CN101494473A - Protection method for WDM optical network loop based on resource and taking regard of protection duration control - Google Patents

Protection method for WDM optical network loop based on resource and taking regard of protection duration control Download PDF

Info

Publication number
CN101494473A
CN101494473A CNA2009100791219A CN200910079121A CN101494473A CN 101494473 A CN101494473 A CN 101494473A CN A2009100791219 A CNA2009100791219 A CN A2009100791219A CN 200910079121 A CN200910079121 A CN 200910079121A CN 101494473 A CN101494473 A CN 101494473A
Authority
CN
China
Prior art keywords
circle
link
protection
network
resource
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2009100791219A
Other languages
Chinese (zh)
Other versions
CN101494473B (en
Inventor
罗沛
黄善国
李彬
郭秉礼
黄浩天
顾畹仪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jiaoke Highway Surveying, Design and Research Institute
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN2009100791219A priority Critical patent/CN101494473B/en
Publication of CN101494473A publication Critical patent/CN101494473A/en
Application granted granted Critical
Publication of CN101494473B publication Critical patent/CN101494473B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to the communication field. The embodiment of the invention discloses a protection method of a WDM optical network ring, which is based on resources and considers protecting time control. The method mainly comprises the processing procedures under three states of preconfigured state, normal working state and fault state. The proposal also provides a heuristic ring search configuration method and a protection switch process matched with the configuration method.

Description

A kind of based on resource and consider the WDM optical-fiber network circle guard method of guard time control
Technical field
The present invention relates to the communications field, relate in particular to the protection that is used for WDM optical-fiber network link failure.
Background technology
Along with the develop rapidly of optical transport technology, single channel transmission rate and single fiber multipling channel number constantly increase in wavelength division multiplexing (WDM) network, thereby have caused the rapid expansion of network capacity.Meanwhile, in case break down in the network to bring and seriously influence to entire society life.Therefore, the reliability of assurance optical-fiber network has very important significance.
The protection of P circle is a kind of protected mode in the WDM network, and it combines the ring network protection and the mesh network protection recovers both advantages.The quick protection in the latticed network is realized in the circular passage that the protection of P circle sets in advance by idling-resource, allows service aisle to select the shortest direct route simultaneously on Internet resources figure.The setting of P circle is based on professional, occur in before any network failure, and the action of desired real-time reversion is pre-designed fully.Although use the P circle and encircle similarly on switch function and network topology, the P circle can not only provide protection to the fault of ring uplink, can also provide protection for the fault of gap-bridging link.
The characteristic that P circle method is protected based on business has also been brought certain limitation to it simultaneously.Because it is to protect at one group of business in the network, before the configuration of P circle, must know the professional situation that takies working resource in the network in advance, so it mainly is applicable to static state or quasistatic business.So, need to use more efficient methods to provide protection as business in order to adapt to the demand of dynamic service.And in the existing guard method, on the basis of P circle method resource-based RP circle (Resource-based Protection cycle) method have configuration simple, be applicable to dynamically and advantages such as static traffic.It inherited P circle method to enclose and the protection of gap-bridging link and another kind based on encircle guard method---Hamilton's environmental protection is defended the doctrine at the advantage of protection of resources, and overcome both some shortcomings.It and type of service are irrelevant, and the network management system burden is little, the resource utilization height, and network topology do not had special requirement, be a kind of simple and practical network protection method.
But; on protection speed, because RP circle method allows the resource conservation on the link to be reused by a plurality of RP circles, so when link failure, need send fault signaling around fault RP circle; notify two end node protections of every link to switch, its guard time will be grown relatively.Particularly jumping figure is bigger, promptly encloses the RP circle that uplink is many, scale is bigger, and when fault took place, the passing time of fault signaling was long.And, because the selection of configuration of guard circle is lacked consideration to the guard time factor, cause each fault to take place after, network all need be judged the coupling of resource conservation again, thereby makes traditional RP circle method become at a loss what to do aspect the control of guard time.
Consider afore-mentioned, exist to overcome needs not enough in the correlation technique.
Summary of the invention
The object of the present invention is to provide a kind ofly based on resource and consider the WDM optical-fiber network circle guard method of guard time control, be used to the link failure of WDM optical-fiber network that protection is provided.
Provided by the invention based on resource and consider the WDM optical-fiber network circle guard method of guard time control, it is characterized in that comprising following steps:
In the pre-configured stage of network topology, call the didactic two step collocation methods of considering guard time control and from the circle set, choose one group of circle and provide protection for every link in the network, divide work and resource conservation on each bar link simultaneously;
After back and fault restoration take place network failure, switch flow process according to the dissimilar corresponding protection of taking of the two step guard circles that collocation method disposed.
Provided by the invention based on resource and consider that the two step collocation methods that the WDM optical-fiber network circle guard method of guard time control is comprised comprise following steps:
Never comprise select one group of circle uplink of not having a coincidence and protection efficient height in the available circle set of mesh circle (certain bar link the inferior short circuit between the both link ends point by the circle that is surrounded) therewith, the wide circle of protection range provides effective protection for most of link, and divide work and resource conservation on these links, the corresponding relation of working resource and guard circle is saved in the record sheet at each end of link node place;
Mesh circle in the network is sorted, in the network not yet protected link guard circle is provided, and working resource on this part link and the corresponding relation between the guard circle are saved in the record sheet at each end of link node place.
Provided by the invention based on resource and consider that protection that the WDM optical-fiber network circle guard method of guard time control is comprised switches flow process and comprise following steps:
After fault takes place, the record sheet at inquiry faulty link end node place, and according to the type classification switchover mode of affiliated guard circle.If for mesh circle protection then send the protection switching messages of pitch of the laps, confirm that resource conservation coupling back is finished by the faulty link end points to switch; Switch if not then directly finishing by the end node of faulty link;
After fault restoration and impaired business were switched to former working channel again, the work resource conservation record sheet at query node place was according to the type classification step of guard circle.If for mesh circle protection then send the protection switching messages of pitch of the laps, the resource conservation on the link of reusing with the circle of first step configuration in two step of guard circle shared in this protection process and all collocation methods is switched on the circle of first step configuration in the two step collocation methods again; Switch if not then need not.
Above technical method as can be seen, the two step collocation methods that circle guard method provided by the invention is comprised have been taken all factors into consideration the protection efficient and the guard time factor of guard circle, thereby select and the guard circle of configuration has the better protect effect; And, two step collocation methods have guaranteed can not exist between some protection efficient height, the protection link circle how the conflict phenomenon of resource conservation, and pass through with between the mesh circle, and the resource conservation between the circle of mesh circle and first step configuration is shared, has improved the resource conservation utilance; In addition; the configuration characteristics that flow process combines two step collocation methods are switched in the protection of the worry guard time control that circle guard method provided by the invention is comprised; and utilized the circle of first step configuration to protect the efficient height; the character that protection range is wide; the fault that guarantees the most of link of network all need not be by sending the fault signaling message around guard circle; directly finish the switching of resource, thereby effectively reduced required guard time after most of link occurs fault by the two-end-point of faulty link.Need be scale minimum in the network by sending what finish that protection switches around figure message, the mesh circle of jumping figure minimum, thus on path, effectively limited guard time.At last; finish by troubleshooting; resource switch process after network state is recovered normally; guaranteed the coupling of resource conservation on the circle circle of first step configuration; thereby when having guaranteed that also fault arrives next time; most of link still can directly be finished protection by the end points of faulty link and switch, and has kept the stability of whole protecting method.
Other features and advantages of the present invention will be set forth in the following description, and, partly from specification, become apparent, perhaps understand by implementing the present invention, purpose of the present invention and other advantage can be by specification, the claims in abbreviation, and the specifically noted structure realizes and obtains in the accompanying drawing.
Description of drawings
In conjunction with the accompanying drawing of having described various embodiment of the present invention, according to following detailed description, will be easier to understand above-mentioned and other advantage of the present invention to each invention of the present invention, wherein:
Fig. 1 shows based on resource and considers the WDM optical-fiber network circle guard method frame diagram that guard time is controlled;
Fig. 2 illustrates the flow chart of two step collocation methods among Fig. 1;
Fig. 3 illustrates an application example figure of two step collocation methods among Fig. 1;
Fig. 4 illustrates among Fig. 1 under the normal operating conditions certain link capacity use figure in network constantly;
Fig. 5 illustrates the error protection flow chart under the malfunction among Fig. 1;
Embodiment
By with reference to following detailed description for exemplary non-limiting examples and figures, advantages and features of the invention and realize that method of the present invention is easier to understand.Yet the present invention can implement with multiple different form, and the embodiment that should not be construed as limited in this explaination.In addition, thus it will be completely and completely that these embodiment the disclosure are provided.And complete conveyed to those skilled in the art with design of the present invention, the present invention will only be defined by claims.In specification, identical label is indicated the parts of enjoying all the time.
Fig. 1 shows resource-based circle Protection Code and realizes block diagram.Mainly comprise three kinds of processing under the state: pre-configured state, normal operating conditions and malfunction.
Pre-configured state is meant the state of network before handling all service request, is used for enclosing calculating and sharing out the work and resource conservation.At first,, utilize circle searching algorithm 103 to find out all possible circle set 104 in the network, and obtain mesh circle set 106 simultaneously in conjunction with optionally enclosing length restriction condition 102 according to network topology 101.Wherein, the searching algorithm of circle set commonly used has breadth-first search (breadth first search) algorithm and Johnson algorithm etc.The mesh circle is at the name of mesh net.The computational methods of mesh circle are: to any link in the network topology, be input parameter, call dijkstra's algorithm one time with the head and the tail node of this link, try to achieve between two nodes this link shortest path by.This time short circuit by coupling together with this link, is promptly obtained a mesh circle.After the circle set was calculated and finished, this method was used didactic two step collocation methods 108 to choose one group of circle from available circle set 105 and mesh circle set 106 and is gathered as guard circle in conjunction with the link capacity information 107 of network topology 101 and topology.Then whole network capacity is divided into working capacity and protection capacity, distributes the working resource 109 of resource conservation 110 and its protection; And finish pre-configured process to the mesh net topology, form pre-configured back topology 111.Because the hypothesis network is uniformly,, enclose uplink has half on each direction capacity as the protection capacity so the capacity on every link equates that all the distribution of circle uplink capacity is similar to the two fibre two-way multi-section guard rings (BLSR) of SDH.Corresponding relation on the link between the working resource of resource conservation and its protection is stored in the resource record table of this end of link node, by this end of link node maintenance.The flow chart and the process description aftermentioned thereof of two step collocation methods.
So far, pre-configured state finishes, and network enters normal operating conditions and malfunction processing procedure.When network is in normal operating conditions, the processing procedure 112 of service request itself there is not particularity.Promptly, satisfy service request, finish professional foundation according to effective route and Wavelength assignment algorithm 113.When business reaches,, just can reach the professional purpose of protection, no matter and be static traffic or dynamic service as long as route is selected in available working capacity inside in the topology 111 of pre-configured back.
When network failure took place, by fault detect 114, network entered malfunction by normal operating conditions.The protection that the handling process of malfunction is divided into before the fault restoration switches 115, and the resource after failover process 116 and the fault restoration switches 117.Wherein failover process 116 is meant by artificial or method for distinguishing, repairs the process of faulty link.After the fault restoration, the network recovery normal operating conditions; It is in order to provide the working resource that effective protection initiates and the bridge joint process of resource conservation for the business on the faulty link at short notice that protection before the fault restoration switches 115; It is after fault restoration that resource after the fault restoration switches 117, before the network recovery fault takes place state the time, and the resource reversed process of doing for the couple state that guarantees the resource conservation of part circle uplink.This is to provide the preparation of doing of quick protective switch for network failure next time.Switch for twice need defer to two the step collocation methods 108 suit mutually switch the rule 118.The process chart of malfunction and process description aftermentioned thereof.
Fig. 2 illustrates the flow chart of two step collocation methods among Fig. 1.Two step collocation methods are a kind of heuritic approaches, are used for selecting one group of circle in two steps from all available circles of network, for every link of network provides protection.We introduce some call parameters of algorithm operation before describing its basic step.Suppose that link capacity all is C in the uniform network.Suppose that N represents the set of all nodes in the network, S represents the set of all links in the network, s X, yA link between representation node i and the j, x, y ∈ N.Set P={p 1, p 2, p 3..., p nThe set of a series of P of representative circle, wherein n represents the number that P encloses in this set.For i P circle p i, definition
Figure A20091007912100111
Represent the number of the ring uplink that this P circle comprised,
Figure A20091007912100112
Represent this P to enclose the number of the gap-bridging link that is comprised.Definition
Figure A20091007912100113
Be effective weight of single P circle, be used for reflecting capacity that the P circle can protect what.According to the basic definition of P circle,, can protect one times working capacity, and, then can protect the working capacity of twice for gap-bridging link for the ring uplink.Therefore, for some P circle p i, the computing formula of its effective weight is:
EW p i = Σ ∀ s x , y ∈ S X p i , j = 2 | S p i , S | + | S p i , C |
Wherein,
Figure A20091007912100115
Expression is for specific P circle p i, link s X, yWeighted value, work as s X, yDuring for the ring uplink of this P circle, X p i , j = 1 ; Work as s X, yDuring for the gap-bridging link of this P circle, X p i , j = 2 ; Otherwise X p i , j = 0
Simultaneously, definition Be some P circle p iVolumetric efficiency, be used for reflecting the protection efficient of single P circle, the ratio of promptly protected capacity and protection capacity, then Can be defined as:
CE p i = Σ ∀ s x , y ∈ S X p i , j | p i | = 2 | S p i , S | + | S p i , C | | S p i , C |
Wherein, | p i| represent the size of this P circle, equal the number of this P circle ring uplink, promptly | p i | = | S p i , C | .
After circle set search, we can obtain available circle set P.After passing through the one-time calculation to full mesh topology according to mesh circle computational methods in addition, we can obtain mesh circle set NP.We are not comprised the available circle set P of mesh circle remove the common factor of P and NP from P after 1, i.e. P 1=P-P ∩ NP.We are referred to as available substantially circle set.
The first step of two step collocation methods is the available substantially circle set P that never comprise the mesh circle 1In select one group of pairwise orthogonal and the high circle of volumetric efficiency provides effective protection for most of link, second step was then utilized the circle of scale minimum in the network---the mesh circle is not for providing the link assignment resource conservation of protection, to realize the covering fully to network link.Two the step collocation methods performing step as shown in the figure:
In step 201, algorithm begins.
Step 202 to step 206 belongs to first step circle layoutprocedure, and its function is: from available substantially circle set P 1In select one group of pairwise orthogonal (do not have overlap link) available circle network link is carried out covering first time.
In step 202, the initialization network topology all is initialized as available working resource with all resources; And, calculate P according to the current resource situation of the topological sum of network 1In the volumetric efficiency of each available circle CE p i ( p i ∈ P 1 ) . A circle
Figure A20091007912100123
The ratio that can reflect when adopting this circle that protection is provided new work resource in the network and newly-increased resource conservation;
In step 203, find out set P 1In the circle of volumetric efficiency maximum as the circle of this selection, if the volumetric efficiency of a plurality of circles is all identical, so just select many one of active link, if identically more then select one arbitrarily;
In step 204, be that this circle that chooses distributes resource conservation, and its working resource that can protect is protected for being subjected to this circle to upgrade under it formal notation of end of link node place record sheet.The resource conservation distribution is half of every circle uplink capacity, i.e. C/2.Capacity is that symmetrical complement distributes on two-way link, is similar to the capacity allocation mode of BLSR.Record sheet is preserved by two end points of link and is safeguarded that the structure of record sheet will be introduced in detail at further part.If the circle uplink of this circle overlaps with the gap-bridging link of original circle, the record sheet that then distributes the corresponding protection resource and upgrade this gap-bridging link end points place is protected by the circle of current selection; If the gap-bridging link of this circle overlaps with the circle uplink of original circle, then capacity allocation is constant on this link, does not upgrade record sheet; If the gap-bridging link of this circle overlaps with the gap-bridging link of original circle, then capacity allocation is constant on this link, upgrades record sheet for being subjected to that circle protection of length the shortest (or jumping figure is minimum);
In step 205, judge whether that the all-network resource divided and finish (promptly all links all are marked in the protection range of a circle).If then enter step 210; Otherwise, continue step 206;
In step 206, upgrade topology, all links of having divided resource conservation in the circle of this selection are left out from network topology, i.e. every circle uplink.From set P 1In remove disabled circle in this circle selected and the topology after renewal, promptly having the circle uplink of or one or more is to have deleted the circle of link.Judge set P 1In whether have available circle, if having, get back to step 203; If set P 1In do not had available circle, then recover network topology, i.e. links of deletion before all.Each node is preserved circle protection record sheet, enters the second step layoutprocedure.
Step 207 to step 209 belongs to the second step circle layoutprocedure, and its function is: select one group of available circle from mesh circle set NP network link is realized covering fully.They each other and and the selected circle of the first step between can exist and reuse link.
In step 207, find out set and comprise the maximum circle of also unallocated link among the NP as this selected circle.If the unallocated number of links that a plurality of circles comprise is identical, few one of choosing circle length so is if identically more then select one arbitrarily;
In step 208, be that this mesh circle that chooses distributes protection and working resource, and preserve the nodes records table and its working resource that can protect is labeled as is subjected to this circle protection.The capacity allocation mode is identical with step 204, and resource conservation is half of every circle uplink capacity.If there is identical circle uplink in this circle with the circle that the first step has been selected, then this link capacity distribution is constant, and the record sheet of link end points is constant; If there is identical circle uplink in this circle with second circle selected of step, then this link capacity distribution is constant, this circle is added in the record sheet of link end points so far; If the circle uplink of this circle overlaps with the gap-bridging link that the first step has been selected to enclose, then distribute the corresponding protection resource, and the record sheet that upgrades this gap-bridging link end points place is protected by the circle of current selection;
In step 209, judge whether that the all-network resource divided finish (promptly all links are all at least in the protection range of a circle).If then continue step 210; Otherwise, from mesh circle set NP, remove the circle of this selection, jump to step 207.
In step 210, algorithm finishes.
Two groups of available circles can be obtained through this algorithm, all standing can be realized network link.Wherein, by first group of circle pairwise orthogonal selecting among the set P1 (not having the circle uplink that overlaps), these circles all are that protection efficient is high and link that comprise is many, coverage is wider.Second group of circle being selected among the NP by set do not require pairwise orthogonal, do not require yet with first group in the circle quadrature.Second group of circle volumetric efficiency all is 1, and the scale of circle is all very little.Be of value to shortening when fault takes place and protect switching messages, also be of value to the fully covering of realization simultaneously link around the time that ring transmits.In second group of available circle, there is not gap-bridging link in the mesh circle, but a plurality of circle may have the circle uplink of repetition.At this moment, the resource conservation of circle uplink can be a plurality of circle and reuses (we claim that such link is for reusing link).Therefore, write down the circle at this link place, switch so that when fault, carry out corresponding protection with regard to the end node that needs each bar link.On circle during other link occurs fault, two nodes of reusing on the link can be switched to resource conservation on the corresponding circle according to the fault signaling, and when reusing link occurs fault, only need be just passable to the circle being responsible for its recovery at the both link ends switching services of naming a person for a particular job; And in first group of available circle, owing to be the relation of quadrature between the circle, so can there not be the circle uplink of reusing.And if the gap-bridging link that link is a plurality of circles in order to reduce guard time, can be stipulated that circle protection by length the shortest (or jumping figure is minimum) of this gap-bridging link at this; And between second group and first group of circle the situation that uplink is reused may appear also enclosing.At this moment we stipulate, break down if circle is gone up other links (the non-link of reusing), then utilize the resource conservation protection in this circle to switch; If reuse link occurs fault, then utilize the resource conservation of first group of circle to finish protection and switch.
Fig. 3 illustrates an application example figure of two step collocation methods.Provided 4 available circles among the figure, wherein, p 1And p 2Be based on the circle set P that factor such as length calculates respectively 1Maximum and time big available circle of middle volumetric efficiency; Np 1And np 2Belong to mesh circle set NP.We have CE p 1 > CE p 2 , CE np 1 = CE np 2 = 1 . By the configuration of first step circle, p 1And p 2Successively chosen.p 1Provide protection for its circle upward reaches gap-bridging link, comprise link s 1,2And s 2,3p 2Provide protection for its circle upward reaches gap-bridging link, comprise link s 1,4Respective link can be divided resource conservation automatically; The end points of respective link can be preserved the corresponding relation of this link and guard circle in record sheet.Suppose at this moment only to have link s in the network 2,4And s 3,4Unallocated resource is also distributed available guard circle, then will trigger the layoutprocedure in second step.After second step, placement algorithm finished, link s 3,4Will be by mesh circle np 2Protection; Link s 2,4As circle np 1And np 2Shared link, will by the circle np 1And np 2In any one protection (may be prescribed as circle that the shortest circle of jumping figure).At this moment, link s 2,4And s 3,4On resource will divide equally according to the mode of half work, half protection.s 3,4End points with np 2Be recorded as the guard circle of this link.Because s 2,4Be shared link, its end points will write down circle np simultaneously 1And np 2Select in the actual reversed process.And the circle np of second step configuration 1, np 2Circle p with the configuration of the one 1 step 1, p 2Between have the situation of shared link equally.Our regulation: if having shared link between second circle chosen of step, then this shared link can be implemented protection by a plurality of circles; If second step was chosen and the one 1 circle chosen of step between have shared link, then provide protection, so only preserve the corresponding relation with the latter in the record sheet at these link end points places by the latter.
The working channel numbering is W (x, y, 0/1) on the link, and wherein x represents link, and y represents the order numbering of this working channel on this link, and 1 is expressed as this channel provides the circle of protection to belong to the two first group of circle set that goes on foot in the collocation methods, and 0 expression does not belong to.W (s for example 1,2, 2,1) and expression link s 1,2In the 2nd working channel be subjected to certain circle protection in the set of first group of circle.Protection channel number mode on the link is that (z), wherein x represents link to P for x, y, and y represents the order numbering of this protection channel on this link, and z represents this protection channel place circle.P (s for example 1,2, 1, p 1) expression link s 1,2In the 1st the protection channel, the circle p 1In.The channel of mentioning below more than reaching all is meant two-way channel.It should be noted that the corresponding relation of two step collocation methods at good resource of the node configuration of reusing both link ends and guard circle.In figure, node 2 and node 4 are np 1With np 2Reuse link s 2,4End points; Node 1 and node 4 are np 1And p 2Reuse link s 1,4End points.With node 4 is example, and the work resource conservation record sheet of its maintenance is as shown in table 1:
The work resource conservation of safeguarding in table 1 node 4
Figure A20091007912100171
In the last table, y is a variable ( C 2 < y &le; C , y &Element; N + ) . P (s 1,4, y, p 2) and P (s 1,4, y, np 1) refer to p together 2And np 1Shared link s 1,4On resource conservation.Work as np 1Go up and remove s 1,4And and p 1, p 2During outer other link failures of the link of sharing, i.e. link s 2,4During fault, node 1 and node 4 are judged can be by np 1Perhaps np 2Protection.If select np 1, s 1,4On resource conservation will be used as np 1Protection.Work as p 2Go up and remove s 1,4During outer other link failures, node 1 and node 4 judge it is p 2So protection is with s 1,4On resource conservation as p 2Protection.When reusing link, i.e. s 1,4During fault, node 1 and node 4 are judged still by p by tabling look-up 2Protection is provided.In like manner, s 2,4Be np 1And np 2Shared link.If s 3,4Break down, node 3 and node 4 are np with judgement 2Protection is also used s 2,4On resource conservation.If np 1Non-shared link of middle existence.When this link occurs fault, its end node will be tabled look-up judges it is np 1Protection.Will be s 2,4On resource conservation as np 1Protection.And work as s 2,4When itself breaks down, with s 1,4The processing mode difference of fault, node 2 and node 4 will be through consultation, and working resource is switched to np 1Or np 2In any one can.
Fig. 4 shows among Fig. 1 operate as normal period, and certain is the link capacity user mode in network constantly.Link capacity is divided according to the capacity division rule of each bar link in the network, and half of all told 406 of promptly enclosing uplink is working capacity 404, and second half is a protection capacity 405; All told 409 all can be used as working capacity and divides on the gap-bridging link.Wherein, load 402 is parts of having used in the working capacity 404 on the circle uplink, and idle capacity 401 is the parts that are not used as yet in the working capacity 404 on the circle uplink.Load 408 is parts of having used in all told 409 on the gap-bridging link, and idle capacity 407 is the parts that are not used as yet in all told 409 on the gap-bridging link.That of maximum in the maximum that maximum required protection capacity 403 equals to enclose uplink load 402 and peaked half these two value of gap-bridging link load 408.
The circle guard method that the present invention the proposes request process of managing business in network course of normal operation and mesh network is basic identical; when business reaches; as long as route is selected in working capacity inside available in topology; just can reach the professional purpose of protection, no matter and be static traffic or dynamic service.Because in this circle guard method design, the working capacity on each section of the whole network (link) all equates there is not prediction work traffic intensity matrix, do not optimize the configuration of working capacity and protection capacity according to the working capacity distribution pattern.So in professional routing procedure, need to consider to adopt suitable routing algorithm, efficiently utilize Internet resources, realize lower service blocking rate.Several routing algorithms commonly used have the shortest jumping routing algorithm (Shortest-HopRouting), minimum load routing algorithm (Least-Load Routing), maximum residual routing algorithms (Most-Free Routing) etc., the particular content of algorithm is not described herein at this.
Fig. 5 shows the error protection flow chart under the malfunction among Fig. 1.
In step 501, the end-point detection of faulty link starts the circle protection to the link failure that self connects;
In step 502, detect the work resource conservation record sheet of this link of link terminal point inquiry of link failure.And judge whether by available substantially circle protection.If flow process enters step 508, otherwise, step 503 continued;
In step 503, the link terminal point that detects link failure prolongs each circle of chain road direction on the guard circle and goes up node and send the protection switching messages (SwitchMessage) of carrying this coil structures information;
In step 504, the node on this guard circle circle receives the protection switching messages;
In step 505, in case the node on the circle receives the protection switching messages, just dispose the cross-connect matrix of this node according to message, return to the corresponding acknowledge message of end points (Confirm Message) of faulty link then;
In step 506, the end points of faulty link receives and waits for the affirmation message that all nodes return;
In step 507, the end points of faulty link judges whether to receive this circle and goes up the affirmation message that all nodes return.If continue step 508; Otherwise continue to wait for, return step 506;
In step 508, the end points of faulty link is finished the switching services process according to the corresponding relation of switching that inquires before separately.
In step 509, switch successfully after, the end points of faulty link sends the protection channel notification to this each node of switching on the circle that takies, notifies the protection channel on their this circles occupied;
In step 510, fault treating procedure.
In step 511, after troubleshooting finishes, affected business will be switched on the former working channel again again.Idle condition is replied in resource conservation.Judge the available substantially circle that whether is of this fault employing.If flow process enters to step 517; Otherwise, continue step 512;
In step 512, switch by this protection and to initiate node and prolong each circle of chain road direction on the guard circle (mesh circle) of this use and go up node and send the resource switching messages once more;
In step 513, node receives the resource switching messages on the circle;
In step 514; after node receives the resource switching messages on the circle; inquire about the record sheet at this node place and with the resource conservation on the link of reusing of the available substantially circle of guard circle shared in this protection process and all first steps configuration; by disposing the cross-connect matrix of this node, be switched to again on the available substantially circle.Resource conservation with the available substantially circle circle uplink that guarantees first configuration set recovers couple state.Return to this protection then and switch the corresponding acknowledge message of initiation node;
In step 515, this protection is switched and is initiated the node reception and wait for the affirmation message that all nodes return;
In step 516, this protection is switched the initiation node and is judged whether to receive the affirmation message that last all nodes of this circle return.If continue step 517; Otherwise continue to wait for, return step 515;
In step 517, flow process finishes.
Though described embodiments of the present invention in conjunction with the accompanying drawings, those skilled in the art can make various distortion or modification within the scope of the appended claims in this area.

Claims (6)

1, a kind of based on resource and consider the WDM optical-fiber network circle guard method of guard time control, it is characterized in that may further comprise the steps:
The pre-configured network topology stage, call the didactic two step collocation methods of considering guard time control and from the circle set, choose one group of circle and provide protection for every link in the network, divide work and resource conservation on each bar link simultaneously;
After back and fault restoration take place network failure, switch flow process according to the dissimilar corresponding protection of taking of the two step guard circles that collocation method disposed.
2, method according to claim 1, the wherein said step of calling didactic two step collocation methods mainly may further comprise the steps:
Never comprise in the network topology minimum circle and be the circle of selecting one group of circle uplink of not having a coincidence in the available circle set of mesh circle and carry out first time and sort, and be followed successively by by the result of described first time of ordering that a part of link provides protection in the network, and working resource on this part link and the corresponding relation between the guard circle are saved in the record sheet at each end of link node place;
Mesh circle in the network is sorted, in the network not yet protected link guard circle is provided, and working resource on this part link and the corresponding relation between the guard circle are saved in the record sheet at each end of link node place.
3, method according to claim 2, wherein, described first time, the foundation of ordering was the volumetric efficiency of guard circle, the ratio of new work resource and newly-increased resource conservation in the network when promptly using this guard circle; Described second time, the foundation of ordering was that guard circle comprises unallocated work or resource conservation quantity of links, comprised circle uplink and gap-bridging link, if when number is identical then according to the jumping figure decision order of circle.
4, method according to claim 3, wherein, the method for the described ordering first time is a descending.
5, method according to claim 3, wherein, the method for the described ordering second time is a descending; Described jumping figure decision method in proper order according to circle is an ascending order.
6, method according to claim 1, the wherein said step of taking corresponding protection to switch flow process mainly comprises following steps:
After fault takes place,, confirm after the resource conservation coupling to finish and switch by the faulty link end points if for the protection of mesh circle then send the protection switching messages of pitch of the laps; Switch if not then directly finishing by the end points of faulty link;
After fault restoration and impaired business are switched to former working channel again, if for mesh circle protection then send the protection switching messages of pitch of the laps, the resource conservation on the link of reusing with the circle of first step configuration in two step of guard circle shared in this protection process and all collocation methods is switched on the circle of first step configuration in the two step collocation methods again; Switch if not then need not.
CN2009100791219A 2009-03-04 2009-03-04 Protection method for WDM optical network loop based on resource and taking regard of protection duration control Active CN101494473B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009100791219A CN101494473B (en) 2009-03-04 2009-03-04 Protection method for WDM optical network loop based on resource and taking regard of protection duration control

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009100791219A CN101494473B (en) 2009-03-04 2009-03-04 Protection method for WDM optical network loop based on resource and taking regard of protection duration control

Publications (2)

Publication Number Publication Date
CN101494473A true CN101494473A (en) 2009-07-29
CN101494473B CN101494473B (en) 2013-12-11

Family

ID=40924905

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009100791219A Active CN101494473B (en) 2009-03-04 2009-03-04 Protection method for WDM optical network loop based on resource and taking regard of protection duration control

Country Status (1)

Country Link
CN (1) CN101494473B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103490810A (en) * 2013-10-14 2014-01-01 重庆邮电大学 Wavelength conversion range limited 2-hop-segment-based dynamic optical multicast P-ring segment protection method
CN104144121A (en) * 2013-05-10 2014-11-12 中国电信股份有限公司 Method, device and system for avoiding switching transmission in sectionalized protection
CN104734950A (en) * 2013-12-20 2015-06-24 中兴通讯股份有限公司 Method and device for protecting PTN network services

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105577435A (en) * 2015-12-21 2016-05-11 中国联合网络通信集团有限公司 Method and equipment for configuring P-cycles

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1588883A (en) * 2004-09-23 2005-03-02 上海交通大学 Network protective method based on multiple volume preset protective ring
CN101026482A (en) * 2006-02-23 2007-08-29 北京邮电大学 Network protection method based shared risk linkgroup for WDM optical network
CN101287009A (en) * 2008-06-05 2008-10-15 中兴通讯股份有限公司 Method and apparatus for configuring static pre-configuration cycle under double link fault

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1588883A (en) * 2004-09-23 2005-03-02 上海交通大学 Network protective method based on multiple volume preset protective ring
CN101026482A (en) * 2006-02-23 2007-08-29 北京邮电大学 Network protection method based shared risk linkgroup for WDM optical network
CN101287009A (en) * 2008-06-05 2008-10-15 中兴通讯股份有限公司 Method and apparatus for configuring static pre-configuration cycle under double link fault

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104144121A (en) * 2013-05-10 2014-11-12 中国电信股份有限公司 Method, device and system for avoiding switching transmission in sectionalized protection
CN104144121B (en) * 2013-05-10 2017-09-08 中国电信股份有限公司 Avoid switching the method, apparatus and system of transmission in sectionalised protection
CN103490810A (en) * 2013-10-14 2014-01-01 重庆邮电大学 Wavelength conversion range limited 2-hop-segment-based dynamic optical multicast P-ring segment protection method
CN103490810B (en) * 2013-10-14 2016-08-17 重庆邮电大学 The light multicast dynamic P circle 2 jumping segment protection method that a kind of wavelength convert scope is limited
CN104734950A (en) * 2013-12-20 2015-06-24 中兴通讯股份有限公司 Method and device for protecting PTN network services
CN104734950B (en) * 2013-12-20 2019-04-26 中兴通讯股份有限公司 The method and device that a kind of pair of PTN network business is protected

Also Published As

Publication number Publication date
CN101494473B (en) 2013-12-11

Similar Documents

Publication Publication Date Title
Ou et al. Traffic grooming for survivable WDM networks-shared protection
US7466913B2 (en) Method for WDM optical networks including alternate routes for fault recovery
Wang et al. Partial path protection for WDM networks: End-to-end recovery using local failure information
He et al. Path-based protection for surviving double-link failures in mesh-restorable optical networks
Schupke Multiple failure survivability in WDM networks with p-cycles
CN100396040C (en) Method of path selecting in intelligent optical network
CN105207859A (en) OTN network planning setting method in power communication network
CN102185650A (en) Disjoint path-based ASON (Automatic Switched Optical Network) multiple fault protection method
CN102480368B (en) Protecting method and system of aggregation link
CN101494473A (en) Protection method for WDM optical network loop based on resource and taking regard of protection duration control
CN101155063B (en) Service protection method and routing device
Zhang et al. Dynamic light trail routing in WDM optical networks
CN100536405C (en) Method of obtaining protection path of effectively used network resource
CN101287009B (en) Method and apparatus for configuring static pre-configuration cycle under double link fault
EP1453233B1 (en) Method and apparatus for dynamic provisioning of reliable connections in the presence of multiple failures
CN101321124A (en) Branch routing search recovery method of wavelength changeable optical network double-link failure
EP1432274B1 (en) Protection scheme for a communication network
CN1859049B (en) Method for obtaining optimum shared protective path
CN101938426B (en) Routing inquiry method and system for automatic switched optical network
Ramasubramanian et al. Comparison of failure dependent protection strategies in optical networks
Ruan et al. A fast lightpath restoration method using two backup paths in WDM networks
CN101325456B (en) Method for processing degrade of TE link in an optical network
Jaekel et al. Logical topology design for WDM networks using survivable routing
Ramasubramanian Supporting multiple protection strategies in optical networks
Bhatt et al. Survivable routing and wavelength assignment strategy for multiclass WDM optical networks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: BEIJING JIAOKE HIGHWAY SURVEYING, DESIGN AND RESEA

Effective date: 20120110

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20120110

Address after: 100876 Beijing city Haidian District Xitucheng Road No. 10

Applicant after: Beijing University of Posts and Telecommunications

Co-applicant after: Beijing Jiaoke Highway Surveying, Design and Research Institute

Address before: 100876 Beijing city Haidian District Xitucheng Road No. 10

Applicant before: Beijing University of Posts and Telecommunications

C14 Grant of patent or utility model
GR01 Patent grant