CN114401462A - Risk assessment method for protecting subnet of optical transmission network - Google Patents

Risk assessment method for protecting subnet of optical transmission network Download PDF

Info

Publication number
CN114401462A
CN114401462A CN202111525703.2A CN202111525703A CN114401462A CN 114401462 A CN114401462 A CN 114401462A CN 202111525703 A CN202111525703 A CN 202111525703A CN 114401462 A CN114401462 A CN 114401462A
Authority
CN
China
Prior art keywords
protection
network
nodes
node
subnet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111525703.2A
Other languages
Chinese (zh)
Inventor
张海燕
李昆鸿
黄山珂
杨金
潘蕊
祝青
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yuxi Power Supply Bureau of Yunnan Power Grid Co Ltd
Original Assignee
Yuxi Power Supply Bureau of Yunnan Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yuxi Power Supply Bureau of Yunnan Power Grid Co Ltd filed Critical Yuxi Power Supply Bureau of Yunnan Power Grid Co Ltd
Priority to CN202111525703.2A priority Critical patent/CN114401462A/en
Priority to CN202210420598.4A priority patent/CN114630215A/en
Publication of CN114401462A publication Critical patent/CN114401462A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q11/00Selecting arrangements for multiplex systems
    • H04Q11/0001Selecting arrangements for multiplex systems using optical switching
    • H04Q11/0062Network aspects
    • H04Q11/0067Provisions for optical access or distribution networks, e.g. Gigabit Ethernet Passive Optical Network (GE-PON), ATM-based Passive Optical Network (A-PON), PON-Ring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q11/00Selecting arrangements for multiplex systems
    • H04Q11/0001Selecting arrangements for multiplex systems using optical switching
    • H04Q11/0062Network aspects
    • H04Q2011/0079Operation or maintenance aspects

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a subnet protection risk assessment method of an optical transmission network, which comprises the following steps: s1, obtaining configuration information of each device, wherein the configuration information comprises an ID and a name of each device, a light path relation between each device and each device, a configured protection subnet name, a configured protection subnet type and coordinate information of each device in topology. In the invention, the evaluation of network-level path protection is carried out on the whole optical transmission network, the analysis and presentation of the equipment node of the unprotected sub-network, the single-chain protected sub-network, the large-ring protected sub-network and the single-node protected sub-network are provided, the position and the relation of each node are presented in a topological graph according to the coordinates of the equipment node, meanwhile, the stacking information of each protected sub-network is drawn according to the outline of the relation between the equipment node and the equipment, finally, an optimization suggestion is output, and a network planning person is supported to master the risk condition of the protected sub-network of the whole network and visually browse.

Description

Risk assessment method for protecting subnet of optical transmission network
Technical Field
The invention relates to the technical field of optical transmission networks, in particular to a risk assessment method for a protection subnet of an optical transmission network.
Background
In an optical transmission system, in order to improve the reliability of services on links, protection links need to be added on the basis of working links, when the working links fail or the performance is inferior to a certain necessary level, the working links are replaced by the protection links, with the development of networks, network planning becomes complex, and risks easily exist.
But does not support assessing the risk of protecting the sub-network from the overall network point of view and does not mark the information of the risky protecting sub-network or device nodes in the topology.
Disclosure of Invention
The invention aims to: in order to solve the above problems, a method for evaluating risk of a protection subnet of an optical transmission network is provided.
In order to achieve the purpose, the invention adopts the following technical scheme:
a risk assessment method for protecting a subnet of an optical transmission network comprises the following steps:
s1, acquiring configuration information of each device, wherein the configuration information comprises an ID (identity) and a name of each device, a light path relation between each device and each device, a configured protection subnet name, a configured protection subnet type and coordinate information of each device in topology;
s2, analyzing risks of the protection subnet or equipment;
s3, marking the risk state of each protection subnet or equipment:
the text or form describes nodes that are not marked as "nodes of unprotected subnets";
characters or forms describe all protection subnets marked as single chains, and the names of the protection subnets, the number of nodes and the names of all the nodes are presented;
characters or forms describe all protection subnets marked as 'large rings', and the names of the protection subnets, the number of nodes and the names of all the nodes are presented;
the characters or the forms describe all equipment nodes marked as 'single nodes', and the names of all the nodes and the names of the protection sub-networks to which the nodes belong are presented;
and S4, outputting a corresponding optimization suggestion.
Preferably, the following parts are included in the S2:
a. the device node is not configured with any protection sub-network and is marked as a node without the protection sub-network;
b. in the protection subnet, whether the type is a protection-chain-free type or not is marked as a single chain if the type is the protection-chain-free type;
c. whether the number of the equipment nodes in the protection subnet is more than 10 or not is judged; if the number of nodes is more than 10, marking as a 'large ring';
d. if one protection sub-network and the other protection sub-network in the protection sub-networks have only 1 shared node, for example, only 1 shared node, the device node is marked as a single node.
Preferably, the S3 further includes:
the topology graph presents the situation of protecting subnet connection: according to the coordinates of each equipment node, the light path relation between the equipment and the protection subnet information configured by the equipment, the equipment nodes and the connection of the same protection subnet are surrounded and illustrated in the topology by using the contour map, and different protection subnets are presented by using contour maps with different colors, so that an operator can visually check the connection condition of the protection subnet of the whole network.
Preferably, the topology is marked with the device nodes or protection subnets in which the marks exist from a to D.
Preferably, the S4 includes the following cases:
the label "single stranded" then suggests: modifying the unprotected chain into a protection ring or a protection chain;
the label "macrocycle" suggests: the more the number of the nodes of the protection sub-network is, the higher the probability of double-node faults is, the larger ring is transformed into a smaller ring, and the reliability is improved;
the flag "single node" then prompts: for a single node, the existing network optical fiber is transformed into a double-node access.
In summary, due to the adoption of the technical scheme, the invention has the beneficial effects that:
according to the method, the device nodes of the unprotected sub-network, the single-chain protected sub-network, the large-ring protected sub-network and the single-node protected sub-network are analyzed and presented by aiming at the whole optical transmission network, the positions and the relations of all the nodes are presented in a topological graph according to the coordinates of the device nodes, meanwhile, the stacking information of all the protected sub-networks is drawn according to the outlines of the relations between the device nodes and the devices, and finally, an optimization suggestion is output to support a network planner to master the risk condition and visual browsing of the protected sub-networks of the whole network.
Drawings
FIG. 1 illustrates a schematic flow chart provided in accordance with an embodiment of the present invention;
FIG. 2 illustrates a topology diagram provided in accordance with an embodiment of the invention;
fig. 3 shows a schematic diagram of a topology node tag provided according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-3, the present invention provides a technical solution:
a risk assessment method for protecting a subnet of an optical transmission network comprises the following steps:
s1, acquiring configuration information of each device, wherein the configuration information comprises an ID (identity) and a name of each device, a light path relation between each device and each device, a configured protection subnet name, a configured protection subnet type and coordinate information of each device in topology;
s2, analyzing risks of the protection subnet or the equipment:
a. the device node is not configured with any protection sub-network and is marked as a node without the protection sub-network;
b. in the protection subnet, whether the type is a protection-chain-free type or not is marked as a single chain if the type is the protection-chain-free type;
c. whether the number of the equipment nodes in the protection subnet is more than 10 or not is judged; if the number of nodes is more than 10, marking as a 'large ring';
d. in the protection sub-networks, whether one protection sub-network and the other protection sub-network have only 1 shared node, if so, the equipment node is marked as a single node;
s3, marking the risk state of each protection subnet or equipment:
the text or form describes nodes that are not marked as "nodes of unprotected subnets";
characters or forms describe all protection subnets marked as single chains, and the names of the protection subnets, the number of nodes and the names of all the nodes are presented;
characters or forms describe all protection subnets marked as 'large rings', and the names of the protection subnets, the number of nodes and the names of all the nodes are presented;
the characters or the forms describe all equipment nodes marked as 'single nodes', and the names of all the nodes and the names of the protection sub-networks to which the nodes belong are presented;
the topology graph presents the situation of protecting subnet connection: according to the coordinates of each equipment node, the light path relation between equipment and the protection subnet information configured by the equipment, the equipment nodes and the connection contour map belonging to the same protection subnet are surrounded in the topology, different protection subnets are presented by contour maps with different colors, and the protection subnet connection condition of the whole network can be visually checked by an operator;
a device node or a protection subnet, each of which has a label in the topology label existence step S2;
s4, outputting a corresponding optimization suggestion:
the following cases are included:
the label "single stranded" then suggests: modifying the unprotected chain into a protection ring or a protection chain;
the label "macrocycle" suggests: the more the number of the nodes of the protection sub-network is, the higher the probability of double-node faults is, the larger ring is transformed into a smaller ring, and the reliability is improved;
the flag "single node" then prompts: for a single node, the existing network optical fiber is transformed into a double-node access.
The previous description of the embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (5)

1. A risk assessment method for protecting a subnet of an optical transmission network is characterized by comprising the following steps:
s1, acquiring configuration information of each device, wherein the configuration information comprises an ID (identity) and a name of each device, a light path relation between each device and each device, a configured protection subnet name, a configured protection subnet type and coordinate information of each device in topology;
s2, analyzing risks of the protection subnet or equipment;
s3, marking the risk state of each protection subnet or equipment:
the text or form describes nodes that are not marked as "nodes of unprotected subnets";
characters or forms describe all protection subnets marked as single chains, and the names of the protection subnets, the number of nodes and the names of all the nodes are presented;
characters or forms describe all protection subnets marked as 'large rings', and the names of the protection subnets, the number of nodes and the names of all the nodes are presented;
the characters or the forms describe all equipment nodes marked as 'single nodes', and the names of all the nodes and the names of the protection sub-networks to which the nodes belong are presented;
and S4, outputting a corresponding optimization suggestion.
2. The method according to claim 1, wherein the S2 includes the following parts:
a. the device node is not configured with any protection sub-network and is marked as a node without the protection sub-network;
b. in the protection subnet, whether the type is a protection-chain-free type or not is marked as a single chain if the type is the protection-chain-free type;
c. whether the number of the equipment nodes in the protection subnet is more than 10 or not is judged; if the number of nodes is more than 10, marking as a 'large ring';
d. if one protection sub-network and the other protection sub-network in the protection sub-networks have only 1 shared node, for example, only 1 shared node, the device node is marked as a single node.
3. The method according to claim 1, wherein the S3 further includes:
the topology graph presents the situation of protecting subnet connection: according to the coordinates of each equipment node, the light path relation between the equipment and the protection subnet information configured by the equipment, the equipment nodes and the connection of the same protection subnet are surrounded and illustrated in the topology by using the contour map, and different protection subnets are presented by using contour maps with different colors, so that an operator can visually check the connection condition of the protection subnet of the whole network.
4. The method according to claim 3, wherein the device nodes or the protection subnets marked with the marks A to D exist in the topology.
5. The method according to claim 1, wherein S4 includes following cases:
the label "single stranded" then suggests: modifying the unprotected chain into a protection ring or a protection chain;
the label "macrocycle" suggests: the more the number of the nodes of the protection sub-network is, the higher the probability of double-node failure is, and the large ring is transformed into the small ring;
the flag "single node" then prompts: for a single node, the existing network optical fiber is transformed into a double-node access.
CN202111525703.2A 2021-12-14 2021-12-14 Risk assessment method for protecting subnet of optical transmission network Pending CN114401462A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202111525703.2A CN114401462A (en) 2021-12-14 2021-12-14 Risk assessment method for protecting subnet of optical transmission network
CN202210420598.4A CN114630215A (en) 2021-12-14 2022-04-21 Risk assessment method for protecting subnet of optical transmission network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111525703.2A CN114401462A (en) 2021-12-14 2021-12-14 Risk assessment method for protecting subnet of optical transmission network

Publications (1)

Publication Number Publication Date
CN114401462A true CN114401462A (en) 2022-04-26

Family

ID=81227342

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202111525703.2A Pending CN114401462A (en) 2021-12-14 2021-12-14 Risk assessment method for protecting subnet of optical transmission network
CN202210420598.4A Pending CN114630215A (en) 2021-12-14 2022-04-21 Risk assessment method for protecting subnet of optical transmission network

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202210420598.4A Pending CN114630215A (en) 2021-12-14 2022-04-21 Risk assessment method for protecting subnet of optical transmission network

Country Status (1)

Country Link
CN (2) CN114401462A (en)

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101515886A (en) * 2008-11-07 2009-08-26 西安交通大学 Multi-domain optical network survivability method based on identification of reliable service
CN101741717A (en) * 2008-11-07 2010-06-16 赵季红 Conditional risk separation degree-based multiple domain network routing method
CN102075399B (en) * 2009-11-24 2013-06-26 中国移动通信集团四川有限公司 A method for searching branched chains of the transmission network and an apparatus for the same
CN104935378B (en) * 2015-06-05 2017-12-19 烽火通信科技股份有限公司 A kind of fiber link detecting system and method for EPON
CN108055071B (en) * 2017-12-05 2021-10-01 全球能源互联网研究院有限公司 Cooperative protection method and device for data network and optical transmission network
CN109447048B (en) * 2018-12-25 2020-12-25 苏州闪驰数控系统集成有限公司 Artificial intelligence early warning system
CN111783265B (en) * 2020-06-29 2022-11-04 云南电网有限责任公司玉溪供电局 Optimization method for topology generation of power grid tidal current diagram

Also Published As

Publication number Publication date
CN114630215A (en) 2022-06-14

Similar Documents

Publication Publication Date Title
US20050091356A1 (en) Method and machine-readable medium for using matrices to automatically analyze network events and objects
ATE305191T1 (en) NETWORK MONITORING METHOD FOR A TELECOMMUNICATION NETWORK
CN112491636B (en) Data processing method and device and computer storage medium
CN107872356A (en) The method and apparatus that business function chain detects path
CN110708116B (en) Optical path management system and method for rapidly positioning and analyzing same route of optical path
CN102724071A (en) Method and system for power communication failure early warning analysis based on network model and rule models
CN111865627B (en) Transmission networking evaluation method, device, computing equipment and computer storage medium
CN108965267A (en) network attack processing method, device and vehicle
CN110493670A (en) A kind of interruption of optical cables determination method and device
CN109327401A (en) A kind of traffic scheduling method and system of SDN network
Feng et al. Bound-based network tomography with additive metrics
CN102739445B (en) A kind of method and system for rapidly positioning faults of looped network
CN114401462A (en) Risk assessment method for protecting subnet of optical transmission network
CN105071991B (en) The test method of the IP connectivity of multiple fire walls
Iqbal et al. Detection of spatially-close fiber segments in optical networks
CN106131786A (en) The acquisition methods of additional population data and device
CN107769964B (en) Special line checking method and system
US20040158780A1 (en) Method and system for presenting neighbors of a device in a network via a graphical user interface
US8743736B2 (en) Inferring connectivity in the presence of conflicting network data
CN108259441A (en) It is a kind of to prevent URL from accessing the method and device to detour
CN110572278A (en) Method and device for positioning information of three-layer gateway of metropolitan area network
CN113824744B (en) Situation awareness visualization method and system for business view and storage medium
CN114205242A (en) Method and device for determining false loop
CN101145963B (en) A topology discovery method of protective sub-network
CN112836836A (en) Intelligent substation secondary equipment loop visual presentation method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20220426

WD01 Invention patent application deemed withdrawn after publication