Supercharge Your Innovation With Domain-Expert AI Agents!

Compression method and compression device of alarm mask data

A technology of shielding data and compressing methods, applied in the field of optical transmission, can solve the problems of low alarm reporting efficiency, user service interruption, capacity overrun, etc., to achieve the effect of reducing reporting time, improving system efficiency, and reducing the amount of set data

Active Publication Date: 2011-08-24
丰县科技开发服务总站
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It is very simple to do this, but there are many disadvantages: a large amount of shielding information is transmitted through the network, which usually takes a long time; putting it into the device storage will cause a lot of pressure on the device's memory, and even the capacity of the device will exceed the limit. Paralyzed, resulting in interruption of user services; too many alarm reporting comparisons, making alarm reporting inefficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Compression method and compression device of alarm mask data
  • Compression method and compression device of alarm mask data
  • Compression method and compression device of alarm mask data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] The alarm masking data compression device involved in this example is used to realize the alarm masking data compression method, including: a status flag module, which obtains the settable alarm masking data, establishes a maskable tree according to the hierarchical relationship, and sets each The node status of the node, the node status includes full shielding status, partial shielding status, and unshielding status; the status update module updates the node status of the shieldable tree; the compression module compresses the shielding tree according to the hierarchical relationship and the traversed node status, and gradually Layer pruning of all nodes below the fully shielded state node, the unshielded state node itself and all nodes below it; the remaining shieldable tree after pruning is the compressed shielding tree, and the compressed alarm shielding data is obtained.

[0028] The compression method of the alarm shielding data involved in this example, such as fi...

Embodiment 2

[0052] Please refer to Figure 2 to Figure 4 And Table 1 to Table 4, on the basis of the above example, this example uses a specific implementation mode under one network element to illustrate the method of compressing the alarm mask data and the method of comparing the compressed data.

[0053] Referring to Table 1, Table 1 provides the alarm shielding information that can be set under a network element.

[0054] Table 1

[0055] Alarm number

network element

veneer

port

layer rate

Alarm reason

1

Network element 1

veneer 1

port 1

layer rate 1

No light alarm

2

Network element 1

veneer 1

port 2

layer rate 2

Low light warning

3

Network element 1

veneer 2

port 1

layer rate 3

No light alarm

4

Network element 1

veneer 2

port 1

layer rate 4

Low light warning

5

Network element 1

veneer 3

port 1

layer rate 5

No light al...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a compression method of alarm mask data. The compression method comprises the following steps: acquiring the alarm mask data, establishing a maskable tree according to hierarchical relation and setting up a node state of each node of the maskable tree, wherein, the node state comprises a fully masked state, a partially masked state and a non-masked state; and updating the node state of the maskable tree; compressing the maskable tree according to the hierarchical relation and traverse node state; and gradually omitting all the nodes below the nodes in the fully masked state, the nodes in the non-masked state and the nodes below the nodes in the non-masked state. The compression method of the alarm mask data helps greatly reduce alarm mask information, quicken transmission of the mask information, reduce burden of equipment memory, shorten comparative alarm and reporting time of net elements, quicken reporting and improve system performance.

Description

technical field [0001] The invention relates to the field of optical transmission, in particular to an alarm shielding technology in the field of optical transmission. Background technique [0002] Alarm masking is one of the most commonly used functions of transmission equipment. In actual equipment, each network element contains multiple boards, and each board has multiple ports, and each port contains several or even dozens of alarm items. This network element, single board, port, and alarm hierarchy on the port cause the number of maskable data to increase in series, resulting in a huge amount of data, which brings great inconvenience to the transmission, storage, and use of masked information. For example, an SDH network element has 4 STM-64 optical boards under it, and there are 4 physical termination points PTP under each optical board, and there are 128 connection termination point CTPs under each PTP, and each CTP has an average of 20 alarm items, then The total n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/26H04L12/24H04L1/00H04B10/08
Inventor 刘骁建
Owner 丰县科技开发服务总站
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More