CN109150706B - Risk path identification method and device - Google Patents

Risk path identification method and device Download PDF

Info

Publication number
CN109150706B
CN109150706B CN201710453278.8A CN201710453278A CN109150706B CN 109150706 B CN109150706 B CN 109150706B CN 201710453278 A CN201710453278 A CN 201710453278A CN 109150706 B CN109150706 B CN 109150706B
Authority
CN
China
Prior art keywords
path
protection
risk
routing
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710453278.8A
Other languages
Chinese (zh)
Other versions
CN109150706A (en
Inventor
刘金洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201710453278.8A priority Critical patent/CN109150706B/en
Publication of CN109150706A publication Critical patent/CN109150706A/en
Application granted granted Critical
Publication of CN109150706B publication Critical patent/CN109150706B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/22Alternate routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/12Shortest path evaluation
    • H04L45/122Shortest path evaluation by minimising distances, e.g. by selecting a route with minimum of number of hops
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/28Routing or path finding of packets in data switching networks using route fault recovery

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application provides a method and a device for identifying a risk path, which relate to the field of information interruption detection, and the method comprises the following steps: acquiring a risk state of a target path according to a routing state of the target path; and when the target path is determined to be a risk path, calculating a protection routing path corresponding to the target path according to a preset routing strategy. All risk paths of the whole network can be automatically identified or a user can be timely identified after configuring a certain service, then the risk paths are corrected, the protection expected by the user is provided for the original paths to the maximum extent, once the original paths have problems, the original paths can be immediately switched to the protection paths, the service is not interrupted, the risk paths of the whole network can be reduced to the minimum without manually checking, identifying and correcting the original paths in hundreds of thousands of paths of the existing network one by one, the reliability of the paths of the whole network is improved, and the engineering operation difficulty and the huge workload are reduced.

Description

Risk path identification method and device
Technical Field
The invention relates to the field of information interruption detection, in particular to a risk path identification method and device.
Background
In the information society which is developed at a high speed, information becomes a more important resource than materials and energy, and loss caused by interruption of business or information is serious. Once the service interruption occurs, the operation and maintenance personnel analyze the fault point section by section according to the alarm and the service flow direction of the existing network, and then perform manual recovery, such as replacing a single board, a port laser or an optical fiber on the fault equipment. How to identify the existing high risk path in the existing network in advance or actively prompt the risk and correct the risk when the user configures a new service becomes an urgent problem for operators.
Disclosure of Invention
The invention provides a method and a device for identifying a risk path, which solve the problems of long time consumption, high complexity and huge workload caused by judging and repairing fault points one by one on a network manager.
In order to achieve the purpose of the invention, the technical scheme adopted by the invention is as follows:
a method of identifying a risk path, comprising:
acquiring a risk state of a target path according to a routing state of the target path;
and when the target path is determined to be a risk path, calculating a protection routing path corresponding to the target path according to a preset routing strategy.
Preferably, after the calculating the protection routing path corresponding to the target path according to the preset routing policy, the method further includes: and when the protection routing path corresponding to the target path cannot be calculated according to a preset routing strategy, feeding back the reason of failure calculation.
Preferably, after the calculating the protection routing path corresponding to the target path according to the preset routing policy, the method further includes:
and correcting the routing state of the target path according to the protection routing path.
Preferably, the routing state comprises one or more of:
protection group status, optical connection status, pipe status.
Preferably, obtaining the risk state of the target path according to the routing state of the target path includes:
when the target path does not have a protection path, determining that the target path is a first priority risk path;
when the target path has a protection path and the target path and the protection path have the same connection, determining that the target path is a second priority risk path;
and when the target path has a protection path, the target path is separated from the protection path, and the intersection exists between the pipeline sets to which the target path and the protection path belong, determining that the target path is a third-priority risk path.
Preferably, the calculating the protection routing path corresponding to the target path according to a preset routing policy includes:
calculating the current service bearing route of the target path;
and calculating a protection routing path corresponding to the target path according to the routing strategy corresponding to the risk priority of the target path.
Preferably, after the calculating the protection routing path corresponding to the target path according to the preset routing policy, the method further includes: and when a plurality of protection routing paths are calculated, determining the route with the minimum hop count as the protection routing path.
Preferably, according to the routing policy corresponding to the risk priority of the target path, calculating the protection routing path corresponding to the target path includes one of:
configuring a protection route path which does not pass through the same pipeline as the current service bearing route;
configuring a protection route path of optical connection which is different from the current service bearing route in path;
and configuring a protection route path matched with the current service bearing route.
In order to solve the above technical problem, the present invention further provides an identification apparatus for a risk path, including:
the risk path identification module is set to obtain the risk state of the target path according to the routing state of the target path;
and the correction module is configured to calculate a protection routing path corresponding to the target path according to a preset routing strategy when the target path is determined to be the risk path.
Preferably, the modification module is further configured to feed back a reason of the failure in calculation when the protection routing path corresponding to the target path cannot be calculated according to a preset routing policy.
Preferably, the modification module is further configured to:
and correcting the routing state of the target path according to the protection routing path.
Preferably, the routing state in the risk path identification module comprises one or more of:
protection group status, optical connection status, pipe status.
Preferably, the obtaining, by the risk path identification module, the risk state of the target path according to the routing state of the target path includes:
when the target path does not have a protection path, determining that the target path is a first priority risk path;
when the target path has a protection path and the target path and the protection path have the same connection, determining that the target path is a second priority risk path;
and when the target path has a protection path, the target path is separated from the protection path, and an intersection exists between the pipeline sets to which the target path and the protection path belong, determining that the target path is a third-priority risk path.
Preferably, the calculating, by the modification module according to a preset routing policy, the protection routing path corresponding to the target path includes:
calculating the current service bearing route of the target path;
and calculating a protection routing path corresponding to the target path according to the routing strategy corresponding to the risk priority of the target path.
Preferably, the modification module is further configured to determine a route with the minimum hop count as the protection route path when a plurality of protection route paths are calculated.
Preferably, the calculating, by the modifying module, the protection routing path corresponding to the target path according to the routing policy corresponding to the risk priority of the target path includes one of:
configuring a protection route path which does not pass through the same pipeline as the current service bearing route;
configuring a protection route path of the optical connection which is different from the current service bearing route;
and configuring a protection route path matched with the current service bearing route.
Compared with the prior art, the invention has the following beneficial effects:
the technical scheme of the invention can automatically identify all risk paths of the whole network or identify the risk paths in time after a user configures a certain service, then modify the risk paths, maximally provide the protection expected by the user for the original paths, once the original paths have problems, the original paths can be switched to the protection paths immediately, the service is not interrupted, and the risk paths of the whole network can be reduced to the minimum without manually checking, identifying and modifying the paths one by one in hundreds of thousands of paths of the existing network, thereby improving the reliability of the paths of the whole network, and reducing the difficulty of engineering operation and huge workload.
Drawings
Fig. 1 is a flowchart of a risk path identification method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of an apparatus for identifying a risk path according to an embodiment of the present invention;
fig. 3 is a schematic diagram illustrating a risk path identification process in embodiment 1 of the present invention;
FIG. 4 is a schematic diagram of a risk path modification process of embodiment 2 of the present invention;
FIG. 5 is a schematic diagram of a risk path identification process of embodiment 3 of the present invention;
fig. 6 is a schematic diagram of a risk path identification process of embodiment 4 of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the following describes embodiments of the present invention with reference to the accompanying drawings, and it should be noted that, in case of conflict, the embodiments and features in the embodiments in the present application may be combined with each other arbitrarily.
As shown in fig. 1, an embodiment of the present invention provides a method for identifying a risk path, including:
s101, obtaining a risk state of a target path according to a routing state of the target path;
s102, when the target path is determined to be a risk path, calculating a protection routing path corresponding to the target path according to a preset routing strategy.
And step S102, if the protection routing path corresponding to the target path cannot be calculated according to a preset routing strategy, feeding back the reason of failure calculation.
Step S102 is followed by:
s103, correcting the routing state of the target path according to the protection routing path.
Wherein the routing state comprises one or more of:
protection group status, optical connection status, pipe status.
The step S101 of obtaining the risk state of the target path according to the routing state of the target path includes:
when the target path does not have a protection path, determining that the target path is a first priority risk path;
when the target path has a protection path and the target path and the protection path have the same connection, determining that the target path is a second priority risk path;
and when the target path has a protection path, the target path is separated from the protection path, and the intersection exists between the pipeline sets to which the target path and the protection path belong, determining that the target path is a third-priority risk path.
Step S102 of calculating a protection routing path corresponding to the target path according to a preset routing policy includes:
calculating the current service bearing route of the target path;
and calculating a protection routing path corresponding to the target path according to the routing strategy corresponding to the risk priority of the target path by taking the non-response current service as a reference.
And when a plurality of protection route paths are calculated, determining the route with the minimum hop count as the protection route path.
Wherein, according to the routing policy corresponding to the risk priority of the target path, calculating the protection routing path corresponding to the target path includes one of the following:
configuring a protection route path which does not pass through the same pipeline as the current service bearing route;
configuring a protection route path of the optical connection which is different from the current service bearing route;
and configuring a protection route path matched with the current service bearing route.
The routing strategy of the embodiment of the invention takes the non-response of the current service as a reference, preferentially selects the protection routing path which does not pass through the same pipeline, and can select the protection routing path which does not pass through the same optical connection when the condition can not be met.
As shown in fig. 2, an embodiment of the present invention further provides an apparatus for identifying a risk path, which may be set in a network management server, and includes:
the risk path identification module is set to obtain the risk state of the target path according to the routing state of the target path;
and the correction module is configured to calculate a protection routing path corresponding to the target path according to a preset routing strategy when the target path is determined to be the risk path.
Preferably, the modification module is further configured to feed back a reason of the failure in calculation when the protection routing path corresponding to the target path cannot be calculated according to a preset routing policy.
Preferably, the modification module is further configured to:
and correcting the routing state of the target path according to the protection routing path.
Preferably, the routing state in the risk path identification module comprises one or more of:
protection group status, optical connection status, pipe status.
Preferably, the obtaining, by the risk path identification module, the risk state of the target path according to the routing state of the target path includes:
when the target path does not have a protection path, determining that the target path is a first priority risk path;
when the target path has a protection path and the target path and the protection path have the same path, determining that the target path is a second priority risk path;
and when the target path has a protection path, the target path is separated from the protection path, and the intersection exists between the pipeline sets to which the target path and the protection path belong, determining that the target path is a third-priority risk path.
Preferably, the calculating, by the modification module according to a preset routing policy, the protection routing path corresponding to the target path includes:
calculating the current service bearing route of the target path;
and calculating a protection routing path corresponding to the target path according to the routing strategy corresponding to the risk priority of the target path.
Preferably, the modification module is further configured to determine the route with the minimum hop count as the protection route path when a plurality of protection route paths are calculated.
Preferably, the calculating, by the modification module, the protection routing path corresponding to the target path according to the routing policy corresponding to the risk priority of the target path includes one of:
configuring a protection route path which does not pass through the same pipeline as the current service bearing route;
configuring a protection route path of the optical connection which is different from the current service bearing route;
and configuring a protection route path matched with the current service bearing route.
In the embodiment of the invention, when any path is input, the risk path identification device inquires a path table, a protection group table, a routing table, an optical connection table, a pipeline table and other tables from a database for comprehensive calculation, and carries out risk judgment: a: whether the path is a path without protection or not, and if not, the path belongs to a first priority risk path; b: if the protection path is taken, whether the routes of the working path and the protection path pass through the same connection is continuously judged, and if the routes pass through the same connection, the routes belong to a second priority risk path; c: and if the connection of the working path and the protection path is completely separated, continuously judging whether the connection of the working path and the protection path is buried in the same pipeline, and if at least one section of the connection of the working path and the connection of the protection path belongs to the same pipeline, determining that the connection of the working path and the protection path is a third-priority risk path. For the judgment of three risk paths of ABC, the risk identification policy may be customized according to the scenario and the requirement in the embodiment of the present invention, for example, only judgment of a, AB, or AC is performed.
Further, a pipe is buried with many optical fibers (i.e., optical connections) at the same time, and if the working route and the protection route pass through the same pipe at the same time, the service is interrupted once the physical pipe is cut by construction. When working and protection are not routed through the same pipe, they are not routed through the same connection, and they are not routed through any of the same nodes except the originating node.
After the risk paths are identified, the risk paths can be presented to the client in a list form, and specific risk reasons and risk levels are listed, so that a risk path list is generated.
For the identified risk paths, different protection route calculation strategies can be formulated for the risk paths with different priorities according to the current network condition. The actual route of the risk path is calculated first, and a qualified protection route is automatically calculated for the actual route by using the established route strategy. If the route can be successfully calculated, the route is automatically corrected successfully and a corrected path is presented; and if the route calculation fails, feeding back a specific reason of the failure of the route calculation. Optionally, for the risk path table, the user may autonomously select which priority risk paths to correct or all corrections.
Example 1
In this embodiment, a process of risk path identification is described with reference to fig. 3, which includes:
s201, inputting a path.
Any path existing on the input network management can be a whole network sequential recursive query or a user appoints a certain existing path.
S202, judging whether protection is provided.
For the path in step S201, it is determined whether the path has a protection group, and further determined whether the path has a protection path. If yes, go to step S203. If not, directly listing in the risk path list and identifying as the first priority risk path, wherein the risk reason is "unprotected", namely step S205.
And S203, judging whether the work and the protection are separated.
For the protected path in step S202, the routing table of the working path and the routing table of the protection path and the optical connection table are queried, so as to calculate and determine whether the working path and the protection path pass through the same optical connection. If not, go to step S204. If yes, directly listing in a risk path list, and marking as a second priority risk path, wherein the risk reason is as follows: the working and protecting names of the same optical connections routed over the same optical connection and the same optical connection routed over the same optical connection, step S205.
And S204, judging whether the work and the protection are the same as the pipeline.
For the path with separated work and protection in step S203, it is determined whether a and B have an intersection by querying the pipeline set a to which all optical connections passed by the work route belong and the pipeline set B to which all optical connections passed by the protection route belong. If yes, step S205 is executed to list the risk path list and identify the risk path as a third-priority risk path, where the risk reason is: the work and protection are via the same pipeline and the same pipeline name. If not, the path does not belong to a risk path.
And S205, adding a risk path list.
And adding the risk paths judged in the steps S202, S203 and S204 into a risk path list, presenting the risk path list to a user, and listing specific risk levels and risk reasons. The reason for the risk path judged in step S202 is displayed as "no protection", and the priority is displayed as a first priority risk path; the reason for the risk path judged in step S203 is "the same optical connection for working and protection, the priority is displayed as a second priority risk path; the reason for the risk path determined in step S204 is displayed as "the same pipeline is traversed for work and protection", and the priority is displayed as a third priority risk path. The risk paths of different priorities have different risks, as follows: the risk path of the first priority, which has the highest risk, may cause an immediate disruption of traffic if any one node or optical connection fails. In contrast, the risk of the third priority risk path is low, and the service is interrupted only when the pipeline is broken.
The user can select different risk identification strategies according to different scenes and requirements, and the steps S202, S203 and S204 can select one step or two or three steps as required. At present, three steps are all selected as the most comprehensive risk identification strategy.
Example 2
In this embodiment, a flow of risk path modification is described with reference to fig. 4, which includes:
s301, inputting a risk path.
A risk path is selected from the risk path table.
S302, calculating the actual route of the risk path
The actual route of the risk path is calculated, i.e. the traffic is currently carried on that route. And performing the operation of S303 by taking the route as a reference, wherein the reference is that the current network service is not influenced.
And S303, judging whether the protection route meeting the conditions can be calculated.
The user may select different protection routing policies for risk paths of different priorities. For this path in step S302, the routing policy specified by the user is selected according to the risk priority, and a protection route meeting the user' S expectations is automatically calculated for this path. If the route can be successfully calculated, go to step S304; if the route calculation fails, the specific reason for the failure of the route calculation is presented to the client, step S305.
S304, whether a plurality of protection routes exist.
If two or more protection routes are calculated, selecting the protection route with the minimum hop count, in step S306; if only one is calculated, the correction is performed directly, in step S307.
S305, presenting the failure reason.
And presenting the specific reason of the routing calculation failure to the user, and carrying out the existing network reconstruction by the user according to the reason.
S306, selecting the minimum hop route.
And selecting the route with the minimum hop number from the plurality of calculated routes meeting the conditions as the original route for correction.
And S307, correcting the path.
And establishing a protection group for the protection route which meets the conditions and is selected in the steps and the original path to form a protection relation, and presenting the protection relation to the path corrected by the user.
Example 3
The method for automatically identifying and correcting risk paths provided by the present invention is described in detail by specific embodiments, as shown in fig. 5. The method and the device are used for automatically identifying the risk path of the whole network and correcting the scene.
The process for automatically identifying and correcting the risk path in the whole network comprises the following steps:
s401, taking the first path of the whole network as input, recursion is carried out in sequence.
And inquiring all paths of the whole network, and sequentially using the first path to the last path as the input of the risk path identification module.
S402, calling a risk path identification module.
And for each input path in the S401, identifying the risk path according to a risk path identification strategy formulated by a user.
And S403, judging whether the whole network identification is finished.
Whether all paths of the whole network are identified completely or not, and if not, continuing to identify the risk of the next path; if the recognition is completed, step S404 is performed.
S404, calling a correction module.
And taking each risk path identified by the risk path identification module as the input of the correction module, and correcting one by one. The correction strategy is user-defined as follows: and calculating a protection route which is not connected with the working route through the same pipeline for the risk routes of all the priorities. The strategy is a most comprehensive and perfect correction strategy, and the service can be protected to the greatest extent.
S405, whether all risk paths are corrected is finished.
If the risk path table has an uncorrected path, continuing correcting; and if all the risk paths are corrected, finishing configuration and presenting the correction result of each risk path to the user.
S406, the configuration is finished.
By the method, risk identification and correction can be automatically carried out on all paths of the whole network, and the corrected result is presented to a user in a visual form.
Example 4
The embodiment is used for immediately identifying and prompting a corrected scene after a user creates a successful path; as shown in fig. 6, in this embodiment, the scenario that the user immediately performs risk identification and prompts correction after creating a successful path includes the following steps:
s501, the user configures a path successfully.
When the user successfully configures one path, the path is automatically used as the input of the risk path identification module.
And S502, calling a risk path identification module.
For the path in S501, risk path identification is performed according to a risk path identification policy specified by the user. In this embodiment, the user only identifies paths without protection as risk paths.
S503, judging whether the risk path exists.
Identifying the risk path, and if the path is not the risk path, finishing configuration; if the risk path is determined, step S504 is performed.
S504, calling a correction module.
And correcting the risk path as an input of a correction module according to a strategy specified by a user. The user's correction strategy is to calculate a protection path for the same optical connection that is not routed.
And S505, finishing the configuration.
By the method, risk identification and correction can be performed in time after each path is created by a user, the probability of the risk path is reduced to the maximum extent, and the reliability of the whole network path is improved.
Although the embodiments of the present invention have been described above, the contents thereof are merely embodiments adopted to facilitate understanding of the technical aspects of the present invention, and are not intended to limit the present invention. It will be apparent to persons skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (14)

1. A method for identifying a risk path, comprising:
acquiring the risk path priority of a target path according to the routing state of the target path; wherein the risk path priority characterizes a risk status of the target path; the routing state includes one or more of: protection group status, optical connection status, pipe status;
and taking the current service as a reference, and calculating a protection routing path corresponding to the target path according to a preset routing strategy when the target path is determined to be the risk path.
2. The method of claim 1, wherein: after the protection routing path corresponding to the target path is calculated according to a preset routing strategy, the method further comprises the following steps: and feeding back the reason of the failure calculation when the protection routing path corresponding to the target path cannot be calculated according to the preset routing strategy.
3. The method of claim 1, wherein: after the protection routing path corresponding to the target path is calculated according to a preset routing strategy, the method further comprises the following steps:
and correcting the routing state of the target path according to the protection routing path.
4. The method of claim 1, wherein: obtaining the risk path priority of the target path according to the routing state of the target path comprises:
when the target path does not have a protection path, determining that the target path is a first priority risk path;
when the target path has a protection path and the target path and the protection path have the same connection, determining that the target path is a second priority risk path;
and when the target path has a protection path, the target path is separated from the protection path, and the intersection exists between the pipeline sets to which the target path and the protection path belong, determining that the target path is a third-priority risk path.
5. The method of claim 4, wherein: calculating the protection routing path corresponding to the target path according to a preset routing policy comprises:
calculating the current service bearing route of the target path;
and calculating a protection routing path corresponding to the target path according to the routing strategy corresponding to the risk priority of the target path.
6. The method of claim 5, wherein: after the protection routing path corresponding to the target path is calculated according to a preset routing policy, the method further comprises the following steps: and when a plurality of protection routing paths are calculated, determining the route with the minimum hop count as the protection routing path.
7. The method of claim 5, wherein: according to the routing strategy corresponding to the risk priority of the target path, calculating a protection routing path corresponding to the target path comprises one of the following steps:
configuring a protection route path which does not pass through the same pipeline as the current service bearing route;
configuring a protection route path of the optical connection which is different from the current service bearing route;
and configuring a protection route path matched with the current service bearing route.
8. An apparatus for identifying a risk path, comprising: the method comprises the following steps:
the risk path identification module is set to obtain the risk path priority of the target path according to the routing state of the target path; wherein the risk path priority characterizes a risk status of the target path; the routing state in the risk path identification module includes one or more of: protection group status, optical connection status, pipeline status;
and the correction module is used for calculating a protection routing path corresponding to the target path according to a preset routing strategy when the target path is determined to be the risk path on the basis of not influencing the current service.
9. The apparatus of claim 8, wherein: the correction module is further configured to feed back a reason of the calculation failure when the protection routing path corresponding to the target path cannot be calculated according to a preset routing policy.
10. The apparatus of claim 8, wherein: the correction module is further configured to:
and correcting the routing state of the target path according to the protection routing path.
11. The apparatus of claim 8, wherein: the obtaining, by the risk path identification module, the risk path priority of the target path according to the routing state of the target path includes:
when the target path does not have a protection path, determining that the target path is a first priority risk path;
when the target path has a protection path and the target path and the protection path have the same connection, determining that the target path is a second priority risk path;
and when the target path has a protection path, the target path is separated from the protection path, and an intersection exists between the pipeline sets to which the target path and the protection path belong, determining that the target path is a third-priority risk path.
12. The apparatus of claim 11, wherein: the step of calculating, by the correction module, the protection routing path corresponding to the target path according to a preset routing policy includes:
calculating the current service bearing route of the target path;
and calculating a protection routing path corresponding to the target path according to the routing strategy corresponding to the risk priority of the target path.
13. The apparatus of claim 12, wherein: the correction module is also configured to determine the route with the minimum hop count as the protection route path when the protection route paths are calculated.
14. The apparatus of claim 12, wherein: the correction module calculates a protection routing path corresponding to the target path according to the routing strategy corresponding to the risk priority of the target path, wherein the protection routing path comprises one of the following:
configuring a protection route path which does not pass through the same pipeline as the current service bearing route;
configuring a protection route path of optical connection which is different from the current service bearing route in path;
and configuring a protection route path matched with the current service bearing route.
CN201710453278.8A 2017-06-15 2017-06-15 Risk path identification method and device Active CN109150706B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710453278.8A CN109150706B (en) 2017-06-15 2017-06-15 Risk path identification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710453278.8A CN109150706B (en) 2017-06-15 2017-06-15 Risk path identification method and device

Publications (2)

Publication Number Publication Date
CN109150706A CN109150706A (en) 2019-01-04
CN109150706B true CN109150706B (en) 2022-10-28

Family

ID=64830117

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710453278.8A Active CN109150706B (en) 2017-06-15 2017-06-15 Risk path identification method and device

Country Status (1)

Country Link
CN (1) CN109150706B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112333093A (en) * 2020-11-23 2021-02-05 迈普通信技术股份有限公司 Policy routing path determining method and device, network equipment and readable storage medium
CN113347200B (en) * 2021-06-25 2022-03-04 任拓数据科技(上海)有限公司 Information prompting method based on internet behavior big data and cloud computing AI system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2337279A1 (en) * 2009-12-18 2011-06-22 Alcatel Lucent Method of protecting a data transmission through a network
WO2012119500A1 (en) * 2011-08-24 2012-09-13 华为技术有限公司 Method for selecting current backup route, and router
EP2555469A1 (en) * 2011-02-09 2013-02-06 Huawei Technologies Co., Ltd. Fault protection method and device
CN103688490A (en) * 2013-06-26 2014-03-26 华为技术有限公司 Protection path calculation method, related device and system
CN105429894A (en) * 2015-11-30 2016-03-23 国网冀北电力有限公司信息通信分公司 Service route selection method and device in electric power communication network
CN105991427A (en) * 2015-01-27 2016-10-05 杭州迪普科技有限公司 Method and device for determining and switching backup paths
CN106506357A (en) * 2016-12-06 2017-03-15 国网河南省电力公司信息通信公司 A kind of double route collocation method of power telecom network and device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020194339A1 (en) * 2001-05-16 2002-12-19 Lin Philip J. Method and apparatus for allocating working and protection bandwidth in a telecommunications mesh network
US20050237950A1 (en) * 2004-04-26 2005-10-27 Board Of Regents, The University Of Texas System System, method and apparatus for dynamic path protection in networks
US7561534B2 (en) * 2004-06-30 2009-07-14 Alcatel-Lucent Usa Inc. Methods of network routing having improved resistance to faults affecting groups of links subject to common risks
US8619553B2 (en) * 2009-01-08 2013-12-31 Ciena Corporation Methods and systems for mesh restoration based on associated hop designated transit lists
CN102571401B (en) * 2010-12-24 2015-07-08 华为技术有限公司 Method and device for building backup path and method and device for selecting backup path

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2337279A1 (en) * 2009-12-18 2011-06-22 Alcatel Lucent Method of protecting a data transmission through a network
EP2555469A1 (en) * 2011-02-09 2013-02-06 Huawei Technologies Co., Ltd. Fault protection method and device
WO2012119500A1 (en) * 2011-08-24 2012-09-13 华为技术有限公司 Method for selecting current backup route, and router
CN103688490A (en) * 2013-06-26 2014-03-26 华为技术有限公司 Protection path calculation method, related device and system
CN105991427A (en) * 2015-01-27 2016-10-05 杭州迪普科技有限公司 Method and device for determining and switching backup paths
CN105429894A (en) * 2015-11-30 2016-03-23 国网冀北电力有限公司信息通信分公司 Service route selection method and device in electric power communication network
CN106506357A (en) * 2016-12-06 2017-03-15 国网河南省电力公司信息通信公司 A kind of double route collocation method of power telecom network and device

Also Published As

Publication number Publication date
CN109150706A (en) 2019-01-04

Similar Documents

Publication Publication Date Title
CN109150572B (en) Method, device and computer readable storage medium for realizing alarm association
US7450598B2 (en) System and method to provision MPLS/VPN network
US6907549B2 (en) Error detection in communication systems
JP5119935B2 (en) Management program, management apparatus, and management method
EP3335384A1 (en) Systems and methods for managing network health
EP3958508A1 (en) Data processing method and device, storage medium and electronic device
CN109150706B (en) Risk path identification method and device
CN106936683B (en) A kind of method and device for realizing tunnel configuration
US8705369B2 (en) Routing cost normalizing
JP2007080035A (en) Notification method and system for fault notification
US20090226162A1 (en) Auto-prioritizing service impacted optical fibers in massive collapsed rings network outages
US7660402B1 (en) System and method for managing telecommunication trunk groups
CN113453262A (en) Bidirectional Forwarding Detection (BFD) method and device
CN112395298B (en) Data consistency management system based on data layering thought
CN109547870B (en) Method and system for scheduling optical cable cutting task
CN109918546A (en) Task configuration method and device for dialogue
CN109740789A (en) Cable management method, apparatus, equipment and storage medium
CN110233796B (en) Power communication network optimization method and equipment based on weighted routing algorithm
CN106506190A (en) A kind of communication network runtime and operation method
RU2007107870A (en) METHODS, DEVICES, AND COMPUTER SOFTWARE PRODUCTS FOR SELECTIVE CONTROL OF A NETWORK IN A NETWORK CONTAINING SEVERAL ACTIVE ROUTES TO A GENERAL REMAINING CENTER
CN114448868B (en) Path scheduling method, device and equipment based on segmented routing strategy
CN112860496A (en) Fault repair operation recommendation method and device and storage medium
CN111030843A (en) M equipment online configuration method and device
CN113824744B (en) Situation awareness visualization method and system for business view and storage medium
US20170048099A1 (en) Systems and methods for managing network health

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant