CN106685571B - A kind of hybrid protection method based on recovery time sensitivity in WDM optical-fiber networks - Google Patents
A kind of hybrid protection method based on recovery time sensitivity in WDM optical-fiber networks Download PDFInfo
- Publication number
- CN106685571B CN106685571B CN201611102140.5A CN201611102140A CN106685571B CN 106685571 B CN106685571 B CN 106685571B CN 201611102140 A CN201611102140 A CN 201611102140A CN 106685571 B CN106685571 B CN 106685571B
- Authority
- CN
- China
- Prior art keywords
- backup
- service
- access
- recovery time
- shared
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04J—MULTIPLEX COMMUNICATION
- H04J14/00—Optical multiplex systems
- H04J14/02—Wavelength-division multiplex systems
- H04J14/0227—Operation, administration, maintenance or provisioning [OAMP] of WDM networks, e.g. media access, routing or wavelength allocation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04J—MULTIPLEX COMMUNICATION
- H04J14/00—Optical multiplex systems
- H04J14/02—Wavelength-division multiplex systems
- H04J14/0287—Protection in WDM systems
- H04J14/0289—Optical multiplex section protection
- H04J14/029—Dedicated protection at the optical multiplex section (1+1)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04J—MULTIPLEX COMMUNICATION
- H04J14/00—Optical multiplex systems
- H04J14/02—Wavelength-division multiplex systems
- H04J14/0287—Protection in WDM systems
- H04J14/0289—Optical multiplex section protection
- H04J14/0291—Shared protection at the optical multiplex section (1:1, n:m)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04J—MULTIPLEX COMMUNICATION
- H04J14/00—Optical multiplex systems
- H04J14/02—Wavelength-division multiplex systems
- H04J14/0287—Protection in WDM systems
- H04J14/0293—Optical channel protection
- H04J14/0294—Dedicated protection at the optical channel (1+1)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04J—MULTIPLEX COMMUNICATION
- H04J14/00—Optical multiplex systems
- H04J14/02—Wavelength-division multiplex systems
- H04J14/0287—Protection in WDM systems
- H04J14/0293—Optical channel protection
- H04J14/0295—Shared protection at the optical channel (1:1, n:m)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
- H04L47/72—Admission control; Resource allocation using reservation actions during connection setup
- H04L47/726—Reserving resources in multiple paths to be used simultaneously
- H04L47/728—Reserving resources in multiple paths to be used simultaneously for backup paths
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
- H04L47/78—Architectures of resource allocation
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Optical Communication System (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The hybrid protection method based on recovery time sensitivity in a kind of wavelength-division multiplex (WDM) optical-fiber network is claimed in the present invention, belongs to Communication Network Technique field.Recovery time constraint of this method based on service connection; for the contradiction between recovery time and resource utilization; in a manner that Shared path-protection and dedicated path-protection are combined; flexible backup or protection resource allocation proposal are provided for different grades of business; under the premise of service recovery time thresholding is met; optimize network resource utilization, the hybrid protection configuration for distinguishing restoring degree is provided for service connection.
Description
Technical field
The present invention relates to Communication Network Technique fields, and in particular to based on the mixed of recovery time sensitivity in a kind of WDM optical-fiber networks
Close guard method.
Background technology
In optical-fiber network as telecommunication backbone net architecture, once generating assembly failure or damage, will cause a large amount of
Loss of data and service disconnection.Therefore, survivability problem is always an important subject in WDM optical-fiber networks.Network is given birth to
When sustainability refers to network failure, the ability of necessary service quality can be still maintained.In the research of network survivability sex chromosome mosaicism, protect
Shield technology important anti-ruin technology and is widely studied and paid close attention to as a kind of.Protection refers to be in network before failure generation
Service connection reserve backup (protection) resource, when network failure, by impaired service switching to reserved protection resource
On to realize the recovery of business.
There are mainly two types of path protection methods:Dedicated path-protection (DPP) and Shared path-protection (SPP).Private access
Protection (DPP), which refers to, protects the reserved wavelength resource on access and the configured completions of OXC (optical cross connect) on node, and by
One service connection is special and exclusively enjoys.As shown in Figure 1, access a-b-c-d is active channel of the connecting node to (a, d), access
A-e-f-g-d is corresponding privacy protection access, and when the link b-c failures on active channel, node b will be to source node
A sends alarm information, and starts the switching of service channel by source node a.Due to OXC on the node of backup access in privacy protection
Configuration is completed in advance, and the business in working ways can be at once switched on backup access, thus service recovery time comparatively fast but
Resource backup consumption is larger.The protection access that Shared path-protection (SPP) refers to certain business under given conditions can share net
Reserved wavelength resource in network, but OXC need to be configured before service switching.As shown in Fig. 2, access a-b-c-d is connection
Node is to the active channel of (a, d), and a-e-g-d is corresponding backup access, and access h-o-p-q is connecting node to (h, q)
Active channel, h-e-g-q are corresponding backup accesses.Since two accesses of a-b-c-d and h-o-p-q detach, in single-link event
Under barrier, the resource backup on link l can be connected (a, d) and connection (h, q) is shared.One on active channel a-b-c-d
During link b-c failure, node b will send alarm information to source node a, and be matched by OXC on source node a triggering backup accesses
It puts, then carries out the switching of service channel, therefore the smaller but service recovery time of resource backup consumption of shared protection is longer.
Since privacy protection has the characteristics that exclusive resource backup, the Internet resources of service connection configuration consumption are larger, special
It is not in Internet resources scarcity, it will cause a large amount of business that can not establish connection due to a lack of enough resources.And it shares
Protection has the characteristics that service switching time lag, and the interim break period of business different degrees of extension will occur, particularly
For high-grade service connection, it may be difficult to ensure its corresponding SLA (service level agreement).And any of the above situations
Occur, will all cause greatly to lose to user and operator.
In order to solve the contradiction of traditional privacy protection and shared protection between service recovery time, resource utilization,
A kind of it is proposed that hybrid protection method based on recovery time sensitivity.Recovery time constraint of this method based on service connection,
In a manner that Shared path-protection and dedicated path-protection are combined, flexible resource backup is provided for different grades of business
Allocation plan under the premise of service recovery time thresholding is met, optimizes network resource utilization, differentiation is provided for service connection
The hybrid protection configuration of restoring degree.
Invention content
Present invention seek to address that above problem of the prior art, it is proposed that one kind is directed to multi-link failure, when control restores
Between, improve network resource utilization, the hybrid protection method of differentiated service restoring degree.Technical scheme is as follows:
A kind of hybrid protection method based on recovery time sensitivity in WDM (wavelength-division multiplex) optical-fiber network, including following step
Suddenly:
101st, it is each service connection c using dijkstra's algorithm in optical-fiber network G (N, L)iFind three link disjoints
Access, i.e.,:Active channel WPi, the first backup access BPi 1With the second backup access BPi 2, and BPi 2It is not shorter than BPi 1, 1≤i≤
| C |, C represents the set of all service connections in network, and N represents all node sets in network, and L represents all in network
Two-way link set;
102nd, compare in optical-fiber network G (N, L) between all arbitrary accesses of service connection mutual alignment relation (including:Work
Access WPi, the first backup access BPi 1With the second backup access BPi 2), obtain each service connection resource backup can shared relationship,
And the first backup access BP in each service connection is calculated with thisi 1With the second backup access BPi 2Corresponding maximum recovery time
RTi 1With RTi 2;
103rd, according to first, second backup access can shared relationship, it is total to reference to service recovery time thresholding
It enjoys or specialized configuration is set;
104th, on the arbitrary link l in optical-fiber network G (N, L), for all active channel WP by the linkiDistribution business
Business bandwidth For original service bandwidth demand, l ∈ L, and use resource optimization ILP models calculate and obtain corresponding first backup
Access BPi 1With the second backup access BPi 2On optimum allocation bandwidthWherein, k is the grade of service, βkFor backup access band
Wide allocation proportion, and 0≤β1≤β2≤β3…≤βk≤1;
105th, on the arbitrary link l in optical-fiber network G (N, L), backup bandwidth resources are shared for related service connection distribution,
MeetAndWherein, l ∈ L, k and k ' expressions are not
The same grade of service, βk′And βk′Represent the backup channel bandwidth allocation proportion of different brackets business,WithRespectively pass through chain
The connection c of road liWith ci′Backup bandwidth.
106th, on the arbitrary link l in optical-fiber network G (N, L), proprietary backup bandwidth resources are distributed for related service connection,
MeetWherein, the different grade of service of l ∈ L, k and k ' expression, βk′And βk′Represent different
The backup channel bandwidth allocation proportion of grade business,WithRespectively pass through the connection c of link liWith ci′Backup bandwidth.
Further, step 102 judges that resource backup could be shared according to the position relationship of access:
1) rule one
Position relationship:
Or:
Or
Shared relationship:
2) rule two
Position relationship:
Shared relationship:
3) rule three
Position relationship:
Or:
OrOr
Shared relationship:
4) rule four
Position relationship:
Shared relationship:
5) rule five
Position relationship:In addition to other any position relationships of more than position relationship.
Shared relationship:
Further, step 103 according to first, second backup access can shared relationship, with reference to service recovery time door
Limit carries out it setting of shared or specialized configuration, specifically includes:
To any service connection ciIf the second backup access BPi 2It can share, and RTi 2≤RT0, RT0During for business recovery
Between thresholding, then BP is seti 2For configuration sharing, otherwise, BP is seti 2For specialized configuration;If BPi 1It can share, and RTi 1≤RT0,
BP is then seti 1For configuration sharing, otherwise, BP is seti 1For specialized configuration.
It advantages of the present invention and has the beneficial effect that:
In the present invention, for the contradiction between recovery time and resource utilization, the recovery time based on service connection is about
In a manner that Shared path-protection and dedicated path-protection are combined, flexible backup money is provided for different brackets business for beam
Source allocation plan under the premise of service recovery time thresholding is met, optimizes network resource utilization, area is provided for service connection
Divide the hybrid protection configuration of restoring degree.
Description of the drawings
Fig. 1 is dedicated path-protection schematic diagram in the prior art;
Fig. 2 is Shared path-protection schematic diagram in the prior art;
Fig. 3 is that the present invention provides preferred embodiment business recovery process schematic;
Fig. 4 is the flow of the hybrid protection method based on recovery time sensitivity in preferred embodiment of the present invention WDM optical-fiber networks
Figure.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, detailed
Carefully describe.Described embodiment is only the part of the embodiment of the present invention.
The present invention solve above-mentioned technical problem technical solution be:
A non-limiting embodiment is provided below in conjunction with the accompanying drawings further to illustrate the present invention.Wherein set k=
3, that is, there is 0≤β1≤β2≤β3≤ 1, RT0=50ms.
Concept and model involved by the content of present invention is as follows:
1. impaired business recovery process
As shown in Figure 3, it is assumed that the connection of a a to d, a are source node, and d is purpose node.Recovery process is divided into two steps
Suddenly:The first step, if on active channel, link b-c breaks down, then end node b and c will be first it is detected that failures, and will
Failure message is sent respectively to source node a and destination node d.Second step, when source node a receives fault warning message
It waits, triggers the protection handoff procedure of business.
The protection handoff procedure of business is divided into two kinds of situations:For privacy protection, source node s receives fault warning message
Afterwards, along backup access a-e-f-g-d a notification message is sent to destination node d.Destination node d receive the message it
Afterwards, one confirmation message of backtracking gives source node a, subsequent source node a to start access switching, so as to complete the extensive of impaired business
It is multiple.For shared protection, after source node a receives fault warning message, along backup access a-e-f-g-d to destination node d
Configuration message is sent, each OXC on the backup access is configured step by step, after destination node d completes corresponding configuration, former road is returned
Returning a confirmation message gives source node a, subsequent source node a to start access switching, so as to complete the recovery of impaired business.
2. network model
Assuming that WDM optical network models are G (N, L), wherein N is nodes set, and L is the two-way link collection in network
It closes.Each node in network has complete wavelength conversion capability, and each of the links have identical wavelength bandwidth.Network event
Barrier is using single link failure and double-link failure as representative.
It is each service connection c that dijkstra's algorithm is utilized in G (N, L)i(1≤i≤| C |) find three link disjoints
Access, i.e.,:Active channel WPi, the first backup access BPi 1With the second backup access BPi 2, and BPi 2It is not shorter than BPi 1。
3. recovery time model
When recovery time refers to network failure, it will be spent in the impaired service switching in network to backup (protection) access
The time taken.Related symbol is defined as follows:
FT:Detect the time of a failure;
DT:On one node, the time of signal processing;
PT:The time that signal is propagated on a Tiao Lian roads;
CT:The time of OXC configurations;
m:Hop count on active channel;
n:Hop count on backup access;
Connect ciMaximum traffic recovery time.
The maximum traffic recovery time of privacy protection is calculated as shown in formula (1), shares the maximum traffic recovery time of protection
It calculates as shown in formula (2).
Technical scheme of the present invention is described as follows:
The present invention is a kind of protection scheme based on recovery time sensitivity applied to WDM optical-fiber networks.
1. protect access secret sharing:
Related symbol explanation:
l:A bidirectional fiber link in network G (N, L);
WPiOr WPi′:The active channel of service connection i and i ';
BPi 1OrCorresponding to WPiOr WPi′The first backup access, i.e. WPiOr WPi′After failure, business will preferentially be cut
Change to the backup access;
BPi 2OrCorresponding to WPiOr WPi′The second backup access, i.e. WPiOr WPi′Failure, and BPi 1OrAlso it loses
During effect, business will be switched to the backup access;
Represent there is one or more link to overlap mutually between access A and access B;
Represent there is no link to overlap mutually between access A and access B;
(A, B)=0:Represent that access A and access B cannot share resource backup;
(A, B)=1:Represent that access A and access B can share resource backup;
RTiOr RTi':The maximum recovery time of service connection i or i ';
RT0:Service recovery time thresholding, such as:50ms.
Whether the protection access of service connection can use resource-sharing allocation plan in the present invention, will depend on two items
Part, i.e.,:Judge that resource backup could be shared according to the position relationship of each access first;Then under the shared relationship, industry is calculated
Can whether the maximum recovery time of business be less than the thresholding of setting, to determine use the configuration sharing.
Judge that resource backup could be shared according to the position relationship of access:
6) rule one
Position relationship:
Or:
OrOr
Shared relationship:
7) rule two
Position relationship:
Shared relationship:
8) rule three
Position relationship:
Or:
OrOr
Shared relationship:
9) rule four
Position relationship:
Shared relationship:
10) rule five
Position relationship:In addition to other any position relationships of more than position relationship.
Shared relationship:
According to above shared rule, obtain between each service channel can shared relationship, and calculate each business under the relationship
The maximum recovery time of connection, and then judge that corresponding configuration sharing can be used:
The first step:If BPi 2It can share, calculate corresponding maximum recovery time RTi 2;
Second step:If RTi 2≤RT0, then BPi 2Configuration sharing can be used, otherwise using specialized configuration;
Third walks:If BPi 1It can share, calculate corresponding maximum recovery time RTi 1;
4th step:If RTi 1≤RT0, then BPi 1Configuration sharing can be used, otherwise using specialized configuration;
2. bandwidth resources allocation plan
To realize the allocation optimum of bandwidth resources, the present invention uses ILP optimal models to connect for all business in network
Connect the corresponding bandwidth of operation of distribution and backup bandwidth.Concrete model design is as follows:
Input:
·G(N,L):N={ n } is node set, and L={ l } is two-way link set;
·C:Service connection request set { ci}(1≤i≤|C|);
·The set for all connections that backup access passes through link l;
·W:The bandwidth capacity of each of the links, i.e., total number of wavelengths;
·Connect ciOperating bandwidth requirement;
·k:Connect ciThe grade of service.K={ 1,2,3 } is set in the present embodiment, wherein, 1 represents general service, and 2 represent
Higher level service, 3 represent urgency traffic;
· Represent connection ciBackup access j with connecting ci′Backup access q share bandwidth resources, it is no
Then, it does not share;
Output:
·Connect ciThe assignment bandwidth on link l;
·Connect ciThe backup bandwidth distributed on link l;
·βk:The backup bandwidth allocation proportion of k class business;
Object function:
In formula (3), by maximizing β1, β2, β3, all kinds of business is made to obtain more protection resource distributions, and select suitably
Weight coefficient (such as:100,70,50) can be preferably, then that high-grade business provides more under limited network resource conditions
Protection resource, and provide higher business recovery degree guarantee.By limiting each link backup resource B to a certain extentl's
Consumption promotes the shared of resource backup, to realize the optimization of total network resource.
Constraints:
Formula (4) ensures connection ciAssignment bandwidth meets original bandwidth requirements.
0≤β1≤β2≤β3≤1 (5)
Formula (5) ensures that high-grade business preferentially obtains more resource backup.
Q=1or 2, j=1or 2
Formula (6) provides Spare Capacity Sharing constraint.
Formula (7) limits the bandwidth resources amount distributed on link l and is no more than link capacity.
A kind of hybrid protection method based on recovery time sensitivity in WDM optical-fiber networks, specific implementation method include as follows
Step:
101st, it is each service connection c using dijkstra's algorithm in optical-fiber network G (N, L)iFind three link disjoints
Access, i.e.,:Active channel WPi, the first backup access BPi 1With the second backup access BPi 2, and BPi 2It is not shorter than BPi 1, 1≤i≤
| C |, C represents the set of all service connections in network, and N represents all node sets in network, and L represents all in network
Two-way link set;
102nd, compare in optical-fiber network G (N, L) between all arbitrary accesses of service connection mutual alignment relation (including:Work
Access WPi, the first backup access BPi 1With the second backup access BPi 2), obtain each service connection resource backup can shared relationship,
And the first backup access BP in each service connection is calculated with thisi 1With the second backup access BPi 2Corresponding maximum recovery time
RTi 1With RTi 2;
103rd, to any service connection ciIf BPi 2It can share, and RTi 2≤RT0(RT0For service recovery time thresholding),
BP is then seti 2For configuration sharing, otherwise, BP is seti 2For specialized configuration;If BPi 1It can share, and RTi 1≤RT0, then set
BPi 1For configuration sharing, otherwise, BP is seti 1For specialized configuration;
104th, on the arbitrary link l in optical-fiber network G (N, L), for all active channel WP by the linkiDistribution business
Business bandwidth For original service bandwidth demand, l ∈ L, and use resource optimization ILP models calculate and obtain corresponding first backup
Access BPi 1With the second backup access BPi 2On optimum allocation bandwidthWherein, k is the grade of service, βkFor backup access band
Wide allocation proportion, and 0≤β1≤β2≤β3…≤βk≤1;
105th, on the arbitrary link l in optical-fiber network G (N, L), backup bandwidth resources are shared for related service connection distribution,
MeetAndWherein, l ∈ L, k and k ' expressions are not
The same grade of service, βk′And βk′Represent the backup channel bandwidth allocation proportion of different brackets business,WithRespectively pass through chain
The connection c of road liWith ci′Backup bandwidth.
106th, on the arbitrary link l in optical-fiber network G (N, L), proprietary backup bandwidth resources are distributed for related service connection,
MeetWherein, the different grade of service of l ∈ L, k and k ' expression, βk′And βk′Represent different
The backup channel bandwidth allocation proportion of grade business,WithRespectively pass through the connection c of link liWith ci′Backup bandwidth.
The above embodiment is interpreted as being merely to illustrate the present invention rather than limit the scope of the invention.
After the content for having read the record of the present invention, technical staff can make various changes or modifications the present invention, these equivalent changes
Change and modification equally falls into the scope of the claims in the present invention.
Claims (3)
1. a kind of hybrid protection method based on recovery time sensitivity in WDM optical-fiber networks, which is characterized in that include the following steps:
101st, it is each service connection c using dijkstra's algorithm in optical-fiber network G (N, L)iFind the logical of three link disjoints
Road, i.e.,:Active channel WPi, the first backup access BPi 1With the second backup access BPi 2, and BPi 2It is not shorter than BPi 1, 1≤i≤| C |,
C represents the set of all service connections in network, and N represents all node sets in network, and L represents all two-way in network
Link set;
102nd, compare the mutual alignment relation between all arbitrary accesses of service connection in optical-fiber network G (N, L), wherein arbitrary access packet
Include active channel WPi, the first backup access BPi 1With the second backup access BPi 2, obtain sharing for each service connection resource backup
Relationship, and the first backup access BP in each service connection is calculated with thisi 1With the second backup access BPi 2Corresponding maximum recovery
Time RTi 1With RTi 2;
103rd, according to first, second backup access can shared relationship, it is carried out with reference to service recovery time thresholding it is shared or
Specialized configuration is set;
104th, on the arbitrary link l in optical-fiber network G (N, L), for all active channel WP by the linkiDistribution business band
It is wide For original service bandwidth demand, l ∈ L, and use resource optimization integral linear programming model are calculated and are obtained corresponding the
One backup access BPi 1With the second backup access BPi 2On optimum allocation bandwidthWherein, k is the grade of service, βkIt is standby
Part channel bandwidth allocation proportion, and 0≤β1≤β2≤β3…≤βk≤1;
105th, on the arbitrary link l in optical-fiber network G (N, L), for the shared backup bandwidth resources of related service connection distribution, meetAndWherein, l ∈ L, k and k ' expression are different
The grade of service, βkAnd βk′Represent the backup channel bandwidth allocation proportion of different brackets business,WithRespectively pass through link l
Connection ciWith ci′Backup bandwidth;
106th, on the arbitrary link l in optical-fiber network G (N, L), for related service connection distribution proprietary backup bandwidth resources, meetWherein, the different grade of service of l ∈ L, k and k ' expression, βkAnd βk′Represent different brackets industry
The backup channel bandwidth allocation proportion of business,WithRespectively pass through the connection c of link liWith ci′Backup bandwidth.
2. the hybrid protection method based on recovery time sensitivity in WDM optical-fiber networks according to claim 1, feature exist
In step 102 judges that resource backup could be shared and pass through rule according to the mutual alignment relation between the arbitrary access of all service connections
Then any rule in one to five is judged:
Rule one
Position relationship:
Or:
OrOr
Shared relationship:
1) rule two
Position relationship:
Shared relationship:
2) rule three
Position relationship:
Or:
OrOr
Shared relationship:
3) rule four
Position relationship:
Shared relationship:
4) rule five
Position relationship:In addition to other any position relationships of more than position relationship;
Shared relationship:
3. the hybrid protection method based on recovery time sensitivity in WDM optical-fiber networks according to claim 1 or 2, feature
Be, step 103 according to first, second backup access can shared relationship, it is total to reference to service recovery time thresholding
It enjoys or specialized configuration is set, specifically include:
To any service connection ciIf the second backup access BPi 2It can share, and RTi 2≤RT0, RT0For service recovery time door
Limit, then set BPi 2For configuration sharing, otherwise, BP is seti 2For specialized configuration;If BPi 1It can share, and RTi 1≤RT0, then set
Put BPi 1For configuration sharing, otherwise, BP is seti 1For specialized configuration.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611102140.5A CN106685571B (en) | 2016-12-05 | 2016-12-05 | A kind of hybrid protection method based on recovery time sensitivity in WDM optical-fiber networks |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611102140.5A CN106685571B (en) | 2016-12-05 | 2016-12-05 | A kind of hybrid protection method based on recovery time sensitivity in WDM optical-fiber networks |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106685571A CN106685571A (en) | 2017-05-17 |
CN106685571B true CN106685571B (en) | 2018-06-15 |
Family
ID=58866395
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611102140.5A Active CN106685571B (en) | 2016-12-05 | 2016-12-05 | A kind of hybrid protection method based on recovery time sensitivity in WDM optical-fiber networks |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106685571B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101155433A (en) * | 2006-09-30 | 2008-04-02 | 华为技术有限公司 | Service protection method and routing device |
CN102186124A (en) * | 2011-04-29 | 2011-09-14 | 东北大学 | Utility-based interlayer coordination method in WDM (Wavelength Division Multiplexing) optical network |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102487466B (en) * | 2010-12-03 | 2015-08-12 | 中兴通讯股份有限公司 | The method and system of the transmission data under a kind of full guard pattern in EPON |
US8718039B2 (en) * | 2011-12-22 | 2014-05-06 | Tt Government Solutions, Inc. | Signaling protocol for multi-domain optical networks |
CN104080112B (en) * | 2014-07-17 | 2017-11-07 | 重庆邮电大学 | A kind of method for improving wireless self-organization network service reliability |
-
2016
- 2016-12-05 CN CN201611102140.5A patent/CN106685571B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101155433A (en) * | 2006-09-30 | 2008-04-02 | 华为技术有限公司 | Service protection method and routing device |
CN102186124A (en) * | 2011-04-29 | 2011-09-14 | 东北大学 | Utility-based interlayer coordination method in WDM (Wavelength Division Multiplexing) optical network |
Non-Patent Citations (2)
Title |
---|
On Exploiting Sharable Resources With Resource Contention Resolution for Surviving Double-Link Failures in Optical Mesh Networks;Ning-Hai Bao 等;《JOURNAL OF LIGHTWAVE TECHNOLOGY》;20120711;第30卷(第17期);全文 * |
一种基于区分业务等级的光网络共享通路保护算法;梁俊 等;《光通信研究》;20130321(第2期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN106685571A (en) | 2017-05-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104488238B (en) | The system and method controlled for cluster link aggregation in network environment | |
Ju et al. | Power-efficient protection with directed $ p $-cycles for asymmetric traffic in elastic optical networks | |
US8830825B2 (en) | Method and system for priority based (1:1)n ethernet protection | |
Zhong et al. | On QoS-assured degraded provisioning in service-differentiated multi-layer elastic optical networks | |
CN111342889B (en) | Risk separation protection path searching method and system for safety and stability control type service | |
CN106992810A (en) | Consider the shared protection route and frequency spectrum distributing method of joint probability of malfunction constraint | |
CN102480368B (en) | Protecting method and system of aggregation link | |
CN106471779A (en) | A kind of guard method of virtual network and device | |
Wright et al. | Cost model comparison of ZR/ZR+ modules against traditional WDM transponders for 400G IP/WDM core networks | |
CN106998295B (en) | Optimized routing and spectrum allocation method and system based on special protection combined fault probability constraint | |
CN103532872B (en) | Reduce method and router that link state data bag floods | |
CN103581006A (en) | System architecture for global optimization of flexible grid optical networks and global optimization method thereof | |
CN106685571B (en) | A kind of hybrid protection method based on recovery time sensitivity in WDM optical-fiber networks | |
CN101547382B (en) | Separation method for active-Standby service resource of different source and sink for grid network | |
CN107864093A (en) | A kind of multilayer union route and Survivability Strategy based on economic factors | |
WO2023246081A1 (en) | Optical network fault analysis method and apparatus | |
CN101321124A (en) | Branch routing search recovery method of wavelength changeable optical network double-link failure | |
CN101192961B (en) | Route method and device | |
WO2023004903A1 (en) | Crosstalk sensing-based dedicated protection spectrum allocation method and system | |
CN103001876B (en) | Bearer network flow optimizing method, router, optimizing server and bearer network system | |
CN109842522A (en) | Communicate the configuration method and system of route resource | |
Silva et al. | An heuristic for maximally SRLG-disjoint path pairs calculation | |
CN104158740B (en) | A kind of path management method and controller | |
CN102355608A (en) | Improved method for fault recovery of multi-granularity optical network based on GMPLS | |
Shan et al. | Partial spatial protection for provisioning differentiated reliability in FSTR-based Metro Ethernet networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20200415 Address after: 226400 Zhongtian Industrial Zone, Hekou Town, Rudong County, Jiangsu, Nantong Patentee after: ZHONGTIAN BROADBAND TECHNOLOGY Co.,Ltd. Address before: 400065 No. 2, Chongwen Road, Nanshan street, Nan'an District, Chongqing Patentee before: CHONGQING UNIVERSITY OF POSTS AND TELECOMMUNICATIONS |