CN106685571A - Hybrid protection method in WDM optical network based on recovery time sensitivity - Google Patents

Hybrid protection method in WDM optical network based on recovery time sensitivity Download PDF

Info

Publication number
CN106685571A
CN106685571A CN201611102140.5A CN201611102140A CN106685571A CN 106685571 A CN106685571 A CN 106685571A CN 201611102140 A CN201611102140 A CN 201611102140A CN 106685571 A CN106685571 A CN 106685571A
Authority
CN
China
Prior art keywords
backup
service
recovery time
path
link
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611102140.5A
Other languages
Chinese (zh)
Other versions
CN106685571B (en
Inventor
鲍宁海
苏国庆
陈静波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongtian Broadband Technology Co Ltd
Original Assignee
Chongqing University of Post and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University of Post and Telecommunications filed Critical Chongqing University of Post and Telecommunications
Priority to CN201611102140.5A priority Critical patent/CN106685571B/en
Publication of CN106685571A publication Critical patent/CN106685571A/en
Application granted granted Critical
Publication of CN106685571B publication Critical patent/CN106685571B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J14/00Optical multiplex systems
    • H04J14/02Wavelength-division multiplex systems
    • H04J14/0227Operation, administration, maintenance or provisioning [OAMP] of WDM networks, e.g. media access, routing or wavelength allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J14/00Optical multiplex systems
    • H04J14/02Wavelength-division multiplex systems
    • H04J14/0287Protection in WDM systems
    • H04J14/0289Optical multiplex section protection
    • H04J14/029Dedicated protection at the optical multiplex section (1+1)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J14/00Optical multiplex systems
    • H04J14/02Wavelength-division multiplex systems
    • H04J14/0287Protection in WDM systems
    • H04J14/0289Optical multiplex section protection
    • H04J14/0291Shared protection at the optical multiplex section (1:1, n:m)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J14/00Optical multiplex systems
    • H04J14/02Wavelength-division multiplex systems
    • H04J14/0287Protection in WDM systems
    • H04J14/0293Optical channel protection
    • H04J14/0294Dedicated protection at the optical channel (1+1)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J14/00Optical multiplex systems
    • H04J14/02Wavelength-division multiplex systems
    • H04J14/0287Protection in WDM systems
    • H04J14/0293Optical channel protection
    • H04J14/0295Shared protection at the optical channel (1:1, n:m)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/72Admission control; Resource allocation using reservation actions during connection setup
    • H04L47/726Reserving resources in multiple paths to be used simultaneously
    • H04L47/728Reserving resources in multiple paths to be used simultaneously for backup paths
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/78Architectures of resource allocation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Optical Communication System (AREA)

Abstract

The invention discloses a hybrid protection method in a WDM (wavelength division multiplexing) optical network based on recovery time sensitivity, and belongs to the technical field of communication networks. The method is based on the recovery time constraint of business connection, aims at the conflict between the recovery time and the resource utilization rate, employs a mode of combining shared access protection and dedicated access protection, provides a flexible backup (protection) resource configuration scheme for businesses at different levels, optimizes the network resource utilization rate under the condition that a business recovery time threshold is met, and provides a hybrid protection configuration, which discriminates the recovery degrees, for the business connection.

Description

Based on the hybrid protection method that recovery time is sensitive in a kind of WDM optical-fiber networks
Technical field
The present invention relates to Communication Network Technique field, and in particular to based on the mixed of recovery time sensitivity in a kind of WDM optical-fiber networks Close guard method.
Background technology
In optical-fiber network as telecommunication backbone net architecture, once generating assembly failure or damage, will cause substantial amounts of Loss of data and service disconnection.Therefore, survivability problem is always an important subject in WDM optical-fiber networks.Network is given birth to When sustainability refers to network failure, the ability of necessary service quality can be still maintained.In the research of network survivability sex chromosome mosaicism, protect Shield technology is widely studied and paid close attention to as a kind of important anti-technology of ruining.Protection refers in before failure occurs for network Reserved backup (protection) resource of service connection, when network failure, by impaired service switching to the protection resource reserved On realizing the recovery of business.
Path protection method mainly has two kinds:Dedicated path-protection (DPP) and Shared path-protection (SPP).Private access Protection (DPP) refers to the reserved wavelength resource on protection path and the configured completions of OXC (optical cross connect) on node, and quilt One service connection is special and exclusively enjoys.As shown in figure 1, path a-b-c-d is active channel of the connecting node to (a, d), path A-e-f-g-d is corresponding privacy protection path, and when a link b-c on active channel fails, node b will be to source node A sends alarm information, and starts the switching of service channel by source node a.Due to OXC on the node of backup path in privacy protection Configuration is completed in advance, and the business in working ways can be switched on backup path at once, thus service recovery time comparatively fast but Resource backup consumption is larger.Shared path-protection (SPP) refers to that the protection path of some business under given conditions can share net Reserved wavelength resource in network, but OXC need to be configured before service switching.As shown in Fig. 2 path a-b-c-d is connection To the active channel of (a, d), a-e-g-d is corresponding backup path to node, and path h-o-p-q is connecting node to (h, q) Active channel, h-e-g-q is corresponding backup path.Because two paths of a-b-c-d and h-o-p-q are separated, in single-link event Under barrier, the resource backup on link l can be connected (a, d) and connection (h, q) is shared.On active channel a-b-c-d one When bar link b-c fails, node b will send alarm information to source node a, and be matched somebody with somebody by OXC on source node a triggering backup paths Put, then carry out the switching of service channel, therefore the shared resource backup consumption protected is smaller but service recovery time is more long.
The characteristics of having exclusive resource backup due to privacy protection, the Internet resources of service connection configuration consumption are larger, special It is not when Internet resources are deficient, it will cause the substantial amounts of business connection cannot be set up due to a lack of enough resources.And share The characteristics of protection is with service switching time lag, the interim break period of business will appear from different degrees of extension, particularly For high-grade service connection, it may be difficult to ensure its corresponding SLA (service level agreement).And any of the above situation Occur, all will cause greatly loss to user and operator.
In order to solve contradiction of traditional privacy protection and shared protection between service recovery time, resource utilization, It is proposed that a kind of hybrid protection method sensitive based on recovery time.The recovery time that the method is based on service connection constrains, By the way of Shared path-protection and dedicated path-protection are combined, for different grades of business provides flexible resource backup Allocation plan, on the premise of service recovery time thresholding is met, optimizes network resource utilization, for service connection provides differentiation The hybrid protection configuration of restoring degree.
The content of the invention
Present invention seek to address that above problem of the prior art, it is proposed that one kind is directed to multi-link failure, when control recovers Between, improve network resource utilization, the hybrid protection method of differentiated service restoring degree.Technical scheme is as follows:
Based on the hybrid protection method that recovery time is sensitive in a kind of WDM (wavelength-division multiplex) optical-fiber network, it includes following step Suddenly:
101st, it is each service connection c that dijkstra's algorithm is utilized in optical-fiber network G (N, L)iFind three link disjoints Path, i.e.,:Active channel WPi, the first backup path BPi 1With the second backup path BPi 2, and BPi 2It is not shorter than BPi 1, 1≤i≤ | C |, C represent the set of all service connections in network, and N represents all node sets in network, and L represents all of in network Bi-directional link set;
102nd, compare in optical-fiber network G (N, L) between all any paths of service connection mutual alignment relation (including:Work Path WPi, the first backup path BPi 1With the second backup path BPi 2), obtain each service connection resource backup can shared relationship, And the first backup path BP in each service connection is calculated with thisi 1With the second backup path BPi 2Corresponding maximum recovery time RTi 1With RTi 2
103rd, according to first, second backup path can shared relationship, it is total to reference to service recovery time thresholding Enjoy or specialized configuration is set;
104th, it is all active channel WP by the link on any link l in optical-fiber network G (N, L)iDistribution business Business bandwidth It is original service bandwidth demand, l ∈ L, and use resource optimization ILP models, calculates and obtain corresponding first backup Path BPi 1With the second backup path BPi 2On optimum allocation bandwidthWherein, k is the grade of service, βkIt is backup path band Allocation proportion wide, and 0≤β1≤β2≤β3…≤βk≤1;
105th, it is the related service shared backup bandwidth resources of connection distribution on any link l in optical-fiber network G (N, L), MeetAndWherein, l ∈ L, k and k ' are represented not The same grade of service, βk′And βk′The backup channel bandwidth allocation proportion of different brackets business is represented,WithRespectively by chain The connection c of road liWith ci′Backup bandwidth.
106th, it is related service connection distribution proprietary backup bandwidth resources on any link l in optical-fiber network G (N, L), MeetWherein, the different grade of service of l ∈ L, k and k ' expression, βk′And βk′Represent different The backup channel bandwidth allocation proportion of grade business,WithRespectively by the connection c of link liWith ci′Backup bandwidth.
Further, step 102 judges that resource backup could be shared according to the position relationship of path:
1) rule one
Position relationship:
Or:
Or
Shared relationship:
2) rule two
Position relationship:
Shared relationship:
3) rule three
Position relationship:
Or:
OrOr
Shared relationship:
4) rule four
Position relationship:
Shared relationship:
5) rule five
Position relationship:Except other any position relationships of above position relationship.
Shared relationship:
Further, step 103 according to first, second backup path can shared relationship, with reference to service recovery time door Limit carries out shared or specialized configuration to it and sets, and specifically includes:
To any service connection ciIf, the second backup path BPi 2Can share, and RTi 2≤RT0, RT0During for business recovery Between thresholding, then BP is seti 2It is configuration sharing, otherwise, BP is seti 2It is specialized configuration;If BPi 1Can share, and RTi 1≤RT0, BP is then seti 1It is configuration sharing, otherwise, BP is seti 1It is specialized configuration.
Advantages of the present invention and have the beneficial effect that:
In the present invention, for the contradiction between recovery time and resource utilization, the recovery time based on service connection is about Beam, by the way of Shared path-protection and dedicated path-protection are combined, for different brackets business provides flexible backup money Source allocation plan, on the premise of service recovery time thresholding is met, optimizes network resource utilization, for service connection provides area Divide the hybrid protection configuration of restoring degree.
Brief description of the drawings
Fig. 1 is dedicated path-protection schematic diagram in the prior art;
Fig. 2 is Shared path-protection schematic diagram in the prior art;
Fig. 3 is that the present invention provides preferred embodiment business recovery process schematic;
Fig. 4 is the flow of the hybrid protection method based on recovery time sensitivity in preferred embodiment of the present invention WDM optical-fiber networks Figure.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, detailed Carefully describe.Described embodiment is only a part of embodiment of the invention.
The present invention solve above-mentioned technical problem technical scheme be:
A non-limiting embodiment is given below in conjunction with the accompanying drawings further to illustrate the present invention.Wherein set k= 3, that is, there is 0≤β1≤β2≤β3≤ 1, RT0=50ms.
Concept and model involved by present invention is as follows:
1. business recovery process is damaged
As shown in Figure 3, it is assumed that a connection of a to d, a is source node, and d is purpose node.Recovery process is divided into two steps Suddenly:The first step, if on active channel, link b-c breaks down, then end node b and c will be first it is detected that failures, and will Failure message is sent respectively to source node a and destination node d.Second step, when source node a receives fault warning message Wait, trigger the protection handoff procedure of business.
The protection handoff procedure of business is divided into two kinds of situations:For privacy protection, source node s receives fault warning message Afterwards, a notification message is sent to destination node d along backup path a-e-f-g-d.Destination node d receive the message it Afterwards, one confirmation message of backtracking starts path switching to source node a, subsequent source node a, so as to complete the extensive of impaired business It is multiple.For shared protection, after source node a receives fault warning message, along backup path a-e-f-g-d to destination node d Send configuration message, configures each OXC on the backup path step by step, and after destination node d completes corresponding configuration, former road is returned Returning a confirmation message starts path switching to source node a, subsequent source node a, so as to complete the recovery of impaired business.
2. network model
Assuming that WDM optical network models are G (N, L), wherein N is nodes set, and L is the bi-directional link collection in network Close.Each node in network has complete wavelength conversion capability, and each of the links has identical wavelength bandwidth.Network event Barrier is with single link failure and double-link failure as representative.
It is each service connection c that dijkstra's algorithm is utilized in G (N, L)i(1≤i≤| C |) finds three link disjoints Path, i.e.,:Active channel WPi, the first backup path BPi 1With the second backup path BPi 2, and BPi 2It is not shorter than BPi 1
3. recovery time model
When recovery time refers to that network breaks down, will be spent in the impaired service switching in network to backup (protection) path The time taken.Related symbol is defined as follows:
FT:One time of failure of detection;
DT:On one node, the time of signal transacting;
PT:The time that signal is propagated on a link;
CT:The time of OXC configurations;
m:Hop count on active channel;
n:Hop count on backup path;
Connection ciMaximum traffic recovery time.
The maximum traffic recovery time of privacy protection calculates the maximum traffic recovery time that protection is shared as shown in formula (1) Calculate as shown in formula (2).
Technical scheme is described as follows:
The present invention is a kind of protection scheme sensitive based on recovery time for being applied to WDM optical-fiber networks.
1. path secret sharing is protected:
Related symbol explanation:
l:A bidirectional fiber link in network G (N, L);
WPiOr WPi′:The active channel of service connection i and i ';
BPi 1OrCorresponding to WPiOr WPi′The first backup path, i.e. WPiOr WPi′After failure, business will preferentially cut Change to the backup path;
BPi 2OrCorresponding to WPiOr WPi′The second backup path, i.e. WPiOr WPi′Failure, and BPi 1OrAlso lose During effect, business will be switched to the backup path;
There is one or more link to overlap mutually between expression path A and path B;
There is no link to overlap mutually between expression path A and path B;
(A, B)=0:Represent that path A and path B can not share resource backup;
(A, B)=1:Represent that path A and path B can share resource backup;
RTiOr RTi':The maximum recovery time of service connection i or i ';
RT0:Service recovery time thresholding, for example:50ms.
Whether the protection path of service connection can use resource-sharing allocation plan in the present invention, will be depending on two bars Part, i.e.,:Position relationship first according to each path judges that resource backup could be shared;Then under the shared relationship, industry is calculated Whether can the maximum recovery time of business, less than the thresholding for setting, the configuration sharing be used with decision.
Position relationship according to path judges that resource backup could be shared:
6) rule one
Position relationship:
Or:
OrOr
Shared relationship:
7) rule two
Position relationship:
Shared relationship:
8) rule three
Position relationship:
Or:
OrOr
Shared relationship:
9) rule four
Position relationship:
Shared relationship:
10) rule five
Position relationship:Except other any position relationships of above position relationship.
Shared relationship:
The shared rule according to more than, obtain between each service channel can shared relationship, and calculate each business under the relation The maximum recovery time of connection, and then can judgement use corresponding configuration sharing:
The first step:If BPi 2Can share, calculate corresponding maximum recovery time RTi 2
Second step:If RTi 2≤RT0, then BPi 2Configuration sharing can be used, otherwise using specialized configuration;
3rd step:If BPi 1Can share, calculate corresponding maximum recovery time RTi 1
4th step:If RTi 1≤RT0, then BPi 1Configuration sharing can be used, otherwise using specialized configuration;
2. bandwidth resources allocation plan
To realize the allocation optimum of bandwidth resources, the present invention use ILP optimal models for network in all business company Connect the corresponding bandwidth of operation of distribution and backup bandwidth.Concrete model design is as follows:
Input:
·G(N,L):N={ n } is node set, and L={ l } is bi-directional link set;
·C:Service connection request set { ci}(1≤i≤|C|);
·The set of all connections that backup path passes through link l;
·W:The bandwidth capacity of each of the links, i.e., total number of wavelengths;
·Connection ciOperating bandwidth requirement;
·k:Connection ciThe grade of service.K={ 1,2,3 } is set in the present embodiment, wherein, 1 represents general service, and 2 represent Higher level service, 3 represent urgency traffic;
· Represent connection ciBackup path j be connected ci′The shared bandwidth resources of backup path q, it is no Then, do not share;
Output:
·Connection ciThe assignment bandwidth on link l;
·Connection ciThe backup bandwidth distributed on link l;
·βk:The backup bandwidth allocation proportion of k class business;
Object function:
In formula (3), by maximizing β1, β2, β3, all kinds of business is obtained more protection resource distributions, and select appropriate Weight coefficient (such as:100,70,50), then can be preferably high-grade business and provide more under limited network resource conditions Protection resource, and business recovery degree higher be provided ensure.By limiting each link backup resource B to a certain extentl's Consumption, promotes the shared of resource backup, to realize the optimization of total network resource.
Constraints:
Formula (4) ensures connection ciAssignment bandwidth meets original bandwidth requirements.
0≤β1≤β2≤β3≤1 (5)
Formula (5) ensures that high-grade business preferentially obtains more resource backup.
Q=1or 2, j=1or 2
Formula (6) provides Spare Capacity Sharing constraint.
Formula (7) limits the bandwidth resources amount distributed on link l and is no more than link capacity.
Based on the hybrid protection method that recovery time is sensitive in a kind of WDM optical-fiber networks, its specific implementation method includes as follows Step:
101st, it is each service connection c that dijkstra's algorithm is utilized in optical-fiber network G (N, L)iFind three link disjoints Path, i.e.,:Active channel WPi, the first backup path BPi 1With the second backup path BPi 2, and BPi 2It is not shorter than BPi 1, 1≤i≤ | C |, C represent the set of all service connections in network, and N represents all node sets in network, and L represents all of in network Bi-directional link set;
102nd, compare in optical-fiber network G (N, L) between all any paths of service connection mutual alignment relation (including:Work Path WPi, the first backup path BPi 1With the second backup path BPi 2), obtain each service connection resource backup can shared relationship, And the first backup path BP in each service connection is calculated with thisi 1With the second backup path BPi 2Corresponding maximum recovery time RTi 1With RTi 2
103rd, to any service connection ciIf, BPi 2Can share, and RTi 2≤RT0(RT0It is service recovery time thresholding), BP is then seti 2It is configuration sharing, otherwise, BP is seti 2It is specialized configuration;If BPi 1Can share, and RTi 1≤RT0, then set BPi 1It is configuration sharing, otherwise, BP is seti 1It is specialized configuration;
104th, it is all active channel WP by the link on any link l in optical-fiber network G (N, L)iDistribution business Business bandwidth It is original service bandwidth demand, l ∈ L, and use resource optimization ILP models, calculates and obtain corresponding first backup Path BPi 1With the second backup path BPi 2On optimum allocation bandwidthWherein, k is the grade of service, βkIt is backup path band Allocation proportion wide, and 0≤β1≤β2≤β3…≤βk≤1;
105th, it is the related service shared backup bandwidth resources of connection distribution on any link l in optical-fiber network G (N, L), MeetAndWherein, l ∈ L, k and k ' are represented not The same grade of service, βk′And βk′The backup channel bandwidth allocation proportion of different brackets business is represented,WithRespectively by chain The connection c of road liWith ci′Backup bandwidth.
106th, it is related service connection distribution proprietary backup bandwidth resources on any link l in optical-fiber network G (N, L), MeetWherein, the different grade of service of l ∈ L, k and k ' expression, βk′And βk′Represent different The backup channel bandwidth allocation proportion of grade business,WithRespectively by the connection c of link liWith ci′Backup bandwidth.
The above embodiment is interpreted as being merely to illustrate the present invention rather than limits the scope of the invention. Read after the content of record of the invention, technical staff can make various changes or modifications to the present invention, these equivalent changes Change and modification equally falls into the scope of the claims in the present invention.

Claims (3)

1. based on the hybrid protection method that recovery time is sensitive in a kind of WDM optical-fiber networks, it is characterised in that comprise the following steps:
101st, it is each service connection c that dijkstra's algorithm is utilized in optical-fiber network G (N, L)iFind the logical of three link disjoints Road, i.e.,:Active channel WPi, the first backup path BPi 1With the second backup path BPi 2, and BPi 2It is not shorter than BPi 1, 1≤i≤| C |, C represents the set of all service connections in network, and N represents all node sets in network, and L represents all of two-way in network Link set;
102nd, the mutual alignment relation between all any paths of service connection in optical-fiber network G (N, L) is compared, wherein any path bag Include active channel WPi, the first backup path BPi 1With the second backup path BPi 2, obtain sharing for each service connection resource backup Relation, and the first backup path BP in each service connection is calculated with thisi 1With the second backup path BPi 2Corresponding maximum recovery Time RTi 1With RTi 2
103rd, according to first, second backup path can shared relationship, with reference to service recovery time thresholding it is carried out it is shared or Specialized configuration is set;
104th, it is all active channel WP by the link on any link l in optical-fiber network G (N, L)iDistribution business band It is wide It is original service bandwidth demand, l ∈ L, and use resource optimization ILP models, calculates and obtain corresponding first backup path BPi 1With the second backup path BPi 2On optimum allocation bandwidthWherein, k is the grade of service, βkIt is backup channel bandwidth point With ratio, and 0≤β1≤β2≤β3…≤βk≤1;
105th, it is the related service shared backup bandwidth resources of connection distribution on any link l in optical-fiber network G (N, L), meetsAndWherein, l ∈ L, k and k ' expression are different The grade of service, βk′And βk′The backup channel bandwidth allocation proportion of different brackets business is represented,WithRespectively by link l Connection ciWith ci′Backup bandwidth;
106th, it is related service connection distribution proprietary backup bandwidth resources on any link l in optical-fiber network G (N, L), meetsWherein, the different grade of service of l ∈ L, k and k ' expression, βk′And βk′Represent different brackets The backup channel bandwidth allocation proportion of business,WithRespectively by the connection c of link liWith ci′Backup bandwidth.
2., based on the hybrid protection method that recovery time is sensitive in WDM optical-fiber networks according to claim 1, its feature exists In step 102 judges that resource backup could be shared according to the position relationship of path:
1) rule one
Position relationship:
Or:
OrOr
Shared relationship:
2) rule two
Position relationship:
Shared relationship:
3) rule three
Position relationship:
Or:
OrOr
Shared relationship:
4) rule four
Position relationship:
Shared relationship:
5) rule five
Position relationship:Except other any position relationships of above position relationship;
Shared relationship:
3. based on the hybrid protection method that recovery time is sensitive, its feature in WDM optical-fiber networks according to claim 1 and 2 Be, step 103 according to first, second backup path can shared relationship, it is total to reference to service recovery time thresholding Enjoy or specialized configuration is set, specifically include:
To any service connection ciIf, the second backup path BPi 2Can share, and RTi 2≤RT0, RT0It is service recovery time door Limit, then set BPi 2It is configuration sharing, otherwise, BP is seti 2It is specialized configuration;If BPi 1Can share, and RTi 1≤RT0, then set Put BPi 1It is configuration sharing, otherwise, BP is seti 1It is specialized configuration.
CN201611102140.5A 2016-12-05 2016-12-05 A kind of hybrid protection method based on recovery time sensitivity in WDM optical-fiber networks Active CN106685571B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611102140.5A CN106685571B (en) 2016-12-05 2016-12-05 A kind of hybrid protection method based on recovery time sensitivity in WDM optical-fiber networks

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611102140.5A CN106685571B (en) 2016-12-05 2016-12-05 A kind of hybrid protection method based on recovery time sensitivity in WDM optical-fiber networks

Publications (2)

Publication Number Publication Date
CN106685571A true CN106685571A (en) 2017-05-17
CN106685571B CN106685571B (en) 2018-06-15

Family

ID=58866395

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611102140.5A Active CN106685571B (en) 2016-12-05 2016-12-05 A kind of hybrid protection method based on recovery time sensitivity in WDM optical-fiber networks

Country Status (1)

Country Link
CN (1) CN106685571B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101155433A (en) * 2006-09-30 2008-04-02 华为技术有限公司 Service protection method and routing device
CN102186124A (en) * 2011-04-29 2011-09-14 东北大学 Utility-based interlayer coordination method in WDM (Wavelength Division Multiplexing) optical network
WO2012071828A1 (en) * 2010-12-03 2012-06-07 中兴通讯股份有限公司 Method and system for transmitting data based on full protection mode in passive optical network
US20130163983A1 (en) * 2011-12-22 2013-06-27 Telcordia Technologies, Inc. Signaling Protocol for Multi-Domain Optical Networks
CN104080112A (en) * 2014-07-17 2014-10-01 重庆邮电大学 Method for improving service reliability of wireless self-organizing network

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101155433A (en) * 2006-09-30 2008-04-02 华为技术有限公司 Service protection method and routing device
WO2012071828A1 (en) * 2010-12-03 2012-06-07 中兴通讯股份有限公司 Method and system for transmitting data based on full protection mode in passive optical network
CN102186124A (en) * 2011-04-29 2011-09-14 东北大学 Utility-based interlayer coordination method in WDM (Wavelength Division Multiplexing) optical network
US20130163983A1 (en) * 2011-12-22 2013-06-27 Telcordia Technologies, Inc. Signaling Protocol for Multi-Domain Optical Networks
CN104080112A (en) * 2014-07-17 2014-10-01 重庆邮电大学 Method for improving service reliability of wireless self-organizing network

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
NING-HAI BAO 等: "On Exploiting Sharable Resources With Resource Contention Resolution for Surviving Double-Link Failures in Optical Mesh Networks", 《JOURNAL OF LIGHTWAVE TECHNOLOGY》 *
梁俊 等: "一种基于区分业务等级的光网络共享通路保护算法", 《光通信研究》 *

Also Published As

Publication number Publication date
CN106685571B (en) 2018-06-15

Similar Documents

Publication Publication Date Title
CN101778003B (en) The system and method preventing equipment fault impact communication
US8830825B2 (en) Method and system for priority based (1:1)n ethernet protection
CN111342889B (en) Risk separation protection path searching method and system for safety and stability control type service
CN106471779A (en) A kind of guard method of virtual network and device
CN106992810A (en) Consider the shared protection route and frequency spectrum distributing method of joint probability of malfunction constraint
Wright et al. Cost model comparison of ZR/ZR+ modules against traditional WDM transponders for 400G IP/WDM core networks
CN105530133B (en) A kind of Electric control business intelligence restoration methods
CN101674217A (en) Method for realizing permanent ring network protection in MESH network
CN104954160B (en) A kind of method that realizing bearer network multiple protective and bearer network
CN106685571B (en) A kind of hybrid protection method based on recovery time sensitivity in WDM optical-fiber networks
CN101321124A (en) Branch routing search recovery method of wavelength changeable optical network double-link failure
Zheng et al. Robust design against network failures of shared backup path protected sdm-eons
CN101192961B (en) Route method and device
CN103905338B (en) The method and device that a kind of IP backbone merges
US20090196202A1 (en) Transmitting apparatus and path setting method
CN107864093A (en) A kind of multilayer union route and Survivability Strategy based on economic factors
JP4422568B2 (en) Optical cross-connect device and optical transmission system
Silva et al. An heuristic for maximally SRLG-disjoint path pairs calculation
CN101383759B (en) Protection method dividing management region in optical network
CN104158740B (en) A kind of path management method and controller
Machuca et al. Assessment methodology of protection schemes for next generation optical access networks
Shan et al. Partial spatial protection for provisioning differentiated reliability in FSTR-based Metro Ethernet networks
CN109743112A (en) OTN network-building method, device, equipment and computer readable storage medium
CN103547337B (en) transmission network control method, controller and node
Guo et al. Dynamic shared-path protection algorithm for dual-risk failures in WDM mesh networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200415

Address after: 226400 Zhongtian Industrial Zone, Hekou Town, Rudong County, Jiangsu, Nantong

Patentee after: ZHONGTIAN BROADBAND TECHNOLOGY Co.,Ltd.

Address before: 400065 No. 2, Chongwen Road, Nanshan street, Nan'an District, Chongqing

Patentee before: CHONGQING UNIVERSITY OF POSTS AND TELECOMMUNICATIONS