CN112422343A - Method for evaluating hidden danger of same route based on transmission network - Google Patents

Method for evaluating hidden danger of same route based on transmission network Download PDF

Info

Publication number
CN112422343A
CN112422343A CN202011295239.8A CN202011295239A CN112422343A CN 112422343 A CN112422343 A CN 112422343A CN 202011295239 A CN202011295239 A CN 202011295239A CN 112422343 A CN112422343 A CN 112422343A
Authority
CN
China
Prior art keywords
route
same
hidden danger
network
same route
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011295239.8A
Other languages
Chinese (zh)
Other versions
CN112422343B (en
Inventor
付体锋
刘晓茹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zznode Technology Co ltd
Original Assignee
Beijing Zznode Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zznode Technology Co ltd filed Critical Beijing Zznode Technology Co ltd
Priority to CN202011295239.8A priority Critical patent/CN112422343B/en
Publication of CN112422343A publication Critical patent/CN112422343A/en
Application granted granted Critical
Publication of CN112422343B publication Critical patent/CN112422343B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A network assessment basic index for discovering hidden dangers of the same route of a transmission network is constructed or perfected by adding 3 hidden danger points of the same route of business logic same route, business physical same route and ring network physical same route, thereby being beneficial to improving the network quality level, improving the production efficiency and realizing cost reduction and efficiency improvement.

Description

Method for evaluating hidden danger of same route based on transmission network
Technical Field
The invention relates to a transmission network structure analysis platform technology, in particular to a method for evaluating hidden dangers of same route based on a transmission network.
Background
The transmission Network is constructed for years, an IT (Internet Technology) analysis means and an analysis method are established and perfected aiming at Network optimization indexes, so that the safety of the transmission Network is greatly improved, the analysis of a Packet Transport Network (PTN) logic ring Network is realized in a project, and the analysis of potential Network hazard indexes of 6 ring networks comprises the ring forming rate of a PTN access layer, the double-regression ratio of Network elements of the PTN access layer, the physical double-up connection of a PTN convergence layer, the PTN supermacrocycle, the PTN long single chain and the analysis of a PTN large convergent point. However, with the development of communication technology, the network scale increases year by year, the concerned network health indexes are too many, the indexes of the logic ring network cannot meet the network health degree, the external line resources need to be combined, the physical indexes need to be analyzed in association, and the association between the logic and physical indexes is lacked, so that the analysis efficiency is low in fault, the problem of rapid positioning cannot be caused, and the network health degree cannot be comprehensively examined.
The optimization analysis of the network structure is the key and difficult point in the current network work, at present, companies in various provinces, companies in cities and counties have network maintainers, and the result also organizes personnel in cities and counties for centralized discussion for many times in the process of development, so that the requirements of the network and business personnel are fully researched and collected. In the actual network structure optimization analysis, the prior art also has the following disadvantages: 1) the passive situation that the problem cannot be found manually in the current network structure is as follows: the local city companies have a plurality of manufacturers and complex and changeable network structures, namely, the situation of sharing a common logic path and a common physical path exists, and a plurality of hidden dangers are brought to the local city business. 2) The problem that the current network structure manual analysis efficiency is low: at present, companies in cities and counties in various regions analyze the network, the topology is mainly checked through network management by manpower, the efficiency is very low, and data can be inquired without records. 3) The current fault location is not sufficiently prepared: the current network hidden danger is many, and the location is accurate inadequately. Many network faults are caused by faults, but due to the problem of network networking, a plurality of faults are reported, and the accurate positioning of the faults is influenced. 4) And the current network structure has the same route problem: when a network fails, the ring networks are routed, so that the ring service is not formed logically through the topological structure of the ring networks, no protection effect is achieved, the ring is formed in the network structure, but no service protection is provided, and the standby service cannot be started normally when the service master fails.
Disclosure of Invention
Aiming at the defects or shortcomings in the prior art, the invention provides a method for evaluating hidden dangers of the same route based on a transmission network, which is characterized in that by adding 3 hidden dangers points of the same route of service logic same route, service physical same route and looped network physical same route, network evaluation basic indexes for finding hidden dangers of the same route of the transmission network are jointly constructed or perfected, thereby being beneficial to improving the network quality level, improving the production efficiency and realizing cost reduction and efficiency improvement.
The technical solution of the invention is as follows:
a method for evaluating hidden troubles of the same route based on a transmission network is characterized by comprising the following network evaluation basic indexes for finding the hidden troubles of the same route of the transmission network: the hidden danger of business logic same route and/or hidden danger of business physical same route and/or hidden danger of ring network physical same route.
The ring network physical same route hidden danger value is the number of ring network physical same routes and the ring network physical same route hidden danger coefficient; the hidden danger value of the same service logic route is the number of the same service logic routes and the hidden danger coefficient of the same service logic route; the hidden danger value of the business physical same route is the number of the business physical same route and the hidden danger coefficient of the business physical same route.
The hidden danger coefficient of the ring network physical same route, the hidden danger coefficient of the service logic same route and the hidden danger coefficient of the service physical same route are all 0.1.
The network assessment adopts the following algorithm to determine the score: and if the score is negative, directly taking a value of 0.
The analysis algorithm process of the physical same routing hidden danger of the ring network comprises the following steps: a1, extracting the topology of the ring network; step A2, removing topologies with different grades from the ring network; step A3, judging whether a light path exists, if no, returning to the step A1, and if yes, entering the step A4; step A4, inquiring the office fiber according to the light path, if there is no office fiber, returning to step A3, if there is office fiber, entering step A5; step A5, inquiring fiber cores according to the office direction optical fiber, if no fiber core exists, returning to the step A3, and if fiber cores exist, entering the step A6; step A6, inquiring the optical cable section according to the fiber core, if no optical cable exists, returning to the step A3, and if the optical cable exists, entering the step A7; step A7, recording the optical cable and the optical cable section; step A8, whether a ring topology is still available, if yes, the loop is cycled between step A1 and step A8 after reading the topology of the next section of the ring, and if not, the loop enters step A9; and step A9, comparing whether the optical cable and the optical cable section have repetition, if so, the optical cable and the optical cable section are the ring network physical same route, and returning to the topological section of the ring network physical same route.
The analysis algorithm process of the service logic same routing hidden danger comprises the following steps: step B1, reading a service; step B2, reading the main route and the standby route of the service; step B3, judging whether both the primary route and the standby route exist, if both exist, entering step B4, if only one primary route exists, associating the tunnel protection group to acquire the primary route and the standby route, entering step B4, if no standby route exists, entering step B6; step B4, judging whether the main route and the standby route have the same route, if not, entering step B6, and if so, entering step B5; step B5, judging whether the main and standby routes are on the ring or on the chain, if so, storing the on-ring mark into the database, and if so, storing the on-chain mark into the database; and step B6, cycling between step B1 and step B6 after the business logic same route data is saved and the next business is read.
The analysis algorithm process of the hidden danger of the business physics same route comprises the following steps: step C1, reading a service; step C2, reading the main route and the standby route of the service; step C3, judging whether both the main route and the standby route exist, if so, entering step C4, otherwise, entering step C6; step C4, judging whether the optical paths associated with the main route and the standby route are the same optical cable, if so, entering step C5, otherwise, entering step C6; step C5, judging whether the main and standby routes associated with the same optical path/optical cable are in a ring or in a chain, if so, storing the in-ring identification into the database, and if so, storing the in-chain identification into the database; and step C6, cycling between step C1 and step C6 after saving the service physical same route data and reading the next service.
The invention has the following technical effects: the invention relates to a method for evaluating hidden dangers of the same route based on a transmission network, which constructs or perfects network evaluation basic indexes for finding hidden dangers of the same route of the transmission network together by adding 3 hidden dangers points of the same route of business logic same route, business physical same route and ring network physical same route. The biggest bright point of the technical result is that the method is beneficial to carrying out IT means analysis through 3 same-route hidden trouble points, calculating hidden trouble values of cities and counties in each region, assessing network structures of the cities and the counties in each region through the hidden trouble values, reducing hidden troubles of the network and improving the network quality. Through automatic data analysis, a perfect index assessment system is established, the network quality level is improved, the production efficiency is improved, and cost reduction and efficiency improvement are realized.
The invention has the characteristics that: 1. and optimizing a processing mechanism of the assessment indexes aiming at the network. 2. And a processing mechanism of ring network physical same route aiming at network optimization evaluation indexes. 3. And a processing mechanism aiming at network optimization and evaluation indexes and having the same business physics route. 4. And a processing mechanism aiming at the service logic of network optimization assessment indexes and the same route.
Compared with the prior art, the invention can be beneficial in the following aspects: 1. the work efficiency is improved, the network structure of the province is automatically analyzed, meanwhile, the network structure score is automatically calculated according to the indexes and the weight, the manual analysis is shortened, and the work efficiency is improved. 2. The method has the advantages that the hidden danger points of the network are accurately positioned, detailed information of hidden dangers of PTN service logic same routes, PTN service physical same routes and PTN looped network same routes is provided, effective network rectification in local cities and counties is facilitated, and the same routes are avoided. 3. The stability of the network structure is improved, the 3 types of network index hidden dangers are comprehensively graded and assessed, the network structure is continuously improved in the city, the network structure is continuously optimized, and the stability of the network is improved. 4. The cost is saved, the network structure is automatically optimized, the problem of the same route is avoided from the network networking, the manual analysis time is reduced, and the labor cost is saved. 5. The satisfaction of the user is improved, and good social benefits are created. The network structure optimization avoids the condition that the network has the same route, ensures the stability of user service, avoids the influence of faults and improves the use perception of users. In fact, currently, province companies are actively developing network structure optimization assessment, the assessment system has a good effect in local and city companies, gradually extends to the tail end of a district and county network, and can improve the working efficiency of personnel and achieve the achievement of cost reduction and benefit improvement while solving the actual problem of the network structure.
Drawings
Fig. 1 is a schematic flow chart of a ring network physical co-route analysis algorithm involved in the method for evaluating the potential risk of co-route based on the transmission network of the present invention. FIG. 1 includes step 1, taking the topology on the torus; step 2, removing topologies of different levels from the ring network (for example, if the ring is an access ring, the section is the same if there is a topology between the upper convergence network elements); step 3, judging whether a light path exists (associated light path data), if not, returning to the step 1, and if so, entering the step 4; step 4, inquiring the office-oriented optical fiber according to the optical path, returning to the step 3 if no office-oriented optical fiber exists, and entering the step 5 if the office-oriented optical fiber exists; step 5, inquiring a fiber core according to the local optical fiber, if no fiber core exists, returning to the step 3, and if a fiber core exists, entering the step 6; step 6, inquiring the optical cable section according to the fiber core, returning to the step 3 if no optical cable exists, and entering to the step 7 if the optical cable exists; step 7, recording the optical cable and the optical cable section; step 8, whether ring topology exists or not is judged, if yes, the ring topology is read and then circulated between the step 1 and the step 8, and if not, the step 9 is carried out; and 9, comparing whether the optical cable and the optical cable section are repeated or not, if so, determining the optical cable and the optical cable section are the same physical route, and returning to the topological section of the same route.
Fig. 2 is a schematic flow chart of a service logic same-route analysis algorithm involved in the method for evaluating the hidden danger of the same-route based on the transmission network according to the present invention. Fig. 2 includes step 1, reading a service (e-line); step 2, reading the main route and the standby route of the service; step 3, judging whether both the main route and the standby route exist, if both the main route and the standby route exist, entering step 4, if only one main route exists, associating the tunnel protection group to obtain the main route and the standby route, entering step 4, and if no standby route exists, entering step 6; step 4, judging whether the main route and the standby route have the same route, if not, entering step 6, and if so, entering step 5; step 5, judging whether the main route and the standby route are in a ring or in a chain, if so, storing the in-ring identification into a database, and if so, storing the in-chain identification into the database; and 6, storing the data, reading the next service and circulating between the step 1 and the step 6.
Fig. 3 is a schematic flow chart of a service physical same-route analysis algorithm involved in the method for evaluating the hidden danger of the same-route based on the transmission network according to the present invention. Fig. 3 includes step 1, reading a service (Servicetype ═ 0', e-line service, service not logically routed); step 2, reading the main route and the standby route of the service; step 3, judging whether both the main route and the standby route exist, if so, entering step 4, otherwise, entering step 6; step 4, judging whether the optical paths associated with the main route and the standby route are the same optical cable, if so, entering step 5, otherwise, entering step 6; step 5, judging whether the main and standby routes associated with the same optical path/optical cable are in a ring or in a chain, if so, storing the in-ring identification into a database, and if so, storing the in-chain identification into the database; and 6, storing the data, reading the next service and circulating between the step 1 and the step 6.
Fig. 4 is a schematic structural diagram of a transmission network optimization index library involved in the method for evaluating the hidden danger of the same route based on the transmission network according to the present invention. The network optimization evaluation system comprises an evaluation system part, a same-route hidden danger analysis part and a basic data part, wherein the evaluation system part comprises a transmission network optimization evaluation index system, the same-route hidden danger analysis part comprises a ring network physical same route, a service logic same route and a service physical same route, and the basic data part comprises a topology, a light path, a service, a ring network, a cable segment and a laying segment.
Detailed Description
The invention is explained below with reference to the figures (fig. 1-4) and the examples.
Fig. 1 is a schematic flow chart of a ring network physical co-route analysis algorithm involved in the method for evaluating the potential risk of co-route based on the transmission network of the present invention. Fig. 2 is a schematic flow chart of a service logic same-route analysis algorithm involved in the method for evaluating the hidden danger of the same-route based on the transmission network according to the present invention. Fig. 3 is a schematic flow chart of a service physical same-route analysis algorithm involved in the method for evaluating the hidden danger of the same-route based on the transmission network according to the present invention. Fig. 4 is a schematic structural diagram of a transmission network optimization index library involved in the method for evaluating the hidden danger of the same route based on the transmission network according to the present invention. Referring to fig. 1 to 4, a method for evaluating hidden dangers of the same route based on a transmission network is characterized by establishing the following network assessment basic indexes for discovering the hidden dangers of the same route of the transmission network: the hidden danger of business logic same route and/or hidden danger of business physical same route and/or hidden danger of ring network physical same route. The ring network physical same route hidden danger value is the number of ring network physical same routes and the ring network physical same route hidden danger coefficient; the hidden danger value of the same service logic route is the number of the same service logic routes and the hidden danger coefficient of the same service logic route; the hidden danger value of the business physical same route is the number of the business physical same route and the hidden danger coefficient of the business physical same route. The hidden danger coefficient of the ring network physical same route, the hidden danger coefficient of the service logic same route and the hidden danger coefficient of the service physical same route are all 0.1. The network assessment adopts the following algorithm to determine the score: and if the score is negative, directly taking a value of 0.
The analysis algorithm process of the physical same routing hidden danger of the ring network comprises the following steps: a1, extracting the topology of the ring network; step A2, removing topologies with different grades from the ring network; step A3, judging whether a light path exists, if no, returning to the step A1, and if yes, entering the step A4; step A4, inquiring the office fiber according to the light path, if there is no office fiber, returning to step A3, if there is office fiber, entering step A5; step A5, inquiring fiber cores according to the office direction optical fiber, if no fiber core exists, returning to the step A3, and if fiber cores exist, entering the step A6; step A6, inquiring the optical cable section according to the fiber core, if no optical cable exists, returning to the step A3, and if the optical cable exists, entering the step A7; step A7, recording the optical cable and the optical cable section; step A8, whether a ring topology is still available, if yes, the loop is cycled between step A1 and step A8 after reading the topology of the next section of the ring, and if not, the loop enters step A9; and step A9, comparing whether the optical cable and the optical cable section have repetition, if so, the optical cable and the optical cable section are the ring network physical same route, and returning to the topological section of the ring network physical same route. The analysis algorithm process of the service logic same routing hidden danger comprises the following steps: step B1, reading a service; step B2, reading the main route and the standby route of the service; step B3, judging whether both the primary route and the standby route exist, if both exist, entering step B4, if only one primary route exists, associating the tunnel protection group to acquire the primary route and the standby route, entering step B4, if no standby route exists, entering step B6; step B4, judging whether the main route and the standby route have the same route, if not, entering step B6, and if so, entering step B5; step B5, judging whether the main and standby routes are on the ring or on the chain, if so, storing the on-ring mark into the database, and if so, storing the on-chain mark into the database; and step B6, cycling between step B1 and step B6 after the business logic same route data is saved and the next business is read. The analysis algorithm process of the hidden danger of the business physics same route comprises the following steps: step C1, reading a service; step C2, reading the main route and the standby route of the service; step C3, judging whether both the main route and the standby route exist, if so, entering step C4, otherwise, entering step C6; step C4, judging whether the optical paths associated with the main route and the standby route are the same optical cable, if so, entering step C5, otherwise, entering step C6; step C5, judging whether the main and standby routes associated with the same optical path/optical cable are in a ring or in a chain, if so, storing the in-ring identification into the database, and if so, storing the in-chain identification into the database; and step C6, cycling between step C1 and step C6 after saving the service physical same route data and reading the next service.
1. And (3) ring network physical same route analysis algorithm description: 1) analyzing whether the route of the ring network is repeated through the optical path, if so, the route is the same route of the ring network physics: the same routing is not considered for the paragraphs of different levels in the same ring, the same routing of the ring network only aims at the topology section on the ring, and the links hung up and down on the ring are not considered. 2) And inquiring a section of topology on the ring network, inquiring the associated optical path, inquiring the associated office-oriented optical fiber according to the optical path, and inquiring the fiber core, the optical cable section and the optical cable which belong to the optical path according to the office-oriented optical fiber, wherein if more than two optical cables which are topologically associated on the ring are the same, namely the ring network is physically the same route.
2. The service logic same route analysis algorithm shows that 1) the service logic is same route: and in the PTN service route, if the main and standby routes pass through the same paragraph and are in the topology section of the ring, the same route paragraph still exists, and the route is marked as the logic same route. 2) Inquiring the service route: and only reading the service with the service type being point-to-point to perform the same-route analysis. 3) Judging the number of the associated pseudo wires of the point-to-point service: if the number is equal to 1, the service only has one main route, a protection tunnel of a related tunnel route table query tunnel needs to be carried out, and if the protection tunnel is queried, service same-route analysis is carried out based on the main tunnel and the standby tunnel. 4) Judging the number of the associated pseudo wires of the point-to-point service: if the number is equal to 2 or 3, the service is a service type with one source and two sinks, and comprises two routes of a main route and a standby route, and then the service co-route analysis is carried out based on the main tunnel and the standby tunnel. 5) The main route and the standby route of the service are associated, a section of route based on the main route is compared with all route sections in the standby route, whether the same route section exists or not is judged, and if the same route section exists, the topology of the related route is stored; and continuously comparing the next section of the main route with all the route sections in the standby route, and sequentially circulating whether the same route sections exist or not to judge all the main route sections. 6) And performing ring network judgment on route segments of the same route of all the main and standby routes, judging whether the route segments are on a ring or a chain, and storing the identification of the chain on the ring into a database.
3. The analysis algorithm of the service physical same route shows that 1) the service physical same route: the PTN eliminates the service of the same service logic route, records all paragraphs passed by the main and standby routes, eliminates the paragraphs on the drop link, and analyzes whether all paragraphs pass through the same optical path, if so, records the paragraphs as the same service physical route. 2) And inquiring a section of topology on the main service and standby routes, belonging to the topology on the ring, the associated optical path, the associated office-oriented optical fiber according to the optical path, and the fiber core, the optical cable section and the optical cable which belong to the office-oriented optical fiber, wherein if more than two optical cables which are associated with the topology on the ring are the same, namely the service physical same route is realized.
4. Establishing a transmission network optimization index library:
1) and key indexes of the same route:
(1) ring network physical co-routing: the index counts the PTN looped network same route, namely counts the number of the PTN looped network same route. After all paragraphs passing through the PTN looped network and the paragraphs on the dropped link are removed, whether all the paragraphs pass through the same-section laying section or not is analyzed, and if the paragraphs pass through the same-section laying section, the paragraphs are recorded as the physical same route of the looped network.
Namely: and P1 is PTN service logic same-path, and the number of PTN service logic same-path (on the ring) is counted.
(2) The service logic is the same route: the index counts the PTN service logic same path, namely counts the number (on a ring) of the PTN service logic same path. If a main/standby route of a service on the PTN passes through the same paragraph and the paragraph on the dropped link is eliminated, the same route paragraph still exists, and the route is marked as the same service logic route.
Namely: p2 is PTN service physical co-route, which is the number of PTN service physical co-routes counted (on ring).
(3) And (3) service physical co-routing: the index counts the PTN service physical same route, namely counts the number (on a ring) of PTN service physical same routes. After all paragraphs passing through the PTN looped network and the paragraphs on the dropped link are removed, whether all the paragraphs pass through the same-section laying section or not is analyzed, and if the paragraphs pass through the same-section laying section, the paragraphs are recorded as the physical same route of the looped network.
Namely: and P3 is PTN looped network same route, and the PTN looped network same route number is counted.
2) Network optimization assessment indexes:
the R1 is the PTN service logic equivalent, i.e., weight-P1 × 0.1 (if negative values occur, the value is directly 0).
R2 is the physical route of PTN traffic-weight-P2 x 0.1 (if negative, take value of 0 directly).
The routing of the R3-PTN ring network is weight-P3 x 0.1 (if negative value occurs, directly take 0 value).
3) Sum ═ R1+ R1+ R3
Figure BDA0002785089440000071
According to the method, the network structure of the city and the district is promoted to be continuously optimized by comprehensively scoring and trial-making according to the network structure of the city, the network is standardized and constructed, the comprehensive scoring of the network structure is greatly improved, and high-quality basic network support is provided for government enterprises and guests; meanwhile, through the combination of an automatic analysis tool and a management system, the maintenance investment of local companies is reduced, the working efficiency is improved, and the purposes of reducing risks and improving benefits are achieved.
The hidden trouble of the same route in the transmission network is discovered in time through the proposal, and the evaluation index of the hidden trouble of the same route is carried out on the hidden trouble of the network transmitted in the city, thereby improving the stability of the transmission network management. The application proposal outputs network scoring indexes, service logic same-route hidden dangers, service physical same-route hidden dangers and ring network physical same-route hidden dangers of companies in various regions. The provincial company carries out quantitative index weight matching based on the analyzed indexes, comprehensively scores the network structure of the city, assesses the network condition of the city at regular time and improves the stability of the network.
Those skilled in the art will appreciate that the invention may be practiced without these specific details. It is pointed out here that the above description is helpful for the person skilled in the art to understand the invention, but does not limit the scope of protection of the invention. Any such equivalents, modifications and/or omissions as may be made without departing from the spirit and scope of the invention may be resorted to.

Claims (7)

1. A method for evaluating hidden troubles of the same route based on a transmission network is characterized by comprising the following network evaluation basic indexes for finding the hidden troubles of the same route of the transmission network: the hidden danger of business logic same route and/or hidden danger of business physical same route and/or hidden danger of ring network physical same route.
2. The method for evaluating the hidden danger of the same route based on the transmission network according to claim 1, wherein the hidden danger value of the physical same route of the ring network is the number of the physical same routes of the ring network and the hidden danger coefficient of the physical same route of the ring network; the hidden danger value of the same service logic route is the number of the same service logic routes and the hidden danger coefficient of the same service logic route; the hidden danger value of the business physical same route is the number of the business physical same route and the hidden danger coefficient of the business physical same route.
3. The method for evaluating the hidden danger of the same route based on the transmission network as claimed in claim 2, wherein the hidden danger coefficient of the same physical route of the ring network, the hidden danger coefficient of the same logical route of the service and the hidden danger coefficient of the same physical route of the service are all 0.1.
4. The evaluation method for hidden troubles of the same route of the transmission network according to claim 2, wherein the network assessment adopts the following algorithm to determine the score: and if the score is negative, directly taking a value of 0.
5. The method for evaluating the hidden danger of the same route of the transmission network according to the claim 1, wherein the process of the analysis algorithm of the hidden danger of the physical same route of the ring network comprises the following steps: a1, extracting the topology of the ring network; step A2, removing topologies with different grades from the ring network; step A3, judging whether a light path exists, if no, returning to the step A1, and if yes, entering the step A4; step A4, inquiring the office fiber according to the light path, if there is no office fiber, returning to step A3, if there is office fiber, entering step A5; step A5, inquiring fiber cores according to the office direction optical fiber, if no fiber core exists, returning to the step A3, and if fiber cores exist, entering the step A6; step A6, inquiring the optical cable section according to the fiber core, if no optical cable exists, returning to the step A3, and if the optical cable exists, entering the step A7; step A7, recording the optical cable and the optical cable section; step A8, whether a ring topology is still available, if yes, the loop is cycled between step A1 and step A8 after reading the topology of the next section of the ring, and if not, the loop enters step A9; and step A9, comparing whether the optical cable and the optical cable section have repetition, if so, the optical cable and the optical cable section are the ring network physical same route, and returning to the topological section of the ring network physical same route.
6. The method for evaluating the hidden danger of the same route of the transmission network according to claim 1, wherein the analysis algorithm flow of the hidden danger of the same route of the service logic comprises the following steps: step B1, reading a service; step B2, reading the main route and the standby route of the service; step B3, judging whether both the primary route and the standby route exist, if both exist, entering step B4, if only one primary route exists, associating the tunnel protection group to acquire the primary route and the standby route, entering step B4, if no standby route exists, entering step B6; step B4, judging whether the main route and the standby route have the same route, if not, entering step B6, and if so, entering step B5; step B5, judging whether the main and standby routes are on the ring or on the chain, if so, storing the on-ring mark into the database, and if so, storing the on-chain mark into the database; and step B6, cycling between step B1 and step B6 after the business logic same route data is saved and the next business is read.
7. The method for evaluating the hidden danger of the same route of the transmission network according to claim 1, wherein the analysis algorithm process of the hidden danger of the same route of the business physics comprises the following steps: step C1, reading a service; step C2, reading the main route and the standby route of the service; step C3, judging whether both the main route and the standby route exist, if so, entering step C4, otherwise, entering step C6; step C4, judging whether the optical paths associated with the main route and the standby route are the same optical cable, if so, entering step C5, otherwise, entering step C6; step C5, judging whether the main and standby routes associated with the same optical path/optical cable are in a ring or in a chain, if so, storing the in-ring identification into the database, and if so, storing the in-chain identification into the database; and step C6, cycling between step C1 and step C6 after saving the service physical same route data and reading the next service.
CN202011295239.8A 2020-11-18 2020-11-18 Method for evaluating hidden danger of same route based on transmission network Active CN112422343B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011295239.8A CN112422343B (en) 2020-11-18 2020-11-18 Method for evaluating hidden danger of same route based on transmission network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011295239.8A CN112422343B (en) 2020-11-18 2020-11-18 Method for evaluating hidden danger of same route based on transmission network

Publications (2)

Publication Number Publication Date
CN112422343A true CN112422343A (en) 2021-02-26
CN112422343B CN112422343B (en) 2023-04-18

Family

ID=74774524

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011295239.8A Active CN112422343B (en) 2020-11-18 2020-11-18 Method for evaluating hidden danger of same route based on transmission network

Country Status (1)

Country Link
CN (1) CN112422343B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114338427A (en) * 2022-03-02 2022-04-12 联信弘方(北京)科技股份有限公司 Network hidden danger analysis method and device, electronic equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102833772A (en) * 2012-09-07 2012-12-19 北京直真科技股份有限公司 Method and device for judging base transceiver station single-route and service configuration hidden trouble
CN103166774A (en) * 2011-12-09 2013-06-19 中国移动通信集团福建有限公司 Checking method and device of the same route
JP2015090994A (en) * 2013-11-05 2015-05-11 日本電信電話株式会社 Network design device and method
CN107919904A (en) * 2016-10-09 2018-04-17 中国电信股份有限公司 Band protection service path management method, device
CN108574640A (en) * 2017-03-10 2018-09-25 中国移动通信集团陕西有限公司 Business is the same as route detecting method and device in transmission network
CN110995348A (en) * 2019-11-01 2020-04-10 中国移动通信集团广东有限公司 System and method for troubleshooting and avoiding hidden physical routing danger of transmission network
CN111934914A (en) * 2020-07-15 2020-11-13 北京思特奇信息技术股份有限公司 Method and system for analyzing same route of transmission network

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103166774A (en) * 2011-12-09 2013-06-19 中国移动通信集团福建有限公司 Checking method and device of the same route
CN102833772A (en) * 2012-09-07 2012-12-19 北京直真科技股份有限公司 Method and device for judging base transceiver station single-route and service configuration hidden trouble
JP2015090994A (en) * 2013-11-05 2015-05-11 日本電信電話株式会社 Network design device and method
CN107919904A (en) * 2016-10-09 2018-04-17 中国电信股份有限公司 Band protection service path management method, device
CN108574640A (en) * 2017-03-10 2018-09-25 中国移动通信集团陕西有限公司 Business is the same as route detecting method and device in transmission network
CN110995348A (en) * 2019-11-01 2020-04-10 中国移动通信集团广东有限公司 System and method for troubleshooting and avoiding hidden physical routing danger of transmission network
CN111934914A (en) * 2020-07-15 2020-11-13 北京思特奇信息技术股份有限公司 Method and system for analyzing same route of transmission network

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114338427A (en) * 2022-03-02 2022-04-12 联信弘方(北京)科技股份有限公司 Network hidden danger analysis method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN112422343B (en) 2023-04-18

Similar Documents

Publication Publication Date Title
CN110474806B (en) Power communication network key node identification method
CN104780000B (en) A kind of method of fibre core fault fast positioning
CN110971525B (en) Service routing and addressing method for service operation of power communication network
CN111865627B (en) Transmission networking evaluation method, device, computing equipment and computer storage medium
CN102801732A (en) Power communication backbone network safety risk assessment method based on network topology
CN103107941B (en) Cable resource autodispatcher and method
CN113988484B (en) Traffic accessibility index optimization method applied to territorial space total planning
CN112422343B (en) Method for evaluating hidden danger of same route based on transmission network
CN112966385A (en) Method and system for identifying topology weak points of power distribution network frame
CN110995348A (en) System and method for troubleshooting and avoiding hidden physical routing danger of transmission network
CN108957657B (en) The fibre core type automatic judging method of non-decreasing type backbone optical cable in ODN system
CN111934914B (en) Method and system for analyzing same route of transmission network
CN107563665A (en) A kind of electric power facility distribution and power network resources quality testing method
CN114172784B (en) Network fault risk analysis method and device
CN106656572B (en) electric power communication channel hidden danger point analysis method and device
CN116667881B (en) Electric power communication network key link evaluation method based on rapid density clustering
CN112818557A (en) Well control system safety assessment method and system based on fuzzy comprehensive analysis
CN111967634A (en) Comprehensive evaluation and optimal sorting method and system for investment projects of power distribution network
CN106506190A (en) A kind of communication network runtime and operation method
Jian et al. Research on reliability evaluation of power communication network
Yang et al. Vulnerability analysis of urban rail transit network by considering the station track layout and passenger behavior
CN111259308B (en) Bus network hub evaluation method based on multiple mapping
CN114285789A (en) Method for automatically generating service grooming scheme in power communication network
CN116346701B (en) Power communication network key link identification method
CN113361941B (en) Reliability evaluation method and system for power communication network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant