Font Size: a A A

The Research And Implementation Of Eroded Check On Access Network

Posted on:2006-07-24Degree:MasterType:Thesis
Country:ChinaCandidate:J RaoFull Text:PDF
GTID:2168360152988783Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
As the requirements of the communicational business increasing and the size of the telegraphic network extending, users' demand of the provider of telegraphic become higher and higher. They not only demand the large capacity and high-speed telegraphic network, but also demand high efficiency of the OAM&P of the telegraphic network. Then combining the high speed and capacity optional fiber technology with the intelligent network technology, the Synchronous Digital Hierarchy comes into being. SDH is a hierarchy of trunk transmission net, has been a criterion in communication globalization. The entire world has adopted it or is turning to it. SDH is based on PCM and Plesinchronous Digital Hierarchy (PDH), but with the far-sight in designing forepart, SDH would exist to be the hierarchy criterion in a long time. Nowadays ITU-T continually constitutes complementary criterion, which makes SDH importing.For the SDH network development, its structure is becoming more and more complicated and the clear burden transferring in network become more and more. The entire change makes the security of the SDH network become more strictly. And the eroded code capability of the SDH transfer network is one of the key capabilities of the SDH transfer network. In nowadays, the eroded check technology has become mature in SDH transfer network. But all of the eroded check works aim at the mainly part of the transfer SDH and they don't pay more attention on the part of the access network. For the sake of fitting the new technology system and producing highly efficiency, this design has realized the eroded in the access network device. After this realization has make the transfer network work in a completely security condition.This paper shows the characteristic of SDH signals and SDH equipment, and it raises a portable online eroded check method based on our criterion after the sum-up of other detectors'characteristic and the analysis of SDH parameters' commonness. This paper has design the eroded check function of the E1/STM-1/STM-4 interface in the access device MD5500 and UA5000 of the HUAWEI company .The main work of my design in the function such as: realizing the eroded check function on the interface of the business board; supporting the regenerator set of the performance in the drive module; realizing the warn set of the eroded checking; realizing the query ofthe currently and history data of the eroded checking; offering the user interface for the eroded check;treating warn of the out range of the eroded checking.
Keywords/Search Tags:SDH, eroded-detect, ATM, Transport network, Accessing network
PDF Full Text Request
Related items