CN113709117A - Power communication network safety link configuration method - Google Patents
Power communication network safety link configuration method Download PDFInfo
- Publication number
- CN113709117A CN113709117A CN202110917074.1A CN202110917074A CN113709117A CN 113709117 A CN113709117 A CN 113709117A CN 202110917074 A CN202110917074 A CN 202110917074A CN 113709117 A CN113709117 A CN 113709117A
- Authority
- CN
- China
- Prior art keywords
- node
- acquiring
- link
- service
- communication network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004891 communication Methods 0.000 title claims abstract description 75
- 238000000034 method Methods 0.000 title claims abstract description 54
- 230000006870 function Effects 0.000 claims description 22
- 238000004590 computer program Methods 0.000 claims description 10
- 238000004364 calculation method Methods 0.000 abstract description 8
- 230000005540 biological transmission Effects 0.000 abstract description 6
- 238000010586 diagram Methods 0.000 description 7
- 230000003287 optical effect Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000005856 abnormality Effects 0.000 description 1
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000000354 decomposition reaction Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000006798 recombination Effects 0.000 description 1
- 238000005215 recombination Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/06—Energy or water supply
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/12—Discovery or management of network topologies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Economics (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Public Health (AREA)
- General Physics & Mathematics (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Marketing (AREA)
- Theoretical Computer Science (AREA)
- Human Resources & Organizations (AREA)
- Computer Hardware Design (AREA)
- Water Supply & Treatment (AREA)
- General Engineering & Computer Science (AREA)
- Medical Informatics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The method for configuring the safety link of the power communication network comprises the steps of obtaining a network global risk degree; acquiring the availability of a service channel; acquiring an upper limit value of a service channel bandwidth; acquiring an upper limit value of link time delay; acquiring an optimal safety link according to the network global risk, the service channel availability, the upper limit value of the service channel bandwidth and the upper limit value of the link time delay; when the network global risk degree of the link is minimum and the availability of the service channel is maximum, the link is the optimal safe link. By the method, the global risk balance degree of the power communication network can be effectively reduced, the usability and the effectiveness in the aspects of reducing transmission delay, reducing link calculation time and the like are high, and the optimal safety link of the power communication network is configured. Meanwhile, the importance of the service is determined by quantitative calculation, and the method has important theoretical practical significance for analyzing the influence of communication service, equipment and the like on the reliability of a communication network.
Description
Technical Field
The application relates to the field of power communication, in particular to a power communication network safety link configuration method.
Background
In the field of electric power communication, due to the complexity of electric power communication services, the risk level and the planning strategy of an electric power communication network are different from the services in other fields, the existing research results in other fields cannot be used, and a method with pertinence and individuation needs to be formulated according to unique characteristics of the electric power communication network. The key to reduce the operation risk of the power communication network is how to equalize the communication service risks of different levels in the communication network, that is, how to find a secure link capable of always keeping the global risk balance of the power communication network to be the lowest is a problem to be solved urgently at present.
Disclosure of Invention
In view of this, the present application provides a method for configuring a secure link of an electric power communication network, which implements configuration of the secure link of the electric power communication network based on global risk balance.
For the purpose of making the present application more apparent, its objects, technical means and advantages will be further described in detail with reference to the accompanying drawings.
According to an aspect of the present application, an embodiment of the present application provides a power communication network secure link configuration method, including: acquiring a network global risk degree; acquiring the availability of a service channel; acquiring an upper limit value of a service channel bandwidth; acquiring an upper limit value of link time delay; acquiring an optimal safety link according to the network global risk, the service channel availability, the upper limit value of the service channel bandwidth and the upper limit value of the link time delay; and when the network global risk degree of the link is minimum and the availability of the service channel is maximum, the link is the optimal safe link.
In an embodiment of the present application, the obtaining of the network global risk includes: acquiring node risk degree and edge risk degree; calculating the node risk degree and the edge risk degree according to a formula (I) to generate the network global risk degree;
wherein, in the formula (one), P is the network global risk, V (V)i) Is a node viNode risk degree of (a), M (e)ij) Is an edge eijThe side risk degree of (1).
In an embodiment of the present application, the obtaining node risk degree and edge risk degree includes: acquiring the number of links connected with the node, the degree of the node and the weight value of the service on the node: calculating the number of links connected with the nodes, the degree of the nodes and the weight value of the service on the nodes according to a formula (II) to generate the node risk value;
wherein, in the formula (II), LiIs and node viNumber of links connected, kiIs a node viDegree of (a), WtIs a node viThe weight value of the top t service;
acquiring a weight value of a service on the node;
calculating the weight value of the side service according to a formula (III) to generate the side risk degree;
wherein, in the formula (III), WtIs an edge eijWeight value of the last t-th service.
In an embodiment of the present application, the obtaining the service weight value includes: acquiring the service importance; and acquiring the service weight value according to the service importance.
In an embodiment of the present application, the acquiring availability of a service channel includes: acquiring the node betweenness and the edge betweenness; calculating the node betweenness and the edge betweenness according to a function (IV) to generate the service channel availability;
wherein, in the function (IV), Q is the availability of the service channel, B (v)i) Is a node viNode betweenness of B (e)ij) Is an edge eijThe number of edges of (1) is intermediate.
In an embodiment of the present application, the obtaining an upper limit value of a bandwidth of a service channel includes: and acquiring the upper limit value of the service channel bandwidth according to the service channel bandwidth function (V).
NB=bandwidth(eij) Function (five)
In an embodiment of the present application, the obtaining an upper limit value of a link delay includes: acquiring the time delay of the node and the time delay of the edge; and calculating the time delay of the node and the time delay of the edge according to a function (six), and generating an upper limit value of the link time delay.
Wherein, in the function (VI), de (v)i) Is the node viTime delay of (d), de (e)ij) Is an edge eijThe delay of (2).
According to a second aspect of the present application, an embodiment of the present application provides a processor, configured to execute the power communication network secure link configuration method described in any one of the foregoing embodiments.
According to a third aspect of the present application, an embodiment of the present application provides an electronic device, including:
a processor; and a memory for storing the processor executable information; the processor is configured to execute the power communication network secure link configuration method in any one of the above embodiments.
According to a third aspect of the present application, an embodiment of the present application provides a computer-readable storage medium, where the storage medium stores a computer program, and the computer program is configured to execute the power communication network secure link configuration method described in any one of the foregoing embodiments.
The method for configuring the safety link of the power communication network comprises the steps of obtaining a network global risk degree; acquiring the availability of a service channel; acquiring an upper limit value of a service channel bandwidth; acquiring an upper limit value of link time delay; acquiring an optimal safety link according to the network global risk, the service channel availability, the upper limit value of the service channel bandwidth and the upper limit value of the link time delay; and when the network global risk degree of the link is minimum and the availability of the service channel is maximum, the link is the optimal safe link. By the method, the global risk balance degree of the power communication network can be effectively reduced, the usability and the effectiveness in the aspects of reducing transmission delay, reducing link calculation time and the like are high, and the optimal safety link of the power communication network is configured. Meanwhile, the importance of the service is determined by quantitative calculation, and the method has important theoretical practical significance for analyzing the influence of communication service, equipment and the like on the reliability of a communication network.
Drawings
Fig. 1 is a schematic flowchart illustrating a method for configuring a secure link of an electrical power communication network according to an embodiment of the present application.
Fig. 2 is a schematic flowchart of a method for acquiring a network global risk degree according to a power communication network security link configuration method according to another embodiment of the present application.
Fig. 3 is a schematic flowchart of a method for acquiring a network global risk level of a power communication network security link configuration method according to another embodiment of the present application.
Fig. 4 is a schematic flowchart illustrating a method for obtaining a weight value of a service on a node according to another embodiment of the present application.
Fig. 5 is a schematic flowchart illustrating a method for configuring a secure link of a power communication network according to another embodiment of the present application.
Fig. 6 is a schematic structural diagram of a processor according to an embodiment of the present application.
Fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Description of reference numerals: 10. an electronic device; 11. a processor; 111. a network global risk degree obtaining module; 112. a service channel availability acquisition module; 113. a service channel bandwidth upper limit value obtaining module; 114. a link time delay upper limit value obtaining module; 115. an optimal secure link acquisition module; 12. a memory; 13. an input device; 14. and an output device.
Detailed Description
In the description of the present application, "plurality" means at least two, e.g., two, three, etc., unless explicitly specifically limited otherwise. All directional indicators in the embodiments of the present application (such as upper, lower, left, right, front, rear, top, bottom … …) are only used to explain the relative positional relationship between the components, the movement, etc. in a particular posture (as shown in the drawings), and if the particular posture is changed, the directional indicator is changed accordingly. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Furthermore, reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Fig. 1 is a schematic flowchart illustrating a method for configuring a secure link of an electrical power communication network according to an embodiment of the present application, where as shown in fig. 1, the method for configuring the secure link of the electrical power communication network includes the following steps:
step 10: and acquiring the global risk degree of the network.
The network global risk degree refers to the risk degree of various services in the power communication network in the global state, and the key for reducing the operation risk of the power communication network is how to balance the communication service risks of different levels in the communication network, so that the premise of reducing the operation risk is to obtain the network global risk degree.
Step 20: and acquiring the availability of the service channel.
The availability of the service channel represents the availability of the service channel, and after the availability of the service channel is obtained, the safety degree of the link is judged by using the calculated value, so that the method is more objective.
Step 30: and acquiring an upper limit value of the service channel bandwidth.
The service channel bandwidth represents the data transmission capacity of the service channel, and the upper limit value of the service channel bandwidth is obtained, namely the upper limit value of the data transmission capacity of the service channel can be obtained, so that the safety and the availability of the power communication network can be ensured only when the bandwidth of the power communication network is less than or equal to the upper limit value of the bandwidth.
Step 40: and acquiring an upper limit value of the link delay.
The link delay refers to the time required for data on the link to be transmitted from a certain node to another node or from one side to the other side, and after the upper limit value of the link delay is obtained, the safety and the availability of the power communication network of the link with the delay value lower than the upper limit value are further improved.
Step 50: and obtaining the optimal safe link according to the network global risk, the service channel availability, the upper limit value of the service channel bandwidth and the upper limit value of the link time delay.
And when the network global risk degree of the link is minimum and the availability of the service channel is maximum, the link is the optimal safe link.
The method for configuring the safe link of the power communication network can effectively reduce the global risk balance degree of the power communication network, has higher availability and effectiveness in the aspects of reducing transmission delay, reducing link calculation time and the like, and is beneficial to configuring the optimal safe link of the power communication network. Meanwhile, the importance of the service is determined by quantitative calculation, and the method has important theoretical practical significance for analyzing the influence of communication service, equipment and the like on the reliability of a communication network.
Specifically, fig. 2 is a schematic flow chart of a method for acquiring a network global risk degree of a power communication network secure link configuration method according to another embodiment of the present application, and as shown in fig. 2, step 10 may specifically include the following steps:
step 101: and acquiring the node risk degree and the edge risk degree.
The node risk degree is the severity of the influence generated after the failure that a certain node in the power communication network has a failure or an abnormality and the service passing through the node is interrupted according to the node aggregation degree in the communication network; the edge risk degree is the severity of the influence caused by service interruption according to the concentration degree of each node in the communication network when one edge in the power communication network has a fault or is abnormal. According to the node risk degree and the edge risk degree, the network global risk degree of the power communication network can be calculated, and further the operation risk of the power communication network is reduced.
Step 102: and calculating the node risk degree and the edge risk degree according to a formula (I) to generate a network global risk degree.
Wherein, in the formula (one), P is the network global risk, V (V)i) Is a node viNode risk degree of (a), M (e)ij) Is an edge eijThe side risk degree of (1).
Through the steps, the network global risk degree can be calculated, so that the configuration of the safety link is carried out, and the risk of network operation is reduced.
In a possible implementation manner, fig. 3 is a schematic flow diagram of a method for acquiring a network global risk level of a power communication network secure link configuration method according to another embodiment of the present application, and as shown in fig. 3, step 101 may specifically include the following steps:
step 1011: and acquiring the number of links connected with the nodes, the degree of the nodes and the weight value of the service on the nodes.
Step 1012: and calculating the number of links connected with the nodes, the degree of the nodes and the weight value of the service on the nodes according to a formula (II) to generate a node risk value.
In the formula (ii), Li is the number of links connected to the node vi, ki is the degree of the node vi, and Wt is the weight value of the t-th service on the node vi.
Step 1013: and acquiring the weight value of the service on the node.
Step 1014: and (4) calculating the weight value of the service on the edge according to a formula (III) to generate an edge risk degree.
Wherein, in the formula (III), WtIs an edge eijWeight value of the last t-th service.
Through the steps, the edge risk degree can be calculated, so that the network global risk degree is calculated, the density of global risk distribution is reduced, the power communication network safety link is obtained, and the risk of network operation is reduced.
Optionally, fig. 4 is a schematic flowchart of a method for acquiring a weight value of a service on a node according to another embodiment of the present invention, where as shown in fig. 4, step 1013 may further include the following steps:
step 10131: and acquiring the service importance.
The service importance is the influence on the stable operation of the power grid when a certain service fails or is interrupted, and the greater the influence, the higher the service importance of the service is. And obtaining the importance of the service, namely obtaining the service weight.
Step 10132: and acquiring a service weight value according to the service importance.
The important component of the network global risk function in the service weight value is directly related to the result of the service link configuration, so that the service weight value is accurately obtained, and the security of the service link configuration can be improved.
Specifically, in an embodiment, fig. 5 is a schematic flowchart of a method for configuring a secure link of an electrical power communication network according to another embodiment of the present application, and as shown in fig. 5, step 20 may specifically include the following steps:
step 201: and acquiring node betweenness and edge betweenness.
Step 202: calculating the node betweenness and the edge betweenness according to the function (IV) to generate the availability of the service channel;
wherein, in the function (IV), Q is the availability of the service channel, B (v)i) Is a node viNode betweenness of B (e)ij) Is an edge eijThe number of edges of (1) is intermediate.
The higher the availability of the service channel is, the lower the risk of network operation is, so that the link safety is judged after the availability of the service channel is calculated, and the obtained judgment result is more accurate and reliable.
In a possible implementation manner, as shown in fig. 5, step 30 may specifically include the following steps:
step 301: and acquiring the upper limit value of the service channel bandwidth according to the service channel bandwidth function (V).
NB=bandwidth(eij) Function (five)
The upper limit value of the service channel bandwidth can be calculated according to the function, so that the safety of the link is judged according to whether the service channel bandwidth of the link is less than or equal to the upper limit value, and the obtained judgment result is more accurate and reliable.
Specifically, in an embodiment, as shown in fig. 5, the step 40 may specifically include the following steps:
step 401: and acquiring the time delay of the node and the time delay of the edge.
Step 402: and (5) calculating the time delay of the node and the time delay of the edge according to the function (six) to generate an upper limit value of the link time delay.
Wherein, in the function (VI), de (v)i) Is a node viTime delay of (d), de (e)ij) Is an edge eijThe delay of (2).
The time delay of the communication network is an important parameter for judging the operation safety and the risk degree of the network, and after the time delay upper limit value of the link is accurately calculated through the steps, whether the time delay value of the optional link is smaller than or equal to the upper limit value is judged, and the safety of the link can be obtained.
Fig. 6 is a schematic structural diagram of a processor according to an embodiment of the present application, and as shown in fig. 6, the processor 11 is configured to execute the method for configuring the secure link of the power communication network in the foregoing embodiment. The processor 11 includes: a network global risk obtaining module 111; a service channel availability acquisition module 112; a service channel bandwidth upper limit value obtaining module 113; a link delay upper limit value obtaining module 114 and an optimal secure link obtaining module 115. The network global risk obtaining module 111 is configured to obtain a network global risk; the service channel availability obtaining module 112 is configured to obtain service channel availability; the service channel bandwidth upper limit value obtaining module 113 is configured to obtain an upper limit value of a service channel bandwidth; the link delay upper limit value obtaining module 114 is configured to obtain an upper limit value of a link delay; the optimal secure link obtaining module 115 is configured to obtain an optimal secure link.
By applying the processor, the global risk balance degree of the power communication network can be effectively reduced, the usability and the effectiveness in the aspects of reducing the transmission delay, reducing the link calculation time and the like are high, and the optimal safety link of the power communication network is configured. Meanwhile, the importance of the service is determined by quantitative calculation, and the method has important theoretical practical significance for analyzing the influence of communication service, equipment and the like on the reliability of a communication network.
FIG. 7 illustrates a block diagram of an electronic device in accordance with an embodiment of the present application.
As shown in fig. 7, the electronic device 10 includes one or more of the processors 11 and the memory 12 of the above embodiments.
The processor 11 may be a Central Processing Unit (CPU) or other form of processing unit having data processing capabilities and/or instruction execution capabilities, and may control other components in the electronic device 10 to perform desired functions.
Memory 12 may include one or more computer program products that may include various forms of computer-readable storage media, such as volatile memory and/or non-volatile memory. Volatile memory can include, for example, Random Access Memory (RAM), cache memory (or the like). The non-volatile memory may include, for example, Read Only Memory (ROM), a hard disk, flash memory, and the like. One or more computer program instructions may be stored on a computer readable storage medium and executed by the processor 11 to implement the above power communication network secure link configuration method of the various embodiments of the present application and/or other desired functions.
In one example, the electronic device 10 may further include: an input device 13 and an output device 14, which are interconnected by a bus system and/or other form of connection mechanism (not shown).
When the electronic device is a stand-alone device, the input means 13 may be a communication network connector for receiving the acquired input signals from the first device and the second device.
The input device 13 may also include, for example, a keyboard, a mouse, and the like.
The output device 14 may output various information including the determined distance information, direction information, and the like to the outside. The output devices 14 may include, for example, a display, speakers, a printer, and a communication network and its connected remote output devices, among others.
Of course, for simplicity, only some of the components of the electronic device 10 relevant to the present application are shown in fig. 6, and components such as buses, input/output interfaces, and the like are omitted. In addition, the electronic device 10 may include any other suitable components depending on the particular application.
Furthermore, in an embodiment of the present application, a computer-readable storage medium is provided, the storage medium storing a computer program for executing the following steps: acquiring a network global risk degree; acquiring the availability of a service channel; acquiring an upper limit value of a service channel bandwidth; acquiring an upper limit value of link time delay; and obtaining the optimal safe link according to the network global risk, the service channel availability, the upper limit value of the service channel bandwidth and the upper limit value of the link time delay.
In addition to the above methods and devices, embodiments of the present application may also be a computer program product comprising computer program information which, when executed by a processor, causes the processor to perform the steps of the power communication network secure link configuration method according to various embodiments of the present application described in the present specification.
The computer program product may include program code for carrying out operations for embodiments of the present application in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server.
Furthermore, embodiments of the present application may also be a computer-readable storage medium having stored thereon computer program information, which, when executed by a processor, causes the processor to perform the steps in the method for configuring a secure link of a power communication network according to various embodiments of the present application.
A computer-readable storage medium may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may include, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The foregoing describes the general principles of the present application in conjunction with specific embodiments, however, it is noted that the advantages, effects, etc. mentioned in the present application are merely examples and are not limiting, and they should not be considered essential to the various embodiments of the present application. Furthermore, the foregoing disclosure of specific details is for the purpose of illustration and description and is not intended to be limiting, since the foregoing disclosure is not intended to be exhaustive or to limit the disclosure to the precise details disclosed.
The block diagrams of devices, apparatuses, systems referred to in this application are only given as illustrative examples and are not intended to require or imply that the connections, arrangements, configurations, etc. must be made in the manner shown in the block diagrams. These devices, apparatuses, devices, systems may be connected, arranged, configured in any manner, as will be appreciated by those skilled in the art. Words such as "including," "comprising," "having," and the like are open-ended words that mean "including, but not limited to," and are used interchangeably therewith. The words "or" and "as used herein mean, and are used interchangeably with, the word" and/or, "unless the context clearly dictates otherwise. The word "such as" is used herein to mean, and is used interchangeably with, the phrase "such as but not limited to".
It should also be noted that in the devices, apparatuses, and methods of the present application, the components or steps may be decomposed and/or recombined. These decompositions and/or recombinations are to be considered as equivalents of the present application.
Claims (10)
1. A power communication network safety link configuration method is characterized by comprising the following steps:
acquiring a network global risk degree;
acquiring the availability of a service channel;
acquiring an upper limit value of a service channel bandwidth;
acquiring an upper limit value of link time delay;
acquiring an optimal safety link according to the network global risk, the service channel availability, the upper limit value of the service channel bandwidth and the upper limit value of the link time delay;
and when the network global risk degree of the link is minimum and the availability of the service channel is maximum, the link is the optimal safe link.
2. The power communication network security link configuration method according to claim 1, wherein the acquiring a network global risk includes:
acquiring node risk degree and edge risk degree;
calculating the node risk degree and the edge risk degree according to a formula (I) to generate the network global risk degree;
wherein, in the formula (one), P is the network global risk, V (V)i) Is a node viNode risk degree of (a), M (e)ij) Is an edge eijThe side risk degree of (1).
3. The method according to claim 2, wherein the obtaining node risk and edge risk comprises:
acquiring the number of links connected with the node, the degree of the node and the weight value of the service on the node:
calculating the number of links connected with the nodes, the degree of the nodes and the weight value of the service on the nodes according to a formula (II) to generate the node risk value;
wherein, in the formula (II), LiIs and node viNumber of links connected, kiIs a node viDegree of (a), WtIs a node viThe weight value of the top t service;
acquiring the weight value of the side service;
calculating the weight value of the side service according to a formula (III) to generate the side risk degree;
wherein, in the formula (III), WtIs an edge eijWeight value of the last t-th service.
4. The power communication network secure link configuration method according to claim 3, wherein the obtaining the traffic weight value includes:
acquiring the service importance;
and acquiring the service weight value according to the service importance.
5. The power communication network secure link configuration method according to claim 1, wherein the acquiring the availability of the service channel comprises:
acquiring the node betweenness and the edge betweenness;
calculating the node betweenness and the edge betweenness according to a function (IV) to generate the service channel availability;
wherein, in the function (IV), Q is the availability of the service channel, B (v)i) Is a node viNode betweenness of B (e)ij) Is an edge eijThe number of edges of (1) is intermediate.
6. The method according to claim 1, wherein the obtaining an upper limit value of a traffic channel bandwidth comprises:
and acquiring the upper limit value of the service channel bandwidth according to the service channel bandwidth function (V).
NB=bandwidth(eij) Function (five)
7. The electric power communication network safety link configuration method according to claim 1, wherein the obtaining an upper limit value of a link delay includes:
acquiring the time delay of the node and the time delay of the edge;
and calculating the time delay of the node and the time delay of the edge according to a function (six), and generating an upper limit value of the link time delay.
Wherein, in the function (VI), de (v)i) Is the node viTime delay of (d), de (e)ij) Is an edge eijThe delay of (2).
8. A processor configured to perform the power communication network secure link configuration method of any one of claims 1 to 7.
9. An electronic device, comprising:
a processor; and
a memory for storing the processor executable information;
wherein the processor is configured to execute the power communication network secure link configuration method of any one of claims 1 to 7.
10. A computer-readable storage medium, characterized in that the storage medium stores a computer program for executing the power communication network secure link configuration method according to any of the claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110917074.1A CN113709117A (en) | 2021-08-11 | 2021-08-11 | Power communication network safety link configuration method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110917074.1A CN113709117A (en) | 2021-08-11 | 2021-08-11 | Power communication network safety link configuration method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113709117A true CN113709117A (en) | 2021-11-26 |
Family
ID=78652408
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110917074.1A Pending CN113709117A (en) | 2021-08-11 | 2021-08-11 | Power communication network safety link configuration method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113709117A (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106453085A (en) * | 2016-12-14 | 2017-02-22 | 国家电网公司 | Business importance-based risk-balancing routing assignment method and system |
CN110995597A (en) * | 2019-12-31 | 2020-04-10 | 国网福建省电力有限公司信息通信分公司 | Method and system for selecting safe link of power communication network |
-
2021
- 2021-08-11 CN CN202110917074.1A patent/CN113709117A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106453085A (en) * | 2016-12-14 | 2017-02-22 | 国家电网公司 | Business importance-based risk-balancing routing assignment method and system |
CN110995597A (en) * | 2019-12-31 | 2020-04-10 | 国网福建省电力有限公司信息通信分公司 | Method and system for selecting safe link of power communication network |
Non-Patent Citations (2)
Title |
---|
曾军等: "考虑全局风险均衡度的电力通信网最优安全链路选择方法", 《数学的实践与认识》 * |
蒋康明等: "基于业务的电力通信网风险评价方法", 《电力系统保护与控制》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10747592B2 (en) | Router management by an event stream processing cluster manager | |
CN112783877A (en) | Cross-link data verification method, device, equipment and storage medium | |
JP5901668B2 (en) | System and method for grouping warnings generated during static analysis | |
CN113038396B (en) | Scheduling method, device and equipment of short message channel and storage medium | |
CN114448830B (en) | Equipment detection system and method | |
CN110059939A (en) | A kind of risk checking method and device | |
CN114666156A (en) | Data security protection system, method, device, computer equipment and storage medium | |
CN113190417A (en) | Microservice state detection method, model training method, device and storage medium | |
JP5711675B2 (en) | Network abnormality detection apparatus and network abnormality detection method | |
EP3970042A1 (en) | Rasp-based implementation using a security manager | |
US20180091376A1 (en) | Entity-state relationship correlation | |
CN117240727B (en) | Communication network switching method and related equipment | |
CN113709117A (en) | Power communication network safety link configuration method | |
EP4375866A1 (en) | Security control method and apparatus for integrated circuit, storage medium, and electronic device | |
CN107360153B (en) | Network security protection system about big data | |
Tian et al. | Impact of cyber dependencies in critical infrastructures: The reliability of grid splitting in power systems | |
CN112461253A (en) | Emergency evacuation path planning method, device, medium and electronic equipment | |
CN113946493A (en) | Monitoring threshold determination and monitoring alarm method, device, equipment and medium | |
CN111681093B (en) | Method and device for displaying resource page and electronic equipment | |
CN113886196A (en) | On-chip power consumption management method, electronic device and storage medium | |
CN113726596A (en) | Power communication network reliability analysis method based on service link | |
CN110955579A (en) | Ambari-based large data platform monitoring method | |
CN117745288B (en) | Method, device, equipment and medium for visualizing blockchain transaction data | |
KR101695461B1 (en) | Apparatus and method for detecting security danger | |
CN113722292B (en) | Disaster response processing method, device, equipment and storage medium of distributed data system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20211126 |