摘要:
Modern switching systems known in prior art may be provided with a high level of internal dependability by redundantly supplying key internal components; however, said precautionary measures generally are of little use in the event of massive external influences (e.g. natural disasters, terrorist attacks, war-related effects, etc.) According to the invention, a 1:1 redundancy is provided, an identical clone being assigned to each switching system that is to be protected as a redundant partner comprising identical hardware, software, and database. The transfer is done in a fast, secure, and automatic manner by a superimposed, real-time capable monitor which establishes communication to the switching systems that are arranged in pairs. The transfer to the redundant switching system is done with the aid of the network management and the central controllers of the two switching systems.
摘要:
According to prior art, contemporary switching systems are provided with a high degree of internal operational security by redundant provision of important internal components but when large-scale external effects occur (such as natural disasters, terrorist attacks, war) the above-mentioned measures are generally of little use because original and replacement components of the switching system are located in the same place. As a result, when a disaster occurs it is highly probable that both components will be destroyed. According to the invention, a protocol is provided, said protocol being executed with a redundancy of 1:1. As a result, an identical clone, with identical hardware, identical software and an identical data base, is allocated to each switching system to be protected, as a redundancy partner. Switching is carried out in a quick, secure and automatic manner by a superordinate, real-time enabled monitor which establishes communication with the switching systems which are arranged in pairs. In the event of communication loss with respect to the active communication system, real-time switching to the redundant switching system is carried out.
摘要:
According to prior art, contemporary switching systems are provided with a high degree of internal operational security by redundant provision of important internal components but when large-scale external effects occur (such as natural disasters, terrorist attacks, war) the above-mentioned measures are generally of little use because original and replacement components of the switching system are located in the same place. As a result, when a disaster occurs it is highly probable that both components will be destroyed. According to the invention, a protocol is provided, said protocol being executed with a redundancy of 1:1. As a result, an identical clone, with identical hardware, identical software and an identical data base, is allocated to each switching system to be protected, as a redundancy partner. Switching is carried out in a quick, secure and automatic manner by a superordinate, real-time enabled monitor which establishes communication with the switching systems which are arranged in pairs. In the event of communication loss with respect to the active communication system, real-time switching to the redundant switching system is carried out.
摘要:
A controller (MGC) requests a gateway (MG) to release a call. The gateway then disconnects and communicates the disconnect to at least one additional network node along the end-to-end connection ISDNA, TDMA, RTP, TDMB, ISDNB on the resource control level (RCL). In the case of a high level recovery of a controller (MGC) a temporally close stop of charging (G) of disconnected connections is effected without the controller (MGC) signaling it.
摘要:
According to prior art, contemporary switching systems are provided with a high degree of internal operational security by redundant provision of important internal components but when large-scale external effects occur (such as natural disasters, terrorist attacks, war) the above-mentioned measures are generally of little use because original and replacement components of the switching system are located in the same place. As a result, when a disaster occurs it is highly probable that both components will be destroyed. This means that an identical clone, with identical hardware, identical software and an identical data base, must be allocated to each switching system to be protected, as a redundancy partner. Switching is carried out in a quick, secure and automatic manner in real time by a superordinate monitor in the network.
摘要:
In general, electrical units have to meet the requirements for high reliability and a high level of operational safety. This applies in particular to communications systems where the constant availability of all devices is necessarily required. For this reason, computer capacity is held in reserve in order to guarantee operational safety, so that in the event of failure of an electrical device, the currently-running functions can be transferred to additional (active) electrical devices. The control of these processes is carried out by a redundancy control. However, the problem associated with prior art remains, whereby all processes for redundancy control are expensive or unreliable, sometimes even both. An aspect of the invention provides a solution by virtue of the fact that each of the electrical devices is monitored by an additional electrical device and that, optionally, each of these devices, in turn, monitors at least one of the electrical devices.
摘要:
The invention relates to a method for error detection in a packet-based message distribution system, according to which messages are distributed via a plurality of nodes (3, 4, 5, 6) and other system components (1, 2, 11, 12, 13), and each node (3, 4, 5, 6) comprises at least two addressable interfaces. For the security of the system, the message distribution paths are designed in a redundant manner and redundancy paths are available in the message distribution system in the event of the breakdown of connections in the message distribution system. The invention is characterised in that the topology of the message distribution system is known by the nodes (3, 4, 5, 6), and the nodes (3, 4, 5, 6) check the accessibility of the other nodes (3, 4, 5, 6) by means of communication tests; interrogate intermediate system components (1, 2, 11, 12, 13) by means of existing interfaces (3.1 to 6.1 and 3.2 to 6.2) in terms of the connection status thereof in relation to other nodes (3, 4, 5, 6) and/or system components (1, 2, 11, 12, 13), and signal optional error configurations, physical errors (4.12), and/or missing redundancy paths of the message distribution system.
摘要:
According to prior art, contemporary switching systems are provided with a high degree of internal operational security by redundant provision of important internal components but when large-scale external effects occur (such as natural disasters, terrorist attacks, war) the above-mentioned measures are generally of little use. Redundancy of 1:1 is provided. As a result, an identical clone, with identical hardware, identical software and an identical data base, is allocated to each switching system to be protected, as a redundancy partner. Switching is carried out in a quick, secure and automatic manner by a superordinate, real-time enabled monitor which establishes communication with the switching systems which are arranged in pairs. In the event of communication loss with respect to the active communication system, real-time switching to the redundant switching system is carried out with the aid of the central controls of the two switching systems.