaining an updated bit block stream, detecting, as the detected byte between the start byte in the start block and the end byte in the end block in the updated bit block stream a segment, wherein the check result storage block is located before the end block;
    当所述第二设备未接收到第一校验结果时,所述第二设备将所述比特块流中所述起始块中的起始字节和所述结束块中的结束字节之间的字节作为被检测区段。When the second device does not receive the first check result, the second device sets a start byte in the start block and an end byte in the end block in the bit block stream. Between the bytes as the detected segment.
  34. 如权利要求31-33任一项所述的方法,其特征在于,还包括:The method of any of claims 31-33, further comprising:
    当所述第二设备未接收到第一校验结果时,所述第二设备将所述第二校验结果发送至第三设备,所述第三设备存储有所述第一校验结果。When the second device does not receive the first verification result, the second device sends the second verification result to the third device, where the third device stores the first verification result.
  35. 如权利要求31-34任一项所述的方法,其特征在于,所述第二设备根据所述第一校验结果与第二校验结果,确定所述被检测区段是否存在误码,包括:The method according to any one of claims 31 to 34, wherein the second device determines whether the detected segment has an error according to the first verification result and the second verification result. include:
    所述第二设备若确定所述第一校验结果与第二校验结果相同,则确定所述被检测区段不存在误码;If the second device determines that the first verification result is the same as the second verification result, determining that the detected segment does not have an error;
    若确定所述第一校验结果与第二校验结果不同,则确定所述被检测区段存在误码。If it is determined that the first check result is different from the second check result, it is determined that the detected segment has an error.
  36. 如权利要求33所述的方法,其特征在于,所述第二设备将所述第一校验结果从所述结束块中删除,获得更新后的结束块,包括:The method according to claim 33, wherein the second device deletes the first verification result from the end block to obtain an updated end block, including:
    当所述第一校验结果占用的字节数大于等于目标字节数时,所述第二设备根据所述第一校验结果占用的字节数将所述结束字节移至所述结束块前的一个比特块,在所述比特块流中新增一个第一比特块,将所述结束字节移动后所在的比特块作为更新后的结束块;When the number of bytes occupied by the first check result is greater than or equal to the target number of bytes, the second device moves the end byte to the end according to the number of bytes occupied by the first check result. a bit block in front of the block, adding a first bit block to the bit block stream, and using the bit block in which the end byte is moved as an updated end block;
    当所述第一校验结果占用的字节数小于所述目标字节数时,所述第二设备根据所述第一校验结果占用的字节数将所述结束字节前移所述第一校验结果占用的字节数,将所述结束字节移动后所在的比特块作为更新后的结束块;When the number of bytes occupied by the first check result is less than the target number of bytes, the second device advances the end byte according to the number of bytes occupied by the first check result. The number of bytes occupied by the first check result, and the bit block in which the end byte is moved is used as the updated end block;
    其中,所述目标字节数为所述结束块中位于所述结束字节前的字节数加1。The target number of bytes is the number of bytes in the end block before the end byte plus one.
  37. 一种比特块流误码检测设备,其特征在于,包括:A bit block stream error detecting device, comprising:
    收发器,用于发送第一边界比特块,所述第一边界比特块用于区别后续发送的N个比特块,N为正整数;依次发送第I比特块,I为大于等于1小于等于N的整数;The transceiver is configured to send a first boundary bit block, where the first boundary bit block is used to distinguish the N bit blocks that are subsequently sent, and N is a positive integer; the first bit block is sequentially sent, and I is greater than or equal to 1 and less than or equal to N. Integer
    处理器,用于确定第一奇偶校验结果和第二奇偶校验结果,所述第一奇偶校验结果的校验对象包括所述N个比特块中每个比特块的连续的m个比特,所述第二奇偶校验结果的校验对象包括所述N个比特块中每个比特块的连续的n个比特,m、n中的至少一个大于等于2;a processor, configured to determine a first parity result and a second parity result, where the check object of the first parity result includes consecutive m bits of each of the N bit blocks The check object of the second parity result includes consecutive n bits of each of the N bit blocks, at least one of m and n being greater than or equal to 2;
    所述收发器,还用于发送第二边界比特块、所述第一奇偶校验结果和所述第二奇偶校验结果,所述第二边界比特块用于区别已经发送完成的所述N个比特块。The transceiver is further configured to send a second boundary bit block, the first parity result, and the second parity result, where the second boundary bit block is used to distinguish the N that has been sent Bit blocks.
  38. 如权利要求37所述的设备,其特征在于,所述第一奇偶校验结果的校验对象还包括所述第一边界比特块的连续的m个比特,所述第二奇偶校验结果的校验对象还包括所述第一边界比特块的连续的n个比特。The device according to claim 37, wherein the check object of the first parity result further comprises consecutive m bits of the first boundary bit block, the second parity result The check object also includes consecutive n bits of the first boundary bit block.
  39. 如权利要求37或38所述的设备,其特征在于,所述第一奇偶校验结果的校验对象还包括所述第二边界比特块的连续的m个比特,所述第二奇偶校验结果的校验对象还包括所述第二边界比特块的连续的n个比特。The apparatus according to claim 37 or 38, wherein the check object of the first parity result further comprises consecutive m bits of the second boundary bit block, the second parity The resulting check object also includes consecutive n bits of the second boundary bit block.
  40. 如权利要求37所述的设备,其特征在于,每个比特块的类型为M1/M2比特块,其中,M1表示每个比特块中的净荷比特数,M2表示每个比特块的总比特数,M2-M1表示每个比特块中的首部同步头比特数,M1、M2为正整数,M2>M1。The apparatus according to claim 37, wherein each type of the bit block is an M1/M2 bit block, wherein M1 represents the number of payload bits in each bit block, and M2 represents the total bit of each bit block. The number, M2-M1, represents the number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
  41. 如权利要求37-40所述的设备,其特征在于,所述收发器,用于:The device of any of claims 37-40, wherein said transceiver is for:
    发送第一边界比特块至第一设备;Transmitting a first boundary bit block to the first device;
    依次发送第I比特块至所述第一设备;Transmitting the first bit block to the first device in sequence;
    发送第二边界比特块、所述第一奇偶校验结果和所述第二奇偶校验结果至所述第一设备;Transmitting a second boundary bit block, the first parity result, and the second parity result to the first device;
    或者,发送第二边界比特块至所述第一设备,发送所述第一奇偶校验结果和所述第二奇偶校验结果至第二设备。Or sending a second boundary bit block to the first device, and sending the first parity result and the second parity result to the second device.
  42. 如权利要求37-41任一项所述的设备,其特征在于,所述收发器,用于:The device according to any one of claims 37 to 41, wherein the transceiver is configured to:
    在第一时刻发送第二边界比特块,在第二时刻发送第一奇偶校验结果和第二奇偶校验结果,其中,所述第一时刻早于所述第二时刻,或所述第一时刻晚于所述第二时刻,所述第一时刻等于所述第二时刻。Transmitting a second boundary bit block at a first time, and transmitting a first parity result and a second parity result at a second time, wherein the first time is earlier than the second time, or the first The time is later than the second time, the first time is equal to the second time.
  43. 如权利要求37-41任一项所述的设备,其特征在于,所述第一奇偶校验结果和所述第二奇偶校验结果存储于所述第二边界比特块中。The apparatus of any of claims 37-41, wherein the first parity result and the second parity result are stored in the second boundary bit block.
  44. 如权利要求37-43任一项所述的设备,其特征在于,所述第一奇偶校验结果和所述第二奇偶校验结果是根据预设校验算法计算得到的,所述预设校验算法用于当所述N个比特块中增加或减少第一比特块时不改变所述第一奇偶校验结果和所述第二奇偶校验结果,所述第一比特块是指在所述N个比特块的传输过程中可能插入所述N个比特块或从所述N个比特块中删除的比特块。The device according to any one of claims 37 to 43, wherein the first parity result and the second parity result are calculated according to a preset check algorithm, the preset a check algorithm for not changing the first parity result and the second parity result when the first bit block is added or decreased in the N bit blocks, where the first bit block refers to The N bit blocks or bit blocks deleted from the N bit blocks may be inserted during transmission of the N bit blocks.
  45. 如权利要求43所述的设备,其特征在于,所述预设校验算法为xBIP-y算法,其中,x是指连续比特交织的比特数,x是根据所述第一比特块的码型定义确定的,y是指监视区段的个数,x,y为正整数,y≥2;The device according to claim 43, wherein the preset check algorithm is an xBIP-y algorithm, wherein x is a number of bits of consecutive bit interleaving, and x is a pattern according to the first bit block Defining the definition, y refers to the number of monitoring segments, x, y is a positive integer, y ≥ 2;
    所述处理器,用于从所述N个比特块中的第1净荷比特开始,将每个比特块的每x个连续比特依次记录至第1个监视区段至第y个监视区段;The processor, for starting from the first payload bit of the N bit blocks, sequentially recording every x consecutive bits of each bit block to the first monitoring segment to the yth monitoring segment ;
    针对每个监视区段采用奇校验或偶校验确定1比特监视码,获得y比特监视码,所述y比特监视码中包括所述第一奇偶校验结果和所述第二奇偶校验结果。Determining a 1-bit monitoring code by using an odd or even parity for each monitoring section, obtaining a y-bit monitoring code, the y-bit monitoring code including the first parity result and the second parity result.
  46. 如权利要求43所述的设备,其特征在于,所述预设校验算法为flexBIP-z算法,其中,z是指监视区段的个数,每个监视区段对应的连续比特交织的比特数不全相同,z个监视区段分别对应的连续比特交织的比特数为A1、A2、A3……Az-1,Az,A1、A2、A3……Az-1,Az,z为正整数,z≥2;The device according to claim 43, wherein the preset check algorithm is a flexBIP-z algorithm, where z is the number of monitored segments, and consecutive bit interleaved bits corresponding to each monitored segment The number of consecutive bit interleaving corresponding to z monitoring sections is A1, A2, A3, ... Az-1, Az, A1, A2, A3, ..., Az-1, Az, z are positive integers. Z≥2;
    所述处理器,用于从所述N个比特块中的第1净荷比特开始,将每个比特块中的A1个连续比特记录至第1个监视区段,将所述A1个连续比特后的A2个连续比特记录至第2个监视区段,将所述A2个连续比特后的A3个连续比特记录至第3个监视区段,直至将所述Az-1个连续比特后的Az个连续比特记录至第z个监视区段;The processor, configured to record, according to a first payload bit of the N bit blocks, A1 consecutive bits in each bit block to a first monitoring segment, where the A1 consecutive bits The last A2 consecutive bits are recorded to the second monitoring segment, and the A3 consecutive bits after the A2 consecutive bits are recorded to the third monitoring segment until the Az-1 consecutive bits are followed by Az. Continuous bits are recorded to the zth monitoring section;
    针对每个监视区段采用奇校验或偶校验确定1比特监视码,获得z比特监视码,所述z比特监视码中包括所述第一奇偶校验结果和所述第二奇偶校验结果。Determining a 1-bit monitoring code by using an odd or even parity for each monitoring section, obtaining a z-bit monitoring code, the z-bit monitoring code including the first parity result and the second parity result.
  47. 如权利要求45或46所述的设备,其特征在于,所述处理器,用于:The device according to claim 45 or 46, wherein the processor is configured to:
    确定第一校验结果集合,所述第一校验结果集合包括所述y比特监视码,或者,所述第一校验结果集合包括所述z比特监视码;Determining a first verification result set, the first verification result set includes the y-bit monitoring code, or the first verification result set includes the z-bit monitoring code;
    所述收发器,用于:The transceiver is configured to:
    发送所述第一校验结果集合。Sending the first set of verification results.
  48. 一种比特块流误码检测设备,其特征在于,包括:A bit block stream error detecting device, comprising:
    收发器,用于接收第一边界比特块,所述第一边界比特块用于区别后续接收的T个比特块,T为正整数;依次接收第I比特块,I为大于等于1小于等于T的整数;接收第二边界比特块,所述第二边界比特块用于区别已经接收完成的所述T个比特块;a transceiver, configured to receive a first boundary bit block, where the first boundary bit block is used to distinguish T bits that are subsequently received, T is a positive integer; and the first bit block is sequentially received, where I is greater than or equal to 1 and less than or equal to T An integer that receives a second boundary bit block, the second boundary bit block being used to distinguish the T bit blocks that have been received;
    处理器,用于确定第三奇偶校验结果和第四奇偶校验结果,所述第三奇偶校验结果的校验对象包括所述T个比特块中每个比特块的连续的m个比特,所述第四奇偶校验结果的校验对象包括所述T个比特块中每个比特块的连续的n个比特,m、n中的至少一个大于等于2;当通过所述收发器接收到第一奇偶校验结果和第二奇偶校验结果时,根据所述第一奇偶校验结果和所述第三奇偶校验结果,以及所述第二奇偶校验结果和所述第四奇偶校验结果,确定所述T个比特块是否存在误码,其中,所述第一奇偶校验结果的校验对象包括N个比特块中每个比特块的连续的m个比特,所述第二奇偶校验结果的校验对象包括所述N个比特块中每个比特块的连续的n个比特,N为确定所述第一奇偶校验结果和所述第二奇偶校验结果时所述第一边界比特块和所述第二边界比特块之间的比特块的数目。a processor, configured to determine a third parity result and a fourth parity result, where the check object of the third parity result includes consecutive m bits of each of the T bit blocks The check object of the fourth parity result includes consecutive n bits of each of the T bit blocks, at least one of m, n being greater than or equal to 2; when received by the transceiver And the first parity result and the third parity result, and the second parity result and the fourth parity according to the first parity result and the second parity result a check result, determining whether the T bit block has an error, wherein the check object of the first parity result includes consecutive m bits of each of the N bit blocks, the The check object of the second parity result includes consecutive n bits of each of the N bit blocks, where N is the result of determining the first parity result and the second parity result a bit between the first boundary bit block and the second boundary bit block The number of blocks.
  49. 如权利要求48所述的设备,其特征在于,所述收发器还用于:The device of claim 48, wherein the transceiver is further configured to:
    当未接收到第一奇偶校验结果和第二奇偶校验结果时,发送所述第三奇偶校验结果和所述第四奇偶校验结果至第二设备,所述第二设备存储有所述第一奇偶校验结果和所述第二奇偶校验结果。Transmitting the third parity result and the fourth parity result to a second device when the first parity result and the second parity result are not received, where the second device stores The first parity result and the second parity result are described.
  50. 如权利要求48所述的设备,其特征在于,所述第三奇偶校验结果的校验对象还包括所述第一边界比特块的连续的m个比特,所述第四奇偶校验结果的校验对象还包括所述第一边界比特块的n个比特;所述第一奇偶校验结果的校验对象还包括所述第一边界比特块的连续的m个比特,所述第二奇偶校验结果的校验对象还包括所述第一边界比特块的连续的n个比特。The device according to claim 48, wherein the check object of the third parity result further comprises consecutive m bits of the first boundary bit block, the fourth parity result The check object further includes n bits of the first boundary bit block; the check object of the first parity result further includes consecutive m bits of the first boundary bit block, the second parity The check object of the check result further includes consecutive n bits of the first boundary bit block.
  51. 如权利要求48或50所述的设备,其特征在于,所述第三奇偶校验结果的校验对象还包括所述第二边界比特块的连续的m个比特,所述第四奇偶校验结果的校验对象还包括所述第二边界比特块的n个比特;所述第一奇偶校验结果的校验对象还包括所述第二边 界比特块的连续的m个比特,所述第二奇偶校验结果的校验对象还包括所述第二边界比特块的连续的n个比特。The apparatus according to claim 48 or 50, wherein the check object of the third parity result further comprises consecutive m bits of the second boundary bit block, the fourth parity The resulting check object further includes n bits of the second boundary bit block; the check object of the first parity result further includes consecutive m bits of the second boundary bit block, the first The check object of the second parity result further includes consecutive n bits of the second boundary bit block.
  52. 如权利要求48-51所述的设备,其特征在于,每个比特块的类型为M1/M2比特块,其中,M1表示每个比特块中的净荷比特数,M2表示每个比特块的总比特数,M2-M1表示每个比特块中的首部同步头比特数,M1、M2为正整数,M2>M1。The apparatus according to claims 48-51, wherein the type of each bit block is an M1/M2 bit block, wherein M1 represents the number of payload bits in each bit block, and M2 represents the block number of each bit block. The total number of bits, M2-M1, represents the number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
  53. 如权利要求48-52任一项所述的设备,其特征在于,所述收发器用于:The device of any of claims 48-52, wherein the transceiver is for:
    在第一时刻接收第二边界比特块;Receiving a second boundary bit block at a first time;
    在第二时刻接收第一奇偶校验结果和第二奇偶校验结果,其中,所述第一时刻早于所述第二时刻,或所述第一时刻晚于所述第二时刻,所述第一时刻等于所述第二时刻。Receiving, at a second time, a first parity result and a second parity result, wherein the first time is earlier than the second time, or the first time is later than the second time, The first moment is equal to the second moment.
  54. 如权利要求48-53任一项所述的设备,其特征在于,所述第一奇偶校验结果和所述第二奇偶校验结果存储于所述第二边界比特块中。The apparatus of any of claims 48-53, wherein the first parity result and the second parity result are stored in the second boundary bit block.
  55. 如权利要求48-54任一项所述的设备,其特征在于,所述第三奇偶校验结果和所述第四奇偶校验结果是根据预设校验算法计算得到的,所述预设校验算法用于当所述T个比特块中增加或减少第一比特块时不改变所述第三奇偶校验结果和所述第四奇偶校验结果,所述第一比特块是指在所述T个比特块的传输过程中可能插入所述T个比特块或从所述T个比特块中删除的比特块。The device according to any one of claims 48 to 54, wherein the third parity result and the fourth parity result are calculated according to a preset check algorithm, the preset a check algorithm for not changing the third parity result and the fourth parity result when the first bit block is added or decreased in the T bit blocks, where the first bit block refers to The T bit blocks or bit blocks deleted from the T bit blocks may be inserted during transmission of the T bit blocks.
  56. 如权利55所述的设备,其特征在于,所述预设校验算法为xBIP-y算法,其中,x是指连续比特交织的比特数,x是根据所述第一比特块的码型定义确定的,y是指监视区段的个数,x,y为正整数,y≥2;The device according to claim 55, wherein the preset check algorithm is an xBIP-y algorithm, wherein x is a number of bits of consecutive bit interleaving, and x is a code type definition according to the first bit block Determined, y refers to the number of monitored segments, x, y is a positive integer, y ≥ 2;
    所述处理器,用于从所述T个比特块中的第1净荷比特开始,将每个比特块的每x个连续比特依次记录至第1个监视区段至第y个监视区段;The processor, for starting from the first payload bit of the T bit blocks, sequentially recording each x consecutive bits of each bit block to the first monitoring segment to the yth monitoring segment ;
    针对每个监视区段采用奇校验或偶校验确定1比特监视码,获得y比特监视码,所述y比特监视码中包括所述第三奇偶校验结果和所述第四奇偶校验结果。Determining a 1-bit monitoring code by using an odd or even parity for each monitoring section, obtaining a y-bit monitoring code, wherein the y-bit monitoring code includes the third parity result and the fourth parity result.
  57. 如权利要求55所述的设备,其特征在于,所述预设校验算法为flexBIP-z算法,其中,z是指监视区段的个数,每个监视区段对应的连续比特交织的比特数不全相同,z个监视区段分别对应的连续比特交织的比特数为A1、A2、A3……Az-1,Az,A1、A2、A3……Az-1,Az,z为正整数,z≥2;The device according to claim 55, wherein the preset check algorithm is a flexBIP-z algorithm, wherein z is a number of monitored segments, and consecutive bit-interleaved bits corresponding to each monitored segment The number of consecutive bit interleaving corresponding to z monitoring sections is A1, A2, A3, ... Az-1, Az, A1, A2, A3, ..., Az-1, Az, z are positive integers. Z≥2;
    所述处理器,用于从所述T个比特块中的第1净荷比特开始,将每个比特块的A1个连续比特记录至第1个监视区段,将所述A1个连续比特后的A2个连续比特记录至第2个监视区段,将所述A2个连续比特后的A3个连续比特记录至第3个监视区段,直至将所述Az-1个连续比特后的Az个连续比特记录至第z个监视区段;The processor is configured to record, according to a first payload bit of the T bit blocks, A1 consecutive bits of each bit block to a first monitoring segment, and after the A1 consecutive bits A2 consecutive bits are recorded to the second monitoring segment, and A3 consecutive bits after the A2 consecutive bits are recorded to the third monitoring segment until Az-1 consecutive bits are Az Continuous bits are recorded to the zth monitoring section;
    针对每个监视区段采用奇校验或偶校验确定1比特监视码,获得z比特监视码,所述z比特监视码中包括所述第三奇偶校验结果和所述第四奇偶校验结果。Determining a 1-bit monitoring code by using an odd parity or an even parity for each monitoring section, obtaining a z-bit monitoring code including the third parity result and the fourth parity in the z-bit monitoring code result.
  58. 如权利要求58-57任一项所述的设备,其特征在于,所述处理器,用于:The device of any of claims 58-57, wherein the processor is configured to:
    若确定所述第一奇偶校验结果和所述第三奇偶校验结果相同,且所述第二奇偶校验结果和所述第四奇偶校验结果相同,则确定所述T个比特块不存在误码;If it is determined that the first parity result and the third parity result are the same, and the second parity result and the fourth parity result are the same, determining that the T bit blocks are not There is a bit error;
    若确定所述第一奇偶校验结果和所述第三奇偶校验结果不相同,和/或所述第二奇偶校验结果和所述第四奇偶校验结果不相同,则确定所述T个比特块存在误码。Determining the T if it is determined that the first parity result and the third parity result are not the same, and/or the second parity result and the fourth parity result are not the same There are bit errors in the bit blocks.
  59. 如权利要求56所述的设备,其特征在于,所述收发器,用于:The device of claim 56, wherein said transceiver is for:
    接收第一校验结果集合,所述第一校验结果集合是根据xBIP-y算法计算得到的, 所述第一校验结果集合包括的y比特监视码中包括所述第一奇偶校验结果和所述第二奇偶校验结果;Receiving a first check result set, where the first check result set is calculated according to an xBIP-y algorithm, where the first check result set includes a y-bit monitoring code including the first parity result And the second parity result;
    所述处理器,用于:确定第二校验结果集合,所述第二奇偶校验结果是根据所述xBIP-y算法计算得到的,所述第二校验结果集合包括的y比特监视码中包括所述第三奇偶校验结果和所述第三奇偶校验结果;根据所述第一校验结果集合和所述第二校验结果集合,确定所述T个比特块是否存在误码。The processor is configured to: determine a second verification result set, where the second parity result is calculated according to the xBIP-y algorithm, and the second verification result set includes a y-bit monitoring code Include the third parity result and the third parity result; determining, according to the first verification result set and the second verification result set, whether the T bit block has a bit error .
  60. 如权利要求57所述的设备,其特征在于,所述收发器,用于:The device according to claim 57, wherein said transceiver is configured to:
    接收第一校验结果集合,所述第一校验结果集合是根据flexBIP-z算法计算得到的,所述第一校验结果集合包括的z比特监视码中包括所述第一奇偶校验结果和所述第二奇偶校验结果;Receiving a first check result set, where the first check result set is calculated according to a flexBIP-z algorithm, where the first check result set includes a z-bit monitoring code including the first parity result And the second parity result;
    所述处理器,用于:确定第二校验结果集合,所述第二校验结果集合是根据所述flexBIP-z算法计算得到的,所述第二校验结果集合包括的z比特监视码中包括所述第三奇偶校验结果和所述第四奇偶校验结果;根据所述第一校验结果集合和所述第二校验结果集合,确定所述T个比特块是否存在误码。The processor is configured to: determine a second verification result set, where the second verification result set is calculated according to the flexBIP-z algorithm, and the second verification result set includes a z-bit monitoring code Include the third parity result and the fourth parity result; determining, according to the first verification result set and the second verification result set, whether the T bit block has an error .
  61. 如权利要求59或60所述的设备,其特征在于,所述处理器,用于:The device according to claim 59 or 60, wherein the processor is configured to:
    若确定所述第一校验结果集合和所述第二校验结果集合相同,则确定所述T个比特块不存在误码;If it is determined that the first verification result set and the second verification result set are the same, determining that the T bit blocks have no error;
    若确定所述第一校验结果集合和所述第二校验结果集合不相同,则确定所述T个比特块存在误码。If it is determined that the first verification result set and the second verification result set are different, it is determined that the T bit blocks have an error.
  62. 一种比特块流误码检测设备,其特征在于,包括:A bit block stream error detecting device, comprising:
    处理器,用于根据比特块流中起始块中的起始字节和与所述起始块对应的结束块中的结束字节确定被检测区段;根据所述被检测区段计算第一校验结果;a processor, configured to determine, according to a start byte in a start block in a bit block stream and an end byte in an end block corresponding to the start block, a detected segment according to the detected segment; a check result;
    收发器,用于发送所述第一校验结果和所述比特块流。And a transceiver, configured to send the first verification result and the bit block stream.
  63. 如权利要求62所述的设备,其特征在于,所述比特块流包括至少一个M1/M2比特块;其中,M1表示每个比特块中的净荷比特数,M2表示每个比特块的总比特数,M2-M1表示每个比特块中的首部同步头比特数,M1、M2为正整数,M2>M1。The apparatus according to claim 62, wherein said bit block stream comprises at least one M1/M2 bit block; wherein M1 represents the number of payload bits in each bit block, and M2 represents the total of each bit block The number of bits, M2-M1, represents the number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
  64. 如权利要求62或63所述的设备,其特征在于,所述收发器,用于:The device according to claim 62 or 63, wherein the transceiver is configured to:
    发送所述第一校验结果和所述比特块流至第二设备;Transmitting the first verification result and the bit block to the second device;
    或者,发送所述第一校验结果至第三设备,发送所述比特块流至所述第二设备;Or sending the first verification result to the third device, and sending the bit block flow to the second device;
  65. 如权利要求62-64任一项所述的设备,其特征在于,所述处理器,还用于:The device according to any one of claims 62 to 64, wherein the processor is further configured to:
    在所述收发器将所述第一校验结果和所述比特块流发送至第二设备之前,将所述第一校验结果存储于所述结束块,获得更新后的结束块;或者,将所述第一校验结果存储于校验结果存储块,并删除所述比特块流中的任一第一比特块,其中,所述校验结果存储块是指位于所述结束块之前的一个新增块,所述第一比特块是指在所述比特块流的传输过程中可能插入所述比特块流或从所述比特块流中删除的比特块。Before the transceiver sends the first verification result and the bit block stream to the second device, storing the first verification result in the end block to obtain an updated end block; or Storing the first check result in a check result storage block, and deleting any first bit block in the bit block stream, where the check result storage block refers to being located before the end block A new block, the first bit block being a bit block that may be inserted into or deleted from the bit block stream during transmission of the bit block stream.
  66. 如权利要求65所述的设备,其特征在于,所述处理器,用于:The device according to claim 65, wherein said processor is configured to:
    当所述第一校验结果占用的字节数大于等于目标字节数时,将所述第一校验结果存储于所述结束块中的所述结束字节之前,并根据所述第一校验结果占用的字节数将所述结束字节移至所述结束块后的一个新增块,删除所述比特块流中的任一第一比特块,将所述结束字节移动后所在的新增块作为更新后的结束块;When the number of bytes occupied by the first verification result is greater than or equal to the target number of bytes, storing the first verification result before the end byte in the end block, and according to the first The number of bytes occupied by the verification result moves the end byte to a new block after the end block, deletes any first bit block in the bit block stream, and moves the end byte The new block is located as the updated end block;
    当所述第一校验结果占用的字节数小于所述目标字节数时,将所述第一校验结果存储于所述结束块中的所述结束字节之前,并根据所述第一校验结果占用的字节数将所述结束字节后移所述第一校验结果占用的字节数,将所述结束字节移动后所在的比特块作为更新后的结束块;When the number of bytes occupied by the first verification result is less than the target number of bytes, storing the first verification result before the end byte in the end block, and according to the The number of bytes occupied by a check result shifts the end byte back by the number of bytes occupied by the first check result, and the bit block where the end byte is moved is used as the updated end block;
    其中,所述目标字节数为所述结束块中位于所述结束字节后的字节数加1。The target number of bytes is the number of bytes in the end block after the end byte plus one.
  67. 一种比特块流误码检测设备,其特征在于,包括:A bit block stream error detecting device, comprising:
    处理器,用于根据比特块流中起始块中的起始字节和与所述起始块对应的结束块中的结束字节确定被检测区段;根据所述被检测区段计算第二校验结果;a processor, configured to determine, according to a start byte in a start block in a bit block stream and an end byte in an end block corresponding to the start block, a detected segment according to the detected segment; Second check result;
    当通过收发器接收到第一校验结果时,根据所述第一校验结果与第二校验结果,确定所述被检测区段是否存在误码。When receiving the first verification result by the transceiver, determining, according to the first verification result and the second verification result, whether the detected segment has an error.
  68. 如权利要求67所述的设备,其特征在于,所述比特块流包括至少一个M1/M2比特块;其中,M1表示每个比特块中的净荷比特数,M2表示每个比特块的总比特数,M2-M1表示每个比特块中的首部同步头比特数,M1、M2为正整数,M2>M1。The apparatus according to claim 67, wherein said bit block stream comprises at least one M1/M2 bit block; wherein M1 represents the number of payload bits in each bit block, and M2 represents the total of each bit block The number of bits, M2-M1, represents the number of header sync header bits in each bit block, M1, M2 are positive integers, M2>M1.
  69. 如权利要求67或68所述的设备,其特征在于,所述处理器,用于The device according to claim 67 or 68, wherein said processor is for
    当通过收发器接收到第一校验结果,且所述第一校验结果存储于所述结束块时,将所述第二校验结果从所述结束块中删除,获得更新后的结束块,将所述起始块中的起始字节和所述更新后的结束块中的结束字节之间的字节作为被检测区段;When the first check result is received by the transceiver, and the first check result is stored in the end block, the second check result is deleted from the end block, and the updated end block is obtained. a byte between the start byte in the start block and the end byte in the updated end block as a detected segment;
    当通过收发器接收到第一校验结果,且所述第一校验结果存储于校验结果存储块时,将所述校验结果存储块从所述比特块流中删除,获得更新后的比特块流,将所述更新后的比特块流中所述起始块中的起始字节和所述结束块中的结束字节之间的字节作为被检测区段,其中,所述校验结果存储块位于所述结束块之前;When the first verification result is received by the transceiver, and the first verification result is stored in the verification result storage block, the verification result storage block is deleted from the bit block stream, and the updated a bit block stream, the byte between the start byte in the start block and the end byte in the end block in the updated bit block stream is used as a detected segment, wherein a check result storage block is located before the end block;
    当未接收到第一校验结果时,将所述比特块流中所述起始块中的起始字节和所述结束块中的结束字节之间的字节作为被检测区段。When the first check result is not received, a byte between the start byte in the start block and the end byte in the end block in the bit block stream is taken as the detected segment.
  70. 如权利要求67-69任一项所述的设备,其特征在于,所述收发器还用于:The device of any of claims 67-69, wherein the transceiver is further configured to:
    当未接收到第一校验结果时,将所述第二校验结果发送至第三设备,所述第三设备存储有所述第一校验结果。When the first verification result is not received, the second verification result is sent to the third device, and the third device stores the first verification result.
  71. 如权利要求67-70任一项所述的设备,其特征在于,所述处理器,用于:The device according to any one of claims 67 to 70, wherein the processor is configured to:
    若确定所述第一校验结果与第二校验结果相同,则确定所述被检测区段不存在误码;If it is determined that the first verification result is the same as the second verification result, determining that the detected segment does not have an error;
    若确定所述第一校验结果与第二校验结果不同,则确定所述被检测区段存在误码。If it is determined that the first check result is different from the second check result, it is determined that the detected segment has an error.
  72. 如权利要求69所述的设备,其特征在于,所述处理器,用于:The device according to claim 69, wherein said processor is configured to:
    当所述第一校验结果占用的字节数大于等于目标字节数时,根据所述第一校验结果占用的字节数将所述结束字节移至所述结束块前的一个比特块,在所述比特块流中新增一个第一比特块,将所述结束字节移动后所在的比特块作为更新后的结束块;When the number of bytes occupied by the first check result is greater than or equal to the target number of bytes, moving the end byte to a bit before the end block according to the number of bytes occupied by the first check result Block, adding a first bit block to the bit block stream, and using the bit block in which the end byte is moved as an updated end block;
    当所述第一校验结果占用的字节数小于所述目标字节数时,根据所述第一校验结果占用的字节数将所述结束字节前移所述第一校验结果占用的字节数,将所述结束字节移动后所在的比特块作为更新后的结束块;When the number of bytes occupied by the first check result is less than the target number of bytes, the end byte is forwarded by the first check result according to the number of bytes occupied by the first check result The number of bytes occupied, the bit block in which the end byte is moved is used as the updated end block;
    其中,所述目标字节数为所述结束块中位于所述结束字节前的字节数加1。The target number of bytes is the number of bytes in the end block before the end byte plus one.
PCT/CN2018/086326 2017-05-24 2018-05-10 Code error detection method and device for bit block stream WO2018214743A1 (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
EP18806648.4A EP3637650A4 (en) 2017-05-24 2018-05-10 Code error detection method and device for bit block stream
KR1020197037429A KR102268902B1 (en) 2017-05-24 2018-05-10 Code error detection method and device for bit block stream
JP2019564840A JP7047233B2 (en) 2017-05-24 2018-05-10 Bit blockstream Bit error detection method and device
EP23213598.8A EP4351005A2 (en) 2017-05-24 2018-05-10 Bit block stream bit error detection method and device
US16/692,151 US10992315B2 (en) 2017-05-24 2019-11-22 Bit block stream bit error detection method and device
US17/240,321 US11463104B2 (en) 2017-05-24 2021-04-26 Bit block stream bit error detection method and device

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN201710374518.5 2017-05-24
CN201710374518 2017-05-24
CN201710764932.7A CN108964837B (en) 2017-05-24 2017-08-30 Method and device for receiving and transmitting bit block stream
CN201710764932.7 2017-08-30

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/692,151 Continuation US10992315B2 (en) 2017-05-24 2019-11-22 Bit block stream bit error detection method and device

Publications (1)

Publication Number Publication Date
WO2018214743A1 true WO2018214743A1 (en) 2018-11-29

Family

ID=64396206

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/086326 WO2018214743A1 (en) 2017-05-24 2018-05-10 Code error detection method and device for bit block stream

Country Status (1)

Country Link
WO (1) WO2018214743A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005053215A1 (en) * 2003-11-28 2005-06-09 Samsung Electronics Co., Ltd. Error correction method and apparatus for low density parity check
US20150256206A1 (en) * 2014-03-06 2015-09-10 Fujitsu Limited Error detection device and error detecting method
CN106375151A (en) * 2016-08-31 2017-02-01 北京信而泰科技股份有限公司 Ethernet error code test method and system
CN106411511A (en) * 2016-11-18 2017-02-15 浙江神州量子网络科技有限公司 Multiparty quantum key distribution system error correction method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005053215A1 (en) * 2003-11-28 2005-06-09 Samsung Electronics Co., Ltd. Error correction method and apparatus for low density parity check
US20150256206A1 (en) * 2014-03-06 2015-09-10 Fujitsu Limited Error detection device and error detecting method
CN106375151A (en) * 2016-08-31 2017-02-01 北京信而泰科技股份有限公司 Ethernet error code test method and system
CN106411511A (en) * 2016-11-18 2017-02-15 浙江神州量子网络科技有限公司 Multiparty quantum key distribution system error correction method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3637650A4 *

Similar Documents

Publication Publication Date Title
JP7047233B2 (en) Bit blockstream Bit error detection method and device
US11316802B2 (en) Time transfer systems and methods over a stream of Ethernet blocks
CN108123813B (en) Transmission method and device for operation, administration and maintenance OAM data
US11082199B2 (en) Data transmission method in optical network and optical network device
US8705570B2 (en) Communication device and communication method
CN109391461B (en) Method and equipment for transparently transmitting service frequency
KR102324923B1 (en) Detection block sending and receiving method, network device and system
CN112511266A (en) Transmission method, detection method and device, acquisition method, network equipment and system
EP3876443A1 (en) Service sending method and apparatus, service receiving method and apparatus, and system and storage medium
US7586950B1 (en) Remote management interface
EP4160956A1 (en) Method and apparatus for determining code block loss
KR102309444B1 (en) Data encapsulation, transmission methods, devices and computer storage media
WO2019015462A1 (en) Method for sending detection block and method for receiving detection block, and network device and system
WO2018214743A1 (en) Code error detection method and device for bit block stream
US10771178B2 (en) Method for sending and receiving optical transport network (OTN) signal, OTN device, and system
WO2021218721A1 (en) Service processing method and apparatus
WO2020108392A1 (en) Service bit stream processing method and apparatus
CN112751645A (en) Communication method, device and storage medium
WO2024001230A1 (en) Bearing method, communication equipment and storage medium
WO2010043128A1 (en) Method and device for transmitting and receiving mapping overheads
ITMI951607A1 (en) DEVICE AND METHOD FOR IMPLEMENTING ATM ADAPTATION LEVEL PROTOCOL FUNCTIONS (AAL) IN A NETWORK
CN113726475A (en) Code block processing method and device
JPS62159933A (en) Frame synchronizing detection circuit

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18806648

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2019564840

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2018806648

Country of ref document: EP

Effective date: 20191206

ENP Entry into the national phase

Ref document number: 20197037429

Country of ref document: KR

Kind code of ref document: A