CN1330129C - Network protective method based on multiple volume preset protective ring - Google Patents
Network protective method based on multiple volume preset protective ring Download PDFInfo
- Publication number
- CN1330129C CN1330129C CNB2004100665961A CN200410066596A CN1330129C CN 1330129 C CN1330129 C CN 1330129C CN B2004100665961 A CNB2004100665961 A CN B2004100665961A CN 200410066596 A CN200410066596 A CN 200410066596A CN 1330129 C CN1330129 C CN 1330129C
- Authority
- CN
- China
- Prior art keywords
- link
- protection ring
- network
- preset protection
- preset
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Abstract
The present invention relates to a network protection method based on a multiple volume preset protection ring, which is used for the technical field of network communication. The method provides protection for the network by the multiple volume preset protection ring. Under the precondition of 100% of network recovery, a linear programming model is adopted firstly, the gross amount or gross cost of a backup resource of the network is made small, and then the network resource configuration is optimized; secondly, preset characteristics of the preset protection ring of backup resource protection of each ring link are adjusted by adopting a correction algorithm, wherein the present invention has the multiple volume preset protection ring that preset protection ring percentages of two or more than two backup resources are allowed to be configured on ring links. The present invention can realize the fast protection recovery of the traditional preset protection ring, and has higher network resource utilization ratio than that of the traditional network protection method by the preset protection ring.
Description
Technical field
The present invention relates to a kind of network protection method, specifically is a kind of preset protection ring network protection method based on multicapacity.Be used for network communications technology field.
Background technology
Along with the continuous development of Internet and network technology, more and more higher requirement has been proposed for the survivability and the reconfigurability of network.Based on network ring topology and mesh network topology have proposed many protection recovery policies.(as BLSR) can realize protecting fast recovery (about 50ms) in ring network, but needs to reserve 100% resource backup at least.In mesh network; adopt shared path protecting method can realize very high resource utilization (as being less than 70%); but need complicated signaling during owing to fault recovery; and after fault takes place; the switch of middle each node needs configuration in real time, can't realize that therefore protection fast recovers as ring network.Protection scheme based on preset protection ring has possessed ring network protection and two advantages of the efficient resource utilization of mesh network fast simultaneously, so preset protection ring is a kind of ideal scheme that improves network survivability.Preset protection ring can be applied to diverse network, as IP, and MPLS, SDH, ASON, WDM network.
There is three types preset protection ring at present: link protection preset protection ring, Node Protection preset protection ring and stream protection preset protection ring.Discovery by literature search, people such as G. Shen have delivered one piece of article on the 21st the 8th phase of volume of the selected topic magazine (i.e. " IEEE JSAC ") of communicating by letter of U.S. electric and Electronic Engineering Association: the preset protection ring that expands to the route segment protection is used for the protection recovery (" Extending thep-cycle concept to path segment protection for span and node failure recovery ") of link and node failure.This article has been introduced the notion of stream protection preset protection ring, and such preset protection ring can be protected all business on the circle link chord link of preset protection ring, also can protect the Business Stream that has different intersection points more than two with preset protection ring at least.These three kinds of preset protection rings are referred to as traditional preset protection ring, and they have a common ground, and that is exactly must the identical resource backup of configuration on each bar circle link of each preset protection ring, and this restriction has brought certain resource redundancy.
Summary of the invention
The objective of the invention is to overcome the deficiency and the defective of existing traditional preset protection ring technology, proposed a kind of preset protection ring network protection method, make it obtain higher network resource utilization based on multicapacity.
The present invention is achieved by the following technical solutions; the present invention uses the preset protection ring based on multicapacity to provide protection as network; guaranteeing under the network 100% recoverable prerequisite; at first adopt linear programming model; needing on each bar link of preset protection ring to obtain the resource backup capacity that disposes; make total amount or total cost minimum of the resource backup of network; reach the purpose of optimizing the Internet resources configuration; secondly adopt circle link backup resource modification method to adjust the preset feature of the resource backup of every circle link with the protection preset protection ring; wherein said preset protection ring based on multicapacity is meant on each bar circle link the preset protection ring that allows two kinds of configurations or two or more resource backup; can reduce the resource redundancy degree, improve utilization rate of network resource.The linear programming solution adopts ripe algorithm, can be simple algorithm, or the Karmarkar algorithm, perhaps finds the solution with the linear programming software kit.
1, described linear programming model, establishment step is as follows:
(1) collects network parameter
S is the link set of network;
P is the preset protection ring set of all preliminary elections in the network;
c
kIt is the cost of unit bandwidth among the link k;
D
iBe all node pair sets that are subjected to failure effect;
D is the number of node to unit bandwidth professional between the r;
When link i lost efficacy, if preset protection ring j can not protect stream r, then r
I, j rBe 0, if inefficacy link i then is 1, otherwise is 2 not only in Working service r but also in circle j;
If the link k among the circle j is the inefficacy link i that is used for protecting among the Working service stream r, then δ
I, j, k rBe 1, otherwise be 0;
(2) defined variable
n
J, kBe the final variables of linear programming model, the unit bandwidth number of the circle link k on the expression circle j;
n
I, j rBe the intermediate variable of linear programming model, expression was enclosed maximum unit bandwidth numbers that j needs when the link i on the Working service r lost efficacy.(annotate: when protection recovers this Working service r; if some link among the circle j does not use; then needn't be on these links the configuration backup resource; if therefore allow configuration two kinds or two or more resource backups on each bar circle link of preset protection ring; then can reduce the redundancy of Internet resources, improve utilization rate of network resource.This is the main distinction of preset protection ring and the traditional preset protection ring based on multicapacity of the present invention.)
(3) set up the survivability constraint
This survivability constraint has guaranteed the recovery of network failure service energy 100% when breaking down.
(4) set up bandwidth constraint
If this constraint representation link i breaks down at the place, and preset protection ring j is used to provide protection and recovers, and then encloses the bandwidth of the circle link k on the j and enough recovers for all failure services provide protection.
(5) set up target function
Minimize∑∑c
kn
j,k
This target function guarantees the total cost minimum of band width configuration on the preset protection ring of the multicapacity of trying to achieve by linear programming model of the present invention.If c
kGet 1, then target function is represented the total amount minimum of resource backup.
By finding the solution top linear programming equation group, needing on each bar link of each preset protection ring to obtain the resource backup capacity that disposes.
2, described circle link backup resource modification method is as described below:
On preset protection ring, the resource backup capacity is that 0 circle link definition is a virtual link.On preset protection ring, except empty limit, the circle link definition of resource backup capacity minimum is the minimum capacity link.Virtual link and minimum capacity link are divided into several sections to preset protection ring.In order to guarantee the preset feature of preset protection ring, the preset protection ring of multicapacity must satisfy one and preset constraint, and that is exactly for the maximum resource backup capacity in these limits of all necessary configuration, all limits on each preset protection ring section.Method is adjusted each preset protection ring, and realizes in two steps:
(1) finds out virtual link and the minimum capacity link that this encloses, promptly found and cut apart all preset protection ring sections that obtain;
(2) find heap(ed) capacity on each preset protection ring section respectively, and all limits on this circle section are all disposed heap(ed) capacity on this section.
Compare with the network protection method of traditional preset protection ring; adopt preset protection ring network protection method of the present invention; in the quick protection recovery characteristics that keeps traditional preset protection ring; under different network topologies and service distribution, can improve the network resource utilization of 4%-60%.
Description of drawings
Fig. 1 is the preset protection ring schematic diagram of multicapacity of the present invention
Fig. 2 finds the solution the resource backup capacity configuration schematic diagram of the preset protection ring of the multicapacity that obtains for linear programming model of the present invention
Fig. 3 is the resource backup capacity configuration schematic diagram of the preset protection ring of the multicapacity that obtains after the circle link backup resource modification method adjustment of preset protection ring of the present invention
Embodiment
In order to understand technical scheme of the present invention better, execution mode is explained in detail below in conjunction with accompanying drawing.
Example 1
Looped network with one six node is the difference that example is come preset protection ring more of the present invention and traditional preset protection ring below, as shown in Figure 1.1 is the circle link of preset protection ring among Fig. 1; 2 is Working service among Fig. 1.Suppose to have in looped network two business, one is B-A-F-E-D, and another is B-C-D-E, and the bandwidth of two business all is 10.
Preset protection ring in traditional preset protection ring method is A-B-C-D-E-F-A.The resource backup of all links is identical on the preset protection ring, is 20.
In Fig. 1; if when Business Stream B-A-F-E-D lost efficacy; restoration path adopts B-C-D; this shows that the link k (be B-C or C-D) of circle among the j is that to be used for protecting inefficacy link i among the Working service stream r (being B-A-F-E-D) (be B-A, or A-F, or F-E; or E-D); that is to say, when k is B-C or C-D, δ
I, j, k rBe 1, k then is 0 when being other limit.Similarly, if Business Stream B-C-D-E lost efficacy, restoration path adopts B-A-F-E, then when k be B-A, or A-F, or during F-E, δ
I, j, k r, k is 1, k then is 0 when being other limit.(can use the linear programming software kit by finding the solution above-mentioned linear programming equation group; as LP_Solver; CPLEX etc.); can obtain guaranteeing under the network 100% recoverable prerequisite; make under the situation of the total amount of resource backup of network or total cost minimum; need the resource backup capacity that disposes on each bar circle link of each preset protection ring, as shown in Figure 1.Can find that the protection of two business recovers the link D-E of arriving all useless, therefore, the resource backup on the link D-E can be 0, and promptly link D-E is a virtual link.Because in this example, preset constraints and satisfy, so needn't carry out circle link backup resource modification method.In this example, adopt the network protection method of the preset protection ring of multicapacity to save 58.3% than the network protection method of traditional preset protection ring.
Example 2
Suppose that the resource backup capacity of every of preset protection ring circle link tries to achieve by linear programming method, as shown in Figure 2.Among Fig. 23 is preset protection paths in the preset protection ring.In Fig. 2, circle link D-E is a virtual link, and circle link A-B is the minimum capacity link.In order to guarantee the preset feature of preset protection ring, the resource backup capacity on the circle link need adopt circle link backup resource modification method to adjust.Be that all circle links between the preset protection ring section A-F-E all dispose the resource backup capacity of 2 units, all the circle links between the preset protection ring section B-C-D all dispose the resource backup capacity of 3 units.The configuration of the resource backup of the preset protection ring of the multicapacity that obtains is at last compared with the network protection method of traditional preset protection ring as shown in Figure 3, and the network protection method of the preset protection ring of multicapacity of the present invention can save 38.9%.
Claims (2)
1, a kind of preset protection ring network protection method based on multicapacity, it is characterized in that, use preset protection ring to provide protection as network based on multicapacity, under the prerequisite that network 100% can recover, at first adopt linear programming model, needing on each bar link of preset protection ring to obtain the resource backup capacity that disposes, make total amount or total cost minimum of the resource backup of network, reach and optimize the Internet resources configuration, secondly adopt circle link backup resource modification method to adjust the preset feature of the resource backup protection preset protection ring of every circle link, wherein, described preset protection ring based on multicapacity is meant on each bar circle link the preset protection ring that allows two kinds of configurations or two or more resource backup;
Described circle link backup resource modification method is as follows:
On preset protection ring; the resource backup capacity is that 0 circle link definition is a virtual link; on preset protection ring; except empty limit; the circle link definition of resource backup capacity minimum is the minimum capacity link; virtual link and minimum capacity link are divided into several sections to preset protection ring; in order to guarantee the preset feature of preset protection ring; the preset protection ring of multicapacity must satisfy one and preset constraint; that is exactly for the maximum resource backup capacity in these limits of all necessary configuration, all limits on each preset protection ring section; method is adjusted each preset protection ring, and realizes in two steps:
(1) finds out virtual link and the minimum capacity link that this encloses, promptly found and cut apart all preset protection ring sections that obtain;
(2) find heap(ed) capacity on each preset protection ring section respectively, and all limits on this circle section are all disposed heap(ed) capacity on this section.
2, the preset protection ring network protection method based on multicapacity according to claim 1 is characterized in that, described linear programming model, and establishment step is as follows:
(1) collects network parameter
S is the link set of network, and P is the preset protection ring set of all preliminary elections in the network, c
kBe the cost of unit bandwidth among the link k, D
iBe all node pair sets that are subjected to failure effect, d is the number of node to unit bandwidth professional between the r, when link i lost efficacy, if preset protection ring j can not protect stream r, then γ
I, j rBe 0, if inefficacy link i then is 1, otherwise is 2 not only in Working service r but also in circle j; If the link k among the circle j is the inefficacy link i that is used for protecting among the Working service stream r, then δ
I, j, k rBe 1, otherwise be 0;
(2) defined variable
n
J, kBe the final variables of linear programming model, the unit bandwidth number of the circle link k on the expression circle j, n
I, j rBe the intermediate variable of linear programming model, expression was enclosed maximum unit bandwidth numbers that j needs when the link i on the Working service r lost efficacy;
(3) set up the survivability constraint
This survivability constraint has guaranteed the recovery of network failure service energy 100% when breaking down;
(4) set up bandwidth constraint
If this constraint representation link i breaks down at the place, and preset protection ring j is used to provide protection and recovers, and then encloses the bandwidth of the circle link k on the j and enough recovers for all failure services provide protection;
(5) set up target function
Minimize∑∑c
kn
j,k
This target function guarantees the total cost minimum of band width configuration on the preset protection ring of the multicapacity of trying to achieve by linear programming model, if c
kGet 1, then target function is represented the total amount minimum of resource backup.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2004100665961A CN1330129C (en) | 2004-09-23 | 2004-09-23 | Network protective method based on multiple volume preset protective ring |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2004100665961A CN1330129C (en) | 2004-09-23 | 2004-09-23 | Network protective method based on multiple volume preset protective ring |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1588883A CN1588883A (en) | 2005-03-02 |
CN1330129C true CN1330129C (en) | 2007-08-01 |
Family
ID=34604052
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2004100665961A Expired - Fee Related CN1330129C (en) | 2004-09-23 | 2004-09-23 | Network protective method based on multiple volume preset protective ring |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1330129C (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101114983B (en) * | 2006-07-27 | 2010-06-23 | 中国科学院计算技术研究所 | Method for enhancing network capacity |
CN101227530B (en) * | 2008-02-03 | 2011-04-06 | 中兴通讯股份有限公司 | Method and apparatus of resource backup |
CN101494473B (en) * | 2009-03-04 | 2013-12-11 | 北京邮电大学 | Protection method for WDM optical network loop based on resource and taking regard of protection duration control |
CN104734950B (en) * | 2013-12-20 | 2019-04-26 | 中兴通讯股份有限公司 | The method and device that a kind of pair of PTN network business is protected |
CN106656787A (en) * | 2017-01-05 | 2017-05-10 | 华北电力大学 | Resource channel joint optimization P-cycle configuration method |
CN108683579A (en) * | 2018-05-14 | 2018-10-19 | 天津大学 | A kind of dynamic link fault protecting method |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030048749A1 (en) * | 1997-07-11 | 2003-03-13 | Telecommunications Research Laboratories | Distributed preconfiguration of spare capacity in closed paths for network restoration |
US20040109407A1 (en) * | 2002-12-05 | 2004-06-10 | Telecommunications Research Laboratories. | Path segment protecting p-cycles |
-
2004
- 2004-09-23 CN CNB2004100665961A patent/CN1330129C/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030048749A1 (en) * | 1997-07-11 | 2003-03-13 | Telecommunications Research Laboratories | Distributed preconfiguration of spare capacity in closed paths for network restoration |
US20040109407A1 (en) * | 2002-12-05 | 2004-06-10 | Telecommunications Research Laboratories. | Path segment protecting p-cycles |
Non-Patent Citations (1)
Title |
---|
用P圈法实现IP网络恢复 宋鸿升,顾畹仪,光通信技术,第6期 2004 * |
Also Published As
Publication number | Publication date |
---|---|
CN1588883A (en) | 2005-03-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Vasseur et al. | Network recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS | |
CN104040974B (en) | Apparatus and method for spare capacity allocation on dual link failureS | |
US7352703B2 (en) | Protection scheme for a communications network under multiple failures | |
US20080068988A1 (en) | Packet communication method and packet communication device | |
JP2002247038A (en) | Method for forming ring in network, method for restoring fault and method for adding node address at the time of forming ring | |
CN102594688B (en) | Method and system for network routing selection | |
CN102480368B (en) | Protecting method and system of aggregation link | |
CN1330129C (en) | Network protective method based on multiple volume preset protective ring | |
CN101800913B (en) | Realization method for protecting and restoring multiplex section of automatically switched optical network | |
WO2010015161A1 (en) | Method, system and device for recovering service | |
EP2693706B1 (en) | Method and device for implementing multi-protection overlapped protection groups | |
Zhang et al. | Linear time construction of redundant trees for recovery schemes enhancing QoP and QoS | |
Deng et al. | Survivable IP over WDM: an efficient mathematical programming problem formulation | |
Frederick et al. | Evaluating dual-failure restorability in mesh-restorable WDM optical networks | |
Assi et al. | On the benefits of lightpath re-provisioning in optical mesh networks | |
Asthana et al. | Second phase reconfiguration of restored path for removal of loop back in p-cycle protection | |
Zeng et al. | A novel end-to-end fault detection and localization protocol for wavelength-routed WDM networks | |
Song et al. | The advantages of backup reprovisioning after failure repair (and failure arrival) in telecom mesh networks | |
Lumetta et al. | Classification of two-link failures for all-optical networks | |
Fouquet et al. | Elastic routing: a distributed variant, implementation issues, and numerical results | |
Krishnan et al. | Unified models of survivability for multi-technology networks | |
Ahmed et al. | Survivability strategies for PCE-based WDM networks offering high reliability performance | |
Ušćumlić et al. | The cost of traffic protection in bidirectional optical packet switching rings | |
ITMI20011657A1 (en) | METHOD TO MANAGE MULTIPLE FAULTS OF DIFFERENT TYPES IN TELECOMMUNICATIONS NETWORKS WITH RING TOPOLOGY | |
Kamamura et al. | Relaxed maintenance protection architecture by dynamic backup path configuration |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20070801 Termination date: 20100923 |