CN1588883A - Network protective method based on multiple volume preset protective ring - Google Patents
Network protective method based on multiple volume preset protective ring Download PDFInfo
- Publication number
- CN1588883A CN1588883A CN 200410066596 CN200410066596A CN1588883A CN 1588883 A CN1588883 A CN 1588883A CN 200410066596 CN200410066596 CN 200410066596 CN 200410066596 A CN200410066596 A CN 200410066596A CN 1588883 A CN1588883 A CN 1588883A
- Authority
- CN
- China
- Prior art keywords
- link
- protection ring
- preset
- network
- preset protection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Abstract
A method for providing protection to network with preset protect loops based on multiple volumes is to first of all adopt a linear mapping model to minimum the general volume or total cost of the network backup resource in terms of 100% recovery of the network to optimize the network resource configuration, then to adopt a modified algorithm to adjust the backup resource of each loop link to protect the preset property of loop, among which, the said preset protection loop based on multiple volumes means the preset protection rate of two or over backup resources are permitted on each loop link.
Description
Technical field
The present invention relates to a kind of network protection method, specifically is a kind of preset protection ring network protection method based on multicapacity.Be used for network communications technology field.
Background technology
Along with the continuous development of Internet and network technology, more and more higher requirement has been proposed for the survivability and the reconfigurability of network.Based on network ring topology and mesh network topology have proposed many protection recovery policies.(as BLSR) can realize protecting fast recovery (about 50ms) in ring network, but needs to reserve 100% resource backup at least.In mesh network; adopt shared path protecting method can realize very high resource utilization (as being less than 70%); but need complicated signaling during owing to fault recovery; and after fault takes place; the switch of middle each node needs configuration in real time, can't realize that therefore protection fast recovers as ring network.Protection scheme based on preset protection ring has possessed ring network protection and two advantages of the efficient resource utilization of mesh network fast simultaneously, so preset protection ring is a kind of ideal scheme that improves network survivability.Preset protection ring can be applied to diverse network, as IP, and MPLS, SDH, ASON, WDM network.
There is three types preset protection ring at present: link protection preset protection ring, Node Protection preset protection ring and stream protection preset protection ring.Discovery by literature search, people such as G.Shen have delivered one piece of article on the 21st the 8th phase of volume of the selected topic magazine (i.e. " IEEE JSAC ") of communicating by letter of U.S. electric and Electronic Engineering Association: the preset protection ring that expands to the route segment protection is used for the protection recovery (" Extending thep-cycle concept to path segment protection for span and node failure recovery ") of link and node failure.This article has been introduced the notion of stream protection preset protection ring, and such preset protection ring can be protected all business on the circle link chord link of preset protection ring, also can protect the Business Stream that has different intersection points more than two with preset protection ring at least.These three kinds of preset protection rings are referred to as traditional preset protection ring, and they have a common ground, and that is exactly must the identical resource backup of configuration on each bar circle link of each preset protection ring, and this restriction has brought certain resource redundancy.
Summary of the invention
The objective of the invention is to overcome the deficiency and the defective of existing traditional preset protection ring technology, proposed a kind of preset protection ring network protection method, make it obtain higher network resource utilization based on multicapacity.
The present invention is achieved by the following technical solutions; the present invention uses the preset protection ring based on multicapacity to provide protection as network; guaranteeing under the network 100% recoverable prerequisite; at first adopt linear programming model; make total amount or total cost minimum of the resource backup of network; reach the purpose of optimizing the Internet resources configuration; next adopts a correction algorithm to adjust the preset feature of the resource backup of every circle link with the protection preset protection ring; wherein said preset protection ring based on multicapacity is meant on each bar circle link the preset protection ring that allows two kinds of configurations or two or more resource backup; can reduce the resource redundancy degree, improve utilization rate of network resource.The linear programming solution adopts ripe algorithm, can be simple algorithm, or the Karmarkar algorithm, perhaps finds the solution with the linear programming software kit.
1, described linear programming model, establishment step is as follows:
(1) collects network parameter
S is the link set of network;
P is the preset protection ring set of all preliminary elections in the network;
c
kIt is the cost of unit bandwidth among the link k;
D
iBe all node pair sets that are subjected to failure effect;
d
rBe the number of node to unit bandwidth professional between the r;
When link i lost efficacy, if preset protection ring j can not protect stream r, then γ
I, j rBe 0, if inefficacy link i then is 1, otherwise is 2 not only in Working service r but also in circle j;
If the link k among the circle j is the inefficacy link i that is used for protecting among the Working service stream r, then δ
I, j, k rBe 1, otherwise be 0;
(2) defined variable
n
J, kBe the final variables of linear programming model, the unit bandwidth number of the circle link k on the expression circle j;
n
I, j rBe the intermediate variable of linear programming model, expression was enclosed maximum unit bandwidth numbers that j needs when the link i on the Working service r lost efficacy.(annotate: when protection recovers this Working service r; if some link among the circle j does not use; then needn't be on these links the configuration backup resource; if therefore allow configuration two kinds or two or more resource backups on each bar circle link of preset protection ring; then can reduce the redundancy of Internet resources, improve utilization rate of network resource.This is the main distinction based on multiclass degree preset protection ring and traditional preset protection ring of the present invention.)
(3) set up the survivability constraint
This survivability constraint has guaranteed the recovery of network failure service energy 100% when breaking down.
(4) set up bandwidth constraint
If this constraint representation link i breaks down at the place, and preset protection ring j is used to provide protection and recovers, and then encloses the bandwidth of the circle link k on the j and enough recovers for all failure services provide protection.
(5) set up target function
The total cost minimum of band width configuration on the multiclass degree P circle that this target function guarantees to try to achieve by linear programming model of the present invention.If c
kGet 1, then target function is represented the total amount minimum of resource backup.
By finding the solution top linear programming equation group, needing on each bar link of each preset protection ring to obtain the resource backup quantity that disposes.
2, described circle link backup resource correction algorithm is as described below:
On preset protection ring, the resource backup capacity is that 0 circle link definition is a virtual link.On preset protection ring, except empty limit, the circle link definition of resource backup capacity minimum is the minimum capacity link.Virtual link and minimum capacity link are divided into several sections to preset protection ring.In order to guarantee the preset feature of preset protection ring, the multicapacity preset protection ring must satisfy one and preset constraint, and that is exactly for the maximum resource backup capacity in these limits of all necessary configuration, all limits on each preset protection ring section.Algorithm is adjusted each preset protection ring, and realizes in two steps:
(1) finds out virtual link and the minimum capacity link that this encloses, promptly found and cut apart all preset protection ring sections that obtain;
(2) find heap(ed) capacity on each preset protection ring section respectively, and all limits on this circle section are all disposed heap(ed) capacity on this section.
Compare with the network protection method of traditional preset protection ring; adopt preset protection ring network protection method of the present invention; in the quick protection recovery characteristics that keeps traditional preset protection ring; under different network topologies and service distribution, can improve the network resource utilization of 4%-60%.
Description of drawings
Fig. 1 is a multicapacity preset protection ring schematic diagram of the present invention
Fig. 2 finds the solution the resource backup capacity configuration schematic diagram of the multicapacity preset protection ring that obtains for linear programming model of the present invention
Fig. 3 is the resource backup capacity configuration schematic diagram of the multicapacity preset protection ring that obtains after the circle link backup resource correction algorithm adjustment of preset protection ring of the present invention
Embodiment
In order to understand technical scheme of the present invention better, execution mode is explained in detail below in conjunction with accompanying drawing.
Example 1
Looped network with one six node is the difference that example is come preset protection ring more of the present invention and traditional preset protection ring below, as shown in Figure 1.1 is the circle link of preset protection ring among Fig. 1; 2 is Working service among Fig. 1.Suppose to have in looped network two business, one is B-A-F-E-D, and another is B-C-D-E, and the bandwidth of two business all is 10.
Preset protection ring in traditional preset protection ring method is A-B-C-D-E-F-A.The resource backup of all links is identical on the preset protection ring, is 20.
In Fig. 1; if when Business Stream B-A-F-E-D lost efficacy; restoration path adopts B-C-D; this shows that the link k (be B-C or C-D) of circle among the j is that to be used for protecting inefficacy link i among the Working service stream r (being B-A-F-E-D) (be B-A, or A-F, or F-E; or E-D); that is to say, when k is B-C or C-D, δ
I, j, k rBe 1, k then is 0 when being other limit.Similarly, if Business Stream B-C-D-E lost efficacy, restoration path adopts B-A-F-E, then when k be B-A, or A-F, or during F-E, δ
I, j, k rBe 1, k then is 0 when being other limit.(can use the linear programming software kit by finding the solution above-mentioned linear programming equation group; as LP_Solver; CPLEX etc.); can obtain guaranteeing under the network 100% recoverable prerequisite; make under the situation of the total amount of resource backup of network or total cost minimum; need the resource backup quantity that disposes on each bar circle link of each preset protection ring, as shown in Figure 1.Can find that the protection of two business recovers the link D-E of arriving all useless, therefore, the resource backup on the link D-E can be 0, and promptly link D-E is a virtual link.Because in this example, preset constraints and satisfy, so needn't carry out circle link backup resource correction algorithm.In this example, adopt the network protection method of multicapacity preset protection ring to save 58.3% than the network protection method of traditional preset protection ring.
Example 2
Suppose that the resource backup capacity of every of preset protection ring circle link tries to achieve by linear programming method, as shown in Figure 2.Among Fig. 23 is preset protection paths in the preset protection ring.In Fig. 2, circle link D-E is a virtual link, and circle link A-B is the minimum capacity link.In order to guarantee the preset feature of preset protection ring, the resource backup capacity on the circle link need adopt correction algorithm adjustment.Be that all circle links between the preset protection ring section A-F-E all dispose the resource backup capacity of 2 units, all the circle links between the preset protection ring section B-C-D all dispose the resource backup capacity of 3 units.The configuration of the resource backup of the multicapacity preset protection ring that obtains is at last compared with the network protection method of traditional preset protection ring as shown in Figure 3, and the network protection method of multicapacity preset protection ring of the present invention can save 38.9%.
Claims (3)
1; a kind of preset protection ring network protection method based on multicapacity; it is characterized in that; use preset protection ring to provide protection as network based on multicapacity; under the prerequisite that network 100% can recover; at first adopt linear programming model; make total amount or total cost minimum of the resource backup of network; reach and optimize the Internet resources configuration; next adopts a correction algorithm to adjust the preset feature of the resource backup protection preset protection ring of every circle link; wherein, described preset protection ring based on multicapacity is meant on each bar circle link the preset protection ring rate that allows two kinds of configurations or two or more resource backup.
2, the preset protection ring network protection method based on multicapacity according to claim 1 is characterized in that, described linear programming model, and establishment step is as follows:
(1) collects network parameter
S is the link set of network, and P is the preset protection ring set of all preliminary elections in the network, c
kBe the cost of unit bandwidth among the link k, D
iBe all node pair sets that are subjected to failure effect, d
rBe the number of node, when link i lost efficacy, if preset protection ring j can not protect stream r, then γ to unit bandwidth professional between the r
I, j rBe 0, if inefficacy link i then is 1, otherwise is 2 not only in Working service r but also in circle j; If the link k among the circle j is the inefficacy link i that is used for protecting among the Working service stream r, then δ
I, j, k rBe 1, otherwise be 0;
(2) defined variable
n
J, kBe the final variables of linear programming model, the unit bandwidth number of the circle link k on the expression circle j, n
I, j rBe the intermediate variable of linear programming model, expression was enclosed maximum unit bandwidth numbers that j needs when the link i on the Working service r lost efficacy;
(3) set up the survivability constraint
This survivability constraint has guaranteed the recovery of network failure service energy 100% when breaking down;
(4) set up bandwidth constraint
If this constraint representation link i breaks down at the place, and preset protection ring j is used to provide protection and recovers, and then encloses the bandwidth of the circle link k on the j and enough recovers for all failure services provide protection;
(5) set up target function
Minimize∑∑c
kn
j,k
If the total cost minimum of band width configuration on the multiclass degree P circle that this target function guarantees to try to achieve by linear programming model is c
kGet 1, then target function is represented the total amount minimum of resource backup.
3, the preset protection ring network protection method based on multicapacity according to claim 1 is characterized in that, described circle link backup resource correction algorithm is as follows:
On preset protection ring; the resource backup capacity is that 0 circle link definition is a virtual link; on preset protection ring; except empty limit; the circle link definition of resource backup capacity minimum is the minimum capacity link; virtual link and minimum capacity link are divided into several sections to preset protection ring; in order to guarantee the preset feature of preset protection ring; the multicapacity preset protection ring must satisfy one and preset constraint; that is exactly for the maximum resource backup capacity in these limits of all necessary configuration, all limits on each preset protection ring section; algorithm is adjusted each preset protection ring, and realizes in two steps:
(1) finds out virtual link and the minimum capacity link that this encloses, promptly found and cut apart all preset protection ring sections that obtain;
(2) find heap(ed) capacity on each preset protection ring section respectively, and all limits on this circle section are all disposed heap(ed) capacity on this section.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2004100665961A CN1330129C (en) | 2004-09-23 | 2004-09-23 | Network protective method based on multiple volume preset protective ring |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2004100665961A CN1330129C (en) | 2004-09-23 | 2004-09-23 | Network protective method based on multiple volume preset protective ring |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1588883A true CN1588883A (en) | 2005-03-02 |
CN1330129C CN1330129C (en) | 2007-08-01 |
Family
ID=34604052
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2004100665961A Expired - Fee Related CN1330129C (en) | 2004-09-23 | 2004-09-23 | Network protective method based on multiple volume preset protective ring |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1330129C (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101494473A (en) * | 2009-03-04 | 2009-07-29 | 北京邮电大学 | Protection method for WDM optical network loop based on resource and taking regard of protection duration control |
CN101114983B (en) * | 2006-07-27 | 2010-06-23 | 中国科学院计算技术研究所 | Method for enhancing network capacity |
CN101227530B (en) * | 2008-02-03 | 2011-04-06 | 中兴通讯股份有限公司 | Method and apparatus of resource backup |
CN104734950A (en) * | 2013-12-20 | 2015-06-24 | 中兴通讯股份有限公司 | Method and device for protecting PTN network services |
CN106656787A (en) * | 2017-01-05 | 2017-05-10 | 华北电力大学 | Resource channel joint optimization P-cycle configuration method |
CN108683579A (en) * | 2018-05-14 | 2018-10-19 | 天津大学 | A kind of dynamic link fault protecting method |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6421349B1 (en) * | 1997-07-11 | 2002-07-16 | Telecommunications Research Laboratories | Distributed preconfiguration of spare capacity in closed paths for network restoration |
CA2434115A1 (en) * | 2002-12-05 | 2004-06-05 | Telecommunications Research Laboratories | Method for design of networks based on p-cycles |
-
2004
- 2004-09-23 CN CNB2004100665961A patent/CN1330129C/en not_active Expired - Fee Related
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101114983B (en) * | 2006-07-27 | 2010-06-23 | 中国科学院计算技术研究所 | Method for enhancing network capacity |
CN101227530B (en) * | 2008-02-03 | 2011-04-06 | 中兴通讯股份有限公司 | Method and apparatus of resource backup |
CN101494473A (en) * | 2009-03-04 | 2009-07-29 | 北京邮电大学 | Protection method for WDM optical network loop based on resource and taking regard of protection duration control |
CN101494473B (en) * | 2009-03-04 | 2013-12-11 | 北京邮电大学 | Protection method for WDM optical network loop based on resource and taking regard of protection duration control |
CN104734950A (en) * | 2013-12-20 | 2015-06-24 | 中兴通讯股份有限公司 | Method and device for protecting PTN network services |
CN104734950B (en) * | 2013-12-20 | 2019-04-26 | 中兴通讯股份有限公司 | The method and device that a kind of pair of PTN network business is protected |
CN106656787A (en) * | 2017-01-05 | 2017-05-10 | 华北电力大学 | Resource channel joint optimization P-cycle configuration method |
CN108683579A (en) * | 2018-05-14 | 2018-10-19 | 天津大学 | A kind of dynamic link fault protecting method |
Also Published As
Publication number | Publication date |
---|---|
CN1330129C (en) | 2007-08-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2681884B1 (en) | Apparatus and method for spare capacity allocation on dual link failures | |
Kumar et al. | Notice of Violation of IEEE Publication Principles: Restoration of the network for next generation (5G) optical communication network | |
US20100080119A1 (en) | Method for restoring connections in a network | |
CN1659835A (en) | Distinguishing between link and node failure to facilitate fast reroute | |
CN1694418A (en) | Method for combining multi-section protection and mesh network recovery | |
CN1859431A (en) | Method for realizing two-way marked exchange path | |
CN1494269A (en) | Transmission network restraint path calculating method | |
CN1588883A (en) | Network protective method based on multiple volume preset protective ring | |
CN1921409A (en) | Preset network protection method capable of sharing bandwidth | |
CN101800913B (en) | Realization method for protecting and restoring multiplex section of automatically switched optical network | |
Fang et al. | Enabling subwavelength level traffic grooming in survivable WDM optical network design | |
Frederick et al. | Evaluating dual-failure restorability in mesh-restorable WDM optical networks | |
CN109218084B (en) | Method for improving interdependency network robustness based on coupling link local centrality accumulation index | |
Wang et al. | Coding-aware virtual network mapping for surviving single link failure | |
CN1866856A (en) | Path protecting method in MESH network | |
Assi et al. | On the benefits of lightpath re-provisioning in optical mesh networks | |
Asthana et al. | Second phase reconfiguration of restored path for removal of loop back in p-cycle protection | |
CN1407763A (en) | Protection method for group business stream on wideband switching network | |
Liu et al. | Spare capacity allocation using partially disjoint paths for dual link failure protection | |
Lee et al. | An ear-decomposition based approach for survivable routing in WDM networks | |
Choudhury et al. | Survivable IP link topology design in an IP-over-WDM architecture | |
Katiyar et al. | Network survivability in WDM | |
Lumetta et al. | Classification of two-link failures for all-optical networks | |
Veerasamy et al. | Effect of traffic splitting on link and path restoration planning | |
Xue et al. | Efficient construction of virtual p-cycles protecting all cycle-protectible working links |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20070801 Termination date: 20100923 |