FIBER MISCONNECTION DETECTING METHOD AND DEVICE

Information

  • Patent Application
  • 20080069559
  • Publication Number
    20080069559
  • Date Filed
    May 21, 2007
    17 years ago
  • Date Published
    March 20, 2008
    16 years ago
Abstract
In a method and device which can quickly detect a fiber misconnection without setting an expected value, a node identifier of source node and an identifier of an interface for inputting/outputting a signal are set in a predetermined first field of a header to be transmitted to a destination node, and when both identifiers set in the first field are received from the destination node, both identifiers are set in a predetermined second field of the header to be transmitted and stored with the first field. When the identifiers set in the first and second fields are received and the identifiers of the second field among the identifiers are consistent with the identifiers of the first field stored at the second step (means), a connection is determined to be correct.
Description

BRIEF DESCRIPTION OF THE DRAWINGS

The above and other objects and advantages of the invention will be apparent upon consideration of the following detailed description, taken in conjunction with the accompanying drawings, in which the reference numerals refer to like parts throughout and in which:



FIGS. 1A and 1B are diagrams showing a mapping example of J0 byte used for a fiber misconnection detecting method and device according to the present invention;



FIG. 2 is a block diagram showing an arrangement of each interface within a node by an embodiment [1] of a fiber misconnection detecting method and device according to the present invention;



FIGS. 3A and 3B are diagrams showing an example of a J0-byte management table in an embodiment [1] of the present invention;



FIG. 4 is a flowchart showing an operation example of a J0-byte transmission/reception value processor used for each interface of a node in the present invention;



FIG. 5 is a flowchart showing an operation example of a misconnection detecting processor used for each interface of a node in the present invention;



FIG. 6 is a block diagram showing a correct connection operation (1) by an embodiment [1] of the present invention;



FIG. 7 is a block diagram showing a correct connection operation (2) by an embodiment [1] of the present invention;



FIG. 8 is a block diagram showing a correct connection operation (3) by an embodiment [1] of the present invention;



FIG. 9 is a block diagram showing a correct connection operation (4) by an embodiment [1] of the present invention;



FIG. 10 is a block diagram showing a misconnection operation (1) by an embodiment [1] of the present invention;



FIG. 11 is a block diagram showing a misconnection operation (2) by an embodiment [1] of the present invention;



FIG. 12 is a block diagram showing a misconnection operation (3) by an embodiment [1] of the present invention;



FIG. 13 is a block diagram showing a misconnection operation (4) by an embodiment [1] of the present invention;



FIG. 14 is a block diagram showing an arrangement of each interface within each node by an embodiment [2] of a fiber misconnection detecting method and device according to the present invention;



FIGS. 15A-15C are diagrams showing an example of a J0-byte management table in an embodiment [2] of the present invention;



FIG. 16 is a flowchart showing an operation example of a J0-byte reception value/receiving expected value-inconsistency detecting processor used for each interface of a node in an embodiment [2] of the present invention;



FIG. 17 is a block diagram showing an operation (1) in an embodiment [2] of the present invention;



FIG. 18 is a block diagram showing an operation (2) in an embodiment [2] of the present invention;



FIG. 19 is a block diagram showing a general network example constructed by a SONET device;



FIG. 20 is a block diagram for describing a correct connection operation in a prior art example; and



FIG. 21 is a block diagram for describing a misconnection operation in a prior art example.





DESCRIPTION OF THE EMBODIMENTS
Embodiment [1]: FIGS. 2, 3A. 3B, and 4-13


FIG. 2 shows an arrangement of each interface (slot or port) within each node according to an embodiment [1]. Each interface is composed of an optical input portion 1 which inputs an optical signal from a fiber F1, an optical output portion 2 which outputs an optical signal to a fiber F2, a J0-byte management table 3, a J0-byte transmission value processor 4 which prepares a transmission value of J0 byte from a reception value of J0 byte inputted from the optical input portion 1 by using information stored in the J0-byte management table 3 to be transmitted to the optical output portion 2, and a misconnection detecting processor 5 which properly generates an alarm based on the information of the J0-byte management table 3.



FIGS. 3A and 3B show an embodiment of the above-mentioned J0-byte management table 3. FIG. 4 shows an operation flow of the J0-byte transmission/reception value processor 4. FIG. 5 shows an operation flow of the misconnection detecting processor 5. FIGS. 3A, 3B, 4, and 5 will be sequentially described in the correct (normal) connection operations (1)-(4) and the misconnection operations (1)-(4), both noted below, in the interface shown in FIG. 2.


Correct connection operation: FIGS. 6-9


Operation (1): FIG. 6

In the opposed nodes A and B, the interfaces IF#5 and IF#6 of the node A respectively have J0-byte management tables 3_A#5 and 3_A#6. The interfaces IF#7 and IF#8 of the node B respectively have J0-byte management tables 3_B#7 and 3_B#8. These J0-byte management tables 3 have a transmission and reception fields (areas) respectively shown in FIGS. 3A and 3B, and are occasionally represented by a reference numeral “3”.


As for the J0 byte transmitted from the interface IF#5 of the node A, the node A transmits it to the node B in which the information of an interface IF ID=5 of a source node ID=A (indicated by “A-5” as ID in FIG. 6) is stored as shown in the J0-byte management table 3_A#5 of FIG. 6 in the upper field of the transmission field shown in FIG. 3A. At this time, the J0-byte transmission/reception value processor 4 executes step S4 through steps S1-S3 shown in FIG. 4.


Similarly, the J0 byte in which ID “A-6” is set in the upper field is transmitted from the interface IF#6 of the node A to the node B, and the J0 bytes in which IDs “B-7” and “B-8” are respectively set in the upper fields are transmitted from the interfaces IF#7 and IF#8 of the node B to the node A.


Operation (2): FIG. 7

In case of the J0 byte in which e.g. ID “A-5” is set in the upper field, the node B having received the J0 byte from the node A stores the ID “A-5” in the upper field of the reception field (see FIG. 3B) as shown in the J0-byte management table 3_B#7 of the interface IF#7 in FIG. 7 (at step S5).


Similarly, the ID “A-6” is set in the upper field of the reception field of the table 3_B#8 in the interface IF#8 of the node B having received from the node A the J0 byte in which the ID “A-6” is set in the upper field. Similarly, the IDs “B-7” and “B-8” are respectively stored in the upper fields of the reception fields based on the J0 bytes respectively received by the interfaces IF#5 and IF#6, as shown in FIG. 7, as well as the J0-byte management tables 3_A#5 and 3_A#6 of the node A.


Operation (3): FIG. 8

In the node B, the ID “A-5” stored in the upper field of the reception field of the J0-byte management table 3_B#7 is copied and stored in the lower field of the transmission field (at step S6).


Similarly, in the table 3_B#8 of the node B, the ID “A-6” stored in the upper field of the reception field is copied and stored in the lower field of the transmission field. Furthermore, similarly in the tables 3_A#5 and 3_A#6 of the node A, the IDs “B-7” and “B-8” stored in the upper fields in the reception fields are copied and stored in the lower fields of the transmission fields.


Thus, in the tables 3_A#5 and 3_A#6 of the node A as well as the tables 3_B#7 and 3_B#8 of the node B, the upper and lower fields respectively hold source node ID (node ID+interface ID) and the opposed node ID (node ID+interface ID) in the transmission fields.


In such a state, the J0-byte transmission/reception value processor 4 transmits the IDs of the upper and lower fields set in the transmission fields of each J0-byte management table 3 to the fiber F2 through the optical output portion 2 (at step S4).


Operation (4): FIG. 9

At step S4 in the above-mentioned operation (3), the interface IF#7 of the node B receives from the interface IF#5 of the node A the J0 byte in which the ID “A-5” is set in the upper field and the ID “B-7” is set in the lower field. Therefore, the J0-byte transmission/reception value processor 4, in the same way as the above-mentioned operation (2), overwrites the ID “A-5” in the upper field and stores the ID “B-7” in the lower field of the reception field in the table 3_B#7, as shown in FIG. 9.


Similarly, the ID “A-6” of the upper field and the ID “B-8” of the lower field in the J0 byte transmitted from the interface IF#6 of the node A are respectively stored in the upper and lower fields in the reception field of the J0-byte management table 3_B#8 of the node B.


Similarly in the J0-byte management table 3_A#5 of the node A, the ID “B-7” of the upper field and the ID “A-5” of the lower field in the J0 byte transmitted from the interface IF#7 of the node B are respectively stored in the upper and lower fields in the reception field as shown in FIG. 9. Similarly in the J0-byte management table 3_A#6 of the node A, the ID “B-8” of the upper field and the ID “A-6” of the lower field in the J0 byte transmitted from the interface IF#8 of the node B are respectively stored in the upper and lower fields in the reception field.


When the IDs are thus stored in the transmission field and the reception field in the tables, the misconnection detecting processor 5 acquires the reception J0 byte values in the J0-byte management table 3 (at step S11), confirms that the values are not lower field initial values of the reception J0 byte (at step S12), and then acquires the ID of the transmission field in the J0-byte management table (at step S14). Hereafter, as shown by doted lines, whether or not the value of the upper field in the transmission field is consistent with the value of the lower field in the reception field is determined in each table (at step S15).


As a result of this determination, both values are consistent with each other in the example of FIG. 9. Therefore, no alarm is generated (at step S13). It is to be noted that in case where an alarm has been generated, the alarm is released.


Thus, the upper field of the transmission field is consistent with the lower field of the reception field in the table 3, so that it is determined that no misconnection occurs.


Also, as for a connection relationship, it can be confirmed in both of the nodes A and B by the J0-byte management table 3 that the interface IF#5 of the node A and the interface IF#7 of the node B as well as the interface IF#6 of the node A and the interface IF#8 of the node B are correctly connected respectively.


Misconnection Operation: FIGS. 10-13

The misconnection in this example is caused by a reverse connection of the fibers of the interfaces IF#5 and IF#6 in the node A.


Operation (1): FIG. 10

This operation (1) is the same as the operation (1) upon correct connection shown in FIG. 6.


Operation (2): FIG. 11

As mentioned above, the fibers of the interfaces IF#5 and IF#6 in the node A are reversely connected. Therefore, the J0 byte from the interface IF#7 of the node B is provided to the interface IF#6 of the node A in the operation (2). Accordingly, the ID “B-7” is stored in the upper field of the reception field in the J0-byte management table 3_A#6 of the node A as shown in FIG. 11. Similarly, the interface IF#5 of the node A inputs the J0 byte from the interface IF#8 of the node B, so that the ID “B-8” is stored in the upper field of the reception field, as shown, in the J0-byte management table 3_A#5 of the node A. It is to be noted that in the tables 3_B#7 and 3_B#8, the same IDs as those upon the above correct connection are respectively stored in the upper fields in the reception fields.


Operation (3): FIG. 12

In the operation (3), the ID stored in the upper field of the reception field in each J0-byte management table 3 is copied and stored in the lower field of the transmission field in the same way as the operation (3) upon correct connection shown in FIG. 8.


The J0 byte in which the ID of the transmission field in each table 3 is set is transmitted to the opposed node.


Operation (4): FIG. 13

When the J0 byte is transmitted by the operation (3) shown in FIG. 12, the IDs in the upper and lower fields set in the J0 byte transmitted from the opposed node are stored in the upper and lower fields of the reception field respectively in each table 3 as shown in FIG. 13.


As a result, the ID “B-8” of the upper field and the ID “A-6” of the lower field in the J0 byte transmitted from the interface IF#8 of the node B are respectively stored in the upper and lower fields of the reception field in the J0-byte management table 3_A#5 of the node A. Similarly, the ID “B-7” of the upper field and the ID “A-5” of the lower field set in the J0 byte transmitted from the interface IF#7 of the node B are respectively set in the reception field of the J0-byte management table 3_A#6 of the node A.


If the IDs are set in this way, the misconnection detecting processor 5 compares the ID of the upper field in the transmission field with the ID of the lower field in the reception field at step S15 through steps S11, S12, and S14, so that a misconnection alarm notification is performed since the IDs are inconsistent with each other in all of the tables 3 as shown by the doted lines in FIG. 13 (at step S16).


Since the upper field of the transmission field and the lower field of the reception field are different from each other, the occurrence of the misconnection is detected, so that it becomes possible to perform an alarm notification to a user in such a form that a source port and a misconnected destination port are recognizable.


Embodiment [2]: FIGS. 14, 15A-15C, and 16-18


FIG. 14 shows an arrangement of each interface within each node by the embodiment [2] of the present invention. This arrangement is different from the operation example of each interface by the embodiment [1] shown in FIG. 2 in that a J0-byte reception value/receiving expected value-inconsistency detecting processor 6 is provided.



FIGS. 15A-15C show an arrangement of the J0-byte management table used for the interface IF by the embodiment [2]. This embodiment is different from the table example of the embodiment [1] shown in FIGS. 3A and 3B in that 48-byte “Trace Strings” in the transmission field and the reception field respectively shown in FIGS. 15A and 15B are actually used and the 48-byte Trace String is preset as the receiving expected value by the destination node as shown in FIG. 15C.



FIG. 16 shows an operation flow of the inconsistency detecting processor 6. The operation of the inconsistency detecting processor 6 is mentioned in the correct connection operation example as follows:


Operation (1): FIG. 17

Since a connection between the interfaces is correctly performed in this operation, the same J0 byte as that in the normal connection operation (1) shown in FIG. 6 is transmitted/received between the nodes A and B. Additionally, “AAA” is stored in the Trace String of the J0byte transmitted from the interface IF#5 of the node A. Similarly, “BBB” is stored in the Trace String of the J0 byte from the interface IF#7 of the node B to be transmitted, “CCC” is stored in the Trace String of the J0 byte from the interface IF#6 of the node A to be transmitted, and “DDD” is stored in the Trace String of the J0 byte from the interface IF#8 of the node B to be transmitted.


Operation (2): FIG. 18

Since a correct connection is performed in this operation, the same table contents as that in the correct connection operation (4) shown in FIG. 9 can be obtained. Accordingly, it is recognized that no misconnection has occurred.


However, when a receiving expected value “ZZZ” of the J0 byte set by a user for the interface IF#8 is compared with the value “CCC” set in the Trace String of the J0 byte actually having received from the interface IF#8 in the node B (at step S25 of FIG. 16), both values are found different from each other. Therefore, a result of an existing connection verification becomes error (at step S26).


In this case, the misconnection is not detected as mentioned above and it is determined that the fiber connection between the nodes A and B is correct. Therefore, it becomes possible to determine that the cause of the fiber misconnection is user's missetting of the receiving expected value of the J0 byte set in the interface IF#8 of the node B. Accordingly, when the receiving expected value is not consistent with the reception value in this way, an alarm notification is performed (at step S26).


It is to be noted that the present invention is not limited by the above-mentioned embodiments, and it is obvious that various modifications may be made by one skilled in the art based on the recitation of the claims.

Claims
  • 1. A fiber misconnection detecting method comprising: a first step of setting a node identifier of source node and an identifier of an interface for inputting/outputting a signal in a predetermined first field of a header to be transmitted to a destination node;a second step of setting, when both identifiers set in the first field are received from the destination node, both identifiers in a predetermined second field of the header to be transmitted and stored with the first field; anda third step of determining that a connection is correct when the identifiers set in the first and second fields are received and the identifiers of the second field among the identifiers are consistent with the identifiers of the first field stored at the second step.
  • 2. The fiber misconnection detecting method as claimed in claim 1, wherein a J0 byte or a free space of a section overhead other than the J0 byte is used as the first and second fields
  • 3. The fiber misconnection detecting method as claimed in claim 1, wherein the third step includes a step of generating an alarm in a form that an interface and a misconnected destination are recognizable when not determining that the connection is correct.
  • 4. The fiber misconnection detecting method as claimed in claim 1, further comprising a fourth step of setting an expected value in a third field, in addition to the first and second fields, and a fifth step of determining whether or not the expected value is consistent with a receiving expected value preset when the expected value is received.
  • 5. The fiber misconnection detecting method as claimed in claim 4, further comprising a sixth step of determining that setting of the receiving expected value is incorrect when the fifth step determines inconsistency even if the third step determines that the connection is correct.
  • 6. The fiber misconnection detecting method as claimed in claim 5, wherein a J0 byte or a free space of a section overhead other than the J0 byte is used as the first to third fields
  • 7. The fiber misconnection detecting method as claimed in claim 1, wherein the interface comprises a slot or a port.
  • 8. A fiber misconnection detecting device comprising: a first means setting a node identifier of source node and an identifier of an interface for inputting/outputting a signal in a predetermined first field of a header to be transmitted to a destination node;a second means setting, when both identifiers set in the first field are received from the destination node, both identifiers in a predetermined second field of the header to be transmitted and stored with the first field; anda third means determining that a connection is correct when the identifiers set in the first and second fields are received and the identifiers of the second field among the identifiers are consistent with the identifiers of the first field stored by the second means.
  • 9. The fiber misconnection detecting device as claimed in claim 8, wherein a J0 byte or a free space of a section overhead other than the J0 byte is used as the first and second fields
  • 10. The fiber misconnection detecting device as claimed in claim 8, wherein the third means includes a means generating an alarm in a form that an interface and a misconnected destination are recognizable when not determining that the connection is correct.
  • 11. The fiber misconnection detecting device as claimed in claim 8, further comprising a fourth means setting an expected value in a third field, in addition to the first and second fields, and a fifth means determining whether or not the expected value is consistent with a receiving expected value preset when the expected value is received.
  • 12. The fiber misconnection detecting device as claimed in claim 11, further comprising a sixth means determining that setting of the receiving expected value is incorrect when the fifth means determines inconsistency even if the third means determines that the connection is correct.
  • 13. The fiber misconnection detecting device as claimed in claim 12, wherein a J0 byte or a free space of a section overhead other than the J0 byte is used as the first to third fields
  • 14. The fiber misconnection detecting device as claimed in claim 8, wherein the interface comprises a slot or a port.
Priority Claims (1)
Number Date Country Kind
2006-249479 Sep 2006 JP national