A method for sub-network connection protection via serial monitoring function

A technology of subnet and function, applied in the field of optical communication, can solve the problems of normal service impact of H subnet, unsteady service, frequent service switching, etc.

Active Publication Date: 2009-12-16
ZTE CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the B subnet signal is valid at this time, and the A subnet receives an invalid signal entering the source AU, the A subnet source will automatically generate a valid pointer after receiving the invalid signal, and send a TC-IAIS signal to the C subnet; but if the C subnet does not support the source-sink function, the received N1 or N2 bytes are only passed through, and TC-IAIS is not a condition for triggering subnet connection protection switching; such a When the C subnet comes to the C subnet, the TC-IAIS information given by the A subnet cannot be switched, that is, the service cannot be switched to the effective signal from the B subnet, resulting in service interruption; and, the service arriving at the H subnet will be Always carry TC-IAIS information, which will affect the normal business of the H subnet
[0007] Because the above situation will cause business interruption, it is necessary to find a way to avoid
If the mode that does not support the function of the source and sink is made to support the processing of TC-IAIS through some means (such as software), that is, the subnet that does not support the function of the source and sink is forced to process the signal with TC-IAIS information. If the function of subnet connection protection switchover is generated automatically, after the subnet connection protection is configured on the subnet, if the subnet that does not use the TCM function continuously receives N1 or N2 bytes, it may randomly contain TC-IAIS In this way, there will be frequent switching of services, making normal services unable to be carried out stably

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for sub-network connection protection via serial monitoring function
  • A method for sub-network connection protection via serial monitoring function
  • A method for sub-network connection protection via serial monitoring function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The method for realizing subnet connection protection by monitoring the TCM function in series provided by the present invention is suitable for the synchronous digital system SDH domain composed of two TCM source terminal networks and one TCM sink terminal network. The method introduces the TCM function of the intermediate node mode , Including the steps: (a) Set the subnet for configuring the subnet connection protection as the intermediate node TCM function mode; (b) Detect the signals transmitted by the two TCM source terminal networks respectively, when the TCM on the current working channel is detected In the signal transmitted by the source terminal network, the N1 or N2 byte contains the incoming alarm indication signal Incoming AIS information, and the protection channel signal is valid, the switching action is executed to switch the service from the working channel to the protection channel; (c) for N1 or N2 The content of the byte is processed through and transpa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for achieving sub-network connection protection through TCM function, suitable for the condition of two TCM source-sink SDH regions, which includes (a) setting SN equipped with sub-network connection protection as middle node TCM function manner; and (b) respectively detecting signals transmitted from two source ends SN by the SN equipped with sub-network connection protection, and executing switching operation to switch operation from the working channel to the protection channel when an incoming alarm instruction signal (Incoming AIS) information is detected in the signal transmitted by the current working channel at N1 or N2 byte and the protection channel signal is available. The invention can normally execute switching to obviate operation interruption or frequent switching when a net element equipped with sub-network connection protection is set to a mode not supporting source / sink end and when the net element receives a signal with TC-IAIS information.

Description

Technical field [0001] The present invention relates to a synchronous digital hierarchy (SDH, Synchronous Digital Hierarchy) in the field of optical communication, a technology for quality monitoring and fault location of each sub-network (SN, Sub Network) at the boundary of a network operator, and in particular to a technology for monitoring through series connection ( TCM (TandemConnection Monitoring) function realizes the method of subnet connection protection. Background technique [0002] The optical synchronous digital transmission network is composed of a number of SDH network units. The network for synchronous information transmission, multiplexing and cross-connection on optical fibers is a standard for digital signal transmission and a layered system. It has a set of standardized information structure levels, and has a block frame structure that allows the arrangement of rich overhead bits (that is, the remaining part of the network node interface bit stream after deduc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/26H04J3/08H04L5/00
Inventor 胡秀兰吕建平
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products