CONFIGURATION METHOD AND APPARATUS FOR SYNCHRONIZATION NETWORK

Information

  • Patent Application
  • 20180123717
  • Publication Number
    20180123717
  • Date Filed
    August 26, 2015
    8 years ago
  • Date Published
    May 03, 2018
    6 years ago
Abstract
The present disclosure relates to a configuration method and apparatus for a synchronization network. The method includes: determining at least the following information: topology of the synchronization network, and the number of external clocks enabled by the synchronization network; and performing clock configuration for the synchronization network according to the determined information
Description
TECHNICAL FIELD

The present disclosure relates to the field of communication technology, and more particularly, to a configuration method, a configuration apparatus for a synchronization network and a computer readable storage medium.


BACKGROUND

With rapid development of new communication technologies and new businesses, bandwidth of communication network keeps growing, the transmission rate keeps increasing, and networks are getting more merged with one another. Facing competition in the telecommunications market, communication enterprises need to introduce new technologies to improve service quality, to develop from the competition. At present, new data services such as e-commerce, multimedia communications, IP telephone are new growth points of telecommunication business. For traditional business, there are demands for enterprises interconnection and inter-network settlements. Moreover, communications business involves security, authentication and billing, etc. All of these problems demonstrate importance of synchronization networks to modern telecommunications networks.


Synchronization network is one of the support systems for running a telecommunications network, providing synchronization control signals for clocks (or carriers) in telecommunication devices within the telecommunications network to make the operation rates of the telecommunication devices synchronized. The synchronization network is an indispensable part of the telecommunications network. The synchronization network may ensure network timing performance and then ensure the smooth conduction of the key businesses. With the development and application of SDH (Synchronous Digital Hierarchy), ATM (Asynchronous Transfer Mode), CDMA (Code Division Multiple Access), IP (Internet Protocol) and other technologies, a variety of business networks have ever higher requirements on synchronization. The concept of synchronization has gradually evolved from conventional frequency synchronization to clock synchronization (including frequency synchronization and/or time synchronization).


With evolving of telecommunication networks to intelligent and automation networks, intelligence of synchronization network has also been included in the demand list for research. How to configure the synchronization network has become a problem to be solved.


This section provides background information related to the present disclosure which is not necessarily prior art.


SUMMARY

The following is a summary of the subject matter of the detailed description herein. The summary is not intended to limit the protection scope of the claims.


An embodiment of the present disclosure provides a configuration method for a synchronization network. The method includes the following steps.


At least the following information is determined: topology of the synchronization network and the number of external clocks enabled by the synchronization network.


Clock configuration is for the synchronization network according to the determined information.


According to an exemplary embodiment, if the synchronization network includes a ring having an external clock injected at a single point, configuring the synchronization network comprises: performing the clock configuration for the ring in a ring manner by:


for a node having external clock injection in the ring, configuring an extracted external clock; and


for each node having no external clock injection in the ring, configuring two chains for extracting clocks from adjacent nodes at both sides of the node, and configuring an extracted clock in an extraction direction being the same as a preset extraction direction of an operation clock of the ring, as an operation clock, the extraction direction of an operation clock of the ring being clockwise or counter clockwise.


An embodiment of the present disclosure also provides a configuration apparatus for a synchronization network. The apparatus includes a processor and a memory. The memory stores instructions executable by the processor. The processor is configured to:


determine at least the following information: topology of the synchronization network; and the number of external clocks enabled by the synchronization network;


perform clock configuration for the synchronization network according to the determined information.


An embodiment of the present disclosure also provides a computer readable storage medium, storing program instructions which, if being executed by a processor, implement the configuration method for a synchronization network provided by the embodiments of the present disclosure.


Through the above solutions, clock configuration of the synchronization network with various topologies and injected clock sources are achieved, and it has at least one of the following advantages: simple, reliable, and may prevent the clocks from forming a loop.


This section provides a summary of various implementations or examples of the technology described in the disclosure, and is not a comprehensive disclosure of the full scope or all features of the disclosed technology.





BRIEF DESCRIPTION OF THE DRAWINGS


FIGS. 1-12 are diagrams showing examples of clock configuration according to examples 1-12 of the present disclosure;



FIG. 13 is a flow chart of a method according to an embodiment of the present disclosure; and



FIG. 14 is a block diagram of an apparatus according to an embodiment of the present disclosure.





DETAILED DESCRIPTION

In order to make the objectives, technical solutions and advantages of the embodiments of the present disclosure become clearer, the embodiments of the present disclosure will be described in detail hereinafter with reference to the accompanying drawings. It is should be noted that the embodiments and features in the embodiments in the present application may be combined with each other if no confliction is caused.


First Embodiment

The present embodiment relates to a configuration method for a synchronization network. The synchronization network mentioned herein may refer to an entire network or a local network. From the topological point of view, it may be a single ring (not interconnected with other rings), multiple rings interconnected with each other, a chain or a combination thereof, and the like.


As shown in FIG. 13, the configuration method for a synchronization network according to the present embodiment includes the following steps.


At step 110, at least the following information is determined: topology of the synchronization network; and the number of external clocks enabled by the synchronization network.


At step 120, clock configuration is performed for the synchronization network according to the determined information.


Accordingly, the present embodiment also provides a configuration apparatus for a synchronization network. As shown in FIG. 14, the apparatus includes an information acquisition module 10 and a clock configuration module 20.


The information acquisition module 10 is configured to determine at least the following information: topology of the synchronization network; and the number of external clocks enabled by the synchronization network.


The clock configuration module 20 configured to perform clock configuration for the synchronization network according to the determined information.


The topology of the synchronization network includes a ring and a chain. The ring topology may be divided into single ring or interconnected rings. For a single ring, the enabled external clock may be injected from a single node of the ring (single point injection) or from multiple nodes (such as double point injection). The so-called external clock is a clock extracted from outside of the ring, also known as an extracted external clock. For interconnected rings, a clock extracted from one ring at an interconnection node may be an external clock for another ring. For a ring, the clock configuration may be performed in a ring manner, or may be performed in a shortest-path manner.


Clock configuration for various situations will be described in detail with reference to the following embodiments.


Second Embodiment

In the present embodiment, the synchronization network includes a ring having an external clock injected at a single point, and the clock configuration is performed for the ring in a ring manner. Specifically, the clock configuration may include the following steps.


For a node having external clock injection in the ring, an extracted external clock is configured.


For each node having no external clock injection in the ring, two chains for extracting clocks from adjacent nodes at both sides thereof are configured, and an extracted clock in an extraction direction being the same as a preset extraction direction of an operation clock of the ring is configured as an operation clock. The extraction direction of an operation clock of the ring is clockwise or counter clockwise.


Correspondingly, the clock configuration module of the present embodiment configures the ring in a ring manner. The clock configuration module may include a first configuration unit and a second configuration unit.


The first configuration unit is configured to, for a node having external clock injection in the ring, configure an extracted clock.


The second configuration unit is configured to, for each node having no external clock injection in the ring, configure two chains for extracting clocks from adjacent nodes at both sides thereof, and configure an extracted clock in an extraction direction being the same as a preset extraction direction of an operation clock of the ring, as an operation clock, the extraction direction of an operation clock of the ring being clockwise or counter clockwise.


In the embodiment, there may be the following different scenarios.


First, the ring is a single ring.


Second, the ring is interconnected at least with another ring, and a non-interconnection node in the ring has external clock injection.


Third, the ring is interconnected with at least another ring, other nodes than a node for interconnecting with the ring in the another ring have external clock injection, and each interconnection node of the ring and the another ring is regarded as a node having external clock injection in the ring.


Third Embodiment

In the present embodiment, the synchronization network includes a ring having external clocks injected at double points, and the clock configuration is performed for the ring in a ring manner. The clock configuration may include the following steps.


For each node having no external clock injection in the ring, two chains for extracting clocks from adjacent nodes at both sides thereof are configured, and an extracted clock in an extraction direction being the same as a preset extraction direction of an operation clock of the ring is configured as an operation clock. The extraction direction of an operation clock of the ring is clockwise or counter clockwise.


One of two nodes having external clock injection in the ring is configured as a main operation node, and another of the two nodes is configured as a standby operation node. For the main operation node, an extracted external clock is configured and one chain for extracting a clock from an adjacent node at one side in an extraction direction being opposite to the extraction direction of the operation clock of the ring is configured. For the standby operation node, an extracted external clock is configured, and one chain for extracting a clock from an adjacent node at one side in an extraction direction being the same as the extraction direction of the operation clock of the ring is configured, and the extracted clock of the chain is configured as the operation clock.


Correspondingly, the clock configuration module of the present embodiment configures the ring in a ring manner. The clock configuration module may include a first configuration unit and a second configuration unit.


The first configuration unit is configured to, for each node having no external clock injection in the ring, configure two chains for extracting clocks from adjacent nodes at both sides thereof, and configure an extracted clock in an extraction direction being the same as a preset extraction direction of an operation clock of the ring, as an operation clock. The extraction direction of an operation clock of the ring is clockwise or counter clockwise.


The second configuration unit is configured to configure one of two nodes having external clock injection in the ring as a main operation node, and another of the two nodes as a standby operation node. For the main operation node, the second configuration unit configures an extracted external clock and configures one chain for extracting a clock from an adjacent node at one side in an extraction direction being opposite to the extraction direction of the operation clock of the ring. For the standby operation node, the second configuration unit configures an extracted external clock and configures one chain for extracting a clock from an adjacent node at one side in an extraction direction being the same as the extraction direction of the operation clock of the ring, and configures the extracted clock of the chain as the operation clock.


In the embodiment, there may be the following scenarios.


First, the ring is a single ring.


Second, the ring is interconnected at least with another ring, and two non-interconnection nodes in the ring have external clock injection.


Third, the ring is interconnected with at least another ring, other nodes than an interconnection node in the two rings have external clock injection, each interconnection node of the ring and the another ring is regarded as a node having external clock injection in the ring, the ring being performed with clock configuration, and a node being regarded as having external clock injection in the ring has different operation states in the two rings to which the node belongs. The operation states referring to main operation or standby operation.


Fourth, the ring is interconnected with at least another two rings, each node other than a node interconnected with the ring in the another two rings has external clock injection, each node interconnected with each of the another two rings in the ring is regarded as a node having external clock injection in the ring, clock configuration is performed on the ring; and each node being regarded as having external clock injection in the ring has different operation states in the two rings to which the node belongs.


According to an exemplary embodiment, if two interconnection nodes are regarded as one node, the method further includes: determining the operation states of the two interconnection nodes as standby main rings; configuring two chains of extracted clocks in two directions between the two interconnection nodes, or configuring one chain in an extraction direction being the same as the extraction direction of an operation clock of the main ring, and configuring the extracted clock in an extraction direction being the same as the extraction direction of an operation clock of the main ring as the operation clock. Correspondingly, the clock configuration module also includes a third configuration unit. The third configuration unit is configured to determine the operation states of the two interconnection nodes as standby main rings; configure two chains of extracted clocks in two directions between the two interconnection nodes, or configure one chain in an extraction direction being the same as the extraction direction of an operation clock of the main ring, and configure the extracted clock in an extraction direction being the same as the extraction direction of an operation clock of the main ring as the operation clock.


Fourth Embodiment

In the present embodiment, the synchronization network includes a ring having an external clock injected at a single point, and the clock configuration is performed for the ring in a in a shortest-path manner. The clock configuration may include the following steps.


For a node having external clock injection in the ring, an extracted external clock is configured.


For each node having no external clock injection in the ring, a shortest path from the node to a node having external clock injection is determined. For the node, two chains for extracting clocks from adjacent nodes at both sides thereof are configured, and an extracted clock of one of the chains located on the shortest path is configured as the operation clock.


The shortest path may be determined by a variety of methods. An extraction path from the node to a node having external clock injection being the shortest may refer to that the number of nodes on the path for extracting the operation clock from the node to the clock node is minimum, or a length of the chain is minimum, or a weighted sum of the number of nodes and the length of chains is minimum, and so on. For example, within a ring having single point injection, there are two possible paths from a node having no clock injection to a node having clock injection. Within a ring of double point injection, there are four possible paths from a node having no clock injection to a node having clock injection. The shortest path may be determined by comparison.


Correspondingly, the clock configuration module of the present embodiment configures the ring in the shortest path manner. The clock configuration may include a first configuration unit and a second configuration unit.


The first configuration unit is configured to, for a node having external clock injection in the ring, configure an extracted external clock.


The second configuration unit is configured to, for each node having no external clock injection in the ring, determine a shortest path from the node to a node having external clock injection, configure for the node two chains for extracting clocks from adjacent nodes at both sides thereof, and configuring an extracted clock of one of the chains located on the shortest path as the operation clock.


In the embodiment, there may be the following scenarios.


First, the ring is a single ring.


Second, the ring is interconnected at least with another ring, and a non-interconnection node in the ring has external clock injection.


Third, the ring is interconnected with at least another ring at a single point, other nodes than the node for interconnecting with the node in the another ring have external clock injection, and the interconnection node is a node having external clock injection in the ring.


Fifth Embodiment

In the present embodiment, the synchronization network includes a ring having external clocks injected at double points, and the clock configuration is performed for the ring in a shortest-path manner. The clock configuration may include the following steps.


For each node having external clock injection in the ring, an extracted external clock is configured and at least one chain for extracting a clock from an adjacent node at one side thereof is configured.


For each node having no external clock injection in the ring, a shortest path from the node to a node having external clock injection is determined. For the node, two chains for extracting clocks from adjacent nodes at both sides thereof are configured, and an extracted clock of one of the chains located on the shortest path is configured as the operation clock.


Correspondingly, the clock configuration module of the present embodiment configures the ring in a shortest-path manner. The clock configuration module includes a first configuration unit and a second configuration unit.


The first configuration unit is configured to, for each node having external clock injection in the ring, configure an extracted external clock and configure at least one chain for extracting a clock from an adjacent node at one side thereof.


The second configuration unit is configured to, for each node having no external clock injection in the ring, determine a shortest path from the node to a node having external clock injection, configure for the node two chains for extracting clocks from adjacent nodes at both sides thereof, and configure an extracted clock of a chain located on the shortest path as the operation clock.


According to an exemplary embodiment, for each node having external clock injection in the ring, configuring at least one chain for extracting a clock from an adjacent node at one side thereof includes: if there is a common adjacent node between two nodes, for each of the two nodes, configuring only one chain for extracting an external clock from a non-common adjacent node. Correspondingly, the first configuration unit configuring, for each of the two nodes having external clock injection in the ring, at least one chain for extracting a clock from an adjacent node at one side thereof includes: if there is a common adjacent node between the two nodes, for each of the two nodes, configuring only one chain for extracting an external clock from a non-common adjacent node.


In the present embodiment, there may be the following scenarios.


First, the ring is a single ring.


Second, the ring is interconnected with at least another ring at double points, other nodes than the node for interconnecting with the node in the another ring have external clock injection, and the two nodes for interconnecting the ring and the another ring are two nodes having external clock injection in the ring.


Sixth Embodiment

In the present embodiment, the synchronization network includes two interconnected rings. In each of the rings, a node other than a node for interconnecting the two rings has external clock injection. The clock configuration is performed for the two rings in a shortest-path manner. The clock configuration may include the following steps.


For each interconnection node of the two rings, a shortest path from the node to a node having external clock injection in the two rings is determined. For the node, a plurality of chains for extracting clocks from adjacent nodes thereof are determined, and an extracted clock of one of the chains located on the shortest path is configured as the operation clock.


For each non-interconnection node of the two rings, a shortest path from the node to a node having external clock injection in the same ring is determined. For the node, two chains for extracting clocks from adjacent nodes at both sides thereof are determined, and an extracted clock of one of the chains located on the shortest path is configured as the operation clock.


For each node having external clock injection in the two rings, an extracted clock is configured and two chains for extracting clocks from adjacent nodes at both sides thereof are configured.


Correspondingly, the clock configuration module of the present embodiment configures the two rings in a shortest-path manner. The clock configuration module may include a first configuration unit, a second configuration unit and a third configuration unit.


The first configuration unit is configured to, for each interconnection node of the two rings, determine a shortest path from the node to a node having external clock injection in the two rings, configure for the node a plurality of chains for extracting clocks from adjacent nodes thereof, and configure an extracted clock of one of the chains located on the shortest path as the operation clock.


The second configuration unit is configured to, for each non-interconnection node of the two rings, determine a shortest path from the node to a node having external clock injection in the same ring, configure for the node two chains for extracting clocks from adjacent nodes at both sides thereof, and configure an extracted clock of one of the chains located on the shortest path as the operation clock.


The third configuration unit is configured to, for each node having external clock injection in the two rings, configure an extracted clock and configure two chains for extracting clocks from adjacent nodes at both sides thereof.


Seventh Embodiment

In the present embodiment, the synchronization network includes a chain having external clocks injected at a single point, and the clock configuration is performed for the chain. The clock configuration may include the following steps.


For a node having external clock injection in the chain, an extracted external clock is configured.


For each node having no external clock injection in the chain, one chain for extracting a clock from an adjacent node at one side thereof which is closest to a node having clock injection in the ring is configured.


Correspondingly, the clock configuration module of the present embodiment performs clock configuration for the chain. The clock configuration may include a first to configuration unit and a second configuration unit.


The first configuration unit is configured to, for a node having external clock injection in the chain, configure an extracted external clock.


The second configuration unit is configured to, for each node having no external clock injection in the chain, configure one chain for extracting a clock from an adjacent node at one side thereof which is closest to a node having clock injection in the ring.


Eighth Embodiment

An embodiment of the present disclosure also provide a computer readable storage medium for storing program instructions which, if being executed by a processor, implement the configuration method for a synchronization network provided by any one of the first to the seventh embodiments of the present disclosure.


The method according to the embodiments will be described below with reference to some examples.


In these examples, for a ring configuration, an extraction direction of an operation clock of the ring can be set. In the figures of these examples, the extraction direction of an operation clock of the ring is counter clockwise, for example. However, it may also be clockwise.


In these examples, the core rings and/or chains may be divided into the following types: a single core ring, multiple core rings, and a core chain. The number of nodes of a ring for injection of a clock source may be one or more. The core ring is a ring network of a designated core according to users' demands. The core chain is a chain network of a designated core according to users' demand.


To configure a ring, for each of single point injection and double point injection of the clock source, there are two configuration manners: a ring manner and a shortest-path manner.


For configuring a ring of the double point injection in the ring manner, clock sources (i.e. the external clocks) are divided into a main operation clock source and a standby operation clock source. For configuring a ring of double point injection in the shortest-path manner, the clock sources are not divided into a main operation clock source and a standby operation clock source. Herein, if the clock sources are not divided into a main operation clock source and a standby operation clock source, all the clock sources are regarded as main operation clock sources by default.


The operation clock of a node for injecting a clock is an injection clock source, and a route on the node for injecting a clock extracts a standby clock.


For configuration manner of a non-core ring and/or chain, if a clock has been configured for a node for interconnecting with the ring and/or chain in the upper layer, clock configuration is not performed again in the present layer.


During configuration, the rules for extracting a clock by a plurality of chains between nodes are as follows. If there are clock mutual-extractions in two directions between the nodes, there is at most one chain for mutual-extraction. If there is only a clock extraction in one direction between the nodes, there may be at most two chains for extraction. The clock chain may adopt optical port priority, high rate port priority principle.


During configuration, the rules for the ring direction setting are as follows. For a ring manner, it is required to prescribe a clockwise direction and a counter clockwise direction uniformly. For example, the direction may be taken according to the following rules: selecting one clock node or a node for injecting a clock on the ring; acquiring two network elements adjacent to the node; and taking a direction from the node to a network element with a larger ID as a counter clockwise direction.


First Example

As shown in FIG. 1, a core ring is composed of nodes A, B, C, D, E and F. The core ring has only one external clock source (briefly referred to as an external clock) injected at the node A. Therefore, A is a clock node (also referred to as a node for injecting a clock). The rule of ring manner configuration is adopted.


Only an extracted external clock is configured for the clock node A, and the priority for the extracted clock is the highest, which is 1.


Taking the clock node A as a starting point, a route turning to the adjacent node F in the counter clockwise direction (that is, from the node A to B, to C, to D, to E and to F) is the extraction route of the operation clock (represented by a solid line in the figure, and composed of chains for extracting the operation clock between adjacent nodes on the route).


In an opposite direction, taking the clock node A as a starting point, a route turning to the adjacent node B in the clockwise direction (that is, from the node A to F, to E, to D, to C and to B) is a route for extracting a protection clock (represented by a dashed line in the figure, and composed of chains for extracting the protection clock between adjacent nodes on the route).


The priority of extracting a clock is 1 for the port of extracting the operation clock on each node, and the port with a lower priority of extracting a clock is the port for extracting the protection clock.


The configuration for the ring in FIG. 1 corresponds to the first scenario in the second embodiment.


Second Example

As shown in FIG. 2, a core ring is composed of nodes A, B, C, D, E and F. The core ring has two external clock sources injected at node A and D, respectively. Therefore, both A and D are clock nodes. The rule of ring manner configuration is adopted.


The node A is set as a main clock node, and the node D is set as a standby clock node.


Taking the main clock node A as a starting point, a route turning to the adjacent node F in the counter clockwise direction (that is, from the node A to B, to C, to D, to E and to F) is the extraction route of the operation clock.


Taking the standby clock node D as a starting point, a route turning to the adjacent node E in the clockwise direction (that is, from the node D to C, to B, to A, to F and to E) is the extraction route of the protection clock.


The priority of extracting a clock is 1 for the port of extracting the operation clock on each node, and the port with a lower priority of extracting a clock is the port for extracting the protection clock.


The configuration for the ring in FIG. 2 corresponds to the first scenario in the third embodiment.


Third Example

As shown in FIG. 3, a core ring is composed of nodes A, B, C, D, E and F. The core ring has only one external clock source injected at the node A. Therefore, A is a clock node. The rule of the shortest-path manner configuration is adopted.


Only an extracted external clock is configured for the clock node A.


For the node B, a chain on the shortest path from the node B to the clock node A is the extraction chain for the operation clock (that is, from the node A to B). The chain in the direction opposite to that of the extraction chain for the operation clock is the extraction chain for the protection clock (that is, from the node C to B).


Other nodes are all configured in the same shortest-path manner as for the node B.


The priority of extracting a clock is 1 for the port of extracting the operation clock on each node, and the port with a lower priority of extracting a clock is the port for extracting the protection clock.


The configuration for the ring in FIG. 3 corresponds to the first scenario in the fourth embodiment.


Fourth Example

As shown in FIG. 4(a), a core ring is composed of nodes A, B, C, D, E and F. The core ring has two external clock sources injected at node A and F respectively. Therefore, both A and F are clock nodes. The rule of the shortest-path manner configuration is adopted.


The two external clock sources are not classified into a main clock source and a standby clock source, and thus both the node A and the node F are main operation clock nodes.


If the operation clocks of the clock nodes A and F are external clock sources (that is, extracted external clocks, or extracted/acquired external clock). The extracted clock priority is 1. Other chain port on the clock node is also for extracting a clock. The extracted clock priority for the other port is lower, and the port is a port for extracting a protection clock.


For the node B, the path from the node B to the clock node A is the shortest. Therefore, this chain is taken as the extraction chain for the operation clock of the node B (that is, from the node A to the node B). The chain in the direction opposite to that of the extraction chain for the operation clock is the extraction chain for the protection clock (that is, from the node C to B).


For the node E, the path from the node E to the clock node F is the shortest. Therefore, this chain is taken as the extraction chain for the operation clock of the node E (that is, from the node F to the node E). The chain in the direction opposite to that of the extraction chain for the operation clock is the extraction chain for the protection clock (that is, from the node D to E).


Other nodes are all configured in the same shortest-path manner as for the nodes B and E.


The priority of extracting a clock is 1 for the port of extracting the operation clock on each node, and the port with a lower priority of extracting a clock is the port for extracting the protection clock.


As shown in FIG. 4(b), a core ring is composed of nodes A, B, C, D, E and F. The core ring has two external clock sources injected at node A and D, respectively. Therefore, both A and D are clock nodes. The rule of the shortest-path manner configuration is adopted.


The two external clock sources are not classified into a main clock source and a standby clock source, and thus both the node A and the node D are main operation clock nodes.


If the operation clocks of the clock nodes A and D are external clock sources. The priority of extracting a clock is 1. Other chain port on the clock node is also for extracting a clock. The priority of extracting a clock is lower, and the port is a port for extracting a protection clock.


For the node B, the path from the node B to the clock node A is the shortest. Therefore, this chain is taken as the extraction chain for the operation clock of the node B (that is, from the node A to the node B). The chain in the direction opposite to that of the extraction chain for the operation clock is the extraction chain for the protection clock (that is, from the node C to B).


For the node E, the path from the node E to the clock node D is the shortest. Therefore, this chain is taken as the extraction chain for the operation clock of the node E (that is, from the node D to the node E). The chain in the direction opposite to that of the extraction chain for the operation clock is the extraction chain for the protection clock (that is, from the node F to E).


Other nodes are all configured in the same shortest-path manner as for the nodes B and E.


The priority of extracting a clock is 1 for the port of extracting the operation clock on each node, and the port with a lower priority of extracting a clock is the port for extracting the protection clock.


As shown in FIG. 4(c), a core ring is composed of nodes A, B, C, D, E and F. The core ring has two external clock sources injected at node A and D, respectively. Therefore, both A and D are clock nodes. The rule of the shortest-path manner configuration is adopted.


The two external clock sources are not classified into a main clock source and a standby clock source, and thus both the node A and the node D are main operation clock nodes.


If the operation clocks of the clock nodes A and D are external clock sources. The priority of extracting a clock is 1. Other chain port on the clock node is also for extracting a clock. The priority of extracting a clock is lower, and the port is a port for extracting a protection clock.


Since there in only one node E between the clock nodes A and D, in order for the clocks not to form a loop (that is, if the clock source fails, the clock extraction process will not form a loop, otherwise the network clocks will form an endless cycle, and is unable to perform timing), the clock nodes A and D cannot extract a clock from the node E.


For the node B, the path from the node B to the clock node A is the shortest. Therefore, this chain is taken as the extraction chain for the operation clock of the node B (that is, from the node A to the node B). The chain in the direction opposite to that of the extraction chain for the operation clock is the extraction chain for the protection clock (that is, from the node C to B).


Other nodes are all configured in the same shortest-path manner as for the nodes B and E.


The priority of extracting a clock is 1 for the port of extracting the operation clock on each node, and the port with a lower priority of extracting a clock is the port for extracting the protection clock.


The configuration for the ring in FIGS. 4 (a)-(c) corresponds to the first scenario in the fifth embodiment. In FIG. 4 (c), there is a common adjacent node between two clock injection nodes.


Fifth Example

If a plurality of core rings are interconnected, the interconnection may be realized by a single node or double nodes. In this example, the interconnection by double nodes is taken as an example.


As shown in FIG. 5, two core rings interconnected at double nodes only has one external clock source injected at the node A. Therefore, the node A is a clock node. The interconnection nodes (i.e., the nodes for interconnecting the two rings) are the nodes E and F. The rule of the ring manner configuration is adopted.


Only an extracted external clock is configured for the clock node A.


The external clock source is determined at the ring 1. The ring 1 is configured in the ring manner, as follows.


Taking the clock node A as a starting point, a route turning to the adjacent node F in the counter clockwise direction (that is, from the node A to B, to C, to D, to E and to F) is the extraction route of the operation clock.


Taking the clock node A as a starting point, a route turning to the adjacent node B in the clockwise direction (that is, from the node A to F, to E, to D, to C and to B) is a route for extracting a protection clock.


Since the ring 1 and ring 2 are interconnected at double nodes. For the ring 2, the adjacent nodes E and F (including the chain between the two nodes) are regarded as one node EF (also referred to as a logic connection node, a connection node). Clock mutual-extraction is performed between the two interconnection nodes E and F, to achieve complete communication.


The ring 2 is processed as a lower layer of the ring 1, and is configured in the ring manner as follows.


The logic connection node EF is determined as a clock injection node.


Taking the logic connection node EF as a starting point, a route turning to the adjacent node F in the counter clockwise direction (that is, from the node EF to G, to H, to I, and to J) is the extraction route of the operation clock.


Taking the logic connection node EF as a starting point, a route turning to the adjacent node G in the clockwise direction (that is, from the node EF to J, to I, to H, and to G) is the extraction route of the operation clock.


The priority of extracting a clock is 1 for the port of extracting the operation clock on each node, and the port with a lower priority of extracting a clock is the port for extracting the protection clock.


The configuration for the ring 1 in FIG. 5 corresponds to the second scenario in the second embodiment, and the configuration for the ring 2 in FIG. 5 corresponds to the third scenario in the second embodiment.


Sixth Example

As shown in FIG. 6, two core rings are interconnected by a single node. The interconnected rings have two external clock sources injected at the nodes A and L. Therefore, the nodes A and L are clock nodes. The connection node is node F.



FIG. 6 (a) shows two core rings interconnected by double nodes. The interconnected rings have two external clock sources injected at the node A and the node I. Therefore, the nodes A and I are clock nodes. The connection nodes are the node D and the node E.



FIG. 6 (b) shows three core rings interconnected by double nodes. The interconnected rings have one external clock source injected at the node A and the node M. Therefore, the nodes A and M are clock nodes. The connection nodes are the nodes D, E, H and I.



FIG. 6 (b) adopts the rule of the ring configuration manner.


In the present embodiment, as shown in FIG. 6, there are provided a main external clock source and a standby external clock source.


The interconnected multiple core rings are decomposed into independent single core rings.


For core rings interconnected by a single node, as shown in FIG. 6 (a), the interconnected core rings are decomposed into two independent single rings, and the connection node F is a physical node.


For core rings interconnected by double nodes, as shown in FIGS. 6 (b) and 6(c), the interconnected core rings are decomposed into a plurality of independent single rings. In FIG. 6(b), for the ring 4, the connection node is one logic connection node DE. The logic connection node includes two physical interconnected nodes D and E, and a physical chain D-E between the two nodes. Similarly, in FIG. 6(b), for the ring 6, the connection node is one logic connection node DE. For the ring 7, the connection node is one logic connection node HI.


There are a plurality of clock injection nodes on the ring. A main clock node and a standby clock node are determined for the ring. The ring where the main clock is located is the main core ring. The clock node of the main core ring is the main clock node of the network. The standby clock is the connection node of the ring where the main clock is located. In the present embodiment, the main core ring in FIG. 6(a) is the ring 1, the main clock node of the ring 1 is the node A, and the standby clock node is the connection node F. The main core ring in FIG. 6(b) is the ring 3, the main clock node of the ring 3 is the node A, and the standby clock node is the logic connection node DE. The main clock node of the ring 5 in FIG. 6(c) is the node A, and the standby clock node in the logic connection node DE.


The connection node closest to the ring where the main clock is located is the main clock injection node. In the present embodiment, in FIG. 6(a), since the connection node F is the connection node closest to the ring 1, the main clock injection node of the ring 2 in FIG. 6(a) is the connection node F, and the clock node L is the standby clock node. Similarly, the main clock injection node of the ring 4 in FIG. 6(b) is the connection node DE, and the standby clock node is the node I. The main clock injection node of the ring 7 in FIG. 6(c) is the connection node HI, and the standby clock node is the node M. It may be seen from here that, the connection node has different operation states in the two rings which the connection node belongs.


The decomposed single rings are configured according to the manner for configuring a single core ring.


If the connection node is the logic node (as shown in FIGS. 6 (b) and 6(c)), mutual clock-extraction is performed between the two interconnection nodes, to achieve complete communication.


The configuration for the ring 1 in FIG. 5 corresponds to the second scenario in the second embodiment, and the configuration for the ring 2 in FIG. 5 corresponds to the third scenario in the second embodiment.


The configurations for the rings in FIGS. 6 (a), (b) and (c) except for the ring in the middle of the FIG. 6 (c) correspond to the third scenario of the third embodiment, and the configuration for the ring in the middle of the FIG. 6 (c) corresponds to the fourth scenario in the third embodiment.


Seventh Example

Multiple core rings may be interconnection by a single node or double nodes, and so on. In this example, the interconnection by double nodes is taken as an example.


As shown in FIG. 7, two core rings interconnected by double nodes only has one external clock source injected at the node A. Therefore, the node A is a clock node. The interconnection nodes are the nodes E and F. The rule of the shortest-path manner configuration is adopted.


The clock source is at the ring 1, and the ring 1 is configured in the same way as configuring a single core ring with a single clock source in the shortest-path manner. Specifically, the following configurations may be performed.


Only an extracted external clock is configured for the clock node A.


For the node B, the chain of the shortest path from the node B to the clock node A is the extraction chain for the operation clock of the node B (that is, from the node A to the node B). The chain in the direction opposite to that of the extraction chain for the operation clock is the extraction chain for the protection clock (that is, from the node C to B).


Other nodes on the ring 1 are all configured in the same shortest-path manner as for the node B.


The priority of extracting a clock is 1 for the port of extracting the operation clock on each node, and the port with a lower priority of extracting a clock is the port for extracting the protection clock.


The ring 2 is processed as a lower layer of the ring 1. Specifically, the following configurations are performed.


The interconnection nodes E and F of the ring 1 are all determined as the clock injection nodes of the ring 2.


The configuration manner is the same as that of the main core ring. Since there are two clock injection nodes, the ring 2 is configured in the same way as configuring a single core ring with multiple clock sources in the shortest-path manner. Specifically, the following configurations are performed.


The two external clock sources are not classified into a main clock source and a standby clock source, and thus both of the node E and the node F are main clock injection nodes.


For the node G, the path from the node G to the clock injection node E is the shortest. Therefore, this chain is taken as the extraction chain for the operation clock of the node G (that is, from the node E to the node G). The chain in the direction opposite to that of the extraction chain for the operation clock is the extraction chain for the protection clock (that is, from the node H to G).


For the node J, the path from the node J to the clock injection node F is the shortest. Therefore, this chain is taken as the extraction chain for the operation clock of the node J (that is, from the node F to the node J). The chain in the direction opposite to that of the extraction chain for the operation clock is the extraction chain for the protection clock (that is, from the node I to J).


Other nodes are all configured in the same shortest-path manner as for the nodes G and J.


The priority of extracting a clock is 1 for the port of extracting the operation clock on each node, and the port with a lower priority of extracting a clock is the port for extracting the protection clock.


The configuration for the left ring in FIG. 7 corresponds to the second scenario in the fourth embodiment, and the configuration for the right ring in FIG. 7 corresponds to the second scenario in the fifth embodiment.


Eighth Example

Multiple core rings may be interconnection by a single node, or double nodes, and so on. In this example, the interconnection by a single node is taken as an example.


As shown in FIG. 8, one network is composed of two rings interconnected by a single node. The network has two external clock sources injected at the nodes A and L. Therefore, the nodes A and L are clock nodes. The interconnection node is the node F. The rule of the shortest-path manner configuration is adopted.


The two external clock sources are not classified into a main clock source and a standby clock source, and thus both of the node A and the node L are main clock nodes.


The configuration is performed in the same way as configuring a single core ring with multiple clock sources in the shortest-path manner. Specifically, the following configurations are performed.


For the node B, the path from the node B to the clock node A is the shortest. Therefore, this chain is taken as the extraction chain for the operation clock of the node B (that is, from the node A to the node B). The chain in the direction opposite to that of the extraction chain for the operation clock is the extraction chain for the protection clock (that is, from the node C to B).


For the node M, the path from the node M to the clock node L is the shortest. Therefore, this chain is taken as the extraction chain for the operation clock of the node M (that is, from the node L to the node M). The chain in the direction opposite to that of the extraction chain for the operation clock is the extraction chain for the protection clock (that is, from the node F to M).


For the interconnection node F, the path from the node F to the clock node A is the shortest. Therefore, this chain is taken as the extraction chain for the operation clock of the node F (that is, from the node A to G to F). Other chains (that is, chains from the node E to the node F, from the node H to the node F, from the node M to the node F) are all extraction chains for the protection clock. The chain in the direction opposite to that of the extraction chain for the operation clock (that is, from the node E to F) may be selected as the first extraction chain for the protection clock.


Other nodes are all configured in the same shortest-path manner as for the nodes B and E.


The priority of extracting a clock is 1 for the port of extracting the operation clock on each node, and the port with a lower priority of extracting a clock is the port for extracting the protection clock.


The configuration for the two rings in FIG. 8 corresponds to the sixth embodiment.


Ninth Example

As shown in FIG. 9, one chain-type network is composed of nodes A, B and C. There are 3 chains between the nodes B and C. The entire chain-type network only has one external clock source injected at the point A. Therefore, the node A is the clock node, and the configuration rule is as follows.


An extracted external clock is configured for the clock node A.


The chain on the shortest path from the node B to the clock node A is the extraction chain for the operation clock of the node B. Similarly, the chain on the shortest path from the node C to the clock node A is the extraction chain for the operation clock of the node C.


There are 3 chains between the nodes B and C. Since there is only clock extraction in a single direction (that is, only clock extraction from the node B to C), then at most two chains for extracting a clock may be allowed. The optical port priority, or high rate port priority principle is adopted. One of the ports has the priority of 1, and the other has the priority of 2.


The configuration for the nodes on the chain in FIG. 9 corresponds to the second scenario in the seventh embodiment.


Tenth Example

In this example, the ring at the upper layer (for example, the core ring or the non-core ring at the previous upper layer) is configured in the ring manner. As shown in FIG. 10, the non-core ring 1.1 is composed of nodes A, B, C, D, E and F.


An access node is determined as the clock injection node of the non-core ring. In FIG. 10 (a), the node A is the access node for accessing the upper layer, is also the clock injection node of the non-core ring 1.1, and is configured in the same as configuring a ring with interjection at a single point. In FIG. 10 (b), the nodes A and F are the access nodes for accessing the upper layer, and are also the clock injection nodes. The nodes A and F are regarded as one logic connection node AF which is configured in the same way as configuring a ring with interjection at a single point.


For FIG. 10 (a):


Taking the clock interjection node A as a starting point, a route turning to the adjacent node F in the counter clockwise direction (that is, from the node A to B, to C, to D, to E and to F) is the extraction route of the operation clock.


Taking the clock interjection node A as a starting point, a route turning to the adjacent node B in the clockwise direction (that is, from the node A to F, to E, to D, to C and to B) is a route for extracting a protection clock.


The priority of extracting a clock is 1 for the port of extracting the operation clock on each node, and the port with a lower priority of extracting a clock is the port for extracting the protection clock.


For FIG. 10 (b):


Taking the node A as a starting point, a route turning to the adjacent node E in the counter clockwise direction (that is, from the node A to B, to C, to D and to E) is the extraction route of the operation clock.


Taking the node F as a starting point, a route turning to the adjacent node B in the clockwise direction (that is, from the node F to E, to D, to C and to B) is a route for extracting a protection clock.


The priority of extracting a clock is 1 for the port of extracting the operation clock on each node, and the port with a lower priority of extracting a clock is the port for extracting the protection clock.


The configurations for the rings in FIG. 10 (a), FIG. 10 (b) correspond to the second scenario in the second embodiment.


Eleventh Example


In this example, the ring at the upper layer (for example, the core ring or the non-core ring at the previous upper layer) is configured in the shortest-path manner. As shown in FIG. 11, the non-core ring 1.1 is composed of nodes A, B, C, D, E and F. The configuration is as follows.


An access node is determined as the clock injection node of the non-core ring. In FIG. 11 (a), the node A is the access node for accessing the upper layer, also is the clock injection node of the non-core ring 1.1. In FIG. 11 (b). The nodes A and F are the access nodes for accessing the upper layer, and are also the clock injection nodes. The nodes A and F are all main clock injection nodes.


For FIG. 11 (a):


For the node B, a chain on the shortest path from the node B to the clock injection node A is the extraction chain for the operation clock (that is, from the node A to B). The chain in the direction opposite to that of the extraction chain for the operation clock is the extraction chain for the protection clock (that is, from the node C to B).


Other nodes are all configured in the same shortest-path manner as for the node B.


The priority of extracting a clock is 1 for the port of extracting the operation clock on each node, and the port with a lower priority of extracting a clock is the port for extracting the protection clock.


For FIG. 11 (b):


The nodes A and F all main clock injection nodes.


For the node B, a chain on the shortest path from the node B to the clock injection node A is the extraction chain for the operation clock (that is, from the node A to B). The chain in the direction opposite to that of the extraction chain for the operation clock is the extraction chain for the protection clock (that is, from the node C to B).


For the node E, a chain on the shortest path from the node E to the clock injection node F is the extraction chain for the operation clock (that is, from the node F to E). The chain in the direction opposite to that of the extraction chain for the operation clock is the extraction chain for the protection clock (that is, from the node D to E).


Other nodes are all configured in the same shortest-path manner as for the nodes B and E.


The priority of extracting a clock is 1 for the port of extracting the operation clock on each node, and the port with a lower priority of extracting a clock is the port for extracting the protection clock.


The configuration for the ring in FIG. 11(a) corresponds to the third scenario in the fourth embodiment. The configuration for the ring in FIG. 11(b) corresponds to the second scenario in the fifth embodiment.


Twelfth Example

In this example, the clock extraction is performed in a single direction. As shown in FIG. 12, the node C of the non-core chain is a clock injection node, and the configuration rule is as follows.


The access node C is determined as a clock injection node of the non-core chain.


The configuration is the same as configuring a core chain, that is, the shortest path from each node (A, B, D and E) to the clock injection node C is the route for extracting the operation clock of the node.


For a chain structure, there is no situation of clock injection at multiple points, becauser if there is clock injection at multiple points, a loop is certainly formed.


It should be noted that, although in the examples herein, the core rings and the non-core rings are described differently, for the clock configuration, the types thereof may be not taken into consideration, but corresponding configuration is adopted depending on the topology.


It will be understood by those ordinary skilled in the art that all or a portion of the steps of the embodiments described above may be implemented in processes of a computer program that may be stored in a computer readable storage medium. The computer program may be executed on a corresponding hardware platform (such as a system, a device, an apparatus, a means, etc.). If being executed, the computer program causer corresponding devices to perform one or combination of the steps of the method according to the embodiments.


Alternatively, all or part of the steps of the embodiments described above may also be implemented in an integrated circuit. These steps may be separately integrated into integrated circuit modules or a plurality of modules or steps thereof may be implemented as a single integrated circuit module.


The devices/functional modules/functional units in the above embodiments may be implemented by a general-purpose computing device, which may be integrated on a single computing device or may be distributed over a network of a plurality of computing devices.


The devices/functional modules/functional units in the above embodiments may be stored in a computer-readable storage medium in the form of software function modules and sold or used as a stand-alone product. The above-mentioned computer-readable storage medium may be a read-only memory, a magnetic disk, or an optical disk.


INDUSTRIAL APPLICABILITY

Through the embodiments of the present disclosure, clock configuration of the synchronization network with various topologies and injected clock sources are achieved, and it may prevent the clocks from forming a loop.

Claims
  • 1. A configuration method for a synchronization network, comprising: determining at least the following information: topology of the synchronization network, and the number of external clocks enabled by the synchronization network; andperforming clock configuration for the synchronization network according to the determined information.
  • 2. The configuration method according to claim 1, wherein: if the synchronization network comprises a ring having an external clock injected at a single point, configuring the synchronization network comprises: performing the clock configuration for the ring in a ring manner by:for a node having external clock injection in the ring, configuring an extracted external clock; andfor each node having no external clock injection in the ring, configuring two chains for extracting clocks from adjacent nodes at both sides of the node, and configuring an extracted clock in an extraction direction being the same as a preset extraction direction of an operation clock of the ring, as an operation clock, the extraction direction of the operation clock of the ring being clockwise or counter clockwise.
  • 3. The configuration method according to claim 2, wherein: the ring is a single ring; orthe ring is interconnected at least with another ring, and a non-interconnection node in the ring has external clock injection; orthe ring is interconnected with at least another ring, other nodes than a node for interconnecting with the ring in the another ring has external clock injection, and interconnection nodes of the ring and the another ring are regarded as nodes having external clock injection in respective rings.
  • 4. The configuration method according to claim 1, wherein: if the synchronization network comprises a ring having external clocks injected at double points, configuring the synchronization network comprises: performing the clock configuration for the ring in a ring manner by:for each node having no external clock injection in the ring, configuring two chains for extracting clocks from adjacent nodes at both sides of the node, and configuring an extracted clock in an extraction direction being the same as a preset extraction direction of an operation clock of the ring, as an operation clock, the extraction direction of the operation clock of the ring being clockwise or counter clockwise; andconfiguring one of two nodes having external clock injection in the ring as a main operation node, and another of the two nodes as a standby operation node; for the main operation node, configuring an extracted external clock and configuring one chain for extracting a clock from an adjacent node at one side of the main operation node in an extraction direction being opposite to the extraction direction of the operation clock of the ring; and for the standby operation node, configuring an extracted external clock and configuring one chain for extracting a clock from an adjacent node at one side of the standby operation node in an extraction direction being the same as the extraction direction of the operation clock of the ring, and configuring the extracted clock of the chain as the operation clock.
  • 5. The configuration method according to claim 4, wherein: the ring is a single ring; orthe ring is interconnected at least with another ring, and two non-interconnection nodes in the ring have external clock injection; orthe ring is interconnected with at least another ring, other nodes than an interconnection node in the two rings have external clock injection, and interconnection nodes of the ring and the another ring are regarded as one node having external clock injection in respective rings, the ring is performed with clock configuration; and the one node being regarded as having external clock injection has different operation states in the two rings to which the node belongs; orthe ring is interconnected with at least another two rings, each node other than a node interconnected with the ring in the another two rings has external clock injection, all nodes interconnected with each of the another two rings in the ring are regarded as one node having external clock injection in the ring, the ring is performed with clock configuration; and the one node being regarded as having external clock injection has different operation states in the two rings to which the node belongs.
  • 6. The configuration method according to claim 5, wherein: if two interconnection nodes are regarded as one node, the method further comprises:determining the operation states of the two interconnection nodes as standby main rings;configuring two chains of extracted clocks in two directions between the two interconnection nodes, or configuring one chain in an extraction direction being the same as the extraction direction of an operation clock of the main ring, and configuring the extracted clock in an extraction direction being the same as the extraction direction of the operation clock of the main ring as the operation clock.
  • 7. The configuration method according to claim 1, wherein if the synchronization network comprises a ring having an external clock injected at a single point, configuring the synchronization network comprises: performing the clock configuration for the ring in a shortest-path manner by:for a node having external clock injection in the ring, configuring an extracted external clock; andfor each node having no external clock injection in the ring, determining a shortest path from the node having no external clock injection to a node having external clock injection, configuring for the node having no external clock injection two chains for extracting clocks from adjacent nodes at both sides of the node having no external clock injection, and configuring an extracted clock of one of the chains located on the shortest path as the operation clock.
  • 8. The configuration method according to claim 7, wherein: the ring is a single ring; orthe ring is interconnected at least with another ring, and a non-interconnection node in the ring has external clock injection; orthe ring is interconnected with at least another ring at a single point, other nodes than the node for interconnecting with the ring in the another ring has external clock injection, and the interconnection node is a node having external clock injection in the ring.
  • 9. The configuration method according to claim 1, wherein: if the synchronization network comprises a ring having external clocks injected at double points, configuring the synchronization network comprises: performing the clock configuration for the ring in a shortest-path manner, by:for each node having external clock injection in the ring, configuring an extracted external clock and configuring at least one chain for extracting a clock from an adjacent node at one side of the node having external clock injection; andfor each node having no external clock injection in the ring, determining a shortest path from the node having external clock injection to a node having external clock injection, configuring for the node having external clock injection two chains for extracting clocks from adjacent nodes at both sides of the node having external clock injection, and configuring an extracted clock of one of the chains located on the shortest path as the operation clock.
  • 10. The configuration method according to claim 9, wherein: for each node having external clock injection in the ring, configuring at least one chain for extracting a clock from an adjacent node at one side of the node having external clock injection comprises:if a common adjacent node exists between two nodes having external clock injection, for each of the two nodes, configuring only one chain for extracting an external clock from a non-common adjacent node for the node having external clock injection.
  • 11. The configuration method according to claim 9, wherein: the ring is a single ring; orthe ring is interconnected with at least another ring at double points, other nodes than the node for interconnecting with the ring in the another ring has external clock injection, and the two nodes for interconnecting the ring and the another ring are two nodes having external clock injection in the ring.
  • 12. The configuration method according to claim 1, wherein: if the synchronization network comprises two interconnected rings, and in each of the rings, a node other than a node for interconnecting the two rings has external clock injection, configuring the synchronization network comprises: performing the clock configuration for the two rings in a shortest-path manner by:for each interconnection node of the two rings, determining a shortest path from the interconnection node to a node having external clock injection in the two rings, configuring for the interconnection node a plurality of chains for extracting clocks from adjacent nodes of the interconnection node, and configuring an extracted clock of one of the chains located on the shortest path as the operation clock;for each non-interconnection node of the two rings, determining a shortest path from the non-interconnection node to a node having external clock injection in the same ring, configuring for the non-interconnection node two chains for extracting clocks from adjacent nodes at both sides of the non-interconnection node, and configuring an extracted clock of one of the chains located on the shortest path as the operation clock; andfor each node having external clock injection in the two rings, configuring an extracted clock and configuring two chains for extracting clocks from adjacent nodes at both sides of the node having external clock injection.
  • 13. The configuration method according to claim 1, wherein: if the synchronization network comprises a chain having external clocks injected at a single point, configuring the synchronization network comprises: performing the clock configuration for the chain by:for a node having external clock injection in the chain, configuring an extracted external clock; andfor each node having no external clock injection in the chain, configuring one chain for extracting a clock from an adjacent node at one side of the node having no external clock injection which is closest to a node having clock injection in the ring.
  • 14. A configuration apparatus for a synchronization network, comprising: a processor; anda memory for storing instructions executable by the processor;wherein the processor is configured to:determine at least the following information: topology of the synchronization network and the number of external clocks enabled by the synchronization network; andperform clock configuration for the synchronization network according to the determined information.
  • 15. The configuration apparatus according to claim 14, wherein the processor is configured to: if the synchronization network comprises a ring having an external clock injected at a single point,for a node having external clock injection in the ring, configure an extracted external clock; andfor each node having no external clock injection in the ring, configure two chains for extracting clocks from adjacent nodes at both sides of the node having no external clock injection, and configure an extracted clock in an extraction direction being the same as a preset extraction direction of an operation clock of the ring, as an operation clock, the extraction direction of an operation clock of the ring being clockwise or counter clockwise.
  • 16. The configuration apparatus according to claim 15, wherein: the ring is a single ring; orthe ring is interconnected at least with another ring, and a non-interconnection node in the ring has external clock injection; orthe ring is interconnected with at least another ring, other nodes than a node for interconnecting with the node in the another ring has external clock injection, and the processor is configured to regard each interconnection node of the ring and the another ring as a node having external clock injection in the ring and performs the clock configuration for the ring.
  • 17. The configuration apparatus according to claim 14, wherein the processor is configured to: if the synchronization network comprises a ring having external clocks injected at double points,for each node having no external clock injection in the ring, configure two chains for extracting clocks from adjacent nodes at both sides of the node having no external clock injection, and configure an extracted clock in an extraction direction being the same as a preset extraction direction of an operation clock of the ring, as an operation clock, the extraction direction of an operation clock of the ring being clockwise or counter clockwise; andconfigure one of two nodes having external clock injection in the ring as a main operation node, and another of the two nodes as a standby operation node; for the main operation node, configure an extracted external clock and configure one chain for extracting a clock from an adjacent node at one side of the main operation node in an extraction direction being opposite to the extraction direction of the operation clock of the ring; and for the standby operation node, configure an extracted external clock and configure one chain for extracting a clock from an adjacent node at one side of the standby operation node in an extraction direction being the same as the extraction direction of the operation clock of the ring, and configure the extracted clock of the chain as the operation clock.
  • 18. The configuration apparatus according to claim 17, wherein: the ring is a single ring; orthe ring is interconnected at least with another ring, and two non-interconnection nodes in the ring have external clock injection; orthe ring is interconnected with at least another ring, other nodes than an interconnection node in the two rings have external clock injection, the processor is configured to regard all interconnection nodes of the ring and the another ring as one node having external clock injection in the ring, and performs clock configuration for the ring; and the node being regarded as having external clock injection has different operation states in the two rings to which the node belongs; orthe ring is interconnected with at least another two rings, each node other than a node interconnected with the ring in the another two rings has external clock injection, the processor is configured to regard all nodes interconnected with each of the another two rings in the ring as one node having external clock injection in the ring, and performs clock configuration for the ring; and the one node being regarded as having external clock injection has different operation states in the two rings to which the node belongs.
  • 19. The configuration apparatus according to claim 18, wherein the processor is configured to: if two interconnection nodes are regarded as one node,determine the operations state of the two interconnection nodes as standby main rings; configure two chains of extracted clocks in two directions between the two interconnection nodes, or configure one chain in an extraction direction being the same as the extraction direction of an operation clock of the main ring, and configure the extracted clock in an extraction direction being the same as the extraction direction of an operation clock of the main ring as the operation clock.
  • 20. The configuration apparatus according to claim 14, wherein the processor is configured to: if the synchronization network comprises a ring having an external clock injected at a single point,for a node having external clock injection in the ring, configure an extracted external clock; andfor each node having no external clock injection in the ring, determine a shortest path from the node having no external clock injection to a node having external clock injection, configure for the node having no external clock injection two chains for extracting clocks from adjacent nodes at both sides of the node having no external clock injection, and configuring an extracted clock of one of the chains located on the shortest path as the operation clock.
  • 21. The configuration apparatus according to claim 20, wherein: the ring is a single ring; orthe ring is interconnected at least with another ring, and a non-interconnection node in the ring has external clock injection; orthe ring is interconnected with at least another ring at a single point, other nodes than the node for interconnecting with the ring in the another ring has external clock injection, and the interconnection node is a node having external clock injection in the ring.
  • 22. The configuration apparatus according to claim 14, wherein the processor is configured to: if the synchronization network comprises a ring having external clocks injected at double points,for each node having external clock injection in the ring, configure an extracted external clock and configure at least one chain for extracting a clock from an adjacent node at one side of the node having no external clock injection; andfor each node having no external clock injection in the ring, determine a shortest path from the node having no external clock injection to a node having external clock injection, configure for the node having no external clock injection two chains for extracting clocks from adjacent nodes at both sides of the node having no external clock injection, and configure an extracted clock of a chain located on the shortest path as the operation clock.
  • 23. The configuration apparatus according to claim 22, wherein the processor is configured to: if a common adjacent node exists between the two nodes having external clock injection, for each of the two nodes having external clock injection, configuring only one chain for extracting an external clock from a non-common adjacent node.
  • 24. The configuration apparatus according to claim 22, wherein: the ring is a single ring; orthe ring is interconnected with at least another ring at double points, other nodes than the node for interconnecting with the ring in the another ring has external clock injection, and the two nodes for interconnecting the ring and the another ring are two nodes having external clock injection in the ring.
  • 25. The configuration apparatus according to claim 14, wherein: if the synchronization network comprises two interconnected rings, and in each of the rings, a node other than a node for interconnecting the two rings has external clock injection;the processor is configured to,for each interconnection node of the two rings, determine a shortest path from the interconnection node of the two rings to a node having external clock injection in the two rings, configure for the interconnection node of the two rings a plurality of chains for extracting clocks from adjacent nodes of the interconnection node of the two rings, and configure an extracted clock of one of the chains located on the shortest path as the operation clock;for each non-interconnection node of the two rings, determine a shortest path from the non-interconnection node of the two rings to a node having external clock injection in the same ring, configure for the non-interconnection node of the two rings two chains for extracting clocks from adjacent nodes at both sides of the non-interconnection node of the two rings, and configure an extracted clock of one of the chains located on the shortest path as the operation clock; anda third configuration unit configured to, for each node having external clock injection in the two rings, configure an extracted clock and configure two chains for extracting clocks from adjacent nodes at both sides of the node having external clock injection in the two rings.
  • 26. The configuration apparatus according to claim 14, wherein the processor is configured to: if the synchronization network comprises a chain having external clocks injected at a single point,for a node having external clock injection in the chain, configure an extracted external clock; andfor each node having no external clock injection in the chain, configure one chain for extracting a clock from an adjacent node at one side of the having no external clock injection which is closest to a node having clock injection in the ring.
  • 27. A computer readable storage medium, storing program instructions which, if being executed by a processor, implement a configuration method for a synchronization network which comprises: determining at least the following information: topology of the synchronization network, and the number of external clocks enabled by the synchronization network; andperforming clock configuration for the synchronization network according to the determined information.
Priority Claims (1)
Number Date Country Kind
201510163644.7 Apr 2015 CN national
CROSS-REFERENCE TO RELATED APPLICATION

This application is based upon and claims priority to PCT Application No. PCT/CN2015/088149, filed Aug. 26, 2015, which is based upon and claims priority to Chinese Patent Application No. 201510163644.7, filed Apr. 8, 2015, the entire contents of which are incorporated herein by reference.

PCT Information
Filing Document Filing Date Country Kind
PCT/CN2015/088149 8/26/2015 WO 00