Claims
- 1. Procedure for ensuring the activation of a V5 interface formed between a local exchange (LE) and an access node (AN) and comprising at least two links (L), in which interface the operational condition of the links reserved for protocols essential to the operation of the interface as well as the operational condition of the primary and secondary links reserved for protocols used to protect them is checked during the activation procedure, characterised in thatthe checking of the operational condition of the primary and secondary links is started simultaneously both on the local exchange side and on the access node side; the process waits for a confirmation that the primary and/or secondary links/link are/is operational; and if a confirmation indicating that the link is operational is received for the secondary link first, then a switchover of the primary link to the secondary link according to the V5 definitions is performed and the new primary link is used for protection in the V5 interface during the V5 interface activation process.
- 2. Procedure as defined in claim 1, characterised in that if the primary link switchover is unsuccessful, then the V5 interface activation process is terminated.
- 3. Procedure as defined in claim 1, characterised in that if the primary link becomes operational during the V5 interface activation process, then the primary link is defined as a new secondary link.
- 4. Procedure as defined in claim 1, characterised in that the C-channels of the V5 interface are protected during the activation process by the new primary link without returning to the initial state even if the link allocated for the PSTN protocol should be out of order.
- 5. Procedure as defined in claim 1, characterised in that, when the process is waiting for a confirmation of activation of the PSTN protocol, switchover of the link allocated for the PSTN protocol is carried out if the link fails.
- 6. Procedure as defined in claim 1, characterised in that if a standard “release link” command concerning the data link for the protection protocol is received, then the data link is immediately reactivated.
- 7. Procedure as defined in claim 1, characterised in that if a standard “release link” command concerning the data link for any protocol in the V5 interface is received, then the data link is immediately reactivated.
- 8. Procedure as defined in claim 1, characterised in that, before the activation of different protocols, such as the PSTN protocol, a check is carried out to establish whether the link allocated for the protocol in question is operational.
Priority Claims (1)
Number |
Date |
Country |
Kind |
970890 |
Feb 1997 |
FI |
|
Parent Case Info
“This application is a continuation of international application number PCT/FI98/00115, filed Feb. 10, 1998, pending.”
US Referenced Citations (4)
Foreign Referenced Citations (1)
Number |
Date |
Country |
0 763 953 |
Mar 1997 |
EP |
Non-Patent Literature Citations (3)
Entry |
A. Gillespie “Interfacing Access Networks to Exchanges: The ETSI V5 Approach”IEEE Global Telecommunications Conference, vol. 3, pp. 1754-1758. |
K Khakzar “V5 Interfaces between Digital Local Exchanges and Access Networks”Frequenz, Vol. 48, pp. 44-50. |
International Search Report for PCT/FI98/00115. |
Continuations (1)
|
Number |
Date |
Country |
Parent |
PCT/FI98/00115 |
Feb 1998 |
US |
Child |
09/310611 |
|
US |