欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > PDF文档下载
    分享到微信 分享到微博 分享到QQ空间

    ITU-T M 3604-1992 Application of Maintenance Principles to ISDN Primary Rate Access (Study Group IV)《综合业务数字网初始速率入口维修原则的应用-维修 综合业务数字网(第4研究组)20页》.pdf

    • 资源ID:800216       资源大小:783.37KB        全文页数:20页
    • 资源格式: PDF        下载积分:10000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要10000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    ITU-T M 3604-1992 Application of Maintenance Principles to ISDN Primary Rate Access (Study Group IV)《综合业务数字网初始速率入口维修原则的应用-维修 综合业务数字网(第4研究组)20页》.pdf

    1、CCITT RECM“CM.3604 92 ri 4862591 0579116 259 INTERNATIONAL TELECOMMUNICATION UNION CCITT THE INTERNATIONAL TELEGRAPH AND TELEPHONE CONSULTATIVE COMMITTEE MAINTENANCE: ISDN M.3604 (1 0/92) APPLICATION OF MAINTENANCE PRINCIPLES TO ISDN PRIMARY RATE ACCESS Recommendation M.3604 CCITT RECMN*M-3604 92 48

    2、b2.591 0579LL7 17.5 FOREWORD The CCITT (the International Telegraph and Telephone Consultative Committee) is a permanent organ of the International Telecommunication Union (ITU). CCIT is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a vie

    3、w to standardizing telecommunications on a worldwide basis. The Plenary Assembly of CCIT which meets every four years, establishes the topics for study and approves Recommendations revised by its Study Groups. The approval of Recommendations by the members of CCIT between Plenary Assemblies is cover

    4、ed by the procedure laid down in CCIT Resolution No. 2 (Melbourne, 1988). Recommendation M.3604 was revised by Study Group IV and was approved under the Resolution No. 2 procedure on the 5th of October 1992. CCIT NOTE In this Recommendation, the expression “Adminisuation” is used for conciseness to

    5、indicate both a telecommunication administration and a recognized private operating agency. O ITU 1993 All rights reserved. No part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in wri

    6、ting from the ITU. CCITT RECMN*M-3604 92 Lid62591 0579LLB O21 Recommendation M.3604 APPLICATION OF MAINTENANCE PRINCIPLES TO ISDN PRIMARY RATE ACCESS (Melbourne 1988 as Rec. 1.604; revised and renumbered 1992) Abstract This Recommendation defines capabilities and functions used by the network to mai

    7、ntain the physical layer of ISDN primary rate access. Keywords - ISDN, - maintenance; - primary rate access. 1 Scope of application This Recommendation covers the maintenance of that part of the ISDN subscriber primary rate access which is controlled by the network. The Recommendation follows the ma

    8、intenance principles as defined in Recommen- dation M.20 11 and applies to the primary rate access connected to the local exchange. The scope of this Recommendation is to describe the minimum functions required to maintain the subscriber primary rate access. They are applicable to any primary rate a

    9、ccess. The principle of controlled maintenance (as defined in Recommendation M.20 i) is applied for maintaining the subscriber primary rate access. Controlled maintenance is a method of sustaining a desired technical performance by the systematic application of supervision, testing and performance s

    10、ampling in order to minimize preventive maintenance and to reduce corrective maintenance. 2 Network configuration for maintenance activities Figure 1M.3604 gives the basis for the general maintenance principles of the subscriber access. 3 Failure detection 3.1 General Unlike the ISDN basic access, t

    11、he digitai section of the ISDN subscriber primary rate access is never deactivated (as seen by the exchange); continuous automatic supervision of the correct functioning of layer 1 up to NT2 is always operating. This supervision is called continuous automatic supervision of layer 1. Automatic superv

    12、ision of the correct functioning of the D-channel layers 2 and 3 is ais0 operating. This supervision is called automatic supervision of layers 2 and 3 of the D-channel protocol. Recommendation M.3604 (10192) 1 - CCITT RECMN*M*3b04 92 486259L 0579LL9 Tb8 Subscriber access I I installation I Subscribe

    13、r i LI; I li u . i, 1-1 I OAMC I Configuration to be maintained L-J ,- I- MSP Management Service Provider OAMC Operation Administration Maintenance Centre SAMF Subscriber Access Management Function SIMF Subscriber Installation Management Function See Recommendation M.3600 2 for detailed discussion o

    14、f the terms. Nute 1 - The subscriber access contains a digital link which can use different varieties of transmission techniques and media. Figure uM.3604 shows examples of configurations made by using existing digital line systems and multiplexers complying with G.700 7 - and G.900 SI - Series Reco

    15、mmendations. Nute 2 - A local exchange should be able to connect different types of dipital line systems and different spes of subscriber installations at V3 interfaces complying with Recommendation 4.512 9. Nute 3 - The use of different types of digital line systems shall not affect the subscriber

    16、installation complying with Recommendation 1.431 IO. Nute 4 -The subscriber access shall comply with the CRC procedure dehed in Recommendations G.704 5 and G.706 6. Nute 5 - In some countries. the subscriber installation is allowed to control maintenance functions in the subscriber access. FIGURE 1/

    17、M.3604 Configuration for the maintenance of primary access 3.2 Automatic supervision 3.2.1 Objectives This supervision is realized by continuous automatic mechanisms located in various pieces of equipment of the ISDN primary rate access. These automatic mechanisms are never deactivated and are gener

    18、ally based on the operation of CRC information which is given by the CRC procedure associated with the link between the customer and the local exchange. These mechanisms are complemented by the detection of malfunctioning of particular items, e - detection of loss of frame alignment; - detection of

    19、AIS and RAI; - generation of frame signal; - CRC code generation; 2 Recommendation M.3604 (10/92) CCITT RECMN*M.3bOY 92 48bZ571 0579120 78T - Wgeneration; - - - CRC monitoring of the incoming signal (network-to-user); detection of CRC error information (user-to-network); CRC error reporting to the n

    20、etwork (optional in 1544 kbids systems). Digital section *II T “3 Noie - Digital sections may include zero, one or more regenerators. FIGURE 2m.3604 Examples of equipment configurations in the ISDN subscriber primary rate access 3.2.3 ETfunctions The functions which are allocated to the ET are liste

    21、d below: - - - - detection of RAI; - generation of frame signal; - CRC code generation; - RAI generation; - - - The exchange termination may optionally detect the CRC error information reported by the user side. The RAI is generated towards NT2 upon detection by the ET of a fault in the input direct

    22、ion (loss of signal, detection of loss of incoming signal; detection of loss of frame alignment; detection of AIS, generation of AIS (optional in 1544 kbids systems); CRC monitoring of the incoming signal (user-to-network); detection of the CRC error information (network-to-user); CRC error reportin

    23、g to the user (optional in 1544 kbit/s systems). loss of frame alignment, detection of AIS). Recommendation M.3604 (10D2) 3 CCITT RECMN*M.3604 92 48b2591 0.579121 bLb The ET has the option to evaluate the transmission performance based on the statistical treatment of the local and remote CRC mor rep

    24、orts and on the fault indications. The transmission performance evaluation is based on a permanent processing of the elemenary results presented by the continuous error monitoring of the digital transmission link. The result of this processing will give information. on the transmission quality level

    25、 (nod quality, degraded quality, unacceptable quality) and on the unavailability of the access (see Q 5.6). 3.3 Automatic supervision of layers 2 and 3 of the D-channel protocol This covers supervision of activities of layers 2 and 3 of the D-channel protocol. Automatic supervision of layers 2 and 3

    26、 will be made by self-acting mechanisms implemented in the network (e.g. in the ET). There are three categories of automatic supervision which may be performed by layer 2 and layer 3 of the D-channel protocols: - - protocol misoperation detection; - service provision incapability detection (e.g. inc

    27、apability of layer 2 to establish a data link connection); error monitoring (e.g. the layer 2 CRC procedure can detect the occurrence of an errored frame). These events should be recorded as discussed in Recommendation M.3640 4. 3.4 Continuity test For further study. 4 System protection When a confi

    28、rmed fault is detected which has an adverse effect on the availability andlor functionality of network equipment, the access is considered “out of service due to failure” and call attempts may be rejected to prevent further damage or to remove the adverse effect. 5 5.1 5.2 5.3 5.4 Failure indication

    29、 Default indication signals a) AIS - as defined in Recommendation 1.43 1 103. b) RAI - as defined in Recommendation 1.43 1 101. State tables State tables associated with failures in the primary rate access are given in Recommendation 1.43 1 101. Generation of defect indication signals by the hT2 The

    30、 NT2 functions are listed in Q 3.2.2. The generation of RAI toward the ET is used to indicate the loss of incoming layer 1 capability. Generation of defect indication signals by the subscriber access The digital link functions are listed in Annex A for each option within the access. 4 Recommendation

    31、 M.3604 (10192) CCITT RECMN*M.3604 92 m 4862593 0579322 552 m 5.5 Generation of defect indication signals by the exchange termination The exchange termination functions are listed in 4 3.2.3. The generation of RAI toward the NT1 is used to indicate the loss of incoming layer 1 capability. 5.6 Transm

    32、ission quality monitoring by the exchange 5.6.1 Error performance parameters According to Recommendations M.20 i and M.2100 3, the anomaly and defect indications are treated on a statistical basis. 5.6.2 Error performance evaluations The access is considered by the local exchange to be “unavailable”

    33、, “unacceptable” or “degraded” according to Recommendation 21 O0 3. 5.7 Failure information from the exchange A defect confmed by the exchange and related to a subscriber access andor a subscriber installation shall be reported to the OAMC in a message. exchange shall be reported to the OAMC in a me

    34、ssage. been made (see 0 6). The detection of a degraded or an unacceptable quality level or of the unavailability of the access by the The message could be presented after an automatic identification of a failed Maintenance Entity (ME) has 5.8 Failure information to the subscriber installation The d

    35、etection of a degraded or unacceptable quality level by the exchange may be reported to the user by the transmission of a state indication. 6 Failure localization 6.1 Automatic confirmation of failure within the subscriber primary rate access An automatic test procedure to confm a detected possible

    36、failure condition within the subscriber access should be provided. It shall be initiated by an automatic reaction of the exchange, following abnormal conditions which have been detected by the processes presented above, i.e. continuous supervision of layer 1, supervision of layers 2 and 3 of the D-c

    37、hannel protocol. within the subscriber installation and within the subscriber access should be possible. If failures are detected in the D-channel layers 2 and 3 communication, clear differentiation between failures 6.2 Failed maintenance entity identification 6.2.1 General Such a function has to be

    38、 made on demand or automatically following the indication of failure conditions by the network or following a subscriber complaint. It is necessary, before undertaking the appropriate action, to identify (i.e. to know) the maintenance entity affected by the failure. 6.2.2 Objectives The main objecti

    39、ve of this function, which is controlled by the SAMF, is to indicate to the OAMC whether - within the ET; - - within the subscriber installation. the failure is: within the digital transmission link (NT1 to LT); Recommendation M.3604 (10D2) 5 CCITT RECMN*M*3b04 92 II 48b259L 0579123 499 - 4;qFl L II

    40、 I LT 6.3 6.3.1 Location of loopbacks Loopbacks for maintenance of the subscriber primary rate access PQssibie loopback locations for failure localization and verification controlled by the SAMF are shown in Figure 3M.3604. Digital section T Reaenerator v 31 2 1A 1 (Note 1) E FIGURE 3FI.3604 Locatio

    41、n of the loopbacks for maintenance of the general equipment conflguration of the subscriber primary rate access 6.3.2 6.4 Characteristics of loopbacks The characteristics of the loopbacks are given in Table 1M.3604. Failure localization mechanisms See Figure 4M.3604. If a subscriber access failure i

    42、s confirmed by the exchange and if the failure is not located in the exchange, then - either the loopback 2 can be established under control of the exchange, in which case: i) if the loopback 2 is successful, the exchange considers the subscriber access to be functioning correctly; ii) if the loopba

    43、ck 2 is unsuccessful, the exchange reports to the OAMC; or, if the loopback 2 cannot be established under control of the exchange, then the exchange informs the OAMC that the digital link is affected by a failure. - in the case of a failed maintenance entity being detected, an automatic localization

    44、 process is initiated. This process could localize the failure within the digital link by the use of loopbacks or subscriber access fault information. 6 Recommendation M.3604 (10/92) CCITT RECMN*M.3604 72 E 48b257L 0577L24 325 E 1 TABLE 1M.3604 Channe(s) looped back Characteristics of the loopbacks

    45、for subscriber primary rate access Control mechanism Loopback type Control point Loopback Complete loopback (Note 3) Location Non-transparent ET or other NE Local (Note 4) within subscriber maintenance access Complete loopback (Note 3) Complete loopback 1 Non-transparent ET or other NE Layer 1 (Note

    46、 4) within subscriber access Non-transparent ET or other NE Layer i (Notes 1 and 4) within subscriber 1A , B,HO,Hl B, HO, H1 In LT, as near as possible to the line, towards the ET In the regenerator Partial, Under control of Layer 3 transparent or local exchange non-transparent Partial, Under contro

    47、l of Layer 3 transparent or N or WA non-transparent 2 4 In NT1, as near as possible to T reference point, towards ET (Note 2) In NT2, as near as possible to T reference point, towards T (Note 5) In the TE or TA E In ET, towards the line Layer 3 I Under control of I Partial, B*Ho7H1 I transparent or

    48、local exchange Implementation optional optional Optional optional optional Optional Note 1 - When option 2 (see Annex A) is used, only the B- and D-channels are returned through the NT1 unaltered and therefore only those channels can be used by a loopback test. Note 2 - In the case of using existing

    49、 digital systems, a manual loopback may replace loopback 2. This loopback is implemented between NT2 and NT1 and is controlled by the user at the request of the network staff. Nofe 3 - These complete primary rate loopbacks operate on the full bit stream including time slot O in 2048 kbitls systems and the F bits of 1544 kbitls systems. Note 4 - These loopbacks are normally non-transparent and send AIS in the forward direction. However, when the network can continue to provide good network clock, these loopbacks may be transparent When transparen


    注意事项

    本文(ITU-T M 3604-1992 Application of Maintenance Principles to ISDN Primary Rate Access (Study Group IV)《综合业务数字网初始速率入口维修原则的应用-维修 综合业务数字网(第4研究组)20页》.pdf)为本站会员(figureissue185)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开