CN102271294B - Load balance-based unicast share multi-layer protection method in optical fiber network - Google Patents

Load balance-based unicast share multi-layer protection method in optical fiber network Download PDF

Info

Publication number
CN102271294B
CN102271294B CN2011101101580A CN201110110158A CN102271294B CN 102271294 B CN102271294 B CN 102271294B CN 2011101101580 A CN2011101101580 A CN 2011101101580A CN 201110110158 A CN201110110158 A CN 201110110158A CN 102271294 B CN102271294 B CN 102271294B
Authority
CN
China
Prior art keywords
link
wavelength
protection
lsp
logical links
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2011101101580A
Other languages
Chinese (zh)
Other versions
CN102271294A (en
Inventor
王兴伟
王宇
黄敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Northeastern University China
Original Assignee
Northeastern University China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Northeastern University China filed Critical Northeastern University China
Priority to CN2011101101580A priority Critical patent/CN102271294B/en
Publication of CN102271294A publication Critical patent/CN102271294A/en
Application granted granted Critical
Publication of CN102271294B publication Critical patent/CN102271294B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention provides a load balance-based unicast share multi-layer protection method in an optical fiber network, belonging to the technical field of network communication. The method comprises the steps of setting up a working LSP (Label Switching Path) for a business request, setting up a protection LSP for the business request, and providing WDM (Wavelength Division Multiplex) layer protection for a heavy duty load light path, and releasing resources when the business leaves. According to the invention, the application scope for the traditional unicast share multi-layer protection method can be expanded, and multiple constraint situations are considered when multi-layer protection is carried out; the recovery action and the resource utilization rate are comprehensively considered, the quantity of influenced businesses when physical link failures happen is reduced as many as possible by using load balance on wavelength of a physical link and load balance on bandwidth on the light path.

Description

The multilayer guard method is shared in the clean culture based on load balancing in a kind of optical-fiber network
Technical field
The invention belongs to networking technology area, the multilayer guard method is shared in the clean culture based on load balancing that is specifically related in a kind of optical-fiber network.
Background technology
Along with the high speed development of the Internet, people have proposed new requirement to capability of communication system and performance.(Wavelength Division Multiplexing, WDM) technology can provide huge transmission capacity to wavelength division multiplexing, satisfies the demand of Internet service to bandwidth.But,, will cause a large number of services to interrupt in case network failure takes place.Meanwhile, in order to reduce the network operation cost, improve the bandwidth resources utilance, transmission network is developed to IP over WDM double-layer structure by traditional IP over ATM over SDH/SONET overWDM multilayer overlay structure gradually, and IP operation directly is carried on the WDM optical-fiber network.When breaking down, provide the ability of uninterrupted service for improving IP over WDM network, need provide protection mechanism at IP layer and WDM layer.
The multilayer guard method is shared in clean culture in traditional optical-fiber network; only consider the shared multilayer guard method of link failure under single restraint condition mostly; its scope of application is narrower; do not consider multiple constraint situations such as the constraint of optical transceiver number, sparse wavelength Conversion constraint, do not take all factors into consideration recovery amount of action that reduces when breaking down and the resource utilization that improves light path yet.
Summary of the invention
The problem that is saved as at above-mentioned prior art, the multilayer guard method is shared in the clean culture based on load balancing that the invention provides in a kind of optical-fiber network, this method is under the prerequisite of considering single link failure, the quantity of impaired business when breaking down by reducing the light path of passing through this physical link as much as possible and reduce its loaded service quantity as much as possible, reducing physical link; Take all factors into consideration simultaneously and recover action and resource utilization, provide the protection and the operating load light path of attaching most importance to that the protection of WDM layer is provided for business at the IP layer in conjunction with the share protect mechanism under the clean culture environment.
In IP over WDM network, three kinds of controlling models are arranged, be respectively overlay model, peer-to-peer model and extended model.Guard method of the present invention is primarily aimed at peer-to-peer model.
Network model can be described as oriented connected graph G p(V, L, W), as shown in Figure 6.V wherein, L, W represent the wavelength set of node set, physical link set and every physical link of network respectively, | V|, | L|, | W| represents node number, physical link number and every physical link medium wave long number of network respectively.
The constraints that the present invention considers mainly contains: the wavelength continuity constraint under the constraint of optical transceiver number, the sparse part wavelength Conversion, sparse part beam split constraint are described below:
(1) optical transceiver number
Each network node has all been disposed the optical transmitter and the optical receiver of some, and the present invention supposes that the optical transmitter of same node is identical with the optical receiver number.
(2) wavelength conversion capability
Whether have wavelength conversion capability according to node, node can be divided three classes: no wavelength transfer capability node, complete wavelength conversion capability node, part wavelength conversion capability node.
Among the present invention, for convenience, the wavelength conversion capability of unified conceptual description node with the wavelength Conversion scope is 0 with the node label that does not have wavelength conversion capability for the wavelength Conversion scope, and the node wave length conversion range with complete wavelength conversion capability is | W|.
(3) beam split ability
According to the power of beam split ability, network node can be divided three classes: no beam split ability MI (Multicast Incapable), complete beam split ability, part beam split ability.
The multilayer guard method is shared in the clean culture based on load balancing in the optical-fiber network of the present invention, comprises the steps:
Step (1), set up working LSP (label switched path) for service request
For protection LSP and working LSP can not broken down simultaneously, it is that physical link separates that protection LSP requires with working LSP, and it is as follows to set up protection LSP concrete steps:
Step (1.1), link cost is set:
It is ∞ that the pairing all wavelengths link of physical link of working LSP process and the link cost of logical links are set;
According to formula W Wcl=1 * α WclThe link cost W of each wavelength Conversion link is set Wcl
Wherein: α WclThe grade factor for the wavelength Conversion link;
According to formula
Figure BDA0000058307190000021
The link cost W of each logical links is set Ll
Wherein: b t, b w, b p, b rTotal bandwidth, bandwidth of operation, protection bandwidth and the user's bandwidth on demand of representing this logical links respectively;
α LlBe the logical links grade factor:
According to formula The link cost W of the logical node of each node correspondence to the admittance link of the corresponding all wavelengths node of this node is set Al
According to formula The link cost W of the corresponding all wavelengths node of each node to the admittance link of its logical node is set Al
Wherein: t t, r t, t a, r aRepresent the total optical transmitter number in this node place, total optical receiver number, available light transmitter number and available light receiver number respectively;
α AlFor admitting the grade factor of link;
According to formula The link cost W of each wavelength link is set Wll
Wherein: w w, w pOperating wave long number and protection number of wavelengths in the physical link under this wavelength link respectively;
α WllThe grade factor for the wavelength link;
| W| is the number of wavelengths in every physical link;
Step (1.2), pathfinding:
Step (1.2.1), utilize dijkstra's algorithm to calculate one from v ' sTo v ' dShortest path, judge whether pathfinding success;
Wherein: v ' sBe v sLogical node, v sBe source node;
V ' dBe v dLogical node, v dBe destination node;
Step (1.2.2) is if service request is refused in failure, and method finishes;
Step (1.2.3) is if success continues execution in step (1.3); The LSP that herein obtains is a link set of being made up of wavelength Conversion link, logical links, admittance link, wavelength link;
Step (1.3), format LSP:
For each bar link among the LSP:
Step (1.3.1) is if for admitting link, explanation need be set up a new light path, record all wavelengths link and wavelength Conversion link thereafter admitted link until next bar occurring so according to the order of sequence, creates a new light path according to the orderly link set that obtains;
Step (1.3.2) does not process if be logical links;
Through format, LSP has become a set that only is made of logical links;
Step (1.4), Resources allocation:
Step (1.4.1), for newly-built light path, the user mode of the corresponding wavelength link of its process is changed to " being used to light path "; Light path source node place available light transmitter number subtracts one; Light path destination node place available light receiver number subtracts one; On logical topology, increase corresponding logical links;
Step (1.4.2), upgrade the bandwidth usage of each logical links on the LSP path successively.
Step (2), be that service request sets up protection LSP, concrete steps are as follows:
Step (2.1), link cost is set
It is ∞ that the pairing all wavelengths link of physical link of working LSP process and the link cost of logical links are set; The link cost that all the other each wavelength Conversion links, logical links, admittance link, logical links and wavelength link are set is as follows;
According to formula W Wcl=1 * α WclThe link cost W of each wavelength Conversion link is set Wcl
Wherein: α WclThe grade factor for the wavelength Conversion link;
According to formula The link cost W of the logical node of each node correspondence to the admittance link of the corresponding all wavelengths node of this node is set Al
According to formula
Figure BDA0000058307190000042
The link cost W of the corresponding all wavelengths node of each node to the admittance link of its logical node is set Al
Wherein: t t, r t, t a, r aRepresent the total optical transmitter number in this node place, total optical receiver number, available light transmitter number and available light receiver number respectively;
α AlFor admitting the grade factor of link;
According to formula The link cost W of each wavelength link is set Wll
Wherein: w w, w pOperating wave long number and protection number of wavelengths in the physical link under this wavelength link respectively;
α WllThe grade factor for the wavelength link;
| W| is the number of wavelengths in every physical link;
According to formula
Figure BDA0000058307190000051
Be arranged on resource conservation and share under the situation, when setting up protection LSP, introduce the link cost of this logical links when protecting LSP to need newly assigned protection bandwidth to count through this logical links for service request;
Wherein: b t, b w, b p, b NewBe respectively total bandwidth, bandwidth of operation, the protection bandwidth of this logical links and pass through this logical links and need newly assigned protection bandwidth number as if protection LSP;
α LlIt is the grade factor of logical links;
Step (2.2), pathfinding
Step (2.2.1), utilize dijkstra's algorithm to calculate one from v ' sTo v ' dShortest path, judge whether pathfinding success;
Step (2.2.2) is refused service request if failure discharges the resource that working LSP takies, and method finishes;
Step (2.2.3) is if success continues execution in step (2.3);
Step (2.3), format LSP:
For each bar link among the LSP:
Step (2.3.1) is if for admitting link, explanation need be set up a new light path, record all wavelengths link and wavelength Conversion link thereafter admitted link until next bar occurring so according to the order of sequence, creates a new light path according to the orderly link set that obtains;
Step (2.3.2) does not process if be logical links;
Through format, LSP has become a set that only is made of logical links;
Step (2.4), Resources allocation:
Step (2.4.1), for newly-built light path, the user mode of the corresponding wavelength link of its process is changed to " being used to light path "; Light path source node place available light transmitter number subtracts one; Light path destination node place available light receiver number subtracts one; On logical topology, increase corresponding logical links;
Step (2.4.2), upgrade the bandwidth usage of each logical links on the LSP path successively:
According to following policy update bandwidth usage:
If two protection LSP has passed through identical logical links, and the working LSP of their correspondences is that physical link separates, and they can the share protect bandwidth on this logical links so.
Make R lBe the request set of all protection LSP through logical links l; E rThe set of physical link for the working LSP process of request r; Protection LSP through the working LSP of l the physical link of process institute's physical link of protecting of constituting l gather
Figure BDA0000058307190000052
Figure BDA0000058307190000053
Be working LSP process physical link e, protection LSP is through the request set of logical links l; For any e ∈ A 1, all write down the bandwidth number of protecting this physical link to distribute
Figure BDA0000058307190000061
b rBandwidth on demand for professional r.
When being a new service request foundation protection LSP,, so at first listing each logical links of its working LSP process and list, and then list the physical link of each logical links process successively if should protect LSP through logical links l.Have repetition between these physical links, remove the physical link of repetition, every physical link only keeps one, constitutes set A 2
For e ∈ A arbitrarily 2If,
Figure BDA0000058307190000062
Add e to A so 1In, the while military order
Figure BDA0000058307190000063
b rBandwidth on demand for new business; If e ∈ is A 1, order
Figure BDA0000058307190000064
This logical links needs newly assigned resource conservation bandwidth
Figure BDA0000058307190000065
If there are not enough idle bandwidths on the l, l is unavailable so.
Step (3), the operating load light path of attaching most importance to provide the protection of WDM layer
When set up working LSP and protection LSP for service request after, check successively working LSP each logical links (every logical links all corresponding a light path) of process, if its load has surpassed specified threshold value
Figure BDA0000058307190000066
And WDM layer protection is not provided, so for it provides a protection light path, actual creation light path not, and just on corresponding wavelength link, keeping a record.
The source node that makes this heavy industry make the load light path is v a, destination node is v b, concrete steps are as follows:
Step (3.1), link cost is set
Heavy industry is set to be made the link cost of the pairing all wavelengths link of physical link of load light path process and is set to ∞;
The link cost that all logical links are set is set to ∞;
According to formula
Figure BDA0000058307190000067
The link cost W of its commplementary wave length link is set Wll
W wherein w, w pOperating wave long number and protection number of wavelengths in the physical link under this wavelength link respectively;
The link cost that all admit link is set:
In the share protect method, when the operating load light path of attaching most importance to provides the protection of WDM layer, if the wavelength link is jumped on first of protection road or final jump wavelength link uses with other professional sharing, protect road source node and destination node can share optical transmitter and the optical receiver that use has distributed respectively so, do not need sub-distribution again; So when calculating the protection of WDM layer, the edge joint that goes out at protection source node place, road is received the edge joint of going at link and destination node place and is received link and be set to α Al, other admits link to be set to ∞;
Step (3.2), pathfinding
Step (3.2.1): calculate one with dijkstra's algorithm and connect v ' aAnd v ' bThe path of cost minimum, judge whether the pathfinding success;
Step (3.2.2): if failure, WDM layer protection failure, method finishes;
Step (3.2.3): if success, judgement source, destination have or not enough optical transceivers;
Step (3.2.4): when the path first jumping wavelength link user mode is not " being used to protection ", v ' aIf optical transmitter of the new distribution in place is v ' aPlace's optical transmitter number is 0, WDM layer protection failure, and method finishes; Otherwise, v ' aPlace's optical transmitter number subtracts one;
Step (3.2.5), when path final jump wavelength link user mode be not " be used to protection ", v ' bIf optical receiver of the new distribution in place is v ' bPlace's optical receiver number is 0, WDM layer protection failure, and method finishes; Otherwise, v ' bPlace's optical receiver number subtracts one;
Step (3.2.6), this heavy industry is made the load light path be labeled as " the WDM layer is protected " state;
Step (3.3), Resources allocation
Each wavelength link user mode of protection road process is set to " being used to protection "; The physical link that operating path is crossed is gathered the array A that adds each wavelength link of protecting the road process to 3In.
Step (4), when leaving away, business discharges resource
When business is left away, need to discharge the resource that takies on its working LSP and the protection LSP, concrete steps are as follows:
Step (4.1), successively discharge working LSP and protection LSP the bandwidth that takies on each logical links of process;
During bandwidth resources on the release guard LSP, each logical links of check protection LSP process successively is with the array A of this logical links 1In, the bandwidth of the physical link correspondence of this vocational work LSP process deducts this professional bandwidth on demand, if A 1In the bandwidth of certain physics link correspondence be 0, from A 1Middle this physical link of deletion will protect the value of bandwidth to be re-set as A 1In the maximum of the corresponding bandwidth of each physical link;
Step (4.2), the protection light path is arranged, but present load is lower than for those
Figure BDA0000058307190000071
Working light path, delete its protection light path: upgrade successively its protection light path the wavelength link of process, with the physical link of this working light path process array A from each wavelength link 3Middle deletion; If the array A of certain bar wavelength link 3In no longer contain any physical link; This wavelength Link State is set is " not using "; If this wavelength link is the first jumping wavelength link in the protection road, light path source node place optical transmitter number adds one so; If final jump wavelength link in the protection road, light path destination node place optical receiver adds one so;
Wherein:
Figure BDA0000058307190000072
Be a threshold value of the operating load appointment of light path,
Figure BDA0000058307190000073
Step (4.3), be 0 logical links, delete this logical links for dedicated bandwidth; The operating position that each wavelength link of light path process is set is " not using "; Light path source node place optical transmitter number adds one; Destination node place optical receiver number adds one.
The multilayer guard method is shared in the clean culture based on load balancing in the optical-fiber network of the present invention: can expand the range of application that traditional unicast is shared the multilayer guard method on the one hand, consider a plurality of restraint conditions when carrying out the multilayer protection; On the other hand, take all factors into consideration and recover action and resource utilization, the working load equilibrium of bandwidth on equilibrium of wavelength working load and light path on the physical link, affected number of services when the physical link fault taking place to reduce as far as possible.
Description of drawings
Fig. 1 is that network configuration is by the overlapping schematic diagram to two-layer evolution of multilayer;
Fig. 2 is the schematic diagram of overlay model;
Fig. 3 is the schematic diagram of peer-to-peer model;
Fig. 4 is the give an example schematic diagram of (physical topology N) of physical topology;
Fig. 5 is the schematic diagram of the wavelength hierarchical diagram (wavelength hierarchical diagram G) of physical topology N correspondence;
Fig. 6 is the schematic diagram of network model;
Fig. 7 is the schematic diagram of network node;
Fig. 8 is the wavelength hierarchical diagram;
Fig. 9 is basic multilayer auxiliary view;
Figure 10 has added the multilayer auxiliary view of admitting behind the link;
Figure 11 is the schematic diagram of logical links resource conservation sharing policy.
Embodiment
Below in conjunction with accompanying drawing to sharing the multilayer guard method based on the clean culture of load balancing and do and describe in further detail in the optical-fiber network of the present invention.
One, optical-fiber network basic platform
1 IP over WDM network overview and key technology thereof
1.1WDM technology
Growing continuously and fast of mobile service, the 3G emerging service is saved up strength to start out, and Internet services such as long-distance education, video conference, video request program, ecommerce flourish makes data traffic be explosive increase.The business demand of explosive increase has proposed new requirement to capability of communication system, function and performance.
The straightforward procedure that increases the communication system bandwidth is to lay more optical fiber, costs dearly but lay optical fiber, and is subjected to the restriction of physical conditions such as natural environment, poor expandability.Another method is to adopt time division multiplexing (it has improved transmission bit rate for Time DivisionMultiplexing, TDM) technology, but that the transmission capacity of simple optical fiber is still is limited, can not effectively utilize fiber bandwidth.Under this background, wavelength division multiplexing (Wavelength Division Multiplexing, WDM) arise at the historic moment by technology.Wavelength division multiplexing is a kind of technology of transmitting a plurality of different wave length optical carriers in same optical fiber.Merge together by the optical carrier of multiplexer (Multiplexer) at transmitting terminal, be put in the optical fiber and transmit different wave length; The optical carrier of different wave length is separated by demodulation multiplexer at receiving terminal, be converted to original signal via optical receiver.Each wavelength independent transmission is independent of each other in the optical fiber, has improved the transmission capacity of optical fiber greatly, makes wavelength division multiplexing become best network capacity extension mode.Along with the reduction of optical device cost, and the breakthrough and the maturation of new technology such as the outer FEC coding of modulation techniques such as DQPSK, DP-QPSK, electronic dispersion compensation, super band, single wavelength 40Gbit/s, systems such as transmission-link capacity 1.6Tbit/s are commercialization.Japan NEC and French Alcatel on 100km distance, realized respectively total amount be 10.9Tbit/s (273 * 40Gbit/s) with total amount be 10.2Tbit/s (the up-to-date world record of 256 * 40Gbit/s) transmission capacity.
Traditional point-to-point wdm system structure adopts simple linear mode, with the dilatation of wavelength path mode, a large amount of original bandwidth can be provided, it need introduce jumbo flexible optical node device at the network node place just can be converted into the bandwidth that actual networking can flexible Application, realize that the WDM layer is interconnected, construct optical transfer network (Optical Transport Network, OTN).This class optical node device mainly comprise reconfigurable light bifurcated multiplexer (Optical Add-Drop Multiplexer, OADM) and optical cross connect (Optical Cross Connect, OXC).By introduce OADM at network intermediate node place, can insert in this locality or the wavelength of road one group selection down, flexibly traffic carrying capacity up and down.Along with the direction of WDM network towards mesh network develops, need realize more coarsegrain at network hub node place, comprise wavelength, wavestrip, so that the processing light signal on the optical fiber granularity, introduce OXC at the hub node place and necessitate.It is mainly finished in wavelength, wavestrip and functions such as other connection of optical fiber level, bifurcated, protection and recovery.
Press application type, OXC can be divided into optical fiber interconnection (Fiber Cross Connect, FXC), wavelength is selected interconnection (Wavelength Selective Cross Connect, WSXC) and wavelength exchange interconnection (Wavelength InterchangeCross Connect, WIXC).FXC exchanges on any output optical fibre all wavelengths on the input optical fibre is disposable; WSXC exchanges to a wavelength on the input optical fibre on the same wavelength on any output optical fibre; WIXC has wavelength conversion capability, a wavelength on the input optical fibre can be exchanged on any one wavelength on any output optical fibre.By implementation, OXC can be divided into OXC (OEO-OXC, electric OXC) that adopts electric cross matrix and the OXC that adopts full optical cross-matrix (OOO-OXC, full light OXC).Electricity OXC is converted to the signal of telecommunication by opto-electronic conversion with light signal, after carrying out interconnection and handling, is converted to light signal output again.Full light OXC does not need to carry out opto-electronic conversion, and all intersections are all carried out at the WDM layer.The wavelength that OADM and OXC only select local service is the road up and down, and other wavelength are expedite by network node, are referred to as bypass.OADM and OXC have reconfigurability flexibly, make network have the wavelength routing capabilities, set up end to end the wavelength path (light path, lightpath).Along with OADM and OXC continuous advancement in technology, the WDM optical-fiber network develops towards complete mesh network from linear, ring network gradually.
Though OXC has networking capability flexibly, traditional OXC only has the static configuration ability.In recent years, IP operation becomes the main business amount of network service gradually, because the uncertainty and the Unpredictability of IP operation, dynamic-configuration to the network bandwidth requires more and more urgent, network need have the ability of dynamic-configuration, and traditional mode time and effort consuming by human configuration is made mistakes easily, and can not in time dispose, its shortcoming manifests gradually.The WDM optical-fiber network will adapt to the demand of new business; huge bandwidth capacity must can be made full use of; rational distribution service; connect for business as soon as possible; and provide protection and Restoration Mechanism; simultaneously can also provide different service quality (Quality of Service, QoS) service of grade according to the demand of business.ASON (Automatic Switched Optical Network, ASON) [5,6]Under such background, produce.It is the connection of managing network automatically, and this optical-fiber network with independent control plane is called ASON.
ASON can be found topology, resource and professional variation automatically; Can be fast with set up light dynamically and be connected, realize the dynamic assignment of Internet resources; Introduced the protection Restoration Mechanism of basic mesh network, can adopting more, flexible way provides protection for business and recovers; How novel high speed can be provided and increase income business, for example, super band width service and nonstandard bandwidth business, bandwidth on-demand business, the configuration of dynamic virtual ring and end to end circuit configuration service, virtual optical network business etc.At present, the professional interconnected alliance in International Telecommunications Union (ITU-T), internet engineering task group (IETF), OIF Optical Internetworking Forum (OIF) and the light territory positive formulation work of carrying out ASON field relevant criterion of International Standards Organization such as (ODSI).
1.2 network model
Along with business developments such as video conferences, the diversification gradually of Internet business, IP operation becomes main data traffic.The WDM optical-fiber network provides huge transmission capacity as the leading net that transmits.The fusion of IP and WDM becomes the trend of future network development.The interconnect model of transmission network is also developed to IP over WDM double-layer structure by traditional IP over ATM over SDH/SONET over WDM multilayer overlay structure gradually, as shown in Figure 1.In the overlapping network configuration of multilayer; the IP layer is used to provide business, and the ATM layer provides service quality, and (Quality of Service QoS) guarantees for business connects; the SDH/SONET layer utilizes its guard ring mechanism to provide protection and Restoration Mechanism for network, and the WDM layer provides huge transmission bandwidth.But in the multilayer overlapping network structure, the cell mechanism of ATM has been brought bigger overhead, has reduced bandwidth for transmission efficient.Along with the WDM optical-fiber network is developed to mesh network by looped network, though the SDH/SONET protection mechanism is effective fast, its protection cost is higher, and the protection mechanism of SDH/SONET is no longer suitable.In order to reduce the network operation cost, improve the bandwidth resources utilance, ATM layer and SDH/SONET layer fade away, and transmission network finally develops into the two-tier network structure of IP over WDM, and promptly IP operation is directly transmitted on the WDM optical-fiber network.
In IP over WDM network, three kinds of controlling models are arranged, be respectively overlay model, peer-to-peer model and extended model.
(1) overlay model
Overlay model claims client/server model again, is proposed by ITU-T.As shown in Figure 2, IP layer and WDM layer are separate in this model, and control plane is separately arranged, and move different Routing Protocols, routing iinformation such as switching network topology not between Routing Protocol.IP layer and WDM layer by user-network interface (User to Network Interface UNI) links together, and the WDM layer is made of subnet, between each subnet by Network-Network interface (Network to Network Interface, NNI) interconnected.This model can realize that effective subnet divides, and makes things convenient for the control of each subnet and upgrading etc.The IP layer can only be seen the light path of setting up between edge device in the WDM layer, and in this model, the internal structure of WDM layer network is transparent to the IP layer.The IP layer proposes professional transmission request by UNI to the WDM layer, is responsible for the control of light path by the WDM layer, and the intelligence of network is reflected in the WDM layer fully.This model has realized that to greatest extent the control of WDM layer and IP layer separates.The shortcoming of overlay model is the light path set up between WDM layer edge device, be reflected as the logical links of IP layer, and the LSA of these links can cause very big network overhead.
(2) peer-to-peer model
Peer-to-peer model is proposed by IETF.As shown in Figure 3, in this model, IP layer and WDM layer are reciprocity, return unified control plane management.IETF with this control plane called after GMPLS (GeneralizedMulti-protocol Label Switching, GMPLS).In peer-to-peer model, ip router and OXC all are called as LSR (Label Switching Router, LSR), identical route and the signaling protocol of they operations, routing iinformation such as exchanging chain line state to each other, the IP layer can be seen the internal structure of WDM layer, and the WDM layer is no longer transparent to the IP layer.In peer-to-peer model, because IP layer and WDM layer are reciprocity, need to exchange a large amount of Link States and signaling control information between each LSR, cause very big network overhead.The internal structure of WDM network is unfavorable for the stable of network no longer to user transparent, also is unfavorable for the division of subnet in the WDM network; IP layer and WDM layer recovery mechanism need united and coordinating, and control is complicated.
(3) extended model
In extended model, IP layer and WDM layer are separate, move independently Routing Protocol, but can exchange some reachability information by UNI between them.For example be the OXC distributing IP address in the WDM network, offer the IP layer by WDM layer Routing Protocol then and use, realize automatic pathfinding etc.The key issue of this model is how at UNI place exchange reachability information.
The present invention is primarily aimed at peer-to-peer model.
1.3 IP over WDM network key technology
In IP over WDM network, the IP layer provides layer as business, and the WDM layer is as transport layer, and its key issue is how to realize the seamless link of IP layer and WDM layer, and the GMPLS that IETF proposes provides a good solution thinking.In addition; the low speed service bandwidth granularity that IP admits is generally less than single wavelength capacities; so in IP over WDM,, carry these low speed business with the WDM layer then, and be problem demanding prompt solution for business provides corresponding protection/Restoration Mechanism how effectively with service convergence.In order to address the above problem, mainly proposed at present GMPLS, Traffic grooming, with closely-related route of Traffic grooming and key technologies such as Wavelength Assignment and network survivability.
1.3.1GMPLS technology
GMPLS is the product of Multi-Protocol Label Switch (MPLS) to the development of WDM layer, and it has realized the seamless fusion of IP layer and WDM optical-fiber network effectively.GMPLS has inherited nearly all excellent characteristic such as traffic engineering among the MPLS, simultaneously mpls protocol is expanded.GMPLS is absorbed in control plane, supports the exchange of packet switching, time-division switching, wavelength exchange and space switching multiple resource granularities such as (optical fiber exchanges).GMPLS also replenishes and revises original signaling and Routing Protocol among the MPLS, and designed brand-new LMP Link Manager Protocol (Link Management protocol, LMP).
(1) general multiple protocols label
GMPLS has defined five kinds of interface types, is respectively: (a) packet switch capable (Packet Switch Capable, PSC): carry out packet switching,, transmit grouping according to the information of packet header by the identification boundaries of packets.(b) (Layer2 Switch Capable, L2SC): carry out cell switching, cell is transmitted according to the information of cell head in the border of passing through by identification to second layer Fabric Interface.(c) time division multiplexing capable (Time Division Multiplexing Capable, TDMC): carry out business according to the TDM time slot and transmit.(d) lambda switch capable (Lambda Switch Capable, LSC): transmit professional by optical wavelength or optical band according to bearer service.(e) fiber switch capable (Fiber Switch Capable, FSC): transmit according to the physical location of optical fiber in physical space.GMPLS has done expansion to the label among the MPLS, makes it also can carry out mark to TDM time slot, wavelength, wavestrip, optical fiber etc.GMPLS unifies mark to IP exchanges data, TDM circuit switching and the exchange of WDM light.The packet switching label continues to adopt the label among the MPLS, and circuit switching and light switch label are defined again, comprises request label, universal tag, suggestion label, sets label etc.Wherein, the request label is used for label switched path (LabelSwitching Path, foundation LSP); After universal tag was used to set up LSP, indication was along the service conditions of LSP transmission; When the suggestion label was used to dispose LSP, the time delay of avoiding reverse configuration to cause was set up light fast and is connected; Set label and be used to limit the scope that downstream node is selected label.
(2) common tags switching path
Because GMPLS supports the exchange of different resource granularity, for fear of the waste of bandwidth resources, the LSP of inferior grade (PSC, L2SC, TDMC, LSC, FSC grade reduce successively) need be nested among the high-grade LSP when setting up LSP, is called the LSP classification again.The LSP classification technique realizes by the GMPLS labeled slots, allow the identical inferior grade LSP of inlet to converge after, transparent pass high-grade LSP, then distal portion from.Use the device interface types of every LSP starting and ending of LSP sizing specification identical.Same-interface is meant that the interface of certain grade can use the multiplexing a plurality of LSP of certain technology.Among the MPLS, set up bidirectional LSP and must set up two unidirectional LSP that direction is opposite, its setup delay is long, signaling consumption is big.GMPLS improves it, can set up bidirectional LSP.Require the LSP of both direction to have identical traffic engineering parameter when setting up bidirectional LSP, comprise resource requirement, protection/Restoration Mechanism etc.When GMPLS set up bidirectional LSP, the path of uplink and downlink adopted same signaling message, and two LSP set up simultaneously, had effectively reduced the time delay that LSP sets up, and had reduced signaling consumption.
(3) link management
In optical-fiber network, between two adjacent OXC in the quantity of parallel optical fiber link and every the optical fiber multiplexing number of wavelengths be huge, provide broadcast mechanism if be respectively it, the information transmitted amount is very big in the time of can causing link maintenance and broadcasting, is unpractical for every optical fiber, each wavelength provide an IP address simultaneously.For this reason, GMPLS has adopted link bundling and has not had the mode of numbering link and handle this problem.If parallel link belongs to identical link group, these links can be bound so, constitute a bar bundle link.Identical link group is meant shared risk link group (Shared Risk LinkGroup, SRLG) numbering, identical link type of coding, the identical protection/recovery type that belongs to identical.Greatly reduce the size of LSD like this, reduced the signaling consumption that broadcasting brings.Do not have the numbering link and be meant, adopt the mode of (router id, link number) two tuples to identify the address of link, replace using the mode of IP address designation with this.GMPLS has formulated LMP Link Manager Protocol, is responsible for functions such as control channel management between two adjacent nodes, link summary, link verification, fault management, and wherein link verification and fault management are optional.
(4) route and signaling protocol
When GMPLS adopts the general multiple protocols label to set up LSP; need to consider the factor of bandwidth and protection/recovery capability; this requires node need write down link-state information; GMPLS expands to RSVP-TE and CR-LDP respectively with defined two signaling protocol RSVP of MPLS traffic engineering and LDP for this reason, parameters such as the bandwidth by signaling exchange LSP, type, protection/Restoration Mechanism.Route Selection both can adopt the demonstration method for routing, also can adopt the method for multi-hop.In addition, the GMPLS Routing Protocol OSPF and the IS-IS that also will be used for the control of traffic engineering in the territory expands to OSPF-TE and IS-IS-TE respectively.Link management such as link bundling, LMP Link Manager Protocol mechanism has well reduced the expense that the maintenance link state information is brought in route and the signaling protocol among the GMPLS.
1.3.2 route and Wavelength Assignment
Given one group of connection, for each connect to create a light path and distribute the process of a wavelength be called route and Wavelength Assignment (Route and Wavelength Assignment, RWA).Connection request can be divided into two kinds: static connection request and dynamic connection request.For static traffic, the set of service connection request is given in advance, its target is to set up light path for these connection requests, and in global scope, minimize used Internet resources, for example number of wavelengths, fiber count etc., be the number of wavelengths of given fixed number, for connection request as much as possible is set up light path.Static routing and assignment of wavelength are called as static light path and set up (Static Lightpath Establishment, SLE) problem.For dynamic service, when connection request arrives,, after business is left away, cancel light path for it sets up light path.Its target is to set up light path for the business that dynamically arrives, and reduces blocking rate as much as possible, or sets up the quantity of light path in the maximization synchronization network.Dynamic routing and Wavelength Assignment are called as dynamic light path and set up (Dynamic Lightpath Establishment, DLE) problem.
At present route and assignment of wavelength are decomposed into Route Selection and two subproblems of Wavelength Assignment.Whether find a best route (for example shortest path) earlier, checking then has available wavelength for distributing.If, calculate the route of suboptimum so again because the successional constraint of wavelength does not have wavelength can distribute to this route, continue to repeat said process, up to the route that finds to satisfy the wavelength continuity constraint, otherwise block connection request.Before finding this route, method iteration possibly at this problem, has proposed the notion of wavelength hierarchical diagram many times, and route and Wavelength Assignment are converted to the problem of graph theory, solves the problem of Route Selection and Wavelength Assignment simultaneously.
The define grid topology be N (R, A, L, W), wherein R is the set of lambda router node, A is the set of access node, L is a nonoriented edge, W is the wavelength available number in every physical link.Each access node all is bundled on the lambda router and provides electro-optical conversion to support the electricity exchange.Each bar limit is made up of two reverse one-way optical fibers, can carry on each bar optical fiber | W| wavelength channel.Definition wavelength hierarchical diagram model is that (V, E), it is a directed graph to G.The process that obtains the wavelength hierarchical diagram according to physical topology N is as follows: each node i ∈ R duplicates in G among the N | and W| time, these nodes are designated respectively If link l ∈ L connects router i and router j, i wherein, j ∈ R, so for any w ∈ W,
Figure BDA0000058307190000132
With
Figure BDA0000058307190000133
By a directed edge
Figure BDA0000058307190000134
Link together, wherein,
Figure BDA0000058307190000135
Suppose that access node a ∈ A is connected on the lambda router node r ∈ R.In G, for each access node a creates two nodes, a representative professional generating portion (source), another one is represented professional teste (purpose).These two nodes are designated respectively In G, add
Figure BDA0000058307190000137
To node
Figure BDA0000058307190000138
And
Figure BDA0000058307190000139
Arrive
Figure BDA00000583071900001310
Directed edge.Therefore the number of node among the G | V|=|R| * | W|+2 * | A|; The bar number of directed edge | E|=2 * | L| * | W|.For example, the wavelength hierarchical diagram of physical topology correspondence shown in Figure 4 as shown in Figure 5.Wherein, the link between every lambda router is made up of two reverse one-way optical fibers, and every optical fiber medium wave long number is 2.By the wavelength hierarchical diagram, route just becomes relative simple with assignment of wavelength.As long as found the route that connects source and destination on certain wavelength plane, this route satisfies the wavelength continuity constraint surely with regard to one.
1.3.3 Traffic grooming
The WDM optical-fiber network provides huge transmission capacity, and the system of single wavelength capacities 40Gbit/s is commercial.Each professional bandwidth on demand is compared relatively low with single wavelength capacities, for example OC-12, OC-48, OC-192 but in actual applications.Think that each low speed service request distributes a wavelength can cause a large amount of bandwidth waste.All create a light path for each request, also can increase the electricity exchange cost (for example needing to dispose more optical transceiver) of network, increase the cost of network.The most important thing is, the wavelength available number in the real network than the professional number of the low speed that arrives lack many.So Traffic grooming is the basic function that the WDM optical-fiber network must have, to increase network throughput, improve the wavelength resource utilance, reduce network cost.Traffic grooming is exactly the technology of transmitting on low speed service convergence to the high speed light path in the WDM optical-fiber network, and its target is to minimize network cost or maximization network throughput.
In the WDM optical-fiber network, Traffic grooming need solve the problem of three aspects: (1) sets up light path, and (2) distribute wavelength to satisfy the wavelength continuity for light path, and (3) are route low speed business on logical topology.Whether given in advance according to business, Traffic grooming can be divided into two classes: the static traffic amount is dredged with the dynamic service amount and is dredged.Dredge for the static traffic amount, these three problems can adopt the shaping linear programming, and (Integer Linear Programming, ILP) method of You Huaing solves together.But for catenet, the complexity of problem solving rises, and generally adopts heuritic approach to solve three problems respectively.In the dynamic service amount is dredged, when service connection request arrives, at first on logical topology, seek route for it, if the bandwidth on the unreachable or existing light path of purpose uses up, create new light path carrying new business so and connect.
1.3.4 network survivability
After network survivability was meant and breaks down, network can provide the ability of uninterrupted service.Development along with WDM technology, can multiplexing hundreds and thousands of wavelength in the single fiber, the capacity of each wavelength also reaches tens even hundreds of Gbit/s, in case network failure (as link failure etc.) takes place, the service failure that can cause the Tbit/s order of magnitude causes to have a strong impact on.Therefore the survivability of WDM optical-fiber network becomes the major issue of people's growing interest.
WDM layer survivability technology can be divided into two classes: protection (Protection) and recovery (Restoration).Protection is meant when business connects reserves resource conservation for professional in advance, in case break down, the professional commentaries on classics carried by resource conservation.Protection has short protection switching time, but owing to need reserve resource conservation in advance, and when not breaking down, resource conservation is idle, so resource utilization is low.Recovery is not meant in advance to professional reserves resource conservation, and when fault took place, according at that time network resource usage situation, the mode of employing heavy-route was sought idling-resource dynamically and carried affected business again.Recovery has higher resource utilization, but owing to be to seek the available resources bearer service more dynamically after fault takes place, so protection is long switching time, and when offered load heavier, when not having enough available resources, can cause the fault recovery failure.
Whether share according to resource conservation, protection mechanism is divided into two classes again: privacy protection (Dedicated Protection) and share protect (Shared Protection).In privacy protection, for the resource conservation that certain bar work road is reserved is monopolized, other protection road can not re-use.In share protect, if two work Lu Buhui break down (is that physical link separates as two work roads) simultaneously, they can the share protect resource so.From the angle of resource utilization, share protect is than privacy protection resource utilization height, and the traffic intensity of network is high more, and the advantage of share protect is obvious more.The protection switching time aspect, privacy protection is shorter than share protect.This is because in the privacy protection, resource conservation is monopolized, can be pre-configured, in case break down, just influenced business is switched in the resource conservation; And in the share protect, can not prejudge which service failure, and can not dispose in advance, have only after fault takes place, again by the devices such as OXC on certain signaling mechanism configuration protection road, so its protection is longer switching time.
According to the granularity of protection, protection mechanism can be divided into path protection, link protection and sectionalised protection again.Path protection be meant for work the road provide one to protect the road end to end.Link protection is meant that in case break down, professional switching is responsible at the faulty link two ends, need not the sourcesink node and participates in into each the bar link on the work road calculates a protection road.In the sectionalised protection, the road segmentation of will working earlier is that each section is calculated a protection road again, and first section tail of section is responsible for fault recovery.Comparatively speaking, path protection has higher resource utilization, and the fault recovery of link protection need not the sourcesink node and participates in, and has that to protect switching time, sectionalised protection faster be to attempt at the two seeking balance.
A kind of as in the survivability technology, resist technology has protects switching time faster, can satisfy the requirement of a large amount of real time business, so the present invention relates generally to resist technology.
2 network models
Network model can be described as oriented connected graph G p(V, L, W), as shown in Figure 6.V wherein, L, W represent the wavelength set of node set, physical link set and every physical link of network respectively, | V|, | L|, | W| represents node number, physical link number and every physical link medium wave long number of network respectively.
2.1 network node
Network node is made up of OXC that combines and ip router.Wherein, ip router is responsible for the admission service request.OXC dredges matrix by wavelength switching matrix, low speed business and one group of tunable optical transceiver is formed (as shown in Figure 7).Wavelength in the input optical fibre can directly exchange to the corresponding wavelength of output optical fibre by the wavelength switching matrix and get on behind demultiplexing, perhaps exchanges to optical receiving set and is transformed into the signal of telecommunication and enters low speed and dredge matrix.Belong to local business and then transfer to the ip router processing by the low-speed service data flow port, non-local service is converted to light signal by optical transmitter, reenters the wavelength switching matrix, and the respective wavelength that exchanges to corresponding optical fiber gets on.That is to say, do not contain local service in certain wavelength channel in the input optical fibre and then can directly pass through the wavelength switching matrix, promptly bypass to output optical fibre; Have on the business/under wavelength channel in electric territory, handle down by optical transceiver.Each network node has all been safeguarded overall link-state information, comprises the operating position of wavelength on each physical link, operating position of bandwidth etc. on each light path.
In addition, the constraints of the present invention's consideration mainly contains: the wavelength continuity constraint under the constraint of optical transceiver number, the sparse part wavelength Conversion, sparse part beam split constraint etc.
(1) optical transceiver number
Each network node has all been disposed the optical transmitter and the optical receiver of some, and the present invention supposes that the optical transmitter of same node is identical with the optical receiver number.
(2) wavelength conversion capability
Whether have wavelength conversion capability according to node, node can be divided three classes: no wavelength transfer capability node, complete wavelength conversion capability node, part wavelength conversion capability node.
No wavelength transfer capability is meant, the wavelength channel in the input optical fibre can only exchange to by the wavelength switching matrix that the wavelength channel of identical wavelength gets in the output optical fibre.
Wavelength conversion capability is meant fully, and the wavelength channel in the input optical fibre gets on by the wavelength channel that the wavelength switching matrix can exchange to any wavelength in the output optical fibre.
The part wavelength conversion capability, the wavelength channel in the input optical fibre gets on by the wavelength channel that the wavelength switching matrix can exchange to wavelength in the certain limit adjacent with this wavelength in the output optical fibre.For example, certain node has the part wavelength conversion capability, and its wavelength Conversion scope is 2, so wavelength X 4Can transform to wavelength X 2, λ 3, λ 5And λ 6Get on.Wavelength Conversion scope with node of part wavelength conversion capability may be also inequality.
Among the present invention, for convenience, the wavelength conversion capability of unified conceptual description node with the wavelength Conversion scope is 0 with the node label that does not have wavelength conversion capability for the wavelength Conversion scope, and the node wave length conversion range with complete wavelength conversion capability is | W|.
(3) beam split ability
In the WDM optical-fiber network, if will make node have multicast capability, need be at the node deployment optical splitter.According to the power of beam split ability, network node can be divided three classes: no beam split ability MI (Multicast Incapable), complete beam split ability, part beam split ability.
No beam split ability is meant that node can only be sent an input signal into an output port, if it is not the multicast destination node, and so can only be as the non-bifurcation node in the centre of multicast tree; If it is the multicast destination node, it can only be as the leaf node of multicast tree so.
The beam split ability is meant that node can be sent into input signal any a plurality of output port fully.
Part beam split ability is meant that node can be sent into input signal the output port of some.
The two kinds of nodes in back are referred to as MC (Multicast Capable) node, both can be used as the destination node of multicast tree, also can be used as the intermediate node of light tree.When as intermediate section knuckle point, for the node of complete beam split ability, its out-degree without limits; For the node of part beam split ability, if it is not a destination node, but its out-degree can not surpass its maximum beam split number so; If simultaneously as destination node, need tell one road light signal on this underground road, but can not surpassing its maximum beam split number, its out-degree subtracts one.
The co-wavelength transfer capability is the same, for convenience, counts the beam split ability of description node but the present invention is unified with the maximum beam split, but the maximum beam split number that does not have the node of beam split ability is made as 1, and the node wave length conversion range with complete beam split is the degree of node.
Existing wavelength conversion capability, have the node of beam split ability that two kinds of node structures are arranged again: (1) carries out wavelength Conversion earlier, after carry out beam split, (2) carry out beam split earlier, after carry out wavelength Conversion.First kind of node structure is simpler, and its two wavelength telling must have identical wavelength, have certain limitation.Second kind of node structure is more flexible, is the direction of development in the future, and the wavelength that its each beam split is come out can carry out wavelength Conversion, and be therefore many to the quantitative requirement of wavelength shifter.In addition, from the angle of algorithm, design is special circumstances (transforming to after the beam split on the identical wavelength) of second kind of node structure based on the algorithm of first kind of node structure in fact, so the present invention adopts second kind of node structure.
2.2 network link
Connect by the opposite one-way optical fiber of a pair of transmission direction between two network nodes.Article two, optical fiber has identical wavelength set, and number of wavelengths is | W|.Article two, optical fiber is that physical link separates, and in the use of wavelength, and separate in the transmission of data, be independent of each other.
2.3 basic structure
For given physical topology G p(V, L, W), according to following steps structure multilayer auxiliary view.
(1) with each node v i∈ V, i=1,2 ..., | V|, duplicate | W| time, be labeled as respectively
Figure BDA0000058307190000171
Be called the wavelength node.Have identical ID by the duplicated all wavelengths node of same node, be its physical node ID.If from node v iTo node v jAn oriented physical link l is arranged Ij, so for all w=1,2 ... | W|, from the wavelength node
Figure BDA0000058307190000172
To the wavelength node
Figure BDA0000058307190000173
Increase a link
Figure BDA0000058307190000174
Be called the wavelength link, every wavelength link is corresponding to wavelength in its place physical link.So just, constructed the wavelength hierarchical diagram, wherein the topology of the wavelength node of each wavelength correspondence and wavelength link formation is called the wavelength plane.For example, (suppose that every physical link medium wave long number is 2) as shown in Figure 8 according to the wavelength hierarchical diagram of physical topology structure among Fig. 6.
(2) with each node v i∈ V, i=1,2 ..., | V| duplicates one time, is designated v ' i, be called logical node.Logical node is used for receiving and is connected with winding-up, can be understood as the ip router node.If at the WDM layer, there is one from node v iTo node v jLight path, increase by one so from node v ' iTo node v ' jVirtual link, be called logical links (logical links is a light path hereinafter), the bandwidth of logical links is the capacity (supposing that all light paths all are single wavelength channels) of a wavelength.The topology that is made of logical node and logical links is called logical topology.Logical topology and wavelength hierarchical diagram combined just constituted basic multilayer auxiliary view.Still the topology with Fig. 6 is an example, supposes with wavelength X 2Created one from node v 2To node v 4Light path, light path is through intermediate node v 3On the wavelength hierarchical diagram
Figure BDA0000058307190000175
Arrive
Figure BDA0000058307190000176
And
Figure BDA0000058307190000177
Arrive
Figure BDA0000058307190000178
The wavelength link be labeled as and use, on logical topology, increase v ' 2To v ' 4Logical links, the multilayer auxiliary view that obtains is as shown in Figure 9.
2.4 optical transceiver number constraint
When business is carried out Traffic grooming, utilize existing logical links to can not find the route that can reach destination node sometimes, at this moment need newly-built light path.During each newly-built light path, the light path source node need consume an optical transmitter, and destination node consumes an optical receiver.Logical links needs record available light transmitter number and available light receiver number as the admittance node of business.As long as source, destination node have one not meet the demands, light path just can not be set up.For digitlization constraint with the optical transceiver number, be converted into the content of graph theory, adopt the conceptual description optical transceiver number constraint of admitting link.For arbitrary node v i∈ V, i=1,2 ..., | V| increases v ' iArrive
Figure BDA0000058307190000181
And
Figure BDA0000058307190000182
To v ' iThe admittance link.
With Fig. 9 is example, supposes that each node place optical receiver number and optical transmitter number average are 2, because v 2To v 4So newly-built light path is v 2Place's available light transmitter number subtracts one, v 4Place's available light receiver number subtracts one.The multilayer auxiliary view that obtains so as shown in figure 10, the other numeral of logical node wherein, the expression available light transmitter number of front, the expression available light receiver number of back.
2.5 wavelength conversion capability constraint
The present invention considers sparse part wavelength conversion capability constraint, and this constraint can solve by improving the multilayer auxiliary view.
For arbitrary node v i∈ V, its wavelength Conversion scope is r, increases so Arrive
Figure BDA0000058307190000184
Virtual link, be called the wavelength Conversion link.
After introducing wavelength conversion capability, the structure of light path and light tree changes to some extent.
(1) light path
Light path in general sense requires each wavelength link of light path process to have identical wavelength in order to satisfy the wavelength continuity constraint, and promptly light path is made up of one group of wavelength link with identical wavelength.When a newly-built light path, only need on certain wavelength plane, find the route of linked source, destination node to get final product.After considering wavelength conversion capability, each wavelength link of light path process can use different wavelength, when a newly-built light path, is route on certain wavelength plane no longer just, but on the multilayer auxiliary view route.The ordered set that this moment, light path was made up of wavelength link and wavelength Conversion link.
(2) light tree
After introducing wavelength conversion, each node on the light tree all is the wavelength node, and father node may be wavelength link or wavelength Conversion link to the link of child nodes.
3 based on the shared multilayer guard method of the clean culture of load balancing
3.1 resource conservation sharing policy
Resource conservation is shared and is meant if two operating paths can not break down simultaneously, and their protection road can be shared and be used identical resource conservation so.According to the granularity of shared resource, the resource conservation sharing policy can be divided into logical links resource conservation sharing policy and wavelength link protection resource-sharing strategy.
3.1.1 logical links resource conservation sharing policy
If two protection LSP has passed through identical logical links, and the working LSP of their correspondences is that physical link separates, and they can the share protect bandwidth on this logical links so.
Make R lBe the request set of all protection LSP through logical links l; E rThe set of physical link for the working LSP process of request r; Protection LSP through the working LSP of l the physical link of process institute's physical link of protecting of constituting l gather
Figure BDA0000058307190000191
Be working LSP process physical link e, protection LSP is through the request set of logical links l; For any e ∈ A 1, all write down the bandwidth number of protecting this physical link to distribute
Figure BDA0000058307190000192
Bandwidth on demand for professional r.
When being a new service request foundation protection LSP,, so at first listing each logical links of its working LSP process and list, and then list the physical link of each logical links process successively if should protect LSP through logical links l.Have repetition between these physical links, remove the physical link of repetition, every physical link only keeps one, constitutes set A 2
For e ∈ A arbitrarily 2If,
Figure BDA0000058307190000193
Add e to A so 1In, the while military order
Figure BDA0000058307190000194
b rBandwidth on demand for new business; If e ∈ is A 1, order This logical links needs newly assigned resource conservation bandwidth
Figure BDA0000058307190000196
If there are not enough idle bandwidths on the l, l is unavailable so.
For instance, request r1, r2, r3 arrives successively, and its bandwidth application is 1 unit (for example OC-1), and the protection LSP that calculates for them all passes through l.As shown in figure 11, for clarity, the physical link that working LSP shown in the figure has been removed behind the repetition link is represented.It is 0 that logic of propositions link l goes up original resource conservation, and the operating position of the resource conservation of logical links l changes as follows so.
After supposing to remove the repetition physical link, the set of the physical link of r1 working LSP process is e 1, e 2, e 3, e 4, e 5The physical link set of r1 working LSP process is e 2, e 3, e 6r 3The physical link set of working LSP process is e 2, e 1, e 7
Step is as follows:
Step (1): request r1 arrives.
Step (1.1): with e 1, e 2, e 3, e 4, e 5Add the physical link set A of protecting of logical links l to 1In, with A 1In each
Figure BDA0000058307190000197
All be designated as 1.
Step (1.2): with the b of l pBe designated as 1.
Step (2): request r 2Arrive.
Step (2.1): with e 6Add the A of logical links l to 1In, and the bandwidth that it is corresponding is updated to 1.
Step (2.2): with A 1Middle e 2, e 3Corresponding bandwidth all increases by 1.Current A 1The physical link of middle record is e 1, e 2, e 3, e 4, e 5, e 6, it is corresponding
Figure BDA0000058307190000198
Be followed successively by 1,2,2,1,1,1.
Step (2.3): with the b of l pBe updated to current maximum 2.
Step (3): request r 3Arrive.
Step (3.1): with e 7Add the A of logical links l to 1In, and the bandwidth that it is corresponding is updated to 1.
Step (3.2): with A 1Middle e 1, e 2Corresponding bandwidth all increases by 1.Current A 1The physical link of middle record is e 1, e 2, e 3, e 4, e 5, e 6, e 7, it is corresponding
Figure BDA0000058307190000201
Be followed successively by 2,3,2,1,1,1,1.
Step 3.3: with b pBe updated to current maximum 3.
3.1.2 wavelength link protection resource-sharing strategy
Separate if two same wavelength link of the protection road of working light path process, and these two working light paths is physical links, their protection path can be shared and be used this wavelength link so.
Every wavelength link l that is used to share protect has the set A of a record protection road through the physical link of the working light path process of this wavelength link 3When being working light path when seeking the protection light path, if the physical link of this working light path process is not all at the A of this wavelength link l 3In, its protection light path can be shared this wavelength link so.
3.2 link cost
When setting up working LSP, owing to do not relate to the sharing problem of resource conservation, so its each logical links, wavelength link, the setting of the link cost cost setting during with privacy protection of admitting link, wavelength Conversion link are identical.But when setting up protection LSP, the setting of the link cost of logical links and distinguishing to some extent when setting up working LSP.
The present invention adopts the working load equilibrium of bandwidth on the balanced and light path of wavelength working load on the physical link, affected number of services when as far as possible reducing generation physical link fault.
In order better to realize that load balancing, the present invention are that wavelength Conversion link, logical links, admittance link, wavelength link are provided with different grades, are called α Wcl, α Ll, α Al, α WllThe wavelength Conversion link priority is the highest, is thereafter logical links, admittance link, wavelength link successively.Having a long way to go of the grade factor, for example be respectively 1,100,10000,1000000, its objective is that the weights for each node that can obtain according to the Dijkstra shortest path algorithm analyze wavelength Conversion number of links, the logic chain way of process, admit number of links and wavelength number of links.The less path of number of links was selected to admit in the preferential minimum path of use wavelength link of selecting secondly when this just impelled routing, even with the less path of optical transceiver number, to reduce the quantity of newly-built light path number, the last operating position of Compare Logic link again.
Admit the grade factor of link and wavelength link can reach different optimization aim by changing.In the last example, main target is for using minimum number of wavelengths.If will admit the bigger grade factor of link setting, its optimization aim just becomes the minimum optical transceiver number of use so, and this is applicable to that mainly the optical transceiver number is the network of main constraint.
3.2.1 wavelength Conversion link
Because the wavelength Conversion link is except the time-delay that the introducing wavelength Conversion is brought, the load to network does not exert an influence, so the link cost of wavelength Conversion link is suc as formula shown in 3.1.
W wcl=1×α wcl (3.1)
Owing on the multilayer auxiliary view, during the method processing node wavelength conversion capability of utilization 2.2.3 joint introduction, have the problem of continuous wavelength conversion.For example, if the excursion of certain node is 2, wavelength X so 5Can transform to wavelength X 7But, wavelength X 7Can transform to λ 9, by twice wavelength Conversion, wavelength X 5Transformed to wavelength X 9But the fact is the wavelength variation range of this node is 2, wavelength X 5Can not transform to λ 9Among the present invention, when operation dijkstra's algorithm pathfinding on the multilayer auxiliary view, when certain wavelength node of expansion, if its previous dive node is the wavelength node, and identical node ID is arranged with it, be that its previous dive link is the wavelength Conversion link, so in expansion during this node, the link cost of the wavelength Conversion link in its neighbours limit is by ∞ calculating (the physical link cost of this wavelength Conversion link still be 0 constant).Cause wavelength Conversion to exceed the problem of wavelength Conversion scope with regard to having avoided by continuous double bounce wavelength Conversion link like this.In the path that calculates like this,, a wavelength Conversion link can only be arranged at most before and after it at each node place.The dijkstra's algorithm of hereinafter using is all as above handled.
3.2.2 logical links
Each bar logical links all corresponding a light path of WDM layer, the capacity of logical links bandwidth is exactly the bandwidth capacity of light path.Article one, the loading condition of logical links can have multiple balancing method, for example the quantity of the LSP that carries on this logical links, dedicated bandwidth accounts for the ratio of total bandwidth etc.Consider the bandwidth difference that different business is asked, simply be difficult to the loading condition of reflected optical path with professional number, dedicated bandwidth accounts for the ratio of total bandwidth as the standard of weighing a logical links loading condition so select.To account for the ratio of total bandwidth high more for dedicated bandwidth, and the load of this logical links is heavy more, will avoid this link as much as possible when routing, so will be the bigger link cost of this link setting.In like manner, the lower link of ratio that accounts for total bandwidth for dedicated bandwidth is provided with less link cost.
Make b t, b w, b p, b rRepresent total bandwidth, bandwidth of operation, protection bandwidth and user's bandwidth on demand of this logical links respectively, the link cost of this logical links is suc as formula shown in 3.2 so.
W ll = &infin; b t - b w - b p < b r ( 1 + b w + b p b t ) &times; &alpha; ll b t - b w - b p &GreaterEqual; b r - - - ( 3.2 )
3.2.3 admittance link
The link cost of admitting link is the operating position that is used for reflecting this node place optical transmitter and optical receiver.For certain node,, consume the optical transmitter in this node place when this node during as the source node of new light path; When this node during, consume an optical receiver, so separate during the operating position of optical transmitter and optical receiver for certain node as destination node.
Make t t, r t, t a, r aRepresent the total optical transmitter number in this node place, total optical receiver number, available light transmitter number and available light receiver number respectively, the link cost from the logical node of this node correspondence to the admittance link of the corresponding all wavelengths node of this node is suc as formula shown in 3.3 so.
W al = &infin; t a = t t ( 1 + t t - t a t t ) &times; &alpha; al t a < t t - - - ( 3.3 )
The corresponding all wavelengths node of this node to the link cost of the admittance link of its logical node suc as formula shown in 3.4.
W al = &infin; r a = r t ( 1 + r t - r a r t ) r a < r t - - - ( 3.4 )
3.2.4 wavelength link
The link cost of wavelength link is the loading condition that is used for reflecting physical link under this wavelength link.The loading condition of physical link can be weighed with the ratio that accounts for total number of wavelengths with number of wavelengths.The wavelength link has four kinds of user modes: do not use, be used to make up light path, be used to make up the light tree, be used to protection.
Make w w, w pOperating wave long number and protection number of wavelengths in the physical link under this wavelength link respectively, if this wavelength link is used, its link cost is ∞ so, otherwise its link cost is suc as formula shown in 3.5.
W wll = &infin; w w + w p = | W | ( 1 + w w + w p | W | ) &times; &alpha; wll w w + w p < | W | - - - ( 3.5 )
The logical links under 3.2.5 resource conservation is shared
Share under the situation in resource conservation, when setting up protection LSP for service request, the factor that influences a logical links link cost protects LSP to need newly assigned protection bandwidth number through this logical links except the load of this logical links in addition.
Make b t, b w, b p, b NewRepresent respectively this logical links total bandwidth, bandwidth of operation, protection bandwidth and if protection LSP through the newly assigned protection bandwidth of these logical links needs number, the link cost of this logical links is suc as formula shown in 3.6 so.
W ll = &infin; b t - b w - b p < b new ( b new b t ) ( 1 + b w + b p b t ) &times; &alpha; ll b t - b w - b p &GreaterEqual; b new - - - ( 3.6 )
Wherein, α LlIt is the grade factor of logical links.From formula 3.6 as can be seen, when not having enough idle bandwidths, this logical links is unavailable.Otherwise the protection bandwidth that need newly take is few more, and the link cost of link is more little, and when not needing newly to take the protection bandwidth, link cost is 0.
The admittance link under 3.2.6 resource conservation is shared
In the share protect method; when the operating load light path of attaching most importance to provides the protection of WDM layer; if the wavelength link is jumped on first of protection road or final jump wavelength link uses with other professional sharing; protect road source node and destination node can share optical transmitter and the optical receiver that use has distributed respectively so, do not need sub-distribution again.So when calculating the protection of WDM layer, the edge joint that goes out at protection source node place, road is received the edge joint of going at link and destination node place and is received link and be set to α Al, other admits link to be set to ∞.
The wavelength link under 3.2.7 resource conservation is shared
When calculating the protection of WDM layer, if this wavelength link does not use or user mode for " being used to protection " and can share this wavelength the time, the link cost of wavelength link is provided with by formula 3.5.Otherwise be set to ∞.
The core procedure of LUSMP algorithm also can be divided into four parts: for service request is set up working LSP, set up protection LSP for service request, the operating load light path of attaching most importance to provides the protection of WDM layer, discharges resource when business is left away.
Two, the multilayer guard method is shared in the clean culture based on load balancing in the optical-fiber network of the present invention, comprises the steps:
Step (1), set up working LSP for service request, concrete steps are as follows:
Step (1.1), link cost is set:
The link cost of each wavelength Conversion link, logical links, admittance link and wavelength link is set according to formula 3.1~3.5;
Step (1.2), pathfinding:
Step (1.2.1), utilize dijkstra's algorithm to calculate one from v ' sTo v ' dShortest path judge whether pathfinding success;
Step (1.2.2) is if service request is refused in failure, and method finishes;
Step (1.2.3) is if success continues execution in step (1.3); The LSP that herein obtains is a link set of being made up of wavelength Conversion link, logical links, admittance link, wavelength link;
Step (1.3), format LSP:
For each bar link among the LSP:
Step (1.3.1) is if for admitting link, explanation need be set up a new light path, record all wavelengths link and wavelength Conversion link thereafter admitted link until next bar occurring so according to the order of sequence, creates a new light path according to the orderly link set that obtains;
Step (1.3.2) does not process if be logical links;
Through format, LSP has become a set that only is made of logical links;
Step (1.4), Resources allocation:
Step (1.4.1), for newly-built light path, the user mode of the corresponding wavelength link of its process is changed to " being used to light path "; Light path source node place available light transmitter number subtracts one; Light path destination node place available light receiver number subtracts one; On logical topology, increase corresponding logical links;
Step (1.4.2), upgrade the bandwidth usage of each logical links on the LSP path successively.
Step (2), be that service request sets up protection LSP
For protection LSP and working LSP can not broken down simultaneously, it is that physical link separates that protection LSP requires with working LSP, and the concrete steps of setting up protection LSP are as follows:
Step (2.1), link cost is set
It is ∞ that the pairing all wavelengths link of physical link of working LSP process and the link cost of logical links are set; The link cost of all the other each wavelength Conversion links, logical links, admittance link and wavelength link is set according to formula 3.1,3.6,3.3,3.4,3.5;
Step (2.2), pathfinding
Step (2.2.1), utilize dijkstra's algorithm to calculate one from v ' sTo v ' dShortest path, judge whether pathfinding success;
Step (2.2.2) is refused service request if failure discharges the resource that working LSP takies, and method finishes;
Step (2.2.3) is if success continues execution in step (2.3);
Step (2.3), format LSP:
For each bar link among the LSP:
Step (2.3.1) is if for admitting link, explanation need be set up a new light path, record all wavelengths link and wavelength Conversion link thereafter admitted link until next bar occurring so according to the order of sequence, creates a new light path according to the orderly link set that obtains;
Step (2.3.2) does not process if be logical links;
Through format, LSP has become a set that only is made of logical links;
Step (2.4), Resources allocation:
Step (2.4.1), for newly-built light path, the user mode of the corresponding wavelength link of its process is changed to " being used to light path "; Light path source node place available light transmitter number subtracts one; Light path destination node place available light receiver number subtracts one; On logical topology, increase corresponding logical links;
Step (2.4.2), upgrade the bandwidth usage of each logical links on the LSP path successively;
According to following policy update bandwidth usage:
If two protection LSP has passed through identical logical links, and the working LSP of their correspondences is that physical link separates, and they can the share protect bandwidth on this logical links so.
Make R lBe the request set of all protection LSP through logical links l; E rThe set of physical link for the working LSP process of request r; Protection LSP through the working LSP of l the physical link of process institute's physical link of protecting of constituting l gather
Figure BDA0000058307190000241
Be working LSP process physical link e, protection LSP is through the request set of logical links l; For any e ∈ A 1, all write down the bandwidth number of protecting this physical link to distribute
Figure BDA0000058307190000242
b rBandwidth on demand for professional r.
When being a new service request foundation protection LSP,, so at first listing each logical links of its working LSP process and list, and then list the physical link of each logical links process successively if should protect LSP through logical links l.Have repetition between these physical links, remove the physical link of repetition, every physical link only keeps one, constitutes set A 2
For e ∈ A arbitrarily 2If,
Figure BDA0000058307190000251
Add e to A so 1In, the while military order
Figure BDA0000058307190000252
b rBandwidth on demand for new business; If e ∈ is A 1, order This logical links needs newly assigned resource conservation bandwidth
Figure BDA0000058307190000254
If there are not enough idle bandwidths on the l, l is unavailable so.
Step (3), the operating load light path of attaching most importance to provide the protection of WDM layer
Under the share protect; when the light path of doing load for a heavy industry provides the protection light path; actual creation light path not; and just on corresponding wavelength link, done record; represent that this protection light path is through this wavelength link; have only when concrete fault takes place, just dispose OXC dynamically and create the protection light path.
When set up working LSP and protection LSP for service request after, check successively working LSP each logical links (every logical links all corresponding a light path) of process, if its load has surpassed specified threshold value And WDM layer protection is not provided, so for it provides a protection light path, actual creation light path not, and just on corresponding wavelength link, keeping a record.
The source node that makes this heavy industry make the load light path is v a, destination node is v b, concrete steps are as follows:
Step (3.1), link cost is set
The link cost that heavy industry is made the pairing all wavelengths link of physical link of load light path process is set to ∞; The link cost of all logical links is set to ∞; The link cost of its commplementary wave length link is set according to formula 3.5; According to 3.2.6 the link cost that all admit link is set;
Step (3.2), pathfinding
Step (3.2.1), calculate one with dijkstra's algorithm and connect v ' aAnd v ' bThe path of cost minimum, judge whether the pathfinding success;
Step (3.2.2) is if fail, and the protection of WDM layer failed, and method finishes;
Step (3.2.3) is if successful, and judgement source, destination have or not enough optical transceivers;
Step (3.2.4), jump wavelength link user mode when not being " being used to protection ", v ' when path first aIf optical transmitter of the new distribution in place is v ' aPlace's optical transmitter number is 0, WDM layer protection failure, and method finishes; Otherwise, v ' aPlace's optical transmitter number subtracts one;
Step (3.2.5), when path final jump wavelength link user mode be not " be used to protection ", v ' bIf optical receiver of the new distribution in place is v ' bPlace's optical receiver number is 0, WDM layer protection failure, and method finishes; Otherwise, v ' bPlace's optical receiver number subtracts one;
Step (3.2.6), this heavy industry is made the load light path be labeled as " the WDM layer is protected " state;
Step (3.3), Resources allocation
Each wavelength link user mode of protection road process is set to " being used to protection "; The physical link that operating path is crossed is gathered the array A that adds each wavelength link of protecting the road process to 3In.
Step (4), when leaving away, business discharges resource
When business is left away, need to discharge the resource that takies on its working LSP and the protection LSP, concrete steps are as follows:
Step (4.1), successively discharge working LSP and protection LSP the bandwidth that takies on each logical links of process;
During bandwidth resources on the release guard LSP, each logical links of check protection LSP process successively is with the array A of this logical links 1In, the bandwidth of the physical link correspondence of this vocational work LSP process deducts this professional bandwidth on demand, if A 1In the bandwidth of certain physics link correspondence be 0, from A 1Middle this physical link of deletion will protect the value of bandwidth to be re-set as A 1In the maximum of the corresponding bandwidth of each physical link;
Step (4.2), the protection light path is arranged, but present load is lower than for those
Figure BDA0000058307190000261
Working light path, delete its protection light path: upgrade successively its protection light path the wavelength link of process, with the physical link of this working light path process array A from each wavelength link 3Middle deletion; If the array A of certain bar wavelength link 3In no longer contain any physical link; This wavelength Link State is set is " not using "; If this wavelength link is the first jumping wavelength link in the protection road, light path source node place optical transmitter number adds one so; If final jump wavelength link in the protection road, light path destination node place optical receiver adds one so;
Wherein:
Figure BDA0000058307190000262
Be a threshold value of the operating load appointment of light path,
Step (4.3), be 0 logical links, delete this logical links for dedicated bandwidth; The operating position that each wavelength link of light path process is set is " not using "; Light path source node place optical transmitter number adds one; Destination node place optical receiver number adds one.

Claims (1)

1. the multilayer guard method is shared in the clean culture based on load balancing in the optical-fiber network, it is characterized in that: comprise the steps:
Step (1), set up working LSP for service request, i.e. label switched path
For protection LSP and working LSP can not broken down simultaneously, it is that physical link separates that protection LSP requires with working LSP, and it is as follows to set up protection LSP concrete steps:
Step (1.1), link cost is set:
It is ∞ that the pairing all wavelengths link of physical link of working LSP process and the link cost of logical links are set;
According to formula W Wcl=1 * α WclThe link cost W of each wavelength Conversion link is set Wcl
Wherein: α WclThe grade factor for the wavelength Conversion link;
According to formula W ll = &infin; b t - b w - b p < b r ( 1 + b w + b p b t ) &times; &alpha; ll b t - b w - b p &GreaterEqual; b r The link cost W of each logical links is set Ll
Wherein: b t, b w, b p, b rTotal bandwidth, bandwidth of operation, protection bandwidth and the user's bandwidth on demand of representing this logical links respectively;
α LlBe the logical links grade factor:
According to formula W al = &infin; t a = t t ( 1 + t t - t a t t ) &times; &alpha; al t a < t t The link cost W of the logical node of each node correspondence to the admittance link of the corresponding all wavelengths node of this node is set Al
According to formula W al = &infin; r a = r t ( 1 + r t - r a r t ) &times; &alpha; al r a < r t The link cost W of the corresponding all wavelengths node of each node to the admittance link of its logical node is set Al
Wherein: t t, r t, t a, r aRepresent the total optical transmitter number in this node place, total optical receiver number, available light transmitter number and available light receiver number respectively;
α AlFor admitting the grade factor of link;
According to formula W wll = &infin; w w + w p = | W | ( 1 + w w + w p | W | ) &times; &alpha; wll w w + w p < | W | The link cost W of each wavelength link is set Wll
Wherein: w w, w pOperating wave long number and protection number of wavelengths in the physical link under this wavelength link respectively;
α WllThe grade factor for the wavelength link;
| W| is the number of wavelengths in every physical link;
Step (1.2), pathfinding:
Step (1.2.1), utilize dijkstra's algorithm to calculate one from v ' sTo v ' dShortest path, judge whether pathfinding success;
Wherein: v ' sBe v sLogical node, v sBe source node;
V ' dBe v dLogical node, v dBe destination node;
Step (1.2.2) is if service request is refused in failure, and method finishes;
Step (1.2.3) is if success continues execution in step (1.3); The LSP that herein obtains is a link set of being made up of wavelength Conversion link, logical links, admittance link, wavelength link;
Step (1.3), format LSP:
For each bar link among the LSP:
Step (1.3.1) is if for admitting link, explanation need be set up a new light path, record all wavelengths link and wavelength Conversion link thereafter admitted link until next bar occurring so according to the order of sequence, creates a new light path according to the orderly link set that obtains;
Step (1.3.2) does not process if be logical links;
Through format, LSP has become a set that only is made of logical links;
Step (1.4), Resources allocation:
Step (1.4.1), for newly-built light path, the user mode of the corresponding wavelength link of its process is changed to " being used to light path "; Light path source node place available light transmitter number subtracts one; Light path destination node place available light receiver number subtracts one; On logical topology, increase corresponding logical links;
Step (1.4.2), upgrade the bandwidth usage of each logical links on the LSP path successively;
Step (2), be that service request sets up protection LSP, concrete steps are as follows:
Step (2.1), link cost is set
It is ∞ that the pairing all wavelengths link of physical link of working LSP process and the link cost of logical links are set; The link cost that all the other each wavelength Conversion links, logical links, admittance link, logical links and wavelength link are set is as follows;
According to formula W Wcl=1 * α WclThe link cost W of each wavelength Conversion link is set Wcl
Wherein: α WclThe grade factor for the wavelength Conversion link;
According to formula W al = &infin; t a = t t ( 1 + t t - t a t t ) &times; &alpha; al t a < t t The link cost W of the logical node of each node correspondence to the admittance link of the corresponding all wavelengths node of this node is set Al
According to formula W al = &infin; r a = r t ( 1 + r t - r a r t ) &times; &alpha; al r a < r t The link cost W of the corresponding all wavelengths node of each node to the admittance link of its logical node is set Al
Wherein: t t, r t, t α, r aRepresent the total optical transmitter number in this node place, total optical receiver number, available light transmitter number and available light receiver number respectively;
α AlFor admitting the grade factor of link;
According to formula W wll = &infin; w w + w p = | W | ( 1 + w w + w p | W | ) &times; &alpha; wll w w + w p < | W | The link cost W of each wavelength link is set Wll
Wherein: w w, w pOperating wave long number and protection number of wavelengths in the physical link under this wavelength link respectively;
α WllThe grade factor for the wavelength link;
| W| is the number of wavelengths in every physical link;
According to formula W ll = &infin; b t - b w - b p < b new ( b new b t ) ( 1 + b w + b p b t ) &times; &alpha; ll b t - b w - b p &GreaterEqual; b new Be arranged on resource conservation and share under the situation, when setting up protection LSP, introduce the link cost of this logical links when protecting LSP to need newly assigned protection bandwidth to count through this logical links for service request;
Wherein: b t, b w, b p, b NewBe respectively total bandwidth, bandwidth of operation, the protection bandwidth of this logical links and pass through this logical links and need newly assigned protection bandwidth number as if protection LSP;
α LlIt is the grade factor of logical links;
Step (2.2), pathfinding
Step (2.2.1), utilize dijkstra's algorithm to calculate one from v ' sTo v ' dShortest path, judge whether pathfinding success;
Step (2.2.2) is refused service request if failure discharges the resource that working LSP takies, and method finishes;
Step (2.2.3) is if success continues execution in step (2.3);
Step (2.3), format LSP:
For each bar link among the LSP:
Step (2.3.1) is if for admitting link, explanation need be set up a new light path, record all wavelengths link and wavelength Conversion link thereafter admitted link until next bar occurring so according to the order of sequence, creates a new light path according to the orderly link set that obtains;
Step (2.3.2) does not process if be logical links;
Through format, LSP has become a set that only is made of logical links;
Step (2.4), Resources allocation:
Step (2.4.1), for newly-built light path, the user mode of the corresponding wavelength link of its process is changed to " being used to light path "; Light path source node place available light transmitter number subtracts one; Light path destination node place available light receiver number subtracts one; On logical topology, increase corresponding logical links;
Step (2.4.2), upgrade the bandwidth usage of each logical links on the LSP path successively:
According to following policy update bandwidth usage:
If two protection LSP has passed through identical logical links, and the working LSP of their correspondences is that physical link separates, and they can the share protect bandwidth on this logical links so;
Make R lBe the request set of all protection LSP through logical links l; E rThe set of physical link for the working LSP process of request r; Protection LSP through the working LSP of logical links l the physical link of process institute's physical link of protecting of constituting logical links l gather
Figure FDA00003072811100041
Figure FDA00003072811100042
Be working LSP process physical link e, protection LSP is through the request set of logical links l; For any e ∈ A 1, all write down the bandwidth number of protecting this physical link to distribute b rBandwidth on demand for professional r;
When being a new service request foundation protection LSP,, so at first listing each logical links of its working LSP process and list, and then list the physical link of each logical links process successively if should protect LSP through logical links l; Have repetition between these physical links, remove the physical link of repetition, every physical link only keeps one, constitutes set A 2
For e ∈ A arbitrarily 2If,
Figure FDA00003072811100047
Add e to A so 1In, the while military order
Figure FDA00003072811100044
b rBandwidth on demand for new business; If e ∈ is A 1, order
Figure FDA00003072811100045
This logical links needs newly assigned resource conservation bandwidth
Figure FDA00003072811100046
If there are not enough idle bandwidths on the logical links l, logical links l is unavailable so; Step (3), the operating load light path of attaching most importance to provide the protection of WDM layer
When set up working LSP and protection LSP for service request after, check successively working LSP each logical links of process, every all corresponding light path of logical links is if its load has surpassed specified threshold value
Figure FDA00003072811100051
And WDM layer protection is not provided, so for it provides a protection light path, actual creation light path not, and just on corresponding wavelength link, keep a record;
The source node that makes this heavy industry make the load light path is v a, destination node is v b, concrete steps are as follows:
Step (3.1), link cost is set
Heavy industry is set to be made the link cost of the pairing all wavelengths link of physical link of load light path process and is set to ∞;
The link cost that all logical links are set is set to ∞;
According to formula W wll = &infin; w w + w p = | W | ( 1 + w w + w p | W | ) &times; &alpha; wll w w + w p < | W | The link cost W of its commplementary wave length link is set Wll
W wherein w, w pOperating wave long number and protection number of wavelengths in the physical link under this wavelength link respectively;
The link cost that all admit link is set:
In the share protect method, when the operating load light path of attaching most importance to provides the protection of WDM layer, if the wavelength link is jumped on first of protection road or final jump wavelength link uses with other professional sharing, protect road source node and destination node can share optical transmitter and the optical receiver that use has distributed respectively so, do not need sub-distribution again; So when calculating the protection of WDM layer, the edge joint that goes out at protection source node place, road is received the edge joint of going at link and destination node place and is received link and be set to α Al, other admits link to be set to ∞;
Step (3.2), pathfinding
Step (3.2.1): calculate one with dijkstra's algorithm and connect v ' aAnd v ' bThe path of cost minimum, judge whether the pathfinding success;
Step (3.2.2): if failure, WDM layer protection failure, method finishes;
Step (3.2.3): if success, judgement source, destination have or not enough optical transceivers;
Step (3.2.4): when the path first jumping wavelength link user mode is not " being used to protection ", v ' aIf optical transmitter of the new distribution in place is v ' aPlace's optical transmitter number is 0, WDM layer protection failure, and method finishes; Otherwise, v ' aPlace's optical transmitter number subtracts one;
Step (3.2.5), when path final jump wavelength link user mode be not " be used to protection ", v ' bIf optical receiver of the new distribution in place is v ' bPlace's optical receiver number is 0, WDM layer protection failure, and method finishes; Otherwise, v ' bPlace's optical receiver number subtracts one;
Step (3.2.6), this heavy industry is made the load light path be labeled as " the WDM layer is protected " state;
Step (3.3), Resources allocation
Each wavelength link user mode of protection road process is set to " being used to protection "; The physical link that operating path is crossed is gathered the array A that adds each wavelength link of protecting the road process to 3In;
Step (4), when leaving away, business discharges resource
When business is left away, need to discharge the resource that takies on its working LSP and the protection LSP, concrete steps are as follows:
Step (4.1), successively discharge working LSP and protection LSP the bandwidth that takies on each logical links of process;
During bandwidth resources on the release guard LSP, each logical links of check protection LSP process successively is with the array A of this logical links 1In, the bandwidth of the physical link correspondence of this vocational work LSP process deducts this professional bandwidth on demand, if A 1In the bandwidth of certain physics link correspondence be 0, from A 1Middle this physical link of deletion will protect the value of bandwidth to be re-set as A 1In the maximum of the corresponding bandwidth of each physical link;
Step (4.2), the protection light path is arranged, but present load is lower than for those
Figure FDA00003072811100061
Working light path, delete its protection light path: upgrade successively its protection light path the wavelength link of process, with the physical link of this working light path process array A from each wavelength link 3Middle deletion; If the array A of certain bar wavelength link 3In no longer contain any physical link; This wavelength Link State is set is " not using "; If this wavelength link is the first jumping wavelength link in the protection road, light path source node place optical transmitter number adds one so; If final jump wavelength link in the protection road, light path destination node place optical receiver adds one so;
Wherein:
Figure FDA00003072811100062
Be a threshold value of the operating load appointment of light path,
Step (4.3), be 0 logical links, delete this logical links for dedicated bandwidth; The operating position that each wavelength link of light path process is set is " not using "; Light path source node place optical transmitter number adds one; Destination node place optical receiver number adds one.
CN2011101101580A 2011-04-29 2011-04-29 Load balance-based unicast share multi-layer protection method in optical fiber network Expired - Fee Related CN102271294B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011101101580A CN102271294B (en) 2011-04-29 2011-04-29 Load balance-based unicast share multi-layer protection method in optical fiber network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011101101580A CN102271294B (en) 2011-04-29 2011-04-29 Load balance-based unicast share multi-layer protection method in optical fiber network

Publications (2)

Publication Number Publication Date
CN102271294A CN102271294A (en) 2011-12-07
CN102271294B true CN102271294B (en) 2013-07-24

Family

ID=45053427

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011101101580A Expired - Fee Related CN102271294B (en) 2011-04-29 2011-04-29 Load balance-based unicast share multi-layer protection method in optical fiber network

Country Status (1)

Country Link
CN (1) CN102271294B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105847137B (en) * 2016-05-28 2019-02-26 国网安徽省电力公司六安供电公司 A kind of link dual path method for building up for data center internet

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101155131A (en) * 2006-09-29 2008-04-02 中国电信股份有限公司 Method for establishing label switched path of minimized path preemption cost
CN101155137A (en) * 2006-09-25 2008-04-02 华为技术有限公司 Method for confirming routing path and its confirming unit

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7050718B2 (en) * 2001-07-26 2006-05-23 Victor John Rychlicki Method of establishing communications in an all optical wavelength division multiplexed network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101155137A (en) * 2006-09-25 2008-04-02 华为技术有限公司 Method for confirming routing path and its confirming unit
CN101155131A (en) * 2006-09-29 2008-04-02 中国电信股份有限公司 Method for establishing label switched path of minimized path preemption cost

Also Published As

Publication number Publication date
CN102271294A (en) 2011-12-07

Similar Documents

Publication Publication Date Title
CN102137313B (en) Subtree-based multicasting traffic grooming method in WDM (Wavelength Division Multiplex) optical network
CN102186124B (en) Utility-based interlayer coordination method in WDM (Wavelength Division Multiplexing) optical network
CN102137026B (en) Multiconstraint and multicast routing method in WDM (Wavelength Division Multiplexing) optical network
Mouftah et al. Optical networks: architecture and survivability
Somani Survivability and traffic grooming in WDM optical networks
US7848651B2 (en) Selective distribution messaging scheme for an optical network
Ye et al. A simple dynamic integrated provisioning/protection scheme in IP over WDM networks
Ye et al. On joint protection/restoration in IP-centric DWDM based optical transport networks
US20050030951A1 (en) Reservation protocol signaling extensions for optical switched networks
WO2005001620A2 (en) Optical network topology databases and optical network operations
Keyao et al. Traffic grooming in optical WDM mesh networks
CN102186123B (en) Multicast-sharing and multilayer protection method based on subtrees in WDM (wavelength division multiplexer) optical network,
CN101459574B (en) Network deployment method, network system and IP node
CN102186125B (en) Special Subtree-based multilayer multicast protection method in WDM (Wavelength Division Multiplexing) network
CN102143086B (en) Multicast shared segment protection method for wavelength division multiplexing (WDM) optical network
CN102271294B (en) Load balance-based unicast share multi-layer protection method in optical fiber network
CN102186126B (en) Special unicast multi-layer protective method based on load equalization in optical network
Fang et al. IP traffic grooming over WDM optical networks
Koubàa et al. QoT-aware elastic bandwidth allocation and spare capacity assignment in flexible island-based optical transport networks under shared risk link group constraints
Correia et al. Protection schemes for IP-over-WDM networks: Throughput and recovery time comparison
Chandwani et al. Comprehensive design methodology for control and data planes in wavelength-routed optical networks
Huo Survivable design and analysis of WDM mesh networks
Su et al. Study on strategy of dynamic joint routing and resource allocation in layered optical transport networks
Balasubramanian Design and protection algorithms for path level aggregation of traffic in WDM metro optical networks
Hou A heuristic for WDM path protection.

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20130724