CN114401462A - Risk assessment method for protecting subnet of optical transmission network - Google Patents
Risk assessment method for protecting subnet of optical transmission network Download PDFInfo
- Publication number
- CN114401462A CN114401462A CN202111525703.2A CN202111525703A CN114401462A CN 114401462 A CN114401462 A CN 114401462A CN 202111525703 A CN202111525703 A CN 202111525703A CN 114401462 A CN114401462 A CN 114401462A
- Authority
- CN
- China
- Prior art keywords
- protection
- network
- nodes
- node
- subnet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q11/00—Selecting arrangements for multiplex systems
- H04Q11/0001—Selecting arrangements for multiplex systems using optical switching
- H04Q11/0062—Network aspects
- H04Q11/0067—Provisions for optical access or distribution networks, e.g. Gigabit Ethernet Passive Optical Network (GE-PON), ATM-based Passive Optical Network (A-PON), PON-Ring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q11/00—Selecting arrangements for multiplex systems
- H04Q11/0001—Selecting arrangements for multiplex systems using optical switching
- H04Q11/0062—Network aspects
- H04Q2011/0079—Operation or maintenance aspects
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a subnet protection risk assessment method of an optical transmission network, which comprises the following steps: s1, obtaining configuration information of each device, wherein the configuration information comprises an ID and a name of each device, a light path relation between each device and each device, a configured protection subnet name, a configured protection subnet type and coordinate information of each device in topology. In the invention, the evaluation of network-level path protection is carried out on the whole optical transmission network, the analysis and presentation of the equipment node of the unprotected sub-network, the single-chain protected sub-network, the large-ring protected sub-network and the single-node protected sub-network are provided, the position and the relation of each node are presented in a topological graph according to the coordinates of the equipment node, meanwhile, the stacking information of each protected sub-network is drawn according to the outline of the relation between the equipment node and the equipment, finally, an optimization suggestion is output, and a network planning person is supported to master the risk condition of the protected sub-network of the whole network and visually browse.
Description
Technical Field
The invention relates to the technical field of optical transmission networks, in particular to a risk assessment method for a protection subnet of an optical transmission network.
Background
In an optical transmission system, in order to improve the reliability of services on links, protection links need to be added on the basis of working links, when the working links fail or the performance is inferior to a certain necessary level, the working links are replaced by the protection links, with the development of networks, network planning becomes complex, and risks easily exist.
But does not support assessing the risk of protecting the sub-network from the overall network point of view and does not mark the information of the risky protecting sub-network or device nodes in the topology.
Disclosure of Invention
The invention aims to: in order to solve the above problems, a method for evaluating risk of a protection subnet of an optical transmission network is provided.
In order to achieve the purpose, the invention adopts the following technical scheme:
a risk assessment method for protecting a subnet of an optical transmission network comprises the following steps:
s1, acquiring configuration information of each device, wherein the configuration information comprises an ID (identity) and a name of each device, a light path relation between each device and each device, a configured protection subnet name, a configured protection subnet type and coordinate information of each device in topology;
s2, analyzing risks of the protection subnet or equipment;
s3, marking the risk state of each protection subnet or equipment:
the text or form describes nodes that are not marked as "nodes of unprotected subnets";
characters or forms describe all protection subnets marked as single chains, and the names of the protection subnets, the number of nodes and the names of all the nodes are presented;
characters or forms describe all protection subnets marked as 'large rings', and the names of the protection subnets, the number of nodes and the names of all the nodes are presented;
the characters or the forms describe all equipment nodes marked as 'single nodes', and the names of all the nodes and the names of the protection sub-networks to which the nodes belong are presented;
and S4, outputting a corresponding optimization suggestion.
Preferably, the following parts are included in the S2:
a. the device node is not configured with any protection sub-network and is marked as a node without the protection sub-network;
b. in the protection subnet, whether the type is a protection-chain-free type or not is marked as a single chain if the type is the protection-chain-free type;
c. whether the number of the equipment nodes in the protection subnet is more than 10 or not is judged; if the number of nodes is more than 10, marking as a 'large ring';
d. if one protection sub-network and the other protection sub-network in the protection sub-networks have only 1 shared node, for example, only 1 shared node, the device node is marked as a single node.
Preferably, the S3 further includes:
the topology graph presents the situation of protecting subnet connection: according to the coordinates of each equipment node, the light path relation between the equipment and the protection subnet information configured by the equipment, the equipment nodes and the connection of the same protection subnet are surrounded and illustrated in the topology by using the contour map, and different protection subnets are presented by using contour maps with different colors, so that an operator can visually check the connection condition of the protection subnet of the whole network.
Preferably, the topology is marked with the device nodes or protection subnets in which the marks exist from a to D.
Preferably, the S4 includes the following cases:
the label "single stranded" then suggests: modifying the unprotected chain into a protection ring or a protection chain;
the label "macrocycle" suggests: the more the number of the nodes of the protection sub-network is, the higher the probability of double-node faults is, the larger ring is transformed into a smaller ring, and the reliability is improved;
the flag "single node" then prompts: for a single node, the existing network optical fiber is transformed into a double-node access.
In summary, due to the adoption of the technical scheme, the invention has the beneficial effects that:
according to the method, the device nodes of the unprotected sub-network, the single-chain protected sub-network, the large-ring protected sub-network and the single-node protected sub-network are analyzed and presented by aiming at the whole optical transmission network, the positions and the relations of all the nodes are presented in a topological graph according to the coordinates of the device nodes, meanwhile, the stacking information of all the protected sub-networks is drawn according to the outlines of the relations between the device nodes and the devices, and finally, an optimization suggestion is output to support a network planner to master the risk condition and visual browsing of the protected sub-networks of the whole network.
Drawings
FIG. 1 illustrates a schematic flow chart provided in accordance with an embodiment of the present invention;
FIG. 2 illustrates a topology diagram provided in accordance with an embodiment of the invention;
fig. 3 shows a schematic diagram of a topology node tag provided according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-3, the present invention provides a technical solution:
a risk assessment method for protecting a subnet of an optical transmission network comprises the following steps:
s1, acquiring configuration information of each device, wherein the configuration information comprises an ID (identity) and a name of each device, a light path relation between each device and each device, a configured protection subnet name, a configured protection subnet type and coordinate information of each device in topology;
s2, analyzing risks of the protection subnet or the equipment:
a. the device node is not configured with any protection sub-network and is marked as a node without the protection sub-network;
b. in the protection subnet, whether the type is a protection-chain-free type or not is marked as a single chain if the type is the protection-chain-free type;
c. whether the number of the equipment nodes in the protection subnet is more than 10 or not is judged; if the number of nodes is more than 10, marking as a 'large ring';
d. in the protection sub-networks, whether one protection sub-network and the other protection sub-network have only 1 shared node, if so, the equipment node is marked as a single node;
s3, marking the risk state of each protection subnet or equipment:
the text or form describes nodes that are not marked as "nodes of unprotected subnets";
characters or forms describe all protection subnets marked as single chains, and the names of the protection subnets, the number of nodes and the names of all the nodes are presented;
characters or forms describe all protection subnets marked as 'large rings', and the names of the protection subnets, the number of nodes and the names of all the nodes are presented;
the characters or the forms describe all equipment nodes marked as 'single nodes', and the names of all the nodes and the names of the protection sub-networks to which the nodes belong are presented;
the topology graph presents the situation of protecting subnet connection: according to the coordinates of each equipment node, the light path relation between equipment and the protection subnet information configured by the equipment, the equipment nodes and the connection contour map belonging to the same protection subnet are surrounded in the topology, different protection subnets are presented by contour maps with different colors, and the protection subnet connection condition of the whole network can be visually checked by an operator;
a device node or a protection subnet, each of which has a label in the topology label existence step S2;
s4, outputting a corresponding optimization suggestion:
the following cases are included:
the label "single stranded" then suggests: modifying the unprotected chain into a protection ring or a protection chain;
the label "macrocycle" suggests: the more the number of the nodes of the protection sub-network is, the higher the probability of double-node faults is, the larger ring is transformed into a smaller ring, and the reliability is improved;
the flag "single node" then prompts: for a single node, the existing network optical fiber is transformed into a double-node access.
The previous description of the embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Claims (5)
1. A risk assessment method for protecting a subnet of an optical transmission network is characterized by comprising the following steps:
s1, acquiring configuration information of each device, wherein the configuration information comprises an ID (identity) and a name of each device, a light path relation between each device and each device, a configured protection subnet name, a configured protection subnet type and coordinate information of each device in topology;
s2, analyzing risks of the protection subnet or equipment;
s3, marking the risk state of each protection subnet or equipment:
the text or form describes nodes that are not marked as "nodes of unprotected subnets";
characters or forms describe all protection subnets marked as single chains, and the names of the protection subnets, the number of nodes and the names of all the nodes are presented;
characters or forms describe all protection subnets marked as 'large rings', and the names of the protection subnets, the number of nodes and the names of all the nodes are presented;
the characters or the forms describe all equipment nodes marked as 'single nodes', and the names of all the nodes and the names of the protection sub-networks to which the nodes belong are presented;
and S4, outputting a corresponding optimization suggestion.
2. The method according to claim 1, wherein the S2 includes the following parts:
a. the device node is not configured with any protection sub-network and is marked as a node without the protection sub-network;
b. in the protection subnet, whether the type is a protection-chain-free type or not is marked as a single chain if the type is the protection-chain-free type;
c. whether the number of the equipment nodes in the protection subnet is more than 10 or not is judged; if the number of nodes is more than 10, marking as a 'large ring';
d. if one protection sub-network and the other protection sub-network in the protection sub-networks have only 1 shared node, for example, only 1 shared node, the device node is marked as a single node.
3. The method according to claim 1, wherein the S3 further includes:
the topology graph presents the situation of protecting subnet connection: according to the coordinates of each equipment node, the light path relation between the equipment and the protection subnet information configured by the equipment, the equipment nodes and the connection of the same protection subnet are surrounded and illustrated in the topology by using the contour map, and different protection subnets are presented by using contour maps with different colors, so that an operator can visually check the connection condition of the protection subnet of the whole network.
4. The method according to claim 3, wherein the device nodes or the protection subnets marked with the marks A to D exist in the topology.
5. The method according to claim 1, wherein S4 includes following cases:
the label "single stranded" then suggests: modifying the unprotected chain into a protection ring or a protection chain;
the label "macrocycle" suggests: the more the number of the nodes of the protection sub-network is, the higher the probability of double-node failure is, and the large ring is transformed into the small ring;
the flag "single node" then prompts: for a single node, the existing network optical fiber is transformed into a double-node access.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111525703.2A CN114401462A (en) | 2021-12-14 | 2021-12-14 | Risk assessment method for protecting subnet of optical transmission network |
CN202210420598.4A CN114630215A (en) | 2021-12-14 | 2022-04-21 | Risk assessment method for protecting subnet of optical transmission network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111525703.2A CN114401462A (en) | 2021-12-14 | 2021-12-14 | Risk assessment method for protecting subnet of optical transmission network |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114401462A true CN114401462A (en) | 2022-04-26 |
Family
ID=81227342
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111525703.2A Pending CN114401462A (en) | 2021-12-14 | 2021-12-14 | Risk assessment method for protecting subnet of optical transmission network |
CN202210420598.4A Pending CN114630215A (en) | 2021-12-14 | 2022-04-21 | Risk assessment method for protecting subnet of optical transmission network |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210420598.4A Pending CN114630215A (en) | 2021-12-14 | 2022-04-21 | Risk assessment method for protecting subnet of optical transmission network |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN114401462A (en) |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101515886A (en) * | 2008-11-07 | 2009-08-26 | 西安交通大学 | Multi-domain optical network survivability method based on identification of reliable service |
CN101741717A (en) * | 2008-11-07 | 2010-06-16 | 赵季红 | Conditional risk separation degree-based multiple domain network routing method |
CN102075399B (en) * | 2009-11-24 | 2013-06-26 | 中国移动通信集团四川有限公司 | A method for searching branched chains of the transmission network and an apparatus for the same |
CN104935378B (en) * | 2015-06-05 | 2017-12-19 | 烽火通信科技股份有限公司 | A kind of fiber link detecting system and method for EPON |
CN108055071B (en) * | 2017-12-05 | 2021-10-01 | 全球能源互联网研究院有限公司 | Cooperative protection method and device for data network and optical transmission network |
CN109447048B (en) * | 2018-12-25 | 2020-12-25 | 苏州闪驰数控系统集成有限公司 | Artificial intelligence early warning system |
CN111783265B (en) * | 2020-06-29 | 2022-11-04 | 云南电网有限责任公司玉溪供电局 | Optimization method for topology generation of power grid tidal current diagram |
-
2021
- 2021-12-14 CN CN202111525703.2A patent/CN114401462A/en active Pending
-
2022
- 2022-04-21 CN CN202210420598.4A patent/CN114630215A/en active Pending
Also Published As
Publication number | Publication date |
---|---|
CN114630215A (en) | 2022-06-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20050091356A1 (en) | Method and machine-readable medium for using matrices to automatically analyze network events and objects | |
ATE305191T1 (en) | NETWORK MONITORING METHOD FOR A TELECOMMUNICATION NETWORK | |
CN112491636B (en) | Data processing method and device and computer storage medium | |
CN107872356A (en) | The method and apparatus that business function chain detects path | |
CN110708116B (en) | Optical path management system and method for rapidly positioning and analyzing same route of optical path | |
CN102724071A (en) | Method and system for power communication failure early warning analysis based on network model and rule models | |
CN111865627B (en) | Transmission networking evaluation method, device, computing equipment and computer storage medium | |
CN108965267A (en) | network attack processing method, device and vehicle | |
CN110493670A (en) | A kind of interruption of optical cables determination method and device | |
CN109327401A (en) | A kind of traffic scheduling method and system of SDN network | |
Feng et al. | Bound-based network tomography with additive metrics | |
CN102739445B (en) | A kind of method and system for rapidly positioning faults of looped network | |
CN114401462A (en) | Risk assessment method for protecting subnet of optical transmission network | |
CN105071991B (en) | The test method of the IP connectivity of multiple fire walls | |
Iqbal et al. | Detection of spatially-close fiber segments in optical networks | |
CN106131786A (en) | The acquisition methods of additional population data and device | |
CN107769964B (en) | Special line checking method and system | |
US20040158780A1 (en) | Method and system for presenting neighbors of a device in a network via a graphical user interface | |
US8743736B2 (en) | Inferring connectivity in the presence of conflicting network data | |
CN108259441A (en) | It is a kind of to prevent URL from accessing the method and device to detour | |
CN110572278A (en) | Method and device for positioning information of three-layer gateway of metropolitan area network | |
CN113824744B (en) | Situation awareness visualization method and system for business view and storage medium | |
CN114205242A (en) | Method and device for determining false loop | |
CN101145963B (en) | A topology discovery method of protective sub-network | |
CN112836836A (en) | Intelligent substation secondary equipment loop visual presentation method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20220426 |
|
WD01 | Invention patent application deemed withdrawn after publication |