CN106685571A - Hybrid protection method in WDM optical network based on recovery time sensitivity - Google Patents
Hybrid protection method in WDM optical network based on recovery time sensitivity Download PDFInfo
- Publication number
- CN106685571A CN106685571A CN201611102140.5A CN201611102140A CN106685571A CN 106685571 A CN106685571 A CN 106685571A CN 201611102140 A CN201611102140 A CN 201611102140A CN 106685571 A CN106685571 A CN 106685571A
- Authority
- CN
- China
- Prior art keywords
- backup
- service
- recovery time
- path
- link
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04J—MULTIPLEX COMMUNICATION
- H04J14/00—Optical multiplex systems
- H04J14/02—Wavelength-division multiplex systems
- H04J14/0227—Operation, administration, maintenance or provisioning [OAMP] of WDM networks, e.g. media access, routing or wavelength allocation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04J—MULTIPLEX COMMUNICATION
- H04J14/00—Optical multiplex systems
- H04J14/02—Wavelength-division multiplex systems
- H04J14/0287—Protection in WDM systems
- H04J14/0289—Optical multiplex section protection
- H04J14/029—Dedicated protection at the optical multiplex section (1+1)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04J—MULTIPLEX COMMUNICATION
- H04J14/00—Optical multiplex systems
- H04J14/02—Wavelength-division multiplex systems
- H04J14/0287—Protection in WDM systems
- H04J14/0289—Optical multiplex section protection
- H04J14/0291—Shared protection at the optical multiplex section (1:1, n:m)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04J—MULTIPLEX COMMUNICATION
- H04J14/00—Optical multiplex systems
- H04J14/02—Wavelength-division multiplex systems
- H04J14/0287—Protection in WDM systems
- H04J14/0293—Optical channel protection
- H04J14/0294—Dedicated protection at the optical channel (1+1)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04J—MULTIPLEX COMMUNICATION
- H04J14/00—Optical multiplex systems
- H04J14/02—Wavelength-division multiplex systems
- H04J14/0287—Protection in WDM systems
- H04J14/0293—Optical channel protection
- H04J14/0295—Shared protection at the optical channel (1:1, n:m)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
- H04L47/72—Admission control; Resource allocation using reservation actions during connection setup
- H04L47/726—Reserving resources in multiple paths to be used simultaneously
- H04L47/728—Reserving resources in multiple paths to be used simultaneously for backup paths
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
- H04L47/78—Architectures of resource allocation
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Optical Communication System (AREA)
Abstract
The invention discloses a hybrid protection method in a WDM (wavelength division multiplexing) optical network based on recovery time sensitivity, and belongs to the technical field of communication networks. The method is based on the recovery time constraint of business connection, aims at the conflict between the recovery time and the resource utilization rate, employs a mode of combining shared access protection and dedicated access protection, provides a flexible backup (protection) resource configuration scheme for businesses at different levels, optimizes the network resource utilization rate under the condition that a business recovery time threshold is met, and provides a hybrid protection configuration, which discriminates the recovery degrees, for the business connection.
Description
Technical field
The present invention relates to Communication Network Technique field, and in particular to based on the mixed of recovery time sensitivity in a kind of WDM optical-fiber networks
Close guard method.
Background technology
In optical-fiber network as telecommunication backbone net architecture, once generating assembly failure or damage, will cause substantial amounts of
Loss of data and service disconnection.Therefore, survivability problem is always an important subject in WDM optical-fiber networks.Network is given birth to
When sustainability refers to network failure, the ability of necessary service quality can be still maintained.In the research of network survivability sex chromosome mosaicism, protect
Shield technology is widely studied and paid close attention to as a kind of important anti-technology of ruining.Protection refers in before failure occurs for network
Reserved backup (protection) resource of service connection, when network failure, by impaired service switching to the protection resource reserved
On realizing the recovery of business.
Path protection method mainly has two kinds:Dedicated path-protection (DPP) and Shared path-protection (SPP).Private access
Protection (DPP) refers to the reserved wavelength resource on protection path and the configured completions of OXC (optical cross connect) on node, and quilt
One service connection is special and exclusively enjoys.As shown in figure 1, path a-b-c-d is active channel of the connecting node to (a, d), path
A-e-f-g-d is corresponding privacy protection path, and when a link b-c on active channel fails, node b will be to source node
A sends alarm information, and starts the switching of service channel by source node a.Due to OXC on the node of backup path in privacy protection
Configuration is completed in advance, and the business in working ways can be switched on backup path at once, thus service recovery time comparatively fast but
Resource backup consumption is larger.Shared path-protection (SPP) refers to that the protection path of some business under given conditions can share net
Reserved wavelength resource in network, but OXC need to be configured before service switching.As shown in Fig. 2 path a-b-c-d is connection
To the active channel of (a, d), a-e-g-d is corresponding backup path to node, and path h-o-p-q is connecting node to (h, q)
Active channel, h-e-g-q is corresponding backup path.Because two paths of a-b-c-d and h-o-p-q are separated, in single-link event
Under barrier, the resource backup on link l can be connected (a, d) and connection (h, q) is shared.On active channel a-b-c-d one
When bar link b-c fails, node b will send alarm information to source node a, and be matched somebody with somebody by OXC on source node a triggering backup paths
Put, then carry out the switching of service channel, therefore the shared resource backup consumption protected is smaller but service recovery time is more long.
The characteristics of having exclusive resource backup due to privacy protection, the Internet resources of service connection configuration consumption are larger, special
It is not when Internet resources are deficient, it will cause the substantial amounts of business connection cannot be set up due to a lack of enough resources.And share
The characteristics of protection is with service switching time lag, the interim break period of business will appear from different degrees of extension, particularly
For high-grade service connection, it may be difficult to ensure its corresponding SLA (service level agreement).And any of the above situation
Occur, all will cause greatly loss to user and operator.
In order to solve contradiction of traditional privacy protection and shared protection between service recovery time, resource utilization,
It is proposed that a kind of hybrid protection method sensitive based on recovery time.The recovery time that the method is based on service connection constrains,
By the way of Shared path-protection and dedicated path-protection are combined, for different grades of business provides flexible resource backup
Allocation plan, on the premise of service recovery time thresholding is met, optimizes network resource utilization, for service connection provides differentiation
The hybrid protection configuration of restoring degree.
The content of the invention
Present invention seek to address that above problem of the prior art, it is proposed that one kind is directed to multi-link failure, when control recovers
Between, improve network resource utilization, the hybrid protection method of differentiated service restoring degree.Technical scheme is as follows:
Based on the hybrid protection method that recovery time is sensitive in a kind of WDM (wavelength-division multiplex) optical-fiber network, it includes following step
Suddenly:
101st, it is each service connection c that dijkstra's algorithm is utilized in optical-fiber network G (N, L)iFind three link disjoints
Path, i.e.,:Active channel WPi, the first backup path BPi 1With the second backup path BPi 2, and BPi 2It is not shorter than BPi 1, 1≤i≤
| C |, C represent the set of all service connections in network, and N represents all node sets in network, and L represents all of in network
Bi-directional link set;
102nd, compare in optical-fiber network G (N, L) between all any paths of service connection mutual alignment relation (including:Work
Path WPi, the first backup path BPi 1With the second backup path BPi 2), obtain each service connection resource backup can shared relationship,
And the first backup path BP in each service connection is calculated with thisi 1With the second backup path BPi 2Corresponding maximum recovery time
RTi 1With RTi 2;
103rd, according to first, second backup path can shared relationship, it is total to reference to service recovery time thresholding
Enjoy or specialized configuration is set;
104th, it is all active channel WP by the link on any link l in optical-fiber network G (N, L)iDistribution business
Business bandwidth It is original service bandwidth demand, l ∈ L, and use resource optimization ILP models, calculates and obtain corresponding first backup
Path BPi 1With the second backup path BPi 2On optimum allocation bandwidthWherein, k is the grade of service, βkIt is backup path band
Allocation proportion wide, and 0≤β1≤β2≤β3…≤βk≤1;
105th, it is the related service shared backup bandwidth resources of connection distribution on any link l in optical-fiber network G (N, L),
MeetAndWherein, l ∈ L, k and k ' are represented not
The same grade of service, βk′And βk′The backup channel bandwidth allocation proportion of different brackets business is represented,WithRespectively by chain
The connection c of road liWith ci′Backup bandwidth.
106th, it is related service connection distribution proprietary backup bandwidth resources on any link l in optical-fiber network G (N, L),
MeetWherein, the different grade of service of l ∈ L, k and k ' expression, βk′And βk′Represent different
The backup channel bandwidth allocation proportion of grade business,WithRespectively by the connection c of link liWith ci′Backup bandwidth.
Further, step 102 judges that resource backup could be shared according to the position relationship of path:
1) rule one
Position relationship:
Or:
Or
Shared relationship:
2) rule two
Position relationship:
Shared relationship:
3) rule three
Position relationship:
Or:
OrOr
Shared relationship:
4) rule four
Position relationship:
Shared relationship:
5) rule five
Position relationship:Except other any position relationships of above position relationship.
Shared relationship:
Further, step 103 according to first, second backup path can shared relationship, with reference to service recovery time door
Limit carries out shared or specialized configuration to it and sets, and specifically includes:
To any service connection ciIf, the second backup path BPi 2Can share, and RTi 2≤RT0, RT0During for business recovery
Between thresholding, then BP is seti 2It is configuration sharing, otherwise, BP is seti 2It is specialized configuration;If BPi 1Can share, and RTi 1≤RT0,
BP is then seti 1It is configuration sharing, otherwise, BP is seti 1It is specialized configuration.
Advantages of the present invention and have the beneficial effect that:
In the present invention, for the contradiction between recovery time and resource utilization, the recovery time based on service connection is about
Beam, by the way of Shared path-protection and dedicated path-protection are combined, for different brackets business provides flexible backup money
Source allocation plan, on the premise of service recovery time thresholding is met, optimizes network resource utilization, for service connection provides area
Divide the hybrid protection configuration of restoring degree.
Brief description of the drawings
Fig. 1 is dedicated path-protection schematic diagram in the prior art;
Fig. 2 is Shared path-protection schematic diagram in the prior art;
Fig. 3 is that the present invention provides preferred embodiment business recovery process schematic;
Fig. 4 is the flow of the hybrid protection method based on recovery time sensitivity in preferred embodiment of the present invention WDM optical-fiber networks
Figure.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, detailed
Carefully describe.Described embodiment is only a part of embodiment of the invention.
The present invention solve above-mentioned technical problem technical scheme be:
A non-limiting embodiment is given below in conjunction with the accompanying drawings further to illustrate the present invention.Wherein set k=
3, that is, there is 0≤β1≤β2≤β3≤ 1, RT0=50ms.
Concept and model involved by present invention is as follows:
1. business recovery process is damaged
As shown in Figure 3, it is assumed that a connection of a to d, a is source node, and d is purpose node.Recovery process is divided into two steps
Suddenly:The first step, if on active channel, link b-c breaks down, then end node b and c will be first it is detected that failures, and will
Failure message is sent respectively to source node a and destination node d.Second step, when source node a receives fault warning message
Wait, trigger the protection handoff procedure of business.
The protection handoff procedure of business is divided into two kinds of situations:For privacy protection, source node s receives fault warning message
Afterwards, a notification message is sent to destination node d along backup path a-e-f-g-d.Destination node d receive the message it
Afterwards, one confirmation message of backtracking starts path switching to source node a, subsequent source node a, so as to complete the extensive of impaired business
It is multiple.For shared protection, after source node a receives fault warning message, along backup path a-e-f-g-d to destination node d
Send configuration message, configures each OXC on the backup path step by step, and after destination node d completes corresponding configuration, former road is returned
Returning a confirmation message starts path switching to source node a, subsequent source node a, so as to complete the recovery of impaired business.
2. network model
Assuming that WDM optical network models are G (N, L), wherein N is nodes set, and L is the bi-directional link collection in network
Close.Each node in network has complete wavelength conversion capability, and each of the links has identical wavelength bandwidth.Network event
Barrier is with single link failure and double-link failure as representative.
It is each service connection c that dijkstra's algorithm is utilized in G (N, L)i(1≤i≤| C |) finds three link disjoints
Path, i.e.,:Active channel WPi, the first backup path BPi 1With the second backup path BPi 2, and BPi 2It is not shorter than BPi 1。
3. recovery time model
When recovery time refers to that network breaks down, will be spent in the impaired service switching in network to backup (protection) path
The time taken.Related symbol is defined as follows:
FT:One time of failure of detection;
DT:On one node, the time of signal transacting;
PT:The time that signal is propagated on a link;
CT:The time of OXC configurations;
m:Hop count on active channel;
n:Hop count on backup path;
Connection ciMaximum traffic recovery time.
The maximum traffic recovery time of privacy protection calculates the maximum traffic recovery time that protection is shared as shown in formula (1)
Calculate as shown in formula (2).
Technical scheme is described as follows:
The present invention is a kind of protection scheme sensitive based on recovery time for being applied to WDM optical-fiber networks.
1. path secret sharing is protected:
Related symbol explanation:
l:A bidirectional fiber link in network G (N, L);
WPiOr WPi′:The active channel of service connection i and i ';
BPi 1OrCorresponding to WPiOr WPi′The first backup path, i.e. WPiOr WPi′After failure, business will preferentially cut
Change to the backup path;
BPi 2OrCorresponding to WPiOr WPi′The second backup path, i.e. WPiOr WPi′Failure, and BPi 1OrAlso lose
During effect, business will be switched to the backup path;
There is one or more link to overlap mutually between expression path A and path B;
There is no link to overlap mutually between expression path A and path B;
(A, B)=0:Represent that path A and path B can not share resource backup;
(A, B)=1:Represent that path A and path B can share resource backup;
RTiOr RTi':The maximum recovery time of service connection i or i ';
RT0:Service recovery time thresholding, for example:50ms.
Whether the protection path of service connection can use resource-sharing allocation plan in the present invention, will be depending on two bars
Part, i.e.,:Position relationship first according to each path judges that resource backup could be shared;Then under the shared relationship, industry is calculated
Whether can the maximum recovery time of business, less than the thresholding for setting, the configuration sharing be used with decision.
Position relationship according to path judges that resource backup could be shared:
6) rule one
Position relationship:
Or:
OrOr
Shared relationship:
7) rule two
Position relationship:
Shared relationship:
8) rule three
Position relationship:
Or:
OrOr
Shared relationship:
9) rule four
Position relationship:
Shared relationship:
10) rule five
Position relationship:Except other any position relationships of above position relationship.
Shared relationship:
The shared rule according to more than, obtain between each service channel can shared relationship, and calculate each business under the relation
The maximum recovery time of connection, and then can judgement use corresponding configuration sharing:
The first step:If BPi 2Can share, calculate corresponding maximum recovery time RTi 2;
Second step:If RTi 2≤RT0, then BPi 2Configuration sharing can be used, otherwise using specialized configuration;
3rd step:If BPi 1Can share, calculate corresponding maximum recovery time RTi 1;
4th step:If RTi 1≤RT0, then BPi 1Configuration sharing can be used, otherwise using specialized configuration;
2. bandwidth resources allocation plan
To realize the allocation optimum of bandwidth resources, the present invention use ILP optimal models for network in all business company
Connect the corresponding bandwidth of operation of distribution and backup bandwidth.Concrete model design is as follows:
Input:
·G(N,L):N={ n } is node set, and L={ l } is bi-directional link set;
·C:Service connection request set { ci}(1≤i≤|C|);
·The set of all connections that backup path passes through link l;
·W:The bandwidth capacity of each of the links, i.e., total number of wavelengths;
·Connection ciOperating bandwidth requirement;
·k:Connection ciThe grade of service.K={ 1,2,3 } is set in the present embodiment, wherein, 1 represents general service, and 2 represent
Higher level service, 3 represent urgency traffic;
· Represent connection ciBackup path j be connected ci′The shared bandwidth resources of backup path q, it is no
Then, do not share;
Output:
·Connection ciThe assignment bandwidth on link l;
·Connection ciThe backup bandwidth distributed on link l;
·βk:The backup bandwidth allocation proportion of k class business;
Object function:
In formula (3), by maximizing β1, β2, β3, all kinds of business is obtained more protection resource distributions, and select appropriate
Weight coefficient (such as:100,70,50), then can be preferably high-grade business and provide more under limited network resource conditions
Protection resource, and business recovery degree higher be provided ensure.By limiting each link backup resource B to a certain extentl's
Consumption, promotes the shared of resource backup, to realize the optimization of total network resource.
Constraints:
Formula (4) ensures connection ciAssignment bandwidth meets original bandwidth requirements.
0≤β1≤β2≤β3≤1 (5)
Formula (5) ensures that high-grade business preferentially obtains more resource backup.
Q=1or 2, j=1or 2
Formula (6) provides Spare Capacity Sharing constraint.
Formula (7) limits the bandwidth resources amount distributed on link l and is no more than link capacity.
Based on the hybrid protection method that recovery time is sensitive in a kind of WDM optical-fiber networks, its specific implementation method includes as follows
Step:
101st, it is each service connection c that dijkstra's algorithm is utilized in optical-fiber network G (N, L)iFind three link disjoints
Path, i.e.,:Active channel WPi, the first backup path BPi 1With the second backup path BPi 2, and BPi 2It is not shorter than BPi 1, 1≤i≤
| C |, C represent the set of all service connections in network, and N represents all node sets in network, and L represents all of in network
Bi-directional link set;
102nd, compare in optical-fiber network G (N, L) between all any paths of service connection mutual alignment relation (including:Work
Path WPi, the first backup path BPi 1With the second backup path BPi 2), obtain each service connection resource backup can shared relationship,
And the first backup path BP in each service connection is calculated with thisi 1With the second backup path BPi 2Corresponding maximum recovery time
RTi 1With RTi 2;
103rd, to any service connection ciIf, BPi 2Can share, and RTi 2≤RT0(RT0It is service recovery time thresholding),
BP is then seti 2It is configuration sharing, otherwise, BP is seti 2It is specialized configuration;If BPi 1Can share, and RTi 1≤RT0, then set
BPi 1It is configuration sharing, otherwise, BP is seti 1It is specialized configuration;
104th, it is all active channel WP by the link on any link l in optical-fiber network G (N, L)iDistribution business
Business bandwidth It is original service bandwidth demand, l ∈ L, and use resource optimization ILP models, calculates and obtain corresponding first backup
Path BPi 1With the second backup path BPi 2On optimum allocation bandwidthWherein, k is the grade of service, βkIt is backup path band
Allocation proportion wide, and 0≤β1≤β2≤β3…≤βk≤1;
105th, it is the related service shared backup bandwidth resources of connection distribution on any link l in optical-fiber network G (N, L),
MeetAndWherein, l ∈ L, k and k ' are represented not
The same grade of service, βk′And βk′The backup channel bandwidth allocation proportion of different brackets business is represented,WithRespectively by chain
The connection c of road liWith ci′Backup bandwidth.
106th, it is related service connection distribution proprietary backup bandwidth resources on any link l in optical-fiber network G (N, L),
MeetWherein, the different grade of service of l ∈ L, k and k ' expression, βk′And βk′Represent different
The backup channel bandwidth allocation proportion of grade business,WithRespectively by the connection c of link liWith ci′Backup bandwidth.
The above embodiment is interpreted as being merely to illustrate the present invention rather than limits the scope of the invention.
Read after the content of record of the invention, technical staff can make various changes or modifications to the present invention, these equivalent changes
Change and modification equally falls into the scope of the claims in the present invention.
Claims (3)
1. based on the hybrid protection method that recovery time is sensitive in a kind of WDM optical-fiber networks, it is characterised in that comprise the following steps:
101st, it is each service connection c that dijkstra's algorithm is utilized in optical-fiber network G (N, L)iFind the logical of three link disjoints
Road, i.e.,:Active channel WPi, the first backup path BPi 1With the second backup path BPi 2, and BPi 2It is not shorter than BPi 1, 1≤i≤| C |,
C represents the set of all service connections in network, and N represents all node sets in network, and L represents all of two-way in network
Link set;
102nd, the mutual alignment relation between all any paths of service connection in optical-fiber network G (N, L) is compared, wherein any path bag
Include active channel WPi, the first backup path BPi 1With the second backup path BPi 2, obtain sharing for each service connection resource backup
Relation, and the first backup path BP in each service connection is calculated with thisi 1With the second backup path BPi 2Corresponding maximum recovery
Time RTi 1With RTi 2;
103rd, according to first, second backup path can shared relationship, with reference to service recovery time thresholding it is carried out it is shared or
Specialized configuration is set;
104th, it is all active channel WP by the link on any link l in optical-fiber network G (N, L)iDistribution business band
It is wide It is original service bandwidth demand, l ∈ L, and use resource optimization ILP models, calculates and obtain corresponding first backup path
BPi 1With the second backup path BPi 2On optimum allocation bandwidthWherein, k is the grade of service, βkIt is backup channel bandwidth point
With ratio, and 0≤β1≤β2≤β3…≤βk≤1;
105th, it is the related service shared backup bandwidth resources of connection distribution on any link l in optical-fiber network G (N, L), meetsAndWherein, l ∈ L, k and k ' expression are different
The grade of service, βk′And βk′The backup channel bandwidth allocation proportion of different brackets business is represented,WithRespectively by link l
Connection ciWith ci′Backup bandwidth;
106th, it is related service connection distribution proprietary backup bandwidth resources on any link l in optical-fiber network G (N, L), meetsWherein, the different grade of service of l ∈ L, k and k ' expression, βk′And βk′Represent different brackets
The backup channel bandwidth allocation proportion of business,WithRespectively by the connection c of link liWith ci′Backup bandwidth.
2., based on the hybrid protection method that recovery time is sensitive in WDM optical-fiber networks according to claim 1, its feature exists
In step 102 judges that resource backup could be shared according to the position relationship of path:
1) rule one
Position relationship:
Or:
OrOr
Shared relationship:
2) rule two
Position relationship:
Shared relationship:
3) rule three
Position relationship:
Or:
OrOr
Shared relationship:
4) rule four
Position relationship:
Shared relationship:
5) rule five
Position relationship:Except other any position relationships of above position relationship;
Shared relationship:
3. based on the hybrid protection method that recovery time is sensitive, its feature in WDM optical-fiber networks according to claim 1 and 2
Be, step 103 according to first, second backup path can shared relationship, it is total to reference to service recovery time thresholding
Enjoy or specialized configuration is set, specifically include:
To any service connection ciIf, the second backup path BPi 2Can share, and RTi 2≤RT0, RT0It is service recovery time door
Limit, then set BPi 2It is configuration sharing, otherwise, BP is seti 2It is specialized configuration;If BPi 1Can share, and RTi 1≤RT0, then set
Put BPi 1It is configuration sharing, otherwise, BP is seti 1It is specialized configuration.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611102140.5A CN106685571B (en) | 2016-12-05 | 2016-12-05 | A kind of hybrid protection method based on recovery time sensitivity in WDM optical-fiber networks |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611102140.5A CN106685571B (en) | 2016-12-05 | 2016-12-05 | A kind of hybrid protection method based on recovery time sensitivity in WDM optical-fiber networks |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106685571A true CN106685571A (en) | 2017-05-17 |
CN106685571B CN106685571B (en) | 2018-06-15 |
Family
ID=58866395
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611102140.5A Active CN106685571B (en) | 2016-12-05 | 2016-12-05 | A kind of hybrid protection method based on recovery time sensitivity in WDM optical-fiber networks |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106685571B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101155433A (en) * | 2006-09-30 | 2008-04-02 | 华为技术有限公司 | Service protection method and routing device |
CN102186124A (en) * | 2011-04-29 | 2011-09-14 | 东北大学 | Utility-based interlayer coordination method in WDM (Wavelength Division Multiplexing) optical network |
WO2012071828A1 (en) * | 2010-12-03 | 2012-06-07 | 中兴通讯股份有限公司 | Method and system for transmitting data based on full protection mode in passive optical network |
US20130163983A1 (en) * | 2011-12-22 | 2013-06-27 | Telcordia Technologies, Inc. | Signaling Protocol for Multi-Domain Optical Networks |
CN104080112A (en) * | 2014-07-17 | 2014-10-01 | 重庆邮电大学 | Method for improving service reliability of wireless self-organizing network |
-
2016
- 2016-12-05 CN CN201611102140.5A patent/CN106685571B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101155433A (en) * | 2006-09-30 | 2008-04-02 | 华为技术有限公司 | Service protection method and routing device |
WO2012071828A1 (en) * | 2010-12-03 | 2012-06-07 | 中兴通讯股份有限公司 | Method and system for transmitting data based on full protection mode in passive optical network |
CN102186124A (en) * | 2011-04-29 | 2011-09-14 | 东北大学 | Utility-based interlayer coordination method in WDM (Wavelength Division Multiplexing) optical network |
US20130163983A1 (en) * | 2011-12-22 | 2013-06-27 | Telcordia Technologies, Inc. | Signaling Protocol for Multi-Domain Optical Networks |
CN104080112A (en) * | 2014-07-17 | 2014-10-01 | 重庆邮电大学 | Method for improving service reliability of wireless self-organizing network |
Non-Patent Citations (2)
Title |
---|
NING-HAI BAO 等: "On Exploiting Sharable Resources With Resource Contention Resolution for Surviving Double-Link Failures in Optical Mesh Networks", 《JOURNAL OF LIGHTWAVE TECHNOLOGY》 * |
梁俊 等: "一种基于区分业务等级的光网络共享通路保护算法", 《光通信研究》 * |
Also Published As
Publication number | Publication date |
---|---|
CN106685571B (en) | 2018-06-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7852752B2 (en) | Method and apparatus for designing backup communication path, and computer product | |
CN101778003B (en) | The system and method preventing equipment fault impact communication | |
US8830825B2 (en) | Method and system for priority based (1:1)n ethernet protection | |
CN106471779A (en) | A kind of guard method of virtual network and device | |
Wright et al. | Cost model comparison of ZR/ZR+ modules against traditional WDM transponders for 400G IP/WDM core networks | |
CN111342889B (en) | Risk separation protection path searching method and system for safety and stability control type service | |
CN101674217A (en) | Method for realizing permanent ring network protection in MESH network | |
CN106464511A (en) | Service protecting method and device | |
CN105530133B (en) | A kind of Electric control business intelligence restoration methods | |
CN107864093A (en) | A kind of multilayer union route and Survivability Strategy based on economic factors | |
CN106685571B (en) | A kind of hybrid protection method based on recovery time sensitivity in WDM optical-fiber networks | |
CN101321124A (en) | Branch routing search recovery method of wavelength changeable optical network double-link failure | |
Machuca et al. | Assessment methodology of protection schemes for next generation optical access networks | |
CN101192961B (en) | Route method and device | |
CN103905338B (en) | The method and device that a kind of IP backbone merges | |
JP4422568B2 (en) | Optical cross-connect device and optical transmission system | |
US20090196202A1 (en) | Transmitting apparatus and path setting method | |
Silva et al. | An heuristic for maximally SRLG-disjoint path pairs calculation | |
CN101383759B (en) | Protection method dividing management region in optical network | |
CN104158740B (en) | A kind of path management method and controller | |
CN102355608A (en) | Improved method for fault recovery of multi-granularity optical network based on GMPLS | |
Shan et al. | Partial spatial protection for provisioning differentiated reliability in FSTR-based Metro Ethernet networks | |
CN109743112A (en) | OTN network-building method, device, equipment and computer readable storage medium | |
Ušćumlić et al. | The cost of traffic protection in bidirectional optical packet switching rings | |
Chen et al. | Optimal regenerator assignment and resource allocation strategies for translucent optical networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20200415 Address after: 226400 Zhongtian Industrial Zone, Hekou Town, Rudong County, Jiangsu, Nantong Patentee after: ZHONGTIAN BROADBAND TECHNOLOGY Co.,Ltd. Address before: 400065 No. 2, Chongwen Road, Nanshan street, Nan'an District, Chongqing Patentee before: CHONGQING UNIVERSITY OF POSTS AND TELECOMMUNICATIONS |