The present disclosure relates to the field of communication technology, and more particularly, to a configuration method, a configuration apparatus for a synchronization network and a computer readable storage medium.
With rapid development of new communication technologies and new businesses, bandwidth of communication network keeps growing, the transmission rate keeps increasing, and networks are getting more merged with one another. Facing competition in the telecommunications market, communication enterprises need to introduce new technologies to improve service quality, to develop from the competition. At present, new data services such as e-commerce, multimedia communications, IP telephone are new growth points of telecommunication business. For traditional business, there are demands for enterprises interconnection and inter-network settlements. Moreover, communications business involves security, authentication and billing, etc. All of these problems demonstrate importance of synchronization networks to modern telecommunications networks.
Synchronization network is one of the support systems for running a telecommunications network, providing synchronization control signals for clocks (or carriers) in telecommunication devices within the telecommunications network to make the operation rates of the telecommunication devices synchronized. The synchronization network is an indispensable part of the telecommunications network. The synchronization network may ensure network timing performance and then ensure the smooth conduction of the key businesses. With the development and application of SDH (Synchronous Digital Hierarchy), ATM (Asynchronous Transfer Mode), CDMA (Code Division Multiple Access), IP (Internet Protocol) and other technologies, a variety of business networks have ever higher requirements on synchronization. The concept of synchronization has gradually evolved from conventional frequency synchronization to clock synchronization (including frequency synchronization and/or time synchronization).
With evolving of telecommunication networks to intelligent and automation networks, intelligence of synchronization network has also been included in the demand list for research. How to configure the synchronization network has become a problem to be solved.
This section provides background information related to the present disclosure which is not necessarily prior art.
The following is a summary of the subject matter of the detailed description herein. The summary is not intended to limit the protection scope of the claims.
An embodiment of the present disclosure provides a configuration method for a synchronization network. The method includes the following steps.
At least the following information is determined: topology of the synchronization network and the number of external clocks enabled by the synchronization network.
Clock configuration is for the synchronization network according to the determined information.
According to an exemplary embodiment, if the synchronization network includes a ring having an external clock injected at a single point, configuring the synchronization network comprises: performing the clock configuration for the ring in a ring manner by:
for a node having external clock injection in the ring, configuring an extracted external clock; and
for each node having no external clock injection in the ring, configuring two chains for extracting clocks from adjacent nodes at both sides of the node, and configuring an extracted clock in an extraction direction being the same as a preset extraction direction of an operation clock of the ring, as an operation clock, the extraction direction of an operation clock of the ring being clockwise or counter clockwise.
An embodiment of the present disclosure also provides a configuration apparatus for a synchronization network. The apparatus includes a processor and a memory. The memory stores instructions executable by the processor. The processor is configured to:
determine at least the following information: topology of the synchronization network; and the number of external clocks enabled by the synchronization network;
perform clock configuration for the synchronization network according to the determined information.
An embodiment of the present disclosure also provides a computer readable storage medium, storing program instructions which, if being executed by a processor, implement the configuration method for a synchronization network provided by the embodiments of the present disclosure.
Through the above solutions, clock configuration of the synchronization network with various topologies and injected clock sources are achieved, and it has at least one of the following advantages: simple, reliable, and may prevent the clocks from forming a loop.
This section provides a summary of various implementations or examples of the technology described in the disclosure, and is not a comprehensive disclosure of the full scope or all features of the disclosed technology.
In order to make the objectives, technical solutions and advantages of the embodiments of the present disclosure become clearer, the embodiments of the present disclosure will be described in detail hereinafter with reference to the accompanying drawings. It is should be noted that the embodiments and features in the embodiments in the present application may be combined with each other if no confliction is caused.
The present embodiment relates to a configuration method for a synchronization network. The synchronization network mentioned herein may refer to an entire network or a local network. From the topological point of view, it may be a single ring (not interconnected with other rings), multiple rings interconnected with each other, a chain or a combination thereof, and the like.
As shown in
At step 110, at least the following information is determined: topology of the synchronization network; and the number of external clocks enabled by the synchronization network.
At step 120, clock configuration is performed for the synchronization network according to the determined information.
Accordingly, the present embodiment also provides a configuration apparatus for a synchronization network. As shown in
The information acquisition module 10 is configured to determine at least the following information: topology of the synchronization network; and the number of external clocks enabled by the synchronization network.
The clock configuration module 20 configured to perform clock configuration for the synchronization network according to the determined information.
The topology of the synchronization network includes a ring and a chain. The ring topology may be divided into single ring or interconnected rings. For a single ring, the enabled external clock may be injected from a single node of the ring (single point injection) or from multiple nodes (such as double point injection). The so-called external clock is a clock extracted from outside of the ring, also known as an extracted external clock. For interconnected rings, a clock extracted from one ring at an interconnection node may be an external clock for another ring. For a ring, the clock configuration may be performed in a ring manner, or may be performed in a shortest-path manner.
Clock configuration for various situations will be described in detail with reference to the following embodiments.
In the present embodiment, the synchronization network includes a ring having an external clock injected at a single point, and the clock configuration is performed for the ring in a ring manner. Specifically, the clock configuration may include the following steps.
For a node having external clock injection in the ring, an extracted external clock is configured.
For each node having no external clock injection in the ring, two chains for extracting clocks from adjacent nodes at both sides thereof are configured, and an extracted clock in an extraction direction being the same as a preset extraction direction of an operation clock of the ring is configured as an operation clock. The extraction direction of an operation clock of the ring is clockwise or counter clockwise.
Correspondingly, the clock configuration module of the present embodiment configures the ring in a ring manner. The clock configuration module may include a first configuration unit and a second configuration unit.
The first configuration unit is configured to, for a node having external clock injection in the ring, configure an extracted clock.
The second configuration unit is configured to, for each node having no external clock injection in the ring, configure two chains for extracting clocks from adjacent nodes at both sides thereof, and configure an extracted clock in an extraction direction being the same as a preset extraction direction of an operation clock of the ring, as an operation clock, the extraction direction of an operation clock of the ring being clockwise or counter clockwise.
In the embodiment, there may be the following different scenarios.
First, the ring is a single ring.
Second, the ring is interconnected at least with another ring, and a non-interconnection node in the ring has external clock injection.
Third, the ring is interconnected with at least another ring, other nodes than a node for interconnecting with the ring in the another ring have external clock injection, and each interconnection node of the ring and the another ring is regarded as a node having external clock injection in the ring.
In the present embodiment, the synchronization network includes a ring having external clocks injected at double points, and the clock configuration is performed for the ring in a ring manner. The clock configuration may include the following steps.
For each node having no external clock injection in the ring, two chains for extracting clocks from adjacent nodes at both sides thereof are configured, and an extracted clock in an extraction direction being the same as a preset extraction direction of an operation clock of the ring is configured as an operation clock. The extraction direction of an operation clock of the ring is clockwise or counter clockwise.
One of two nodes having external clock injection in the ring is configured as a main operation node, and another of the two nodes is configured as a standby operation node. For the main operation node, an extracted external clock is configured and one chain for extracting a clock from an adjacent node at one side in an extraction direction being opposite to the extraction direction of the operation clock of the ring is configured. For the standby operation node, an extracted external clock is configured, and one chain for extracting a clock from an adjacent node at one side in an extraction direction being the same as the extraction direction of the operation clock of the ring is configured, and the extracted clock of the chain is configured as the operation clock.
Correspondingly, the clock configuration module of the present embodiment configures the ring in a ring manner. The clock configuration module may include a first configuration unit and a second configuration unit.
The first configuration unit is configured to, for each node having no external clock injection in the ring, configure two chains for extracting clocks from adjacent nodes at both sides thereof, and configure an extracted clock in an extraction direction being the same as a preset extraction direction of an operation clock of the ring, as an operation clock. The extraction direction of an operation clock of the ring is clockwise or counter clockwise.
The second configuration unit is configured to configure one of two nodes having external clock injection in the ring as a main operation node, and another of the two nodes as a standby operation node. For the main operation node, the second configuration unit configures an extracted external clock and configures one chain for extracting a clock from an adjacent node at one side in an extraction direction being opposite to the extraction direction of the operation clock of the ring. For the standby operation node, the second configuration unit configures an extracted external clock and configures one chain for extracting a clock from an adjacent node at one side in an extraction direction being the same as the extraction direction of the operation clock of the ring, and configures the extracted clock of the chain as the operation clock.
In the embodiment, there may be the following scenarios.
First, the ring is a single ring.
Second, the ring is interconnected at least with another ring, and two non-interconnection nodes in the ring have external clock injection.
Third, the ring is interconnected with at least another ring, other nodes than an interconnection node in the two rings have external clock injection, each interconnection node of the ring and the another ring is regarded as a node having external clock injection in the ring, the ring being performed with clock configuration, and a node being regarded as having external clock injection in the ring has different operation states in the two rings to which the node belongs. The operation states referring to main operation or standby operation.
Fourth, the ring is interconnected with at least another two rings, each node other than a node interconnected with the ring in the another two rings has external clock injection, each node interconnected with each of the another two rings in the ring is regarded as a node having external clock injection in the ring, clock configuration is performed on the ring; and each node being regarded as having external clock injection in the ring has different operation states in the two rings to which the node belongs.
According to an exemplary embodiment, if two interconnection nodes are regarded as one node, the method further includes: determining the operation states of the two interconnection nodes as standby main rings; configuring two chains of extracted clocks in two directions between the two interconnection nodes, or configuring one chain in an extraction direction being the same as the extraction direction of an operation clock of the main ring, and configuring the extracted clock in an extraction direction being the same as the extraction direction of an operation clock of the main ring as the operation clock. Correspondingly, the clock configuration module also includes a third configuration unit. The third configuration unit is configured to determine the operation states of the two interconnection nodes as standby main rings; configure two chains of extracted clocks in two directions between the two interconnection nodes, or configure one chain in an extraction direction being the same as the extraction direction of an operation clock of the main ring, and configure the extracted clock in an extraction direction being the same as the extraction direction of an operation clock of the main ring as the operation clock.
In the present embodiment, the synchronization network includes a ring having an external clock injected at a single point, and the clock configuration is performed for the ring in a in a shortest-path manner. The clock configuration may include the following steps.
For a node having external clock injection in the ring, an extracted external clock is configured.
For each node having no external clock injection in the ring, a shortest path from the node to a node having external clock injection is determined. For the node, two chains for extracting clocks from adjacent nodes at both sides thereof are configured, and an extracted clock of one of the chains located on the shortest path is configured as the operation clock.
The shortest path may be determined by a variety of methods. An extraction path from the node to a node having external clock injection being the shortest may refer to that the number of nodes on the path for extracting the operation clock from the node to the clock node is minimum, or a length of the chain is minimum, or a weighted sum of the number of nodes and the length of chains is minimum, and so on. For example, within a ring having single point injection, there are two possible paths from a node having no clock injection to a node having clock injection. Within a ring of double point injection, there are four possible paths from a node having no clock injection to a node having clock injection. The shortest path may be determined by comparison.
Correspondingly, the clock configuration module of the present embodiment configures the ring in the shortest path manner. The clock configuration may include a first configuration unit and a second configuration unit.
The first configuration unit is configured to, for a node having external clock injection in the ring, configure an extracted external clock.
The second configuration unit is configured to, for each node having no external clock injection in the ring, determine a shortest path from the node to a node having external clock injection, configure for the node two chains for extracting clocks from adjacent nodes at both sides thereof, and configuring an extracted clock of one of the chains located on the shortest path as the operation clock.
In the embodiment, there may be the following scenarios.
First, the ring is a single ring.
Second, the ring is interconnected at least with another ring, and a non-interconnection node in the ring has external clock injection.
Third, the ring is interconnected with at least another ring at a single point, other nodes than the node for interconnecting with the node in the another ring have external clock injection, and the interconnection node is a node having external clock injection in the ring.
In the present embodiment, the synchronization network includes a ring having external clocks injected at double points, and the clock configuration is performed for the ring in a shortest-path manner. The clock configuration may include the following steps.
For each node having external clock injection in the ring, an extracted external clock is configured and at least one chain for extracting a clock from an adjacent node at one side thereof is configured.
For each node having no external clock injection in the ring, a shortest path from the node to a node having external clock injection is determined. For the node, two chains for extracting clocks from adjacent nodes at both sides thereof are configured, and an extracted clock of one of the chains located on the shortest path is configured as the operation clock.
Correspondingly, the clock configuration module of the present embodiment configures the ring in a shortest-path manner. The clock configuration module includes a first configuration unit and a second configuration unit.
The first configuration unit is configured to, for each node having external clock injection in the ring, configure an extracted external clock and configure at least one chain for extracting a clock from an adjacent node at one side thereof.
The second configuration unit is configured to, for each node having no external clock injection in the ring, determine a shortest path from the node to a node having external clock injection, configure for the node two chains for extracting clocks from adjacent nodes at both sides thereof, and configure an extracted clock of a chain located on the shortest path as the operation clock.
According to an exemplary embodiment, for each node having external clock injection in the ring, configuring at least one chain for extracting a clock from an adjacent node at one side thereof includes: if there is a common adjacent node between two nodes, for each of the two nodes, configuring only one chain for extracting an external clock from a non-common adjacent node. Correspondingly, the first configuration unit configuring, for each of the two nodes having external clock injection in the ring, at least one chain for extracting a clock from an adjacent node at one side thereof includes: if there is a common adjacent node between the two nodes, for each of the two nodes, configuring only one chain for extracting an external clock from a non-common adjacent node.
In the present embodiment, there may be the following scenarios.
First, the ring is a single ring.
Second, the ring is interconnected with at least another ring at double points, other nodes than the node for interconnecting with the node in the another ring have external clock injection, and the two nodes for interconnecting the ring and the another ring are two nodes having external clock injection in the ring.
In the present embodiment, the synchronization network includes two interconnected rings. In each of the rings, a node other than a node for interconnecting the two rings has external clock injection. The clock configuration is performed for the two rings in a shortest-path manner. The clock configuration may include the following steps.
For each interconnection node of the two rings, a shortest path from the node to a node having external clock injection in the two rings is determined. For the node, a plurality of chains for extracting clocks from adjacent nodes thereof are determined, and an extracted clock of one of the chains located on the shortest path is configured as the operation clock.
For each non-interconnection node of the two rings, a shortest path from the node to a node having external clock injection in the same ring is determined. For the node, two chains for extracting clocks from adjacent nodes at both sides thereof are determined, and an extracted clock of one of the chains located on the shortest path is configured as the operation clock.
For each node having external clock injection in the two rings, an extracted clock is configured and two chains for extracting clocks from adjacent nodes at both sides thereof are configured.
Correspondingly, the clock configuration module of the present embodiment configures the two rings in a shortest-path manner. The clock configuration module may include a first configuration unit, a second configuration unit and a third configuration unit.
The first configuration unit is configured to, for each interconnection node of the two rings, determine a shortest path from the node to a node having external clock injection in the two rings, configure for the node a plurality of chains for extracting clocks from adjacent nodes thereof, and configure an extracted clock of one of the chains located on the shortest path as the operation clock.
The second configuration unit is configured to, for each non-interconnection node of the two rings, determine a shortest path from the node to a node having external clock injection in the same ring, configure for the node two chains for extracting clocks from adjacent nodes at both sides thereof, and configure an extracted clock of one of the chains located on the shortest path as the operation clock.
The third configuration unit is configured to, for each node having external clock injection in the two rings, configure an extracted clock and configure two chains for extracting clocks from adjacent nodes at both sides thereof.
In the present embodiment, the synchronization network includes a chain having external clocks injected at a single point, and the clock configuration is performed for the chain. The clock configuration may include the following steps.
For a node having external clock injection in the chain, an extracted external clock is configured.
For each node having no external clock injection in the chain, one chain for extracting a clock from an adjacent node at one side thereof which is closest to a node having clock injection in the ring is configured.
Correspondingly, the clock configuration module of the present embodiment performs clock configuration for the chain. The clock configuration may include a first to configuration unit and a second configuration unit.
The first configuration unit is configured to, for a node having external clock injection in the chain, configure an extracted external clock.
The second configuration unit is configured to, for each node having no external clock injection in the chain, configure one chain for extracting a clock from an adjacent node at one side thereof which is closest to a node having clock injection in the ring.
An embodiment of the present disclosure also provide a computer readable storage medium for storing program instructions which, if being executed by a processor, implement the configuration method for a synchronization network provided by any one of the first to the seventh embodiments of the present disclosure.
The method according to the embodiments will be described below with reference to some examples.
In these examples, for a ring configuration, an extraction direction of an operation clock of the ring can be set. In the figures of these examples, the extraction direction of an operation clock of the ring is counter clockwise, for example. However, it may also be clockwise.
In these examples, the core rings and/or chains may be divided into the following types: a single core ring, multiple core rings, and a core chain. The number of nodes of a ring for injection of a clock source may be one or more. The core ring is a ring network of a designated core according to users' demands. The core chain is a chain network of a designated core according to users' demand.
To configure a ring, for each of single point injection and double point injection of the clock source, there are two configuration manners: a ring manner and a shortest-path manner.
For configuring a ring of the double point injection in the ring manner, clock sources (i.e. the external clocks) are divided into a main operation clock source and a standby operation clock source. For configuring a ring of double point injection in the shortest-path manner, the clock sources are not divided into a main operation clock source and a standby operation clock source. Herein, if the clock sources are not divided into a main operation clock source and a standby operation clock source, all the clock sources are regarded as main operation clock sources by default.
The operation clock of a node for injecting a clock is an injection clock source, and a route on the node for injecting a clock extracts a standby clock.
For configuration manner of a non-core ring and/or chain, if a clock has been configured for a node for interconnecting with the ring and/or chain in the upper layer, clock configuration is not performed again in the present layer.
During configuration, the rules for extracting a clock by a plurality of chains between nodes are as follows. If there are clock mutual-extractions in two directions between the nodes, there is at most one chain for mutual-extraction. If there is only a clock extraction in one direction between the nodes, there may be at most two chains for extraction. The clock chain may adopt optical port priority, high rate port priority principle.
During configuration, the rules for the ring direction setting are as follows. For a ring manner, it is required to prescribe a clockwise direction and a counter clockwise direction uniformly. For example, the direction may be taken according to the following rules: selecting one clock node or a node for injecting a clock on the ring; acquiring two network elements adjacent to the node; and taking a direction from the node to a network element with a larger ID as a counter clockwise direction.
As shown in
Only an extracted external clock is configured for the clock node A, and the priority for the extracted clock is the highest, which is 1.
Taking the clock node A as a starting point, a route turning to the adjacent node F in the counter clockwise direction (that is, from the node A to B, to C, to D, to E and to F) is the extraction route of the operation clock (represented by a solid line in the figure, and composed of chains for extracting the operation clock between adjacent nodes on the route).
In an opposite direction, taking the clock node A as a starting point, a route turning to the adjacent node B in the clockwise direction (that is, from the node A to F, to E, to D, to C and to B) is a route for extracting a protection clock (represented by a dashed line in the figure, and composed of chains for extracting the protection clock between adjacent nodes on the route).
The priority of extracting a clock is 1 for the port of extracting the operation clock on each node, and the port with a lower priority of extracting a clock is the port for extracting the protection clock.
The configuration for the ring in
As shown in
The node A is set as a main clock node, and the node D is set as a standby clock node.
Taking the main clock node A as a starting point, a route turning to the adjacent node F in the counter clockwise direction (that is, from the node A to B, to C, to D, to E and to F) is the extraction route of the operation clock.
Taking the standby clock node D as a starting point, a route turning to the adjacent node E in the clockwise direction (that is, from the node D to C, to B, to A, to F and to E) is the extraction route of the protection clock.
The priority of extracting a clock is 1 for the port of extracting the operation clock on each node, and the port with a lower priority of extracting a clock is the port for extracting the protection clock.
The configuration for the ring in
As shown in
Only an extracted external clock is configured for the clock node A.
For the node B, a chain on the shortest path from the node B to the clock node A is the extraction chain for the operation clock (that is, from the node A to B). The chain in the direction opposite to that of the extraction chain for the operation clock is the extraction chain for the protection clock (that is, from the node C to B).
Other nodes are all configured in the same shortest-path manner as for the node B.
The priority of extracting a clock is 1 for the port of extracting the operation clock on each node, and the port with a lower priority of extracting a clock is the port for extracting the protection clock.
The configuration for the ring in
As shown in
The two external clock sources are not classified into a main clock source and a standby clock source, and thus both the node A and the node F are main operation clock nodes.
If the operation clocks of the clock nodes A and F are external clock sources (that is, extracted external clocks, or extracted/acquired external clock). The extracted clock priority is 1. Other chain port on the clock node is also for extracting a clock. The extracted clock priority for the other port is lower, and the port is a port for extracting a protection clock.
For the node B, the path from the node B to the clock node A is the shortest. Therefore, this chain is taken as the extraction chain for the operation clock of the node B (that is, from the node A to the node B). The chain in the direction opposite to that of the extraction chain for the operation clock is the extraction chain for the protection clock (that is, from the node C to B).
For the node E, the path from the node E to the clock node F is the shortest. Therefore, this chain is taken as the extraction chain for the operation clock of the node E (that is, from the node F to the node E). The chain in the direction opposite to that of the extraction chain for the operation clock is the extraction chain for the protection clock (that is, from the node D to E).
Other nodes are all configured in the same shortest-path manner as for the nodes B and E.
The priority of extracting a clock is 1 for the port of extracting the operation clock on each node, and the port with a lower priority of extracting a clock is the port for extracting the protection clock.
As shown in
The two external clock sources are not classified into a main clock source and a standby clock source, and thus both the node A and the node D are main operation clock nodes.
If the operation clocks of the clock nodes A and D are external clock sources. The priority of extracting a clock is 1. Other chain port on the clock node is also for extracting a clock. The priority of extracting a clock is lower, and the port is a port for extracting a protection clock.
For the node B, the path from the node B to the clock node A is the shortest. Therefore, this chain is taken as the extraction chain for the operation clock of the node B (that is, from the node A to the node B). The chain in the direction opposite to that of the extraction chain for the operation clock is the extraction chain for the protection clock (that is, from the node C to B).
For the node E, the path from the node E to the clock node D is the shortest. Therefore, this chain is taken as the extraction chain for the operation clock of the node E (that is, from the node D to the node E). The chain in the direction opposite to that of the extraction chain for the operation clock is the extraction chain for the protection clock (that is, from the node F to E).
Other nodes are all configured in the same shortest-path manner as for the nodes B and E.
The priority of extracting a clock is 1 for the port of extracting the operation clock on each node, and the port with a lower priority of extracting a clock is the port for extracting the protection clock.
As shown in
The two external clock sources are not classified into a main clock source and a standby clock source, and thus both the node A and the node D are main operation clock nodes.
If the operation clocks of the clock nodes A and D are external clock sources. The priority of extracting a clock is 1. Other chain port on the clock node is also for extracting a clock. The priority of extracting a clock is lower, and the port is a port for extracting a protection clock.
Since there in only one node E between the clock nodes A and D, in order for the clocks not to form a loop (that is, if the clock source fails, the clock extraction process will not form a loop, otherwise the network clocks will form an endless cycle, and is unable to perform timing), the clock nodes A and D cannot extract a clock from the node E.
For the node B, the path from the node B to the clock node A is the shortest. Therefore, this chain is taken as the extraction chain for the operation clock of the node B (that is, from the node A to the node B). The chain in the direction opposite to that of the extraction chain for the operation clock is the extraction chain for the protection clock (that is, from the node C to B).
Other nodes are all configured in the same shortest-path manner as for the nodes B and E.
The priority of extracting a clock is 1 for the port of extracting the operation clock on each node, and the port with a lower priority of extracting a clock is the port for extracting the protection clock.
The configuration for the ring in
If a plurality of core rings are interconnected, the interconnection may be realized by a single node or double nodes. In this example, the interconnection by double nodes is taken as an example.
As shown in
Only an extracted external clock is configured for the clock node A.
The external clock source is determined at the ring 1. The ring 1 is configured in the ring manner, as follows.
Taking the clock node A as a starting point, a route turning to the adjacent node F in the counter clockwise direction (that is, from the node A to B, to C, to D, to E and to F) is the extraction route of the operation clock.
Taking the clock node A as a starting point, a route turning to the adjacent node B in the clockwise direction (that is, from the node A to F, to E, to D, to C and to B) is a route for extracting a protection clock.
Since the ring 1 and ring 2 are interconnected at double nodes. For the ring 2, the adjacent nodes E and F (including the chain between the two nodes) are regarded as one node EF (also referred to as a logic connection node, a connection node). Clock mutual-extraction is performed between the two interconnection nodes E and F, to achieve complete communication.
The ring 2 is processed as a lower layer of the ring 1, and is configured in the ring manner as follows.
The logic connection node EF is determined as a clock injection node.
Taking the logic connection node EF as a starting point, a route turning to the adjacent node F in the counter clockwise direction (that is, from the node EF to G, to H, to I, and to J) is the extraction route of the operation clock.
Taking the logic connection node EF as a starting point, a route turning to the adjacent node G in the clockwise direction (that is, from the node EF to J, to I, to H, and to G) is the extraction route of the operation clock.
The priority of extracting a clock is 1 for the port of extracting the operation clock on each node, and the port with a lower priority of extracting a clock is the port for extracting the protection clock.
The configuration for the ring 1 in
As shown in
In the present embodiment, as shown in
The interconnected multiple core rings are decomposed into independent single core rings.
For core rings interconnected by a single node, as shown in
For core rings interconnected by double nodes, as shown in
There are a plurality of clock injection nodes on the ring. A main clock node and a standby clock node are determined for the ring. The ring where the main clock is located is the main core ring. The clock node of the main core ring is the main clock node of the network. The standby clock is the connection node of the ring where the main clock is located. In the present embodiment, the main core ring in
The connection node closest to the ring where the main clock is located is the main clock injection node. In the present embodiment, in
The decomposed single rings are configured according to the manner for configuring a single core ring.
If the connection node is the logic node (as shown in
The configuration for the ring 1 in
The configurations for the rings in
Multiple core rings may be interconnection by a single node or double nodes, and so on. In this example, the interconnection by double nodes is taken as an example.
As shown in
The clock source is at the ring 1, and the ring 1 is configured in the same way as configuring a single core ring with a single clock source in the shortest-path manner. Specifically, the following configurations may be performed.
Only an extracted external clock is configured for the clock node A.
For the node B, the chain of the shortest path from the node B to the clock node A is the extraction chain for the operation clock of the node B (that is, from the node A to the node B). The chain in the direction opposite to that of the extraction chain for the operation clock is the extraction chain for the protection clock (that is, from the node C to B).
Other nodes on the ring 1 are all configured in the same shortest-path manner as for the node B.
The priority of extracting a clock is 1 for the port of extracting the operation clock on each node, and the port with a lower priority of extracting a clock is the port for extracting the protection clock.
The ring 2 is processed as a lower layer of the ring 1. Specifically, the following configurations are performed.
The interconnection nodes E and F of the ring 1 are all determined as the clock injection nodes of the ring 2.
The configuration manner is the same as that of the main core ring. Since there are two clock injection nodes, the ring 2 is configured in the same way as configuring a single core ring with multiple clock sources in the shortest-path manner. Specifically, the following configurations are performed.
The two external clock sources are not classified into a main clock source and a standby clock source, and thus both of the node E and the node F are main clock injection nodes.
For the node G, the path from the node G to the clock injection node E is the shortest. Therefore, this chain is taken as the extraction chain for the operation clock of the node G (that is, from the node E to the node G). The chain in the direction opposite to that of the extraction chain for the operation clock is the extraction chain for the protection clock (that is, from the node H to G).
For the node J, the path from the node J to the clock injection node F is the shortest. Therefore, this chain is taken as the extraction chain for the operation clock of the node J (that is, from the node F to the node J). The chain in the direction opposite to that of the extraction chain for the operation clock is the extraction chain for the protection clock (that is, from the node I to J).
Other nodes are all configured in the same shortest-path manner as for the nodes G and J.
The priority of extracting a clock is 1 for the port of extracting the operation clock on each node, and the port with a lower priority of extracting a clock is the port for extracting the protection clock.
The configuration for the left ring in
Multiple core rings may be interconnection by a single node, or double nodes, and so on. In this example, the interconnection by a single node is taken as an example.
As shown in
The two external clock sources are not classified into a main clock source and a standby clock source, and thus both of the node A and the node L are main clock nodes.
The configuration is performed in the same way as configuring a single core ring with multiple clock sources in the shortest-path manner. Specifically, the following configurations are performed.
For the node B, the path from the node B to the clock node A is the shortest. Therefore, this chain is taken as the extraction chain for the operation clock of the node B (that is, from the node A to the node B). The chain in the direction opposite to that of the extraction chain for the operation clock is the extraction chain for the protection clock (that is, from the node C to B).
For the node M, the path from the node M to the clock node L is the shortest. Therefore, this chain is taken as the extraction chain for the operation clock of the node M (that is, from the node L to the node M). The chain in the direction opposite to that of the extraction chain for the operation clock is the extraction chain for the protection clock (that is, from the node F to M).
For the interconnection node F, the path from the node F to the clock node A is the shortest. Therefore, this chain is taken as the extraction chain for the operation clock of the node F (that is, from the node A to G to F). Other chains (that is, chains from the node E to the node F, from the node H to the node F, from the node M to the node F) are all extraction chains for the protection clock. The chain in the direction opposite to that of the extraction chain for the operation clock (that is, from the node E to F) may be selected as the first extraction chain for the protection clock.
Other nodes are all configured in the same shortest-path manner as for the nodes B and E.
The priority of extracting a clock is 1 for the port of extracting the operation clock on each node, and the port with a lower priority of extracting a clock is the port for extracting the protection clock.
The configuration for the two rings in
As shown in
An extracted external clock is configured for the clock node A.
The chain on the shortest path from the node B to the clock node A is the extraction chain for the operation clock of the node B. Similarly, the chain on the shortest path from the node C to the clock node A is the extraction chain for the operation clock of the node C.
There are 3 chains between the nodes B and C. Since there is only clock extraction in a single direction (that is, only clock extraction from the node B to C), then at most two chains for extracting a clock may be allowed. The optical port priority, or high rate port priority principle is adopted. One of the ports has the priority of 1, and the other has the priority of 2.
The configuration for the nodes on the chain in
In this example, the ring at the upper layer (for example, the core ring or the non-core ring at the previous upper layer) is configured in the ring manner. As shown in
An access node is determined as the clock injection node of the non-core ring. In
For
Taking the clock interjection node A as a starting point, a route turning to the adjacent node F in the counter clockwise direction (that is, from the node A to B, to C, to D, to E and to F) is the extraction route of the operation clock.
Taking the clock interjection node A as a starting point, a route turning to the adjacent node B in the clockwise direction (that is, from the node A to F, to E, to D, to C and to B) is a route for extracting a protection clock.
The priority of extracting a clock is 1 for the port of extracting the operation clock on each node, and the port with a lower priority of extracting a clock is the port for extracting the protection clock.
For
Taking the node A as a starting point, a route turning to the adjacent node E in the counter clockwise direction (that is, from the node A to B, to C, to D and to E) is the extraction route of the operation clock.
Taking the node F as a starting point, a route turning to the adjacent node B in the clockwise direction (that is, from the node F to E, to D, to C and to B) is a route for extracting a protection clock.
The priority of extracting a clock is 1 for the port of extracting the operation clock on each node, and the port with a lower priority of extracting a clock is the port for extracting the protection clock.
The configurations for the rings in
Eleventh Example
In this example, the ring at the upper layer (for example, the core ring or the non-core ring at the previous upper layer) is configured in the shortest-path manner. As shown in
An access node is determined as the clock injection node of the non-core ring. In
For
For the node B, a chain on the shortest path from the node B to the clock injection node A is the extraction chain for the operation clock (that is, from the node A to B). The chain in the direction opposite to that of the extraction chain for the operation clock is the extraction chain for the protection clock (that is, from the node C to B).
Other nodes are all configured in the same shortest-path manner as for the node B.
The priority of extracting a clock is 1 for the port of extracting the operation clock on each node, and the port with a lower priority of extracting a clock is the port for extracting the protection clock.
For
The nodes A and F all main clock injection nodes.
For the node B, a chain on the shortest path from the node B to the clock injection node A is the extraction chain for the operation clock (that is, from the node A to B). The chain in the direction opposite to that of the extraction chain for the operation clock is the extraction chain for the protection clock (that is, from the node C to B).
For the node E, a chain on the shortest path from the node E to the clock injection node F is the extraction chain for the operation clock (that is, from the node F to E). The chain in the direction opposite to that of the extraction chain for the operation clock is the extraction chain for the protection clock (that is, from the node D to E).
Other nodes are all configured in the same shortest-path manner as for the nodes B and E.
The priority of extracting a clock is 1 for the port of extracting the operation clock on each node, and the port with a lower priority of extracting a clock is the port for extracting the protection clock.
The configuration for the ring in
In this example, the clock extraction is performed in a single direction. As shown in
The access node C is determined as a clock injection node of the non-core chain.
The configuration is the same as configuring a core chain, that is, the shortest path from each node (A, B, D and E) to the clock injection node C is the route for extracting the operation clock of the node.
For a chain structure, there is no situation of clock injection at multiple points, becauser if there is clock injection at multiple points, a loop is certainly formed.
It should be noted that, although in the examples herein, the core rings and the non-core rings are described differently, for the clock configuration, the types thereof may be not taken into consideration, but corresponding configuration is adopted depending on the topology.
It will be understood by those ordinary skilled in the art that all or a portion of the steps of the embodiments described above may be implemented in processes of a computer program that may be stored in a computer readable storage medium. The computer program may be executed on a corresponding hardware platform (such as a system, a device, an apparatus, a means, etc.). If being executed, the computer program causer corresponding devices to perform one or combination of the steps of the method according to the embodiments.
Alternatively, all or part of the steps of the embodiments described above may also be implemented in an integrated circuit. These steps may be separately integrated into integrated circuit modules or a plurality of modules or steps thereof may be implemented as a single integrated circuit module.
The devices/functional modules/functional units in the above embodiments may be implemented by a general-purpose computing device, which may be integrated on a single computing device or may be distributed over a network of a plurality of computing devices.
The devices/functional modules/functional units in the above embodiments may be stored in a computer-readable storage medium in the form of software function modules and sold or used as a stand-alone product. The above-mentioned computer-readable storage medium may be a read-only memory, a magnetic disk, or an optical disk.
Through the embodiments of the present disclosure, clock configuration of the synchronization network with various topologies and injected clock sources are achieved, and it may prevent the clocks from forming a loop.
Number | Date | Country | Kind |
---|---|---|---|
201510163644.7 | Apr 2015 | CN | national |
This application is based upon and claims priority to PCT Application No. PCT/CN2015/088149, filed Aug. 26, 2015, which is based upon and claims priority to Chinese Patent Application No. 201510163644.7, filed Apr. 8, 2015, the entire contents of which are incorporated herein by reference.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/CN2015/088149 | 8/26/2015 | WO | 00 |