CN106685571B - A kind of hybrid protection method based on recovery time sensitivity in WDM optical-fiber networks - Google Patents

A kind of hybrid protection method based on recovery time sensitivity in WDM optical-fiber networks Download PDF

Info

Publication number
CN106685571B
CN106685571B CN201611102140.5A CN201611102140A CN106685571B CN 106685571 B CN106685571 B CN 106685571B CN 201611102140 A CN201611102140 A CN 201611102140A CN 106685571 B CN106685571 B CN 106685571B
Authority
CN
China
Prior art keywords
backup
service
access
recovery time
shared
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611102140.5A
Other languages
Chinese (zh)
Other versions
CN106685571A (en
Inventor
鲍宁海
苏国庆
陈静波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongtian Broadband Technology Co Ltd
Original Assignee
Chongqing University of Post and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University of Post and Telecommunications filed Critical Chongqing University of Post and Telecommunications
Priority to CN201611102140.5A priority Critical patent/CN106685571B/en
Publication of CN106685571A publication Critical patent/CN106685571A/en
Application granted granted Critical
Publication of CN106685571B publication Critical patent/CN106685571B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J14/00Optical multiplex systems
    • H04J14/02Wavelength-division multiplex systems
    • H04J14/0227Operation, administration, maintenance or provisioning [OAMP] of WDM networks, e.g. media access, routing or wavelength allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J14/00Optical multiplex systems
    • H04J14/02Wavelength-division multiplex systems
    • H04J14/0287Protection in WDM systems
    • H04J14/0289Optical multiplex section protection
    • H04J14/029Dedicated protection at the optical multiplex section (1+1)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J14/00Optical multiplex systems
    • H04J14/02Wavelength-division multiplex systems
    • H04J14/0287Protection in WDM systems
    • H04J14/0289Optical multiplex section protection
    • H04J14/0291Shared protection at the optical multiplex section (1:1, n:m)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J14/00Optical multiplex systems
    • H04J14/02Wavelength-division multiplex systems
    • H04J14/0287Protection in WDM systems
    • H04J14/0293Optical channel protection
    • H04J14/0294Dedicated protection at the optical channel (1+1)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J14/00Optical multiplex systems
    • H04J14/02Wavelength-division multiplex systems
    • H04J14/0287Protection in WDM systems
    • H04J14/0293Optical channel protection
    • H04J14/0295Shared protection at the optical channel (1:1, n:m)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/72Admission control; Resource allocation using reservation actions during connection setup
    • H04L47/726Reserving resources in multiple paths to be used simultaneously
    • H04L47/728Reserving resources in multiple paths to be used simultaneously for backup paths
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/78Architectures of resource allocation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Optical Communication System (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The hybrid protection method based on recovery time sensitivity in a kind of wavelength-division multiplex (WDM) optical-fiber network is claimed in the present invention, belongs to Communication Network Technique field.Recovery time constraint of this method based on service connection; for the contradiction between recovery time and resource utilization; in a manner that Shared path-protection and dedicated path-protection are combined; flexible backup or protection resource allocation proposal are provided for different grades of business; under the premise of service recovery time thresholding is met; optimize network resource utilization, the hybrid protection configuration for distinguishing restoring degree is provided for service connection.

Description

A kind of hybrid protection method based on recovery time sensitivity in WDM optical-fiber networks
Technical field
The present invention relates to Communication Network Technique fields, and in particular to based on the mixed of recovery time sensitivity in a kind of WDM optical-fiber networks Close guard method.
Background technology
In optical-fiber network as telecommunication backbone net architecture, once generating assembly failure or damage, will cause a large amount of Loss of data and service disconnection.Therefore, survivability problem is always an important subject in WDM optical-fiber networks.Network is given birth to When sustainability refers to network failure, the ability of necessary service quality can be still maintained.In the research of network survivability sex chromosome mosaicism, protect Shield technology important anti-ruin technology and is widely studied and paid close attention to as a kind of.Protection refers to be in network before failure generation Service connection reserve backup (protection) resource, when network failure, by impaired service switching to reserved protection resource On to realize the recovery of business.
There are mainly two types of path protection methods:Dedicated path-protection (DPP) and Shared path-protection (SPP).Private access Protection (DPP), which refers to, protects the reserved wavelength resource on access and the configured completions of OXC (optical cross connect) on node, and by One service connection is special and exclusively enjoys.As shown in Figure 1, access a-b-c-d is active channel of the connecting node to (a, d), access A-e-f-g-d is corresponding privacy protection access, and when the link b-c failures on active channel, node b will be to source node A sends alarm information, and starts the switching of service channel by source node a.Due to OXC on the node of backup access in privacy protection Configuration is completed in advance, and the business in working ways can be at once switched on backup access, thus service recovery time comparatively fast but Resource backup consumption is larger.The protection access that Shared path-protection (SPP) refers to certain business under given conditions can share net Reserved wavelength resource in network, but OXC need to be configured before service switching.As shown in Fig. 2, access a-b-c-d is connection Node is to the active channel of (a, d), and a-e-g-d is corresponding backup access, and access h-o-p-q is connecting node to (h, q) Active channel, h-e-g-q are corresponding backup accesses.Since two accesses of a-b-c-d and h-o-p-q detach, in single-link event Under barrier, the resource backup on link l can be connected (a, d) and connection (h, q) is shared.One on active channel a-b-c-d During link b-c failure, node b will send alarm information to source node a, and be matched by OXC on source node a triggering backup accesses It puts, then carries out the switching of service channel, therefore the smaller but service recovery time of resource backup consumption of shared protection is longer.
Since privacy protection has the characteristics that exclusive resource backup, the Internet resources of service connection configuration consumption are larger, special It is not in Internet resources scarcity, it will cause a large amount of business that can not establish connection due to a lack of enough resources.And it shares Protection has the characteristics that service switching time lag, and the interim break period of business different degrees of extension will occur, particularly For high-grade service connection, it may be difficult to ensure its corresponding SLA (service level agreement).And any of the above situations Occur, will all cause greatly to lose to user and operator.
In order to solve the contradiction of traditional privacy protection and shared protection between service recovery time, resource utilization, A kind of it is proposed that hybrid protection method based on recovery time sensitivity.Recovery time constraint of this method based on service connection, In a manner that Shared path-protection and dedicated path-protection are combined, flexible resource backup is provided for different grades of business Allocation plan under the premise of service recovery time thresholding is met, optimizes network resource utilization, differentiation is provided for service connection The hybrid protection configuration of restoring degree.
Invention content
Present invention seek to address that above problem of the prior art, it is proposed that one kind is directed to multi-link failure, when control restores Between, improve network resource utilization, the hybrid protection method of differentiated service restoring degree.Technical scheme is as follows:
A kind of hybrid protection method based on recovery time sensitivity in WDM (wavelength-division multiplex) optical-fiber network, including following step Suddenly:
101st, it is each service connection c using dijkstra's algorithm in optical-fiber network G (N, L)iFind three link disjoints Access, i.e.,:Active channel WPi, the first backup access BPi 1With the second backup access BPi 2, and BPi 2It is not shorter than BPi 1, 1≤i≤ | C |, C represents the set of all service connections in network, and N represents all node sets in network, and L represents all in network Two-way link set;
102nd, compare in optical-fiber network G (N, L) between all arbitrary accesses of service connection mutual alignment relation (including:Work Access WPi, the first backup access BPi 1With the second backup access BPi 2), obtain each service connection resource backup can shared relationship, And the first backup access BP in each service connection is calculated with thisi 1With the second backup access BPi 2Corresponding maximum recovery time RTi 1With RTi 2
103rd, according to first, second backup access can shared relationship, it is total to reference to service recovery time thresholding It enjoys or specialized configuration is set;
104th, on the arbitrary link l in optical-fiber network G (N, L), for all active channel WP by the linkiDistribution business Business bandwidth For original service bandwidth demand, l ∈ L, and use resource optimization ILP models calculate and obtain corresponding first backup Access BPi 1With the second backup access BPi 2On optimum allocation bandwidthWherein, k is the grade of service, βkFor backup access band Wide allocation proportion, and 0≤β1≤β2≤β3…≤βk≤1;
105th, on the arbitrary link l in optical-fiber network G (N, L), backup bandwidth resources are shared for related service connection distribution, MeetAndWherein, l ∈ L, k and k ' expressions are not The same grade of service, βk′And βk′Represent the backup channel bandwidth allocation proportion of different brackets business,WithRespectively pass through chain The connection c of road liWith ci′Backup bandwidth.
106th, on the arbitrary link l in optical-fiber network G (N, L), proprietary backup bandwidth resources are distributed for related service connection, MeetWherein, the different grade of service of l ∈ L, k and k ' expression, βk′And βk′Represent different The backup channel bandwidth allocation proportion of grade business,WithRespectively pass through the connection c of link liWith ci′Backup bandwidth.
Further, step 102 judges that resource backup could be shared according to the position relationship of access:
1) rule one
Position relationship:
Or:
Or
Shared relationship:
2) rule two
Position relationship:
Shared relationship:
3) rule three
Position relationship:
Or:
OrOr
Shared relationship:
4) rule four
Position relationship:
Shared relationship:
5) rule five
Position relationship:In addition to other any position relationships of more than position relationship.
Shared relationship:
Further, step 103 according to first, second backup access can shared relationship, with reference to service recovery time door Limit carries out it setting of shared or specialized configuration, specifically includes:
To any service connection ciIf the second backup access BPi 2It can share, and RTi 2≤RT0, RT0During for business recovery Between thresholding, then BP is seti 2For configuration sharing, otherwise, BP is seti 2For specialized configuration;If BPi 1It can share, and RTi 1≤RT0, BP is then seti 1For configuration sharing, otherwise, BP is seti 1For specialized configuration.
It advantages of the present invention and has the beneficial effect that:
In the present invention, for the contradiction between recovery time and resource utilization, the recovery time based on service connection is about In a manner that Shared path-protection and dedicated path-protection are combined, flexible backup money is provided for different brackets business for beam Source allocation plan under the premise of service recovery time thresholding is met, optimizes network resource utilization, area is provided for service connection Divide the hybrid protection configuration of restoring degree.
Description of the drawings
Fig. 1 is dedicated path-protection schematic diagram in the prior art;
Fig. 2 is Shared path-protection schematic diagram in the prior art;
Fig. 3 is that the present invention provides preferred embodiment business recovery process schematic;
Fig. 4 is the flow of the hybrid protection method based on recovery time sensitivity in preferred embodiment of the present invention WDM optical-fiber networks Figure.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, detailed Carefully describe.Described embodiment is only the part of the embodiment of the present invention.
The present invention solve above-mentioned technical problem technical solution be:
A non-limiting embodiment is provided below in conjunction with the accompanying drawings further to illustrate the present invention.Wherein set k= 3, that is, there is 0≤β1≤β2≤β3≤ 1, RT0=50ms.
Concept and model involved by the content of present invention is as follows:
1. impaired business recovery process
As shown in Figure 3, it is assumed that the connection of a a to d, a are source node, and d is purpose node.Recovery process is divided into two steps Suddenly:The first step, if on active channel, link b-c breaks down, then end node b and c will be first it is detected that failures, and will Failure message is sent respectively to source node a and destination node d.Second step, when source node a receives fault warning message It waits, triggers the protection handoff procedure of business.
The protection handoff procedure of business is divided into two kinds of situations:For privacy protection, source node s receives fault warning message Afterwards, along backup access a-e-f-g-d a notification message is sent to destination node d.Destination node d receive the message it Afterwards, one confirmation message of backtracking gives source node a, subsequent source node a to start access switching, so as to complete the extensive of impaired business It is multiple.For shared protection, after source node a receives fault warning message, along backup access a-e-f-g-d to destination node d Configuration message is sent, each OXC on the backup access is configured step by step, after destination node d completes corresponding configuration, former road is returned Returning a confirmation message gives source node a, subsequent source node a to start access switching, so as to complete the recovery of impaired business.
2. network model
Assuming that WDM optical network models are G (N, L), wherein N is nodes set, and L is the two-way link collection in network It closes.Each node in network has complete wavelength conversion capability, and each of the links have identical wavelength bandwidth.Network event Barrier is using single link failure and double-link failure as representative.
It is each service connection c that dijkstra's algorithm is utilized in G (N, L)i(1≤i≤| C |) find three link disjoints Access, i.e.,:Active channel WPi, the first backup access BPi 1With the second backup access BPi 2, and BPi 2It is not shorter than BPi 1
3. recovery time model
When recovery time refers to network failure, it will be spent in the impaired service switching in network to backup (protection) access The time taken.Related symbol is defined as follows:
FT:Detect the time of a failure;
DT:On one node, the time of signal processing;
PT:The time that signal is propagated on a Tiao Lian roads;
CT:The time of OXC configurations;
m:Hop count on active channel;
n:Hop count on backup access;
Connect ciMaximum traffic recovery time.
The maximum traffic recovery time of privacy protection is calculated as shown in formula (1), shares the maximum traffic recovery time of protection It calculates as shown in formula (2).
Technical scheme of the present invention is described as follows:
The present invention is a kind of protection scheme based on recovery time sensitivity applied to WDM optical-fiber networks.
1. protect access secret sharing:
Related symbol explanation:
l:A bidirectional fiber link in network G (N, L);
WPiOr WPi′:The active channel of service connection i and i ';
BPi 1OrCorresponding to WPiOr WPi′The first backup access, i.e. WPiOr WPi′After failure, business will preferentially be cut Change to the backup access;
BPi 2OrCorresponding to WPiOr WPi′The second backup access, i.e. WPiOr WPi′Failure, and BPi 1OrAlso it loses During effect, business will be switched to the backup access;
Represent there is one or more link to overlap mutually between access A and access B;
Represent there is no link to overlap mutually between access A and access B;
(A, B)=0:Represent that access A and access B cannot share resource backup;
(A, B)=1:Represent that access A and access B can share resource backup;
RTiOr RTi':The maximum recovery time of service connection i or i ';
RT0:Service recovery time thresholding, such as:50ms.
Whether the protection access of service connection can use resource-sharing allocation plan in the present invention, will depend on two items Part, i.e.,:Judge that resource backup could be shared according to the position relationship of each access first;Then under the shared relationship, industry is calculated Can whether the maximum recovery time of business be less than the thresholding of setting, to determine use the configuration sharing.
Judge that resource backup could be shared according to the position relationship of access:
6) rule one
Position relationship:
Or:
OrOr
Shared relationship:
7) rule two
Position relationship:
Shared relationship:
8) rule three
Position relationship:
Or:
OrOr
Shared relationship:
9) rule four
Position relationship:
Shared relationship:
10) rule five
Position relationship:In addition to other any position relationships of more than position relationship.
Shared relationship:
According to above shared rule, obtain between each service channel can shared relationship, and calculate each business under the relationship The maximum recovery time of connection, and then judge that corresponding configuration sharing can be used:
The first step:If BPi 2It can share, calculate corresponding maximum recovery time RTi 2
Second step:If RTi 2≤RT0, then BPi 2Configuration sharing can be used, otherwise using specialized configuration;
Third walks:If BPi 1It can share, calculate corresponding maximum recovery time RTi 1
4th step:If RTi 1≤RT0, then BPi 1Configuration sharing can be used, otherwise using specialized configuration;
2. bandwidth resources allocation plan
To realize the allocation optimum of bandwidth resources, the present invention uses ILP optimal models to connect for all business in network Connect the corresponding bandwidth of operation of distribution and backup bandwidth.Concrete model design is as follows:
Input:
·G(N,L):N={ n } is node set, and L={ l } is two-way link set;
·C:Service connection request set { ci}(1≤i≤|C|);
·The set for all connections that backup access passes through link l;
·W:The bandwidth capacity of each of the links, i.e., total number of wavelengths;
·Connect ciOperating bandwidth requirement;
·k:Connect ciThe grade of service.K={ 1,2,3 } is set in the present embodiment, wherein, 1 represents general service, and 2 represent Higher level service, 3 represent urgency traffic;
· Represent connection ciBackup access j with connecting ci′Backup access q share bandwidth resources, it is no Then, it does not share;
Output:
·Connect ciThe assignment bandwidth on link l;
·Connect ciThe backup bandwidth distributed on link l;
·βk:The backup bandwidth allocation proportion of k class business;
Object function:
In formula (3), by maximizing β1, β2, β3, all kinds of business is made to obtain more protection resource distributions, and select suitably Weight coefficient (such as:100,70,50) can be preferably, then that high-grade business provides more under limited network resource conditions Protection resource, and provide higher business recovery degree guarantee.By limiting each link backup resource B to a certain extentl's Consumption promotes the shared of resource backup, to realize the optimization of total network resource.
Constraints:
Formula (4) ensures connection ciAssignment bandwidth meets original bandwidth requirements.
0≤β1≤β2≤β3≤1 (5)
Formula (5) ensures that high-grade business preferentially obtains more resource backup.
Q=1or 2, j=1or 2
Formula (6) provides Spare Capacity Sharing constraint.
Formula (7) limits the bandwidth resources amount distributed on link l and is no more than link capacity.
A kind of hybrid protection method based on recovery time sensitivity in WDM optical-fiber networks, specific implementation method include as follows Step:
101st, it is each service connection c using dijkstra's algorithm in optical-fiber network G (N, L)iFind three link disjoints Access, i.e.,:Active channel WPi, the first backup access BPi 1With the second backup access BPi 2, and BPi 2It is not shorter than BPi 1, 1≤i≤ | C |, C represents the set of all service connections in network, and N represents all node sets in network, and L represents all in network Two-way link set;
102nd, compare in optical-fiber network G (N, L) between all arbitrary accesses of service connection mutual alignment relation (including:Work Access WPi, the first backup access BPi 1With the second backup access BPi 2), obtain each service connection resource backup can shared relationship, And the first backup access BP in each service connection is calculated with thisi 1With the second backup access BPi 2Corresponding maximum recovery time RTi 1With RTi 2
103rd, to any service connection ciIf BPi 2It can share, and RTi 2≤RT0(RT0For service recovery time thresholding), BP is then seti 2For configuration sharing, otherwise, BP is seti 2For specialized configuration;If BPi 1It can share, and RTi 1≤RT0, then set BPi 1For configuration sharing, otherwise, BP is seti 1For specialized configuration;
104th, on the arbitrary link l in optical-fiber network G (N, L), for all active channel WP by the linkiDistribution business Business bandwidth For original service bandwidth demand, l ∈ L, and use resource optimization ILP models calculate and obtain corresponding first backup Access BPi 1With the second backup access BPi 2On optimum allocation bandwidthWherein, k is the grade of service, βkFor backup access band Wide allocation proportion, and 0≤β1≤β2≤β3…≤βk≤1;
105th, on the arbitrary link l in optical-fiber network G (N, L), backup bandwidth resources are shared for related service connection distribution, MeetAndWherein, l ∈ L, k and k ' expressions are not The same grade of service, βk′And βk′Represent the backup channel bandwidth allocation proportion of different brackets business,WithRespectively pass through chain The connection c of road liWith ci′Backup bandwidth.
106th, on the arbitrary link l in optical-fiber network G (N, L), proprietary backup bandwidth resources are distributed for related service connection, MeetWherein, the different grade of service of l ∈ L, k and k ' expression, βk′And βk′Represent different The backup channel bandwidth allocation proportion of grade business,WithRespectively pass through the connection c of link liWith ci′Backup bandwidth.
The above embodiment is interpreted as being merely to illustrate the present invention rather than limit the scope of the invention. After the content for having read the record of the present invention, technical staff can make various changes or modifications the present invention, these equivalent changes Change and modification equally falls into the scope of the claims in the present invention.

Claims (3)

1. a kind of hybrid protection method based on recovery time sensitivity in WDM optical-fiber networks, which is characterized in that include the following steps:
101st, it is each service connection c using dijkstra's algorithm in optical-fiber network G (N, L)iFind the logical of three link disjoints Road, i.e.,:Active channel WPi, the first backup access BPi 1With the second backup access BPi 2, and BPi 2It is not shorter than BPi 1, 1≤i≤| C |, C represents the set of all service connections in network, and N represents all node sets in network, and L represents all two-way in network Link set;
102nd, compare the mutual alignment relation between all arbitrary accesses of service connection in optical-fiber network G (N, L), wherein arbitrary access packet Include active channel WPi, the first backup access BPi 1With the second backup access BPi 2, obtain sharing for each service connection resource backup Relationship, and the first backup access BP in each service connection is calculated with thisi 1With the second backup access BPi 2Corresponding maximum recovery Time RTi 1With RTi 2
103rd, according to first, second backup access can shared relationship, it is carried out with reference to service recovery time thresholding it is shared or Specialized configuration is set;
104th, on the arbitrary link l in optical-fiber network G (N, L), for all active channel WP by the linkiDistribution business band It is wide For original service bandwidth demand, l ∈ L, and use resource optimization integral linear programming model are calculated and are obtained corresponding the One backup access BPi 1With the second backup access BPi 2On optimum allocation bandwidthWherein, k is the grade of service, βkIt is standby Part channel bandwidth allocation proportion, and 0≤β1≤β2≤β3…≤βk≤1;
105th, on the arbitrary link l in optical-fiber network G (N, L), for the shared backup bandwidth resources of related service connection distribution, meetAndWherein, l ∈ L, k and k ' expression are different The grade of service, βkAnd βk′Represent the backup channel bandwidth allocation proportion of different brackets business,WithRespectively pass through link l Connection ciWith ci′Backup bandwidth;
106th, on the arbitrary link l in optical-fiber network G (N, L), for related service connection distribution proprietary backup bandwidth resources, meetWherein, the different grade of service of l ∈ L, k and k ' expression, βkAnd βk′Represent different brackets industry The backup channel bandwidth allocation proportion of business,WithRespectively pass through the connection c of link liWith ci′Backup bandwidth.
2. the hybrid protection method based on recovery time sensitivity in WDM optical-fiber networks according to claim 1, feature exist In step 102 judges that resource backup could be shared and pass through rule according to the mutual alignment relation between the arbitrary access of all service connections Then any rule in one to five is judged:
Rule one
Position relationship:
Or:
OrOr
Shared relationship:
1) rule two
Position relationship:
Shared relationship:
2) rule three
Position relationship:
Or:
OrOr
Shared relationship:
3) rule four
Position relationship:
Shared relationship:
4) rule five
Position relationship:In addition to other any position relationships of more than position relationship;
Shared relationship:
3. the hybrid protection method based on recovery time sensitivity in WDM optical-fiber networks according to claim 1 or 2, feature Be, step 103 according to first, second backup access can shared relationship, it is total to reference to service recovery time thresholding It enjoys or specialized configuration is set, specifically include:
To any service connection ciIf the second backup access BPi 2It can share, and RTi 2≤RT0, RT0For service recovery time door Limit, then set BPi 2For configuration sharing, otherwise, BP is seti 2For specialized configuration;If BPi 1It can share, and RTi 1≤RT0, then set Put BPi 1For configuration sharing, otherwise, BP is seti 1For specialized configuration.
CN201611102140.5A 2016-12-05 2016-12-05 A kind of hybrid protection method based on recovery time sensitivity in WDM optical-fiber networks Active CN106685571B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611102140.5A CN106685571B (en) 2016-12-05 2016-12-05 A kind of hybrid protection method based on recovery time sensitivity in WDM optical-fiber networks

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611102140.5A CN106685571B (en) 2016-12-05 2016-12-05 A kind of hybrid protection method based on recovery time sensitivity in WDM optical-fiber networks

Publications (2)

Publication Number Publication Date
CN106685571A CN106685571A (en) 2017-05-17
CN106685571B true CN106685571B (en) 2018-06-15

Family

ID=58866395

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611102140.5A Active CN106685571B (en) 2016-12-05 2016-12-05 A kind of hybrid protection method based on recovery time sensitivity in WDM optical-fiber networks

Country Status (1)

Country Link
CN (1) CN106685571B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101155433A (en) * 2006-09-30 2008-04-02 华为技术有限公司 Service protection method and routing device
CN102186124A (en) * 2011-04-29 2011-09-14 东北大学 Utility-based interlayer coordination method in WDM (Wavelength Division Multiplexing) optical network

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102487466B (en) * 2010-12-03 2015-08-12 中兴通讯股份有限公司 The method and system of the transmission data under a kind of full guard pattern in EPON
US8718039B2 (en) * 2011-12-22 2014-05-06 Tt Government Solutions, Inc. Signaling protocol for multi-domain optical networks
CN104080112B (en) * 2014-07-17 2017-11-07 重庆邮电大学 A kind of method for improving wireless self-organization network service reliability

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101155433A (en) * 2006-09-30 2008-04-02 华为技术有限公司 Service protection method and routing device
CN102186124A (en) * 2011-04-29 2011-09-14 东北大学 Utility-based interlayer coordination method in WDM (Wavelength Division Multiplexing) optical network

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
On Exploiting Sharable Resources With Resource Contention Resolution for Surviving Double-Link Failures in Optical Mesh Networks;Ning-Hai Bao 等;《JOURNAL OF LIGHTWAVE TECHNOLOGY》;20120711;第30卷(第17期);全文 *
一种基于区分业务等级的光网络共享通路保护算法;梁俊 等;《光通信研究》;20130321(第2期);全文 *

Also Published As

Publication number Publication date
CN106685571A (en) 2017-05-17

Similar Documents

Publication Publication Date Title
CN104488238B (en) The system and method controlled for cluster link aggregation in network environment
Ju et al. Power-efficient protection with directed $ p $-cycles for asymmetric traffic in elastic optical networks
US8830825B2 (en) Method and system for priority based (1:1)n ethernet protection
Zhong et al. On QoS-assured degraded provisioning in service-differentiated multi-layer elastic optical networks
CN111342889B (en) Risk separation protection path searching method and system for safety and stability control type service
CN106992810A (en) Consider the shared protection route and frequency spectrum distributing method of joint probability of malfunction constraint
CN102480368B (en) Protecting method and system of aggregation link
CN106471779A (en) A kind of guard method of virtual network and device
Wright et al. Cost model comparison of ZR/ZR+ modules against traditional WDM transponders for 400G IP/WDM core networks
CN106998295B (en) Optimized routing and spectrum allocation method and system based on special protection combined fault probability constraint
CN103532872B (en) Reduce method and router that link state data bag floods
CN103581006A (en) System architecture for global optimization of flexible grid optical networks and global optimization method thereof
CN106685571B (en) A kind of hybrid protection method based on recovery time sensitivity in WDM optical-fiber networks
CN101547382B (en) Separation method for active-Standby service resource of different source and sink for grid network
CN107864093A (en) A kind of multilayer union route and Survivability Strategy based on economic factors
WO2023246081A1 (en) Optical network fault analysis method and apparatus
CN101321124A (en) Branch routing search recovery method of wavelength changeable optical network double-link failure
CN101192961B (en) Route method and device
WO2023004903A1 (en) Crosstalk sensing-based dedicated protection spectrum allocation method and system
CN103001876B (en) Bearer network flow optimizing method, router, optimizing server and bearer network system
CN109842522A (en) Communicate the configuration method and system of route resource
Silva et al. An heuristic for maximally SRLG-disjoint path pairs calculation
CN104158740B (en) A kind of path management method and controller
CN102355608A (en) Improved method for fault recovery of multi-granularity optical network based on GMPLS
Shan et al. Partial spatial protection for provisioning differentiated reliability in FSTR-based Metro Ethernet networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200415

Address after: 226400 Zhongtian Industrial Zone, Hekou Town, Rudong County, Jiangsu, Nantong

Patentee after: ZHONGTIAN BROADBAND TECHNOLOGY Co.,Ltd.

Address before: 400065 No. 2, Chongwen Road, Nanshan street, Nan'an District, Chongqing

Patentee before: CHONGQING UNIVERSITY OF POSTS AND TELECOMMUNICATIONS