CN113709117A - Power communication network safety link configuration method - Google Patents

Power communication network safety link configuration method Download PDF

Info

Publication number
CN113709117A
CN113709117A CN202110917074.1A CN202110917074A CN113709117A CN 113709117 A CN113709117 A CN 113709117A CN 202110917074 A CN202110917074 A CN 202110917074A CN 113709117 A CN113709117 A CN 113709117A
Authority
CN
China
Prior art keywords
node
acquiring
link
service
communication network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110917074.1A
Other languages
Chinese (zh)
Inventor
赵军愉
董旭亮
马秣然
裴兴
李明月
杨超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
Baoding Power Supply Co of State Grid Hebei Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
Baoding Power Supply Co of State Grid Hebei Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, Baoding Power Supply Co of State Grid Hebei Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN202110917074.1A priority Critical patent/CN113709117A/en
Publication of CN113709117A publication Critical patent/CN113709117A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Economics (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Public Health (AREA)
  • General Physics & Mathematics (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Theoretical Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Computer Hardware Design (AREA)
  • Water Supply & Treatment (AREA)
  • General Engineering & Computer Science (AREA)
  • Medical Informatics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The method for configuring the safety link of the power communication network comprises the steps of obtaining a network global risk degree; acquiring the availability of a service channel; acquiring an upper limit value of a service channel bandwidth; acquiring an upper limit value of link time delay; acquiring an optimal safety link according to the network global risk, the service channel availability, the upper limit value of the service channel bandwidth and the upper limit value of the link time delay; when the network global risk degree of the link is minimum and the availability of the service channel is maximum, the link is the optimal safe link. By the method, the global risk balance degree of the power communication network can be effectively reduced, the usability and the effectiveness in the aspects of reducing transmission delay, reducing link calculation time and the like are high, and the optimal safety link of the power communication network is configured. Meanwhile, the importance of the service is determined by quantitative calculation, and the method has important theoretical practical significance for analyzing the influence of communication service, equipment and the like on the reliability of a communication network.

Description

Power communication network safety link configuration method
Technical Field
The application relates to the field of power communication, in particular to a power communication network safety link configuration method.
Background
In the field of electric power communication, due to the complexity of electric power communication services, the risk level and the planning strategy of an electric power communication network are different from the services in other fields, the existing research results in other fields cannot be used, and a method with pertinence and individuation needs to be formulated according to unique characteristics of the electric power communication network. The key to reduce the operation risk of the power communication network is how to equalize the communication service risks of different levels in the communication network, that is, how to find a secure link capable of always keeping the global risk balance of the power communication network to be the lowest is a problem to be solved urgently at present.
Disclosure of Invention
In view of this, the present application provides a method for configuring a secure link of an electric power communication network, which implements configuration of the secure link of the electric power communication network based on global risk balance.
For the purpose of making the present application more apparent, its objects, technical means and advantages will be further described in detail with reference to the accompanying drawings.
According to an aspect of the present application, an embodiment of the present application provides a power communication network secure link configuration method, including: acquiring a network global risk degree; acquiring the availability of a service channel; acquiring an upper limit value of a service channel bandwidth; acquiring an upper limit value of link time delay; acquiring an optimal safety link according to the network global risk, the service channel availability, the upper limit value of the service channel bandwidth and the upper limit value of the link time delay; and when the network global risk degree of the link is minimum and the availability of the service channel is maximum, the link is the optimal safe link.
In an embodiment of the present application, the obtaining of the network global risk includes: acquiring node risk degree and edge risk degree; calculating the node risk degree and the edge risk degree according to a formula (I) to generate the network global risk degree;
Figure BDA0003206013180000011
wherein, in the formula (one), P is the network global risk, V (V)i) Is a node viNode risk degree of (a), M (e)ij) Is an edge eijThe side risk degree of (1).
In an embodiment of the present application, the obtaining node risk degree and edge risk degree includes: acquiring the number of links connected with the node, the degree of the node and the weight value of the service on the node: calculating the number of links connected with the nodes, the degree of the nodes and the weight value of the service on the nodes according to a formula (II) to generate the node risk value;
Figure BDA0003206013180000021
wherein, in the formula (II), LiIs and node viNumber of links connected, kiIs a node viDegree of (a), WtIs a node viThe weight value of the top t service;
acquiring a weight value of a service on the node;
calculating the weight value of the side service according to a formula (III) to generate the side risk degree;
Figure BDA0003206013180000022
wherein, in the formula (III), WtIs an edge eijWeight value of the last t-th service.
In an embodiment of the present application, the obtaining the service weight value includes: acquiring the service importance; and acquiring the service weight value according to the service importance.
In an embodiment of the present application, the acquiring availability of a service channel includes: acquiring the node betweenness and the edge betweenness; calculating the node betweenness and the edge betweenness according to a function (IV) to generate the service channel availability;
Figure BDA0003206013180000023
wherein, in the function (IV), Q is the availability of the service channel, B (v)i) Is a node viNode betweenness of B (e)ij) Is an edge eijThe number of edges of (1) is intermediate.
In an embodiment of the present application, the obtaining an upper limit value of a bandwidth of a service channel includes: and acquiring the upper limit value of the service channel bandwidth according to the service channel bandwidth function (V).
NB=bandwidth(eij) Function (five)
In an embodiment of the present application, the obtaining an upper limit value of a link delay includes: acquiring the time delay of the node and the time delay of the edge; and calculating the time delay of the node and the time delay of the edge according to a function (six), and generating an upper limit value of the link time delay.
Figure BDA0003206013180000031
Wherein, in the function (VI), de (v)i) Is the node viTime delay of (d), de (e)ij) Is an edge eijThe delay of (2).
According to a second aspect of the present application, an embodiment of the present application provides a processor, configured to execute the power communication network secure link configuration method described in any one of the foregoing embodiments.
According to a third aspect of the present application, an embodiment of the present application provides an electronic device, including:
a processor; and a memory for storing the processor executable information; the processor is configured to execute the power communication network secure link configuration method in any one of the above embodiments.
According to a third aspect of the present application, an embodiment of the present application provides a computer-readable storage medium, where the storage medium stores a computer program, and the computer program is configured to execute the power communication network secure link configuration method described in any one of the foregoing embodiments.
The method for configuring the safety link of the power communication network comprises the steps of obtaining a network global risk degree; acquiring the availability of a service channel; acquiring an upper limit value of a service channel bandwidth; acquiring an upper limit value of link time delay; acquiring an optimal safety link according to the network global risk, the service channel availability, the upper limit value of the service channel bandwidth and the upper limit value of the link time delay; and when the network global risk degree of the link is minimum and the availability of the service channel is maximum, the link is the optimal safe link. By the method, the global risk balance degree of the power communication network can be effectively reduced, the usability and the effectiveness in the aspects of reducing transmission delay, reducing link calculation time and the like are high, and the optimal safety link of the power communication network is configured. Meanwhile, the importance of the service is determined by quantitative calculation, and the method has important theoretical practical significance for analyzing the influence of communication service, equipment and the like on the reliability of a communication network.
Drawings
Fig. 1 is a schematic flowchart illustrating a method for configuring a secure link of an electrical power communication network according to an embodiment of the present application.
Fig. 2 is a schematic flowchart of a method for acquiring a network global risk degree according to a power communication network security link configuration method according to another embodiment of the present application.
Fig. 3 is a schematic flowchart of a method for acquiring a network global risk level of a power communication network security link configuration method according to another embodiment of the present application.
Fig. 4 is a schematic flowchart illustrating a method for obtaining a weight value of a service on a node according to another embodiment of the present application.
Fig. 5 is a schematic flowchart illustrating a method for configuring a secure link of a power communication network according to another embodiment of the present application.
Fig. 6 is a schematic structural diagram of a processor according to an embodiment of the present application.
Fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Description of reference numerals: 10. an electronic device; 11. a processor; 111. a network global risk degree obtaining module; 112. a service channel availability acquisition module; 113. a service channel bandwidth upper limit value obtaining module; 114. a link time delay upper limit value obtaining module; 115. an optimal secure link acquisition module; 12. a memory; 13. an input device; 14. and an output device.
Detailed Description
In the description of the present application, "plurality" means at least two, e.g., two, three, etc., unless explicitly specifically limited otherwise. All directional indicators in the embodiments of the present application (such as upper, lower, left, right, front, rear, top, bottom … …) are only used to explain the relative positional relationship between the components, the movement, etc. in a particular posture (as shown in the drawings), and if the particular posture is changed, the directional indicator is changed accordingly. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Furthermore, reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Fig. 1 is a schematic flowchart illustrating a method for configuring a secure link of an electrical power communication network according to an embodiment of the present application, where as shown in fig. 1, the method for configuring the secure link of the electrical power communication network includes the following steps:
step 10: and acquiring the global risk degree of the network.
The network global risk degree refers to the risk degree of various services in the power communication network in the global state, and the key for reducing the operation risk of the power communication network is how to balance the communication service risks of different levels in the communication network, so that the premise of reducing the operation risk is to obtain the network global risk degree.
Step 20: and acquiring the availability of the service channel.
The availability of the service channel represents the availability of the service channel, and after the availability of the service channel is obtained, the safety degree of the link is judged by using the calculated value, so that the method is more objective.
Step 30: and acquiring an upper limit value of the service channel bandwidth.
The service channel bandwidth represents the data transmission capacity of the service channel, and the upper limit value of the service channel bandwidth is obtained, namely the upper limit value of the data transmission capacity of the service channel can be obtained, so that the safety and the availability of the power communication network can be ensured only when the bandwidth of the power communication network is less than or equal to the upper limit value of the bandwidth.
Step 40: and acquiring an upper limit value of the link delay.
The link delay refers to the time required for data on the link to be transmitted from a certain node to another node or from one side to the other side, and after the upper limit value of the link delay is obtained, the safety and the availability of the power communication network of the link with the delay value lower than the upper limit value are further improved.
Step 50: and obtaining the optimal safe link according to the network global risk, the service channel availability, the upper limit value of the service channel bandwidth and the upper limit value of the link time delay.
And when the network global risk degree of the link is minimum and the availability of the service channel is maximum, the link is the optimal safe link.
The method for configuring the safe link of the power communication network can effectively reduce the global risk balance degree of the power communication network, has higher availability and effectiveness in the aspects of reducing transmission delay, reducing link calculation time and the like, and is beneficial to configuring the optimal safe link of the power communication network. Meanwhile, the importance of the service is determined by quantitative calculation, and the method has important theoretical practical significance for analyzing the influence of communication service, equipment and the like on the reliability of a communication network.
Specifically, fig. 2 is a schematic flow chart of a method for acquiring a network global risk degree of a power communication network secure link configuration method according to another embodiment of the present application, and as shown in fig. 2, step 10 may specifically include the following steps:
step 101: and acquiring the node risk degree and the edge risk degree.
The node risk degree is the severity of the influence generated after the failure that a certain node in the power communication network has a failure or an abnormality and the service passing through the node is interrupted according to the node aggregation degree in the communication network; the edge risk degree is the severity of the influence caused by service interruption according to the concentration degree of each node in the communication network when one edge in the power communication network has a fault or is abnormal. According to the node risk degree and the edge risk degree, the network global risk degree of the power communication network can be calculated, and further the operation risk of the power communication network is reduced.
Step 102: and calculating the node risk degree and the edge risk degree according to a formula (I) to generate a network global risk degree.
Figure BDA0003206013180000061
Wherein, in the formula (one), P is the network global risk, V (V)i) Is a node viNode risk degree of (a), M (e)ij) Is an edge eijThe side risk degree of (1).
Through the steps, the network global risk degree can be calculated, so that the configuration of the safety link is carried out, and the risk of network operation is reduced.
In a possible implementation manner, fig. 3 is a schematic flow diagram of a method for acquiring a network global risk level of a power communication network secure link configuration method according to another embodiment of the present application, and as shown in fig. 3, step 101 may specifically include the following steps:
step 1011: and acquiring the number of links connected with the nodes, the degree of the nodes and the weight value of the service on the nodes.
Step 1012: and calculating the number of links connected with the nodes, the degree of the nodes and the weight value of the service on the nodes according to a formula (II) to generate a node risk value.
Figure BDA0003206013180000062
In the formula (ii), Li is the number of links connected to the node vi, ki is the degree of the node vi, and Wt is the weight value of the t-th service on the node vi.
Step 1013: and acquiring the weight value of the service on the node.
Step 1014: and (4) calculating the weight value of the service on the edge according to a formula (III) to generate an edge risk degree.
Figure BDA0003206013180000063
Wherein, in the formula (III), WtIs an edge eijWeight value of the last t-th service.
Through the steps, the edge risk degree can be calculated, so that the network global risk degree is calculated, the density of global risk distribution is reduced, the power communication network safety link is obtained, and the risk of network operation is reduced.
Optionally, fig. 4 is a schematic flowchart of a method for acquiring a weight value of a service on a node according to another embodiment of the present invention, where as shown in fig. 4, step 1013 may further include the following steps:
step 10131: and acquiring the service importance.
The service importance is the influence on the stable operation of the power grid when a certain service fails or is interrupted, and the greater the influence, the higher the service importance of the service is. And obtaining the importance of the service, namely obtaining the service weight.
Step 10132: and acquiring a service weight value according to the service importance.
The important component of the network global risk function in the service weight value is directly related to the result of the service link configuration, so that the service weight value is accurately obtained, and the security of the service link configuration can be improved.
Specifically, in an embodiment, fig. 5 is a schematic flowchart of a method for configuring a secure link of an electrical power communication network according to another embodiment of the present application, and as shown in fig. 5, step 20 may specifically include the following steps:
step 201: and acquiring node betweenness and edge betweenness.
Step 202: calculating the node betweenness and the edge betweenness according to the function (IV) to generate the availability of the service channel;
Figure BDA0003206013180000071
wherein, in the function (IV), Q is the availability of the service channel, B (v)i) Is a node viNode betweenness of B (e)ij) Is an edge eijThe number of edges of (1) is intermediate.
The higher the availability of the service channel is, the lower the risk of network operation is, so that the link safety is judged after the availability of the service channel is calculated, and the obtained judgment result is more accurate and reliable.
In a possible implementation manner, as shown in fig. 5, step 30 may specifically include the following steps:
step 301: and acquiring the upper limit value of the service channel bandwidth according to the service channel bandwidth function (V).
NB=bandwidth(eij) Function (five)
The upper limit value of the service channel bandwidth can be calculated according to the function, so that the safety of the link is judged according to whether the service channel bandwidth of the link is less than or equal to the upper limit value, and the obtained judgment result is more accurate and reliable.
Specifically, in an embodiment, as shown in fig. 5, the step 40 may specifically include the following steps:
step 401: and acquiring the time delay of the node and the time delay of the edge.
Step 402: and (5) calculating the time delay of the node and the time delay of the edge according to the function (six) to generate an upper limit value of the link time delay.
Figure BDA0003206013180000072
Wherein, in the function (VI), de (v)i) Is a node viTime delay of (d), de (e)ij) Is an edge eijThe delay of (2).
The time delay of the communication network is an important parameter for judging the operation safety and the risk degree of the network, and after the time delay upper limit value of the link is accurately calculated through the steps, whether the time delay value of the optional link is smaller than or equal to the upper limit value is judged, and the safety of the link can be obtained.
Fig. 6 is a schematic structural diagram of a processor according to an embodiment of the present application, and as shown in fig. 6, the processor 11 is configured to execute the method for configuring the secure link of the power communication network in the foregoing embodiment. The processor 11 includes: a network global risk obtaining module 111; a service channel availability acquisition module 112; a service channel bandwidth upper limit value obtaining module 113; a link delay upper limit value obtaining module 114 and an optimal secure link obtaining module 115. The network global risk obtaining module 111 is configured to obtain a network global risk; the service channel availability obtaining module 112 is configured to obtain service channel availability; the service channel bandwidth upper limit value obtaining module 113 is configured to obtain an upper limit value of a service channel bandwidth; the link delay upper limit value obtaining module 114 is configured to obtain an upper limit value of a link delay; the optimal secure link obtaining module 115 is configured to obtain an optimal secure link.
By applying the processor, the global risk balance degree of the power communication network can be effectively reduced, the usability and the effectiveness in the aspects of reducing the transmission delay, reducing the link calculation time and the like are high, and the optimal safety link of the power communication network is configured. Meanwhile, the importance of the service is determined by quantitative calculation, and the method has important theoretical practical significance for analyzing the influence of communication service, equipment and the like on the reliability of a communication network.
FIG. 7 illustrates a block diagram of an electronic device in accordance with an embodiment of the present application.
As shown in fig. 7, the electronic device 10 includes one or more of the processors 11 and the memory 12 of the above embodiments.
The processor 11 may be a Central Processing Unit (CPU) or other form of processing unit having data processing capabilities and/or instruction execution capabilities, and may control other components in the electronic device 10 to perform desired functions.
Memory 12 may include one or more computer program products that may include various forms of computer-readable storage media, such as volatile memory and/or non-volatile memory. Volatile memory can include, for example, Random Access Memory (RAM), cache memory (or the like). The non-volatile memory may include, for example, Read Only Memory (ROM), a hard disk, flash memory, and the like. One or more computer program instructions may be stored on a computer readable storage medium and executed by the processor 11 to implement the above power communication network secure link configuration method of the various embodiments of the present application and/or other desired functions.
In one example, the electronic device 10 may further include: an input device 13 and an output device 14, which are interconnected by a bus system and/or other form of connection mechanism (not shown).
When the electronic device is a stand-alone device, the input means 13 may be a communication network connector for receiving the acquired input signals from the first device and the second device.
The input device 13 may also include, for example, a keyboard, a mouse, and the like.
The output device 14 may output various information including the determined distance information, direction information, and the like to the outside. The output devices 14 may include, for example, a display, speakers, a printer, and a communication network and its connected remote output devices, among others.
Of course, for simplicity, only some of the components of the electronic device 10 relevant to the present application are shown in fig. 6, and components such as buses, input/output interfaces, and the like are omitted. In addition, the electronic device 10 may include any other suitable components depending on the particular application.
Furthermore, in an embodiment of the present application, a computer-readable storage medium is provided, the storage medium storing a computer program for executing the following steps: acquiring a network global risk degree; acquiring the availability of a service channel; acquiring an upper limit value of a service channel bandwidth; acquiring an upper limit value of link time delay; and obtaining the optimal safe link according to the network global risk, the service channel availability, the upper limit value of the service channel bandwidth and the upper limit value of the link time delay.
In addition to the above methods and devices, embodiments of the present application may also be a computer program product comprising computer program information which, when executed by a processor, causes the processor to perform the steps of the power communication network secure link configuration method according to various embodiments of the present application described in the present specification.
The computer program product may include program code for carrying out operations for embodiments of the present application in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server.
Furthermore, embodiments of the present application may also be a computer-readable storage medium having stored thereon computer program information, which, when executed by a processor, causes the processor to perform the steps in the method for configuring a secure link of a power communication network according to various embodiments of the present application.
A computer-readable storage medium may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may include, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The foregoing describes the general principles of the present application in conjunction with specific embodiments, however, it is noted that the advantages, effects, etc. mentioned in the present application are merely examples and are not limiting, and they should not be considered essential to the various embodiments of the present application. Furthermore, the foregoing disclosure of specific details is for the purpose of illustration and description and is not intended to be limiting, since the foregoing disclosure is not intended to be exhaustive or to limit the disclosure to the precise details disclosed.
The block diagrams of devices, apparatuses, systems referred to in this application are only given as illustrative examples and are not intended to require or imply that the connections, arrangements, configurations, etc. must be made in the manner shown in the block diagrams. These devices, apparatuses, devices, systems may be connected, arranged, configured in any manner, as will be appreciated by those skilled in the art. Words such as "including," "comprising," "having," and the like are open-ended words that mean "including, but not limited to," and are used interchangeably therewith. The words "or" and "as used herein mean, and are used interchangeably with, the word" and/or, "unless the context clearly dictates otherwise. The word "such as" is used herein to mean, and is used interchangeably with, the phrase "such as but not limited to".
It should also be noted that in the devices, apparatuses, and methods of the present application, the components or steps may be decomposed and/or recombined. These decompositions and/or recombinations are to be considered as equivalents of the present application.

Claims (10)

1. A power communication network safety link configuration method is characterized by comprising the following steps:
acquiring a network global risk degree;
acquiring the availability of a service channel;
acquiring an upper limit value of a service channel bandwidth;
acquiring an upper limit value of link time delay;
acquiring an optimal safety link according to the network global risk, the service channel availability, the upper limit value of the service channel bandwidth and the upper limit value of the link time delay;
and when the network global risk degree of the link is minimum and the availability of the service channel is maximum, the link is the optimal safe link.
2. The power communication network security link configuration method according to claim 1, wherein the acquiring a network global risk includes:
acquiring node risk degree and edge risk degree;
calculating the node risk degree and the edge risk degree according to a formula (I) to generate the network global risk degree;
Figure FDA0003206013170000011
wherein, in the formula (one), P is the network global risk, V (V)i) Is a node viNode risk degree of (a), M (e)ij) Is an edge eijThe side risk degree of (1).
3. The method according to claim 2, wherein the obtaining node risk and edge risk comprises:
acquiring the number of links connected with the node, the degree of the node and the weight value of the service on the node:
calculating the number of links connected with the nodes, the degree of the nodes and the weight value of the service on the nodes according to a formula (II) to generate the node risk value;
Figure FDA0003206013170000012
wherein, in the formula (II), LiIs and node viNumber of links connected, kiIs a node viDegree of (a), WtIs a node viThe weight value of the top t service;
acquiring the weight value of the side service;
calculating the weight value of the side service according to a formula (III) to generate the side risk degree;
Figure FDA0003206013170000021
wherein, in the formula (III), WtIs an edge eijWeight value of the last t-th service.
4. The power communication network secure link configuration method according to claim 3, wherein the obtaining the traffic weight value includes:
acquiring the service importance;
and acquiring the service weight value according to the service importance.
5. The power communication network secure link configuration method according to claim 1, wherein the acquiring the availability of the service channel comprises:
acquiring the node betweenness and the edge betweenness;
calculating the node betweenness and the edge betweenness according to a function (IV) to generate the service channel availability;
Figure FDA0003206013170000022
wherein, in the function (IV), Q is the availability of the service channel, B (v)i) Is a node viNode betweenness of B (e)ij) Is an edge eijThe number of edges of (1) is intermediate.
6. The method according to claim 1, wherein the obtaining an upper limit value of a traffic channel bandwidth comprises:
and acquiring the upper limit value of the service channel bandwidth according to the service channel bandwidth function (V).
NB=bandwidth(eij) Function (five)
7. The electric power communication network safety link configuration method according to claim 1, wherein the obtaining an upper limit value of a link delay includes:
acquiring the time delay of the node and the time delay of the edge;
and calculating the time delay of the node and the time delay of the edge according to a function (six), and generating an upper limit value of the link time delay.
Figure FDA0003206013170000023
Wherein, in the function (VI), de (v)i) Is the node viTime delay of (d), de (e)ij) Is an edge eijThe delay of (2).
8. A processor configured to perform the power communication network secure link configuration method of any one of claims 1 to 7.
9. An electronic device, comprising:
a processor; and
a memory for storing the processor executable information;
wherein the processor is configured to execute the power communication network secure link configuration method of any one of claims 1 to 7.
10. A computer-readable storage medium, characterized in that the storage medium stores a computer program for executing the power communication network secure link configuration method according to any of the claims 1 to 7.
CN202110917074.1A 2021-08-11 2021-08-11 Power communication network safety link configuration method Pending CN113709117A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110917074.1A CN113709117A (en) 2021-08-11 2021-08-11 Power communication network safety link configuration method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110917074.1A CN113709117A (en) 2021-08-11 2021-08-11 Power communication network safety link configuration method

Publications (1)

Publication Number Publication Date
CN113709117A true CN113709117A (en) 2021-11-26

Family

ID=78652408

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110917074.1A Pending CN113709117A (en) 2021-08-11 2021-08-11 Power communication network safety link configuration method

Country Status (1)

Country Link
CN (1) CN113709117A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106453085A (en) * 2016-12-14 2017-02-22 国家电网公司 Business importance-based risk-balancing routing assignment method and system
CN110995597A (en) * 2019-12-31 2020-04-10 国网福建省电力有限公司信息通信分公司 Method and system for selecting safe link of power communication network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106453085A (en) * 2016-12-14 2017-02-22 国家电网公司 Business importance-based risk-balancing routing assignment method and system
CN110995597A (en) * 2019-12-31 2020-04-10 国网福建省电力有限公司信息通信分公司 Method and system for selecting safe link of power communication network

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
曾军等: "考虑全局风险均衡度的电力通信网最优安全链路选择方法", 《数学的实践与认识》 *
蒋康明等: "基于业务的电力通信网风险评价方法", 《电力系统保护与控制》 *

Similar Documents

Publication Publication Date Title
US10747592B2 (en) Router management by an event stream processing cluster manager
CN112783877A (en) Cross-link data verification method, device, equipment and storage medium
JP5901668B2 (en) System and method for grouping warnings generated during static analysis
CN113038396B (en) Scheduling method, device and equipment of short message channel and storage medium
CN114448830B (en) Equipment detection system and method
CN110059939A (en) A kind of risk checking method and device
CN114666156A (en) Data security protection system, method, device, computer equipment and storage medium
CN113190417A (en) Microservice state detection method, model training method, device and storage medium
JP5711675B2 (en) Network abnormality detection apparatus and network abnormality detection method
EP3970042A1 (en) Rasp-based implementation using a security manager
US20180091376A1 (en) Entity-state relationship correlation
CN117240727B (en) Communication network switching method and related equipment
CN113709117A (en) Power communication network safety link configuration method
EP4375866A1 (en) Security control method and apparatus for integrated circuit, storage medium, and electronic device
CN107360153B (en) Network security protection system about big data
Tian et al. Impact of cyber dependencies in critical infrastructures: The reliability of grid splitting in power systems
CN112461253A (en) Emergency evacuation path planning method, device, medium and electronic equipment
CN113946493A (en) Monitoring threshold determination and monitoring alarm method, device, equipment and medium
CN111681093B (en) Method and device for displaying resource page and electronic equipment
CN113886196A (en) On-chip power consumption management method, electronic device and storage medium
CN113726596A (en) Power communication network reliability analysis method based on service link
CN110955579A (en) Ambari-based large data platform monitoring method
CN117745288B (en) Method, device, equipment and medium for visualizing blockchain transaction data
KR101695461B1 (en) Apparatus and method for detecting security danger
CN113722292B (en) Disaster response processing method, device, equipment and storage medium of distributed data system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20211126