CN112422343B - Method for evaluating hidden danger of same route based on transmission network - Google Patents

Method for evaluating hidden danger of same route based on transmission network Download PDF

Info

Publication number
CN112422343B
CN112422343B CN202011295239.8A CN202011295239A CN112422343B CN 112422343 B CN112422343 B CN 112422343B CN 202011295239 A CN202011295239 A CN 202011295239A CN 112422343 B CN112422343 B CN 112422343B
Authority
CN
China
Prior art keywords
route
same
network
service
hidden danger
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011295239.8A
Other languages
Chinese (zh)
Other versions
CN112422343A (en
Inventor
付体锋
刘晓茹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zznode Technology Co ltd
Original Assignee
Beijing Zznode Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zznode Technology Co ltd filed Critical Beijing Zznode Technology Co ltd
Priority to CN202011295239.8A priority Critical patent/CN112422343B/en
Publication of CN112422343A publication Critical patent/CN112422343A/en
Application granted granted Critical
Publication of CN112422343B publication Critical patent/CN112422343B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A network assessment basic index for discovering hidden dangers of the same route of a transmission network is constructed or perfected by adding 3 hidden danger points of the same route of business logic same route, business physical same route and ring network physical same route, thereby being beneficial to improving the network quality level, improving the production efficiency and realizing cost reduction and efficiency improvement.

Description

Method for evaluating hidden danger of same route based on transmission network
Technical Field
The invention relates to a transmission network structure analysis platform technology, in particular to a method for evaluating hidden dangers of same route based on a transmission network.
Background
The transmission Network is constructed for many years, an IT (Internet Technology) analysis means and an analysis method are established and perfected aiming at Network optimization indexes, so that the safety of the transmission Network is greatly improved, the project realizes the analysis of a Packet Transport Network (PTN) logical ring Network, and the analysis of the hidden danger indexes of the ring Network of 6 rings comprises the ring forming rate of a PTN access layer, the double-classification of Network elements of the PTN access layer, the physical double-up of a PTN convergence layer, a PTN supermacroring, a PTN long single chain and the analysis of a PTN large convergent point. However, with the development of communication technology, the network scale increases year by year, the concerned network health indexes are too many, the indexes of the logic ring network cannot meet the network health degree, the external line resources need to be combined, the physical indexes need to be analyzed in association, and the association between the logic and physical indexes is lacked, so that the analysis efficiency is low in fault, the problem of rapid positioning cannot be caused, and the network health degree cannot be comprehensively examined.
The optimization analysis of the network structure is the key and difficult point in the current network work, all provincial companies, city companies and prefecture and county companies have network maintainers at present, and the result also organizes local city and prefecture personnel for centralized discussion for many times in the process of development, and fully investigates and collects the requirements of the network and business personnel. In the actual network structure optimization analysis, the prior art has the following disadvantages: 1) The passive situation that the problem cannot be found manually in the current network structure is as follows: the local city companies have a plurality of manufacturers and complex and changeable network structures, namely, the situation of sharing a common logic path and a common physical path exists, and a plurality of hidden dangers are brought to the local city business. 2) The problem that the current network structure manual analysis efficiency is low: at present, companies in cities and counties in various regions analyze the network, the topology is mainly checked through network management by manpower, the efficiency is very low, and data can be inquired without records. 3) The current fault location is not sufficiently prepared: the current network hidden danger is many, and the location is accurate inadequately. Many network faults are caused by faults, but due to the problem of network networking, a plurality of faults are reported, and the accurate positioning of the faults is influenced. 4) And the current network structure has the same route problem: when a network fails, the ring networks are routed, so that the ring service is not formed logically through the topological structure of the ring networks, no protection effect is achieved, the ring is formed in the network structure, but no service protection is provided, and the standby service cannot be started normally when the service master fails.
Disclosure of Invention
Aiming at the defects or shortcomings in the prior art, the invention provides a method for evaluating hidden dangers of the same route based on a transmission network, which is characterized in that by adding 3 hidden dangers points of the same route of service logic same route, service physical same route and looped network physical same route, network evaluation basic indexes for finding hidden dangers of the same route of the transmission network are jointly constructed or perfected, thereby being beneficial to improving the network quality level, improving the production efficiency and realizing cost reduction and efficiency improvement.
The technical solution of the invention is as follows:
a method for evaluating hidden troubles of the same route based on a transmission network is characterized by comprising the following network evaluation basic indexes for finding the hidden troubles of the same route of the transmission network: the hidden danger of business logic same route and/or hidden danger of business physical same route and/or hidden danger of ring network physical same route.
Ring network physical same route hidden danger value = number of ring network physical same route × (ring network physical same route hidden danger coefficient); the hidden danger value = hidden danger coefficient of service logic same route; the hidden danger value of the service physical same route = the number of the service physical same route and the hidden danger coefficient of the service physical same route.
The hidden danger coefficient of the ring network physical same route, the hidden danger coefficient of the service logic same route and the hidden danger coefficient of the service physical same route are all 0.1.
The network assessment adopts the following algorithm to determine the score: the score = preset weight-hidden danger value, the higher the score is, the better the network quality is, and if the score has a negative value, the value of 0 is directly taken.
The analysis algorithm process of the physical same routing hidden danger of the ring network comprises the following steps: a1, taking topology on a ring network; step A2, removing topologies with different grades from the ring network; step A3, judging whether a light path exists, if no light path exists, returning to the step A1, and if yes, entering the step A4; step A4, inquiring the office-oriented optical fiber according to the optical path, returning to the step A3 if no office-oriented optical fiber exists, and entering the step A5 if the office-oriented optical fiber exists; step A5, inquiring a fiber core according to the local optical fiber, returning to the step A3 if no fiber core exists, and entering to the step A6 if a fiber core exists; step A6, inquiring the optical cable section according to the fiber core, if no optical cable exists, returning to the step A3, and if an optical cable exists, entering the step A7; step A7, recording the optical cable and the optical cable section; step A8, whether ring topology exists or not is judged, if yes, the ring topology is read and then circulated between the step A1 and the step A8, and if not, the step A9 is executed; and A9, comparing whether the optical cable and the optical cable section have repetition, if so, determining that the optical cable and the optical cable section have the same physical route of the ring network, and returning to the topological section of the same physical route of the ring network.
The analysis algorithm process of the service logic same routing hidden danger comprises the following steps: step B1, reading a service; b2, reading the main route and the standby route of the service; step B3, judging whether both the main route and the standby route exist, if both the main route and the standby route exist, entering step B4, if only one main route exists, associating the tunnel protection group to obtain the main route and the standby route, and then entering step B4, and if no standby route exists, entering step B6; step B4, judging whether the main route and the standby route have the same route, if not, entering step B6, and if so, entering step B5; step B5, judging whether the main route and the standby route are in a ring or in a chain, if so, storing the in-ring identification into a database, and if so, storing the in-chain identification into the database; and step B6, storing the same routing data of the service logic and reading the next service, and circulating between the step B1 and the step B6.
The analysis algorithm process of the hidden danger of the business physics same route comprises the following steps: step C1, reading a service; step C2, reading the main route and the standby route of the service; step C3, judging whether the main route and the standby route exist, if so, entering step C4, otherwise, entering step C6; step C4, judging whether the optical paths associated with the main route and the standby route are the same optical cable, if so, entering step C5, otherwise, entering step C6; step C5, judging whether the main and standby routes associated with the same optical path/optical cable are in a ring or in a chain, if so, storing the in-ring identification into a database, and if so, storing the in-chain identification into the database; and step C6, storing the service physical same route data, reading the next service and circulating between the step C1 and the step C6.
The invention has the following technical effects: the invention relates to a method for evaluating hidden dangers of the same route based on a transmission network, which constructs or perfects network evaluation basic indexes for finding hidden dangers of the same route of the transmission network together by adding 3 hidden dangers points of the same route, such as a service logic same route, a service physical same route and a ring network physical same route. The biggest bright point of the technical result is that the method is beneficial to carrying out IT means analysis through 3 same-route hidden trouble points, calculating hidden trouble values of cities and counties in each region, assessing network structures of the cities and the counties in each region through the hidden trouble values, reducing hidden troubles of the network and improving the network quality. Through automatic data analysis, a complete index assessment system is established, the network quality level is improved, the production efficiency is improved, and cost reduction and efficiency improvement are realized.
The invention has the characteristics that: 1. and optimizing a processing mechanism of the assessment indexes aiming at the network. 2. And a processing mechanism of ring network physical same route aiming at network optimization evaluation indexes. 3. And a processing mechanism aiming at network optimization and evaluation indexes and having the same business physics route. 4. And a processing mechanism aiming at the service logic of network optimization assessment indexes and the same route.
Compared with the prior art, the invention can be beneficial in the following aspects: 1. the work efficiency is improved, the network structure of the province is automatically analyzed, meanwhile, the network structure score is automatically calculated according to the indexes and the weight, the manual analysis is shortened, and the work efficiency is improved. 2. The method has the advantages that the hidden danger points of the network are accurately positioned, detailed information of hidden dangers of PTN service logic same routes, PTN service physical same routes and PTN looped network same routes is provided, effective network rectification in local cities and counties is facilitated, and the same routes are avoided. 3. The stability of the network structure is improved, the 3 types of network index hidden dangers are comprehensively graded and assessed, the network structure is continuously improved in the city, the network structure is continuously optimized, and the stability of the network is improved. 4. The cost is saved, the network structure is automatically optimized, the problem of the same route is avoided from the network networking, the manual analysis time is reduced, and the labor cost is saved. 5. The satisfaction of the user is improved, and good social benefits are created. The network structure optimization avoids the condition that the network has the same route, ensures the stability of user service, avoids the influence of faults and improves the use perception of users. In fact, currently, province companies are actively developing network structure optimization assessment, the assessment system has a good effect in local and city companies, gradually extends to the tail end of a district and county network, and can improve the working efficiency of personnel and achieve the achievement of cost reduction and benefit improvement while solving the actual problem of the network structure.
Drawings
Fig. 1 is a schematic flow chart of a ring network physical co-route analysis algorithm involved in the method for evaluating the potential risk of co-route based on the transmission network of the present invention. FIG. 1 includes step 1, taking topology on the torus; step 2, removing the topology of different levels from the ring network (for example, the ring is an access ring, if there is topology between the upper connection convergence network elements, this section is the same); step 3, judging whether a light path exists (associated light path data), if not, returning to the step 1, and if so, entering the step 4; step 4, inquiring the office-oriented optical fiber according to the optical path, returning to the step 3 if no office-oriented optical fiber exists, and entering the step 5 if the office-oriented optical fiber exists; step 5, inquiring a fiber core according to the local optical fiber, if no fiber core exists, returning to the step 3, and if a fiber core exists, entering the step 6; step 6, inquiring the optical cable section according to the fiber core, returning to the step 3 if no optical cable exists, and entering to the step 7 if the optical cable exists; step 7, recording the optical cable and the optical cable section; step 8, whether ring topology exists or not is judged, if yes, the ring topology is read and then circulated between the step 1 and the step 8, and if not, the step 9 is carried out; and 9, comparing whether the optical cable and the optical cable section are repeated or not, if so, determining the optical cable and the optical cable section are the same physical route, and returning to the topological section of the same route.
Fig. 2 is a schematic flow chart of a service logic same-route analysis algorithm involved in the method for evaluating the same-route hidden danger based on the transmission network according to the present invention. Fig. 2 includes step 1, reading a service (e-line); step 2, reading the main route and the standby route of the service; step 3, judging whether both the main route and the standby route exist, if both the main route and the standby route exist, entering step 4, if only one main route exists, associating the tunnel protection group to obtain the main route and the standby route, entering step 4, and if no standby route exists, entering step 6; step 4, judging whether the main route and the standby route have the same route, if not, entering step 6, and if so, entering step 5; step 5, judging whether the main route and the standby route are in a ring or in a chain, if so, storing the in-ring identification into a database, and if so, storing the in-chain identification into the database; and 6, storing the data, reading the next service and circulating between the step 1 and the step 6.
Fig. 3 is a schematic flow chart of a business physical same-route analysis algorithm involved in the method for evaluating the hidden danger of the same-route based on the transmission network according to the present invention. Fig. 3 includes step 1, reading a service (Servicetype = '0', e-line service, non-logically co-routed service); step 2, reading the main route and the standby route of the service; step 3, judging whether both the main route and the standby route exist, if so, entering step 4, otherwise, entering step 6; step 4, judging whether the optical paths associated with the main route and the standby route are the same optical cable, if so, entering step 5, otherwise, entering step 6; step 5, judging whether the main and standby routes associated with the same optical path/optical cable are in a ring or in a chain, if so, storing the in-ring identification into a database, and if so, storing the in-chain identification into the database; and 6, storing the data, reading the next service and circulating between the step 1 and the step 6.
Fig. 4 is a schematic diagram of a structure of a transmission network optimization index library involved in implementing the method for evaluating the hidden danger of the same route based on the transmission network of the present invention. The network monitoring system comprises an assessment system part, a same-route hidden danger analysis part and a basic data part, wherein the assessment system part comprises a transmission network optimization assessment index system, the same-route hidden danger analysis part comprises a looped network physical same route, a service logic same route and a service physical same route, and the basic data part comprises a topology, an optical path, a service, a looped network, an optical cable section and a laying section.
Detailed Description
The invention is explained below with reference to the figures (fig. 1-4) and examples.
Fig. 1 is a schematic flow chart of a ring network physical co-route analysis algorithm involved in the method for evaluating the potential risk of co-route based on the transmission network of the present invention. Fig. 2 is a schematic flow chart of a service logic same-route analysis algorithm involved in the method for evaluating the same-route hidden danger based on the transmission network according to the present invention. Fig. 3 is a schematic flow chart of a service physical same-route analysis algorithm involved in the method for evaluating the hidden danger of the same-route based on the transmission network according to the present invention. Fig. 4 is a schematic structural diagram of a transmission network optimization index library involved in the method for evaluating the hidden danger of the same route based on the transmission network according to the present invention. Referring to fig. 1 to 4, a method for evaluating hidden dangers of the same route based on a transmission network is characterized by establishing the following network assessment basic indexes for discovering the hidden dangers of the same route of the transmission network: the hidden danger of business logic same route and/or hidden danger of business physical same route and/or hidden danger of ring network physical same route. Ring network physical same route hidden danger value = number of ring network physical same route × (ring network physical same route hidden danger coefficient); service logic same route hidden danger value = number of service logic same routes and service logic same route hidden danger coefficient; the hidden danger value of the service physical same route = number of the service physical same route and hidden danger coefficient of the service physical same route. The hidden danger coefficient of the ring network physical same route, the hidden danger coefficient of the service logic same route and the hidden danger coefficient of the service physical same route are all 0.1. The network assessment adopts the following algorithm to determine scores: the score = preset weight-hidden danger value, the higher the score is, the better the network quality is, and if the score has a negative value, the value of 0 is directly taken.
The analysis algorithm process of the hidden danger of the physical same route of the ring network comprises the following steps: a1, taking topology on a ring network; step A2, removing topologies with different grades from the ring network; step A3, judging whether a light path exists, if no light path exists, returning to the step A1, and if yes, entering the step A4; step A4, inquiring the office-oriented optical fiber according to the optical path, returning to the step A3 if no office-oriented optical fiber exists, and entering the step A5 if the office-oriented optical fiber exists; step A5, inquiring a fiber core according to the local optical fiber, returning to the step A3 if no fiber core exists, and entering to the step A6 if a fiber core exists; step A6, inquiring the optical cable section according to the fiber core, returning to the step A3 if no optical cable exists, and entering to the step A7 if the optical cable exists; step A7, recording the optical cable and the optical cable section; step A8, whether ring topology exists or not is judged, if yes, the ring topology is read and then circulated between the step A1 and the step A8, and if not, the step A9 is executed; and A9, comparing whether the optical cable and the optical cable section are repeated, if so, determining that the optical cable and the optical cable section are the same route of the ring network physics, and returning to the topological section of the same route of the ring network physics. The analysis algorithm process of the hidden danger of the business logic same route comprises the following steps: step B1, reading a service; b2, reading the main route and the standby route of the service; step B3, judging whether both the main route and the standby route exist, if both the main route and the standby route exist, entering step B4, if only one main route exists, associating the tunnel protection group to obtain the main route and the standby route, and then entering step B4, and if no standby route exists, entering step B6; step B4, judging whether the main route and the standby route have the same route, if not, entering step B6, and if so, entering step B5; step B5, judging whether the main route and the standby route are in a ring or in a chain, if so, storing the ring identifier into a database, and if so, storing the chain identifier into the database; and step B6, storing the same routing data of the service logic, reading the next service and circulating between the step B1 and the step B6. The analysis algorithm process of the hidden danger of the business physics same route comprises the following steps: step C1, reading a service; step C2, reading the main route and the standby route of the service; step C3, judging whether both the main route and the standby route exist, if so, entering step C4, otherwise, entering step C6; step C4, judging whether the optical paths associated with the main route and the standby route are the same optical cable, if so, entering step C5, otherwise, entering step C6; step C5, judging whether the main and standby routes associated with the same optical path/optical cable are in a ring or in a chain, if so, storing the in-ring identification into a database, and if so, storing the in-chain identification into the database; and step C6, storing the service physical same-route data, reading the next service and circulating between the step C1 and the step C6.
1. And (3) ring network physical same route analysis algorithm description: 1) Analyzing whether the route of the ring network is repeated through the optical path, if so, the route is the same route of the ring network physics: the same routing is not considered for the paragraphs of different levels in the same ring, the same routing of the ring network only aims at the topology section on the ring, and the links hung up and down on the ring are not considered. 2) And inquiring a section of topology on the ring network, inquiring the associated optical path, inquiring the associated office-oriented optical fiber according to the optical path, and inquiring the fiber core, the optical cable section and the optical cable which belong to the optical path according to the office-oriented optical fiber, wherein if more than two optical cables which are topologically associated on the ring are the same, namely the ring network is physically the same route.
2. The service logic same route analysis algorithm shows that 1) the service logic is same route: and PTN service routing, if the main and standby routes pass through the same paragraph and are in a topology section on a ring, the same route paragraph still exists, and the route is marked as a logic same route. 2) Inquiring the service route: and only reading the service with the service type being point-to-point to perform the same-route analysis. 3) Judging the number of the associated pseudo wires of the point-to-point service: if the number is equal to 1, the service only has one main route, a protection tunnel of a related tunnel route table query tunnel needs to be carried out, and if the protection tunnel is queried, service same-route analysis is carried out based on the main tunnel and the standby tunnel. 4) Judging the number of the associated pseudo wires of the point-to-point service: if the number is equal to 2 or 3, the service is a service type with one source and two sinks, and comprises two routes of a main route and a standby route, and then the service co-route analysis is carried out based on the main tunnel and the standby tunnel. 5) The main route and the standby route of the service are associated, one section of route based on the main route is compared with all route sections in the standby route, whether the same route section exists or not is judged, and if the same route section exists, the topology of the related route is stored; and continuously comparing the next route segment of the main route with all the route segments in the standby route, and sequentially circulating whether the same route segment exists or not to judge all the main route segments. 6) And performing ring network judgment on route segments of the same route of all the main and standby routes, judging whether the route segments are on a ring or a chain, and storing the identification of the chain on the ring into a database.
3. The analysis algorithm of the service physical same route shows that 1) the service physical same route: the PTN eliminates the service of the same service logic route, records all paragraphs passed by the main and standby routes, eliminates the paragraphs on the drop link, and analyzes whether all paragraphs pass through the same optical path, if so, records the paragraphs as the same service physical route. 2) And inquiring a section of topology on the main service and standby routes, belonging to the topology on the ring, the associated optical path, the associated office-oriented optical fiber according to the optical path, and the fiber core, the optical cable section and the optical cable which belong to the office-oriented optical fiber, wherein if more than two optical cables which are associated with the topology on the ring are the same, namely the service physical same route is realized.
4. Establishing a transmission network optimization index library:
1) And key indexes of the same route:
(1) The ring network is physically routed: the index statistics PTN looped network same route = statistics PTN looped network same route number. After all paragraphs passing through the PTN looped network and the paragraphs on the dropped link are removed, whether all the paragraphs pass through the same-section laying section or not is analyzed, and if the paragraphs pass through the same-section laying section, the paragraphs are recorded as the physical same route of the looped network.
Namely: p1= PTN service logical co-route = count the number of PTN service logical co-routes (on the ring).
(2) Service logic same route: the index counts PTN service logic same paths = the number (on a ring) of PTN service logic same paths. If a main/standby route of a service on the PTN passes through the same paragraph and the paragraph on the dropped link is eliminated, the same route paragraph still exists, and the route is marked as the same service logic route.
Namely: p2= PTN traffic physical same route = count the number of PTN traffic physical same routes (on the ring).
(3) And (3) service physical co-routing: the index counts PTN service physical same route = PTN service physical same route number (on a ring). After all paragraphs passing through the PTN looped network and the paragraphs on the dropped link are removed, whether all the paragraphs pass through the same-section laying section or not is analyzed, and if the paragraphs pass through the same-section laying section, the paragraphs are recorded as the physical same route of the looped network.
Namely: p3= PTN ring network same route = count the number of PTN ring network same routes.
2) Network optimization assessment indexes:
r1= PTN traffic logical equivalent = weight-P1 × 0.1 (if a negative value occurs, it directly takes the value 0).
R2= PTN traffic physical co-route = weight-P2 x 0.1 (if negative values occur, take the value 0 directly).
R3= PTN ring network routing = weight-P3 × 0.1 (if negative value occurs, 0 is directly taken).
3) And the city score formula SUM = R1+ R1+ R3
Figure BDA0002785089440000071
According to the method, the network structure of the city and the district is promoted to be continuously optimized by comprehensively scoring and trial-making according to the network structure of the city, the network is standardized and constructed, the comprehensive scoring of the network structure is greatly improved, and high-quality basic network support is provided for government enterprises and guests; meanwhile, through the combination of an automatic analysis tool and a management system, the maintenance investment of local companies is reduced, the working efficiency is improved, and the purposes of reducing risks and improving benefits are achieved.
The hidden trouble of the same route in the transmission network is discovered in time through the proposal, and the evaluation index of the hidden trouble of the same route is carried out on the hidden trouble of the network transmitted in the city, thereby improving the stability of the transmission network management. The application proposal outputs network scoring indexes, service logic same-route hidden dangers, service physical same-route hidden dangers and ring network physical same-route hidden dangers of companies in various regions. The provincial company carries out quantitative index weight matching based on the analyzed indexes, comprehensively scores the network structure of the city, assesses the network condition of the city at regular time and improves the stability of the network.
Those skilled in the art will appreciate that the invention may be practiced without these specific details. It is pointed out here that the above description is helpful for the person skilled in the art to understand the invention, but does not limit the scope of protection of the invention. Any such equivalents, modifications and/or omissions as may be made without departing from the spirit and scope of the invention may be resorted to.

Claims (4)

1. A method for evaluating hidden troubles of the same route based on a transmission network is characterized by comprising the following network evaluation basic indexes for finding the hidden troubles of the same route of the transmission network: service logic same routing hidden danger and/or service physical same routing hidden danger and/or looped network physical same routing hidden danger;
the analysis algorithm process of the hidden danger of the physical same route of the ring network comprises the following steps: a1, taking topology on a ring network; step A2, removing topologies with different grades from the ring network; step A3, judging whether a light path exists, if no light path exists, returning to the step A1, and if yes, entering the step A4; step A4, inquiring the office-oriented optical fiber according to the optical path, returning to the step A3 if no office-oriented optical fiber exists, and entering the step A5 if the office-oriented optical fiber exists; step A5, inquiring a fiber core according to the local optical fiber, returning to the step A3 if no fiber core exists, and entering to the step A6 if a fiber core exists; step A6, inquiring the optical cable section according to the fiber core, if no optical cable exists, returning to the step A3, and if an optical cable exists, entering the step A7; step A7, recording the optical cable and the optical cable section; step A8, whether ring topology exists or not is judged, if yes, the ring topology is read and then circulated between the step A1 and the step A8, and if not, the step A9 is executed; step A9, comparing whether the optical cable and the optical cable section have repetition, if so, determining that the optical cable and the optical cable section have the same physical route of the ring network, and returning to the topological section of the same physical route of the ring network;
the analysis algorithm process of the service logic same routing hidden danger comprises the following steps: step B1, reading a service; b2, reading the main route and the standby route of the service; step B3, judging whether both the main route and the standby route exist, if both the main route and the standby route exist, entering step B4, if only one main route exists, associating the tunnel protection group to obtain the main route and the standby route, and then entering step B4, and if no standby route exists, entering step B6; step B4, judging whether the main route and the standby route have the same route, if not, entering step B6, and if so, entering step B5; step B5, judging whether the main route and the standby route are in a ring or in a chain, if so, storing the in-ring identification into a database, and if so, storing the in-chain identification into the database; step B6, storing the same routing data of the business logic and reading the next business and circulating between the step B1 and the step B6;
the analysis algorithm process of the hidden danger of the business physics same route comprises the following steps: step C1, reading a service; step C2, reading the main route and the standby route of the service; step C3, judging whether both the main route and the standby route exist, if so, entering step C4, otherwise, entering step C6; step C4, judging whether the optical paths associated with the main route and the standby route are the same optical cable, if so, entering step C5, otherwise, entering step C6; step C5, judging whether the main and standby routes associated with the same optical path/optical cable are in a ring or in a chain, if so, storing the in-ring identification into a database, and if so, storing the in-chain identification into the database; and step C6, storing the service physical same route data, reading the next service and circulating between the step C1 and the step C6.
2. The method for evaluating the hidden danger of the same route based on the transmission network according to claim 1, wherein the hidden danger value of the physical same route of the ring network = number of the physical same route of the ring network + hidden danger coefficient of the physical same route of the ring network; the hidden danger value = hidden danger coefficient of service logic same route; the hidden danger value of the service physical same route = number of the service physical same route and hidden danger coefficient of the service physical same route.
3. The method for evaluating the hidden danger of the same route based on the transmission network as claimed in claim 2, wherein the hidden danger coefficient of the same physical route of the ring network, the hidden danger coefficient of the same logical route of the service and the hidden danger coefficient of the same physical route of the service are all 0.1.
4. The evaluation method for hidden troubles of the same route of the transmission network according to claim 2, wherein the network assessment adopts the following algorithm to determine the score: the score = preset weight-hidden danger value, the higher the score is, the better the network quality is, and if the score has a negative value, the value of 0 is directly taken.
CN202011295239.8A 2020-11-18 2020-11-18 Method for evaluating hidden danger of same route based on transmission network Active CN112422343B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011295239.8A CN112422343B (en) 2020-11-18 2020-11-18 Method for evaluating hidden danger of same route based on transmission network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011295239.8A CN112422343B (en) 2020-11-18 2020-11-18 Method for evaluating hidden danger of same route based on transmission network

Publications (2)

Publication Number Publication Date
CN112422343A CN112422343A (en) 2021-02-26
CN112422343B true CN112422343B (en) 2023-04-18

Family

ID=74774524

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011295239.8A Active CN112422343B (en) 2020-11-18 2020-11-18 Method for evaluating hidden danger of same route based on transmission network

Country Status (1)

Country Link
CN (1) CN112422343B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114338427A (en) * 2022-03-02 2022-04-12 联信弘方(北京)科技股份有限公司 Network hidden danger analysis method and device, electronic equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102833772A (en) * 2012-09-07 2012-12-19 北京直真科技股份有限公司 Method and device for judging base transceiver station single-route and service configuration hidden trouble
CN103166774A (en) * 2011-12-09 2013-06-19 中国移动通信集团福建有限公司 Checking method and device of the same route
JP2015090994A (en) * 2013-11-05 2015-05-11 日本電信電話株式会社 Network design device and method
CN107919904A (en) * 2016-10-09 2018-04-17 中国电信股份有限公司 Band protection service path management method, device
CN108574640A (en) * 2017-03-10 2018-09-25 中国移动通信集团陕西有限公司 Business is the same as route detecting method and device in transmission network
CN110995348A (en) * 2019-11-01 2020-04-10 中国移动通信集团广东有限公司 System and method for troubleshooting and avoiding hidden physical routing danger of transmission network
CN111934914A (en) * 2020-07-15 2020-11-13 北京思特奇信息技术股份有限公司 Method and system for analyzing same route of transmission network

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103166774A (en) * 2011-12-09 2013-06-19 中国移动通信集团福建有限公司 Checking method and device of the same route
CN102833772A (en) * 2012-09-07 2012-12-19 北京直真科技股份有限公司 Method and device for judging base transceiver station single-route and service configuration hidden trouble
JP2015090994A (en) * 2013-11-05 2015-05-11 日本電信電話株式会社 Network design device and method
CN107919904A (en) * 2016-10-09 2018-04-17 中国电信股份有限公司 Band protection service path management method, device
CN108574640A (en) * 2017-03-10 2018-09-25 中国移动通信集团陕西有限公司 Business is the same as route detecting method and device in transmission network
CN110995348A (en) * 2019-11-01 2020-04-10 中国移动通信集团广东有限公司 System and method for troubleshooting and avoiding hidden physical routing danger of transmission network
CN111934914A (en) * 2020-07-15 2020-11-13 北京思特奇信息技术股份有限公司 Method and system for analyzing same route of transmission network

Also Published As

Publication number Publication date
CN112422343A (en) 2021-02-26

Similar Documents

Publication Publication Date Title
CN104780000B (en) A kind of method of fibre core fault fast positioning
CN110474806B (en) Power communication network key node identification method
CN104135521B (en) The data outliers identification method and system of environment automatic monitoring network
CN103166774B (en) With route arrange distinguish method and device
CN106789408B (en) Method for calculating ring forming rate of IPRAN network access layer equipment
CN112422343B (en) Method for evaluating hidden danger of same route based on transmission network
CN111865627B (en) Transmission networking evaluation method, device, computing equipment and computer storage medium
CN110971525B (en) Service routing and addressing method for service operation of power communication network
CN109495332B (en) Health state evaluation and analysis method for power communication network
Deng et al. Topology vulnerability analysis and measure of urban metro network: The case of Nanjing
CN102938708A (en) Alarm transmission mode based alarm correlation analysis system and analysis method thereof
CN108957657B (en) The fibre core type automatic judging method of non-decreasing type backbone optical cable in ODN system
CN111934914B (en) Method and system for analyzing same route of transmission network
CN109344975A (en) A kind of the verification optimization method and its system of energy communication service Single Point of Faliure
CN107563665A (en) A kind of electric power facility distribution and power network resources quality testing method
CN115660494A (en) Electric power communication network structure risk assessment system
CN110474801A (en) Powerline network fault simulation method based on service reliability
CN106656572B (en) electric power communication channel hidden danger point analysis method and device
CN114390626B (en) Network route determining method, device and readable storage medium
CN116667881B (en) Electric power communication network key link evaluation method based on rapid density clustering
CN103369416A (en) Method for analyzing Ethernet passive optical network (EPON) redundant networking reliability
CN114172784B (en) Network fault risk analysis method and device
CN106506190A (en) A kind of communication network runtime and operation method
Jian et al. Research on reliability evaluation of power communication network
CN114285789A (en) Method for automatically generating service grooming scheme in power communication network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant