Clock time synchronous resource distribution method and device
A clock time and synchronization source technology, applied in the field of communication, can solve problems such as clock looping and mismatching, and achieve the effect of simple and clear configuration, avoiding mismatching and clock looping
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0042] Example 1: End-to-end configuration of the clock synchronization source path configuration of the entire network.
[0043] According to the clock network plan, determine the first node network element, the last node network element, and the intermediate node network element, and specify the clock parameters of the entire network, including but not limited to: SSM mode, internal clock crystal oscillator level, whether to enable clock protection, etc. Determine the clock transmission link in the network, perform end-to-end configuration of the clock synchronization source of the entire network through the network topology diagram, specify the intermediate network element, and complete the clock synchronization source configuration of the intermediate node network element, which includes the following steps.
[0044] The network manager starts the end-to-end clock synchronization source configuration;
[0045] Global configuration of clock algorithm parameters, including but not ...
example 2
[0053] Example 2: End-to-end 1588 time synchronization source configuration.
[0054] According to the 1588 time network plan, specify multiple Grandmaster NEs, and different Grandmaster NEs will form the end-to-end configuration of the first and last NEs at 1588 time. Through the network topology diagram, perform end-to-end 1588 time port configuration. Specify the necessary NEs, A link (port) is necessary to complete the 1588 time port configuration of all nodes and network elements in the network, which includes the following steps.
[0055] The network manager starts the end-to-end 1588 time configuration.
[0056] Globally configure time domain parameters, including but not limited to: time domain, domain delay measurement mechanism, 1588 protocol message sending parameters, time synchronization algorithm and other parameters.
[0057] According to the 1588 time network plan, multiple Grandmaster network elements are designated. Different Grandmaster network elements form the end...
example 3
[0064] Example 3: End-to-end 1588 time error monitoring path configuration.
[0065] First, the entire network must establish a 1588 time network, and the 1588 time path is configured successfully. 1588 time transfers the real running network topology map, performs end-to-end 1588 time error detection link configuration, specifies the first and last nodes of the monitoring path, and specifies the necessary network elements and the necessary links (ports). It includes the following steps.
[0066] On the basis that the real operating network topology map has been generated at 1588 time, the network manager initiates the end-to-end 1588 time error detection link configuration.
[0067] Specify the 1588 time error detection link, the first and last node network element.
[0068] Specify the necessary network element (binding the next hop IP address) and the necessary link (binding VLAN domain).
[0069] If the 1588 time is ETH1588, the method uses Layer 2 unicast to configure a virtual lo...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 