Clock time synchronization source configuration method and device
A clock time and synchronization source technology, applied in the field of communication, can solve the problems of clock looping and mismatching, and achieve the effect of simple and clear configuration, avoiding mismatching and clock looping.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0042] Example 1: End-to-end configuration of the network-wide clock synchronization source path configuration.
[0043] According to the clock network planning, determine the first node network element, the last node network element, and the intermediate node network element, and specify the clock parameters of the whole network, including but not limited to: SSM mode, internal clock crystal oscillator level, whether to enable clock protection, etc. Determine the clock transmission link in the network, configure the clock synchronization source of the network elements in the whole network end-to-end through the network topology diagram, specify the intermediate network elements, and complete the clock synchronization source configuration of the intermediate node network elements, which includes the following steps.
[0044] The network management starts the end-to-end clock synchronization source configuration;
[0045] Configure clock algorithm parameters globally, including...
example 2
[0053] Example 2: End-to-end 1588 time synchronization source configuration.
[0054] According to the 1588 time network planning, designate multiple Grandmaster network elements, and form the 1588 time end-to-end configuration of the first and last network elements by different Grandmaster network elements. Through the network topology diagram, perform end-to-end 1588 time port configuration, specify the necessary network elements, Links (ports) must be passed to complete the 1588 time port configuration of all node network elements in the network, which includes the following steps.
[0055] The NMS starts the end-to-end 1588 time configuration.
[0056] Globally configure time domain parameters, including but not limited to: time domain, domain delay measurement mechanism, 1588 protocol message sending parameters, time synchronization algorithm and other parameters.
[0057] According to the 1588 time network planning, designate multiple Grandmaster network elements, form ...
example 3
[0064] Example 3: End-to-end 1588 time error monitoring path configuration.
[0065] First, the entire network must establish a 1588 time network, and the 1588 time path is successfully configured. 1588 time transfer real operation network topology diagram, end-to-end 1588 time error detection link configuration, designate the first and last nodes of the monitoring path, and at the same time designate the necessary network elements and necessary links (ports), which includes the following steps.
[0066] On the basis that the real running network topology diagram of 1588 time transfer has been generated, the network management starts the end-to-end 1588 time error detection link configuration.
[0067] Specify the 1588 time error detection link, the first and last node NEs.
[0068] Specify the necessary NEs (bind to the next hop IP address) and the required links (bind to the VLAN domain).
[0069] If the 1588 time is ETH1588, then the method configures a virtual local area...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


